use super::*;
use snarkos_node_network::{PeerPoolHandling, harden_socket};
use snarkos_node_router::messages::{
BlockRequest,
BlockResponse,
DataBlocks,
DisconnectReason,
Message,
MessageCodec,
Ping,
Pong,
UnconfirmedTransaction,
};
use snarkos_node_tcp::{ConnectError, Connection, ConnectionSide, Tcp};
use snarkvm::{
console::network::{ConsensusVersion, Network},
ledger::{block::Transaction, narwhal::Data},
utilities::flatten_error,
};
use std::{io, net::SocketAddr};
impl<N: Network, C: ConsensusStorage<N>> P2P for Validator<N, C> {
fn tcp(&self) -> &Tcp {
self.router.tcp()
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Handshake for Validator<N, C> {
async fn perform_handshake(&self, mut connection: Connection) -> Result<Connection, ConnectError> {
let peer_addr = connection.addr();
let conn_side = connection.side();
let stream = self.borrow_stream(&mut connection);
harden_socket(stream)?;
let genesis_header = self.ledger.get_header(0).map_err(ConnectError::other)?;
let restrictions_id = self.ledger.vm().restrictions().restrictions_id();
self.router.handshake(peer_addr, stream, conn_side, genesis_header, restrictions_id).await?;
Ok(connection)
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> OnConnect for Validator<N, C>
where
Self: Outbound<N>,
{
async fn on_connect(&self, peer_addr: SocketAddr) {
if let Some(listener_addr) = self.router().resolve_to_listener(peer_addr)
&& let Some(peer) = self.router().get_connected_peer(listener_addr)
&& peer.node_type != NodeType::BootstrapClient
{
self.ping.on_peer_connected(listener_addr);
}
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Disconnect for Validator<N, C> {
async fn handle_disconnect(&self, peer_addr: SocketAddr) {
if let Some(peer_ip) = self.router.resolve_to_listener(peer_addr) {
let was_connected = self.router.downgrade_peer_to_candidate(peer_ip);
if was_connected {
self.sync.remove_peer(&peer_ip);
}
self.router.cache().clear_peer_entries(peer_ip);
#[cfg(feature = "metrics")]
self.router.update_metrics();
}
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Reading for Validator<N, C> {
type Codec = MessageCodec<N>;
type Message = Message<N>;
fn codec(&self, _peer_addr: SocketAddr, _side: ConnectionSide) -> Self::Codec {
Default::default()
}
async fn process_message(&self, peer_addr: SocketAddr, message: Self::Message) -> io::Result<()> {
let clone = self.clone();
if matches!(message, Message::BlockRequest(_) | Message::BlockResponse(_)) {
tokio::spawn(async move {
clone.process_message_inner(peer_addr, message).await;
});
} else {
self.process_message_inner(peer_addr, message).await;
}
Ok(())
}
}
impl<N: Network, C: ConsensusStorage<N>> Validator<N, C> {
async fn process_message_inner(
&self,
peer_addr: SocketAddr,
message: <Validator<N, C> as snarkos_node_tcp::protocols::Reading>::Message,
) {
if let Err(error) = self.inbound(peer_addr, message).await {
warn!("Failed to process inbound message from '{peer_addr}' - {error}");
if let Some(peer_ip) = self.router().resolve_to_listener(peer_addr) {
warn!("Disconnecting from '{peer_ip}' for protocol violation");
self.router().send(peer_ip, Message::Disconnect(DisconnectReason::ProtocolViolation.into()));
self.router().disconnect(peer_ip);
}
}
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Routing<N> for Validator<N, C> {}
impl<N: Network, C: ConsensusStorage<N>> Heartbeat<N> for Validator<N, C> {}
impl<N: Network, C: ConsensusStorage<N>> Outbound<N> for Validator<N, C> {
fn router(&self) -> &Router<N> {
&self.router
}
fn is_block_synced(&self) -> bool {
self.sync.is_block_synced()
}
fn num_blocks_behind(&self) -> Option<u32> {
self.sync.num_blocks_behind()
}
fn get_sync_speed(&self) -> f64 {
self.sync.get_sync_speed()
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Inbound<N> for Validator<N, C> {
fn is_valid_message_version(&self, message_version: u32) -> bool {
self.router().is_valid_message_version(message_version)
}
fn block_request(&self, peer_ip: SocketAddr, message: BlockRequest) -> bool {
let BlockRequest { start_height, end_height } = &message;
let latest_consensus_version = match N::CONSENSUS_VERSION(end_height.saturating_sub(1)) {
Ok(version) => version,
Err(err) => {
error!("{}", flatten_error(err.context("Failed to retrieve consensus version")));
return false;
}
};
let blocks = match self.ledger.get_blocks(*start_height..*end_height) {
Ok(blocks) => DataBlocks(blocks),
Err(err) => {
let err =
err.context(format!("Failed to retrieve blocks {start_height} to {end_height} from the ledger"));
error!("{}", flatten_error(err));
return false;
}
};
self.router()
.send(peer_ip, Message::BlockResponse(BlockResponse::new(message, blocks, latest_consensus_version)));
true
}
fn block_response(
&self,
peer_ip: SocketAddr,
_blocks: Vec<Block<N>>,
_latest_consensus_version: Option<ConsensusVersion>,
) -> bool {
warn!("Received a block response through P2P, not BFT, from {peer_ip}");
false
}
fn ping(&self, peer_ip: SocketAddr, _message: Ping<N>) -> bool {
self.router().send(peer_ip, Message::Pong(Pong { is_fork: Some(false) }));
true
}
fn pong(&self, peer_ip: SocketAddr, _message: Pong) -> bool {
self.ping.on_pong_received(peer_ip);
true
}
fn puzzle_request(&self, peer_ip: SocketAddr) -> bool {
let epoch_hash = match self.ledger.latest_epoch_hash() {
Ok(epoch_hash) => epoch_hash,
Err(error) => {
error!("Failed to prepare a puzzle request for '{peer_ip}': {error}");
return false;
}
};
let block_header = Data::Object(self.ledger.latest_header());
self.router().send(peer_ip, Message::PuzzleResponse(PuzzleResponse { epoch_hash, block_header }));
true
}
fn puzzle_response(&self, peer_ip: SocketAddr, _epoch_hash: N::BlockHash, _header: Header<N>) -> bool {
debug!("Disconnecting '{peer_ip}' for the following reason - {}", DisconnectReason::ProtocolViolation);
false
}
async fn unconfirmed_solution(
&self,
peer_ip: SocketAddr,
serialized: UnconfirmedSolution<N>,
solution: Solution<N>,
) -> bool {
if let Err(error) = self.consensus.add_unconfirmed_solution(solution).await {
trace!("[UnconfirmedSolution] {error}");
return true; }
let message = Message::UnconfirmedSolution(serialized);
self.propagate_to_validators(message, &[peer_ip]);
true
}
async fn unconfirmed_transaction(
&self,
peer_ip: SocketAddr,
serialized: UnconfirmedTransaction<N>,
transaction: Transaction<N>,
) -> bool {
if let Err(error) = self.consensus.add_unconfirmed_transaction(transaction).await {
trace!("[UnconfirmedTransaction] {error}");
return true; }
let message = Message::UnconfirmedTransaction(serialized);
self.propagate_to_validators(message, &[peer_ip]);
true
}
}