Skip to main content

snarkos_node/client/
router.rs

1// Copyright (c) 2019-2026 Provable Inc.
2// This file is part of the snarkOS library.
3
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at:
7
8// http://www.apache.org/licenses/LICENSE-2.0
9
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15
16use super::*;
17use snarkos_node_network::{PeerPoolHandling, harden_socket};
18use snarkos_node_router::{
19    Routing,
20    messages::{
21        BlockRequest,
22        BlockResponse,
23        DataBlocks,
24        DisconnectReason,
25        MessageCodec,
26        PeerRequest,
27        Ping,
28        Pong,
29        PuzzleResponse,
30        UnconfirmedTransaction,
31    },
32};
33use snarkos_node_tcp::{ConnectError, Connection, ConnectionSide, Tcp};
34use snarkvm::{
35    console::network::{ConsensusVersion, Network},
36    ledger::{block::Transaction, narwhal::Data},
37    utilities::flatten_error,
38};
39
40use std::{io, net::SocketAddr};
41
42impl<N: Network, C: ConsensusStorage<N>> P2P for Client<N, C> {
43    /// Returns a reference to the TCP instance.
44    fn tcp(&self) -> &Tcp {
45        self.router.tcp()
46    }
47}
48
49#[async_trait]
50impl<N: Network, C: ConsensusStorage<N>> Handshake for Client<N, C> {
51    /// Performs the handshake protocol.
52    async fn perform_handshake(&self, mut connection: Connection) -> Result<Connection, ConnectError> {
53        // Perform the handshake.
54        let peer_addr = connection.addr();
55        let conn_side = connection.side();
56        let stream = self.borrow_stream(&mut connection);
57        // Make the socket more robust.
58        harden_socket(stream)?;
59        let genesis_header = *self.genesis.header();
60        let restrictions_id = self.ledger.vm().restrictions().restrictions_id();
61
62        self.router.handshake(peer_addr, stream, conn_side, genesis_header, restrictions_id).await?;
63
64        Ok(connection)
65    }
66}
67
68#[async_trait]
69impl<N: Network, C: ConsensusStorage<N>> OnConnect for Client<N, C> {
70    async fn on_connect(&self, peer_addr: SocketAddr) {
71        // Resolve the peer address to the listener address.
72        if let Some(listener_addr) = self.router().resolve_to_listener(peer_addr)
73            && let Some(peer) = self.router().get_connected_peer(listener_addr)
74        {
75            // If it's a bootstrap client, only request its peers.
76            if peer.node_type == NodeType::BootstrapClient {
77                self.router().send(listener_addr, Message::PeerRequest(PeerRequest));
78            } else {
79                // Send the first `Ping` message to the peer.
80                self.ping.on_peer_connected(listener_addr);
81            }
82        }
83    }
84}
85
86#[async_trait]
87impl<N: Network, C: ConsensusStorage<N>> Disconnect for Client<N, C> {
88    /// Any extra operations to be performed during a disconnect.
89    async fn handle_disconnect(&self, peer_addr: SocketAddr) {
90        if let Some(peer_ip) = self.router.resolve_to_listener(peer_addr) {
91            self.sync.remove_peer(&peer_ip);
92
93            self.router.downgrade_peer_to_candidate(peer_ip);
94
95            // Clear cached entries applicable to the peer.
96            self.router.cache().clear_peer_entries(peer_ip);
97            #[cfg(feature = "metrics")]
98            self.router.update_metrics();
99        }
100    }
101}
102
103#[async_trait]
104impl<N: Network, C: ConsensusStorage<N>> Reading for Client<N, C> {
105    type Codec = MessageCodec<N>;
106    type Message = Message<N>;
107
108    /// Creates a [`Decoder`] used to interpret messages from the network.
109    /// The `side` param indicates the connection side **from the node's perspective**.
110    fn codec(&self, _peer_addr: SocketAddr, _side: ConnectionSide) -> Self::Codec {
111        Default::default()
112    }
113
114    /// Processes a message received from the network.
115    async fn process_message(&self, peer_addr: SocketAddr, message: Self::Message) -> io::Result<()> {
116        let clone = self.clone();
117        if matches!(message, Message::BlockRequest(_) | Message::BlockResponse(_)) {
118            // Handle BlockRequest and BlockResponse messages in a separate task to not block the
119            // inbound queue.
120            tokio::spawn(async move {
121                clone.process_message_inner(peer_addr, message).await;
122            });
123        } else {
124            self.process_message_inner(peer_addr, message).await;
125        }
126        Ok(())
127    }
128}
129
130impl<N: Network, C: ConsensusStorage<N>> Client<N, C> {
131    async fn process_message_inner(
132        &self,
133        peer_addr: SocketAddr,
134        message: <Client<N, C> as snarkos_node_tcp::protocols::Reading>::Message,
135    ) {
136        // Process the message. Disconnect if the peer violated the protocol.
137        if let Err(error) = self.inbound(peer_addr, message).await {
138            warn!("Failed to process inbound message from '{peer_addr}' - {error}");
139
140            //TODO(kaimast): set disconnect reason based on error
141            if let Some(peer_ip) = self.router().resolve_to_listener(peer_addr) {
142                warn!("Disconnecting from '{peer_ip}' for protocol violation");
143                self.router().send(peer_ip, Message::Disconnect(DisconnectReason::ProtocolViolation.into()));
144                // Disconnect from this peer.
145                self.router().disconnect(peer_ip);
146            }
147        }
148    }
149}
150
151#[async_trait]
152impl<N: Network, C: ConsensusStorage<N>> Routing<N> for Client<N, C> {}
153
154impl<N: Network, C: ConsensusStorage<N>> Heartbeat<N> for Client<N, C> {}
155
156impl<N: Network, C: ConsensusStorage<N>> Outbound<N> for Client<N, C> {
157    /// Returns a reference to the router.
158    fn router(&self) -> &Router<N> {
159        &self.router
160    }
161
162    /// Returns `true` if the node is synced up to the latest block (within the given tolerance).
163    fn is_block_synced(&self) -> bool {
164        self.sync.is_block_synced()
165    }
166
167    /// Returns the number of blocks this node is behind the greatest peer height,
168    /// or `None` if not connected to peers yet.
169    fn num_blocks_behind(&self) -> Option<u32> {
170        self.sync.num_blocks_behind()
171    }
172
173    /// Returns the current sync speed in blocks per second.
174    fn get_sync_speed(&self) -> f64 {
175        self.sync.get_sync_speed()
176    }
177}
178
179#[async_trait]
180impl<N: Network, C: ConsensusStorage<N>> Inbound<N> for Client<N, C> {
181    /// Returns `true` if the message version is valid.
182    fn is_valid_message_version(&self, message_version: u32) -> bool {
183        self.router().is_valid_message_version(message_version)
184    }
185
186    /// Handles a `BlockRequest` message.
187    fn block_request(&self, peer_ip: SocketAddr, message: BlockRequest) -> bool {
188        let BlockRequest { start_height, end_height } = &message;
189
190        // Get the latest consensus version, i.e., the one for the last block's height.
191        let latest_consensus_version = match N::CONSENSUS_VERSION(end_height.saturating_sub(1)) {
192            Ok(version) => version,
193            Err(err) => {
194                let err = err.context("Failed to retrieve consensus version");
195                error!("{}", flatten_error(&err));
196                return false;
197            }
198        };
199
200        // Retrieve the blocks within the requested range.
201        let blocks = match self.ledger.get_blocks(*start_height..*end_height) {
202            Ok(blocks) => DataBlocks(blocks),
203            Err(error) => {
204                let err =
205                    error.context(format!("Failed to retrieve blocks {start_height} to {end_height} from the ledger"));
206                error!("{}", flatten_error(&err));
207                return false;
208            }
209        };
210
211        // Send the `BlockResponse` message to the peer.
212        self.router()
213            .send(peer_ip, Message::BlockResponse(BlockResponse::new(message, blocks, latest_consensus_version)));
214        true
215    }
216
217    /// Handles a `BlockResponse` message.
218    fn block_response(
219        &self,
220        peer_ip: SocketAddr,
221        blocks: Vec<Block<N>>,
222        latest_consensus_version: Option<ConsensusVersion>,
223    ) -> bool {
224        // We do not need to explicitly sync here because insert_block_response, will wake up the sync task.
225        match self.sync.insert_block_responses(peer_ip, blocks, latest_consensus_version) {
226            Ok(_) => true,
227            Err(err) if err.is_benign() => {
228                let err: anyhow::Error = err.into();
229                debug!("{}", flatten_error(err.context(format!("Ignoring block response from peer '{peer_ip}'"))));
230                true
231            }
232            Err(err) if err.is_invalid_consensus_version() => {
233                // If the error indicates the peer missed an upgrade and forked, ban it.
234                let err: anyhow::Error = err.into();
235                let err = err.context(format!("Peer sent an invalid block response '{peer_ip}'"));
236
237                let msg = flatten_error(&err);
238                error!("{msg}");
239                self.router().ip_ban_peer(peer_ip, Some(&err.to_string()));
240
241                false
242            }
243            Err(err) => {
244                let err: anyhow::Error = err.into();
245                let err = err.context(format!("Failed to insert block response from '{peer_ip}'"));
246                warn!("{}", flatten_error(err));
247
248                // TODO(kaimast): This needs more testing to ensure disconnect is the correct action.
249                true
250            }
251        }
252    }
253
254    /// Processes the block locators and sends back a `Pong` message.
255    fn ping(&self, peer_ip: SocketAddr, message: Ping<N>) -> bool {
256        // If block locators were provided, then update the peer in the sync pool.
257        if let Some(block_locators) = message.block_locators {
258            // Check the block locators are valid, and update the peer in the sync pool.
259            if let Err(err) = self.sync.update_peer_locators(peer_ip, &block_locators) {
260                warn!("{}", flatten_error(err.context(format!("Peer '{peer_ip}' sent invalid block locators"))));
261                return false;
262            }
263
264            let last_peer_height = Some(block_locators.latest_locator_height());
265            self.router().update_connected_peer(&peer_ip, |peer| peer.last_height_seen = last_peer_height);
266        }
267
268        // Send a `Pong` message to the peer.
269        self.router().send(peer_ip, Message::Pong(Pong { is_fork: Some(false) }));
270        true
271    }
272
273    /// Sleeps for a period and then sends a `Ping` message to the peer.
274    fn pong(&self, peer_ip: SocketAddr, _message: Pong) -> bool {
275        self.ping.on_pong_received(peer_ip);
276        true
277    }
278
279    /// Retrieves the latest epoch hash and latest block header, and returns the puzzle response to the peer.
280    fn puzzle_request(&self, peer_ip: SocketAddr) -> bool {
281        // Retrieve the latest epoch hash.
282        let epoch_hash = match self.ledger.latest_epoch_hash() {
283            Ok(epoch_hash) => epoch_hash,
284            Err(err) => {
285                let err = err.context(format!("Failed to prepare a puzzle request for '{peer_ip}'"));
286                error!("{}", flatten_error(err));
287                return false;
288            }
289        };
290        // Retrieve the latest block header.
291        let block_header = Data::Object(self.ledger.latest_header());
292        // Send the `PuzzleResponse` message to the peer.
293        self.router().send(peer_ip, Message::PuzzleResponse(PuzzleResponse { epoch_hash, block_header }));
294        true
295    }
296
297    /// Saves the latest epoch hash and latest block header in the node.
298    fn puzzle_response(&self, peer_ip: SocketAddr, _epoch_hash: N::BlockHash, _header: Header<N>) -> bool {
299        debug!("Disconnecting '{peer_ip}' for the following reason - {}", DisconnectReason::ProtocolViolation);
300        false
301    }
302
303    /// Propagates the unconfirmed solution to all connected validators.
304    async fn unconfirmed_solution(
305        &self,
306        peer_ip: SocketAddr,
307        serialized: UnconfirmedSolution<N>,
308        solution: Solution<N>,
309    ) -> bool {
310        // Try to add the solution to the verification queue, without changing LRU status of known solutions.
311        let mut solution_queue = self.solution_queue.lock();
312        if !solution_queue.contains(&solution.id()) {
313            solution_queue.put(solution.id(), (peer_ip, serialized, solution));
314        }
315
316        true // Maintain the connection
317    }
318
319    /// Handles an `UnconfirmedTransaction` message.
320    async fn unconfirmed_transaction(
321        &self,
322        peer_ip: SocketAddr,
323        serialized: UnconfirmedTransaction<N>,
324        transaction: Transaction<N>,
325    ) -> bool {
326        // Try to add the transaction to a verification queue, without changing LRU status of known transactions.
327        match &transaction {
328            Transaction::<N>::Fee(..) => (), // Fee Transactions are not valid.
329            Transaction::<N>::Deploy(..) => {
330                let mut deploy_queue = self.deploy_queue.lock();
331                if !deploy_queue.contains(&transaction.id()) {
332                    deploy_queue.put(transaction.id(), (peer_ip, serialized, transaction));
333                }
334            }
335            Transaction::<N>::Execute(..) => {
336                let mut execute_queue = self.execute_queue.lock();
337                if !execute_queue.contains(&transaction.id()) {
338                    execute_queue.put(transaction.id(), (peer_ip, serialized, transaction));
339                }
340            }
341        }
342
343        true // Maintain the connection
344    }
345}