mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-10 20:22:02 +00:00
* Port eth1 lib to use stable futures * Port eth1_test_rig to stable futures * Port eth1 tests to stable futures * Port genesis service to stable futures * Port genesis tests to stable futures * Port beacon_chain to stable futures * Port lcli to stable futures * Fix eth1_test_rig (#1014) * Fix lcli * Port timer to stable futures * Fix timer * Port websocket_server to stable futures * Port notifier to stable futures * Add TODOS * Update hashmap hashset to stable futures * Adds panic test to hashset delay * Port remote_beacon_node to stable futures * Fix lcli merge conflicts * Non rpc stuff compiles * protocol.rs compiles * Port websockets, timer and notifier to stable futures (#1035) * Fix lcli * Port timer to stable futures * Fix timer * Port websocket_server to stable futures * Port notifier to stable futures * Add TODOS * Port remote_beacon_node to stable futures * Partial eth2-libp2p stable future upgrade * Finished first round of fighting RPC types * Further progress towards porting eth2-libp2p adds caching to discovery * Update behaviour * RPC handler to stable futures * Update RPC to master libp2p * Network service additions * Fix the fallback transport construction (#1102) * Correct warning * Remove hashmap delay * Compiling version of eth2-libp2p * Update all crates versions * Fix conversion function and add tests (#1113) * Port validator_client to stable futures (#1114) * Add PH & MS slot clock changes * Account for genesis time * Add progress on duties refactor * Add simple is_aggregator bool to val subscription * Start work on attestation_verification.rs * Add progress on ObservedAttestations * Progress with ObservedAttestations * Fix tests * Add observed attestations to the beacon chain * Add attestation observation to processing code * Add progress on attestation verification * Add first draft of ObservedAttesters * Add more tests * Add observed attesters to beacon chain * Add observers to attestation processing * Add more attestation verification * Create ObservedAggregators map * Remove commented-out code * Add observed aggregators into chain * Add progress * Finish adding features to attestation verification * Ensure beacon chain compiles * Link attn verification into chain * Integrate new attn verification in chain * Remove old attestation processing code * Start trying to fix beacon_chain tests * Split adding into pools into two functions * Add aggregation to harness * Get test harness working again * Adjust the number of aggregators for test harness * Fix edge-case in harness * Integrate new attn processing in network * Fix compile bug in validator_client * Update validator API endpoints * Fix aggreagation in test harness * Fix enum thing * Fix attestation observation bug: * Patch failing API tests * Start adding comments to attestation verification * Remove unused attestation field * Unify "is block known" logic * Update comments * Supress fork choice errors for network processing * Add todos * Tidy * Add gossip attn tests * Disallow test harness to produce old attns * Comment out in-progress tests * Partially address pruning tests * Fix failing store test * Add aggregate tests * Add comments about which spec conditions we check * Dont re-aggregate * Split apart test harness attn production * Fix compile error in network * Make progress on commented-out test * Fix skipping attestation test * Add fork choice verification tests * Tidy attn tests, remove dead code * Remove some accidentally added code * Fix clippy lint * Rename test file * Add block tests, add cheap block proposer check * Rename block testing file * Add observed_block_producers * Tidy * Switch around block signature verification * Finish block testing * Remove gossip from signature tests * First pass of self review * Fix deviation in spec * Update test spec tags * Start moving over to hashset * Finish moving observed attesters to hashmap * Move aggregation pool over to hashmap * Make fc attn borrow again * Fix rest_api compile error * Fix missing comments * Fix monster test * Uncomment increasing slots test * Address remaining comments * Remove unsafe, use cfg test * Remove cfg test flag * Fix dodgy comment * Revert "Update hashmap hashset to stable futures" This reverts commitd432378a3c. * Revert "Adds panic test to hashset delay" This reverts commit281502396f. * Ported attestation_service * Ported duties_service * Ported fork_service * More ports * Port block_service * Minor fixes * VC compiles * Update TODOS * Borrow self where possible * Ignore aggregates that are already known. * Unify aggregator modulo logic * Fix typo in logs * Refactor validator subscription logic * Avoid reproducing selection proof * Skip HTTP call if no subscriptions * Rename DutyAndState -> DutyAndProof * Tidy logs * Print root as dbg * Fix compile errors in tests * Fix compile error in test * Re-Fix attestation and duties service * Minor fixes Co-authored-by: Paul Hauner <paul@paulhauner.com> * Network crate update to stable futures * Port account_manager to stable futures (#1121) * Port account_manager to stable futures * Run async fns in tokio environment * Port rest_api crate to stable futures (#1118) * Port rest_api lib to stable futures * Reduce tokio features * Update notifier to stable futures * Builder update * Further updates * Convert self referential async functions * stable futures fixes (#1124) * Fix eth1 update functions * Fix genesis and client * Fix beacon node lib * Return appropriate runtimes from environment * Fix test rig * Refactor eth1 service update * Upgrade simulator to stable futures * Lighthouse compiles on stable futures * Remove println debugging statement * Update libp2p service, start rpc test upgrade * Update network crate for new libp2p * Update tokio::codec to futures_codec (#1128) * Further work towards RPC corrections * Correct http timeout and network service select * Use tokio runtime for libp2p * Revert "Update tokio::codec to futures_codec (#1128)" This reverts commite57aea924a. * Upgrade RPC libp2p tests * Upgrade secio fallback test * Upgrade gossipsub examples * Clean up RPC protocol * Test fixes (#1133) * Correct websocket timeout and run on os thread * Fix network test * Clean up PR * Correct tokio tcp move attestation service tests * Upgrade attestation service tests * Correct network test * Correct genesis test * Test corrections * Log info when block is received * Modify logs and update attester service events * Stable futures: fixes to vc, eth1 and account manager (#1142) * Add local testnet scripts * Remove whiteblock script * Rename local testnet script * Move spawns onto handle * Fix VC panic * Initial fix to block production issue * Tidy block producer fix * Tidy further * Add local testnet clean script * Run cargo fmt * Tidy duties service * Tidy fork service * Tidy ForkService * Tidy AttestationService * Tidy notifier * Ensure await is not suppressed in eth1 * Ensure await is not suppressed in account_manager * Use .ok() instead of .unwrap_or(()) * RPC decoding test for proto * Update discv5 and eth2-libp2p deps * Fix lcli double runtime issue (#1144) * Handle stream termination and dialing peer errors * Correct peer_info variant types * Remove unnecessary warnings * Handle subnet unsubscription removal and improve logigng * Add logs around ping * Upgrade discv5 and improve logging * Handle peer connection status for multiple connections * Improve network service logging * Improve logging around peer manager * Upgrade swarm poll centralise peer management * Identify clients on error * Fix `remove_peer` in sync (#1150) * remove_peer removes from all chains * Remove logs * Fix early return from loop * Improved logging, fix panic * Partially correct tests * Stable futures: Vc sync (#1149) * Improve syncing heuristic * Add comments * Use safer method for tolerance * Fix tests * Stable futures: Fix VC bug, update agg pool, add more metrics (#1151) * Expose epoch processing summary * Expose participation metrics to prometheus * Switch to f64 * Reduce precision * Change precision * Expose observed attesters metrics * Add metrics for agg/unagg attn counts * Add metrics for gossip rx * Add metrics for gossip tx * Adds ignored attns to prom * Add attestation timing * Add timer for aggregation pool sig agg * Add write lock timer for agg pool * Add more metrics to agg pool * Change map lock code * Add extra metric to agg pool * Change lock handling in agg pool * Change .write() to .read() * Add another agg pool timer * Fix for is_aggregator * Fix pruning bug Co-authored-by: pawan <pawandhananjay@gmail.com> Co-authored-by: Paul Hauner <paul@paulhauner.com>
327 lines
13 KiB
Rust
327 lines
13 KiB
Rust
//! This module handles incoming network messages.
|
|
//!
|
|
//! It routes the messages to appropriate services, such as the Sync
|
|
//! and processes those that are
|
|
#![allow(clippy::unit_arg)]
|
|
|
|
pub mod processor;
|
|
|
|
use crate::error;
|
|
use crate::service::NetworkMessage;
|
|
use beacon_chain::{BeaconChain, BeaconChainTypes, BlockError};
|
|
use eth2_libp2p::{
|
|
rpc::{
|
|
RPCCodedResponse, RPCError, RPCRequest, RPCResponse, RPCResponseErrorCode, RequestId,
|
|
ResponseTermination,
|
|
},
|
|
MessageId, NetworkGlobals, PeerId, PubsubMessage, RPCEvent,
|
|
};
|
|
use futures::prelude::*;
|
|
use processor::Processor;
|
|
use slog::{debug, info, o, trace, warn};
|
|
use std::sync::Arc;
|
|
use tokio::sync::mpsc;
|
|
use types::EthSpec;
|
|
|
|
/// Handles messages received from the network and client and organises syncing. This
|
|
/// functionality of this struct is to validate an decode messages from the network before
|
|
/// passing them to the internal message processor. The message processor spawns a syncing thread
|
|
/// which manages which blocks need to be requested and processed.
|
|
pub struct Router<T: BeaconChainTypes> {
|
|
/// A channel to the network service to allow for gossip propagation.
|
|
network_send: mpsc::UnboundedSender<NetworkMessage<T::EthSpec>>,
|
|
/// Processes validated and decoded messages from the network. Has direct access to the
|
|
/// sync manager.
|
|
processor: Processor<T>,
|
|
/// The `Router` logger.
|
|
log: slog::Logger,
|
|
}
|
|
|
|
/// Types of messages the handler can receive.
|
|
#[derive(Debug)]
|
|
pub enum RouterMessage<T: EthSpec> {
|
|
/// We have initiated a connection to a new peer.
|
|
PeerDialed(PeerId),
|
|
/// Peer has disconnected,
|
|
PeerDisconnected(PeerId),
|
|
/// An RPC response/request has been received.
|
|
RPC(PeerId, RPCEvent<T>),
|
|
/// A gossip message has been received. The fields are: message id, the peer that sent us this
|
|
/// message and the message itself.
|
|
PubsubMessage(MessageId, PeerId, PubsubMessage<T>),
|
|
/// The peer manager has requested we re-status a peer.
|
|
StatusPeer(PeerId),
|
|
}
|
|
|
|
impl<T: BeaconChainTypes> Router<T> {
|
|
/// Initializes and runs the Router.
|
|
pub fn spawn(
|
|
beacon_chain: Arc<BeaconChain<T>>,
|
|
network_globals: Arc<NetworkGlobals<T::EthSpec>>,
|
|
network_send: mpsc::UnboundedSender<NetworkMessage<T::EthSpec>>,
|
|
runtime_handle: &tokio::runtime::Handle,
|
|
log: slog::Logger,
|
|
) -> error::Result<mpsc::UnboundedSender<RouterMessage<T::EthSpec>>> {
|
|
let message_handler_log = log.new(o!("service"=> "router"));
|
|
trace!(message_handler_log, "Service starting");
|
|
|
|
let (handler_send, handler_recv) = mpsc::unbounded_channel();
|
|
|
|
// Initialise a message instance, which itself spawns the syncing thread.
|
|
let processor = Processor::new(
|
|
runtime_handle,
|
|
beacon_chain,
|
|
network_globals,
|
|
network_send.clone(),
|
|
&log,
|
|
);
|
|
|
|
// generate the Message handler
|
|
let mut handler = Router {
|
|
network_send,
|
|
processor,
|
|
log: message_handler_log,
|
|
};
|
|
|
|
// spawn handler task and move the message handler instance into the spawned thread
|
|
runtime_handle.spawn(async move {
|
|
handler_recv
|
|
.for_each(move |msg| future::ready(handler.handle_message(msg)))
|
|
.await;
|
|
debug!(log, "Network message handler terminated.");
|
|
});
|
|
|
|
Ok(handler_send)
|
|
}
|
|
|
|
/// Handle all messages incoming from the network service.
|
|
fn handle_message(&mut self, message: RouterMessage<T::EthSpec>) {
|
|
match message {
|
|
// we have initiated a connection to a peer or the peer manager has requested a
|
|
// re-status
|
|
RouterMessage::PeerDialed(peer_id) | RouterMessage::StatusPeer(peer_id) => {
|
|
self.processor.send_status(peer_id);
|
|
}
|
|
// A peer has disconnected
|
|
RouterMessage::PeerDisconnected(peer_id) => {
|
|
self.processor.on_disconnect(peer_id);
|
|
}
|
|
// An RPC message request/response has been received
|
|
RouterMessage::RPC(peer_id, rpc_event) => {
|
|
self.handle_rpc_message(peer_id, rpc_event);
|
|
}
|
|
// An RPC message request/response has been received
|
|
RouterMessage::PubsubMessage(id, peer_id, gossip) => {
|
|
self.handle_gossip(id, peer_id, gossip);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* RPC - Related functionality */
|
|
|
|
/// Handle RPC messages
|
|
fn handle_rpc_message(&mut self, peer_id: PeerId, rpc_message: RPCEvent<T::EthSpec>) {
|
|
match rpc_message {
|
|
RPCEvent::Request(id, req) => self.handle_rpc_request(peer_id, id, req),
|
|
RPCEvent::Response(id, resp) => self.handle_rpc_response(peer_id, id, resp),
|
|
RPCEvent::Error(id, _protocol, error) => self.handle_rpc_error(peer_id, id, error),
|
|
}
|
|
}
|
|
|
|
/// A new RPC request has been received from the network.
|
|
fn handle_rpc_request(
|
|
&mut self,
|
|
peer_id: PeerId,
|
|
request_id: RequestId,
|
|
request: RPCRequest<T::EthSpec>,
|
|
) {
|
|
match request {
|
|
RPCRequest::Status(status_message) => {
|
|
self.processor
|
|
.on_status_request(peer_id, request_id, status_message)
|
|
}
|
|
RPCRequest::Goodbye(goodbye_reason) => {
|
|
debug!(
|
|
self.log, "PeerGoodbye";
|
|
"peer" => format!("{:?}", peer_id),
|
|
"reason" => format!("{:?}", goodbye_reason),
|
|
);
|
|
self.processor.on_disconnect(peer_id);
|
|
}
|
|
RPCRequest::BlocksByRange(request) => self
|
|
.processor
|
|
.on_blocks_by_range_request(peer_id, request_id, request),
|
|
RPCRequest::BlocksByRoot(request) => self
|
|
.processor
|
|
.on_blocks_by_root_request(peer_id, request_id, request),
|
|
RPCRequest::Ping(_) => unreachable!("Ping MUST be handled in the behaviour"),
|
|
RPCRequest::MetaData(_) => unreachable!("MetaData MUST be handled in the behaviour"),
|
|
}
|
|
}
|
|
|
|
/// An RPC response has been received from the network.
|
|
// we match on id and ignore responses past the timeout.
|
|
fn handle_rpc_response(
|
|
&mut self,
|
|
peer_id: PeerId,
|
|
request_id: RequestId,
|
|
error_response: RPCCodedResponse<T::EthSpec>,
|
|
) {
|
|
// an error could have occurred.
|
|
match error_response {
|
|
RPCCodedResponse::InvalidRequest(error) => {
|
|
warn!(self.log, "RPC Invalid Request"; "peer_id" => peer_id.to_string(), "request_id" => request_id, "error" => error.to_string());
|
|
self.handle_rpc_error(
|
|
peer_id,
|
|
request_id,
|
|
RPCError::ErrorResponse(RPCResponseErrorCode::InvalidRequest),
|
|
);
|
|
}
|
|
RPCCodedResponse::ServerError(error) => {
|
|
warn!(self.log, "RPC Server Error"; "peer_id" => peer_id.to_string(), "request_id" => request_id, "error" => error.to_string());
|
|
self.handle_rpc_error(
|
|
peer_id,
|
|
request_id,
|
|
RPCError::ErrorResponse(RPCResponseErrorCode::ServerError),
|
|
);
|
|
}
|
|
RPCCodedResponse::Unknown(error) => {
|
|
warn!(self.log, "RPC Unknown Error"; "peer_id" => peer_id.to_string(), "request_id" => request_id, "error" => error.to_string());
|
|
self.handle_rpc_error(
|
|
peer_id,
|
|
request_id,
|
|
RPCError::ErrorResponse(RPCResponseErrorCode::Unknown),
|
|
);
|
|
}
|
|
RPCCodedResponse::Success(response) => match response {
|
|
RPCResponse::Status(status_message) => {
|
|
self.processor.on_status_response(peer_id, status_message);
|
|
}
|
|
RPCResponse::BlocksByRange(beacon_block) => {
|
|
self.processor.on_blocks_by_range_response(
|
|
peer_id,
|
|
request_id,
|
|
Some(beacon_block),
|
|
);
|
|
}
|
|
RPCResponse::BlocksByRoot(beacon_block) => {
|
|
self.processor.on_blocks_by_root_response(
|
|
peer_id,
|
|
request_id,
|
|
Some(beacon_block),
|
|
);
|
|
}
|
|
RPCResponse::Pong(_) => {
|
|
unreachable!("Ping must be handled in the behaviour");
|
|
}
|
|
RPCResponse::MetaData(_) => {
|
|
unreachable!("Meta data must be handled in the behaviour");
|
|
}
|
|
},
|
|
RPCCodedResponse::StreamTermination(response_type) => {
|
|
// have received a stream termination, notify the processing functions
|
|
match response_type {
|
|
ResponseTermination::BlocksByRange => {
|
|
self.processor
|
|
.on_blocks_by_range_response(peer_id, request_id, None);
|
|
}
|
|
ResponseTermination::BlocksByRoot => {
|
|
self.processor
|
|
.on_blocks_by_root_response(peer_id, request_id, None);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Handle various RPC errors
|
|
fn handle_rpc_error(&mut self, peer_id: PeerId, request_id: RequestId, error: RPCError) {
|
|
warn!(self.log, "RPC Error"; "Peer" => format!("{:?}", peer_id), "request_id" => format!("{}", request_id), "Error" => format!("{:?}", error));
|
|
self.processor.on_rpc_error(peer_id, request_id);
|
|
}
|
|
|
|
/// Handle RPC messages
|
|
fn handle_gossip(
|
|
&mut self,
|
|
id: MessageId,
|
|
peer_id: PeerId,
|
|
gossip_message: PubsubMessage<T::EthSpec>,
|
|
) {
|
|
match gossip_message {
|
|
// Attestations should never reach the router.
|
|
PubsubMessage::AggregateAndProofAttestation(aggregate_and_proof) => {
|
|
if let Some(gossip_verified) =
|
|
self.processor.verify_aggregated_attestation_for_gossip(
|
|
peer_id.clone(),
|
|
*aggregate_and_proof.clone(),
|
|
)
|
|
{
|
|
self.propagate_message(id, peer_id.clone());
|
|
self.processor
|
|
.import_aggregated_attestation(peer_id, gossip_verified);
|
|
}
|
|
}
|
|
PubsubMessage::Attestation(subnet_attestation) => {
|
|
if let Some(gossip_verified) =
|
|
self.processor.verify_unaggregated_attestation_for_gossip(
|
|
peer_id.clone(),
|
|
subnet_attestation.1.clone(),
|
|
)
|
|
{
|
|
self.propagate_message(id, peer_id.clone());
|
|
self.processor
|
|
.import_unaggregated_attestation(peer_id, gossip_verified);
|
|
}
|
|
}
|
|
PubsubMessage::BeaconBlock(block) => {
|
|
match self.processor.should_forward_block(&peer_id, block) {
|
|
Ok(verified_block) => {
|
|
info!(self.log, "New block received"; "slot" => verified_block.block.slot(), "hash" => verified_block.block_root.to_string());
|
|
self.propagate_message(id, peer_id.clone());
|
|
self.processor.on_block_gossip(peer_id, verified_block);
|
|
}
|
|
Err(BlockError::ParentUnknown { .. }) => {} // performing a parent lookup
|
|
Err(e) => {
|
|
// performing a parent lookup
|
|
warn!(self.log, "Could not verify block for gossip";
|
|
"error" => format!("{:?}", e));
|
|
}
|
|
}
|
|
}
|
|
PubsubMessage::VoluntaryExit(_exit) => {
|
|
// TODO: Apply more sophisticated validation
|
|
self.propagate_message(id, peer_id.clone());
|
|
// TODO: Handle exits
|
|
debug!(self.log, "Received a voluntary exit"; "peer_id" => format!("{}", peer_id) );
|
|
}
|
|
PubsubMessage::ProposerSlashing(_proposer_slashing) => {
|
|
// TODO: Apply more sophisticated validation
|
|
self.propagate_message(id, peer_id.clone());
|
|
// TODO: Handle proposer slashings
|
|
debug!(self.log, "Received a proposer slashing"; "peer_id" => format!("{}", peer_id) );
|
|
}
|
|
PubsubMessage::AttesterSlashing(_attester_slashing) => {
|
|
// TODO: Apply more sophisticated validation
|
|
self.propagate_message(id, peer_id.clone());
|
|
// TODO: Handle attester slashings
|
|
debug!(self.log, "Received an attester slashing"; "peer_id" => format!("{}", peer_id) );
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Informs the network service that the message should be forwarded to other peers.
|
|
fn propagate_message(&mut self, message_id: MessageId, propagation_source: PeerId) {
|
|
self.network_send
|
|
.send(NetworkMessage::Propagate {
|
|
propagation_source,
|
|
message_id,
|
|
})
|
|
.unwrap_or_else(|_| {
|
|
warn!(
|
|
self.log,
|
|
"Could not send propagation request to the network service"
|
|
)
|
|
});
|
|
}
|
|
}
|