10 log "github.com/sirupsen/logrus"
11 "github.com/tendermint/go-crypto"
12 cmn "github.com/tendermint/tmlibs/common"
13 dbm "github.com/tendermint/tmlibs/db"
15 cfg "github.com/bytom/config"
16 "github.com/bytom/errors"
17 "github.com/bytom/p2p/connection"
18 "github.com/bytom/p2p/discover"
19 "github.com/bytom/p2p/trust"
23 bannedPeerKey = "BannedPeer"
24 defaultBanDuration = time.Hour * 1
25 minNumOutboundPeers = 5
28 //pre-define errors for connecting fail
30 ErrDuplicatePeer = errors.New("Duplicate peer")
31 ErrConnectSelf = errors.New("Connect self")
32 ErrConnectBannedPeer = errors.New("Connect banned peer")
35 // Switch handles peer connections and exposes an API to receive incoming messages
36 // on `Reactors`. Each `Reactor` is responsible for handling incoming messages of one
37 // or more `Channels`. So while sending outgoing messages is typically performed on the peer,
38 // incoming messages are received on the reactor.
43 peerConfig *PeerConfig
45 reactors map[string]Reactor
46 chDescs []*connection.ChannelDescriptor
47 reactorsByCh map[byte]Reactor
50 nodeInfo *NodeInfo // our node info
51 nodePrivKey crypto.PrivKeyEd25519 // our node privkey
52 discv *discover.Network
53 bannedPeer map[string]time.Time
58 // NewSwitch creates a new Switch with the given config.
59 func NewSwitch(config *cfg.Config) *Switch {
62 peerConfig: DefaultPeerConfig(config.P2P),
63 reactors: make(map[string]Reactor),
64 chDescs: make([]*connection.ChannelDescriptor, 0),
65 reactorsByCh: make(map[byte]Reactor),
67 dialing: cmn.NewCMap(),
69 db: dbm.NewDB("trusthistory", config.DBBackend, config.DBDir()),
71 sw.BaseService = *cmn.NewBaseService(nil, "P2P Switch", sw)
72 sw.bannedPeer = make(map[string]time.Time)
73 if datajson := sw.db.Get([]byte(bannedPeerKey)); datajson != nil {
74 if err := json.Unmarshal(datajson, &sw.bannedPeer); err != nil {
82 // OnStart implements BaseService. It starts all the reactors, peers, and listeners.
83 func (sw *Switch) OnStart() error {
84 for _, reactor := range sw.reactors {
85 if _, err := reactor.Start(); err != nil {
89 for _, listener := range sw.listeners {
90 go sw.listenerRoutine(listener)
92 go sw.ensureOutboundPeersRoutine()
96 // OnStop implements BaseService. It stops all listeners, peers, and reactors.
97 func (sw *Switch) OnStop() {
98 for _, listener := range sw.listeners {
103 for _, peer := range sw.peers.List() {
105 sw.peers.Remove(peer)
108 for _, reactor := range sw.reactors {
113 //AddBannedPeer add peer to blacklist
114 func (sw *Switch) AddBannedPeer(ip string) error {
116 defer sw.mtx.Unlock()
118 sw.bannedPeer[ip] = time.Now().Add(defaultBanDuration)
119 datajson, err := json.Marshal(sw.bannedPeer)
124 sw.db.Set([]byte(bannedPeerKey), datajson)
128 // AddPeer performs the P2P handshake with a peer
129 // that already has a SecretConnection. If all goes well,
130 // it starts the peer and adds it to the switch.
131 // NOTE: This performs a blocking handshake before the peer is added.
132 // CONTRACT: If error is returned, peer is nil, and conn is immediately closed.
133 func (sw *Switch) AddPeer(pc *peerConn) error {
134 peerNodeInfo, err := pc.HandshakeTimeout(sw.nodeInfo, time.Duration(sw.peerConfig.HandshakeTimeout*time.Second))
139 if err := sw.nodeInfo.CompatibleWith(peerNodeInfo); err != nil {
143 peer := newPeer(pc, peerNodeInfo, sw.reactorsByCh, sw.chDescs, sw.StopPeerForError)
144 if err := sw.filterConnByPeer(peer); err != nil {
150 if err := sw.startInitPeer(peer); err != nil {
154 return sw.peers.Add(peer)
157 // AddReactor adds the given reactor to the switch.
158 // NOTE: Not goroutine safe.
159 func (sw *Switch) AddReactor(name string, reactor Reactor) Reactor {
160 // Validate the reactor.
161 // No two reactors can share the same channel.
162 for _, chDesc := range reactor.GetChannels() {
164 if sw.reactorsByCh[chID] != nil {
165 cmn.PanicSanity(fmt.Sprintf("Channel %X has multiple reactors %v & %v", chID, sw.reactorsByCh[chID], reactor))
167 sw.chDescs = append(sw.chDescs, chDesc)
168 sw.reactorsByCh[chID] = reactor
170 sw.reactors[name] = reactor
171 reactor.SetSwitch(sw)
175 // AddListener adds the given listener to the switch for listening to incoming peer connections.
176 // NOTE: Not goroutine safe.
177 func (sw *Switch) AddListener(l Listener) {
178 sw.listeners = append(sw.listeners, l)
181 //DialPeerWithAddress dial node from net address
182 func (sw *Switch) DialPeerWithAddress(addr *NetAddress) error {
183 log.Debug("Dialing peer address:", addr)
184 sw.dialing.Set(addr.IP.String(), addr)
185 defer sw.dialing.Delete(addr.IP.String())
186 if err := sw.filterConnByIP(addr.IP.String()); err != nil {
190 pc, err := newOutboundPeerConn(addr, sw.nodePrivKey, sw.peerConfig)
192 log.WithFields(log.Fields{"address": addr, " err": err}).Debug("DialPeer fail on newOutboundPeerConn")
196 if err = sw.AddPeer(pc); err != nil {
197 log.WithFields(log.Fields{"address": addr, " err": err}).Debug("DialPeer fail on switch AddPeer")
201 log.Debug("DialPeer added peer:", addr)
205 //IsDialing prevent duplicate dialing
206 func (sw *Switch) IsDialing(addr *NetAddress) bool {
207 return sw.dialing.Has(addr.IP.String())
210 // IsListening returns true if the switch has at least one listener.
211 // NOTE: Not goroutine safe.
212 func (sw *Switch) IsListening() bool {
213 return len(sw.listeners) > 0
216 // Listeners returns the list of listeners the switch listens on.
217 // NOTE: Not goroutine safe.
218 func (sw *Switch) Listeners() []Listener {
222 // NumPeers Returns the count of outbound/inbound and outbound-dialing peers.
223 func (sw *Switch) NumPeers() (outbound, inbound, dialing int) {
224 peers := sw.peers.List()
225 for _, peer := range peers {
232 dialing = sw.dialing.Size()
236 // NodeInfo returns the switch's NodeInfo.
237 // NOTE: Not goroutine safe.
238 func (sw *Switch) NodeInfo() *NodeInfo {
242 //Peers return switch peerset
243 func (sw *Switch) Peers() *PeerSet {
247 // SetNodeInfo sets the switch's NodeInfo for checking compatibility and handshaking with other nodes.
248 // NOTE: Not goroutine safe.
249 func (sw *Switch) SetNodeInfo(nodeInfo *NodeInfo) {
250 sw.nodeInfo = nodeInfo
253 // SetNodePrivKey sets the switch's private key for authenticated encryption.
254 // NOTE: Not goroutine safe.
255 func (sw *Switch) SetNodePrivKey(nodePrivKey crypto.PrivKeyEd25519) {
256 sw.nodePrivKey = nodePrivKey
257 if sw.nodeInfo != nil {
258 sw.nodeInfo.PubKey = nodePrivKey.PubKey().Unwrap().(crypto.PubKeyEd25519)
262 // StopPeerForError disconnects from a peer due to external error.
263 func (sw *Switch) StopPeerForError(peer *Peer, reason interface{}) {
264 log.WithFields(log.Fields{"peer": peer, " err": reason}).Debug("stopping peer for error")
265 sw.stopAndRemovePeer(peer, reason)
268 // StopPeerGracefully disconnect from a peer gracefully.
269 func (sw *Switch) StopPeerGracefully(peerID string) {
270 if peer := sw.peers.Get(peerID); peer != nil {
271 sw.stopAndRemovePeer(peer, nil)
275 func (sw *Switch) addPeerWithConnection(conn net.Conn) error {
276 peerConn, err := newInboundPeerConn(conn, sw.nodePrivKey, sw.Config.P2P)
282 if err = sw.AddPeer(peerConn); err != nil {
289 func (sw *Switch) checkBannedPeer(peer string) error {
291 defer sw.mtx.Unlock()
293 if banEnd, ok := sw.bannedPeer[peer]; ok {
294 if time.Now().Before(banEnd) {
295 return ErrConnectBannedPeer
297 sw.delBannedPeer(peer)
302 func (sw *Switch) delBannedPeer(addr string) error {
304 defer sw.mtx.Unlock()
306 delete(sw.bannedPeer, addr)
307 datajson, err := json.Marshal(sw.bannedPeer)
312 sw.db.Set([]byte(bannedPeerKey), datajson)
316 func (sw *Switch) filterConnByIP(ip string) error {
317 if ip == sw.nodeInfo.ListenHost() {
318 return ErrConnectSelf
320 return sw.checkBannedPeer(ip)
323 func (sw *Switch) filterConnByPeer(peer *Peer) error {
324 if err := sw.checkBannedPeer(peer.RemoteAddrHost()); err != nil {
328 if sw.nodeInfo.PubKey.Equals(peer.PubKey().Wrap()) {
329 return ErrConnectSelf
332 if sw.peers.Has(peer.Key) {
333 return ErrDuplicatePeer
338 func (sw *Switch) listenerRoutine(l Listener) {
340 inConn, ok := <-l.Connections()
345 // disconnect if we alrady have 2 * MaxNumPeers, we do this because we wanna address book get exchanged even if
346 // the connect is full. The pex will disconnect the peer after address exchange, the max connected peer won't
347 // be double of MaxNumPeers
348 if sw.peers.Size() >= sw.Config.P2P.MaxNumPeers {
350 log.Info("Ignoring inbound connection: already have enough peers.")
354 // New inbound connection!
355 if err := sw.addPeerWithConnection(inConn); err != nil {
356 log.Info("Ignoring inbound connection: error while adding peer.", " address:", inConn.RemoteAddr().String(), " error:", err)
362 func (sw *Switch) SetDiscv(discv *discover.Network) {
366 func (sw *Switch) dialPeerWorker(a *NetAddress, wg *sync.WaitGroup) {
367 if err := sw.DialPeerWithAddress(a); err != nil {
368 log.WithFields(log.Fields{"addr": a, "err": err}).Error("dialPeerWorker fail on dial peer")
373 func (sw *Switch) ensureOutboundPeers() {
374 numOutPeers, _, numDialing := sw.NumPeers()
375 numToDial := (minNumOutboundPeers - (numOutPeers + numDialing))
376 log.WithFields(log.Fields{"numOutPeers": numOutPeers, "numDialing": numDialing, "numToDial": numToDial}).Debug("ensure peers")
381 connectedPeers := make(map[string]struct{})
382 for _, peer := range sw.Peers().List() {
383 connectedPeers[peer.RemoteAddrHost()] = struct{}{}
386 var wg sync.WaitGroup
387 nodes := make([]*discover.Node, numToDial)
388 n := sw.discv.ReadRandomNodes(nodes)
389 for i := 0; i < n; i++ {
390 try := NewNetAddressIPPort(nodes[i].IP, nodes[i].TCP)
391 if sw.NodeInfo().ListenAddr == try.String() {
394 if dialling := sw.IsDialing(try); dialling {
397 if _, ok := connectedPeers[try.IP.String()]; ok {
402 go sw.dialPeerWorker(try, &wg)
407 func (sw *Switch) ensureOutboundPeersRoutine() {
408 sw.ensureOutboundPeers()
410 ticker := time.NewTicker(10 * time.Second)
416 sw.ensureOutboundPeers()
423 func (sw *Switch) startInitPeer(peer *Peer) error {
424 peer.Start() // spawn send/recv routines
425 for _, reactor := range sw.reactors {
426 if err := reactor.AddPeer(peer); err != nil {
433 func (sw *Switch) stopAndRemovePeer(peer *Peer, reason interface{}) {
434 sw.peers.Remove(peer)
435 for _, reactor := range sw.reactors {
436 reactor.RemovePeer(peer, reason)