mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 21:38:05 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
209 lines
7.2 KiB
Go
209 lines
7.2 KiB
Go
package sync
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/p2p"
|
|
p2ptypes "github.com/OffchainLabs/prysm/v7/beacon-chain/p2p/types"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/primitives"
|
|
"github.com/OffchainLabs/prysm/v7/time"
|
|
"github.com/OffchainLabs/prysm/v7/time/slots"
|
|
libp2pcore "github.com/libp2p/go-libp2p/core"
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// pingHandler reads the incoming ping rpc message from the peer.
|
|
// If the peer's sequence number is higher than the one stored locally,
|
|
// a METADATA request is sent to the peer to retrieve and update the latest metadata.
|
|
// Note: This function is misnamed, as it performs more than just reading a ping message.
|
|
func (s *Service) pingHandler(_ context.Context, msg any, stream libp2pcore.Stream) error {
|
|
SetRPCStreamDeadlines(stream)
|
|
|
|
// Convert the message to SSW Uint64 type.
|
|
m, ok := msg.(*primitives.SSZUint64)
|
|
if !ok {
|
|
return fmt.Errorf("wrong message type for ping, got %T, wanted *uint64", msg)
|
|
}
|
|
sequenceNumber := uint64(*m)
|
|
|
|
// Validate the incoming request regarding rate limiting.
|
|
if err := s.rateLimiter.validateRequest(stream, 1); err != nil {
|
|
return errors.Wrap(err, "validate request")
|
|
}
|
|
|
|
s.rateLimiter.add(stream, 1)
|
|
|
|
// Retrieve the peer ID.
|
|
peerID := stream.Conn().RemotePeer()
|
|
|
|
// Check if the peer sequence number is higher than the one we have in our store.
|
|
valid, err := s.isSequenceNumberUpToDate(sequenceNumber, peerID)
|
|
if err != nil {
|
|
s.writeErrorResponseToStream(responseCodeInvalidRequest, p2ptypes.ErrInvalidSequenceNum.Error(), stream)
|
|
return errors.Wrap(err, "validate sequence number")
|
|
}
|
|
|
|
// We can already prepare a success response to the peer.
|
|
if _, err := stream.Write([]byte{responseCodeSuccess}); err != nil {
|
|
return errors.Wrap(err, "write response")
|
|
}
|
|
|
|
// Retrieve our own sequence number.
|
|
seqNumber := s.cfg.p2p.MetadataSeq()
|
|
|
|
// SSZ encode our sequence number.
|
|
seqNumberSSZ := primitives.SSZUint64(seqNumber)
|
|
|
|
// Send our sequence number back to the peer.
|
|
if _, err := s.cfg.p2p.Encoding().EncodeWithMaxLength(stream, &seqNumberSSZ); err != nil {
|
|
return err
|
|
}
|
|
|
|
closeStream(stream, log)
|
|
|
|
if valid {
|
|
// If the peer's sequence numberwas valid we're done.
|
|
return nil
|
|
}
|
|
|
|
// The peer's sequence number was not valid. We ask the peer for its metadata.
|
|
go func() {
|
|
// Define a new context so the calling function doesn't cancel on us.
|
|
ctx, cancel := context.WithTimeout(context.Background(), ttfbTimeout)
|
|
defer cancel()
|
|
|
|
// Send a METADATA request to the peer.
|
|
peerMetadata, err := s.sendMetaDataRequest(ctx, peerID)
|
|
if err != nil {
|
|
// We cannot compare errors directly as the stream muxer error
|
|
// type isn't compatible with the error we have, so a direct
|
|
// equality checks fails.
|
|
if !strings.Contains(err.Error(), p2ptypes.ErrIODeadline.Error()) {
|
|
log.WithField("peer", peerID).WithError(err).Debug("Could not send metadata request")
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// Update peer's metadata.
|
|
s.cfg.p2p.Peers().SetMetadata(peerID, peerMetadata)
|
|
}()
|
|
|
|
return nil
|
|
}
|
|
|
|
// sendPingRequest first sends a PING request to the peer.
|
|
// If the peer responds with a sequence number higher than latest one for it we have in our store,
|
|
// then this function sends a METADATA request to the peer, and stores the metadata received.
|
|
// This function is actually poorly named, since it does more than just sending a ping request.
|
|
func (s *Service) sendPingRequest(ctx context.Context, peerID peer.ID) error {
|
|
ctx, cancel := context.WithTimeout(ctx, respTimeout)
|
|
defer cancel()
|
|
|
|
// Get the current epoch.
|
|
currentSlot := s.cfg.clock.CurrentSlot()
|
|
currentEpoch := slots.ToEpoch(currentSlot)
|
|
|
|
// SSZ encode our metadata sequence number.
|
|
metadataSeq := s.cfg.p2p.MetadataSeq()
|
|
encodedMetadataSeq := primitives.SSZUint64(metadataSeq)
|
|
|
|
// Get the PING topic for the current epoch.
|
|
topic, err := p2p.TopicFromMessage(p2p.PingMessageName, currentEpoch)
|
|
if err != nil {
|
|
return errors.Wrap(err, "topic from message")
|
|
}
|
|
|
|
// Send the PING request to the peer.
|
|
stream, err := s.cfg.p2p.Send(ctx, &encodedMetadataSeq, topic, peerID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "send ping request")
|
|
}
|
|
defer closeStream(stream, log)
|
|
|
|
startTime := time.Now()
|
|
|
|
// Read the response from the peer.
|
|
code, errMsg, err := ReadStatusCode(stream, s.cfg.p2p.Encoding())
|
|
if err != nil {
|
|
return errors.Wrap(err, "read status code")
|
|
}
|
|
|
|
// Record the latency of the ping request for that peer.
|
|
s.cfg.p2p.Host().Peerstore().RecordLatency(peerID, time.Now().Sub(startTime))
|
|
|
|
// If the peer responded with an error, increment the bad responses scorer.
|
|
if code != 0 {
|
|
s.downscorePeer(peerID, "NotNullPingReadStatusCode")
|
|
return errors.Errorf("code: %d - %s", code, errMsg)
|
|
}
|
|
|
|
// Decode the sequence number from the peer.
|
|
msg := new(primitives.SSZUint64)
|
|
if err := s.cfg.p2p.Encoding().DecodeWithMaxLength(stream, msg); err != nil {
|
|
return errors.Wrap(err, "decode sequence number")
|
|
}
|
|
sequenceNumber := uint64(*msg)
|
|
|
|
// Determine if the peer's sequence number returned by the peer is higher than the one we have in our store.
|
|
valid, err := s.isSequenceNumberUpToDate(sequenceNumber, peerID)
|
|
if err != nil {
|
|
return errors.Wrap(err, "validate sequence number")
|
|
}
|
|
|
|
// The sequence number have in our store for this peer is the same as the one returned by the peer, all good.
|
|
if valid {
|
|
return nil
|
|
}
|
|
|
|
// We need to send a METADATA request to the peer to get its latest metadata.
|
|
md, err := s.sendMetaDataRequest(ctx, peerID)
|
|
if err != nil {
|
|
// do not increment bad responses, as its already done in the request method.
|
|
return errors.Wrap(err, "send metadata request")
|
|
}
|
|
|
|
// Update the metadata for the peer.
|
|
s.cfg.p2p.Peers().SetMetadata(peerID, md)
|
|
|
|
return nil
|
|
}
|
|
|
|
// isSequenceNumberUpToDate check if our internal sequence number for the peer is up to date wrt. the incoming one.
|
|
// - If the incoming sequence number is greater than the sequence number we have in our store for the peer, return false.
|
|
// - If the incoming sequence number is equal to the sequence number we have in our store for the peer, return true.
|
|
// - If the incoming sequence number is less than the sequence number we have in our store for the peer, return an error.
|
|
func (s *Service) isSequenceNumberUpToDate(incomingSequenceNumber uint64, peerID peer.ID) (bool, error) {
|
|
// Retrieve the metadata for the peer we got in our store.
|
|
storedMetadata, err := s.cfg.p2p.Peers().Metadata(peerID)
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "peers metadata")
|
|
}
|
|
|
|
// If we have no metadata for the peer, return false.
|
|
if storedMetadata == nil || storedMetadata.IsNil() {
|
|
return false, nil
|
|
}
|
|
|
|
// The peer's sequence number must be less than or equal to the sequence number we have in our store.
|
|
storedSequenceNumber := storedMetadata.SequenceNumber()
|
|
if storedSequenceNumber > incomingSequenceNumber {
|
|
s.downscorePeer(peerID, "pingInvalidSequenceNumber", logrus.Fields{
|
|
"storedSequenceNumber": storedSequenceNumber,
|
|
"incomingSequenceNumber": incomingSequenceNumber,
|
|
})
|
|
return false, p2ptypes.ErrInvalidSequenceNum
|
|
}
|
|
|
|
// If this is the case, our information about the peer is outdated.
|
|
if storedSequenceNumber < incomingSequenceNumber {
|
|
return false, nil
|
|
}
|
|
|
|
return true, nil
|
|
}
|