Files
nanoreth/crates/net/network/src/discovery.rs

275 lines
9.8 KiB
Rust

//! Discovery support for the network.
use crate::{
error::{NetworkError, ServiceKind},
manager::DiscoveredEvent,
};
use futures::StreamExt;
use reth_discv4::{DiscoveryUpdate, Discv4, Discv4Config, EnrForkIdEntry};
use reth_dns_discovery::{
DnsDiscoveryConfig, DnsDiscoveryHandle, DnsDiscoveryService, DnsNodeRecordUpdate, DnsResolver,
};
use reth_primitives::{ForkId, NodeRecord, PeerId};
use secp256k1::SecretKey;
use std::{
collections::{hash_map::Entry, HashMap, VecDeque},
net::{IpAddr, SocketAddr},
sync::Arc,
task::{Context, Poll},
};
use tokio::{sync::mpsc, task::JoinHandle};
use tokio_stream::wrappers::ReceiverStream;
/// An abstraction over the configured discovery protocol.
///
/// Listens for new discovered nodes and emits events for discovered nodes and their
/// address.
#[derive(Debug)]
pub struct Discovery {
/// All nodes discovered via discovery protocol.
///
/// These nodes can be ephemeral and are updated via the discovery protocol.
discovered_nodes: HashMap<PeerId, SocketAddr>,
/// Local ENR of the discovery service.
local_enr: NodeRecord,
/// Handler to interact with the Discovery v4 service
discv4: Option<Discv4>,
/// All KAD table updates from the discv4 service.
discv4_updates: Option<ReceiverStream<DiscoveryUpdate>>,
/// The handle to the spawned discv4 service
_discv4_service: Option<JoinHandle<()>>,
/// Handler to interact with the DNS discovery service
_dns_discovery: Option<DnsDiscoveryHandle>,
/// Updates from the DNS discovery service.
dns_discovery_updates: Option<ReceiverStream<DnsNodeRecordUpdate>>,
/// The handle to the spawned DNS discovery service
_dns_disc_service: Option<JoinHandle<()>>,
/// Events buffered until polled.
queued_events: VecDeque<DiscoveryEvent>,
/// List of listeners subscribed to discovery events.
discovery_listeners: Vec<mpsc::UnboundedSender<DiscoveryEvent>>,
}
impl Discovery {
/// Spawns the discovery service.
///
/// This will spawn the [`reth_discv4::Discv4Service`] onto a new task and establish a listener
/// channel to receive all discovered nodes.
pub async fn new(
discovery_addr: SocketAddr,
sk: SecretKey,
discv4_config: Option<Discv4Config>,
dns_discovery_config: Option<DnsDiscoveryConfig>,
) -> Result<Self, NetworkError> {
// setup discv4
let local_enr = NodeRecord::from_secret_key(discovery_addr, &sk);
let (discv4, discv4_updates, _discv4_service) = if let Some(disc_config) = discv4_config {
let (discv4, mut discv4_service) =
Discv4::bind(discovery_addr, local_enr, sk, disc_config).await.map_err(|err| {
NetworkError::from_io_error(err, ServiceKind::Discovery(discovery_addr))
})?;
let discv4_updates = discv4_service.update_stream();
// spawn the service
let _discv4_service = discv4_service.spawn();
(Some(discv4), Some(discv4_updates), Some(_discv4_service))
} else {
(None, None, None)
};
// setup DNS discovery
let (_dns_discovery, dns_discovery_updates, _dns_disc_service) =
if let Some(dns_config) = dns_discovery_config {
let (mut service, dns_disc) = DnsDiscoveryService::new_pair(
Arc::new(DnsResolver::from_system_conf()?),
dns_config,
);
let dns_discovery_updates = service.node_record_stream();
let dns_disc_service = service.spawn();
(Some(dns_disc), Some(dns_discovery_updates), Some(dns_disc_service))
} else {
(None, None, None)
};
Ok(Self {
discovery_listeners: Default::default(),
local_enr,
discv4,
discv4_updates,
_discv4_service,
discovered_nodes: Default::default(),
queued_events: Default::default(),
_dns_disc_service,
_dns_discovery,
dns_discovery_updates,
})
}
/// Registers a listener for receiving [DiscoveryEvent] updates.
pub(crate) fn add_listener(&mut self, tx: mpsc::UnboundedSender<DiscoveryEvent>) {
self.discovery_listeners.push(tx);
}
/// Notifies all registered listeners with the provided `event`.
#[inline]
fn notify_listeners(&mut self, event: &DiscoveryEvent) {
self.discovery_listeners.retain_mut(|listener| listener.send(event.clone()).is_ok());
}
/// Updates the `eth:ForkId` field in discv4.
#[allow(unused)]
pub(crate) fn update_fork_id(&self, fork_id: ForkId) {
if let Some(discv4) = &self.discv4 {
// use forward-compatible forkid entry
discv4.set_eip868_rlp("eth".as_bytes().to_vec(), EnrForkIdEntry::from(fork_id))
}
}
/// Bans the [`IpAddr`] in the discovery service.
pub(crate) fn ban_ip(&self, ip: IpAddr) {
if let Some(discv4) = &self.discv4 {
discv4.ban_ip(ip)
}
}
/// Bans the [`PeerId`] and [`IpAddr`] in the discovery service.
pub(crate) fn ban(&self, peer_id: PeerId, ip: IpAddr) {
if let Some(discv4) = &self.discv4 {
discv4.ban(peer_id, ip)
}
}
/// Returns the id with which the local identifies itself in the network
pub(crate) fn local_id(&self) -> PeerId {
self.local_enr.id
}
/// Add a node to the discv4 table.
pub(crate) fn add_discv4_node(&self, node: NodeRecord) {
if let Some(discv4) = &self.discv4 {
discv4.add_node(node);
}
}
/// Processes an incoming [NodeRecord] update from a discovery service
fn on_node_record_update(&mut self, record: NodeRecord, fork_id: Option<ForkId>) {
let id = record.id;
let addr = record.tcp_addr();
match self.discovered_nodes.entry(id) {
Entry::Occupied(_entry) => {}
Entry::Vacant(entry) => {
entry.insert(addr);
self.queued_events.push_back(DiscoveryEvent::NewNode(
DiscoveredEvent::EventQueued { peer_id: id, socket_addr: addr, fork_id },
));
}
}
}
fn on_discv4_update(&mut self, update: DiscoveryUpdate) {
match update {
DiscoveryUpdate::Added(record) => {
self.on_node_record_update(record, None);
}
DiscoveryUpdate::EnrForkId(node, fork_id) => {
self.queued_events.push_back(DiscoveryEvent::EnrForkId(node.id, fork_id))
}
DiscoveryUpdate::Removed(node) => {
self.discovered_nodes.remove(&node);
}
DiscoveryUpdate::Batch(updates) => {
for update in updates {
self.on_discv4_update(update);
}
}
DiscoveryUpdate::DiscoveredAtCapacity(record) => {
self.on_node_record_update(record, None);
}
}
}
pub(crate) fn poll(&mut self, cx: &mut Context<'_>) -> Poll<DiscoveryEvent> {
loop {
// Drain all buffered events first
if let Some(event) = self.queued_events.pop_front() {
self.notify_listeners(&event);
return Poll::Ready(event)
}
// drain the update streams
while let Some(Poll::Ready(Some(update))) =
self.discv4_updates.as_mut().map(|updates| updates.poll_next_unpin(cx))
{
self.on_discv4_update(update)
}
while let Some(Poll::Ready(Some(update))) =
self.dns_discovery_updates.as_mut().map(|updates| updates.poll_next_unpin(cx))
{
self.add_discv4_node(update.node_record);
self.on_node_record_update(update.node_record, update.fork_id);
}
if self.queued_events.is_empty() {
return Poll::Pending
}
}
}
}
#[cfg(test)]
impl Discovery {
/// Returns a Discovery instance that does nothing and is intended for testing purposes.
///
/// NOTE: This instance does nothing
pub(crate) fn noop() -> Self {
let (_discovery_listeners, _): (mpsc::UnboundedSender<DiscoveryEvent>, _) =
mpsc::unbounded_channel();
Self {
discovered_nodes: Default::default(),
local_enr: NodeRecord {
address: IpAddr::V4(std::net::Ipv4Addr::UNSPECIFIED),
tcp_port: 0,
udp_port: 0,
id: PeerId::random(),
},
discv4: Default::default(),
discv4_updates: Default::default(),
queued_events: Default::default(),
_discv4_service: Default::default(),
_dns_discovery: None,
dns_discovery_updates: None,
_dns_disc_service: None,
discovery_listeners: Default::default(),
}
}
}
/// Events produced by the [`Discovery`] manager.
#[derive(Debug, Clone)]
pub enum DiscoveryEvent {
/// Discovered a node
NewNode(DiscoveredEvent),
/// Retrieved a [`ForkId`] from the peer via ENR request, See <https://eips.ethereum.org/EIPS/eip-868>
EnrForkId(PeerId, ForkId),
}
#[cfg(test)]
mod tests {
use super::*;
use rand::thread_rng;
use secp256k1::SECP256K1;
use std::net::{Ipv4Addr, SocketAddrV4};
#[tokio::test(flavor = "multi_thread")]
async fn test_discovery_setup() {
let mut rng = thread_rng();
let (secret_key, _) = SECP256K1.generate_keypair(&mut rng);
let discovery_addr = SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::UNSPECIFIED, 0));
let _discovery =
Discovery::new(discovery_addr, secret_key, Default::default(), Default::default())
.await
.unwrap();
}
}