- package p2p
-
- import (
- "fmt"
- "net"
- "time"
-
- "github.com/pkg/errors"
-
- crypto "github.com/tendermint/go-crypto"
- wire "github.com/tendermint/go-wire"
- cmn "github.com/tendermint/tmlibs/common"
- "github.com/tendermint/tmlibs/log"
- )
-
- // Peer is an interface representing a peer connected on a reactor.
- type Peer interface {
- cmn.Service
-
- Key() string
- IsOutbound() bool
- IsPersistent() bool
- NodeInfo() *NodeInfo
- Status() ConnectionStatus
-
- Send(byte, interface{}) bool
- TrySend(byte, interface{}) bool
-
- Set(string, interface{})
- Get(string) interface{}
- }
-
- // Peer could be marked as persistent, in which case you can use
- // Redial function to reconnect. Note that inbound peers can't be
- // made persistent. They should be made persistent on the other end.
- //
- // Before using a peer, you will need to perform a handshake on connection.
- type peer struct {
- cmn.BaseService
-
- outbound bool
-
- conn net.Conn // source connection
- mconn *MConnection // multiplex connection
-
- persistent bool
- config *PeerConfig
-
- nodeInfo *NodeInfo
- Data *cmn.CMap // User data.
- }
-
- // PeerConfig is a Peer configuration.
- type PeerConfig struct {
- AuthEnc bool `mapstructure:"auth_enc"` // authenticated encryption
-
- // times are in seconds
- HandshakeTimeout time.Duration `mapstructure:"handshake_timeout"`
- DialTimeout time.Duration `mapstructure:"dial_timeout"`
-
- MConfig *MConnConfig `mapstructure:"connection"`
-
- Fuzz bool `mapstructure:"fuzz"` // fuzz connection (for testing)
- FuzzConfig *FuzzConnConfig `mapstructure:"fuzz_config"`
- }
-
- // DefaultPeerConfig returns the default config.
- func DefaultPeerConfig() *PeerConfig {
- return &PeerConfig{
- AuthEnc: true,
- HandshakeTimeout: 20, // * time.Second,
- DialTimeout: 3, // * time.Second,
- MConfig: DefaultMConnConfig(),
- Fuzz: false,
- FuzzConfig: DefaultFuzzConnConfig(),
- }
- }
-
- func newOutboundPeer(addr *NetAddress, reactorsByCh map[byte]Reactor, chDescs []*ChannelDescriptor,
- onPeerError func(Peer, interface{}), ourNodePrivKey crypto.PrivKeyEd25519, config *PeerConfig) (*peer, error) {
-
- conn, err := dial(addr, config)
- if err != nil {
- return nil, errors.Wrap(err, "Error creating peer")
- }
-
- peer, err := newPeerFromConnAndConfig(conn, true, reactorsByCh, chDescs, onPeerError, ourNodePrivKey, config)
- if err != nil {
- if err := conn.Close(); err != nil {
- return nil, err
- }
- return nil, err
- }
- return peer, nil
- }
-
- func newInboundPeer(conn net.Conn, reactorsByCh map[byte]Reactor, chDescs []*ChannelDescriptor,
- onPeerError func(Peer, interface{}), ourNodePrivKey crypto.PrivKeyEd25519, config *PeerConfig) (*peer, error) {
-
- return newPeerFromConnAndConfig(conn, false, reactorsByCh, chDescs, onPeerError, ourNodePrivKey, config)
- }
-
- func newPeerFromConnAndConfig(rawConn net.Conn, outbound bool, reactorsByCh map[byte]Reactor, chDescs []*ChannelDescriptor,
- onPeerError func(Peer, interface{}), ourNodePrivKey crypto.PrivKeyEd25519, config *PeerConfig) (*peer, error) {
-
- conn := rawConn
-
- // Fuzz connection
- if config.Fuzz {
- // so we have time to do peer handshakes and get set up
- conn = FuzzConnAfterFromConfig(conn, 10*time.Second, config.FuzzConfig)
- }
-
- // Encrypt connection
- if config.AuthEnc {
- if err := conn.SetDeadline(time.Now().Add(config.HandshakeTimeout * time.Second)); err != nil {
- return nil, errors.Wrap(err, "Error setting deadline while encrypting connection")
- }
-
- var err error
- conn, err = MakeSecretConnection(conn, ourNodePrivKey)
- if err != nil {
- return nil, errors.Wrap(err, "Error creating peer")
- }
- }
-
- // Key and NodeInfo are set after Handshake
- p := &peer{
- outbound: outbound,
- conn: conn,
- config: config,
- Data: cmn.NewCMap(),
- }
-
- p.mconn = createMConnection(conn, p, reactorsByCh, chDescs, onPeerError, config.MConfig)
-
- p.BaseService = *cmn.NewBaseService(nil, "Peer", p)
-
- return p, nil
- }
-
- func (p *peer) SetLogger(l log.Logger) {
- p.Logger = l
- p.mconn.SetLogger(l)
- }
-
- // CloseConn should be used when the peer was created, but never started.
- func (p *peer) CloseConn() {
- p.conn.Close() // nolint: errcheck
- }
-
- // makePersistent marks the peer as persistent.
- func (p *peer) makePersistent() {
- if !p.outbound {
- panic("inbound peers can't be made persistent")
- }
-
- p.persistent = true
- }
-
- // IsPersistent returns true if the peer is persitent, false otherwise.
- func (p *peer) IsPersistent() bool {
- return p.persistent
- }
-
- // HandshakeTimeout performs a handshake between a given node and the peer.
- // NOTE: blocking
- func (p *peer) HandshakeTimeout(ourNodeInfo *NodeInfo, timeout time.Duration) error {
- // Set deadline for handshake so we don't block forever on conn.ReadFull
- if err := p.conn.SetDeadline(time.Now().Add(timeout)); err != nil {
- return errors.Wrap(err, "Error setting deadline")
- }
-
- var peerNodeInfo = new(NodeInfo)
- var err1 error
- var err2 error
- cmn.Parallel(
- func() {
- var n int
- wire.WriteBinary(ourNodeInfo, p.conn, &n, &err1)
- },
- func() {
- var n int
- wire.ReadBinary(peerNodeInfo, p.conn, maxNodeInfoSize, &n, &err2)
- p.Logger.Info("Peer handshake", "peerNodeInfo", peerNodeInfo)
- })
- if err1 != nil {
- return errors.Wrap(err1, "Error during handshake/write")
- }
- if err2 != nil {
- return errors.Wrap(err2, "Error during handshake/read")
- }
-
- if p.config.AuthEnc {
- // Check that the professed PubKey matches the sconn's.
- if !peerNodeInfo.PubKey.Equals(p.PubKey().Wrap()) {
- return fmt.Errorf("Ignoring connection with unmatching pubkey: %v vs %v",
- peerNodeInfo.PubKey, p.PubKey())
- }
- }
-
- // Remove deadline
- if err := p.conn.SetDeadline(time.Time{}); err != nil {
- return errors.Wrap(err, "Error removing deadline")
- }
-
- peerNodeInfo.RemoteAddr = p.Addr().String()
-
- p.nodeInfo = peerNodeInfo
- return nil
- }
-
- // Addr returns peer's remote network address.
- func (p *peer) Addr() net.Addr {
- return p.conn.RemoteAddr()
- }
-
- // PubKey returns peer's public key.
- func (p *peer) PubKey() crypto.PubKeyEd25519 {
- if p.config.AuthEnc {
- return p.conn.(*SecretConnection).RemotePubKey()
- }
- if p.NodeInfo() == nil {
- panic("Attempt to get peer's PubKey before calling Handshake")
- }
- return p.PubKey()
- }
-
- // OnStart implements BaseService.
- func (p *peer) OnStart() error {
- if err := p.BaseService.OnStart(); err != nil {
- return err
- }
- err := p.mconn.Start()
- return err
- }
-
- // OnStop implements BaseService.
- func (p *peer) OnStop() {
- p.BaseService.OnStop()
- p.mconn.Stop()
- }
-
- // Connection returns underlying MConnection.
- func (p *peer) Connection() *MConnection {
- return p.mconn
- }
-
- // IsOutbound returns true if the connection is outbound, false otherwise.
- func (p *peer) IsOutbound() bool {
- return p.outbound
- }
-
- // Send msg to the channel identified by chID byte. Returns false if the send
- // queue is full after timeout, specified by MConnection.
- func (p *peer) Send(chID byte, msg interface{}) bool {
- if !p.IsRunning() {
- // see Switch#Broadcast, where we fetch the list of peers and loop over
- // them - while we're looping, one peer may be removed and stopped.
- return false
- }
- return p.mconn.Send(chID, msg)
- }
-
- // TrySend msg to the channel identified by chID byte. Immediately returns
- // false if the send queue is full.
- func (p *peer) TrySend(chID byte, msg interface{}) bool {
- if !p.IsRunning() {
- return false
- }
- return p.mconn.TrySend(chID, msg)
- }
-
- // CanSend returns true if the send queue is not full, false otherwise.
- func (p *peer) CanSend(chID byte) bool {
- if !p.IsRunning() {
- return false
- }
- return p.mconn.CanSend(chID)
- }
-
- // String representation.
- func (p *peer) String() string {
- if p.outbound {
- return fmt.Sprintf("Peer{%v %v out}", p.mconn, p.Key())
- }
-
- return fmt.Sprintf("Peer{%v %v in}", p.mconn, p.Key())
- }
-
- // Equals reports whenever 2 peers are actually represent the same node.
- func (p *peer) Equals(other Peer) bool {
- return p.Key() == other.Key()
- }
-
- // Get the data for a given key.
- func (p *peer) Get(key string) interface{} {
- return p.Data.Get(key)
- }
-
- // Set sets the data for the given key.
- func (p *peer) Set(key string, data interface{}) {
- p.Data.Set(key, data)
- }
-
- // Key returns the peer's id key.
- func (p *peer) Key() string {
- return p.nodeInfo.ListenAddr // XXX: should probably be PubKey.KeyString()
- }
-
- // NodeInfo returns a copy of the peer's NodeInfo.
- func (p *peer) NodeInfo() *NodeInfo {
- if p.nodeInfo == nil {
- return nil
- }
- n := *p.nodeInfo // copy
- return &n
- }
-
- // Status returns the peer's ConnectionStatus.
- func (p *peer) Status() ConnectionStatus {
- return p.mconn.Status()
- }
-
- func dial(addr *NetAddress, config *PeerConfig) (net.Conn, error) {
- conn, err := addr.DialTimeout(config.DialTimeout * time.Second)
- if err != nil {
- return nil, err
- }
- return conn, nil
- }
-
- func createMConnection(conn net.Conn, p *peer, reactorsByCh map[byte]Reactor, chDescs []*ChannelDescriptor,
- onPeerError func(Peer, interface{}), config *MConnConfig) *MConnection {
-
- onReceive := func(chID byte, msgBytes []byte) {
- reactor := reactorsByCh[chID]
- if reactor == nil {
- cmn.PanicSanity(cmn.Fmt("Unknown channel %X", chID))
- }
- reactor.Receive(chID, p, msgBytes)
- }
-
- onError := func(r interface{}) {
- onPeerError(p, r)
- }
-
- return NewMConnectionWithConfig(conn, chDescs, onReceive, onError, config)
- }
|