mirror of
https://github.com/kaspanet/kaspad.git
synced 2025-03-30 15:08:33 +00:00

* [NOD-1313] Refactor AddressManager (#918) * [NOD-1313] Refactor AddressManager. * [NOD-1313]Remove old tests.Minor improvements,fixes. * [NOD-1313] After merge fixes. Fix import cycle. * [NOD-1313] Integration tests fixes. * [NOD-1313] Allocate new slice for the returned key. * [NOD-1313] AddressManager improvements and fixes. * Move local and banned addresses to separate lists. * Move AddressManager config to the separate file. * Add LocalAddressManager. * Remove redundant KnownAddress structure. * Restore local addresses functionality. * Call initListeners from the LocalAddressManager. * AddressManager minor improvements and fixes. * [NOD-1313] Minor fixes. * [NOD-1313] Implement HandleGetPeerAddresses. Refactoring. * [NOD-1313] After-merge fixes. * [NOD-1313] Minor improvements. * AddressManager: added BannedAddresses() method. * AddressManager: HandleGetPeerAddresses() add banned addresses separately. * AddressManager: remove addressEntry redundant struct. * ConnectionManager: checkOutgoingConnections() minor improvements and fixes. * Minor refactoring. * Minor fixes. * [NOD-1313] GetPeerAddresses RPC message update * GetPeerAddresses RPC: add BannedAddresses in the separate field. * Update protobuf. * [NOD-1534] Update messages.pb.go Co-authored-by: Kirill <gammerxpower@gmail.com>
119 lines
3.4 KiB
Go
119 lines
3.4 KiB
Go
package handshake
|
|
|
|
import (
|
|
"sync"
|
|
"sync/atomic"
|
|
|
|
"github.com/kaspanet/kaspad/domain"
|
|
|
|
"github.com/kaspanet/kaspad/app/protocol/common"
|
|
"github.com/kaspanet/kaspad/app/protocol/protocolerrors"
|
|
"github.com/kaspanet/kaspad/infrastructure/network/addressmanager"
|
|
|
|
"github.com/kaspanet/kaspad/infrastructure/config"
|
|
"github.com/kaspanet/kaspad/infrastructure/network/netadapter"
|
|
|
|
"github.com/kaspanet/kaspad/app/appmessage"
|
|
peerpkg "github.com/kaspanet/kaspad/app/protocol/peer"
|
|
routerpkg "github.com/kaspanet/kaspad/infrastructure/network/netadapter/router"
|
|
"github.com/kaspanet/kaspad/util/locks"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// HandleHandshakeContext is the interface for the context needed for the HandleHandshake flow.
|
|
type HandleHandshakeContext interface {
|
|
Config() *config.Config
|
|
NetAdapter() *netadapter.NetAdapter
|
|
Domain() domain.Domain
|
|
AddressManager() *addressmanager.AddressManager
|
|
StartIBDIfRequired() error
|
|
AddToPeers(peer *peerpkg.Peer) error
|
|
HandleError(err error, flowName string, isStopping *uint32, errChan chan<- error)
|
|
}
|
|
|
|
// HandleHandshake sets up the handshake protocol - It sends a version message and waits for an incoming
|
|
// version message, as well as a verack for the sent version
|
|
func HandleHandshake(context HandleHandshakeContext, netConnection *netadapter.NetConnection,
|
|
receiveVersionRoute *routerpkg.Route, sendVersionRoute *routerpkg.Route, outgoingRoute *routerpkg.Route,
|
|
) (*peerpkg.Peer, error) {
|
|
|
|
// For HandleHandshake to finish, we need to get from the other node
|
|
// a version and verack messages, so we increase the wait group by 2
|
|
// and block HandleHandshake with wg.Wait().
|
|
wg := sync.WaitGroup{}
|
|
wg.Add(2)
|
|
|
|
isStopping := uint32(0)
|
|
errChan := make(chan error)
|
|
|
|
peer := peerpkg.New(netConnection)
|
|
|
|
var peerAddress *appmessage.NetAddress
|
|
spawn("HandleHandshake-ReceiveVersion", func() {
|
|
address, err := ReceiveVersion(context, receiveVersionRoute, outgoingRoute, peer)
|
|
if err != nil {
|
|
handleError(err, "ReceiveVersion", &isStopping, errChan)
|
|
return
|
|
}
|
|
peerAddress = address
|
|
wg.Done()
|
|
})
|
|
|
|
spawn("HandleHandshake-SendVersion", func() {
|
|
err := SendVersion(context, sendVersionRoute, outgoingRoute, peer)
|
|
if err != nil {
|
|
handleError(err, "SendVersion", &isStopping, errChan)
|
|
return
|
|
}
|
|
wg.Done()
|
|
})
|
|
|
|
select {
|
|
case err := <-errChan:
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return nil, nil
|
|
case <-locks.ReceiveFromChanWhenDone(func() { wg.Wait() }):
|
|
}
|
|
|
|
err := context.AddToPeers(peer)
|
|
if err != nil {
|
|
if errors.As(err, &common.ErrPeerWithSameIDExists) {
|
|
return nil, protocolerrors.Wrap(false, err, "peer already exists")
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
if peerAddress != nil {
|
|
context.AddressManager().AddAddresses(peerAddress)
|
|
}
|
|
|
|
err = context.StartIBDIfRequired()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return peer, nil
|
|
}
|
|
|
|
// Handshake is different from other flows, since in it should forward router.ErrRouteClosed to errChan
|
|
// Therefore we implement a separate handleError for handshake
|
|
func handleError(err error, flowName string, isStopping *uint32, errChan chan error) {
|
|
if errors.Is(err, routerpkg.ErrRouteClosed) {
|
|
if atomic.AddUint32(isStopping, 1) == 1 {
|
|
errChan <- err
|
|
}
|
|
return
|
|
}
|
|
|
|
if protocolErr := &(protocolerrors.ProtocolError{}); errors.As(err, &protocolErr) {
|
|
log.Errorf("Handshake protocol error from %s: %s", flowName, err)
|
|
if atomic.AddUint32(isStopping, 1) == 1 {
|
|
errChan <- err
|
|
}
|
|
return
|
|
}
|
|
panic(err)
|
|
}
|