use super::*;
use snarkos_node_router::{
messages::{
BlockRequest,
BlockResponse,
DataBlocks,
DisconnectReason,
MessageCodec,
Ping,
Pong,
PuzzleResponse,
UnconfirmedTransaction,
},
Routing,
};
use snarkos_node_tcp::{Connection, ConnectionSide, Tcp};
use snarkvm::{
ledger::narwhal::Data,
prelude::{block::Transaction, Network},
};
use snarkos_node_sync::communication_service::CommunicationService;
use std::{io, net::SocketAddr, time::Duration};
impl<N: Network, C: ConsensusStorage<N>> P2P for Client<N, C> {
fn tcp(&self) -> &Tcp {
self.router.tcp()
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Handshake for Client<N, C> {
async fn perform_handshake(&self, mut connection: Connection) -> io::Result<Connection> {
let peer_addr = connection.addr();
let conn_side = connection.side();
let stream = self.borrow_stream(&mut connection);
let genesis_header = *self.genesis.header();
self.router.handshake(peer_addr, stream, conn_side, genesis_header).await?;
Ok(connection)
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> OnConnect for Client<N, C>
where
Self: Outbound<N>,
{
async fn on_connect(&self, peer_addr: SocketAddr) {
let Some(peer_ip) = self.router.resolve_to_listener(&peer_addr) else { return };
let block_locators = match self.sync.get_block_locators() {
Ok(block_locators) => Some(block_locators),
Err(e) => {
error!("Failed to get block locators: {e}");
return;
}
};
self.send_ping(peer_ip, block_locators);
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Disconnect for Client<N, C> {
async fn handle_disconnect(&self, peer_addr: SocketAddr) {
if let Some(peer_ip) = self.router.resolve_to_listener(&peer_addr) {
self.sync.remove_peer(&peer_ip);
self.router.remove_connected_peer(peer_ip);
}
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Writing for Client<N, C> {
type Codec = MessageCodec<N>;
type Message = Message<N>;
fn codec(&self, _addr: SocketAddr, _side: ConnectionSide) -> Self::Codec {
Default::default()
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Reading for Client<N, C> {
type Codec = MessageCodec<N>;
type Message = Message<N>;
fn codec(&self, _peer_addr: SocketAddr, _side: ConnectionSide) -> Self::Codec {
Default::default()
}
async fn process_message(&self, peer_addr: SocketAddr, message: Self::Message) -> io::Result<()> {
if let Err(error) = self.inbound(peer_addr, message).await {
if let Some(peer_ip) = self.router().resolve_to_listener(&peer_addr) {
warn!("Disconnecting from '{peer_ip}' - {error}");
Outbound::send(self, peer_ip, Message::Disconnect(DisconnectReason::ProtocolViolation.into()));
self.router().disconnect(peer_ip);
}
}
Ok(())
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> CommunicationService for Client<N, C> {
type Message = Message<N>;
fn prepare_block_request(start_height: u32, end_height: u32) -> Self::Message {
debug_assert!(start_height < end_height, "Invalid block request format");
Message::BlockRequest(BlockRequest { start_height, end_height })
}
async fn send(
&self,
peer_ip: SocketAddr,
message: Self::Message,
) -> Option<tokio::sync::oneshot::Receiver<io::Result<()>>> {
Outbound::send(self, peer_ip, message)
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Routing<N> for Client<N, C> {}
impl<N: Network, C: ConsensusStorage<N>> Heartbeat<N> for Client<N, C> {}
impl<N: Network, C: ConsensusStorage<N>> Outbound<N> for Client<N, C> {
fn router(&self) -> &Router<N> {
&self.router
}
}
#[async_trait]
impl<N: Network, C: ConsensusStorage<N>> Inbound<N> for Client<N, C> {
fn block_request(&self, peer_ip: SocketAddr, message: BlockRequest) -> bool {
let BlockRequest { start_height, end_height } = &message;
let blocks = match self.ledger.get_blocks(*start_height..*end_height) {
Ok(blocks) => Data::Object(DataBlocks(blocks)),
Err(error) => {
error!("Failed to retrieve blocks {start_height} to {end_height} from the ledger - {error}");
return false;
}
};
Outbound::send(self, peer_ip, Message::BlockResponse(BlockResponse { request: message, blocks }));
true
}
fn block_response(&self, peer_ip: SocketAddr, blocks: Vec<Block<N>>) -> bool {
match self.sync.advance_with_sync_blocks(peer_ip, blocks) {
Ok(()) => true,
Err(error) => {
warn!("{error}");
false
}
}
}
fn ping(&self, peer_ip: SocketAddr, message: Ping<N>) -> bool {
if self.sync.mode().is_router() {
if let Some(block_locators) = message.block_locators {
if let Err(error) = self.sync.update_peer_locators(peer_ip, block_locators) {
warn!("Peer '{peer_ip}' sent invalid block locators: {error}");
return false;
}
}
}
Outbound::send(self, peer_ip, Message::Pong(Pong { is_fork: Some(false) }));
true
}
fn pong(&self, peer_ip: SocketAddr, _message: Pong) -> bool {
let self_ = self.clone();
tokio::spawn(async move {
tokio::time::sleep(Duration::from_secs(Self::PING_SLEEP_IN_SECS)).await;
if self_.router().is_connected(&peer_ip) {
match self_.sync.get_block_locators() {
Ok(block_locators) => self_.send_ping(peer_ip, Some(block_locators)),
Err(e) => error!("Failed to get block locators - {e}"),
}
}
});
true
}
fn puzzle_request(&self, peer_ip: SocketAddr) -> bool {
let epoch_challenge = match self.ledger.latest_epoch_challenge() {
Ok(epoch_challenge) => epoch_challenge,
Err(error) => {
error!("Failed to prepare a puzzle request for '{peer_ip}': {error}");
return false;
}
};
let block_header = Data::Object(self.ledger.latest_header());
Outbound::send(self, peer_ip, Message::PuzzleResponse(PuzzleResponse { epoch_challenge, block_header }));
true
}
fn puzzle_response(&self, peer_ip: SocketAddr, _epoch_challenge: EpochChallenge<N>, _header: Header<N>) -> bool {
debug!("Disconnecting '{peer_ip}' for the following reason - {:?}", DisconnectReason::ProtocolViolation);
false
}
async fn unconfirmed_solution(
&self,
peer_ip: SocketAddr,
serialized: UnconfirmedSolution<N>,
solution: ProverSolution<N>,
) -> bool {
if let Ok(epoch_challenge) = self.ledger.latest_epoch_challenge() {
let proof_target = self.ledger.latest_block().header().proof_target();
let coinbase_puzzle = self.coinbase_puzzle.clone();
let is_valid = tokio::task::spawn_blocking(move || {
solution.verify(coinbase_puzzle.coinbase_verifying_key(), &epoch_challenge, proof_target)
})
.await;
match is_valid {
Ok(Ok(true)) => {
let message = Message::UnconfirmedSolution(serialized);
self.propagate(message, &[peer_ip]);
}
Ok(Ok(false)) | Ok(Err(_)) => {
trace!("Invalid prover solution '{}' for the proof target.", solution.commitment())
}
Err(error) => warn!("Failed to verify the prover solution: {error}"),
}
}
true
}
async fn unconfirmed_transaction(
&self,
peer_ip: SocketAddr,
serialized: UnconfirmedTransaction<N>,
transaction: Transaction<N>,
) -> bool {
if transaction.is_fee() {
return true; }
if self.ledger.check_transaction_basic(&transaction, None).is_ok() {
self.propagate(Message::UnconfirmedTransaction(serialized), &[peer_ip]);
}
true
}
}