zebra/zebrad/src/components/inbound.rs

216 lines
8.6 KiB
Rust
Raw Normal View History

use std::{
future::Future,
pin::Pin,
sync::{Arc, Mutex},
task::{Context, Poll},
};
use futures::{
future::{FutureExt, TryFutureExt},
2020-11-24 14:06:30 -08:00
stream::{Stream, TryStreamExt},
};
use tokio::sync::oneshot;
use tower::{buffer::Buffer, util::BoxService, Service, ServiceExt};
use zebra_network as zn;
use zebra_state as zs;
2020-11-24 14:53:57 -08:00
use zebra_chain::block::{self, Block};
use zebra_consensus::chain::VerifyChainError;
use zebra_network::AddressBook;
2020-11-19 09:55:06 -08:00
mod downloads;
use downloads::Downloads;
type Outbound = Buffer<BoxService<zn::Request, zn::Response, zn::BoxError>, zn::Request>;
type State = Buffer<BoxService<zs::Request, zs::Response, zs::BoxError>, zs::Request>;
2020-11-24 14:53:57 -08:00
type Verifier = Buffer<BoxService<Arc<Block>, block::Hash, VerifyChainError>, Arc<Block>>;
pub type SetupData = (Outbound, Arc<Mutex<AddressBook>>);
/// Uses the node state to respond to inbound peer requests.
///
/// This service, wrapped in appropriate middleware, is passed to
/// `zebra_network::init` to respond to inbound peer requests.
///
/// The `Inbound` service is responsible for:
///
/// - supplying network data like peer addresses to other nodes;
/// - supplying chain data like blocks to other nodes;
/// - performing transaction diffusion;
/// - performing block diffusion.
///
/// Because the `Inbound` service is responsible for participating in the gossip
/// protocols used for transaction and block diffusion, there is a potential
/// overlap with the `ChainSync` component.
///
/// The division of responsibility is that the `ChainSync` component is
/// *internally driven*, periodically polling the network to check whether it is
/// behind the current tip, while the `Inbound` service is *externally driven*,
/// responding to block gossip by attempting to download and validate advertised
/// blocks.
pub struct Inbound {
// invariant: outbound, address_book are Some if network_setup is None
//
// why not use an enum for the inbound state? because it would mean
// match-wrapping the body of Service::call rather than just expect()ing
// some Options.
network_setup: Option<oneshot::Receiver<SetupData>>,
outbound: Option<Outbound>,
address_book: Option<Arc<Mutex<zn::AddressBook>>>,
state: State,
2020-11-19 09:55:06 -08:00
verifier: Verifier,
2020-11-24 14:50:02 -08:00
downloads: Option<Pin<Box<Downloads<Outbound, Verifier, State>>>>,
}
impl Inbound {
2020-11-19 09:55:06 -08:00
pub fn new(
network_setup: oneshot::Receiver<SetupData>,
state: State,
verifier: Verifier,
) -> Self {
Self {
network_setup: Some(network_setup),
outbound: None,
address_book: None,
state,
2020-11-19 09:55:06 -08:00
verifier,
downloads: None,
}
}
}
impl Service<zn::Request> for Inbound {
type Response = zn::Response;
type Error = zn::BoxError;
type Future =
Pin<Box<dyn Future<Output = Result<Self::Response, Self::Error>> + Send + 'static>>;
#[instrument(skip(self, cx))]
fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
// Check whether the network setup is finished, but don't wait for it to
// become ready before reporting readiness. We expect to get it "soon",
// and reporting unreadiness might cause unwanted load-shedding, since
// the load-shed middleware is unable to distinguish being unready due
// to load from being unready while waiting on setup.
if let Some(mut rx) = self.network_setup.take() {
use oneshot::error::TryRecvError;
match rx.try_recv() {
Ok((outbound, address_book)) => {
self.outbound = Some(outbound);
self.address_book = Some(address_book);
self.network_setup = None;
2020-11-24 14:50:02 -08:00
self.downloads = Some(Box::pin(Downloads::new(
2020-11-19 09:55:06 -08:00
self.outbound.clone().unwrap(),
self.verifier.clone(),
self.state.clone(),
2020-11-24 14:50:02 -08:00
)));
}
Err(TryRecvError::Empty) => {
self.network_setup = Some(rx);
}
Err(e @ TryRecvError::Closed) => {
// In this case, report that the service failed, and put the
// failed oneshot back so we'll fail again in case
// poll_ready is called after failure.
self.network_setup = Some(rx);
return Poll::Ready(Err(e.into()));
}
};
}
2020-11-19 09:55:06 -08:00
// Clean up completed download tasks
2020-11-24 13:21:11 -08:00
if let Some(downloads) = self.downloads.as_mut() {
2020-11-24 14:50:02 -08:00
while let Poll::Ready(Some(_)) = downloads.as_mut().poll_next(cx) {}
2020-11-24 13:21:11 -08:00
}
2020-11-19 09:55:06 -08:00
// Now report readiness based on readiness of the inner services, if they're available.
// XXX do we want to propagate backpressure from the network here?
match (
self.state.poll_ready(cx),
self.outbound
.as_mut()
.map(|svc| svc.poll_ready(cx))
.unwrap_or(Poll::Ready(Ok(()))),
) {
(Poll::Ready(Err(e)), _) | (_, Poll::Ready(Err(e))) => Poll::Ready(Err(e)),
(Poll::Pending, _) | (_, Poll::Pending) => Poll::Pending,
(Poll::Ready(Ok(())), Poll::Ready(Ok(()))) => Poll::Ready(Ok(())),
}
}
#[instrument(skip(self))]
fn call(&mut self, req: zn::Request) -> Self::Future {
match req {
zn::Request::Peers => match self.address_book.as_ref() {
Some(addrs) => {
// We could truncate the list to try to not reveal our entire
// peer set. But because we don't monitor repeated requests,
// this wouldn't actually achieve anything, because a crawler
// could just repeatedly query it.
let mut peers = addrs.lock().unwrap().sanitized();
const MAX_ADDR: usize = 1000; // bitcoin protocol constant
peers.truncate(MAX_ADDR);
async { Ok(zn::Response::Peers(peers)) }.boxed()
}
None => async { Err("not ready to serve addresses".into()) }.boxed(),
},
zn::Request::BlocksByHash(hashes) => {
let state = self.state.clone();
let requests = futures::stream::iter(
hashes
.into_iter()
.map(|hash| zs::Request::Block(hash.into())),
);
state
.call_all(requests)
.try_filter_map(|rsp| {
futures::future::ready(match rsp {
zs::Response::Block(Some(block)) => Ok(Some(block)),
// XXX: check how zcashd handles missing blocks?
zs::Response::Block(None) => Err("missing block".into()),
_ => unreachable!("wrong response from state"),
})
})
.try_collect::<Vec<_>>()
.map_ok(zn::Response::Blocks)
.boxed()
}
zn::Request::TransactionsByHash(_transactions) => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::FindBlocks { .. } => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::FindHeaders { .. } => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::PushTransaction(_transaction) => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::AdvertiseTransactions(_transactions) => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
2020-11-19 09:55:06 -08:00
zn::Request::AdvertiseBlock(hash) => {
2020-11-24 14:20:34 -08:00
if let Some(downloads) = self.downloads.as_mut() {
downloads.download_and_verify(hash);
2020-11-19 09:55:06 -08:00
}
2020-11-24 14:20:34 -08:00
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::MempoolTransactions => {
debug!("ignoring unimplemented request");
async { Ok(zn::Response::Nil) }.boxed()
}
zn::Request::Ping(_) => {
unreachable!("ping requests are handled internally");
}
}
}
}