Merge pull request #2905 from tnull/2024-02-expose-init-features

Refactor `PeerManager::get_peer_node_ids` in favor of `list_peers`/`peer_by_node_id` returning additional information
This commit is contained in:
Matt Corallo 2024-02-22 00:06:30 +00:00 committed by GitHub
commit 716269e1e8
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 77 additions and 19 deletions

View file

@ -737,10 +737,10 @@ pub fn do_test(mut data: &[u8], logger: &Arc<dyn Logger>) {
}, },
// 15, 16, 17, 18 is above // 15, 16, 17, 18 is above
19 => { 19 => {
let mut list = loss_detector.handler.get_peer_node_ids(); let mut list = loss_detector.handler.list_peers();
list.sort_by_key(|v| v.0); list.sort_by_key(|v| v.counterparty_node_id);
if let Some((id, _)) = list.get(0) { if let Some(peer_details) = list.get(0) {
loss_detector.handler.disconnect_by_node_id(*id); loss_detector.handler.disconnect_by_node_id(peer_details.counterparty_node_id);
} }
}, },
20 => loss_detector.handler.disconnect_all_peers(), 20 => loss_detector.handler.disconnect_all_peers(),

View file

@ -431,6 +431,26 @@ pub trait SocketDescriptor : cmp::Eq + hash::Hash + Clone {
fn disconnect_socket(&mut self); fn disconnect_socket(&mut self);
} }
/// Details of a connected peer as returned by [`PeerManager::list_peers`].
pub struct PeerDetails {
/// The node id of the peer.
///
/// For outbound connections, this [`PublicKey`] will be the same as the `their_node_id` parameter
/// passed in to [`PeerManager::new_outbound_connection`].
pub counterparty_node_id: PublicKey,
/// The socket address the peer provided in the initial handshake.
///
/// Will only be `Some` if an address had been previously provided to
/// [`PeerManager::new_outbound_connection`] or [`PeerManager::new_inbound_connection`].
pub socket_address: Option<SocketAddress>,
/// The features the peer provided in the initial handshake.
pub init_features: InitFeatures,
/// Indicates the direction of the peer connection.
///
/// Will be `true` for inbound connections, and `false` for outbound connections.
pub is_inbound_connection: bool,
}
/// Error for PeerManager errors. If you get one of these, you must disconnect the socket and /// Error for PeerManager errors. If you get one of these, you must disconnect the socket and
/// generate no further read_event/write_buffer_space_avail/socket_disconnected calls for the /// generate no further read_event/write_buffer_space_avail/socket_disconnected calls for the
/// descriptor. /// descriptor.
@ -958,27 +978,60 @@ impl<Descriptor: SocketDescriptor, CM: Deref, RM: Deref, OM: Deref, L: Deref, CM
} }
} }
/// Get a list of tuples mapping from node id to network addresses for peers which have /// Returns a list of [`PeerDetails`] for connected peers that have completed the initial
/// completed the initial handshake. /// handshake.
/// pub fn list_peers(&self) -> Vec<PeerDetails> {
/// For outbound connections, the [`PublicKey`] will be the same as the `their_node_id` parameter
/// passed in to [`Self::new_outbound_connection`], however entries will only appear once the initial
/// handshake has completed and we are sure the remote peer has the private key for the given
/// [`PublicKey`].
///
/// The returned `Option`s will only be `Some` if an address had been previously given via
/// [`Self::new_outbound_connection`] or [`Self::new_inbound_connection`].
pub fn get_peer_node_ids(&self) -> Vec<(PublicKey, Option<SocketAddress>)> {
let peers = self.peers.read().unwrap(); let peers = self.peers.read().unwrap();
peers.values().filter_map(|peer_mutex| { peers.values().filter_map(|peer_mutex| {
let p = peer_mutex.lock().unwrap(); let p = peer_mutex.lock().unwrap();
if !p.handshake_complete() { if !p.handshake_complete() {
return None; return None;
} }
Some((p.their_node_id.unwrap().0, p.their_socket_address.clone())) let details = PeerDetails {
// unwrap safety: their_node_id is guaranteed to be `Some` after the handshake
// completed.
counterparty_node_id: p.their_node_id.unwrap().0,
socket_address: p.their_socket_address.clone(),
// unwrap safety: their_features is guaranteed to be `Some` after the handshake
// completed.
init_features: p.their_features.clone().unwrap(),
is_inbound_connection: p.inbound_connection,
};
Some(details)
}).collect() }).collect()
} }
/// Returns the [`PeerDetails`] of a connected peer that has completed the initial handshake.
///
/// Will return `None` if the peer is unknown or it hasn't completed the initial handshake.
pub fn peer_by_node_id(&self, their_node_id: &PublicKey) -> Option<PeerDetails> {
let peers = self.peers.read().unwrap();
peers.values().find_map(|peer_mutex| {
let p = peer_mutex.lock().unwrap();
if !p.handshake_complete() {
return None;
}
// unwrap safety: their_node_id is guaranteed to be `Some` after the handshake
// completed.
let counterparty_node_id = p.their_node_id.unwrap().0;
if counterparty_node_id != *their_node_id {
return None;
}
let details = PeerDetails {
counterparty_node_id,
socket_address: p.their_socket_address.clone(),
// unwrap safety: their_features is guaranteed to be `Some` after the handshake
// completed.
init_features: p.their_features.clone().unwrap(),
is_inbound_connection: p.inbound_connection,
};
Some(details)
})
}
fn get_ephemeral_key(&self) -> SecretKey { fn get_ephemeral_key(&self) -> SecretKey {
let mut ephemeral_hash = self.ephemeral_key_midstate.clone(); let mut ephemeral_hash = self.ephemeral_key_midstate.clone();
let counter = self.peer_counter.get_increment(); let counter = self.peer_counter.get_increment();
@ -2746,6 +2799,8 @@ mod tests {
}; };
let addr_a = SocketAddress::TcpIpV4{addr: [127, 0, 0, 1], port: 1000}; let addr_a = SocketAddress::TcpIpV4{addr: [127, 0, 0, 1], port: 1000};
let id_b = peer_b.node_signer.get_node_id(Recipient::Node).unwrap(); let id_b = peer_b.node_signer.get_node_id(Recipient::Node).unwrap();
let features_a = peer_a.init_features(&id_b);
let features_b = peer_b.init_features(&id_a);
let mut fd_b = FileDescriptor { let mut fd_b = FileDescriptor {
fd: 1, outbound_data: Arc::new(Mutex::new(Vec::new())), fd: 1, outbound_data: Arc::new(Mutex::new(Vec::new())),
disconnect: Arc::new(AtomicBool::new(false)), disconnect: Arc::new(AtomicBool::new(false)),
@ -2767,9 +2822,12 @@ mod tests {
let a_data = fd_a.outbound_data.lock().unwrap().split_off(0); let a_data = fd_a.outbound_data.lock().unwrap().split_off(0);
assert_eq!(peer_b.read_event(&mut fd_b, &a_data).unwrap(), false); assert_eq!(peer_b.read_event(&mut fd_b, &a_data).unwrap(), false);
assert!(peer_a.get_peer_node_ids().contains(&(id_b, Some(addr_b)))); assert_eq!(peer_a.peer_by_node_id(&id_b).unwrap().counterparty_node_id, id_b);
assert!(peer_b.get_peer_node_ids().contains(&(id_a, Some(addr_a)))); assert_eq!(peer_a.peer_by_node_id(&id_b).unwrap().socket_address, Some(addr_b));
assert_eq!(peer_a.peer_by_node_id(&id_b).unwrap().init_features, features_b);
assert_eq!(peer_b.peer_by_node_id(&id_a).unwrap().counterparty_node_id, id_a);
assert_eq!(peer_b.peer_by_node_id(&id_a).unwrap().socket_address, Some(addr_a));
assert_eq!(peer_b.peer_by_node_id(&id_a).unwrap().init_features, features_a);
(fd_a.clone(), fd_b.clone()) (fd_a.clone(), fd_b.clone())
} }