- package p2p
-
- import (
- "fmt"
- "net"
- "sync/atomic"
- "time"
-
- crypto "github.com/tendermint/go-crypto"
- cmn "github.com/tendermint/tmlibs/common"
- "github.com/tendermint/tmlibs/log"
-
- "github.com/tendermint/tendermint/config"
- tmconn "github.com/tendermint/tendermint/p2p/conn"
- )
-
- var testIPSuffix uint32
-
- // Peer is an interface representing a peer connected on a reactor.
- type Peer interface {
- cmn.Service
-
- ID() ID // peer's cryptographic ID
- RemoteIP() net.IP // remote IP of the connection
- IsOutbound() bool // did we dial the peer
- IsPersistent() bool // do we redial this peer when we disconnect
- NodeInfo() NodeInfo // peer's info
- Status() tmconn.ConnectionStatus
-
- Send(byte, []byte) bool
- TrySend(byte, []byte) bool
-
- Set(string, interface{})
- Get(string) interface{}
- }
-
- //----------------------------------------------------------
-
- // peerConn contains the raw connection and its config.
- type peerConn struct {
- outbound bool
- persistent bool
- config *config.P2PConfig
- conn net.Conn // source connection
- ip net.IP
- }
-
- // ID only exists for SecretConnection.
- // NOTE: Will panic if conn is not *SecretConnection.
- func (pc peerConn) ID() ID {
- return PubKeyToID(pc.conn.(*tmconn.SecretConnection).RemotePubKey())
- }
-
- // Return the IP from the connection RemoteAddr
- func (pc peerConn) RemoteIP() net.IP {
- if pc.ip != nil {
- return pc.ip
- }
-
- // In test cases a conn could not be present at all or be an in-memory
- // implementation where we want to return a fake ip.
- if pc.conn == nil || pc.conn.RemoteAddr().String() == "pipe" {
- pc.ip = net.IP{172, 16, 0, byte(atomic.AddUint32(&testIPSuffix, 1))}
-
- return pc.ip
- }
-
- host, _, err := net.SplitHostPort(pc.conn.RemoteAddr().String())
- if err != nil {
- panic(err)
- }
-
- ips, err := net.LookupIP(host)
- if err != nil {
- panic(err)
- }
-
- pc.ip = ips[0]
-
- return pc.ip
- }
-
- // peer implements Peer.
- //
- // Before using a peer, you will need to perform a handshake on connection.
- type peer struct {
- cmn.BaseService
-
- // raw peerConn and the multiplex connection
- peerConn
- mconn *tmconn.MConnection
-
- // peer's node info and the channel it knows about
- // channels = nodeInfo.Channels
- // cached to avoid copying nodeInfo in hasChannel
- nodeInfo NodeInfo
- channels []byte
-
- // User data
- Data *cmn.CMap
- }
-
- func newPeer(
- pc peerConn,
- mConfig tmconn.MConnConfig,
- nodeInfo NodeInfo,
- reactorsByCh map[byte]Reactor,
- chDescs []*tmconn.ChannelDescriptor,
- onPeerError func(Peer, interface{}),
- ) *peer {
- p := &peer{
- peerConn: pc,
- nodeInfo: nodeInfo,
- channels: nodeInfo.Channels,
- Data: cmn.NewCMap(),
- }
-
- p.mconn = createMConnection(
- pc.conn,
- p,
- reactorsByCh,
- chDescs,
- onPeerError,
- mConfig,
- )
- p.BaseService = *cmn.NewBaseService(nil, "Peer", p)
-
- return p
- }
-
- func newOutboundPeerConn(
- addr *NetAddress,
- config *config.P2PConfig,
- persistent bool,
- ourNodePrivKey crypto.PrivKey,
- ) (peerConn, error) {
- conn, err := dial(addr, config)
- if err != nil {
- return peerConn{}, cmn.ErrorWrap(err, "Error creating peer")
- }
-
- pc, err := newPeerConn(conn, config, true, persistent, ourNodePrivKey)
- if err != nil {
- if cerr := conn.Close(); cerr != nil {
- return peerConn{}, cmn.ErrorWrap(err, cerr.Error())
- }
- return peerConn{}, err
- }
-
- // ensure dialed ID matches connection ID
- if addr.ID != pc.ID() {
- if cerr := conn.Close(); cerr != nil {
- return peerConn{}, cmn.ErrorWrap(err, cerr.Error())
- }
- return peerConn{}, ErrSwitchAuthenticationFailure{addr, pc.ID()}
- }
-
- return pc, nil
- }
-
- func newInboundPeerConn(
- conn net.Conn,
- config *config.P2PConfig,
- ourNodePrivKey crypto.PrivKey,
- ) (peerConn, error) {
-
- // TODO: issue PoW challenge
-
- return newPeerConn(conn, config, false, false, ourNodePrivKey)
- }
-
- func newPeerConn(
- rawConn net.Conn,
- cfg *config.P2PConfig,
- outbound, persistent bool,
- ourNodePrivKey crypto.PrivKey,
- ) (pc peerConn, err error) {
- conn := rawConn
-
- // Fuzz connection
- if cfg.TestFuzz {
- // so we have time to do peer handshakes and get set up
- conn = FuzzConnAfterFromConfig(conn, 10*time.Second, cfg.TestFuzzConfig)
- }
-
- // Set deadline for secret handshake
- dl := time.Now().Add(cfg.HandshakeTimeout)
- if err := conn.SetDeadline(dl); err != nil {
- return pc, cmn.ErrorWrap(
- err,
- "Error setting deadline while encrypting connection",
- )
- }
-
- // Encrypt connection
- conn, err = tmconn.MakeSecretConnection(conn, ourNodePrivKey)
- if err != nil {
- return pc, cmn.ErrorWrap(err, "Error creating peer")
- }
-
- // Only the information we already have
- return peerConn{
- config: cfg,
- outbound: outbound,
- persistent: persistent,
- conn: conn,
- }, nil
- }
-
- //---------------------------------------------------
- // Implements cmn.Service
-
- // SetLogger implements BaseService.
- func (p *peer) SetLogger(l log.Logger) {
- p.Logger = l
- p.mconn.SetLogger(l)
- }
-
- // OnStart implements BaseService.
- func (p *peer) OnStart() error {
- if err := p.BaseService.OnStart(); err != nil {
- return err
- }
- err := p.mconn.Start()
- return err
- }
-
- // OnStop implements BaseService.
- func (p *peer) OnStop() {
- p.BaseService.OnStop()
- p.mconn.Stop() // stop everything and close the conn
- }
-
- //---------------------------------------------------
- // Implements Peer
-
- // ID returns the peer's ID - the hex encoded hash of its pubkey.
- func (p *peer) ID() ID {
- return p.nodeInfo.ID
- }
-
- // IsOutbound returns true if the connection is outbound, false otherwise.
- func (p *peer) IsOutbound() bool {
- return p.peerConn.outbound
- }
-
- // IsPersistent returns true if the peer is persitent, false otherwise.
- func (p *peer) IsPersistent() bool {
- return p.peerConn.persistent
- }
-
- // NodeInfo returns a copy of the peer's NodeInfo.
- func (p *peer) NodeInfo() NodeInfo {
- return p.nodeInfo
- }
-
- // Status returns the peer's ConnectionStatus.
- func (p *peer) Status() tmconn.ConnectionStatus {
- return p.mconn.Status()
- }
-
- // Send msg bytes to the channel identified by chID byte. Returns false if the
- // send queue is full after timeout, specified by MConnection.
- func (p *peer) Send(chID byte, msgBytes []byte) bool {
- if !p.IsRunning() {
- // see Switch#Broadcast, where we fetch the list of peers and loop over
- // them - while we're looping, one peer may be removed and stopped.
- return false
- } else if !p.hasChannel(chID) {
- return false
- }
- return p.mconn.Send(chID, msgBytes)
- }
-
- // TrySend msg bytes to the channel identified by chID byte. Immediately returns
- // false if the send queue is full.
- func (p *peer) TrySend(chID byte, msgBytes []byte) bool {
- if !p.IsRunning() {
- return false
- } else if !p.hasChannel(chID) {
- return false
- }
- return p.mconn.TrySend(chID, msgBytes)
- }
-
- // Get the data for a given key.
- func (p *peer) Get(key string) interface{} {
- return p.Data.Get(key)
- }
-
- // Set sets the data for the given key.
- func (p *peer) Set(key string, data interface{}) {
- p.Data.Set(key, data)
- }
-
- // hasChannel returns true if the peer reported
- // knowing about the given chID.
- func (p *peer) hasChannel(chID byte) bool {
- for _, ch := range p.channels {
- if ch == chID {
- return true
- }
- }
- // NOTE: probably will want to remove this
- // but could be helpful while the feature is new
- p.Logger.Debug(
- "Unknown channel for peer",
- "channel",
- chID,
- "channels",
- p.channels,
- )
- return false
- }
-
- //---------------------------------------------------
- // methods used by the Switch
-
- // CloseConn should be called by the Switch if the peer was created but never
- // started.
- func (pc *peerConn) CloseConn() {
- pc.conn.Close() // nolint: errcheck
- }
-
- // HandshakeTimeout performs the Tendermint P2P handshake between a given node
- // and the peer by exchanging their NodeInfo. It sets the received nodeInfo on
- // the peer.
- // NOTE: blocking
- func (pc *peerConn) HandshakeTimeout(
- ourNodeInfo NodeInfo,
- timeout time.Duration,
- ) (peerNodeInfo NodeInfo, err error) {
- // Set deadline for handshake so we don't block forever on conn.ReadFull
- if err := pc.conn.SetDeadline(time.Now().Add(timeout)); err != nil {
- return peerNodeInfo, cmn.ErrorWrap(err, "Error setting deadline")
- }
-
- var trs, _ = cmn.Parallel(
- func(_ int) (val interface{}, err error, abort bool) {
- _, err = cdc.MarshalBinaryWriter(pc.conn, ourNodeInfo)
- return
- },
- func(_ int) (val interface{}, err error, abort bool) {
- _, err = cdc.UnmarshalBinaryReader(
- pc.conn,
- &peerNodeInfo,
- int64(MaxNodeInfoSize()),
- )
- return
- },
- )
- if err := trs.FirstError(); err != nil {
- return peerNodeInfo, cmn.ErrorWrap(err, "Error during handshake")
- }
-
- // Remove deadline
- if err := pc.conn.SetDeadline(time.Time{}); err != nil {
- return peerNodeInfo, cmn.ErrorWrap(err, "Error removing deadline")
- }
-
- return peerNodeInfo, nil
- }
-
- // Addr returns peer's remote network address.
- func (p *peer) Addr() net.Addr {
- return p.peerConn.conn.RemoteAddr()
- }
-
- // CanSend returns true if the send queue is not full, false otherwise.
- func (p *peer) CanSend(chID byte) bool {
- if !p.IsRunning() {
- return false
- }
- return p.mconn.CanSend(chID)
- }
-
- // String representation.
- func (p *peer) String() string {
- if p.outbound {
- return fmt.Sprintf("Peer{%v %v out}", p.mconn, p.ID())
- }
-
- return fmt.Sprintf("Peer{%v %v in}", p.mconn, p.ID())
- }
-
- //------------------------------------------------------------------
- // helper funcs
-
- func dial(addr *NetAddress, cfg *config.P2PConfig) (net.Conn, error) {
- if cfg.TestDialFail {
- return nil, fmt.Errorf("dial err (peerConfig.DialFail == true)")
- }
-
- conn, err := addr.DialTimeout(cfg.DialTimeout)
- if err != nil {
- return nil, err
- }
- return conn, nil
- }
-
- func createMConnection(
- conn net.Conn,
- p *peer,
- reactorsByCh map[byte]Reactor,
- chDescs []*tmconn.ChannelDescriptor,
- onPeerError func(Peer, interface{}),
- config tmconn.MConnConfig,
- ) *tmconn.MConnection {
-
- onReceive := func(chID byte, msgBytes []byte) {
- reactor := reactorsByCh[chID]
- if reactor == nil {
- // Note that its ok to panic here as it's caught in the conn._recover,
- // which does onPeerError.
- panic(cmn.Fmt("Unknown channel %X", chID))
- }
- reactor.Receive(chID, p, msgBytes)
- }
-
- onError := func(r interface{}) {
- onPeerError(p, r)
- }
-
- return tmconn.NewMConnectionWithConfig(
- conn,
- chDescs,
- onReceive,
- onError,
- config,
- )
- }
|