mirror of
https://github.com/dashpay/dash.git
synced 2024-12-27 04:52:59 +01:00
Merge #11456: Replace relevant services logic with a function suite.
15f5d3b17
Switch DNSSeed-needed metric to any-automatic-nodes, not services (Matt Corallo)5ee88b4bd
Clarify docs for requirements/handling of addnode/connect nodes (Matt Corallo)57edc0b0c
Rename fAddnode to a more-descriptive "manual_connection" (Matt Corallo)44407100f
Replace relevant services logic with a function suite. (Matt Corallo) Pull request description: This was mostly written as a way to clean things up so that the NETWORK_LIMITED PR (#10387) can be simplified a ton, but its also a nice standalone cleanup that will also require a bit of review because it tweaks a lot of stuff across net. The new functions are fine in protocol.h right now since they're straight-forward, but after NETWORK_LIMITED will really want to move elsewhere after @theuni moves the nServices-based selection to addrman from connman. Adds HasAllRelevantServices and GetRelevantServices, which check for NETWORK|WITNESS. This changes the following: * Removes nRelevantServices from CConnman, disconnecting it a bit more from protocol-level logic. * Replaces our sometimes-connect-to-!WITNESS-nodes logic with simply always requiring WITNESS|NETWORK for outbound non-feeler connections (feelers still only require NETWORK). * This has the added benefit of removing nServicesExpected from CNode - instead letting net_processing's VERSION message handling simply check HasAllRelevantServices. * This implies we believe WITNESS nodes to continue to be a significant majority of nodes on the network, but also because we cannot sync properly from !WITNESS nodes, it is strange to continue using our valuable outbound slots on them. * In order to prevent this change from preventing connection to -connect= nodes which have !WITNESS, -connect nodes are now given the "addnode" flag. This also allows outbound connections to !NODE_NETWORK nodes for -connect nodes (which was already true of addnodes). * Has the (somewhat unintended) consequence of changing one of the eviction metrics from the same sometimes-connect-to-!WITNESS-nodes metric to requiring HasRelevantServices. This should make NODE_NETWORK_LIMITED much simpler to implement. Tree-SHA512: 90606896c86cc5da14c77843b16674a6a012065e7b583d76d1c47a18215358abefcbab44ff4fab3fadcd39aa9a42d4740c6dc8874a58033bdfc8ad3fb5c649fc
This commit is contained in:
parent
35d60de2b5
commit
f8c310a974
@ -487,12 +487,12 @@ std::string HelpMessage(HelpMessageMode mode)
|
|||||||
strUsage += HelpMessageOpt("-spentindex", strprintf(_("Maintain a full spent index, used to query the spending txid and input index for an outpoint (default: %u)"), DEFAULT_SPENTINDEX));
|
strUsage += HelpMessageOpt("-spentindex", strprintf(_("Maintain a full spent index, used to query the spending txid and input index for an outpoint (default: %u)"), DEFAULT_SPENTINDEX));
|
||||||
|
|
||||||
strUsage += HelpMessageGroup(_("Connection options:"));
|
strUsage += HelpMessageGroup(_("Connection options:"));
|
||||||
strUsage += HelpMessageOpt("-addnode=<ip>", _("Add a node to connect to and attempt to keep the connection open"));
|
strUsage += HelpMessageOpt("-addnode=<ip>", _("Add a node to connect to and attempt to keep the connection open (see the `addnode` RPC command help for more info)"));
|
||||||
strUsage += HelpMessageOpt("-allowprivatenet", strprintf(_("Allow RFC1918 addresses to be relayed and connected to (default: %u)"), DEFAULT_ALLOWPRIVATENET));
|
strUsage += HelpMessageOpt("-allowprivatenet", strprintf(_("Allow RFC1918 addresses to be relayed and connected to (default: %u)"), DEFAULT_ALLOWPRIVATENET));
|
||||||
strUsage += HelpMessageOpt("-banscore=<n>", strprintf(_("Threshold for disconnecting misbehaving peers (default: %u)"), DEFAULT_BANSCORE_THRESHOLD));
|
strUsage += HelpMessageOpt("-banscore=<n>", strprintf(_("Threshold for disconnecting misbehaving peers (default: %u)"), DEFAULT_BANSCORE_THRESHOLD));
|
||||||
strUsage += HelpMessageOpt("-bantime=<n>", strprintf(_("Number of seconds to keep misbehaving peers from reconnecting (default: %u)"), DEFAULT_MISBEHAVING_BANTIME));
|
strUsage += HelpMessageOpt("-bantime=<n>", strprintf(_("Number of seconds to keep misbehaving peers from reconnecting (default: %u)"), DEFAULT_MISBEHAVING_BANTIME));
|
||||||
strUsage += HelpMessageOpt("-bind=<addr>", _("Bind to given address and always listen on it. Use [host]:port notation for IPv6"));
|
strUsage += HelpMessageOpt("-bind=<addr>", _("Bind to given address and always listen on it. Use [host]:port notation for IPv6"));
|
||||||
strUsage += HelpMessageOpt("-connect=<ip>", _("Connect only to the specified node(s); -connect=0 disables automatic connections"));
|
strUsage += HelpMessageOpt("-connect=<ip>", _("Connect only to the specified node(s); -connect=0 disables automatic connections (the rules for this peer are the same as for -addnode)"));
|
||||||
strUsage += HelpMessageOpt("-discover", _("Discover own IP addresses (default: 1 when listening and no -externalip or -proxy)"));
|
strUsage += HelpMessageOpt("-discover", _("Discover own IP addresses (default: 1 when listening and no -externalip or -proxy)"));
|
||||||
strUsage += HelpMessageOpt("-dns", _("Allow DNS lookups for -addnode, -seednode and -connect") + " " + strprintf(_("(default: %u)"), DEFAULT_NAME_LOOKUP));
|
strUsage += HelpMessageOpt("-dns", _("Allow DNS lookups for -addnode, -seednode and -connect") + " " + strprintf(_("(default: %u)"), DEFAULT_NAME_LOOKUP));
|
||||||
strUsage += HelpMessageOpt("-dnsseed", _("Query for peer addresses via DNS lookup, if low on addresses (default: 1 unless -connect used)"));
|
strUsage += HelpMessageOpt("-dnsseed", _("Query for peer addresses via DNS lookup, if low on addresses (default: 1 unless -connect used)"));
|
||||||
@ -1016,7 +1016,6 @@ void InitLogging()
|
|||||||
|
|
||||||
namespace { // Variables internal to initialization process only
|
namespace { // Variables internal to initialization process only
|
||||||
|
|
||||||
ServiceFlags nRelevantServices = NODE_NETWORK;
|
|
||||||
int nMaxConnections;
|
int nMaxConnections;
|
||||||
int nUserMaxConnections;
|
int nUserMaxConnections;
|
||||||
int nFD;
|
int nFD;
|
||||||
@ -2122,7 +2121,6 @@ bool AppInitMain(boost::thread_group& threadGroup, CScheduler& scheduler)
|
|||||||
|
|
||||||
CConnman::Options connOptions;
|
CConnman::Options connOptions;
|
||||||
connOptions.nLocalServices = nLocalServices;
|
connOptions.nLocalServices = nLocalServices;
|
||||||
connOptions.nRelevantServices = nRelevantServices;
|
|
||||||
connOptions.nMaxConnections = nMaxConnections;
|
connOptions.nMaxConnections = nMaxConnections;
|
||||||
connOptions.nMaxOutbound = std::min(MAX_OUTBOUND_CONNECTIONS, connOptions.nMaxConnections);
|
connOptions.nMaxOutbound = std::min(MAX_OUTBOUND_CONNECTIONS, connOptions.nMaxConnections);
|
||||||
connOptions.nMaxAddnode = MAX_ADDNODE_CONNECTIONS;
|
connOptions.nMaxAddnode = MAX_ADDNODE_CONNECTIONS;
|
||||||
|
52
src/net.cpp
52
src/net.cpp
@ -436,7 +436,6 @@ CNode* CConnman::ConnectNode(CAddress addrConnect, const char *pszDest, bool fCo
|
|||||||
uint64_t nonce = GetDeterministicRandomizer(RANDOMIZER_ID_LOCALHOSTNONCE).Write(id).Finalize();
|
uint64_t nonce = GetDeterministicRandomizer(RANDOMIZER_ID_LOCALHOSTNONCE).Write(id).Finalize();
|
||||||
CAddress addr_bind = GetBindAddress(hSocket);
|
CAddress addr_bind = GetBindAddress(hSocket);
|
||||||
CNode* pnode = new CNode(id, nLocalServices, GetBestHeight(), hSocket, addrConnect, CalculateKeyedNetGroup(addrConnect), nonce, addr_bind, pszDest ? pszDest : "", false);
|
CNode* pnode = new CNode(id, nLocalServices, GetBestHeight(), hSocket, addrConnect, CalculateKeyedNetGroup(addrConnect), nonce, addr_bind, pszDest ? pszDest : "", false);
|
||||||
pnode->nServicesExpected = ServiceFlags(addrConnect.nServices & nRelevantServices);
|
|
||||||
pnode->AddRef();
|
pnode->AddRef();
|
||||||
|
|
||||||
|
|
||||||
@ -688,7 +687,7 @@ void CNode::copyStats(CNodeStats &stats)
|
|||||||
X(cleanSubVer);
|
X(cleanSubVer);
|
||||||
}
|
}
|
||||||
X(fInbound);
|
X(fInbound);
|
||||||
X(fAddnode);
|
X(m_manual_connection);
|
||||||
X(nStartingHeight);
|
X(nStartingHeight);
|
||||||
{
|
{
|
||||||
LOCK(cs_vSend);
|
LOCK(cs_vSend);
|
||||||
@ -1026,7 +1025,7 @@ bool CConnman::AttemptToEvictConnection()
|
|||||||
|
|
||||||
NodeEvictionCandidate candidate = {node->GetId(), node->nTimeConnected, node->nMinPingUsecTime,
|
NodeEvictionCandidate candidate = {node->GetId(), node->nTimeConnected, node->nMinPingUsecTime,
|
||||||
node->nLastBlockTime, node->nLastTXTime,
|
node->nLastBlockTime, node->nLastTXTime,
|
||||||
(node->nServices & nRelevantServices) == nRelevantServices,
|
HasAllDesirableServiceFlags(node->nServices),
|
||||||
node->fRelayTxes, node->pfilter != nullptr, node->nKeyedNetGroup};
|
node->fRelayTxes, node->pfilter != nullptr, node->nKeyedNetGroup};
|
||||||
vEvictionCandidates.push_back(candidate);
|
vEvictionCandidates.push_back(candidate);
|
||||||
}
|
}
|
||||||
@ -1717,7 +1716,7 @@ void CConnman::ThreadDNSAddressSeed()
|
|||||||
LOCK(cs_vNodes);
|
LOCK(cs_vNodes);
|
||||||
int nRelevant = 0;
|
int nRelevant = 0;
|
||||||
for (auto pnode : vNodes) {
|
for (auto pnode : vNodes) {
|
||||||
nRelevant += pnode->fSuccessfullyConnected && ((pnode->nServices & nRelevantServices) == nRelevantServices);
|
nRelevant += pnode->fSuccessfullyConnected && !pnode->fFeeler && !pnode->fOneShot && !pnode->m_manual_connection && !pnode->fInbound;
|
||||||
}
|
}
|
||||||
if (nRelevant >= 2) {
|
if (nRelevant >= 2) {
|
||||||
LogPrintf("P2P peers available. Skipped DNS seeding.\n");
|
LogPrintf("P2P peers available. Skipped DNS seeding.\n");
|
||||||
@ -1739,7 +1738,7 @@ void CConnman::ThreadDNSAddressSeed()
|
|||||||
} else {
|
} else {
|
||||||
std::vector<CNetAddr> vIPs;
|
std::vector<CNetAddr> vIPs;
|
||||||
std::vector<CAddress> vAdd;
|
std::vector<CAddress> vAdd;
|
||||||
ServiceFlags requiredServiceBits = nRelevantServices;
|
ServiceFlags requiredServiceBits = GetDesirableServiceFlags(NODE_NONE);
|
||||||
std::string host = GetDNSHost(seed, &requiredServiceBits);
|
std::string host = GetDNSHost(seed, &requiredServiceBits);
|
||||||
CNetAddr resolveSource;
|
CNetAddr resolveSource;
|
||||||
if (!resolveSource.SetInternal(host)) {
|
if (!resolveSource.SetInternal(host)) {
|
||||||
@ -1820,7 +1819,7 @@ void CConnman::ThreadOpenConnections()
|
|||||||
for (const std::string& strAddr : gArgs.GetArgs("-connect"))
|
for (const std::string& strAddr : gArgs.GetArgs("-connect"))
|
||||||
{
|
{
|
||||||
CAddress addr(CService(), NODE_NONE);
|
CAddress addr(CService(), NODE_NONE);
|
||||||
OpenNetworkConnection(addr, false, nullptr, strAddr.c_str());
|
OpenNetworkConnection(addr, false, nullptr, strAddr.c_str(), false, false, true);
|
||||||
for (int i = 0; i < 10 && i < nLoop; i++)
|
for (int i = 0; i < 10 && i < nLoop; i++)
|
||||||
{
|
{
|
||||||
if (!interruptNet.sleep_for(std::chrono::milliseconds(500)))
|
if (!interruptNet.sleep_for(std::chrono::milliseconds(500)))
|
||||||
@ -1869,17 +1868,11 @@ void CConnman::ThreadOpenConnections()
|
|||||||
// Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
|
// Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
|
||||||
// This is only done for mainnet and testnet
|
// This is only done for mainnet and testnet
|
||||||
int nOutbound = 0;
|
int nOutbound = 0;
|
||||||
int nOutboundRelevant = 0;
|
|
||||||
std::set<std::vector<unsigned char> > setConnected;
|
std::set<std::vector<unsigned char> > setConnected;
|
||||||
if (!Params().AllowMultipleAddressesFromGroup()) {
|
if (!Params().AllowMultipleAddressesFromGroup()) {
|
||||||
LOCK(cs_vNodes);
|
LOCK(cs_vNodes);
|
||||||
for (CNode* pnode : vNodes) {
|
for (CNode* pnode : vNodes) {
|
||||||
if (!pnode->fInbound && !pnode->fAddnode && !pnode->fMasternode) {
|
if (!pnode->fInbound && !pnode->fMasternode && !pnode->m_manual_connection) {
|
||||||
|
|
||||||
// Count the peers that have all relevant services
|
|
||||||
if (pnode->fSuccessfullyConnected && !pnode->fFeeler && ((pnode->nServices & nRelevantServices) == nRelevantServices)) {
|
|
||||||
nOutboundRelevant++;
|
|
||||||
}
|
|
||||||
// Netgroups for inbound and addnode peers are not excluded because our goal here
|
// Netgroups for inbound and addnode peers are not excluded because our goal here
|
||||||
// is to not use multiple of our limited outbound slots on a single netgroup
|
// is to not use multiple of our limited outbound slots on a single netgroup
|
||||||
// but inbound and addnode peers do not use our outbound slots. Inbound peers
|
// but inbound and addnode peers do not use our outbound slots. Inbound peers
|
||||||
@ -1943,21 +1936,16 @@ void CConnman::ThreadOpenConnections()
|
|||||||
if (IsLimited(addr))
|
if (IsLimited(addr))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
// only connect to full nodes
|
|
||||||
if (!isMasternode && (addr.nServices & REQUIRED_SERVICES) != REQUIRED_SERVICES)
|
|
||||||
continue;
|
|
||||||
|
|
||||||
// only consider very recently tried nodes after 30 failed attempts
|
// only consider very recently tried nodes after 30 failed attempts
|
||||||
if (nANow - addr.nLastTry < 600 && nTries < 30)
|
if (nANow - addr.nLastTry < 600 && nTries < 30)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
// only consider nodes missing relevant services after 40 failed attempts and only if less than half the outbound are up.
|
// for non-feelers, require all the services we'll want,
|
||||||
ServiceFlags nRequiredServices = nRelevantServices;
|
// for feelers, only require they be a full node (only because most
|
||||||
if (nTries >= 40 && nOutbound < (nMaxOutbound >> 1)) {
|
// SPV clients don't have a good address DB available)
|
||||||
nRequiredServices = REQUIRED_SERVICES;
|
if (!isMasternode && !fFeeler && !HasAllDesirableServiceFlags(addr.nServices)) {
|
||||||
}
|
continue;
|
||||||
|
} else if (!isMasternode && fFeeler && !MayHaveUsefulAddressDB(addr.nServices)) {
|
||||||
if (!isMasternode && (addr.nServices & nRequiredServices) != nRequiredServices) {
|
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1966,13 +1954,6 @@ void CConnman::ThreadOpenConnections()
|
|||||||
continue;
|
continue;
|
||||||
|
|
||||||
addrConnect = addr;
|
addrConnect = addr;
|
||||||
|
|
||||||
// regardless of the services assumed to be available, only require the minimum if half or more outbound have relevant services
|
|
||||||
if (nOutboundRelevant >= (nMaxOutbound >> 1)) {
|
|
||||||
addrConnect.nServices = REQUIRED_SERVICES;
|
|
||||||
} else {
|
|
||||||
addrConnect.nServices = nRequiredServices;
|
|
||||||
}
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2165,7 +2146,7 @@ void CConnman::ThreadOpenMasternodeConnections()
|
|||||||
}
|
}
|
||||||
|
|
||||||
// if successful, this moves the passed grant to the constructed node
|
// if successful, this moves the passed grant to the constructed node
|
||||||
bool CConnman::OpenNetworkConnection(const CAddress& addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound, const char *pszDest, bool fOneShot, bool fFeeler, bool fAddnode, bool fConnectToMasternode)
|
bool CConnman::OpenNetworkConnection(const CAddress& addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound, const char *pszDest, bool fOneShot, bool fFeeler, bool manual_connection, bool fConnectToMasternode)
|
||||||
{
|
{
|
||||||
//
|
//
|
||||||
// Initiate outbound network connection
|
// Initiate outbound network connection
|
||||||
@ -2201,8 +2182,8 @@ bool CConnman::OpenNetworkConnection(const CAddress& addrConnect, bool fCountFai
|
|||||||
pnode->fOneShot = true;
|
pnode->fOneShot = true;
|
||||||
if (fFeeler)
|
if (fFeeler)
|
||||||
pnode->fFeeler = true;
|
pnode->fFeeler = true;
|
||||||
if (fAddnode)
|
if (manual_connection)
|
||||||
pnode->fAddnode = true;
|
pnode->m_manual_connection = true;
|
||||||
if (fConnectToMasternode)
|
if (fConnectToMasternode)
|
||||||
pnode->fMasternode = true;
|
pnode->fMasternode = true;
|
||||||
|
|
||||||
@ -3138,7 +3119,6 @@ CNode::CNode(NodeId idIn, ServiceFlags nLocalServicesIn, int nMyStartingHeightIn
|
|||||||
nSendVersion(0)
|
nSendVersion(0)
|
||||||
{
|
{
|
||||||
nServices = NODE_NONE;
|
nServices = NODE_NONE;
|
||||||
nServicesExpected = NODE_NONE;
|
|
||||||
hSocket = hSocketIn;
|
hSocket = hSocketIn;
|
||||||
nRecvVersion = INIT_PROTO_VERSION;
|
nRecvVersion = INIT_PROTO_VERSION;
|
||||||
nLastSend = 0;
|
nLastSend = 0;
|
||||||
@ -3153,7 +3133,7 @@ CNode::CNode(NodeId idIn, ServiceFlags nLocalServicesIn, int nMyStartingHeightIn
|
|||||||
strSubVer = "";
|
strSubVer = "";
|
||||||
fWhitelisted = false;
|
fWhitelisted = false;
|
||||||
fOneShot = false;
|
fOneShot = false;
|
||||||
fAddnode = false;
|
m_manual_connection = false;
|
||||||
fClient = false; // set by version message
|
fClient = false; // set by version message
|
||||||
fFeeler = false;
|
fFeeler = false;
|
||||||
fSuccessfullyConnected = false;
|
fSuccessfullyConnected = false;
|
||||||
|
14
src/net.h
14
src/net.h
@ -111,8 +111,6 @@ static const bool DEFAULT_FORCEDNSSEED = false;
|
|||||||
static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000;
|
static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000;
|
||||||
static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000;
|
static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000;
|
||||||
|
|
||||||
static const ServiceFlags REQUIRED_SERVICES = NODE_NETWORK;
|
|
||||||
|
|
||||||
// NOTE: When adjusting this, update rpcnet:setban's help ("24h")
|
// NOTE: When adjusting this, update rpcnet:setban's help ("24h")
|
||||||
static const unsigned int DEFAULT_MISBEHAVING_BANTIME = 60 * 60 * 24; // Default 24-hour ban
|
static const unsigned int DEFAULT_MISBEHAVING_BANTIME = 60 * 60 * 24; // Default 24-hour ban
|
||||||
|
|
||||||
@ -157,7 +155,6 @@ public:
|
|||||||
struct Options
|
struct Options
|
||||||
{
|
{
|
||||||
ServiceFlags nLocalServices = NODE_NONE;
|
ServiceFlags nLocalServices = NODE_NONE;
|
||||||
ServiceFlags nRelevantServices = NODE_NONE;
|
|
||||||
int nMaxConnections = 0;
|
int nMaxConnections = 0;
|
||||||
int nMaxOutbound = 0;
|
int nMaxOutbound = 0;
|
||||||
int nMaxAddnode = 0;
|
int nMaxAddnode = 0;
|
||||||
@ -175,7 +172,6 @@ public:
|
|||||||
|
|
||||||
void Init(const Options& connOptions) {
|
void Init(const Options& connOptions) {
|
||||||
nLocalServices = connOptions.nLocalServices;
|
nLocalServices = connOptions.nLocalServices;
|
||||||
nRelevantServices = connOptions.nRelevantServices;
|
|
||||||
nMaxConnections = connOptions.nMaxConnections;
|
nMaxConnections = connOptions.nMaxConnections;
|
||||||
nMaxOutbound = std::min(connOptions.nMaxOutbound, connOptions.nMaxConnections);
|
nMaxOutbound = std::min(connOptions.nMaxOutbound, connOptions.nMaxConnections);
|
||||||
nMaxAddnode = connOptions.nMaxAddnode;
|
nMaxAddnode = connOptions.nMaxAddnode;
|
||||||
@ -196,7 +192,7 @@ public:
|
|||||||
void Interrupt();
|
void Interrupt();
|
||||||
bool GetNetworkActive() const { return fNetworkActive; };
|
bool GetNetworkActive() const { return fNetworkActive; };
|
||||||
void SetNetworkActive(bool active);
|
void SetNetworkActive(bool active);
|
||||||
bool OpenNetworkConnection(const CAddress& addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound = nullptr, const char *strDest = nullptr, bool fOneShot = false, bool fFeeler = false, bool fAddnode = false, bool fConnectToMasternode = false);
|
bool OpenNetworkConnection(const CAddress& addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound = nullptr, const char *strDest = nullptr, bool fOneShot = false, bool fFeeler = false, bool manual_connection = false, bool fConnectToMasternode = false);
|
||||||
bool OpenMasternodeConnection(const CAddress& addrConnect);
|
bool OpenMasternodeConnection(const CAddress& addrConnect);
|
||||||
bool CheckIncomingNonce(uint64_t nonce);
|
bool CheckIncomingNonce(uint64_t nonce);
|
||||||
|
|
||||||
@ -532,9 +528,6 @@ private:
|
|||||||
/** Services this instance offers */
|
/** Services this instance offers */
|
||||||
ServiceFlags nLocalServices;
|
ServiceFlags nLocalServices;
|
||||||
|
|
||||||
/** Services this instance cares about */
|
|
||||||
ServiceFlags nRelevantServices;
|
|
||||||
|
|
||||||
CSemaphore *semOutbound;
|
CSemaphore *semOutbound;
|
||||||
CSemaphore *semAddnode;
|
CSemaphore *semAddnode;
|
||||||
CSemaphore *semMasternodeOutbound;
|
CSemaphore *semMasternodeOutbound;
|
||||||
@ -663,7 +656,7 @@ public:
|
|||||||
int nVersion;
|
int nVersion;
|
||||||
std::string cleanSubVer;
|
std::string cleanSubVer;
|
||||||
bool fInbound;
|
bool fInbound;
|
||||||
bool fAddnode;
|
bool m_manual_connection;
|
||||||
int nStartingHeight;
|
int nStartingHeight;
|
||||||
uint64_t nSendBytes;
|
uint64_t nSendBytes;
|
||||||
mapMsgCmdSize mapSendBytesPerMsgCmd;
|
mapMsgCmdSize mapSendBytesPerMsgCmd;
|
||||||
@ -735,7 +728,6 @@ class CNode
|
|||||||
public:
|
public:
|
||||||
// socket
|
// socket
|
||||||
std::atomic<ServiceFlags> nServices;
|
std::atomic<ServiceFlags> nServices;
|
||||||
ServiceFlags nServicesExpected;
|
|
||||||
SOCKET hSocket;
|
SOCKET hSocket;
|
||||||
size_t nSendSize; // total size of all vSendMsg entries
|
size_t nSendSize; // total size of all vSendMsg entries
|
||||||
size_t nSendOffset; // offset inside the first vSendMsg already sent
|
size_t nSendOffset; // offset inside the first vSendMsg already sent
|
||||||
@ -777,7 +769,7 @@ public:
|
|||||||
bool fWhitelisted; // This peer can bypass DoS banning.
|
bool fWhitelisted; // This peer can bypass DoS banning.
|
||||||
bool fFeeler; // If true this node is being used as a short lived feeler.
|
bool fFeeler; // If true this node is being used as a short lived feeler.
|
||||||
bool fOneShot;
|
bool fOneShot;
|
||||||
bool fAddnode;
|
bool m_manual_connection;
|
||||||
bool fClient;
|
bool fClient;
|
||||||
const bool fInbound;
|
const bool fInbound;
|
||||||
std::atomic_bool fSuccessfullyConnected;
|
std::atomic_bool fSuccessfullyConnected;
|
||||||
|
@ -1456,11 +1456,11 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|||||||
{
|
{
|
||||||
connman.SetServices(pfrom->addr, nServices);
|
connman.SetServices(pfrom->addr, nServices);
|
||||||
}
|
}
|
||||||
if (pfrom->nServicesExpected & ~nServices)
|
if (!pfrom->fInbound && !pfrom->fFeeler && !pfrom->m_manual_connection && !HasAllDesirableServiceFlags(nServices))
|
||||||
{
|
{
|
||||||
LogPrint(BCLog::NET, "peer=%d does not offer the expected services (%08x offered, %08x expected); disconnecting\n", pfrom->GetId(), nServices, pfrom->nServicesExpected);
|
LogPrint(BCLog::NET, "peer=%d does not offer the expected services (%08x offered, %08x expected); disconnecting\n", pfrom->GetId(), nServices, GetDesirableServiceFlags(nServices));
|
||||||
connman.PushMessage(pfrom, CNetMsgMaker(INIT_PROTO_VERSION).Make(NetMsgType::REJECT, strCommand, REJECT_NONSTANDARD,
|
connman.PushMessage(pfrom, CNetMsgMaker(INIT_PROTO_VERSION).Make(NetMsgType::REJECT, strCommand, REJECT_NONSTANDARD,
|
||||||
strprintf("Expected to offer services %08x", pfrom->nServicesExpected)));
|
strprintf("Expected to offer services %08x", GetDesirableServiceFlags(nServices))));
|
||||||
pfrom->fDisconnect = true;
|
pfrom->fDisconnect = true;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@ -1697,7 +1697,10 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|||||||
if (interruptMsgProc)
|
if (interruptMsgProc)
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
if ((addr.nServices & REQUIRED_SERVICES) != REQUIRED_SERVICES)
|
// We only bother storing full nodes, though this may include
|
||||||
|
// things which we would not make an outbound connection to, in
|
||||||
|
// part because we may make feeler connections to them.
|
||||||
|
if (!MayHaveUsefulAddressDB(addr.nServices))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (addr.nTime <= 100000000 || addr.nTime > nNow + 10 * 60)
|
if (addr.nTime <= 100000000 || addr.nTime > nNow + 10 * 60)
|
||||||
@ -3001,8 +3004,8 @@ static bool SendRejectsAndCheckIfBanned(CNode* pnode, CConnman& connman)
|
|||||||
state.fShouldBan = false;
|
state.fShouldBan = false;
|
||||||
if (pnode->fWhitelisted)
|
if (pnode->fWhitelisted)
|
||||||
LogPrintf("Warning: not punishing whitelisted peer %s!\n", pnode->GetLogString());
|
LogPrintf("Warning: not punishing whitelisted peer %s!\n", pnode->GetLogString());
|
||||||
else if (pnode->fAddnode)
|
else if (pnode->m_manual_connection)
|
||||||
LogPrintf("Warning: not punishing addnoded peer %s!\n", pnode->GetLogString());
|
LogPrintf("Warning: not punishing manually-connected peer %s!\n", pnode->GetLogString());
|
||||||
else {
|
else {
|
||||||
pnode->fDisconnect = true;
|
pnode->fDisconnect = true;
|
||||||
if (pnode->addr.IsLocal())
|
if (pnode->addr.IsLocal())
|
||||||
|
@ -306,6 +306,43 @@ enum ServiceFlags : uint64_t {
|
|||||||
// BIP process.
|
// BIP process.
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets the set of service flags which are "desirable" for a given peer.
|
||||||
|
*
|
||||||
|
* These are the flags which are required for a peer to support for them
|
||||||
|
* to be "interesting" to us, ie for us to wish to use one of our few
|
||||||
|
* outbound connection slots for or for us to wish to prioritize keeping
|
||||||
|
* their connection around.
|
||||||
|
*
|
||||||
|
* Relevant service flags may be peer- and state-specific in that the
|
||||||
|
* version of the peer may determine which flags are required (eg in the
|
||||||
|
* case of NODE_NETWORK_LIMITED where we seek out NODE_NETWORK peers
|
||||||
|
* unless they set NODE_NETWORK_LIMITED and we are out of IBD, in which
|
||||||
|
* case NODE_NETWORK_LIMITED suffices).
|
||||||
|
*
|
||||||
|
* Thus, generally, avoid calling with peerServices == NODE_NONE.
|
||||||
|
*/
|
||||||
|
static ServiceFlags GetDesirableServiceFlags(ServiceFlags services) {
|
||||||
|
return ServiceFlags(NODE_NETWORK | NODE_WITNESS);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A shortcut for (services & GetDesirableServiceFlags(services))
|
||||||
|
* == GetDesirableServiceFlags(services), ie determines whether the given
|
||||||
|
* set of service flags are sufficient for a peer to be "relevant".
|
||||||
|
*/
|
||||||
|
static inline bool HasAllDesirableServiceFlags(ServiceFlags services) {
|
||||||
|
return !(GetDesirableServiceFlags(services) & (~services));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if a peer with the given service flags may be capable of having a
|
||||||
|
* robust address-storage DB. Currently an alias for checking NODE_NETWORK.
|
||||||
|
*/
|
||||||
|
static inline bool MayHaveUsefulAddressDB(ServiceFlags services) {
|
||||||
|
return services & NODE_NETWORK;
|
||||||
|
}
|
||||||
|
|
||||||
/** A CService with information about it as peer */
|
/** A CService with information about it as peer */
|
||||||
class CAddress : public CService
|
class CAddress : public CService
|
||||||
{
|
{
|
||||||
|
@ -93,7 +93,7 @@ UniValue getpeerinfo(const JSONRPCRequest& request)
|
|||||||
" \"version\": v, (numeric) The peer version, such as 7001\n"
|
" \"version\": v, (numeric) The peer version, such as 7001\n"
|
||||||
" \"subver\": \"/Dash Core:x.x.x/\", (string) The string version\n"
|
" \"subver\": \"/Dash Core:x.x.x/\", (string) The string version\n"
|
||||||
" \"inbound\": true|false, (boolean) Inbound (true) or Outbound (false)\n"
|
" \"inbound\": true|false, (boolean) Inbound (true) or Outbound (false)\n"
|
||||||
" \"addnode\": true|false, (boolean) Whether connection was due to addnode and is using an addnode slot\n"
|
" \"addnode\": true|false, (boolean) Whether connection was due to addnode/-connect or if it was an automatic/inbound connection\n"
|
||||||
" \"startingheight\": n, (numeric) The starting height (block) of the peer\n"
|
" \"startingheight\": n, (numeric) The starting height (block) of the peer\n"
|
||||||
" \"banscore\": n, (numeric) The ban score\n"
|
" \"banscore\": n, (numeric) The ban score\n"
|
||||||
" \"synced_headers\": n, (numeric) The last header we have in common with this peer\n"
|
" \"synced_headers\": n, (numeric) The last header we have in common with this peer\n"
|
||||||
@ -157,7 +157,7 @@ UniValue getpeerinfo(const JSONRPCRequest& request)
|
|||||||
// their ver message.
|
// their ver message.
|
||||||
obj.push_back(Pair("subver", stats.cleanSubVer));
|
obj.push_back(Pair("subver", stats.cleanSubVer));
|
||||||
obj.push_back(Pair("inbound", stats.fInbound));
|
obj.push_back(Pair("inbound", stats.fInbound));
|
||||||
obj.push_back(Pair("addnode", stats.fAddnode));
|
obj.push_back(Pair("addnode", stats.m_manual_connection));
|
||||||
obj.push_back(Pair("startingheight", stats.nStartingHeight));
|
obj.push_back(Pair("startingheight", stats.nStartingHeight));
|
||||||
if (fStateStats) {
|
if (fStateStats) {
|
||||||
obj.push_back(Pair("banscore", statestats.nMisbehavior));
|
obj.push_back(Pair("banscore", statestats.nMisbehavior));
|
||||||
@ -202,6 +202,8 @@ UniValue addnode(const JSONRPCRequest& request)
|
|||||||
"addnode \"node\" \"add|remove|onetry\"\n"
|
"addnode \"node\" \"add|remove|onetry\"\n"
|
||||||
"\nAttempts to add or remove a node from the addnode list.\n"
|
"\nAttempts to add or remove a node from the addnode list.\n"
|
||||||
"Or try a connection to a node once.\n"
|
"Or try a connection to a node once.\n"
|
||||||
|
"Nodes added using addnode (or -connect) are protected from DoS disconnection and are not required to be\n"
|
||||||
|
"full nodes/support SegWit as other outbound peers are (though such peers will not be synced from).\n"
|
||||||
"\nArguments:\n"
|
"\nArguments:\n"
|
||||||
"1. \"node\" (string, required) The node (see getpeerinfo for nodes)\n"
|
"1. \"node\" (string, required) The node (see getpeerinfo for nodes)\n"
|
||||||
"2. \"command\" (string, required) 'add' to add a node to the list, 'remove' to remove a node from the list, 'onetry' to try a connection to the node once\n"
|
"2. \"command\" (string, required) 'add' to add a node to the list, 'remove' to remove a node from the list, 'onetry' to try a connection to the node once\n"
|
||||||
@ -218,7 +220,7 @@ UniValue addnode(const JSONRPCRequest& request)
|
|||||||
if (strCommand == "onetry")
|
if (strCommand == "onetry")
|
||||||
{
|
{
|
||||||
CAddress addr;
|
CAddress addr;
|
||||||
g_connman->OpenNetworkConnection(addr, false, nullptr, strNode.c_str());
|
g_connman->OpenNetworkConnection(addr, false, nullptr, strNode.c_str(), false, false, true);
|
||||||
return NullUniValue;
|
return NullUniValue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user