@aztec/p2p 0.0.0-test.1 → 0.0.1-commit.5476d83
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/bootstrap/bootstrap.d.ts +1 -1
- package/dest/bootstrap/bootstrap.d.ts.map +1 -1
- package/dest/bootstrap/bootstrap.js +22 -9
- package/dest/client/factory.d.ts +14 -4
- package/dest/client/factory.d.ts.map +1 -1
- package/dest/client/factory.js +60 -24
- package/dest/client/index.d.ts +2 -1
- package/dest/client/index.d.ts.map +1 -1
- package/dest/client/index.js +1 -0
- package/dest/client/interface.d.ts +157 -0
- package/dest/client/interface.d.ts.map +1 -0
- package/dest/client/interface.js +9 -0
- package/dest/client/p2p_client.d.ts +72 -187
- package/dest/client/p2p_client.d.ts.map +1 -1
- package/dest/client/p2p_client.js +373 -177
- package/dest/config.d.ts +151 -125
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +183 -34
- package/dest/enr/generate-enr.d.ts +11 -3
- package/dest/enr/generate-enr.d.ts.map +1 -1
- package/dest/enr/generate-enr.js +27 -5
- package/dest/enr/index.d.ts +1 -1
- package/dest/errors/attestation-pool.error.d.ts +7 -0
- package/dest/errors/attestation-pool.error.d.ts.map +1 -0
- package/dest/errors/attestation-pool.error.js +12 -0
- package/dest/errors/reqresp.error.d.ts +1 -1
- package/dest/errors/reqresp.error.d.ts.map +1 -1
- package/dest/index.d.ts +4 -1
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +2 -0
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +68 -8
- package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +214 -63
- package/dest/mem_pools/attestation_pool/index.d.ts +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +21 -6
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +126 -25
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts +19 -6
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/memory_attestation_pool.js +111 -21
- package/dest/mem_pools/attestation_pool/mocks.d.ts +225 -5
- package/dest/mem_pools/attestation_pool/mocks.d.ts.map +1 -1
- package/dest/mem_pools/attestation_pool/mocks.js +9 -15
- package/dest/mem_pools/index.d.ts +1 -1
- package/dest/mem_pools/instrumentation.d.ts +10 -12
- package/dest/mem_pools/instrumentation.d.ts.map +1 -1
- package/dest/mem_pools/instrumentation.js +35 -38
- package/dest/mem_pools/interface.d.ts +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts +62 -13
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.js +469 -97
- package/dest/mem_pools/tx_pool/index.d.ts +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts +34 -10
- package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/memory_tx_pool.js +133 -36
- package/dest/mem_pools/tx_pool/priority.d.ts +1 -1
- package/dest/mem_pools/tx_pool/priority.js +1 -1
- package/dest/mem_pools/tx_pool/tx_pool.d.ts +65 -9
- package/dest/mem_pools/tx_pool/tx_pool.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts.map +1 -1
- package/dest/mem_pools/tx_pool/tx_pool_test_suite.js +264 -39
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +4 -2
- package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/attestation_validator.js +45 -9
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.d.ts +20 -0
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.d.ts.map +1 -0
- package/dest/msg_validators/attestation_validator/fisherman_attestation_validator.js +67 -0
- package/dest/msg_validators/attestation_validator/index.d.ts +2 -1
- package/dest/msg_validators/attestation_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/attestation_validator/index.js +1 -0
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +6 -2
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -1
- package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +73 -12
- package/dest/msg_validators/block_proposal_validator/index.d.ts +1 -1
- package/dest/msg_validators/index.d.ts +1 -1
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts +10 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.d.ts.map +1 -0
- package/dest/msg_validators/msg_seen_validator/msg_seen_validator.js +36 -0
- package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts +3 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/allowed_public_setup.js +27 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts +14 -0
- package/dest/msg_validators/tx_validator/archive_cache.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/archive_cache.js +22 -0
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/block_header_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/block_header_validator.js +4 -4
- package/dest/msg_validators/tx_validator/data_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/data_validator.js +56 -86
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts +1 -3
- package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/double_spend_validator.js +21 -27
- package/dest/msg_validators/tx_validator/factory.d.ts +15 -0
- package/dest/msg_validators/tx_validator/factory.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/factory.js +74 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts +11 -0
- package/dest/msg_validators/tx_validator/gas_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/gas_validator.js +115 -0
- package/dest/msg_validators/tx_validator/index.d.ts +8 -1
- package/dest/msg_validators/tx_validator/index.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/index.js +7 -0
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts +8 -4
- package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/metadata_validator.js +39 -20
- package/dest/msg_validators/tx_validator/phases_validator.d.ts +14 -0
- package/dest/msg_validators/tx_validator/phases_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/phases_validator.js +93 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts +17 -0
- package/dest/msg_validators/tx_validator/test_utils.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/test_utils.js +22 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts +12 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/timestamp_validator.js +32 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts +8 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.d.ts.map +1 -0
- package/dest/msg_validators/tx_validator/tx_permitted_validator.js +24 -0
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -1
- package/dest/msg_validators/tx_validator/tx_proof_validator.js +6 -5
- package/dest/services/data_store.d.ts +1 -1
- package/dest/services/data_store.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.d.ts +10 -9
- package/dest/services/discv5/discV5_service.d.ts.map +1 -1
- package/dest/services/discv5/discV5_service.js +63 -36
- package/dest/services/dummy_service.d.ts +50 -11
- package/dest/services/dummy_service.d.ts.map +1 -1
- package/dest/services/dummy_service.js +88 -5
- package/dest/services/encoding.d.ts +26 -7
- package/dest/services/encoding.d.ts.map +1 -1
- package/dest/services/encoding.js +73 -5
- package/dest/services/gossipsub/scoring.d.ts +1 -1
- package/dest/services/index.d.ts +5 -1
- package/dest/services/index.d.ts.map +1 -1
- package/dest/services/index.js +4 -0
- package/dest/services/libp2p/instrumentation.d.ts +20 -0
- package/dest/services/libp2p/instrumentation.d.ts.map +1 -0
- package/dest/services/libp2p/instrumentation.js +164 -0
- package/dest/services/libp2p/libp2p_service.d.ts +78 -89
- package/dest/services/libp2p/libp2p_service.d.ts.map +1 -1
- package/dest/services/libp2p/libp2p_service.js +698 -246
- package/dest/services/peer-manager/interface.d.ts +23 -0
- package/dest/services/peer-manager/interface.d.ts.map +1 -0
- package/dest/services/peer-manager/interface.js +1 -0
- package/dest/services/peer-manager/metrics.d.ts +6 -2
- package/dest/services/peer-manager/metrics.d.ts.map +1 -1
- package/dest/services/peer-manager/metrics.js +22 -2
- package/dest/services/peer-manager/peer_manager.d.ts +102 -22
- package/dest/services/peer-manager/peer_manager.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_manager.js +549 -72
- package/dest/services/peer-manager/peer_scoring.d.ts +7 -2
- package/dest/services/peer-manager/peer_scoring.d.ts.map +1 -1
- package/dest/services/peer-manager/peer_scoring.js +40 -2
- package/dest/services/reqresp/config.d.ts +11 -9
- package/dest/services/reqresp/config.d.ts.map +1 -1
- package/dest/services/reqresp/config.js +18 -4
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts +2 -2
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/batch_connection_sampler.js +10 -6
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts +31 -17
- package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts.map +1 -1
- package/dest/services/reqresp/connection-sampler/connection_sampler.js +142 -84
- package/dest/services/reqresp/index.d.ts +3 -2
- package/dest/services/reqresp/index.d.ts.map +1 -1
- package/dest/services/reqresp/index.js +2 -1
- package/dest/services/reqresp/interface.d.ts +73 -24
- package/dest/services/reqresp/interface.d.ts.map +1 -1
- package/dest/services/reqresp/interface.js +45 -26
- package/dest/services/reqresp/metrics.d.ts +1 -1
- package/dest/services/reqresp/metrics.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/auth.d.ts +43 -0
- package/dest/services/reqresp/protocols/auth.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/auth.js +71 -0
- package/dest/services/reqresp/protocols/block.d.ts +6 -1
- package/dest/services/reqresp/protocols/block.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/block.js +28 -5
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts +30 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/bitvector.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts +11 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_handler.js +39 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts +47 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/block_txs_reqresp.js +75 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts +4 -0
- package/dest/services/reqresp/protocols/block_txs/index.d.ts.map +1 -0
- package/dest/services/reqresp/protocols/block_txs/index.js +3 -0
- package/dest/services/reqresp/protocols/goodbye.d.ts +3 -5
- package/dest/services/reqresp/protocols/goodbye.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/goodbye.js +7 -7
- package/dest/services/reqresp/protocols/index.d.ts +3 -1
- package/dest/services/reqresp/protocols/index.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/index.js +2 -0
- package/dest/services/reqresp/protocols/ping.d.ts +1 -3
- package/dest/services/reqresp/protocols/ping.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.d.ts +39 -7
- package/dest/services/reqresp/protocols/status.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/status.js +72 -5
- package/dest/services/reqresp/protocols/tx.d.ts +13 -2
- package/dest/services/reqresp/protocols/tx.d.ts.map +1 -1
- package/dest/services/reqresp/protocols/tx.js +34 -6
- package/dest/services/reqresp/rate-limiter/index.d.ts +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts +6 -4
- package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limiter.js +10 -2
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.d.ts.map +1 -1
- package/dest/services/reqresp/rate-limiter/rate_limits.js +21 -1
- package/dest/services/reqresp/reqresp.d.ts +24 -66
- package/dest/services/reqresp/reqresp.d.ts.map +1 -1
- package/dest/services/reqresp/reqresp.js +298 -207
- package/dest/services/reqresp/status.d.ts +10 -4
- package/dest/services/reqresp/status.d.ts.map +1 -1
- package/dest/services/reqresp/status.js +9 -2
- package/dest/services/service.d.ts +23 -19
- package/dest/services/service.d.ts.map +1 -1
- package/dest/services/tx_collection/config.d.ts +25 -0
- package/dest/services/tx_collection/config.d.ts.map +1 -0
- package/dest/services/tx_collection/config.js +58 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts +50 -0
- package/dest/services/tx_collection/fast_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/fast_tx_collection.js +300 -0
- package/dest/services/tx_collection/index.d.ts +3 -0
- package/dest/services/tx_collection/index.d.ts.map +1 -0
- package/dest/services/tx_collection/index.js +2 -0
- package/dest/services/tx_collection/instrumentation.d.ts +10 -0
- package/dest/services/tx_collection/instrumentation.d.ts.map +1 -0
- package/dest/services/tx_collection/instrumentation.js +34 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts +52 -0
- package/dest/services/tx_collection/slow_tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/slow_tx_collection.js +177 -0
- package/dest/services/tx_collection/tx_collection.d.ts +109 -0
- package/dest/services/tx_collection/tx_collection.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection.js +128 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts +30 -0
- package/dest/services/tx_collection/tx_collection_sink.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_collection_sink.js +111 -0
- package/dest/services/tx_collection/tx_source.d.ts +18 -0
- package/dest/services/tx_collection/tx_source.d.ts.map +1 -0
- package/dest/services/tx_collection/tx_source.js +31 -0
- package/dest/services/tx_provider.d.ts +49 -0
- package/dest/services/tx_provider.d.ts.map +1 -0
- package/dest/services/tx_provider.js +210 -0
- package/dest/services/tx_provider_instrumentation.d.ts +13 -0
- package/dest/services/tx_provider_instrumentation.d.ts.map +1 -0
- package/dest/services/tx_provider_instrumentation.js +34 -0
- package/dest/test-helpers/generate-peer-id-private-keys.d.ts +1 -1
- package/dest/test-helpers/get-ports.d.ts +1 -1
- package/dest/test-helpers/get-ports.d.ts.map +1 -1
- package/dest/test-helpers/index.d.ts +2 -1
- package/dest/test-helpers/index.d.ts.map +1 -1
- package/dest/test-helpers/index.js +1 -0
- package/dest/test-helpers/make-enrs.d.ts +1 -1
- package/dest/test-helpers/make-enrs.d.ts.map +1 -1
- package/dest/test-helpers/make-enrs.js +4 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts +33 -5
- package/dest/test-helpers/make-test-p2p-clients.d.ts.map +1 -1
- package/dest/test-helpers/make-test-p2p-clients.js +86 -16
- package/dest/test-helpers/mock-pubsub.d.ts +59 -0
- package/dest/test-helpers/mock-pubsub.d.ts.map +1 -0
- package/dest/test-helpers/mock-pubsub.js +130 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts +12 -0
- package/dest/test-helpers/mock-tx-helpers.d.ts.map +1 -0
- package/dest/test-helpers/mock-tx-helpers.js +19 -0
- package/dest/test-helpers/reqresp-nodes.d.ts +15 -11
- package/dest/test-helpers/reqresp-nodes.d.ts.map +1 -1
- package/dest/test-helpers/reqresp-nodes.js +62 -28
- package/dest/testbench/p2p_client_testbench_worker.d.ts +1 -1
- package/dest/testbench/p2p_client_testbench_worker.js +103 -29
- package/dest/testbench/parse_log_file.d.ts +1 -1
- package/dest/testbench/parse_log_file.js +4 -4
- package/dest/testbench/testbench.d.ts +1 -1
- package/dest/testbench/testbench.js +4 -4
- package/dest/testbench/worker_client_manager.d.ts +1 -6
- package/dest/testbench/worker_client_manager.d.ts.map +1 -1
- package/dest/testbench/worker_client_manager.js +11 -19
- package/dest/types/index.d.ts +4 -2
- package/dest/types/index.d.ts.map +1 -1
- package/dest/types/index.js +2 -0
- package/dest/util.d.ts +24 -16
- package/dest/util.d.ts.map +1 -1
- package/dest/util.js +75 -69
- package/dest/versioning.d.ts +4 -4
- package/dest/versioning.d.ts.map +1 -1
- package/dest/versioning.js +8 -3
- package/package.json +32 -27
- package/src/bootstrap/bootstrap.ts +27 -11
- package/src/client/factory.ts +136 -45
- package/src/client/index.ts +1 -0
- package/src/client/interface.ts +198 -0
- package/src/client/p2p_client.ts +469 -330
- package/src/config.ts +305 -134
- package/src/enr/generate-enr.ts +39 -6
- package/src/errors/attestation-pool.error.ts +13 -0
- package/src/index.ts +4 -0
- package/src/mem_pools/attestation_pool/attestation_pool.ts +75 -7
- package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +264 -65
- package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +173 -34
- package/src/mem_pools/attestation_pool/memory_attestation_pool.ts +156 -30
- package/src/mem_pools/attestation_pool/mocks.ts +11 -10
- package/src/mem_pools/instrumentation.ts +43 -44
- package/src/mem_pools/tx_pool/aztec_kv_tx_pool.ts +549 -108
- package/src/mem_pools/tx_pool/memory_tx_pool.ts +153 -44
- package/src/mem_pools/tx_pool/priority.ts +1 -1
- package/src/mem_pools/tx_pool/tx_pool.ts +67 -8
- package/src/mem_pools/tx_pool/tx_pool_test_suite.ts +217 -34
- package/src/msg_validators/attestation_validator/attestation_validator.ts +54 -11
- package/src/msg_validators/attestation_validator/fisherman_attestation_validator.ts +91 -0
- package/src/msg_validators/attestation_validator/index.ts +1 -0
- package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +82 -14
- package/src/msg_validators/msg_seen_validator/msg_seen_validator.ts +36 -0
- package/src/msg_validators/tx_validator/allowed_public_setup.ts +35 -0
- package/src/msg_validators/tx_validator/archive_cache.ts +28 -0
- package/src/msg_validators/tx_validator/block_header_validator.ts +4 -4
- package/src/msg_validators/tx_validator/data_validator.ts +81 -69
- package/src/msg_validators/tx_validator/double_spend_validator.ts +19 -17
- package/src/msg_validators/tx_validator/factory.ts +109 -0
- package/src/msg_validators/tx_validator/gas_validator.ts +134 -0
- package/src/msg_validators/tx_validator/index.ts +7 -0
- package/src/msg_validators/tx_validator/metadata_validator.ts +58 -21
- package/src/msg_validators/tx_validator/phases_validator.ts +116 -0
- package/src/msg_validators/tx_validator/test_utils.ts +43 -0
- package/src/msg_validators/tx_validator/timestamp_validator.ts +46 -0
- package/src/msg_validators/tx_validator/tx_permitted_validator.ts +17 -0
- package/src/msg_validators/tx_validator/tx_proof_validator.ts +6 -5
- package/src/services/discv5/discV5_service.ts +84 -38
- package/src/services/dummy_service.ts +147 -9
- package/src/services/encoding.ts +80 -5
- package/src/services/index.ts +4 -0
- package/src/services/libp2p/instrumentation.ts +167 -0
- package/src/services/libp2p/libp2p_service.ts +866 -294
- package/src/services/peer-manager/interface.ts +29 -0
- package/src/services/peer-manager/metrics.ts +26 -1
- package/src/services/peer-manager/peer_manager.ts +654 -78
- package/src/services/peer-manager/peer_scoring.ts +46 -3
- package/src/services/reqresp/config.ts +26 -9
- package/src/services/reqresp/connection-sampler/batch_connection_sampler.ts +12 -6
- package/src/services/reqresp/connection-sampler/connection_sampler.ts +148 -95
- package/src/services/reqresp/index.ts +2 -0
- package/src/services/reqresp/interface.ts +91 -36
- package/src/services/reqresp/metrics.ts +4 -1
- package/src/services/reqresp/protocols/auth.ts +83 -0
- package/src/services/reqresp/protocols/block.ts +24 -3
- package/src/services/reqresp/protocols/block_txs/bitvector.ts +90 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_handler.ts +53 -0
- package/src/services/reqresp/protocols/block_txs/block_txs_reqresp.ts +79 -0
- package/src/services/reqresp/protocols/block_txs/index.ts +3 -0
- package/src/services/reqresp/protocols/goodbye.ts +9 -7
- package/src/services/reqresp/protocols/index.ts +2 -0
- package/src/services/reqresp/protocols/status.ts +117 -5
- package/src/services/reqresp/protocols/tx.ts +35 -6
- package/src/services/reqresp/rate-limiter/rate_limiter.ts +12 -3
- package/src/services/reqresp/rate-limiter/rate_limits.ts +21 -1
- package/src/services/reqresp/reqresp.ts +387 -256
- package/src/services/reqresp/status.ts +12 -3
- package/src/services/service.ts +45 -21
- package/src/services/tx_collection/config.ts +84 -0
- package/src/services/tx_collection/fast_tx_collection.ts +340 -0
- package/src/services/tx_collection/index.ts +2 -0
- package/src/services/tx_collection/instrumentation.ts +43 -0
- package/src/services/tx_collection/slow_tx_collection.ts +233 -0
- package/src/services/tx_collection/tx_collection.ts +215 -0
- package/src/services/tx_collection/tx_collection_sink.ts +129 -0
- package/src/services/tx_collection/tx_source.ts +37 -0
- package/src/services/tx_provider.ts +216 -0
- package/src/services/tx_provider_instrumentation.ts +44 -0
- package/src/test-helpers/index.ts +1 -0
- package/src/test-helpers/make-enrs.ts +4 -5
- package/src/test-helpers/make-test-p2p-clients.ts +111 -21
- package/src/test-helpers/mock-pubsub.ts +188 -0
- package/src/test-helpers/mock-tx-helpers.ts +24 -0
- package/src/test-helpers/reqresp-nodes.ts +86 -35
- package/src/testbench/p2p_client_testbench_worker.ts +151 -25
- package/src/testbench/parse_log_file.ts +4 -4
- package/src/testbench/testbench.ts +4 -4
- package/src/testbench/worker_client_manager.ts +17 -23
- package/src/types/index.ts +2 -0
- package/src/util.ts +105 -91
- package/src/versioning.ts +11 -4
|
@@ -1,20 +1,31 @@
|
|
|
1
|
+
import type { EpochCacheInterface } from '@aztec/epoch-cache';
|
|
2
|
+
import { makeEthSignDigest, tryRecoverAddress } from '@aztec/foundation/crypto';
|
|
3
|
+
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
4
|
+
import { Fr } from '@aztec/foundation/fields';
|
|
1
5
|
import { createLogger } from '@aztec/foundation/log';
|
|
2
|
-
import
|
|
6
|
+
import { bufferToHex } from '@aztec/foundation/string';
|
|
7
|
+
import { DateProvider } from '@aztec/foundation/timer';
|
|
8
|
+
import type { PeerInfo, WorldStateSynchronizer } from '@aztec/stdlib/interfaces/server';
|
|
3
9
|
import type { PeerErrorSeverity } from '@aztec/stdlib/p2p';
|
|
4
10
|
import { type TelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
5
11
|
|
|
6
|
-
import type { ENR } from '@chainsafe/enr';
|
|
7
12
|
import type { Connection, PeerId } from '@libp2p/interface';
|
|
13
|
+
import { peerIdFromString } from '@libp2p/peer-id';
|
|
8
14
|
import type { Multiaddr } from '@multiformats/multiaddr';
|
|
15
|
+
import { ENR } from '@nethermindeth/enr';
|
|
9
16
|
import { inspect } from 'util';
|
|
10
17
|
|
|
11
18
|
import type { P2PConfig } from '../../config.js';
|
|
12
19
|
import { PeerEvent } from '../../types/index.js';
|
|
13
|
-
import type {
|
|
20
|
+
import type { FullLibp2p } from '../../util.js';
|
|
14
21
|
import { ReqRespSubProtocol } from '../reqresp/interface.js';
|
|
22
|
+
import { AuthRequest, AuthResponse } from '../reqresp/protocols/auth.js';
|
|
15
23
|
import { GoodByeReason, prettyGoodbyeReason } from '../reqresp/protocols/goodbye.js';
|
|
24
|
+
import { StatusMessage } from '../reqresp/protocols/status.js';
|
|
16
25
|
import type { ReqResp } from '../reqresp/reqresp.js';
|
|
26
|
+
import { ReqRespStatus } from '../reqresp/status.js';
|
|
17
27
|
import type { PeerDiscoveryService } from '../service.js';
|
|
28
|
+
import type { PeerManagerInterface } from './interface.js';
|
|
18
29
|
import { PeerManagerMetrics } from './metrics.js';
|
|
19
30
|
import { PeerScoreState, type PeerScoring } from './peer_scoring.js';
|
|
20
31
|
|
|
@@ -22,6 +33,8 @@ const MAX_DIAL_ATTEMPTS = 3;
|
|
|
22
33
|
const MAX_CACHED_PEERS = 100;
|
|
23
34
|
const MAX_CACHED_PEER_AGE_MS = 5 * 60 * 1000; // 5 minutes
|
|
24
35
|
const FAILED_PEER_BAN_TIME_MS = 5 * 60 * 1000; // 5 minutes timeout after failing MAX_DIAL_ATTEMPTS
|
|
36
|
+
const GOODBYE_DIAL_TIMEOUT_MS = 1000;
|
|
37
|
+
const FAILED_AUTH_HANDSHAKE_EXPIRY_MS = 60 * 60 * 1000; // 1 hour
|
|
25
38
|
|
|
26
39
|
type CachedPeer = {
|
|
27
40
|
peerId: PeerId;
|
|
@@ -36,55 +49,183 @@ type TimedOutPeer = {
|
|
|
36
49
|
timeoutUntilMs: number;
|
|
37
50
|
};
|
|
38
51
|
|
|
39
|
-
|
|
52
|
+
type FailedAuthHandshakeEntry = {
|
|
53
|
+
count: number;
|
|
54
|
+
lastFailureTimestamp: number;
|
|
55
|
+
};
|
|
56
|
+
|
|
57
|
+
export class PeerManager implements PeerManagerInterface {
|
|
40
58
|
private cachedPeers: Map<string, CachedPeer> = new Map();
|
|
41
59
|
private heartbeatCounter: number = 0;
|
|
42
60
|
private displayPeerCountsPeerHeartbeat: number = 0;
|
|
43
61
|
private timedOutPeers: Map<string, TimedOutPeer> = new Map();
|
|
62
|
+
private trustedPeers: Set<string> = new Set();
|
|
63
|
+
private trustedPeersInitialized: boolean = false;
|
|
64
|
+
private privatePeers: Set<string> = new Set();
|
|
65
|
+
private privatePeersInitialized: boolean = false;
|
|
66
|
+
private preferredPeers: Set<string> = new Set();
|
|
67
|
+
private authenticatedPeerIdToValidatorAddress: Map<string, EthAddress> = new Map();
|
|
68
|
+
private authenticatedValidatorAddressToPeerId: Map<string, PeerId> = new Map();
|
|
69
|
+
private peersToBeDisconnected: Set<string> = new Set();
|
|
70
|
+
private failedAuthHandshakes: Map<string, FailedAuthHandshakeEntry> = new Map();
|
|
71
|
+
private validatorAddresses: EthAddress[] = [];
|
|
72
|
+
private initializedPreferredPeers: boolean = false;
|
|
44
73
|
|
|
45
74
|
private metrics: PeerManagerMetrics;
|
|
46
|
-
private
|
|
75
|
+
private handlers: {
|
|
76
|
+
handleConnectedPeerEvent: (e: CustomEvent<PeerId>) => void;
|
|
77
|
+
handleDisconnectedPeerEvent: (e: CustomEvent<PeerId>) => void;
|
|
78
|
+
handleDiscoveredPeer: (enr: ENR) => Promise<void>;
|
|
79
|
+
};
|
|
47
80
|
|
|
48
81
|
constructor(
|
|
49
|
-
private libP2PNode:
|
|
82
|
+
private libP2PNode: FullLibp2p,
|
|
50
83
|
private peerDiscoveryService: PeerDiscoveryService,
|
|
51
84
|
private config: P2PConfig,
|
|
52
85
|
telemetryClient: TelemetryClient,
|
|
53
86
|
private logger = createLogger('p2p:peer-manager'),
|
|
54
87
|
private peerScoring: PeerScoring,
|
|
55
88
|
private reqresp: ReqResp,
|
|
89
|
+
private readonly worldStateSynchronizer: WorldStateSynchronizer,
|
|
90
|
+
private readonly protocolVersion: string,
|
|
91
|
+
private readonly epochCache: EpochCacheInterface,
|
|
92
|
+
private readonly dateProvider: DateProvider = new DateProvider(),
|
|
56
93
|
) {
|
|
94
|
+
if (this.config.p2pDisableStatusHandshake && this.config.p2pAllowOnlyValidators) {
|
|
95
|
+
throw new Error('Status handshake disabled but is required to allow only validators to connect.');
|
|
96
|
+
}
|
|
57
97
|
this.metrics = new PeerManagerMetrics(telemetryClient, 'PeerManager');
|
|
58
98
|
|
|
99
|
+
// Handle Discovered peers
|
|
100
|
+
this.handlers = {
|
|
101
|
+
handleConnectedPeerEvent: this.handleConnectedPeerEvent.bind(this),
|
|
102
|
+
handleDisconnectedPeerEvent: this.handleDisconnectedPeerEvent.bind(this),
|
|
103
|
+
handleDiscoveredPeer: (enr: ENR) =>
|
|
104
|
+
this.handleDiscoveredPeer(enr).catch(e => this.logger.error('Error handling discovered peer', e)),
|
|
105
|
+
};
|
|
106
|
+
|
|
59
107
|
// Handle new established connections
|
|
60
|
-
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent
|
|
108
|
+
this.libP2PNode.addEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
61
109
|
// Handle lost connections
|
|
62
|
-
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent
|
|
110
|
+
this.libP2PNode.addEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
63
111
|
|
|
64
|
-
// Handle Discovered peers
|
|
65
|
-
this.discoveredPeerHandler = (enr: ENR) =>
|
|
66
|
-
this.handleDiscoveredPeer(enr).catch(e => this.logger.error('Error handling discovered peer', e));
|
|
67
112
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
68
|
-
this.peerDiscoveryService
|
|
113
|
+
this.peerDiscoveryService?.on(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
69
114
|
|
|
70
115
|
// Display peer counts every 60 seconds
|
|
71
116
|
this.displayPeerCountsPeerHeartbeat = Math.floor(60_000 / this.config.peerCheckIntervalMS);
|
|
72
117
|
}
|
|
118
|
+
/**
|
|
119
|
+
* Initializes the trusted peers.
|
|
120
|
+
*
|
|
121
|
+
* This function is called when the peer manager is initialized.
|
|
122
|
+
*/
|
|
123
|
+
async initializePeers() {
|
|
124
|
+
if (this.config.trustedPeers) {
|
|
125
|
+
const trustedPeersEnrs: ENR[] = this.config.trustedPeers.map(enr => ENR.decodeTxt(enr));
|
|
126
|
+
await Promise.all(trustedPeersEnrs.map(enr => enr.peerId()))
|
|
127
|
+
.then(peerIds => peerIds.forEach(peerId => this.trustedPeers.add(peerId.toString())))
|
|
128
|
+
.finally(() => {
|
|
129
|
+
this.trustedPeersInitialized = true;
|
|
130
|
+
})
|
|
131
|
+
.catch(e => this.logger.error('Error initializing trusted peers', e));
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
if (this.config.privatePeers) {
|
|
135
|
+
const privatePeersEnrs: ENR[] = this.config.privatePeers.map(enr => ENR.decodeTxt(enr));
|
|
136
|
+
await Promise.all(privatePeersEnrs.map(enr => enr.peerId()))
|
|
137
|
+
.then(peerIds =>
|
|
138
|
+
peerIds.forEach(peerId => {
|
|
139
|
+
this.trustedPeers.add(peerId.toString());
|
|
140
|
+
this.privatePeers.add(peerId.toString());
|
|
141
|
+
}),
|
|
142
|
+
)
|
|
143
|
+
.finally(() => {
|
|
144
|
+
if (!this.config.trustedPeers) {
|
|
145
|
+
this.trustedPeersInitialized = true;
|
|
146
|
+
}
|
|
147
|
+
this.privatePeersInitialized = true;
|
|
148
|
+
})
|
|
149
|
+
.catch(e => this.logger.error('Error initializing private peers', e));
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
if (this.config.preferredPeers) {
|
|
153
|
+
const preferredPeersEnrs: ENR[] = this.config.preferredPeers.map(enr => ENR.decodeTxt(enr));
|
|
154
|
+
await Promise.all(preferredPeersEnrs.map(enr => enr.peerId()))
|
|
155
|
+
.then(peerIds => peerIds.forEach(peerId => this.preferredPeers.add(peerId.toString())))
|
|
156
|
+
.catch(e => this.logger.error('Error initializing preferred peers', e));
|
|
157
|
+
}
|
|
158
|
+
}
|
|
73
159
|
|
|
74
160
|
get tracer() {
|
|
75
161
|
return this.metrics.tracer;
|
|
76
162
|
}
|
|
77
163
|
|
|
78
164
|
@trackSpan('PeerManager.heartbeat')
|
|
79
|
-
public heartbeat() {
|
|
165
|
+
public async heartbeat() {
|
|
80
166
|
this.heartbeatCounter++;
|
|
81
167
|
this.peerScoring.decayAllScores();
|
|
82
|
-
|
|
83
168
|
this.cleanupExpiredTimeouts();
|
|
84
169
|
|
|
170
|
+
await this.setupDirectPeersIfValidator();
|
|
171
|
+
await this.updateAuthenticatedPeers();
|
|
172
|
+
await this.processScheduledDisconnects();
|
|
173
|
+
|
|
85
174
|
this.discover();
|
|
86
175
|
}
|
|
87
176
|
|
|
177
|
+
/*
|
|
178
|
+
* If this node is connecting to preferred peers, make sure it is registered validator */
|
|
179
|
+
async setupDirectPeersIfValidator() {
|
|
180
|
+
if (!this.config.preferredPeers) {
|
|
181
|
+
return;
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
// Already initialized preferred peers, don't wastefully repeat the same work
|
|
185
|
+
if (this.initializedPreferredPeers) {
|
|
186
|
+
return;
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
190
|
+
const validatorSet = new Set(registeredValidators.map(v => v.toString()));
|
|
191
|
+
const isThisNodePartOfValidatorSet = this.validatorAddresses.some(v => validatorSet.has(v.toString()));
|
|
192
|
+
|
|
193
|
+
if (!isThisNodePartOfValidatorSet) {
|
|
194
|
+
return;
|
|
195
|
+
}
|
|
196
|
+
|
|
197
|
+
const preferredPeersEnrs: ENR[] = this.config.preferredPeers.map(enr => ENR.decodeTxt(enr));
|
|
198
|
+
await Promise.all(preferredPeersEnrs.map(enr => enr.peerId()))
|
|
199
|
+
.then(peerIds => peerIds.forEach(peerId => this.preferredPeers.add(peerId.toString())))
|
|
200
|
+
.catch(e => this.logger.error('Error initializing preferred peers', e));
|
|
201
|
+
|
|
202
|
+
const directPeers = (
|
|
203
|
+
await Promise.all(
|
|
204
|
+
preferredPeersEnrs.map(async enr => {
|
|
205
|
+
const peerId = await enr.peerId();
|
|
206
|
+
const address = enr.getLocationMultiaddr('tcp');
|
|
207
|
+
if (address === undefined) {
|
|
208
|
+
throw new Error(`Direct peer ${peerId.toString()} has no TCP address, ENR: ${enr.encodeTxt()}`);
|
|
209
|
+
}
|
|
210
|
+
return {
|
|
211
|
+
id: peerId,
|
|
212
|
+
addrs: [address],
|
|
213
|
+
};
|
|
214
|
+
}),
|
|
215
|
+
)
|
|
216
|
+
).filter(peer => peer !== undefined);
|
|
217
|
+
|
|
218
|
+
await Promise.all(
|
|
219
|
+
directPeers.map(peer => {
|
|
220
|
+
this.libP2PNode.services.pubsub.direct.add(peer.id.toString());
|
|
221
|
+
|
|
222
|
+
return this.libP2PNode.peerStore.merge(peer.id, { multiaddrs: peer.addrs });
|
|
223
|
+
}),
|
|
224
|
+
);
|
|
225
|
+
|
|
226
|
+
this.initializedPreferredPeers = true;
|
|
227
|
+
}
|
|
228
|
+
|
|
88
229
|
/**
|
|
89
230
|
* Cleans up expired timeouts.
|
|
90
231
|
*
|
|
@@ -94,7 +235,7 @@ export class PeerManager {
|
|
|
94
235
|
*/
|
|
95
236
|
private cleanupExpiredTimeouts() {
|
|
96
237
|
// Clean up expired timeouts
|
|
97
|
-
const now =
|
|
238
|
+
const now = this.dateProvider.now();
|
|
98
239
|
for (const [peerId, timedOutPeer] of this.timedOutPeers.entries()) {
|
|
99
240
|
if (now >= timedOutPeer.timeoutUntilMs) {
|
|
100
241
|
this.timedOutPeers.delete(peerId);
|
|
@@ -103,16 +244,57 @@ export class PeerManager {
|
|
|
103
244
|
}
|
|
104
245
|
|
|
105
246
|
/**
|
|
106
|
-
*
|
|
247
|
+
* Processes scheduled disconnects during heartbeat.
|
|
248
|
+
*
|
|
249
|
+
* This batch processes all peers that have been marked for disconnect.
|
|
250
|
+
* preventing immediate disconnects that could cause libp2p state corruption.
|
|
251
|
+
*/
|
|
252
|
+
private async processScheduledDisconnects() {
|
|
253
|
+
if (this.peersToBeDisconnected.size === 0) {
|
|
254
|
+
return;
|
|
255
|
+
}
|
|
256
|
+
|
|
257
|
+
const peersToDisconnect = Array.from(this.peersToBeDisconnected);
|
|
258
|
+
|
|
259
|
+
this.logger.debug(`Processing ${peersToDisconnect.length} scheduled disconnects`);
|
|
260
|
+
try {
|
|
261
|
+
await Promise.all(
|
|
262
|
+
peersToDisconnect.map(async peerIdStr => {
|
|
263
|
+
if (await this.disconnectPeer(peerIdFromString(peerIdStr))) {
|
|
264
|
+
this.peersToBeDisconnected.delete(peerIdStr);
|
|
265
|
+
}
|
|
266
|
+
}),
|
|
267
|
+
);
|
|
268
|
+
this.logger.verbose(`Disconnected ${peersToDisconnect.length} peers`, { peersToDisconnect });
|
|
269
|
+
} catch (error) {
|
|
270
|
+
this.logger.error('Error when disconnecting from peers', error);
|
|
271
|
+
}
|
|
272
|
+
}
|
|
273
|
+
|
|
274
|
+
/**
|
|
275
|
+
* Performs Status Handshake with a connected peer.
|
|
107
276
|
* @param e - The connected peer event.
|
|
108
277
|
*/
|
|
109
278
|
private handleConnectedPeerEvent(e: CustomEvent<PeerId>) {
|
|
110
279
|
const peerId = e.detail;
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
280
|
+
this.logger.verbose(`Connected to peer ${peerId.toString()}`);
|
|
281
|
+
if (this.config.p2pDisableStatusHandshake) {
|
|
282
|
+
return;
|
|
283
|
+
}
|
|
284
|
+
// If we are not configured to only allow validators then perform a status handshake
|
|
285
|
+
if (!this.config.p2pAllowOnlyValidators) {
|
|
286
|
+
void this.exchangeStatusHandshake(peerId);
|
|
287
|
+
return;
|
|
288
|
+
}
|
|
289
|
+
|
|
290
|
+
// We are configured to only allow validators, but this doesn't apply to trusted, private peers or preferred peers
|
|
291
|
+
if (this.isProtectedPeer(peerId)) {
|
|
292
|
+
void this.exchangeStatusHandshake(peerId);
|
|
293
|
+
return;
|
|
115
294
|
}
|
|
295
|
+
|
|
296
|
+
// Initiate auth handshake
|
|
297
|
+
void this.exchangeAuthHandshake(peerId);
|
|
116
298
|
}
|
|
117
299
|
|
|
118
300
|
/**
|
|
@@ -121,11 +303,101 @@ export class PeerManager {
|
|
|
121
303
|
*/
|
|
122
304
|
private handleDisconnectedPeerEvent(e: CustomEvent<PeerId>) {
|
|
123
305
|
const peerId = e.detail;
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
this.logger.
|
|
306
|
+
this.logger.verbose(`Disconnected from peer ${peerId.toString()}`);
|
|
307
|
+
const validatorAddress = this.authenticatedPeerIdToValidatorAddress.get(peerId.toString());
|
|
308
|
+
if (validatorAddress !== undefined) {
|
|
309
|
+
this.logger.info(
|
|
310
|
+
`Removing authentication for validator ${validatorAddress} at peer id ${peerId.toString()} due to disconnection`,
|
|
311
|
+
);
|
|
312
|
+
this.authenticatedValidatorAddressToPeerId.delete(validatorAddress.toString());
|
|
313
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peerId.toString());
|
|
314
|
+
}
|
|
315
|
+
}
|
|
316
|
+
|
|
317
|
+
public registerThisValidatorAddresses(address: EthAddress[]): void {
|
|
318
|
+
this.validatorAddresses = [...address];
|
|
319
|
+
}
|
|
320
|
+
|
|
321
|
+
/**
|
|
322
|
+
* Checks if a peer is trusted.
|
|
323
|
+
* @param peerId - The peer ID.
|
|
324
|
+
* @returns True if the peer is trusted, false otherwise.
|
|
325
|
+
* Note: This function will return false and log a warning if the trusted peers are not initialized.
|
|
326
|
+
*/
|
|
327
|
+
private isTrustedPeer(peerId: PeerId): boolean {
|
|
328
|
+
if (!this.trustedPeersInitialized) {
|
|
329
|
+
this.logger.warn('Trusted peers not initialized, returning false');
|
|
330
|
+
return false;
|
|
128
331
|
}
|
|
332
|
+
return this.trustedPeers.has(peerId.toString());
|
|
333
|
+
}
|
|
334
|
+
|
|
335
|
+
/**
|
|
336
|
+
* Adds a peer to the trusted peers set.
|
|
337
|
+
* @param peerId - The peer ID to add to trusted peers.
|
|
338
|
+
*/
|
|
339
|
+
public addTrustedPeer(peerId: PeerId): void {
|
|
340
|
+
const peerIdStr = peerId.toString();
|
|
341
|
+
|
|
342
|
+
this.trustedPeers.add(peerIdStr);
|
|
343
|
+
this.trustedPeersInitialized = true;
|
|
344
|
+
this.logger.verbose(`Added trusted peer ${peerIdStr}`);
|
|
345
|
+
}
|
|
346
|
+
|
|
347
|
+
/**
|
|
348
|
+
* Adds a peer to the private peers set.
|
|
349
|
+
* @param peerId - The peer ID to add to private peers.
|
|
350
|
+
*/
|
|
351
|
+
public addPrivatePeer(peerId: PeerId): void {
|
|
352
|
+
const peerIdStr = peerId.toString();
|
|
353
|
+
|
|
354
|
+
this.trustedPeers.add(peerIdStr);
|
|
355
|
+
this.privatePeers.add(peerIdStr);
|
|
356
|
+
this.trustedPeersInitialized = true;
|
|
357
|
+
this.privatePeersInitialized = true;
|
|
358
|
+
this.logger.verbose(`Added private peer ${peerIdStr}`);
|
|
359
|
+
}
|
|
360
|
+
|
|
361
|
+
/**
|
|
362
|
+
* Checks if a peer is private.
|
|
363
|
+
* @param peerId - The peer ID.
|
|
364
|
+
* @returns True if the peer is private, false otherwise.
|
|
365
|
+
*/
|
|
366
|
+
private isPrivatePeer(peerId: PeerId): boolean {
|
|
367
|
+
if (!this.privatePeersInitialized) {
|
|
368
|
+
this.logger.warn('Private peers not initialized, returning false');
|
|
369
|
+
return false;
|
|
370
|
+
}
|
|
371
|
+
return this.privatePeers.has(peerId.toString());
|
|
372
|
+
}
|
|
373
|
+
|
|
374
|
+
/**
|
|
375
|
+
* Adds a peer to the preferred peers set.
|
|
376
|
+
* @param peerId - The peer ID to add to preferred peers.
|
|
377
|
+
*/
|
|
378
|
+
public addPreferredPeer(peerId: PeerId): void {
|
|
379
|
+
const peerIdStr = peerId.toString();
|
|
380
|
+
|
|
381
|
+
this.preferredPeers.add(peerIdStr);
|
|
382
|
+
this.logger.verbose(`Added preferred peer ${peerIdStr}`);
|
|
383
|
+
}
|
|
384
|
+
|
|
385
|
+
/**
|
|
386
|
+
* Checks if a peer is preferred.
|
|
387
|
+
* @param peerId - The peer ID.
|
|
388
|
+
* @returns True if the peer is preferred, false otherwise.
|
|
389
|
+
*/
|
|
390
|
+
private isPreferredPeer(peerId: PeerId): boolean {
|
|
391
|
+
return this.preferredPeers.has(peerId.toString());
|
|
392
|
+
}
|
|
393
|
+
|
|
394
|
+
/**
|
|
395
|
+
* Checks if a peer is protected (either trusted or private).
|
|
396
|
+
* @param peerId - The peer ID.
|
|
397
|
+
* @returns True if the peer is protected, false otherwise.
|
|
398
|
+
*/
|
|
399
|
+
private isProtectedPeer(peerId: PeerId): boolean {
|
|
400
|
+
return this.isTrustedPeer(peerId) || this.isPrivatePeer(peerId) || this.isPreferredPeer(peerId);
|
|
129
401
|
}
|
|
130
402
|
|
|
131
403
|
/**
|
|
@@ -140,7 +412,7 @@ export class PeerManager {
|
|
|
140
412
|
|
|
141
413
|
this.metrics.recordGoodbyeReceived(reason);
|
|
142
414
|
|
|
143
|
-
|
|
415
|
+
this.markPeerForDisconnect(peerId);
|
|
144
416
|
}
|
|
145
417
|
|
|
146
418
|
public penalizePeer(peerId: PeerId, penalty: PeerErrorSeverity) {
|
|
@@ -151,6 +423,11 @@ export class PeerManager {
|
|
|
151
423
|
return this.peerScoring.getScore(peerId);
|
|
152
424
|
}
|
|
153
425
|
|
|
426
|
+
public shouldDisableP2PGossip(peerId: string): boolean {
|
|
427
|
+
const isAuthenticated = this.isAuthenticatedPeer(peerIdFromString(peerId));
|
|
428
|
+
return (this.config.p2pAllowOnlyValidators ?? false) && !isAuthenticated;
|
|
429
|
+
}
|
|
430
|
+
|
|
154
431
|
public getPeers(includePending = false): PeerInfo[] {
|
|
155
432
|
const connected = this.libP2PNode
|
|
156
433
|
.getPeers()
|
|
@@ -184,25 +461,61 @@ export class PeerManager {
|
|
|
184
461
|
return [...connected, ...dialQueue, ...cachedPeers];
|
|
185
462
|
}
|
|
186
463
|
|
|
464
|
+
public isAuthenticatedPeer(peerId: PeerId): boolean {
|
|
465
|
+
const peerIdAsString = peerId.toString();
|
|
466
|
+
return (
|
|
467
|
+
this.privatePeers.has(peerIdAsString) ||
|
|
468
|
+
this.trustedPeers.has(peerIdAsString) ||
|
|
469
|
+
this.preferredPeers.has(peerIdAsString) ||
|
|
470
|
+
this.authenticatedPeerIdToValidatorAddress.has(peerIdAsString)
|
|
471
|
+
);
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
/*
|
|
475
|
+
* Checks whether peer is allowed to connect
|
|
476
|
+
*
|
|
477
|
+
* @param id: Address of the node or it's peerId
|
|
478
|
+
*
|
|
479
|
+
* @returns: True if node is allowed to connect, otherwise false
|
|
480
|
+
* */
|
|
481
|
+
public isNodeAllowedToConnect(id: string | PeerId): boolean {
|
|
482
|
+
const entry = this.failedAuthHandshakes.get(id.toString());
|
|
483
|
+
if (!entry) {
|
|
484
|
+
return true;
|
|
485
|
+
}
|
|
486
|
+
|
|
487
|
+
// In case entry is too old, remove it and allow connection
|
|
488
|
+
if (this.dateProvider.now() - entry.lastFailureTimestamp > FAILED_AUTH_HANDSHAKE_EXPIRY_MS) {
|
|
489
|
+
this.failedAuthHandshakes.delete(id.toString());
|
|
490
|
+
return true;
|
|
491
|
+
}
|
|
492
|
+
|
|
493
|
+
return entry.count <= this.config.p2pMaxFailedAuthAttemptsAllowed;
|
|
494
|
+
}
|
|
495
|
+
|
|
187
496
|
/**
|
|
188
497
|
* Discovers peers.
|
|
189
498
|
*/
|
|
190
499
|
private discover() {
|
|
191
500
|
const connections = this.libP2PNode.getConnections();
|
|
192
501
|
|
|
193
|
-
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.
|
|
502
|
+
const healthyConnections = this.prioritizePeers(this.pruneUnhealthyPeers(this.getNonProtectedPeers(connections)));
|
|
194
503
|
|
|
195
504
|
// Calculate how many connections we're looking to make
|
|
196
|
-
const
|
|
505
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
506
|
+
const peersToConnect = this.config.maxPeerCount - healthyConnections.length - protectedPeerCount;
|
|
197
507
|
|
|
198
508
|
const logLevel = this.heartbeatCounter % this.displayPeerCountsPeerHeartbeat === 0 ? 'info' : 'debug';
|
|
199
|
-
this.logger[logLevel](`Connected to ${healthyConnections.length} peers`, {
|
|
200
|
-
|
|
509
|
+
this.logger[logLevel](`Connected to ${healthyConnections.length + this.trustedPeers.size} peers`, {
|
|
510
|
+
discoveredConnections: healthyConnections.length,
|
|
511
|
+
protectedConnections: protectedPeerCount,
|
|
201
512
|
maxPeerCount: this.config.maxPeerCount,
|
|
202
513
|
cachedPeers: this.cachedPeers.size,
|
|
203
514
|
...this.peerScoring.getStats(),
|
|
204
515
|
});
|
|
205
516
|
|
|
517
|
+
this.metrics.recordPeerCount(healthyConnections.length);
|
|
518
|
+
|
|
206
519
|
// Exit if no peers to connect
|
|
207
520
|
if (peersToConnect <= 0) {
|
|
208
521
|
return;
|
|
@@ -217,13 +530,14 @@ export class PeerManager {
|
|
|
217
530
|
.filter(Boolean) as string[],
|
|
218
531
|
);
|
|
219
532
|
|
|
533
|
+
const now = this.dateProvider.now();
|
|
220
534
|
for (const [id, peerData] of this.cachedPeers.entries()) {
|
|
221
535
|
// if already dialling or connected to, remove from cache
|
|
222
536
|
if (
|
|
223
537
|
pendingDials.has(id) ||
|
|
224
538
|
healthyConnections.some(conn => conn.remotePeer.equals(peerData.peerId)) ||
|
|
225
539
|
// if peer has been in cache for the max cache age, remove from cache
|
|
226
|
-
|
|
540
|
+
now - peerData.addedUnixMs > MAX_CACHED_PEER_AGE_MS
|
|
227
541
|
) {
|
|
228
542
|
this.cachedPeers.delete(id);
|
|
229
543
|
} else {
|
|
@@ -248,6 +562,14 @@ export class PeerManager {
|
|
|
248
562
|
}
|
|
249
563
|
}
|
|
250
564
|
|
|
565
|
+
private getNonProtectedPeers(connections: Connection[]): Connection[] {
|
|
566
|
+
return connections.filter(conn => !this.isProtectedPeer(conn.remotePeer));
|
|
567
|
+
}
|
|
568
|
+
|
|
569
|
+
private getProtectedPeerCount(): number {
|
|
570
|
+
return this.trustedPeers.size + this.privatePeers.size + this.preferredPeers.size;
|
|
571
|
+
}
|
|
572
|
+
|
|
251
573
|
private pruneUnhealthyPeers(connections: Connection[]): Connection[] {
|
|
252
574
|
const connectedHealthyPeers: Connection[] = [];
|
|
253
575
|
|
|
@@ -255,9 +577,11 @@ export class PeerManager {
|
|
|
255
577
|
const score = this.peerScoring.getScoreState(peer.remotePeer.toString());
|
|
256
578
|
switch (score) {
|
|
257
579
|
case PeerScoreState.Banned:
|
|
580
|
+
this.metrics.recordLowScoreDisconnect('Banned');
|
|
258
581
|
void this.goodbyeAndDisconnectPeer(peer.remotePeer, GoodByeReason.BANNED);
|
|
259
582
|
break;
|
|
260
583
|
case PeerScoreState.Disconnect:
|
|
584
|
+
this.metrics.recordLowScoreDisconnect('Disconnect');
|
|
261
585
|
void this.goodbyeAndDisconnectPeer(peer.remotePeer, GoodByeReason.LOW_SCORE);
|
|
262
586
|
break;
|
|
263
587
|
case PeerScoreState.Healthy:
|
|
@@ -275,75 +599,85 @@ export class PeerManager {
|
|
|
275
599
|
* @returns The pruned list of connections.
|
|
276
600
|
*/
|
|
277
601
|
private prioritizePeers(connections: Connection[]): Connection[] {
|
|
278
|
-
|
|
279
|
-
|
|
602
|
+
const protectedPeerCount = this.getProtectedPeerCount();
|
|
603
|
+
if (connections.length > this.config.maxPeerCount - protectedPeerCount) {
|
|
604
|
+
// Sort the regular peer scores from highest to lowest
|
|
280
605
|
const prioritizedConnections = connections.sort((connectionA, connectionB) => {
|
|
281
606
|
const connectionScoreA = this.peerScoring.getScore(connectionA.remotePeer.toString());
|
|
282
607
|
const connectionScoreB = this.peerScoring.getScore(connectionB.remotePeer.toString());
|
|
283
608
|
return connectionScoreB - connectionScoreA;
|
|
284
609
|
});
|
|
285
610
|
|
|
286
|
-
//
|
|
287
|
-
|
|
611
|
+
// Calculate how many regular peers we can keep
|
|
612
|
+
const peersToKeep = Math.max(0, this.config.maxPeerCount - protectedPeerCount);
|
|
613
|
+
|
|
614
|
+
// Disconnect from the lowest scoring regular connections that exceed our limit
|
|
615
|
+
for (const conn of prioritizedConnections.slice(peersToKeep)) {
|
|
288
616
|
void this.goodbyeAndDisconnectPeer(conn.remotePeer, GoodByeReason.MAX_PEERS);
|
|
289
617
|
}
|
|
290
|
-
|
|
618
|
+
|
|
619
|
+
// Return trusted connections plus the highest scoring regular connections up to the max peer count
|
|
620
|
+
return prioritizedConnections.slice(0, peersToKeep);
|
|
291
621
|
} else {
|
|
292
622
|
return connections;
|
|
293
623
|
}
|
|
294
624
|
}
|
|
295
625
|
|
|
296
|
-
/**
|
|
297
|
-
* If multiple connections to the same peer are found, the oldest connection is kept and the duplicates are pruned.
|
|
298
|
-
*
|
|
299
|
-
* This is necessary to resolve a race condition where multiple connections to the same peer are established if
|
|
300
|
-
* they are discovered at the same time.
|
|
301
|
-
*
|
|
302
|
-
* @param connections - The list of connections to prune duplicate peers from.
|
|
303
|
-
* @returns The pruned list of connections.
|
|
304
|
-
*/
|
|
305
|
-
private pruneDuplicatePeers(connections: Connection[]): Connection[] {
|
|
306
|
-
const peerConnections = new Map<string, Connection>();
|
|
307
|
-
|
|
308
|
-
for (const conn of connections) {
|
|
309
|
-
const peerId = conn.remotePeer.toString();
|
|
310
|
-
const existingConnection = peerConnections.get(peerId);
|
|
311
|
-
if (!existingConnection) {
|
|
312
|
-
peerConnections.set(peerId, conn);
|
|
313
|
-
} else {
|
|
314
|
-
// Keep the oldest connection for each peer
|
|
315
|
-
this.logger.debug(`Found duplicate connection to peer ${peerId}, keeping oldest connection`);
|
|
316
|
-
if (conn.timeline.open < existingConnection.timeline.open) {
|
|
317
|
-
peerConnections.set(peerId, conn);
|
|
318
|
-
void existingConnection.close();
|
|
319
|
-
} else {
|
|
320
|
-
void conn.close();
|
|
321
|
-
}
|
|
322
|
-
}
|
|
323
|
-
}
|
|
324
|
-
|
|
325
|
-
return [...peerConnections.values()];
|
|
326
|
-
}
|
|
327
|
-
|
|
328
626
|
private async goodbyeAndDisconnectPeer(peer: PeerId, reason: GoodByeReason) {
|
|
329
627
|
this.logger.debug(`Disconnecting peer ${peer.toString()} with reason ${prettyGoodbyeReason(reason)}`);
|
|
330
628
|
|
|
331
629
|
this.metrics.recordGoodbyeSent(reason);
|
|
332
630
|
|
|
333
631
|
try {
|
|
334
|
-
await this.reqresp.sendRequestToPeer(
|
|
632
|
+
const resp = await this.reqresp.sendRequestToPeer(
|
|
633
|
+
peer,
|
|
634
|
+
ReqRespSubProtocol.GOODBYE,
|
|
635
|
+
Buffer.from([reason]),
|
|
636
|
+
GOODBYE_DIAL_TIMEOUT_MS,
|
|
637
|
+
);
|
|
638
|
+
|
|
639
|
+
if (resp.status === ReqRespStatus.FAILURE) {
|
|
640
|
+
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}`);
|
|
641
|
+
} else if (resp.status === ReqRespStatus.SUCCESS) {
|
|
642
|
+
this.logger.verbose(`Sent goodbye to peer ${peer.toString()}`);
|
|
643
|
+
} else {
|
|
644
|
+
this.logger.debug(
|
|
645
|
+
`Unexpected status sending goodbye to peer ${peer.toString()}: ${ReqRespStatus[resp.status]}`,
|
|
646
|
+
);
|
|
647
|
+
}
|
|
335
648
|
} catch (error) {
|
|
336
649
|
this.logger.debug(`Failed to send goodbye to peer ${peer.toString()}: ${error}`);
|
|
337
650
|
} finally {
|
|
338
|
-
|
|
651
|
+
this.markPeerForDisconnect(peer);
|
|
339
652
|
}
|
|
340
653
|
}
|
|
341
654
|
|
|
342
|
-
|
|
655
|
+
/*
|
|
656
|
+
* Marks peer to be disconnected on the next heartbeat
|
|
657
|
+
* */
|
|
658
|
+
private markPeerForDisconnect(peer: PeerId) {
|
|
659
|
+
const peerIdStr = peer.toString();
|
|
660
|
+
this.logger.debug(`Scheduling peer ${peerIdStr} for disconnection`);
|
|
661
|
+
this.peersToBeDisconnected.add(peerIdStr);
|
|
662
|
+
}
|
|
663
|
+
|
|
664
|
+
/**
|
|
665
|
+
* Performs the actual disconnection of a peer.
|
|
666
|
+
* This is called during heartbeat processing to avoid immediate disconnections.
|
|
667
|
+
*
|
|
668
|
+
* @returns True if peer was disconnect, otherwise false
|
|
669
|
+
*/
|
|
670
|
+
private async disconnectPeer(peer: PeerId): Promise<boolean> {
|
|
671
|
+
const peerIdStr = peer.toString();
|
|
672
|
+
|
|
343
673
|
try {
|
|
344
674
|
await this.libP2PNode.hangUp(peer);
|
|
675
|
+
|
|
676
|
+
this.logger.debug(`Successfully disconnected peer ${peerIdStr}`);
|
|
677
|
+
return true;
|
|
345
678
|
} catch (error) {
|
|
346
|
-
this.logger.
|
|
679
|
+
this.logger.warn(`Failed to disconnect peer ${peerIdStr}`, { error });
|
|
680
|
+
return false;
|
|
347
681
|
}
|
|
348
682
|
}
|
|
349
683
|
|
|
@@ -356,10 +690,16 @@ export class PeerManager {
|
|
|
356
690
|
const peerId = await enr.peerId();
|
|
357
691
|
const peerIdString = peerId.toString();
|
|
358
692
|
|
|
693
|
+
// Don't attempt to connect to peers scheduled for disconnection
|
|
694
|
+
if (this.peersToBeDisconnected.has(peerIdString)) {
|
|
695
|
+
this.logger.trace(`Skipping peer scheduled for disconnection ${peerId}`);
|
|
696
|
+
return;
|
|
697
|
+
}
|
|
698
|
+
|
|
359
699
|
// Check if peer is temporarily timed out
|
|
360
700
|
const timedOutPeer = this.timedOutPeers.get(peerIdString);
|
|
361
701
|
if (timedOutPeer) {
|
|
362
|
-
if (
|
|
702
|
+
if (this.dateProvider.now() < timedOutPeer.timeoutUntilMs) {
|
|
363
703
|
this.logger.trace(`Skipping timed out peer ${peerId}`);
|
|
364
704
|
return;
|
|
365
705
|
}
|
|
@@ -399,7 +739,7 @@ export class PeerManager {
|
|
|
399
739
|
enr,
|
|
400
740
|
multiaddrTcp,
|
|
401
741
|
dialAttempts: 0,
|
|
402
|
-
addedUnixMs:
|
|
742
|
+
addedUnixMs: this.dateProvider.now(),
|
|
403
743
|
};
|
|
404
744
|
|
|
405
745
|
// Determine if we should dial immediately or not
|
|
@@ -434,7 +774,7 @@ export class PeerManager {
|
|
|
434
774
|
// Add to timed out peers
|
|
435
775
|
this.timedOutPeers.set(id, {
|
|
436
776
|
peerId: id,
|
|
437
|
-
timeoutUntilMs:
|
|
777
|
+
timeoutUntilMs: this.dateProvider.now() + FAILED_PEER_BAN_TIME_MS,
|
|
438
778
|
});
|
|
439
779
|
}
|
|
440
780
|
}
|
|
@@ -458,7 +798,12 @@ export class PeerManager {
|
|
|
458
798
|
}
|
|
459
799
|
|
|
460
800
|
// Remove the oldest peers
|
|
461
|
-
for (const key of this.cachedPeers.
|
|
801
|
+
for (const [key, value] of this.cachedPeers.entries()) {
|
|
802
|
+
if (this.isProtectedPeer(value.peerId)) {
|
|
803
|
+
this.logger.debug(`Not pruning trusted peer ${key}`);
|
|
804
|
+
continue;
|
|
805
|
+
}
|
|
806
|
+
|
|
462
807
|
this.cachedPeers.delete(key);
|
|
463
808
|
this.logger.trace(`Pruning peer ${key} from cache`);
|
|
464
809
|
peersToDelete--;
|
|
@@ -468,21 +813,252 @@ export class PeerManager {
|
|
|
468
813
|
}
|
|
469
814
|
}
|
|
470
815
|
|
|
816
|
+
private async createStatusMessage() {
|
|
817
|
+
const syncSummary = (await this.worldStateSynchronizer.status()).syncSummary;
|
|
818
|
+
return StatusMessage.fromWorldStateSyncStatus(this.protocolVersion, syncSummary);
|
|
819
|
+
}
|
|
820
|
+
|
|
821
|
+
/**
|
|
822
|
+
* Performs status Handshake with the Peer
|
|
823
|
+
* The way the protocol is designed is that each peer will call this method on newly established p2p connection.
|
|
824
|
+
* Both peers request Status message and both peers perform validation of the received Status message.
|
|
825
|
+
* If this validation fails on any end that peer will initiate disconnect.
|
|
826
|
+
* Note: It's important for both peers to request and perform Status validation,
|
|
827
|
+
* Because one of the peers can be _bad peer_ and this peer can simply skip the check.
|
|
828
|
+
* If we don't implement validation on both ends the _bad peer_ remains connected.
|
|
829
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
830
|
+
* */
|
|
831
|
+
private async exchangeStatusHandshake(peerId: PeerId) {
|
|
832
|
+
try {
|
|
833
|
+
const ourStatus = await this.createStatusMessage();
|
|
834
|
+
//Note: Technically we don't have to send out status to peer as well, but we do.
|
|
835
|
+
//It will be easier to update protocol in the future this way if need be.
|
|
836
|
+
this.logger.trace(`Initiating status handshake with peer ${peerId}`);
|
|
837
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.STATUS, ourStatus.toBuffer());
|
|
838
|
+
const { status } = response;
|
|
839
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
840
|
+
//TODO: maybe hard ban these peers in the future.
|
|
841
|
+
//We could allow this to happen up to N times, and then hard ban?
|
|
842
|
+
//Hard ban: Disallow connection via e.g. libp2p's Gater
|
|
843
|
+
this.logger.debug(`Disconnecting peer ${peerId} who failed to respond status handshake`, {
|
|
844
|
+
peerId,
|
|
845
|
+
status: ReqRespStatus[status],
|
|
846
|
+
});
|
|
847
|
+
this.markPeerForDisconnect(peerId);
|
|
848
|
+
return;
|
|
849
|
+
}
|
|
850
|
+
|
|
851
|
+
const { data } = response;
|
|
852
|
+
const logData = { peerId, status: ReqRespStatus[status], data: data ? bufferToHex(data) : undefined };
|
|
853
|
+
const peerStatusMessage = StatusMessage.fromBuffer(data);
|
|
854
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
855
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to failed status handshake.`, logData);
|
|
856
|
+
this.markPeerForDisconnect(peerId);
|
|
857
|
+
return;
|
|
858
|
+
}
|
|
859
|
+
this.logger.debug(`Successfully completed status handshake with peer ${peerId}`, logData);
|
|
860
|
+
} catch (err: any) {
|
|
861
|
+
//TODO: maybe hard ban these peers in the future
|
|
862
|
+
this.logger.debug(`Disconnecting peer ${peerId} due to error during status handshake: ${err.message ?? err}`, {
|
|
863
|
+
peerId,
|
|
864
|
+
});
|
|
865
|
+
this.markPeerForDisconnect(peerId);
|
|
866
|
+
}
|
|
867
|
+
}
|
|
868
|
+
|
|
869
|
+
/**
|
|
870
|
+
* Performs auth Handshake with the Peer
|
|
871
|
+
* A superset of the status handshake. Also includes a challenge that needs to be signed by the peer's validator key.
|
|
872
|
+
* @param: peerId The Id of the peer to request the Status from.
|
|
873
|
+
* */
|
|
874
|
+
private async exchangeAuthHandshake(peerId: PeerId) {
|
|
875
|
+
const peerIdString = peerId.toString();
|
|
876
|
+
|
|
877
|
+
try {
|
|
878
|
+
const ourStatus = await this.createStatusMessage();
|
|
879
|
+
const authRequest = new AuthRequest(ourStatus, Fr.random());
|
|
880
|
+
|
|
881
|
+
// Note: Technically we don't have to send our status to peer as well, but we do.
|
|
882
|
+
// It will be easier to update protocol in the future this way if need be.
|
|
883
|
+
// We also need to send the challenge at least, so that the peer can sign it.
|
|
884
|
+
this.logger.debug(`Initiating auth handshake with peer ${peerId}`);
|
|
885
|
+
const response = await this.reqresp.sendRequestToPeer(peerId, ReqRespSubProtocol.AUTH, authRequest.toBuffer());
|
|
886
|
+
const { status } = response;
|
|
887
|
+
if (status !== ReqRespStatus.SUCCESS) {
|
|
888
|
+
this.logger.verbose(`Disconnecting peer ${peerId} who failed to respond auth handshake`, {
|
|
889
|
+
peerId,
|
|
890
|
+
status: ReqRespStatus[status],
|
|
891
|
+
});
|
|
892
|
+
this.markAuthHandshakeFailed(peerId);
|
|
893
|
+
this.markPeerForDisconnect(peerId);
|
|
894
|
+
return;
|
|
895
|
+
}
|
|
896
|
+
|
|
897
|
+
const { data } = response;
|
|
898
|
+
const logData = { peerId, status: ReqRespStatus[status], data: data ? bufferToHex(data) : undefined };
|
|
899
|
+
|
|
900
|
+
const peerAuthResponse = AuthResponse.fromBuffer(data);
|
|
901
|
+
|
|
902
|
+
const peerStatusMessage = peerAuthResponse.status;
|
|
903
|
+
if (!ourStatus.validate(peerStatusMessage)) {
|
|
904
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed status handshake as part of auth.`, logData);
|
|
905
|
+
this.markAuthHandshakeFailed(peerId);
|
|
906
|
+
this.markPeerForDisconnect(peerId);
|
|
907
|
+
return;
|
|
908
|
+
}
|
|
909
|
+
|
|
910
|
+
const hashToRecover = authRequest.getPayloadToSign();
|
|
911
|
+
const ethSignedHash = makeEthSignDigest(hashToRecover);
|
|
912
|
+
const sender = tryRecoverAddress(ethSignedHash, peerAuthResponse.signature);
|
|
913
|
+
if (!sender) {
|
|
914
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to failed auth handshake, invalid signature.`, logData);
|
|
915
|
+
this.markAuthHandshakeFailed(peerId);
|
|
916
|
+
this.markPeerForDisconnect(peerId);
|
|
917
|
+
return;
|
|
918
|
+
}
|
|
919
|
+
|
|
920
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
921
|
+
const found = registeredValidators.find(v => v.toString() === sender.toString()) !== undefined;
|
|
922
|
+
if (!found) {
|
|
923
|
+
this.logger.verbose(
|
|
924
|
+
`Disconnecting peer ${peerId} due to failed auth handshake, peer is not a registered validator.`,
|
|
925
|
+
{ ...logData, address: sender.toString() },
|
|
926
|
+
);
|
|
927
|
+
this.markAuthHandshakeFailed(peerId);
|
|
928
|
+
this.markPeerForDisconnect(peerId);
|
|
929
|
+
return;
|
|
930
|
+
}
|
|
931
|
+
|
|
932
|
+
// Check to see that this validator address isn't already allocated to a different peer
|
|
933
|
+
const peerForAddress = this.authenticatedValidatorAddressToPeerId.get(sender.toString());
|
|
934
|
+
if (peerForAddress !== undefined && peerForAddress.toString() !== peerIdString) {
|
|
935
|
+
this.logger.verbose(
|
|
936
|
+
`Received auth for validator ${sender.toString()} from peer ${peerIdString}, but this validator is already authenticated to peer ${peerForAddress.toString()}`,
|
|
937
|
+
{ ...logData, address: sender.toString() },
|
|
938
|
+
);
|
|
939
|
+
return;
|
|
940
|
+
}
|
|
941
|
+
|
|
942
|
+
this.markAuthHandshakeSuccess(peerId);
|
|
943
|
+
this.authenticatedPeerIdToValidatorAddress.set(peerIdString, sender);
|
|
944
|
+
this.authenticatedValidatorAddressToPeerId.set(sender.toString(), peerId);
|
|
945
|
+
this.logger.info(
|
|
946
|
+
`Successfully completed auth handshake with peer ${peerId}, validator address ${sender.toString()}`,
|
|
947
|
+
{ ...logData, address: sender.toString() },
|
|
948
|
+
);
|
|
949
|
+
} catch (err: any) {
|
|
950
|
+
//TODO: maybe hard ban these peers in the future
|
|
951
|
+
this.logger.verbose(`Disconnecting peer ${peerId} due to error during auth handshake: ${err.message}`, {
|
|
952
|
+
peerId,
|
|
953
|
+
err,
|
|
954
|
+
});
|
|
955
|
+
this.markAuthHandshakeFailed(peerId);
|
|
956
|
+
this.markPeerForDisconnect(peerId);
|
|
957
|
+
}
|
|
958
|
+
}
|
|
959
|
+
|
|
960
|
+
/*
|
|
961
|
+
* Marks when peer fails auth handshake
|
|
962
|
+
* */
|
|
963
|
+
private markAuthHandshakeFailed(peerId: PeerId) {
|
|
964
|
+
const now = this.dateProvider.now();
|
|
965
|
+
const peerIdStr = peerId.toString();
|
|
966
|
+
|
|
967
|
+
const existingEntry = this.failedAuthHandshakes.get(peerIdStr);
|
|
968
|
+
this.failedAuthHandshakes.set(peerIdStr, {
|
|
969
|
+
count: (existingEntry?.count || 0) + 1,
|
|
970
|
+
lastFailureTimestamp: now,
|
|
971
|
+
});
|
|
972
|
+
|
|
973
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
974
|
+
connections.forEach(conn => {
|
|
975
|
+
// We mark the IP address
|
|
976
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
977
|
+
const existingAddressEntry = this.failedAuthHandshakes.get(address);
|
|
978
|
+
this.failedAuthHandshakes.set(address, {
|
|
979
|
+
count: (existingAddressEntry?.count || 0) + 1,
|
|
980
|
+
lastFailureTimestamp: now,
|
|
981
|
+
});
|
|
982
|
+
});
|
|
983
|
+
}
|
|
984
|
+
|
|
985
|
+
/*
|
|
986
|
+
* Marks when peer exchanges auth handshake
|
|
987
|
+
* Removes any failed previous attempts
|
|
988
|
+
* */
|
|
989
|
+
private markAuthHandshakeSuccess(peerId: PeerId) {
|
|
990
|
+
this.failedAuthHandshakes.delete(peerId.toString());
|
|
991
|
+
|
|
992
|
+
const connections = this.libP2PNode.getConnections(peerId);
|
|
993
|
+
connections.forEach(conn => {
|
|
994
|
+
const address = conn.remoteAddr.nodeAddress().address;
|
|
995
|
+
this.failedAuthHandshakes.delete(address);
|
|
996
|
+
});
|
|
997
|
+
}
|
|
998
|
+
|
|
471
999
|
/**
|
|
472
1000
|
* Stops the peer manager.
|
|
473
1001
|
* Removing all event listeners.
|
|
474
1002
|
*/
|
|
475
1003
|
public async stop() {
|
|
476
1004
|
// eslint-disable-next-line @typescript-eslint/no-misused-promises
|
|
477
|
-
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.
|
|
1005
|
+
this.peerDiscoveryService.off(PeerEvent.DISCOVERED, this.handlers.handleDiscoveredPeer);
|
|
478
1006
|
|
|
479
1007
|
// Send goodbyes to all peers
|
|
480
1008
|
await Promise.all(
|
|
481
1009
|
this.libP2PNode.getPeers().map(peer => this.goodbyeAndDisconnectPeer(peer, GoodByeReason.SHUTDOWN)),
|
|
482
1010
|
);
|
|
483
1011
|
|
|
484
|
-
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handleConnectedPeerEvent);
|
|
485
|
-
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handleDisconnectedPeerEvent);
|
|
1012
|
+
this.libP2PNode.removeEventListener(PeerEvent.CONNECTED, this.handlers.handleConnectedPeerEvent);
|
|
1013
|
+
this.libP2PNode.removeEventListener(PeerEvent.DISCONNECTED, this.handlers.handleDisconnectedPeerEvent);
|
|
1014
|
+
}
|
|
1015
|
+
|
|
1016
|
+
private shouldTrustWithIdentity(peerId: PeerId): boolean {
|
|
1017
|
+
return this.isProtectedPeer(peerId);
|
|
1018
|
+
}
|
|
1019
|
+
|
|
1020
|
+
/**
|
|
1021
|
+
* Performs auth request verification from peer. An auth request is valid if requested by an authorized peer (a peer we trust).
|
|
1022
|
+
*
|
|
1023
|
+
* @param: _authRequest - Auth request (unused)
|
|
1024
|
+
* @param: peerId - The ID of the peer that requested the auth handshake
|
|
1025
|
+
*
|
|
1026
|
+
* @returns: StatusMessage if peer is trusted
|
|
1027
|
+
*
|
|
1028
|
+
* @throws: If peer is unauthorized
|
|
1029
|
+
* */
|
|
1030
|
+
public async handleAuthRequestFromPeer(_authRequest: AuthRequest, peerId: PeerId): Promise<StatusMessage> {
|
|
1031
|
+
if (!this.shouldTrustWithIdentity(peerId)) {
|
|
1032
|
+
this.logger.warn(`Received auth request from untrusted peer ${peerId.toString()}`);
|
|
1033
|
+
throw new Error('Unauthorised');
|
|
1034
|
+
}
|
|
1035
|
+
this.logger.debug(`Received auth request from trusted peer ${peerId.toString()}`);
|
|
1036
|
+
return await this.createStatusMessage();
|
|
1037
|
+
}
|
|
1038
|
+
|
|
1039
|
+
private async updateAuthenticatedPeers(): Promise<void> {
|
|
1040
|
+
const registeredValidators = await this.epochCache.getRegisteredValidators();
|
|
1041
|
+
const validatorSet = new Set(registeredValidators.map(v => v.toString()));
|
|
1042
|
+
|
|
1043
|
+
const peersToDelete: Set<string> = new Set();
|
|
1044
|
+
const addressesToDelete: Set<string> = new Set();
|
|
1045
|
+
for (const [peer, address] of this.authenticatedPeerIdToValidatorAddress.entries()) {
|
|
1046
|
+
const addressString = address.toString();
|
|
1047
|
+
if (!validatorSet.has(addressString)) {
|
|
1048
|
+
peersToDelete.add(peer);
|
|
1049
|
+
addressesToDelete.add(addressString);
|
|
1050
|
+
this.logger.info(
|
|
1051
|
+
`Removing authentication for peer ${peer.toString()} at address ${addressString} due to no longer being a registered validator`,
|
|
1052
|
+
);
|
|
1053
|
+
}
|
|
1054
|
+
}
|
|
1055
|
+
|
|
1056
|
+
for (const peer of peersToDelete) {
|
|
1057
|
+
this.authenticatedPeerIdToValidatorAddress.delete(peer);
|
|
1058
|
+
}
|
|
1059
|
+
for (const address of addressesToDelete) {
|
|
1060
|
+
this.authenticatedValidatorAddressToPeerId.delete(address);
|
|
1061
|
+
}
|
|
486
1062
|
}
|
|
487
1063
|
}
|
|
488
1064
|
|