2021-11-22 16:28:30 +00:00
|
|
|
mod bucket;
|
|
|
|
mod bucket_entry;
|
2021-12-14 14:48:33 +00:00
|
|
|
mod debug;
|
2021-11-22 16:28:30 +00:00
|
|
|
mod find_nodes;
|
|
|
|
mod node_ref;
|
2021-11-26 14:54:38 +00:00
|
|
|
mod stats_accounting;
|
2022-06-25 14:57:33 +00:00
|
|
|
mod tasks;
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
use crate::dht::*;
|
|
|
|
use crate::network_manager::*;
|
|
|
|
use crate::rpc_processor::*;
|
|
|
|
use crate::xx::*;
|
|
|
|
use crate::*;
|
|
|
|
use alloc::str::FromStr;
|
2021-11-26 14:54:38 +00:00
|
|
|
use bucket::*;
|
|
|
|
pub use bucket_entry::*;
|
2021-12-14 14:48:33 +00:00
|
|
|
pub use debug::*;
|
2021-11-26 14:54:38 +00:00
|
|
|
pub use find_nodes::*;
|
2021-11-22 16:28:30 +00:00
|
|
|
use futures_util::stream::{FuturesUnordered, StreamExt};
|
2021-11-26 14:54:38 +00:00
|
|
|
pub use node_ref::*;
|
|
|
|
pub use stats_accounting::*;
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
|
|
|
2022-05-28 14:07:57 +00:00
|
|
|
pub const BOOTSTRAP_TXT_VERSION: u8 = 0;
|
|
|
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct BootstrapRecord {
|
|
|
|
min_version: u8,
|
|
|
|
max_version: u8,
|
|
|
|
dial_info_details: Vec<DialInfoDetail>,
|
|
|
|
}
|
|
|
|
pub type BootstrapRecordMap = BTreeMap<DHTKey, BootstrapRecord>;
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
#[derive(Debug, Copy, Clone, PartialEq, PartialOrd, Ord, Eq)]
|
|
|
|
pub enum RoutingDomain {
|
|
|
|
PublicInternet,
|
|
|
|
LocalNetwork,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Default)]
|
|
|
|
pub struct RoutingDomainDetail {
|
|
|
|
dial_info_details: Vec<DialInfoDetail>,
|
|
|
|
}
|
|
|
|
|
2021-11-22 16:28:30 +00:00
|
|
|
struct RoutingTableInner {
|
|
|
|
network_manager: NetworkManager,
|
2022-06-25 14:57:33 +00:00
|
|
|
node_id: DHTKey, // The current node's public DHT key
|
|
|
|
node_id_secret: DHTKeySecret, // The current node's DHT key secret
|
|
|
|
|
|
|
|
buckets: Vec<Bucket>, // Routing table buckets that hold entries
|
|
|
|
kick_queue: BTreeSet<usize>, // Buckets to kick on our next kick task
|
|
|
|
bucket_entry_count: usize, // A fast counter for the number of entries in the table, total
|
|
|
|
|
|
|
|
public_internet_routing_domain: RoutingDomainDetail, // The dial info we use on the public internet
|
|
|
|
local_network_routing_domain: RoutingDomainDetail, // The dial info we use on the local network
|
|
|
|
|
|
|
|
self_latency_stats_accounting: LatencyStatsAccounting, // Interim accounting mechanism for this node's RPC latency to any other node
|
|
|
|
self_transfer_stats_accounting: TransferStatsAccounting, // Interim accounting mechanism for the total bandwidth to/from this node
|
|
|
|
self_transfer_stats: TransferStatsDownUp, // Statistics about the total bandwidth to/from this node
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-03-24 14:14:50 +00:00
|
|
|
#[derive(Clone, Debug, Default)]
|
|
|
|
pub struct RoutingTableHealth {
|
|
|
|
pub reliable_entry_count: usize,
|
|
|
|
pub unreliable_entry_count: usize,
|
|
|
|
pub dead_entry_count: usize,
|
|
|
|
}
|
|
|
|
|
2021-11-22 16:28:30 +00:00
|
|
|
struct RoutingTableUnlockedInner {
|
|
|
|
// Background processes
|
2022-07-10 21:36:50 +00:00
|
|
|
rolling_transfers_task: TickTask<EyreReport>,
|
|
|
|
bootstrap_task: TickTask<EyreReport>,
|
|
|
|
peer_minimum_refresh_task: TickTask<EyreReport>,
|
|
|
|
ping_validator_task: TickTask<EyreReport>,
|
2022-06-13 00:58:02 +00:00
|
|
|
node_info_update_single_future: MustJoinSingleFuture<()>,
|
2022-07-10 21:36:50 +00:00
|
|
|
kick_buckets_task: TickTask<EyreReport>,
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct RoutingTable {
|
|
|
|
config: VeilidConfig,
|
2022-06-25 14:57:33 +00:00
|
|
|
inner: Arc<RwLock<RoutingTableInner>>,
|
2021-11-22 16:28:30 +00:00
|
|
|
unlocked_inner: Arc<RoutingTableUnlockedInner>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl RoutingTable {
|
|
|
|
fn new_inner(network_manager: NetworkManager) -> RoutingTableInner {
|
|
|
|
RoutingTableInner {
|
2021-11-26 14:54:38 +00:00
|
|
|
network_manager,
|
2021-11-22 16:28:30 +00:00
|
|
|
node_id: DHTKey::default(),
|
|
|
|
node_id_secret: DHTKeySecret::default(),
|
|
|
|
buckets: Vec::new(),
|
2022-06-25 14:57:33 +00:00
|
|
|
kick_queue: BTreeSet::default(),
|
2022-04-23 01:30:09 +00:00
|
|
|
public_internet_routing_domain: RoutingDomainDetail::default(),
|
|
|
|
local_network_routing_domain: RoutingDomainDetail::default(),
|
2021-11-22 16:28:30 +00:00
|
|
|
bucket_entry_count: 0,
|
2022-03-19 22:19:40 +00:00
|
|
|
self_latency_stats_accounting: LatencyStatsAccounting::new(),
|
|
|
|
self_transfer_stats_accounting: TransferStatsAccounting::new(),
|
|
|
|
self_transfer_stats: TransferStatsDownUp::default(),
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
fn new_unlocked_inner(config: VeilidConfig) -> RoutingTableUnlockedInner {
|
|
|
|
let c = config.get();
|
|
|
|
RoutingTableUnlockedInner {
|
2021-11-26 14:54:38 +00:00
|
|
|
rolling_transfers_task: TickTask::new(ROLLING_TRANSFERS_INTERVAL_SECS),
|
2021-11-22 16:28:30 +00:00
|
|
|
bootstrap_task: TickTask::new(1),
|
2022-01-27 14:53:01 +00:00
|
|
|
peer_minimum_refresh_task: TickTask::new_ms(c.network.dht.min_peer_refresh_time_ms),
|
2021-11-22 16:28:30 +00:00
|
|
|
ping_validator_task: TickTask::new(1),
|
2022-06-13 00:58:02 +00:00
|
|
|
node_info_update_single_future: MustJoinSingleFuture::new(),
|
2022-06-25 14:57:33 +00:00
|
|
|
kick_buckets_task: TickTask::new(1),
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
pub fn new(network_manager: NetworkManager) -> Self {
|
|
|
|
let config = network_manager.config();
|
|
|
|
let this = Self {
|
|
|
|
config: config.clone(),
|
2022-06-25 14:57:33 +00:00
|
|
|
inner: Arc::new(RwLock::new(Self::new_inner(network_manager))),
|
2021-11-22 16:28:30 +00:00
|
|
|
unlocked_inner: Arc::new(Self::new_unlocked_inner(config)),
|
|
|
|
};
|
|
|
|
// Set rolling transfers tick task
|
|
|
|
{
|
|
|
|
let this2 = this.clone();
|
|
|
|
this.unlocked_inner
|
|
|
|
.rolling_transfers_task
|
2022-06-13 00:58:02 +00:00
|
|
|
.set_routine(move |s, l, t| {
|
|
|
|
Box::pin(this2.clone().rolling_transfers_task_routine(s, l, t))
|
2021-11-22 16:28:30 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
// Set bootstrap tick task
|
|
|
|
{
|
|
|
|
let this2 = this.clone();
|
|
|
|
this.unlocked_inner
|
|
|
|
.bootstrap_task
|
2022-06-13 00:58:02 +00:00
|
|
|
.set_routine(move |s, _l, _t| Box::pin(this2.clone().bootstrap_task_routine(s)));
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
// Set peer minimum refresh tick task
|
|
|
|
{
|
|
|
|
let this2 = this.clone();
|
|
|
|
this.unlocked_inner
|
|
|
|
.peer_minimum_refresh_task
|
2022-06-13 00:58:02 +00:00
|
|
|
.set_routine(move |s, _l, _t| {
|
|
|
|
Box::pin(this2.clone().peer_minimum_refresh_task_routine(s))
|
2021-11-22 16:28:30 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
// Set ping validator tick task
|
|
|
|
{
|
|
|
|
let this2 = this.clone();
|
|
|
|
this.unlocked_inner
|
|
|
|
.ping_validator_task
|
2022-06-13 00:58:02 +00:00
|
|
|
.set_routine(move |s, l, t| {
|
|
|
|
Box::pin(this2.clone().ping_validator_task_routine(s, l, t))
|
|
|
|
});
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
2022-06-25 14:57:33 +00:00
|
|
|
// Set kick buckets tick task
|
|
|
|
{
|
|
|
|
let this2 = this.clone();
|
|
|
|
this.unlocked_inner
|
|
|
|
.kick_buckets_task
|
|
|
|
.set_routine(move |s, l, t| {
|
|
|
|
Box::pin(this2.clone().kick_buckets_task_routine(s, l, t))
|
|
|
|
});
|
|
|
|
}
|
2021-11-22 16:28:30 +00:00
|
|
|
this
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn network_manager(&self) -> NetworkManager {
|
2022-06-25 14:57:33 +00:00
|
|
|
self.inner.read().network_manager.clone()
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
pub fn rpc_processor(&self) -> RPCProcessor {
|
|
|
|
self.network_manager().rpc_processor()
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn node_id(&self) -> DHTKey {
|
2022-06-25 14:57:33 +00:00
|
|
|
self.inner.read().node_id
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn node_id_secret(&self) -> DHTKeySecret {
|
2022-06-25 14:57:33 +00:00
|
|
|
self.inner.read().node_id_secret
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
fn with_routing_domain<F, R>(inner: &RoutingTableInner, domain: RoutingDomain, f: F) -> R
|
|
|
|
where
|
|
|
|
F: FnOnce(&RoutingDomainDetail) -> R,
|
|
|
|
{
|
|
|
|
match domain {
|
|
|
|
RoutingDomain::PublicInternet => f(&inner.public_internet_routing_domain),
|
|
|
|
RoutingDomain::LocalNetwork => f(&inner.local_network_routing_domain),
|
|
|
|
}
|
2021-12-24 23:02:53 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
fn with_routing_domain_mut<F, R>(
|
|
|
|
inner: &mut RoutingTableInner,
|
|
|
|
domain: RoutingDomain,
|
|
|
|
f: F,
|
|
|
|
) -> R
|
|
|
|
where
|
|
|
|
F: FnOnce(&mut RoutingDomainDetail) -> R,
|
|
|
|
{
|
|
|
|
match domain {
|
|
|
|
RoutingDomain::PublicInternet => f(&mut inner.public_internet_routing_domain),
|
|
|
|
RoutingDomain::LocalNetwork => f(&mut inner.local_network_routing_domain),
|
|
|
|
}
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn has_dial_info(&self, domain: RoutingDomain) -> bool {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2022-04-23 01:30:09 +00:00
|
|
|
Self::with_routing_domain(&*inner, domain, |rd| !rd.dial_info_details.is_empty())
|
2021-12-24 01:34:52 +00:00
|
|
|
}
|
2022-04-16 15:18:54 +00:00
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn dial_info_details(&self, domain: RoutingDomain) -> Vec<DialInfoDetail> {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2022-04-23 01:30:09 +00:00
|
|
|
Self::with_routing_domain(&*inner, domain, |rd| rd.dial_info_details.clone())
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn first_filtered_dial_info_detail(
|
2022-04-16 15:18:54 +00:00
|
|
|
&self,
|
2022-04-25 15:29:02 +00:00
|
|
|
domain: Option<RoutingDomain>,
|
2022-04-16 15:18:54 +00:00
|
|
|
filter: &DialInfoFilter,
|
|
|
|
) -> Option<DialInfoDetail> {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2022-04-25 15:29:02 +00:00
|
|
|
// Prefer local network first if it isn't filtered out
|
|
|
|
if domain == None || domain == Some(RoutingDomain::LocalNetwork) {
|
|
|
|
Self::with_routing_domain(&*inner, RoutingDomain::LocalNetwork, |rd| {
|
|
|
|
for did in &rd.dial_info_details {
|
|
|
|
if did.matches_filter(filter) {
|
|
|
|
return Some(did.clone());
|
|
|
|
}
|
2022-04-23 01:30:09 +00:00
|
|
|
}
|
2022-04-25 15:29:02 +00:00
|
|
|
None
|
|
|
|
})
|
|
|
|
} else {
|
2022-04-23 01:30:09 +00:00
|
|
|
None
|
2022-04-25 15:29:02 +00:00
|
|
|
}
|
|
|
|
.or_else(|| {
|
|
|
|
if domain == None || domain == Some(RoutingDomain::PublicInternet) {
|
|
|
|
Self::with_routing_domain(&*inner, RoutingDomain::PublicInternet, |rd| {
|
|
|
|
for did in &rd.dial_info_details {
|
|
|
|
if did.matches_filter(filter) {
|
|
|
|
return Some(did.clone());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
2022-04-23 01:30:09 +00:00
|
|
|
})
|
2022-04-16 15:18:54 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn all_filtered_dial_info_details(
|
2022-04-16 15:18:54 +00:00
|
|
|
&self,
|
2022-04-24 02:08:02 +00:00
|
|
|
domain: Option<RoutingDomain>,
|
2022-04-16 15:18:54 +00:00
|
|
|
filter: &DialInfoFilter,
|
|
|
|
) -> Vec<DialInfoDetail> {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2022-04-24 02:08:02 +00:00
|
|
|
let mut ret = Vec::new();
|
|
|
|
|
2022-04-25 00:16:13 +00:00
|
|
|
if domain == None || domain == Some(RoutingDomain::LocalNetwork) {
|
|
|
|
Self::with_routing_domain(&*inner, RoutingDomain::LocalNetwork, |rd| {
|
2022-04-25 15:29:02 +00:00
|
|
|
for did in &rd.dial_info_details {
|
2022-04-24 02:08:02 +00:00
|
|
|
if did.matches_filter(filter) {
|
|
|
|
ret.push(did.clone());
|
|
|
|
}
|
2022-04-23 01:30:09 +00:00
|
|
|
}
|
2022-04-24 02:08:02 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
if domain == None || domain == Some(RoutingDomain::PublicInternet) {
|
|
|
|
Self::with_routing_domain(&*inner, RoutingDomain::PublicInternet, |rd| {
|
2022-04-25 15:29:02 +00:00
|
|
|
for did in &rd.dial_info_details {
|
2022-04-24 02:08:02 +00:00
|
|
|
if did.matches_filter(filter) {
|
|
|
|
ret.push(did.clone());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
ret.remove_duplicates();
|
|
|
|
ret
|
2022-04-16 15:18:54 +00:00
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn register_dial_info(
|
2021-11-22 16:28:30 +00:00
|
|
|
&self,
|
2022-04-23 01:30:09 +00:00
|
|
|
domain: RoutingDomain,
|
2021-11-22 16:28:30 +00:00
|
|
|
dial_info: DialInfo,
|
2022-04-24 02:08:02 +00:00
|
|
|
class: DialInfoClass,
|
2022-07-10 21:36:50 +00:00
|
|
|
) -> EyreResult<()> {
|
2022-05-26 00:56:13 +00:00
|
|
|
log_rtab!(debug
|
|
|
|
"Registering dial_info with:\n domain: {:?}\n dial_info: {:?}\n class: {:?}",
|
|
|
|
domain, dial_info, class
|
2022-04-26 13:16:48 +00:00
|
|
|
);
|
2022-04-16 15:18:54 +00:00
|
|
|
let enable_local_peer_scope = {
|
2022-04-17 17:28:39 +00:00
|
|
|
let config = self.network_manager().config();
|
|
|
|
let c = config.get();
|
2022-04-16 15:18:54 +00:00
|
|
|
c.network.enable_local_peer_scope
|
|
|
|
};
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
if !enable_local_peer_scope
|
|
|
|
&& matches!(domain, RoutingDomain::PublicInternet)
|
|
|
|
&& dial_info.is_local()
|
|
|
|
{
|
2022-07-10 21:36:50 +00:00
|
|
|
bail!("shouldn't be registering local addresses as public");
|
2022-04-17 17:28:39 +00:00
|
|
|
}
|
|
|
|
if !dial_info.is_valid() {
|
2022-07-10 21:36:50 +00:00
|
|
|
bail!(
|
2022-04-26 13:16:48 +00:00
|
|
|
"shouldn't be registering invalid addresses: {:?}",
|
|
|
|
dial_info
|
2022-07-10 21:36:50 +00:00
|
|
|
);
|
2022-04-17 17:28:39 +00:00
|
|
|
}
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
let mut inner = self.inner.write();
|
2022-04-23 01:30:09 +00:00
|
|
|
Self::with_routing_domain_mut(&mut *inner, domain, |rd| {
|
|
|
|
rd.dial_info_details.push(DialInfoDetail {
|
|
|
|
dial_info: dial_info.clone(),
|
2022-04-24 02:08:02 +00:00
|
|
|
class,
|
2022-04-23 01:30:09 +00:00
|
|
|
});
|
2022-04-25 00:16:13 +00:00
|
|
|
rd.dial_info_details.sort();
|
2022-04-16 15:18:54 +00:00
|
|
|
});
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
let domain_str = match domain {
|
|
|
|
RoutingDomain::PublicInternet => "Public",
|
|
|
|
RoutingDomain::LocalNetwork => "Local",
|
|
|
|
};
|
2022-04-16 15:18:54 +00:00
|
|
|
info!(
|
2022-04-23 01:30:09 +00:00
|
|
|
"{} Dial Info: {}",
|
|
|
|
domain_str,
|
2022-04-16 15:18:54 +00:00
|
|
|
NodeDialInfo {
|
|
|
|
node_id: NodeId::new(inner.node_id),
|
|
|
|
dial_info
|
|
|
|
}
|
|
|
|
.to_string(),
|
|
|
|
);
|
2022-04-24 02:08:02 +00:00
|
|
|
debug!(" Class: {:?}", class);
|
2022-05-11 16:20:33 +00:00
|
|
|
|
|
|
|
// Public dial info changed, go through all nodes and reset their 'seen our node info' bit
|
|
|
|
if matches!(domain, RoutingDomain::PublicInternet) {
|
2022-07-06 01:21:58 +00:00
|
|
|
Self::reset_all_seen_our_node_info(&*inner);
|
2022-05-11 16:20:33 +00:00
|
|
|
}
|
|
|
|
|
2022-04-26 13:16:48 +00:00
|
|
|
Ok(())
|
2022-04-16 15:18:54 +00:00
|
|
|
}
|
|
|
|
|
2022-07-06 01:21:58 +00:00
|
|
|
fn reset_all_seen_our_node_info(inner: &RoutingTableInner) {
|
|
|
|
let cur_ts = intf::get_timestamp();
|
|
|
|
Self::with_entries(&*inner, cur_ts, BucketEntryState::Dead, |_, v| {
|
|
|
|
v.with_mut(|e| e.set_seen_our_node_info(false));
|
|
|
|
Option::<()>::None
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2022-04-23 01:30:09 +00:00
|
|
|
pub fn clear_dial_info_details(&self, domain: RoutingDomain) {
|
2022-04-26 13:16:48 +00:00
|
|
|
trace!("clearing dial info domain: {:?}", domain);
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
let mut inner = self.inner.write();
|
2022-04-23 01:30:09 +00:00
|
|
|
Self::with_routing_domain_mut(&mut *inner, domain, |rd| {
|
|
|
|
rd.dial_info_details.clear();
|
2022-07-06 01:21:58 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
// Public dial info changed, go through all nodes and reset their 'seen our node info' bit
|
|
|
|
if matches!(domain, RoutingDomain::PublicInternet) {
|
|
|
|
Self::reset_all_seen_our_node_info(&*inner);
|
|
|
|
}
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn bucket_depth(index: usize) -> usize {
|
|
|
|
match index {
|
|
|
|
0 => 256,
|
|
|
|
1 => 128,
|
|
|
|
2 => 64,
|
|
|
|
3 => 32,
|
|
|
|
4 => 16,
|
|
|
|
5 => 8,
|
|
|
|
6 => 4,
|
|
|
|
7 => 4,
|
|
|
|
8 => 4,
|
|
|
|
9 => 4,
|
|
|
|
_ => 4,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-10 21:36:50 +00:00
|
|
|
pub async fn init(&self) -> EyreResult<()> {
|
2022-06-25 14:57:33 +00:00
|
|
|
let mut inner = self.inner.write();
|
2021-11-22 16:28:30 +00:00
|
|
|
// Size the buckets (one per bit)
|
|
|
|
inner.buckets.reserve(DHT_KEY_LENGTH * 8);
|
|
|
|
for _ in 0..DHT_KEY_LENGTH * 8 {
|
|
|
|
let bucket = Bucket::new(self.clone());
|
|
|
|
inner.buckets.push(bucket);
|
|
|
|
}
|
|
|
|
|
|
|
|
// make local copy of node id for easy access
|
|
|
|
let c = self.config.get();
|
|
|
|
inner.node_id = c.network.node_id;
|
|
|
|
inner.node_id_secret = c.network.node_id_secret;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn terminate(&self) {
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("starting routing table terminate");
|
|
|
|
|
2022-05-25 15:12:19 +00:00
|
|
|
// Cancel all tasks being ticked
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("stopping rolling transfers task");
|
2022-06-13 00:58:02 +00:00
|
|
|
if let Err(e) = self.unlocked_inner.rolling_transfers_task.stop().await {
|
|
|
|
error!("rolling_transfers_task not stopped: {}", e);
|
2022-05-25 15:12:19 +00:00
|
|
|
}
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("stopping bootstrap task");
|
2022-06-13 00:58:02 +00:00
|
|
|
if let Err(e) = self.unlocked_inner.bootstrap_task.stop().await {
|
|
|
|
error!("bootstrap_task not stopped: {}", e);
|
2022-05-25 15:12:19 +00:00
|
|
|
}
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("stopping peer minimum refresh task");
|
2022-06-13 00:58:02 +00:00
|
|
|
if let Err(e) = self.unlocked_inner.peer_minimum_refresh_task.stop().await {
|
|
|
|
error!("peer_minimum_refresh_task not stopped: {}", e);
|
2022-05-25 15:12:19 +00:00
|
|
|
}
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("stopping ping_validator task");
|
2022-06-13 00:58:02 +00:00
|
|
|
if let Err(e) = self.unlocked_inner.ping_validator_task.stop().await {
|
|
|
|
error!("ping_validator_task not stopped: {}", e);
|
2022-05-25 15:12:19 +00:00
|
|
|
}
|
2022-06-15 18:05:04 +00:00
|
|
|
debug!("stopping node info update singlefuture");
|
2022-05-25 15:12:19 +00:00
|
|
|
if self
|
|
|
|
.unlocked_inner
|
|
|
|
.node_info_update_single_future
|
2022-06-13 00:58:02 +00:00
|
|
|
.join()
|
2022-05-25 15:12:19 +00:00
|
|
|
.await
|
|
|
|
.is_err()
|
|
|
|
{
|
2022-06-13 00:58:02 +00:00
|
|
|
error!("node_info_update_single_future not stopped");
|
2022-05-25 15:12:19 +00:00
|
|
|
}
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
*self.inner.write() = Self::new_inner(self.network_manager());
|
2022-06-15 18:05:04 +00:00
|
|
|
|
|
|
|
debug!("finished routing table terminate");
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-05-11 16:20:33 +00:00
|
|
|
// Inform routing table entries that our dial info has changed
|
2022-07-06 01:21:58 +00:00
|
|
|
pub async fn send_node_info_updates(&self, all: bool) {
|
2022-05-11 16:20:33 +00:00
|
|
|
let this = self.clone();
|
2022-07-06 01:21:58 +00:00
|
|
|
|
2022-06-11 22:47:58 +00:00
|
|
|
// Run in background only once
|
|
|
|
let _ = self
|
|
|
|
.clone()
|
|
|
|
.unlocked_inner
|
|
|
|
.node_info_update_single_future
|
|
|
|
.single_spawn(async move {
|
|
|
|
// Only update if we actually have a valid network class
|
|
|
|
let netman = this.network_manager();
|
|
|
|
if matches!(
|
|
|
|
netman.get_network_class().unwrap_or(NetworkClass::Invalid),
|
|
|
|
NetworkClass::Invalid
|
|
|
|
) {
|
|
|
|
trace!(
|
|
|
|
"not sending node info update because our network class is not yet valid"
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
2022-05-11 16:20:33 +00:00
|
|
|
|
2022-06-11 22:47:58 +00:00
|
|
|
// Get the list of refs to all nodes to update
|
|
|
|
let node_refs = {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = this.inner.read();
|
2022-06-11 22:47:58 +00:00
|
|
|
let mut node_refs = Vec::<NodeRef>::with_capacity(inner.bucket_entry_count);
|
|
|
|
let cur_ts = intf::get_timestamp();
|
2022-06-25 19:28:27 +00:00
|
|
|
Self::with_entries(&*inner, cur_ts, BucketEntryState::Unreliable, |k, v| {
|
|
|
|
// Only update nodes that haven't seen our node info yet
|
2022-07-06 01:21:58 +00:00
|
|
|
if all || !v.with(|e| e.has_seen_our_node_info()) {
|
2022-06-25 19:28:27 +00:00
|
|
|
node_refs.push(NodeRef::new(this.clone(), k, v, None));
|
|
|
|
}
|
|
|
|
Option::<()>::None
|
|
|
|
});
|
2022-06-11 22:47:58 +00:00
|
|
|
node_refs
|
|
|
|
};
|
2022-05-11 16:20:33 +00:00
|
|
|
|
2022-06-11 22:47:58 +00:00
|
|
|
// Send the updates
|
2022-07-06 01:21:58 +00:00
|
|
|
log_rtab!(debug "Sending node info updates to {} nodes", node_refs.len());
|
2022-06-11 22:47:58 +00:00
|
|
|
let mut unord = FuturesUnordered::new();
|
|
|
|
for nr in node_refs {
|
|
|
|
let rpc = this.rpc_processor();
|
|
|
|
unord.push(async move {
|
|
|
|
// Update the node
|
|
|
|
if let Err(e) = rpc
|
|
|
|
.rpc_call_node_info_update(Destination::Direct(nr.clone()), None)
|
|
|
|
.await
|
|
|
|
{
|
|
|
|
// Not fatal, but we should be able to see if this is happening
|
|
|
|
trace!("failed to send node info update to {:?}: {}", nr, e);
|
|
|
|
return;
|
|
|
|
}
|
2022-05-11 16:20:33 +00:00
|
|
|
|
2022-06-11 22:47:58 +00:00
|
|
|
// Mark the node as updated
|
|
|
|
nr.set_seen_our_node_info();
|
|
|
|
});
|
|
|
|
}
|
2022-05-11 16:20:33 +00:00
|
|
|
|
2022-06-11 22:47:58 +00:00
|
|
|
// Wait for futures to complete
|
|
|
|
while unord.next().await.is_some() {}
|
2022-05-11 16:20:33 +00:00
|
|
|
|
2022-07-06 01:21:58 +00:00
|
|
|
log_rtab!(debug "Finished sending node updates");
|
2022-06-11 22:47:58 +00:00
|
|
|
})
|
|
|
|
.await;
|
2022-05-11 16:20:33 +00:00
|
|
|
}
|
|
|
|
|
2022-03-09 03:32:12 +00:00
|
|
|
// Attempt to empty the routing table
|
|
|
|
// should only be performed when there are no node_refs (detached)
|
|
|
|
pub fn purge(&self) {
|
2022-06-25 14:57:33 +00:00
|
|
|
let mut inner = self.inner.write();
|
2022-03-09 03:32:12 +00:00
|
|
|
log_rtab!(
|
|
|
|
"Starting routing table purge. Table currently has {} nodes",
|
|
|
|
inner.bucket_entry_count
|
|
|
|
);
|
|
|
|
for bucket in &mut inner.buckets {
|
|
|
|
bucket.kick(0);
|
|
|
|
}
|
2022-05-24 21:13:52 +00:00
|
|
|
log_rtab!(debug
|
|
|
|
"Routing table purge complete. Routing table now has {} nodes",
|
2022-03-09 03:32:12 +00:00
|
|
|
inner.bucket_entry_count
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-11-22 16:28:30 +00:00
|
|
|
// Attempt to settle buckets and remove entries down to the desired number
|
|
|
|
// which may not be possible due extant NodeRefs
|
|
|
|
fn kick_bucket(inner: &mut RoutingTableInner, idx: usize) {
|
|
|
|
let bucket = &mut inner.buckets[idx];
|
|
|
|
let bucket_depth = Self::bucket_depth(idx);
|
|
|
|
|
|
|
|
if let Some(dead_node_ids) = bucket.kick(bucket_depth) {
|
|
|
|
// Remove counts
|
|
|
|
inner.bucket_entry_count -= dead_node_ids.len();
|
2022-05-24 21:13:52 +00:00
|
|
|
log_rtab!(debug "Routing table now has {} nodes", inner.bucket_entry_count);
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
// Now purge the routing table inner vectors
|
|
|
|
//let filter = |k: &DHTKey| dead_node_ids.contains(k);
|
|
|
|
//inner.closest_reliable_nodes.retain(filter);
|
|
|
|
//inner.fastest_reliable_nodes.retain(filter);
|
|
|
|
//inner.closest_nodes.retain(filter);
|
|
|
|
//inner.fastest_nodes.retain(filter);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn find_bucket_index(inner: &RoutingTableInner, node_id: DHTKey) -> usize {
|
|
|
|
distance(&node_id, &inner.node_id)
|
|
|
|
.first_nonzero_bit()
|
|
|
|
.unwrap()
|
|
|
|
}
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
fn get_entry_count(inner: &RoutingTableInner, min_state: BucketEntryState) -> usize {
|
2022-05-24 21:13:52 +00:00
|
|
|
let mut count = 0usize;
|
|
|
|
let cur_ts = intf::get_timestamp();
|
2022-06-25 19:28:27 +00:00
|
|
|
Self::with_entries(inner, cur_ts, min_state, |_, _| {
|
2022-05-24 21:13:52 +00:00
|
|
|
count += 1;
|
|
|
|
Option::<()>::None
|
|
|
|
});
|
|
|
|
count
|
|
|
|
}
|
|
|
|
|
2022-06-25 19:28:27 +00:00
|
|
|
fn with_entries<T, F: FnMut(DHTKey, Arc<BucketEntry>) -> Option<T>>(
|
2022-06-25 14:57:33 +00:00
|
|
|
inner: &RoutingTableInner,
|
2022-05-24 21:13:52 +00:00
|
|
|
cur_ts: u64,
|
|
|
|
min_state: BucketEntryState,
|
|
|
|
mut f: F,
|
|
|
|
) -> Option<T> {
|
2022-06-25 14:57:33 +00:00
|
|
|
for bucket in &inner.buckets {
|
|
|
|
for entry in bucket.entries() {
|
|
|
|
if entry.1.with(|e| e.state(cur_ts) >= min_state) {
|
|
|
|
if let Some(out) = f(*entry.0, entry.1.clone()) {
|
2022-05-24 21:13:52 +00:00
|
|
|
return Some(out);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
fn queue_bucket_kick(&self, node_id: DHTKey) {
|
|
|
|
let mut inner = self.inner.write();
|
2021-11-22 16:28:30 +00:00
|
|
|
let idx = Self::find_bucket_index(&*inner, node_id);
|
2022-06-25 14:57:33 +00:00
|
|
|
inner.kick_queue.insert(idx);
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-05-03 20:43:15 +00:00
|
|
|
// Create a node reference, possibly creating a bucket entry
|
|
|
|
// the 'update_func' closure is called on the node, and, if created,
|
|
|
|
// in a locked fashion as to ensure the bucket entry state is always valid
|
2022-07-10 21:36:50 +00:00
|
|
|
pub fn create_node_ref<F>(&self, node_id: DHTKey, update_func: F) -> EyreResult<NodeRef>
|
2022-05-03 20:43:15 +00:00
|
|
|
where
|
2022-06-25 14:57:33 +00:00
|
|
|
F: FnOnce(&mut BucketEntryInner),
|
2022-05-03 20:43:15 +00:00
|
|
|
{
|
2021-11-22 16:28:30 +00:00
|
|
|
// Ensure someone isn't trying register this node itself
|
|
|
|
if node_id == self.node_id() {
|
2022-07-10 21:36:50 +00:00
|
|
|
bail!("can't register own node");
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
2022-05-03 20:43:15 +00:00
|
|
|
// Lock this entire operation
|
2022-06-25 14:57:33 +00:00
|
|
|
let mut inner = self.inner.write();
|
2022-05-03 20:43:15 +00:00
|
|
|
|
|
|
|
// Look up existing entry
|
|
|
|
let idx = Self::find_bucket_index(&*inner, node_id);
|
|
|
|
let noderef = {
|
2022-06-25 14:57:33 +00:00
|
|
|
let bucket = &inner.buckets[idx];
|
|
|
|
let entry = bucket.entry(&node_id);
|
2022-05-03 20:43:15 +00:00
|
|
|
entry.map(|e| NodeRef::new(self.clone(), node_id, e, None))
|
|
|
|
};
|
|
|
|
|
|
|
|
// If one doesn't exist, insert into bucket, possibly evicting a bucket member
|
|
|
|
let noderef = match noderef {
|
2021-11-22 16:28:30 +00:00
|
|
|
None => {
|
|
|
|
// Make new entry
|
2022-05-03 20:43:15 +00:00
|
|
|
inner.bucket_entry_count += 1;
|
2022-05-24 21:13:52 +00:00
|
|
|
let cnt = inner.bucket_entry_count;
|
2022-05-03 20:43:15 +00:00
|
|
|
let bucket = &mut inner.buckets[idx];
|
|
|
|
let nr = bucket.add_entry(node_id);
|
|
|
|
|
|
|
|
// Update the entry
|
2022-06-25 14:57:33 +00:00
|
|
|
let entry = bucket.entry(&node_id).unwrap();
|
|
|
|
entry.with_mut(update_func);
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
// Kick the bucket
|
2022-06-25 14:57:33 +00:00
|
|
|
inner.kick_queue.insert(idx);
|
2022-07-06 01:21:58 +00:00
|
|
|
log_rtab!(debug "Routing table now has {} nodes, {} live", cnt, Self::get_entry_count(&mut *inner, BucketEntryState::Unreliable));
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
nr
|
|
|
|
}
|
2022-05-03 20:43:15 +00:00
|
|
|
Some(nr) => {
|
|
|
|
// Update the entry
|
|
|
|
let bucket = &mut inner.buckets[idx];
|
2022-06-25 14:57:33 +00:00
|
|
|
let entry = bucket.entry(&node_id).unwrap();
|
|
|
|
entry.with_mut(|e| {
|
|
|
|
update_func(e);
|
|
|
|
});
|
2022-05-03 20:43:15 +00:00
|
|
|
|
|
|
|
nr
|
|
|
|
}
|
2021-11-22 16:28:30 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
Ok(noderef)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn lookup_node_ref(&self, node_id: DHTKey) -> Option<NodeRef> {
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2021-11-22 16:28:30 +00:00
|
|
|
let idx = Self::find_bucket_index(&*inner, node_id);
|
2022-06-25 14:57:33 +00:00
|
|
|
let bucket = &inner.buckets[idx];
|
2021-11-26 14:54:38 +00:00
|
|
|
bucket
|
2022-06-25 14:57:33 +00:00
|
|
|
.entry(&node_id)
|
2022-04-19 15:23:44 +00:00
|
|
|
.map(|e| NodeRef::new(self.clone(), node_id, e, None))
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Shortcut function to add a node to our routing table if it doesn't exist
|
|
|
|
// and add the dial info we have for it, since that's pretty common
|
2022-05-11 01:49:42 +00:00
|
|
|
pub fn register_node_with_signed_node_info(
|
2021-11-22 16:28:30 +00:00
|
|
|
&self,
|
|
|
|
node_id: DHTKey,
|
2022-05-11 01:49:42 +00:00
|
|
|
signed_node_info: SignedNodeInfo,
|
2022-07-10 21:36:50 +00:00
|
|
|
) -> EyreResult<NodeRef> {
|
2022-05-11 13:37:54 +00:00
|
|
|
// validate signed node info is not something malicious
|
|
|
|
if node_id == self.node_id() {
|
2022-07-10 21:36:50 +00:00
|
|
|
bail!("can't register own node id in routing table");
|
2022-05-11 13:37:54 +00:00
|
|
|
}
|
|
|
|
if let Some(rpi) = &signed_node_info.node_info.relay_peer_info {
|
|
|
|
if rpi.node_id.key == node_id {
|
2022-07-10 21:36:50 +00:00
|
|
|
bail!("node can not be its own relay");
|
2022-05-11 13:37:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-03 20:43:15 +00:00
|
|
|
let nr = self.create_node_ref(node_id, |e| {
|
2022-05-11 01:49:42 +00:00
|
|
|
e.update_node_info(signed_node_info);
|
2021-11-22 16:28:30 +00:00
|
|
|
})?;
|
|
|
|
|
|
|
|
Ok(nr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shortcut function to add a node to our routing table if it doesn't exist
|
|
|
|
// and add the last peer address we have for it, since that's pretty common
|
|
|
|
pub fn register_node_with_existing_connection(
|
|
|
|
&self,
|
|
|
|
node_id: DHTKey,
|
|
|
|
descriptor: ConnectionDescriptor,
|
|
|
|
timestamp: u64,
|
2022-07-10 21:36:50 +00:00
|
|
|
) -> EyreResult<NodeRef> {
|
2022-05-03 20:43:15 +00:00
|
|
|
let nr = self.create_node_ref(node_id, |e| {
|
2021-11-22 16:28:30 +00:00
|
|
|
// set the most recent node address for connection finding and udp replies
|
|
|
|
e.set_last_connection(descriptor, timestamp);
|
2022-05-03 20:43:15 +00:00
|
|
|
})?;
|
2021-11-22 16:28:30 +00:00
|
|
|
|
|
|
|
Ok(nr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ticks about once per second
|
|
|
|
// to run tick tasks which may run at slower tick rates as configured
|
2022-07-10 21:36:50 +00:00
|
|
|
pub async fn tick(&self) -> EyreResult<()> {
|
2021-11-22 16:28:30 +00:00
|
|
|
// Do rolling transfers every ROLLING_TRANSFERS_INTERVAL_SECS secs
|
|
|
|
self.unlocked_inner.rolling_transfers_task.tick().await?;
|
|
|
|
|
2022-05-24 21:13:52 +00:00
|
|
|
// If routing table has no live entries, then add the bootstrap nodes to it
|
2022-06-25 14:57:33 +00:00
|
|
|
let live_entry_count =
|
|
|
|
Self::get_entry_count(&*self.inner.read(), BucketEntryState::Unreliable);
|
|
|
|
|
|
|
|
if live_entry_count == 0 {
|
2021-11-22 16:28:30 +00:00
|
|
|
self.unlocked_inner.bootstrap_task.tick().await?;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we still don't have enough peers, find nodes until we do
|
|
|
|
let min_peer_count = {
|
|
|
|
let c = self.config.get();
|
|
|
|
c.network.dht.min_peer_count as usize
|
|
|
|
};
|
2022-06-25 14:57:33 +00:00
|
|
|
if live_entry_count < min_peer_count {
|
2021-11-22 16:28:30 +00:00
|
|
|
self.unlocked_inner.peer_minimum_refresh_task.tick().await?;
|
|
|
|
}
|
2022-06-25 14:57:33 +00:00
|
|
|
|
2021-11-22 16:28:30 +00:00
|
|
|
// Ping validate some nodes to groom the table
|
|
|
|
self.unlocked_inner.ping_validator_task.tick().await?;
|
|
|
|
|
2022-06-25 14:57:33 +00:00
|
|
|
// Kick buckets task
|
|
|
|
let kick_bucket_queue_count = { self.inner.read().kick_queue.len() };
|
|
|
|
if kick_bucket_queue_count > 0 {
|
|
|
|
self.unlocked_inner.kick_buckets_task.tick().await?;
|
|
|
|
}
|
2022-04-07 13:55:09 +00:00
|
|
|
|
2021-11-22 16:28:30 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2021-11-26 14:54:38 +00:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
// Stats Accounting
|
2022-04-18 22:49:33 +00:00
|
|
|
pub fn stats_question_sent(
|
|
|
|
&self,
|
|
|
|
node_ref: NodeRef,
|
|
|
|
ts: u64,
|
|
|
|
bytes: u64,
|
|
|
|
expects_answer: bool,
|
|
|
|
) {
|
2022-03-19 22:19:40 +00:00
|
|
|
self.inner
|
2022-06-25 14:57:33 +00:00
|
|
|
.write()
|
2022-03-19 22:19:40 +00:00
|
|
|
.self_transfer_stats_accounting
|
|
|
|
.add_up(bytes);
|
2022-06-25 14:57:33 +00:00
|
|
|
node_ref.operate_mut(|e| {
|
2022-04-18 22:49:33 +00:00
|
|
|
e.question_sent(ts, bytes, expects_answer);
|
2021-11-26 14:54:38 +00:00
|
|
|
})
|
|
|
|
}
|
2022-03-20 14:52:03 +00:00
|
|
|
pub fn stats_question_rcvd(&self, node_ref: NodeRef, ts: u64, bytes: u64) {
|
2022-03-19 22:19:40 +00:00
|
|
|
self.inner
|
2022-06-25 14:57:33 +00:00
|
|
|
.write()
|
2022-03-19 22:19:40 +00:00
|
|
|
.self_transfer_stats_accounting
|
|
|
|
.add_down(bytes);
|
2022-06-25 14:57:33 +00:00
|
|
|
node_ref.operate_mut(|e| {
|
2021-11-26 14:54:38 +00:00
|
|
|
e.question_rcvd(ts, bytes);
|
|
|
|
})
|
|
|
|
}
|
2022-05-24 21:13:52 +00:00
|
|
|
pub fn stats_answer_sent(&self, node_ref: NodeRef, bytes: u64) {
|
2022-03-19 22:19:40 +00:00
|
|
|
self.inner
|
2022-06-25 14:57:33 +00:00
|
|
|
.write()
|
2022-03-19 22:19:40 +00:00
|
|
|
.self_transfer_stats_accounting
|
|
|
|
.add_up(bytes);
|
2022-06-25 14:57:33 +00:00
|
|
|
node_ref.operate_mut(|e| {
|
2022-05-24 21:13:52 +00:00
|
|
|
e.answer_sent(bytes);
|
2021-11-26 14:54:38 +00:00
|
|
|
})
|
|
|
|
}
|
2022-03-20 14:52:03 +00:00
|
|
|
pub fn stats_answer_rcvd(&self, node_ref: NodeRef, send_ts: u64, recv_ts: u64, bytes: u64) {
|
2022-06-25 14:57:33 +00:00
|
|
|
{
|
|
|
|
let mut inner = self.inner.write();
|
|
|
|
inner.self_transfer_stats_accounting.add_down(bytes);
|
|
|
|
inner
|
|
|
|
.self_latency_stats_accounting
|
|
|
|
.record_latency(recv_ts - send_ts);
|
|
|
|
}
|
|
|
|
node_ref.operate_mut(|e| {
|
2021-11-26 14:54:38 +00:00
|
|
|
e.answer_rcvd(send_ts, recv_ts, bytes);
|
|
|
|
})
|
|
|
|
}
|
2022-05-24 21:13:52 +00:00
|
|
|
pub fn stats_question_lost(&self, node_ref: NodeRef) {
|
2022-06-25 14:57:33 +00:00
|
|
|
node_ref.operate_mut(|e| {
|
2022-05-24 21:13:52 +00:00
|
|
|
e.question_lost();
|
|
|
|
})
|
|
|
|
}
|
|
|
|
pub fn stats_failed_to_send(&self, node_ref: NodeRef, ts: u64, expects_answer: bool) {
|
2022-06-25 14:57:33 +00:00
|
|
|
node_ref.operate_mut(|e| {
|
2022-05-24 21:13:52 +00:00
|
|
|
e.failed_to_send(ts, expects_answer);
|
2021-11-26 14:54:38 +00:00
|
|
|
})
|
|
|
|
}
|
2022-03-24 14:14:50 +00:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
// Routing Table Health Metrics
|
|
|
|
|
|
|
|
pub fn get_routing_table_health(&self) -> RoutingTableHealth {
|
|
|
|
let mut health = RoutingTableHealth::default();
|
|
|
|
let cur_ts = intf::get_timestamp();
|
2022-06-25 14:57:33 +00:00
|
|
|
let inner = self.inner.read();
|
2022-03-24 14:14:50 +00:00
|
|
|
for bucket in &inner.buckets {
|
2022-06-25 14:57:33 +00:00
|
|
|
for (_, v) in bucket.entries() {
|
|
|
|
match v.with(|e| e.state(cur_ts)) {
|
2022-03-24 14:14:50 +00:00
|
|
|
BucketEntryState::Reliable => {
|
|
|
|
health.reliable_entry_count += 1;
|
|
|
|
}
|
|
|
|
BucketEntryState::Unreliable => {
|
|
|
|
health.unreliable_entry_count += 1;
|
|
|
|
}
|
|
|
|
BucketEntryState::Dead => {
|
|
|
|
health.dead_entry_count += 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
health
|
|
|
|
}
|
2021-11-22 16:28:30 +00:00
|
|
|
}
|