1c3ed4c9da
It's logging the blockchain height, not the top block height
798 lines
34 KiB
C++
798 lines
34 KiB
C++
/// @file
|
|
/// @author rfree (current maintainer/user in monero.cc project - most of code is from CryptoNote)
|
|
/// @brief This is the orginal cryptonote protocol network-events handler, modified by us
|
|
|
|
// Copyright (c) 2014-2016, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
// (may contain code and/or modifications by other developers)
|
|
// developer rfree: this code is caller of our new network code, and is modded; e.g. for rate limiting
|
|
|
|
#include <boost/interprocess/detail/atomic.hpp>
|
|
#include <list>
|
|
|
|
#include "cryptonote_core/cryptonote_format_utils.h"
|
|
#include "profile_tools.h"
|
|
#include "../../contrib/otshell_utils/utils.hpp"
|
|
#include "../../src/p2p/network_throttle-detail.hpp"
|
|
#include "../../src/p2p/data_logger.hpp"
|
|
using namespace nOT::nUtils;
|
|
|
|
namespace cryptonote
|
|
{
|
|
|
|
|
|
// static
|
|
// template<class t_core> std::ofstream t_cryptonote_protocol_handler<t_core>::m_logreq("logreq.txt"); // static
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
t_cryptonote_protocol_handler<t_core>::t_cryptonote_protocol_handler(t_core& rcore, nodetool::i_p2p_endpoint<connection_context>* p_net_layout):m_core(rcore),
|
|
m_p2p(p_net_layout),
|
|
m_syncronized_connections_count(0),
|
|
m_synchronized(false)
|
|
|
|
{
|
|
if(!m_p2p)
|
|
m_p2p = &m_p2p_stub;
|
|
}
|
|
//-----------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::init(const boost::program_options::variables_map& vm)
|
|
{
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::deinit()
|
|
{
|
|
|
|
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
void t_cryptonote_protocol_handler<t_core>::set_p2p_endpoint(nodetool::i_p2p_endpoint<connection_context>* p2p)
|
|
{
|
|
if(p2p)
|
|
m_p2p = p2p;
|
|
else
|
|
m_p2p = &m_p2p_stub;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::on_callback(cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("callback fired");
|
|
CHECK_AND_ASSERT_MES_CC( context.m_callback_request_count > 0, false, "false callback fired, but context.m_callback_request_count=" << context.m_callback_request_count);
|
|
--context.m_callback_request_count;
|
|
|
|
if(context.m_state == cryptonote_connection_context::state_synchronizing)
|
|
{
|
|
NOTIFY_REQUEST_CHAIN::request r = boost::value_initialized<NOTIFY_REQUEST_CHAIN::request>();
|
|
m_core.get_short_chain_history(r.block_ids);
|
|
LOG_PRINT_CCONTEXT_L2("-->>NOTIFY_REQUEST_CHAIN: m_block_ids.size()=" << r.block_ids.size() );
|
|
post_notify<NOTIFY_REQUEST_CHAIN>(r, context);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::get_stat_info(core_stat_info& stat_inf)
|
|
{
|
|
return m_core.get_stat_info(stat_inf);
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
void t_cryptonote_protocol_handler<t_core>::log_connections()
|
|
{
|
|
std::stringstream ss;
|
|
ss.precision(1);
|
|
|
|
double down_sum = 0.0;
|
|
double down_curr_sum = 0.0;
|
|
double up_sum = 0.0;
|
|
double up_curr_sum = 0.0;
|
|
|
|
ss << std::setw(30) << std::left << "Remote Host"
|
|
<< std::setw(20) << "Peer id"
|
|
<< std::setw(30) << "Recv/Sent (inactive,sec)"
|
|
<< std::setw(25) << "State"
|
|
<< std::setw(20) << "Livetime(sec)"
|
|
<< std::setw(12) << "Down (kB/s)"
|
|
<< std::setw(14) << "Down(now)"
|
|
<< std::setw(10) << "Up (kB/s)"
|
|
<< std::setw(13) << "Up(now)"
|
|
<< ENDL;
|
|
|
|
uint32_t ip;
|
|
m_p2p->for_each_connection([&](const connection_context& cntxt, nodetool::peerid_type peer_id)
|
|
{
|
|
bool local_ip = false;
|
|
ip = ntohl(cntxt.m_remote_ip);
|
|
// TODO: local ip in calss A, B
|
|
if (ip > 3232235520 && ip < 3232301055) // 192.168.x.x
|
|
local_ip = true;
|
|
auto connection_time = time(NULL) - cntxt.m_started;
|
|
ss << std::setw(30) << std::left << std::string(cntxt.m_is_income ? " [INC]":"[OUT]") +
|
|
epee::string_tools::get_ip_string_from_int32(cntxt.m_remote_ip) + ":" + std::to_string(cntxt.m_remote_port)
|
|
<< std::setw(20) << std::hex << peer_id
|
|
<< std::setw(30) << std::to_string(cntxt.m_recv_cnt)+ "(" + std::to_string(time(NULL) - cntxt.m_last_recv) + ")" + "/" + std::to_string(cntxt.m_send_cnt) + "(" + std::to_string(time(NULL) - cntxt.m_last_send) + ")"
|
|
<< std::setw(25) << get_protocol_state_string(cntxt.m_state)
|
|
<< std::setw(20) << std::to_string(time(NULL) - cntxt.m_started)
|
|
<< std::setw(12) << std::fixed << (connection_time == 0 ? 0.0 : cntxt.m_recv_cnt / connection_time / 1024)
|
|
<< std::setw(14) << std::fixed << cntxt.m_current_speed_down / 1024
|
|
<< std::setw(10) << std::fixed << (connection_time == 0 ? 0.0 : cntxt.m_send_cnt / connection_time / 1024)
|
|
<< std::setw(13) << std::fixed << cntxt.m_current_speed_up / 1024
|
|
<< (local_ip ? "[LAN]" : "")
|
|
<< std::left << (ip == LOCALHOST_INT ? "[LOCALHOST]" : "") // 127.0.0.1
|
|
<< ENDL;
|
|
|
|
if (connection_time > 1)
|
|
{
|
|
down_sum += (cntxt.m_recv_cnt / connection_time / 1024);
|
|
up_sum += (cntxt.m_send_cnt / connection_time / 1024);
|
|
}
|
|
|
|
down_curr_sum += (cntxt.m_current_speed_down / 1024);
|
|
up_curr_sum += (cntxt.m_current_speed_up / 1024);
|
|
|
|
return true;
|
|
});
|
|
ss << ENDL
|
|
<< std::setw(125) << " "
|
|
<< std::setw(12) << down_sum
|
|
<< std::setw(14) << down_curr_sum
|
|
<< std::setw(10) << up_sum
|
|
<< std::setw(13) << up_curr_sum
|
|
<< ENDL;
|
|
LOG_PRINT_L0("Connections: " << ENDL << ss.str());
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
// Returns a list of connection_info objects describing each open p2p connection
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
std::list<connection_info> t_cryptonote_protocol_handler<t_core>::get_connections()
|
|
{
|
|
std::list<connection_info> connections;
|
|
|
|
m_p2p->for_each_connection([&](const connection_context& cntxt, nodetool::peerid_type peer_id)
|
|
{
|
|
connection_info cnx;
|
|
auto timestamp = time(NULL);
|
|
|
|
cnx.incoming = cntxt.m_is_income ? true : false;
|
|
|
|
cnx.ip = epee::string_tools::get_ip_string_from_int32(cntxt.m_remote_ip);
|
|
cnx.port = std::to_string(cntxt.m_remote_port);
|
|
|
|
std::stringstream peer_id_str;
|
|
peer_id_str << std::hex << peer_id;
|
|
peer_id_str >> cnx.peer_id;
|
|
|
|
cnx.recv_count = cntxt.m_recv_cnt;
|
|
cnx.recv_idle_time = timestamp - cntxt.m_last_recv;
|
|
|
|
cnx.send_count = cntxt.m_send_cnt;
|
|
cnx.send_idle_time = timestamp;
|
|
|
|
cnx.state = get_protocol_state_string(cntxt.m_state);
|
|
|
|
cnx.live_time = timestamp - cntxt.m_started;
|
|
|
|
uint32_t ip;
|
|
ip = ntohl(cntxt.m_remote_ip);
|
|
if (ip == LOCALHOST_INT)
|
|
{
|
|
cnx.localhost = true;
|
|
}
|
|
else
|
|
{
|
|
cnx.localhost = false;
|
|
}
|
|
|
|
if (ip > 3232235520 && ip < 3232301055) // 192.168.x.x
|
|
{
|
|
cnx.local_ip = true;
|
|
}
|
|
else
|
|
{
|
|
cnx.local_ip = false;
|
|
}
|
|
|
|
auto connection_time = time(NULL) - cntxt.m_started;
|
|
if (connection_time == 0)
|
|
{
|
|
cnx.avg_download = 0;
|
|
cnx.avg_upload = 0;
|
|
}
|
|
|
|
else
|
|
{
|
|
cnx.avg_download = cntxt.m_recv_cnt / connection_time / 1024;
|
|
cnx.avg_upload = cntxt.m_send_cnt / connection_time / 1024;
|
|
}
|
|
|
|
cnx.current_download = cntxt.m_current_speed_down / 1024;
|
|
cnx.current_upload = cntxt.m_current_speed_up / 1024;
|
|
|
|
connections.push_back(cnx);
|
|
|
|
return true;
|
|
});
|
|
|
|
return connections;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::process_payload_sync_data(const CORE_SYNC_DATA& hshd, cryptonote_connection_context& context, bool is_inital)
|
|
{
|
|
if(context.m_state == cryptonote_connection_context::state_befor_handshake && !is_inital)
|
|
return true;
|
|
|
|
if(context.m_state == cryptonote_connection_context::state_synchronizing)
|
|
return true;
|
|
|
|
if(m_core.have_block(hshd.top_id))
|
|
{
|
|
context.m_state = cryptonote_connection_context::state_normal;
|
|
if(is_inital)
|
|
on_connection_synchronized();
|
|
return true;
|
|
}
|
|
|
|
/* As I don't know if accessing hshd from core could be a good practice,
|
|
I prefer pushing target height to the core at the same time it is pushed to the user.
|
|
Nz. */
|
|
m_core.set_target_blockchain_height(static_cast<int64_t>(hshd.current_height));
|
|
|
|
int64_t diff = static_cast<int64_t>(hshd.current_height) - static_cast<int64_t>(m_core.get_current_blockchain_height());
|
|
LOG_PRINT_CCONTEXT_YELLOW("Sync data returned unknown top block: " << m_core.get_current_blockchain_height() << " -> " << hshd.current_height
|
|
<< " [" << std::abs(diff) << " blocks (" << diff / (24 * 60 * 60 / DIFFICULTY_TARGET_V1) << " days) "
|
|
<< (0 <= diff ? std::string("behind") : std::string("ahead"))
|
|
<< "] " << ENDL << "SYNCHRONIZATION started", (is_inital ? LOG_LEVEL_0:LOG_LEVEL_1));
|
|
LOG_PRINT_L1("Remote blockchain height: " << hshd.current_height << ", id: " << hshd.top_id);
|
|
context.m_state = cryptonote_connection_context::state_synchronizing;
|
|
context.m_remote_blockchain_height = hshd.current_height;
|
|
//let the socket to send response to handshake, but request callback, to let send request data after response
|
|
LOG_PRINT_CCONTEXT_L2("requesting callback");
|
|
++context.m_callback_request_count;
|
|
m_p2p->request_callback(context);
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::get_payload_sync_data(CORE_SYNC_DATA& hshd)
|
|
{
|
|
m_core.get_blockchain_top(hshd.current_height, hshd.top_id);
|
|
hshd.current_height +=1;
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::get_payload_sync_data(blobdata& data)
|
|
{
|
|
CORE_SYNC_DATA hsd = boost::value_initialized<CORE_SYNC_DATA>();
|
|
get_payload_sync_data(hsd);
|
|
epee::serialization::store_t_to_binary(hsd, data);
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_notify_new_block(int command, NOTIFY_NEW_BLOCK::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_NEW_BLOCK (hop " << arg.hop << ")");
|
|
if(context.m_state != cryptonote_connection_context::state_normal)
|
|
return 1;
|
|
m_core.pause_mine();
|
|
std::list<block_complete_entry> blocks;
|
|
blocks.push_back(arg.b);
|
|
m_core.prepare_handle_incoming_blocks(blocks);
|
|
for(auto tx_blob_it = arg.b.txs.begin(); tx_blob_it!=arg.b.txs.end();tx_blob_it++)
|
|
{
|
|
cryptonote::tx_verification_context tvc = AUTO_VAL_INIT(tvc);
|
|
m_core.handle_incoming_tx(*tx_blob_it, tvc, true, true);
|
|
if(tvc.m_verifivation_failed)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L1("Block verification failed: transaction verification failed, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_core.cleanup_handle_incoming_blocks();
|
|
m_core.resume_mine();
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
block_verification_context bvc = boost::value_initialized<block_verification_context>();
|
|
m_core.handle_incoming_block(arg.b.block, bvc); // got block from handle_notify_new_block
|
|
m_core.cleanup_handle_incoming_blocks(true);
|
|
m_core.resume_mine();
|
|
if(bvc.m_verifivation_failed)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L0("Block verification failed, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
if(bvc.m_added_to_main_chain)
|
|
{
|
|
++arg.hop;
|
|
//TODO: Add here announce protocol usage
|
|
relay_block(arg, context);
|
|
}else if(bvc.m_marked_as_orphaned)
|
|
{
|
|
context.m_state = cryptonote_connection_context::state_synchronizing;
|
|
NOTIFY_REQUEST_CHAIN::request r = boost::value_initialized<NOTIFY_REQUEST_CHAIN::request>();
|
|
m_core.get_short_chain_history(r.block_ids);
|
|
LOG_PRINT_CCONTEXT_L2("-->>NOTIFY_REQUEST_CHAIN: m_block_ids.size()=" << r.block_ids.size() );
|
|
post_notify<NOTIFY_REQUEST_CHAIN>(r, context);
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_notify_new_transactions(int command, NOTIFY_NEW_TRANSACTIONS::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_NEW_TRANSACTIONS");
|
|
if(context.m_state != cryptonote_connection_context::state_normal)
|
|
return 1;
|
|
|
|
for(auto tx_blob_it = arg.txs.begin(); tx_blob_it!=arg.txs.end();)
|
|
{
|
|
cryptonote::tx_verification_context tvc = AUTO_VAL_INIT(tvc);
|
|
m_core.handle_incoming_tx(*tx_blob_it, tvc, false, true);
|
|
if(tvc.m_verifivation_failed)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L1("Tx verification failed, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
if(tvc.m_should_be_relayed)
|
|
++tx_blob_it;
|
|
else
|
|
arg.txs.erase(tx_blob_it++);
|
|
}
|
|
|
|
if(arg.txs.size())
|
|
{
|
|
//TODO: add announce usage here
|
|
relay_transactions(arg, context);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_request_get_objects(int command, NOTIFY_REQUEST_GET_OBJECTS::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_REQUEST_GET_OBJECTS");
|
|
NOTIFY_RESPONSE_GET_OBJECTS::request rsp;
|
|
if(!m_core.handle_get_objects(arg, rsp, context))
|
|
{
|
|
LOG_ERROR_CCONTEXT("failed to handle request NOTIFY_REQUEST_GET_OBJECTS, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
}
|
|
LOG_PRINT_CCONTEXT_L2("-->>NOTIFY_RESPONSE_GET_OBJECTS: blocks.size()=" << rsp.blocks.size() << ", txs.size()=" << rsp.txs.size()
|
|
<< ", rsp.m_current_blockchain_height=" << rsp.current_blockchain_height << ", missed_ids.size()=" << rsp.missed_ids.size());
|
|
post_notify<NOTIFY_RESPONSE_GET_OBJECTS>(rsp, context);
|
|
//handler_response_blocks_now(sizeof(rsp)); // XXX
|
|
//handler_response_blocks_now(200);
|
|
return 1;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
|
|
|
|
template<class t_core>
|
|
double t_cryptonote_protocol_handler<t_core>::get_avg_block_size() {
|
|
// return m_core.get_blockchain_storage().get_avg_block_size(count); // this does not count too well the actuall network-size of data we need to download
|
|
|
|
CRITICAL_REGION_LOCAL(m_buffer_mutex);
|
|
double avg = 0;
|
|
if (m_avg_buffer.size() == 0) {
|
|
_warn("m_avg_buffer.size() == 0");
|
|
return 500;
|
|
}
|
|
|
|
const bool dbg_poke_lock = 0; // debug: try to trigger an error by poking around with locks. TODO: configure option
|
|
long int dbg_repeat=0;
|
|
do {
|
|
for (auto element : m_avg_buffer) avg += element;
|
|
} while(dbg_poke_lock && (dbg_repeat++)<100000); // in debug/poke mode, repeat this calculation to trigger hidden locking error if there is one
|
|
return avg / m_avg_buffer.size();
|
|
}
|
|
|
|
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_response_get_objects(int command, NOTIFY_RESPONSE_GET_OBJECTS::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_RESPONSE_GET_OBJECTS");
|
|
|
|
// calculate size of request - mainly for logging/debug
|
|
size_t size = 0;
|
|
for (auto element : arg.txs) size += element.size();
|
|
|
|
for (auto element : arg.blocks) {
|
|
size += element.block.size();
|
|
for (auto tx : element.txs)
|
|
size += tx.size();
|
|
}
|
|
|
|
for (auto element : arg.missed_ids)
|
|
size += sizeof(element.data);
|
|
|
|
size += sizeof(arg.current_blockchain_height);
|
|
{
|
|
CRITICAL_REGION_LOCAL(m_buffer_mutex);
|
|
m_avg_buffer.push_back(size);
|
|
|
|
const bool dbg_poke_lock = 0; // debug: try to trigger an error by poking around with locks. TODO: configure option
|
|
long int dbg_repeat=0;
|
|
do {
|
|
m_avg_buffer.push_back(666); // a test value
|
|
m_avg_buffer.erase_end(1);
|
|
} while(dbg_poke_lock && (dbg_repeat++)<100000); // in debug/poke mode, repeat this calculation to trigger hidden locking error if there is one
|
|
}
|
|
/*using namespace boost::chrono;
|
|
auto point = steady_clock::now();
|
|
auto time_from_epoh = point.time_since_epoch();
|
|
auto sec = duration_cast< seconds >( time_from_epoh ).count();*/
|
|
|
|
//epee::net_utils::network_throttle_manager::get_global_throttle_inreq().logger_handle_net("log/dr-monero/net/req-all.data", sec, get_avg_block_size());
|
|
|
|
if(context.m_last_response_height > arg.current_blockchain_height)
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent wrong NOTIFY_HAVE_OBJECTS: arg.m_current_blockchain_height=" << arg.current_blockchain_height
|
|
<< " < m_last_response_height=" << context.m_last_response_height << ", dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
|
|
context.m_remote_blockchain_height = arg.current_blockchain_height;
|
|
|
|
size_t count = 0;
|
|
BOOST_FOREACH(const block_complete_entry& block_entry, arg.blocks)
|
|
{
|
|
++count;
|
|
block b;
|
|
if(!parse_and_validate_block_from_blob(block_entry.block, b))
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent wrong block: failed to parse and validate block: \r\n"
|
|
<< epee::string_tools::buff_to_hex_nodelimer(block_entry.block) << "\r\n dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
//to avoid concurrency in core between connections, suspend connections which delivered block later then first one
|
|
if(count == 2)
|
|
{
|
|
if(m_core.have_block(get_block_hash(b)))
|
|
{
|
|
context.m_state = cryptonote_connection_context::state_idle;
|
|
context.m_needed_objects.clear();
|
|
context.m_requested_objects.clear();
|
|
LOG_PRINT_CCONTEXT_L1("Connection set to idle state.");
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
auto req_it = context.m_requested_objects.find(get_block_hash(b));
|
|
if(req_it == context.m_requested_objects.end())
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent wrong NOTIFY_RESPONSE_GET_OBJECTS: block with id=" << epee::string_tools::pod_to_hex(get_blob_hash(block_entry.block))
|
|
<< " wasn't requested, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
if(b.tx_hashes.size() != block_entry.txs.size())
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent wrong NOTIFY_RESPONSE_GET_OBJECTS: block with id=" << epee::string_tools::pod_to_hex(get_blob_hash(block_entry.block))
|
|
<< ", tx_hashes.size()=" << b.tx_hashes.size() << " mismatch with block_complete_entry.m_txs.size()=" << block_entry.txs.size() << ", dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
|
|
context.m_requested_objects.erase(req_it);
|
|
}
|
|
|
|
if(context.m_requested_objects.size())
|
|
{
|
|
LOG_PRINT_CCONTEXT_RED("returned not all requested objects (context.m_requested_objects.size()="
|
|
<< context.m_requested_objects.size() << "), dropping connection", LOG_LEVEL_0);
|
|
m_p2p->drop_connection(context);
|
|
return 1;
|
|
}
|
|
|
|
|
|
{
|
|
m_core.pause_mine();
|
|
epee::misc_utils::auto_scope_leave_caller scope_exit_handler = epee::misc_utils::create_scope_leave_handler(
|
|
boost::bind(&t_core::resume_mine, &m_core));
|
|
|
|
LOG_PRINT_CCONTEXT_YELLOW( "Got NEW BLOCKS inside of " << __FUNCTION__ << ": size: " << arg.blocks.size() , LOG_LEVEL_1);
|
|
|
|
if (m_core.get_test_drop_download() && m_core.get_test_drop_download_height()) { // DISCARD BLOCKS for testing
|
|
|
|
uint64_t previous_height = m_core.get_current_blockchain_height();
|
|
|
|
m_core.prepare_handle_incoming_blocks(arg.blocks);
|
|
BOOST_FOREACH(const block_complete_entry& block_entry, arg.blocks)
|
|
{
|
|
// process transactions
|
|
TIME_MEASURE_START(transactions_process_time);
|
|
BOOST_FOREACH(auto& tx_blob, block_entry.txs)
|
|
{
|
|
tx_verification_context tvc = AUTO_VAL_INIT(tvc);
|
|
m_core.handle_incoming_tx(tx_blob, tvc, true, true);
|
|
if(tvc.m_verifivation_failed)
|
|
{
|
|
LOG_ERROR_CCONTEXT("transaction verification failed on NOTIFY_RESPONSE_GET_OBJECTS, \r\ntx_id = "
|
|
<< epee::string_tools::pod_to_hex(get_blob_hash(tx_blob)) << ", dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_core.cleanup_handle_incoming_blocks();
|
|
return 1;
|
|
}
|
|
}
|
|
TIME_MEASURE_FINISH(transactions_process_time);
|
|
|
|
// process block
|
|
|
|
TIME_MEASURE_START(block_process_time);
|
|
block_verification_context bvc = boost::value_initialized<block_verification_context>();
|
|
|
|
m_core.handle_incoming_block(block_entry.block, bvc, false); // <--- process block
|
|
|
|
if(bvc.m_verifivation_failed)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L1("Block verification failed, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_p2p->add_ip_fail(context.m_remote_ip);
|
|
m_core.cleanup_handle_incoming_blocks();
|
|
return 1;
|
|
}
|
|
if(bvc.m_marked_as_orphaned)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L1("Block received at sync phase was marked as orphaned, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_p2p->add_ip_fail(context.m_remote_ip);
|
|
m_core.cleanup_handle_incoming_blocks();
|
|
return 1;
|
|
}
|
|
|
|
TIME_MEASURE_FINISH(block_process_time);
|
|
LOG_PRINT_CCONTEXT_L2("Block process time: " << block_process_time + transactions_process_time << "(" << transactions_process_time << "/" << block_process_time << ")ms");
|
|
|
|
epee::net_utils::data_logger::get_instance().add_data("calc_time", block_process_time + transactions_process_time);
|
|
epee::net_utils::data_logger::get_instance().add_data("block_processing", 1);
|
|
|
|
} // each download block
|
|
m_core.cleanup_handle_incoming_blocks();
|
|
|
|
if (m_core.get_current_blockchain_height() > previous_height)
|
|
{
|
|
LOG_PRINT_CCONTEXT_YELLOW( "Synced " << m_core.get_current_blockchain_height() << "/" << m_core.get_target_blockchain_height() , LOG_LEVEL_0);
|
|
}
|
|
} // if not DISCARD BLOCK
|
|
|
|
|
|
}
|
|
request_missing_objects(context, true);
|
|
return 1;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::on_idle()
|
|
{
|
|
return m_core.on_idle();
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_request_chain(int command, NOTIFY_REQUEST_CHAIN::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_REQUEST_CHAIN: m_block_ids.size()=" << arg.block_ids.size());
|
|
NOTIFY_RESPONSE_CHAIN_ENTRY::request r;
|
|
if(!m_core.find_blockchain_supplement(arg.block_ids, r))
|
|
{
|
|
LOG_ERROR_CCONTEXT("Failed to handle NOTIFY_REQUEST_CHAIN.");
|
|
return 1;
|
|
}
|
|
LOG_PRINT_CCONTEXT_L2("-->>NOTIFY_RESPONSE_CHAIN_ENTRY: m_start_height=" << r.start_height << ", m_total_height=" << r.total_height << ", m_block_ids.size()=" << r.m_block_ids.size());
|
|
post_notify<NOTIFY_RESPONSE_CHAIN_ENTRY>(r, context);
|
|
return 1;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::request_missing_objects(cryptonote_connection_context& context, bool check_having_blocks)
|
|
{
|
|
//if (!m_one_request == false)
|
|
//return true;
|
|
m_one_request = false;
|
|
// save request size to log (dr monero)
|
|
/*using namespace boost::chrono;
|
|
auto point = steady_clock::now();
|
|
auto time_from_epoh = point.time_since_epoch();
|
|
auto sec = duration_cast< seconds >( time_from_epoh ).count();*/
|
|
|
|
if(context.m_needed_objects.size())
|
|
{
|
|
//we know objects that we need, request this objects
|
|
NOTIFY_REQUEST_GET_OBJECTS::request req;
|
|
size_t count = 0;
|
|
auto it = context.m_needed_objects.begin();
|
|
|
|
size_t count_limit = BLOCKS_SYNCHRONIZING_DEFAULT_COUNT;
|
|
_note_c("net/req-calc" , "Setting count_limit: " << count_limit);
|
|
while(it != context.m_needed_objects.end() && count < BLOCKS_SYNCHRONIZING_DEFAULT_COUNT)
|
|
{
|
|
if( !(check_having_blocks && m_core.have_block(*it)))
|
|
{
|
|
req.blocks.push_back(*it);
|
|
++count;
|
|
context.m_requested_objects.insert(*it);
|
|
}
|
|
context.m_needed_objects.erase(it++);
|
|
}
|
|
LOG_PRINT_CCONTEXT_L1("-->>NOTIFY_REQUEST_GET_OBJECTS: blocks.size()=" << req.blocks.size() << ", txs.size()=" << req.txs.size()
|
|
<< "requested blocks count=" << count << " / " << count_limit);
|
|
//epee::net_utils::network_throttle_manager::get_global_throttle_inreq().logger_handle_net("log/dr-monero/net/req-all.data", sec, get_avg_block_size());
|
|
|
|
post_notify<NOTIFY_REQUEST_GET_OBJECTS>(req, context);
|
|
}else if(context.m_last_response_height < context.m_remote_blockchain_height-1)
|
|
{//we have to fetch more objects ids, request blockchain entry
|
|
|
|
NOTIFY_REQUEST_CHAIN::request r = boost::value_initialized<NOTIFY_REQUEST_CHAIN::request>();
|
|
m_core.get_short_chain_history(r.block_ids);
|
|
handler_request_blocks_history( r.block_ids ); // change the limit(?), sleep(?)
|
|
|
|
//std::string blob; // for calculate size of request
|
|
//epee::serialization::store_t_to_binary(r, blob);
|
|
//epee::net_utils::network_throttle_manager::get_global_throttle_inreq().logger_handle_net("log/dr-monero/net/req-all.data", sec, get_avg_block_size());
|
|
LOG_PRINT_CCONTEXT_L1("r = " << 200);
|
|
|
|
LOG_PRINT_CCONTEXT_L1("-->>NOTIFY_REQUEST_CHAIN: m_block_ids.size()=" << r.block_ids.size() );
|
|
post_notify<NOTIFY_REQUEST_CHAIN>(r, context);
|
|
}else
|
|
{
|
|
CHECK_AND_ASSERT_MES(context.m_last_response_height == context.m_remote_blockchain_height-1
|
|
&& !context.m_needed_objects.size()
|
|
&& !context.m_requested_objects.size(), false, "request_missing_blocks final condition failed!"
|
|
<< "\r\nm_last_response_height=" << context.m_last_response_height
|
|
<< "\r\nm_remote_blockchain_height=" << context.m_remote_blockchain_height
|
|
<< "\r\nm_needed_objects.size()=" << context.m_needed_objects.size()
|
|
<< "\r\nm_requested_objects.size()=" << context.m_requested_objects.size()
|
|
<< "\r\non connection [" << epee::net_utils::print_connection_context_short(context)<< "]");
|
|
|
|
context.m_state = cryptonote_connection_context::state_normal;
|
|
LOG_PRINT_CCONTEXT_GREEN(" SYNCHRONIZED OK", LOG_LEVEL_0);
|
|
on_connection_synchronized();
|
|
}
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::on_connection_synchronized()
|
|
{
|
|
bool val_expected = false;
|
|
if(m_synchronized.compare_exchange_strong(val_expected, true))
|
|
{
|
|
LOG_PRINT_L0(ENDL << "**********************************************************************" << ENDL
|
|
<< "You are now synchronized with the network. You may now start simplewallet." << ENDL
|
|
<< ENDL
|
|
<< "Please note, that the blockchain will be saved only after you quit the daemon with \"exit\" command or if you use \"save\" command." << ENDL
|
|
<< "Otherwise, you will possibly need to synchronize the blockchain again." << ENDL
|
|
<< ENDL
|
|
<< "Use \"help\" command to see the list of available commands." << ENDL
|
|
<< "**********************************************************************");
|
|
m_core.on_synchronized();
|
|
}
|
|
return true;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
size_t t_cryptonote_protocol_handler<t_core>::get_synchronizing_connections_count()
|
|
{
|
|
size_t count = 0;
|
|
m_p2p->for_each_connection([&](cryptonote_connection_context& context, nodetool::peerid_type peer_id)->bool{
|
|
if(context.m_state == cryptonote_connection_context::state_synchronizing)
|
|
++count;
|
|
return true;
|
|
});
|
|
return count;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
int t_cryptonote_protocol_handler<t_core>::handle_response_chain_entry(int command, NOTIFY_RESPONSE_CHAIN_ENTRY::request& arg, cryptonote_connection_context& context)
|
|
{
|
|
LOG_PRINT_CCONTEXT_L2("NOTIFY_RESPONSE_CHAIN_ENTRY: m_block_ids.size()=" << arg.m_block_ids.size()
|
|
<< ", m_start_height=" << arg.start_height << ", m_total_height=" << arg.total_height);
|
|
|
|
if(!arg.m_block_ids.size())
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent empty m_block_ids, dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_p2p->add_ip_fail(context.m_remote_ip);
|
|
return 1;
|
|
}
|
|
|
|
if(!m_core.have_block(arg.m_block_ids.front()))
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent m_block_ids starting from unknown id: "
|
|
<< epee::string_tools::pod_to_hex(arg.m_block_ids.front()) << " , dropping connection");
|
|
m_p2p->drop_connection(context);
|
|
m_p2p->add_ip_fail(context.m_remote_ip);
|
|
return 1;
|
|
}
|
|
|
|
context.m_remote_blockchain_height = arg.total_height;
|
|
context.m_last_response_height = arg.start_height + arg.m_block_ids.size()-1;
|
|
if(context.m_last_response_height > context.m_remote_blockchain_height)
|
|
{
|
|
LOG_ERROR_CCONTEXT("sent wrong NOTIFY_RESPONSE_CHAIN_ENTRY, with \r\nm_total_height=" << arg.total_height
|
|
<< "\r\nm_start_height=" << arg.start_height
|
|
<< "\r\nm_block_ids.size()=" << arg.m_block_ids.size());
|
|
m_p2p->drop_connection(context);
|
|
}
|
|
|
|
BOOST_FOREACH(auto& bl_id, arg.m_block_ids)
|
|
{
|
|
if(!m_core.have_block(bl_id))
|
|
context.m_needed_objects.push_back(bl_id);
|
|
}
|
|
|
|
request_missing_objects(context, false);
|
|
return 1;
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::relay_block(NOTIFY_NEW_BLOCK::request& arg, cryptonote_connection_context& exclude_context)
|
|
{
|
|
return relay_post_notify<NOTIFY_NEW_BLOCK>(arg, exclude_context);
|
|
}
|
|
//------------------------------------------------------------------------------------------------------------------------
|
|
template<class t_core>
|
|
bool t_cryptonote_protocol_handler<t_core>::relay_transactions(NOTIFY_NEW_TRANSACTIONS::request& arg, cryptonote_connection_context& exclude_context)
|
|
{
|
|
return relay_post_notify<NOTIFY_NEW_TRANSACTIONS>(arg, exclude_context);
|
|
}
|
|
|
|
/// @deprecated
|
|
template<class t_core> std::ofstream& t_cryptonote_protocol_handler<t_core>::get_logreq() const {
|
|
static std::ofstream * logreq=NULL;
|
|
if (!logreq) {
|
|
LOG_PRINT_RED("LOG OPENED",LOG_LEVEL_0);
|
|
logreq = new std::ofstream("logreq.txt"); // leak mem (singleton)
|
|
*logreq << "Opened log" << std::endl;
|
|
}
|
|
LOG_PRINT_YELLOW("LOG USED",LOG_LEVEL_0);
|
|
(*logreq) << "log used" << std::endl;
|
|
return *logreq;
|
|
}
|
|
|
|
} // namespace
|