1use super::*;
17use snarkos_node_network::PeerPoolHandling;
18use snarkos_node_router::{
19 Routing,
20 messages::{
21 BlockRequest,
22 BlockResponse,
23 DataBlocks,
24 DisconnectReason,
25 MessageCodec,
26 PeerRequest,
27 Ping,
28 Pong,
29 PuzzleResponse,
30 UnconfirmedTransaction,
31 },
32};
33use snarkos_node_sync::InsertBlockResponseError;
34use snarkos_node_tcp::{Connection, ConnectionSide, Tcp};
35use snarkvm::{
36 console::network::{ConsensusVersion, Network},
37 ledger::{block::Transaction, narwhal::Data},
38 utilities::flatten_error,
39};
40
41use std::{io, net::SocketAddr};
42
43impl<N: Network, C: ConsensusStorage<N>> P2P for Client<N, C> {
44 fn tcp(&self) -> &Tcp {
46 self.router.tcp()
47 }
48}
49
50#[async_trait]
51impl<N: Network, C: ConsensusStorage<N>> Handshake for Client<N, C> {
52 async fn perform_handshake(&self, mut connection: Connection) -> io::Result<Connection> {
54 let peer_addr = connection.addr();
56 let conn_side = connection.side();
57 let stream = self.borrow_stream(&mut connection);
58 let genesis_header = *self.genesis.header();
59 let restrictions_id = self.ledger.vm().restrictions().restrictions_id();
60 self.router.handshake(peer_addr, stream, conn_side, genesis_header, restrictions_id).await?;
61
62 Ok(connection)
63 }
64}
65
66#[async_trait]
67impl<N: Network, C: ConsensusStorage<N>> OnConnect for Client<N, C> {
68 async fn on_connect(&self, peer_addr: SocketAddr) {
69 if let Some(listener_addr) = self.router().resolve_to_listener(peer_addr) {
71 if let Some(peer) = self.router().get_connected_peer(listener_addr) {
72 if peer.node_type == NodeType::BootstrapClient {
74 self.router().send(listener_addr, Message::PeerRequest(PeerRequest));
75 } else {
76 self.ping.on_peer_connected(listener_addr);
78 }
79 }
80 }
81 }
82}
83
84#[async_trait]
85impl<N: Network, C: ConsensusStorage<N>> Disconnect for Client<N, C> {
86 async fn handle_disconnect(&self, peer_addr: SocketAddr) {
88 if let Some(peer_ip) = self.router.resolve_to_listener(peer_addr) {
89 self.sync.remove_peer(&peer_ip);
90
91 self.router.downgrade_peer_to_candidate(peer_ip);
92
93 self.router.cache().clear_peer_entries(peer_ip);
95 #[cfg(feature = "metrics")]
96 self.router.update_metrics();
97 }
98 }
99}
100
101#[async_trait]
102impl<N: Network, C: ConsensusStorage<N>> Reading for Client<N, C> {
103 type Codec = MessageCodec<N>;
104 type Message = Message<N>;
105
106 fn codec(&self, _peer_addr: SocketAddr, _side: ConnectionSide) -> Self::Codec {
109 Default::default()
110 }
111
112 async fn process_message(&self, peer_addr: SocketAddr, message: Self::Message) -> io::Result<()> {
114 let clone = self.clone();
115 if matches!(message, Message::BlockRequest(_) | Message::BlockResponse(_)) {
116 tokio::spawn(async move {
119 clone.process_message_inner(peer_addr, message).await;
120 });
121 } else {
122 self.process_message_inner(peer_addr, message).await;
123 }
124 Ok(())
125 }
126}
127
128impl<N: Network, C: ConsensusStorage<N>> Client<N, C> {
129 async fn process_message_inner(
130 &self,
131 peer_addr: SocketAddr,
132 message: <Client<N, C> as snarkos_node_tcp::protocols::Reading>::Message,
133 ) {
134 if let Err(error) = self.inbound(peer_addr, message).await {
136 warn!("Failed to process inbound message from '{peer_addr}' - {error}");
137
138 if let Some(peer_ip) = self.router().resolve_to_listener(peer_addr) {
140 warn!("Disconnecting from '{peer_ip}' for protocol violation");
141 self.router().send(peer_ip, Message::Disconnect(DisconnectReason::ProtocolViolation.into()));
142 self.router().disconnect(peer_ip);
144 }
145 }
146 }
147}
148
149#[async_trait]
150impl<N: Network, C: ConsensusStorage<N>> Routing<N> for Client<N, C> {}
151
152impl<N: Network, C: ConsensusStorage<N>> Heartbeat<N> for Client<N, C> {}
153
154impl<N: Network, C: ConsensusStorage<N>> Outbound<N> for Client<N, C> {
155 fn router(&self) -> &Router<N> {
157 &self.router
158 }
159
160 fn is_block_synced(&self) -> bool {
162 self.sync.is_block_synced()
163 }
164
165 fn num_blocks_behind(&self) -> Option<u32> {
168 self.sync.num_blocks_behind()
169 }
170
171 fn get_sync_speed(&self) -> f64 {
173 self.sync.get_sync_speed()
174 }
175}
176
177#[async_trait]
178impl<N: Network, C: ConsensusStorage<N>> Inbound<N> for Client<N, C> {
179 fn is_valid_message_version(&self, message_version: u32) -> bool {
181 self.router().is_valid_message_version(message_version)
182 }
183
184 fn block_request(&self, peer_ip: SocketAddr, message: BlockRequest) -> bool {
186 let BlockRequest { start_height, end_height } = &message;
187
188 let latest_consensus_version = match N::CONSENSUS_VERSION(end_height.saturating_sub(1)) {
190 Ok(version) => version,
191 Err(err) => {
192 let err = err.context("Failed to retrieve consensus version");
193 error!("{}", flatten_error(&err));
194 return false;
195 }
196 };
197
198 let blocks = match self.ledger.get_blocks(*start_height..*end_height) {
200 Ok(blocks) => DataBlocks(blocks),
201 Err(error) => {
202 let err =
203 error.context(format!("Failed to retrieve blocks {start_height} to {end_height} from the ledger"));
204 error!("{}", flatten_error(&err));
205 return false;
206 }
207 };
208
209 self.router()
211 .send(peer_ip, Message::BlockResponse(BlockResponse::new(message, blocks, latest_consensus_version)));
212 true
213 }
214
215 fn block_response(
217 &self,
218 peer_ip: SocketAddr,
219 blocks: Vec<Block<N>>,
220 latest_consensus_version: Option<ConsensusVersion>,
221 ) -> bool {
222 if let Err(err) = self.sync.insert_block_responses(peer_ip, blocks, latest_consensus_version) {
224 warn!("Failed to insert block response from '{peer_ip}' - {err}");
225
226 if matches!(
228 err,
229 InsertBlockResponseError::ConsensusVersionMismatch { .. }
230 | InsertBlockResponseError::NoConsensusVersion
231 ) {
232 self.router().ip_ban_peer(peer_ip, Some(&err.to_string()));
233 }
234
235 false
236 } else {
237 true
238 }
239 }
240
241 fn ping(&self, peer_ip: SocketAddr, message: Ping<N>) -> bool {
243 if let Some(block_locators) = message.block_locators {
245 if let Err(err) = self.sync.update_peer_locators(peer_ip, &block_locators) {
247 warn!("{}", flatten_error(err.context(format!("Peer '{peer_ip}' sent invalid block locators"))));
248 return false;
249 }
250
251 let last_peer_height = Some(block_locators.latest_locator_height());
252 self.router().update_connected_peer(&peer_ip, |peer| peer.last_height_seen = last_peer_height);
253 }
254
255 self.router().send(peer_ip, Message::Pong(Pong { is_fork: Some(false) }));
257 true
258 }
259
260 fn pong(&self, peer_ip: SocketAddr, _message: Pong) -> bool {
262 self.ping.on_pong_received(peer_ip);
263 true
264 }
265
266 fn puzzle_request(&self, peer_ip: SocketAddr) -> bool {
268 let epoch_hash = match self.ledger.latest_epoch_hash() {
270 Ok(epoch_hash) => epoch_hash,
271 Err(err) => {
272 let err = err.context(format!("Failed to prepare a puzzle request for '{peer_ip}'"));
273 error!("{}", flatten_error(err));
274 return false;
275 }
276 };
277 let block_header = Data::Object(self.ledger.latest_header());
279 self.router().send(peer_ip, Message::PuzzleResponse(PuzzleResponse { epoch_hash, block_header }));
281 true
282 }
283
284 fn puzzle_response(&self, peer_ip: SocketAddr, _epoch_hash: N::BlockHash, _header: Header<N>) -> bool {
286 debug!("Disconnecting '{peer_ip}' for the following reason - {}", DisconnectReason::ProtocolViolation);
287 false
288 }
289
290 async fn unconfirmed_solution(
292 &self,
293 peer_ip: SocketAddr,
294 serialized: UnconfirmedSolution<N>,
295 solution: Solution<N>,
296 ) -> bool {
297 let mut solution_queue = self.solution_queue.lock();
299 if !solution_queue.contains(&solution.id()) {
300 solution_queue.put(solution.id(), (peer_ip, serialized, solution));
301 }
302
303 true }
305
306 async fn unconfirmed_transaction(
308 &self,
309 peer_ip: SocketAddr,
310 serialized: UnconfirmedTransaction<N>,
311 transaction: Transaction<N>,
312 ) -> bool {
313 match &transaction {
315 Transaction::<N>::Fee(..) => (), Transaction::<N>::Deploy(..) => {
317 let mut deploy_queue = self.deploy_queue.lock();
318 if !deploy_queue.contains(&transaction.id()) {
319 deploy_queue.put(transaction.id(), (peer_ip, serialized, transaction));
320 }
321 }
322 Transaction::<N>::Execute(..) => {
323 let mut execute_queue = self.execute_queue.lock();
324 if !execute_queue.contains(&transaction.id()) {
325 execute_queue.put(transaction.id(), (peer_ip, serialized, transaction));
326 }
327 }
328 }
329
330 true }
332}