mirror of
https://github.com/kaspanet/kaspad.git
synced 2025-03-30 15:08:33 +00:00

* Move existing address/bannedAddress functionality to a new addressStore object. * Implement TestAddressManager. * Implement serializeAddressKey and deserializeAddressKey. * Implement serializeNetAddress and deserializeNetAddress. * Store addresses and banned addresses to disk. * Implement restoreNotBannedAddresses. * Fix bannedDatabaseKey. * Implement restoreBannedAddresses. * Implement TestRestoreAddressManager. * Defer closing the database in TestRestoreAddressManager. * Defer closing the database in TestRestoreAddressManager. * Add a log. * Return errors where appropriate. Co-authored-by: Elichai Turkel <elichai.turkel@gmail.com>
250 lines
6.4 KiB
Go
250 lines
6.4 KiB
Go
package connmanager
|
|
|
|
import (
|
|
"github.com/kaspanet/kaspad/app/appmessage"
|
|
"github.com/pkg/errors"
|
|
"net"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
|
|
"github.com/kaspanet/kaspad/infrastructure/network/addressmanager"
|
|
|
|
"github.com/kaspanet/kaspad/infrastructure/network/netadapter"
|
|
|
|
"github.com/kaspanet/kaspad/infrastructure/config"
|
|
)
|
|
|
|
// connectionRequest represents a user request (either through CLI or RPC) to connect to a certain node
|
|
type connectionRequest struct {
|
|
address string
|
|
isPermanent bool
|
|
nextAttempt time.Time
|
|
retryDuration time.Duration
|
|
}
|
|
|
|
// ConnectionManager monitors that the current active connections satisfy the requirements of
|
|
// outgoing, requested and incoming connections
|
|
type ConnectionManager struct {
|
|
cfg *config.Config
|
|
netAdapter *netadapter.NetAdapter
|
|
addressManager *addressmanager.AddressManager
|
|
|
|
activeRequested map[string]*connectionRequest
|
|
pendingRequested map[string]*connectionRequest
|
|
activeOutgoing map[string]struct{}
|
|
targetOutgoing int
|
|
activeIncoming map[string]struct{}
|
|
maxIncoming int
|
|
|
|
stop uint32
|
|
connectionRequestsLock sync.RWMutex
|
|
|
|
resetLoopChan chan struct{}
|
|
loopTicker *time.Ticker
|
|
}
|
|
|
|
// New instantiates a new instance of a ConnectionManager
|
|
func New(cfg *config.Config, netAdapter *netadapter.NetAdapter, addressManager *addressmanager.AddressManager) (*ConnectionManager, error) {
|
|
c := &ConnectionManager{
|
|
cfg: cfg,
|
|
netAdapter: netAdapter,
|
|
addressManager: addressManager,
|
|
activeRequested: map[string]*connectionRequest{},
|
|
pendingRequested: map[string]*connectionRequest{},
|
|
activeOutgoing: map[string]struct{}{},
|
|
activeIncoming: map[string]struct{}{},
|
|
resetLoopChan: make(chan struct{}),
|
|
loopTicker: time.NewTicker(connectionsLoopInterval),
|
|
}
|
|
|
|
connectPeers := cfg.AddPeers
|
|
if len(cfg.ConnectPeers) > 0 {
|
|
connectPeers = cfg.ConnectPeers
|
|
}
|
|
|
|
c.maxIncoming = cfg.MaxInboundPeers
|
|
c.targetOutgoing = cfg.TargetOutboundPeers
|
|
|
|
for _, connectPeer := range connectPeers {
|
|
c.pendingRequested[connectPeer] = &connectionRequest{
|
|
address: connectPeer,
|
|
isPermanent: true,
|
|
}
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
// Start begins the operation of the ConnectionManager
|
|
func (c *ConnectionManager) Start() {
|
|
spawn("ConnectionManager.connectionsLoop", c.connectionsLoop)
|
|
}
|
|
|
|
// Stop halts the operation of the ConnectionManager
|
|
func (c *ConnectionManager) Stop() {
|
|
atomic.StoreUint32(&c.stop, 1)
|
|
|
|
for _, connection := range c.netAdapter.P2PConnections() {
|
|
connection.Disconnect()
|
|
}
|
|
|
|
c.loopTicker.Stop()
|
|
}
|
|
|
|
func (c *ConnectionManager) run() {
|
|
c.resetLoopChan <- struct{}{}
|
|
}
|
|
|
|
func (c *ConnectionManager) initiateConnection(address string) error {
|
|
log.Infof("Connecting to %s", address)
|
|
return c.netAdapter.P2PConnect(address)
|
|
}
|
|
|
|
const connectionsLoopInterval = 30 * time.Second
|
|
|
|
func (c *ConnectionManager) connectionsLoop() {
|
|
for atomic.LoadUint32(&c.stop) == 0 {
|
|
connections := c.netAdapter.P2PConnections()
|
|
|
|
// We convert the connections list to a set, so that connections can be found quickly
|
|
// Then we go over the set, classifying connection by category: requested, outgoing or incoming.
|
|
// Every step removes all matching connections so that once we get to checkIncomingConnections -
|
|
// the only connections left are the incoming ones
|
|
connSet := convertToSet(connections)
|
|
|
|
c.checkRequestedConnections(connSet)
|
|
|
|
c.checkOutgoingConnections(connSet)
|
|
|
|
c.checkIncomingConnections(connSet)
|
|
|
|
c.waitTillNextIteration()
|
|
}
|
|
}
|
|
|
|
// ConnectionCount returns the count of the connected connections
|
|
func (c *ConnectionManager) ConnectionCount() int {
|
|
return c.netAdapter.P2PConnectionCount()
|
|
}
|
|
|
|
// ErrCannotBanPermanent is the error returned when trying to ban a permanent peer.
|
|
var ErrCannotBanPermanent = errors.New("ErrCannotBanPermanent")
|
|
|
|
// Ban marks the given netConnection as banned
|
|
func (c *ConnectionManager) Ban(netConnection *netadapter.NetConnection) error {
|
|
if c.isPermanent(netConnection.Address()) {
|
|
return errors.Wrapf(ErrCannotBanPermanent, "Cannot ban %s because it's a permanent connection", netConnection.Address())
|
|
}
|
|
|
|
return c.addressManager.Ban(netConnection.NetAddress())
|
|
}
|
|
|
|
// BanByIP bans the given IP and disconnects from all the connection with that IP.
|
|
func (c *ConnectionManager) BanByIP(ip net.IP) error {
|
|
ipHasPermanentConnection, err := c.ipHasPermanentConnection(ip)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if ipHasPermanentConnection {
|
|
return errors.Wrapf(ErrCannotBanPermanent, "Cannot ban %s because it's a permanent connection", ip)
|
|
}
|
|
|
|
connections := c.netAdapter.P2PConnections()
|
|
for _, conn := range connections {
|
|
if conn.NetAddress().IP.Equal(ip) {
|
|
conn.Disconnect()
|
|
}
|
|
}
|
|
|
|
return c.addressManager.Ban(appmessage.NewNetAddressIPPort(ip, 0, 0))
|
|
}
|
|
|
|
// IsBanned returns whether the given netConnection is banned
|
|
func (c *ConnectionManager) IsBanned(netConnection *netadapter.NetConnection) (bool, error) {
|
|
if c.isPermanent(netConnection.Address()) {
|
|
return false, nil
|
|
}
|
|
|
|
return c.addressManager.IsBanned(netConnection.NetAddress())
|
|
}
|
|
|
|
func (c *ConnectionManager) waitTillNextIteration() {
|
|
select {
|
|
case <-c.resetLoopChan:
|
|
c.loopTicker.Reset(connectionsLoopInterval)
|
|
case <-c.loopTicker.C:
|
|
}
|
|
}
|
|
|
|
func (c *ConnectionManager) isPermanent(addressString string) bool {
|
|
c.connectionRequestsLock.RLock()
|
|
defer c.connectionRequestsLock.RUnlock()
|
|
|
|
if conn, ok := c.activeRequested[addressString]; ok {
|
|
return conn.isPermanent
|
|
}
|
|
|
|
if conn, ok := c.pendingRequested[addressString]; ok {
|
|
return conn.isPermanent
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (c *ConnectionManager) ipHasPermanentConnection(ip net.IP) (bool, error) {
|
|
c.connectionRequestsLock.RLock()
|
|
defer c.connectionRequestsLock.RUnlock()
|
|
|
|
for addr, conn := range c.activeRequested {
|
|
if !conn.isPermanent {
|
|
continue
|
|
}
|
|
|
|
ips, err := c.extractAddressIPs(addr)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
for _, extractedIP := range ips {
|
|
if extractedIP.Equal(ip) {
|
|
return true, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
for addr, conn := range c.pendingRequested {
|
|
if !conn.isPermanent {
|
|
continue
|
|
}
|
|
|
|
ips, err := c.extractAddressIPs(addr)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
for _, extractedIP := range ips {
|
|
if extractedIP.Equal(ip) {
|
|
return true, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
func (c *ConnectionManager) extractAddressIPs(address string) ([]net.IP, error) {
|
|
host, _, err := net.SplitHostPort(address)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
ip := net.ParseIP(host)
|
|
if ip == nil {
|
|
return c.cfg.Lookup(host)
|
|
}
|
|
|
|
return []net.IP{ip}, nil
|
|
}
|