2024-01-13 00:07:35 +00:00
|
|
|
use std::{
|
2024-05-02 22:58:22 +00:00
|
|
|
fmt::{Debug, Display, Formatter},
|
|
|
|
sync::Arc,
|
|
|
|
task::{ready, Context, Poll},
|
2024-01-13 00:07:35 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
use futures::channel::oneshot;
|
2024-05-02 22:58:22 +00:00
|
|
|
use tokio::{
|
|
|
|
sync::{mpsc, OwnedSemaphorePermit, Semaphore},
|
|
|
|
task::JoinHandle,
|
|
|
|
};
|
|
|
|
use tokio_util::sync::PollSemaphore;
|
2024-06-22 00:29:40 +00:00
|
|
|
use tower::{Service, ServiceExt};
|
|
|
|
use tracing::Instrument;
|
2024-01-13 00:07:35 +00:00
|
|
|
|
2024-01-22 01:56:34 +00:00
|
|
|
use cuprate_helper::asynch::InfallibleOneshotReceiver;
|
2024-06-24 01:30:47 +00:00
|
|
|
use cuprate_pruning::PruningSeed;
|
2024-01-13 00:07:35 +00:00
|
|
|
|
|
|
|
use crate::{
|
2024-06-22 00:29:40 +00:00
|
|
|
handles::{ConnectionGuard, ConnectionHandle},
|
|
|
|
ConnectionDirection, NetworkZone, PeerError, PeerRequest, PeerResponse, SharedError,
|
2024-01-13 00:07:35 +00:00
|
|
|
};
|
|
|
|
|
2023-12-08 15:03:01 +00:00
|
|
|
mod connection;
|
2024-02-15 16:03:04 +00:00
|
|
|
mod connector;
|
2023-12-08 15:03:01 +00:00
|
|
|
pub mod handshaker;
|
2024-07-04 20:05:22 +00:00
|
|
|
mod request_handler;
|
2024-05-02 22:58:22 +00:00
|
|
|
mod timeout_monitor;
|
2023-12-08 15:03:01 +00:00
|
|
|
|
2024-02-15 16:03:04 +00:00
|
|
|
pub use connector::{ConnectRequest, Connector};
|
2024-07-04 20:05:22 +00:00
|
|
|
pub use handshaker::{DoHandshakeRequest, HandshakeError, HandshakerBuilder};
|
2023-12-08 15:03:01 +00:00
|
|
|
|
|
|
|
/// An internal identifier for a given peer, will be their address if known
|
2024-06-04 17:19:25 +00:00
|
|
|
/// or a random u128 if not.
|
2023-12-08 15:03:01 +00:00
|
|
|
#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)]
|
|
|
|
pub enum InternalPeerID<A> {
|
2024-05-02 22:58:22 +00:00
|
|
|
/// A known address.
|
2023-12-08 15:03:01 +00:00
|
|
|
KnownAddr(A),
|
2024-05-02 22:58:22 +00:00
|
|
|
/// An unknown address (probably an inbound anonymity network connection).
|
2024-06-04 17:19:25 +00:00
|
|
|
Unknown(u128),
|
2023-12-08 15:03:01 +00:00
|
|
|
}
|
2024-01-13 00:07:35 +00:00
|
|
|
|
|
|
|
impl<A: Display> Display for InternalPeerID<A> {
|
|
|
|
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
|
|
|
|
match self {
|
|
|
|
InternalPeerID::KnownAddr(addr) => addr.fmt(f),
|
2024-05-02 22:58:22 +00:00
|
|
|
InternalPeerID::Unknown(id) => f.write_str(&format!("Unknown, ID: {id}")),
|
2024-01-13 00:07:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
/// Information on a connected peer.
|
|
|
|
#[derive(Debug, Clone)]
|
|
|
|
pub struct PeerInformation<A> {
|
|
|
|
/// The internal peer ID of this peer.
|
|
|
|
pub id: InternalPeerID<A>,
|
|
|
|
/// The [`ConnectionHandle`] for this peer, allows banning this peer and checking if it is still
|
|
|
|
/// alive.
|
|
|
|
pub handle: ConnectionHandle,
|
|
|
|
/// The direction of this connection (inbound|outbound).
|
|
|
|
pub direction: ConnectionDirection,
|
|
|
|
/// The peers pruning seed.
|
|
|
|
pub pruning_seed: PruningSeed,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This represents a connection to a peer.
|
|
|
|
///
|
|
|
|
/// It allows sending requests to the peer, but does only does minimal checks that the data returned
|
|
|
|
/// is the data asked for, i.e. for a certain request the only thing checked will be that the response
|
|
|
|
/// is the correct response for that request, not that the response contains the correct data.
|
2024-01-13 00:07:35 +00:00
|
|
|
pub struct Client<Z: NetworkZone> {
|
2024-05-02 22:58:22 +00:00
|
|
|
/// Information on the connected peer.
|
|
|
|
pub info: PeerInformation<Z::Addr>,
|
2024-01-13 00:07:35 +00:00
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
/// The channel to the [`Connection`](connection::Connection) task.
|
|
|
|
connection_tx: mpsc::Sender<connection::ConnectionTaskRequest>,
|
|
|
|
/// The [`JoinHandle`] of the spawned connection task.
|
2024-01-13 00:07:35 +00:00
|
|
|
connection_handle: JoinHandle<()>,
|
2024-05-02 22:58:22 +00:00
|
|
|
/// The [`JoinHandle`] of the spawned timeout monitor task.
|
|
|
|
timeout_handle: JoinHandle<Result<(), tower::BoxError>>,
|
2024-01-13 00:07:35 +00:00
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
/// The semaphore that limits the requests sent to the peer.
|
|
|
|
semaphore: PollSemaphore,
|
|
|
|
/// A permit for the semaphore, will be [`Some`] after `poll_ready` returns ready.
|
|
|
|
permit: Option<OwnedSemaphorePermit>,
|
|
|
|
|
|
|
|
/// The error slot shared between the [`Client`] and [`Connection`](connection::Connection).
|
2024-01-13 00:07:35 +00:00
|
|
|
error: SharedError<PeerError>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<Z: NetworkZone> Client<Z> {
|
2024-05-02 22:58:22 +00:00
|
|
|
/// Creates a new [`Client`].
|
|
|
|
pub(crate) fn new(
|
|
|
|
info: PeerInformation<Z::Addr>,
|
2024-01-13 00:07:35 +00:00
|
|
|
connection_tx: mpsc::Sender<connection::ConnectionTaskRequest>,
|
|
|
|
connection_handle: JoinHandle<()>,
|
2024-05-02 22:58:22 +00:00
|
|
|
timeout_handle: JoinHandle<Result<(), tower::BoxError>>,
|
|
|
|
semaphore: Arc<Semaphore>,
|
2024-01-13 00:07:35 +00:00
|
|
|
error: SharedError<PeerError>,
|
|
|
|
) -> Self {
|
|
|
|
Self {
|
2024-05-02 22:58:22 +00:00
|
|
|
info,
|
|
|
|
connection_tx,
|
|
|
|
timeout_handle,
|
|
|
|
semaphore: PollSemaphore::new(semaphore),
|
|
|
|
permit: None,
|
2024-01-13 00:07:35 +00:00
|
|
|
connection_handle,
|
|
|
|
error,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
/// Internal function to set an error on the [`SharedError`].
|
2024-01-13 00:07:35 +00:00
|
|
|
fn set_err(&self, err: PeerError) -> tower::BoxError {
|
|
|
|
let err_str = err.to_string();
|
|
|
|
match self.error.try_insert_err(err) {
|
|
|
|
Ok(_) => err_str,
|
|
|
|
Err(e) => e.to_string(),
|
|
|
|
}
|
|
|
|
.into()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<Z: NetworkZone> Service<PeerRequest> for Client<Z> {
|
|
|
|
type Response = PeerResponse;
|
|
|
|
type Error = tower::BoxError;
|
|
|
|
type Future = InfallibleOneshotReceiver<Result<Self::Response, Self::Error>>;
|
|
|
|
|
|
|
|
fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
|
|
|
|
if let Some(err) = self.error.try_get_err() {
|
|
|
|
return Poll::Ready(Err(err.to_string().into()));
|
|
|
|
}
|
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
if self.connection_handle.is_finished() || self.timeout_handle.is_finished() {
|
2024-01-13 00:07:35 +00:00
|
|
|
let err = self.set_err(PeerError::ClientChannelClosed);
|
|
|
|
return Poll::Ready(Err(err));
|
|
|
|
}
|
|
|
|
|
2024-05-02 22:58:22 +00:00
|
|
|
if self.permit.is_some() {
|
|
|
|
return Poll::Ready(Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
let permit = ready!(self.semaphore.poll_acquire(cx))
|
|
|
|
.expect("Client semaphore should not be closed!");
|
|
|
|
|
|
|
|
self.permit = Some(permit);
|
|
|
|
|
|
|
|
Poll::Ready(Ok(()))
|
2024-01-13 00:07:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn call(&mut self, request: PeerRequest) -> Self::Future {
|
2024-05-02 22:58:22 +00:00
|
|
|
let permit = self
|
|
|
|
.permit
|
|
|
|
.take()
|
|
|
|
.expect("poll_ready did not return ready before call to call");
|
|
|
|
|
2024-01-13 00:07:35 +00:00
|
|
|
let (tx, rx) = oneshot::channel();
|
|
|
|
let req = connection::ConnectionTaskRequest {
|
|
|
|
response_channel: tx,
|
|
|
|
request,
|
2024-05-02 22:58:22 +00:00
|
|
|
permit: Some(permit),
|
2024-01-13 00:07:35 +00:00
|
|
|
};
|
|
|
|
|
2024-06-22 00:29:40 +00:00
|
|
|
if let Err(e) = self.connection_tx.try_send(req) {
|
|
|
|
// The connection task could have closed between a call to `poll_ready` and the call to
|
|
|
|
// `call`, which means if we don't handle the error here the receiver would panic.
|
|
|
|
use mpsc::error::TrySendError;
|
|
|
|
|
|
|
|
match e {
|
|
|
|
TrySendError::Closed(req) | TrySendError::Full(req) => {
|
|
|
|
self.set_err(PeerError::ClientChannelClosed);
|
|
|
|
|
|
|
|
let _ = req
|
|
|
|
.response_channel
|
|
|
|
.send(Err(PeerError::ClientChannelClosed.into()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2024-01-13 00:07:35 +00:00
|
|
|
|
|
|
|
rx.into()
|
|
|
|
}
|
|
|
|
}
|
2024-06-22 00:29:40 +00:00
|
|
|
|
|
|
|
/// Creates a mock [`Client`] for testing purposes.
|
|
|
|
///
|
|
|
|
/// `request_handler` will be used to handle requests sent to the [`Client`]
|
|
|
|
pub fn mock_client<Z: NetworkZone, S>(
|
|
|
|
info: PeerInformation<Z::Addr>,
|
|
|
|
connection_guard: ConnectionGuard,
|
|
|
|
mut request_handler: S,
|
|
|
|
) -> Client<Z>
|
|
|
|
where
|
2024-07-04 20:05:22 +00:00
|
|
|
S: Service<PeerRequest, Response = PeerResponse, Error = tower::BoxError> + Send + 'static,
|
|
|
|
S::Future: Send + 'static,
|
2024-06-22 00:29:40 +00:00
|
|
|
{
|
|
|
|
let (tx, mut rx) = mpsc::channel(1);
|
|
|
|
|
|
|
|
let task_span = tracing::error_span!("mock_connection", addr = %info.id);
|
|
|
|
|
|
|
|
let task_handle = tokio::spawn(
|
|
|
|
async move {
|
|
|
|
let _guard = connection_guard;
|
|
|
|
loop {
|
|
|
|
let Some(req): Option<connection::ConnectionTaskRequest> = rx.recv().await else {
|
|
|
|
tracing::debug!("Channel closed, closing mock connection");
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
|
|
|
tracing::debug!("Received new request: {:?}", req.request.id());
|
|
|
|
let res = request_handler
|
|
|
|
.ready()
|
|
|
|
.await
|
|
|
|
.unwrap()
|
|
|
|
.call(req.request)
|
|
|
|
.await
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
tracing::debug!("Sending back response");
|
|
|
|
|
|
|
|
let _ = req.response_channel.send(Ok(res));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
.instrument(task_span),
|
|
|
|
);
|
|
|
|
|
|
|
|
let timeout_task = tokio::spawn(futures::future::pending());
|
|
|
|
let semaphore = Arc::new(Semaphore::new(1));
|
|
|
|
let error_slot = SharedError::new();
|
|
|
|
|
|
|
|
Client::new(info, tx, task_handle, timeout_task, semaphore, error_slot)
|
|
|
|
}
|