mirror of
https://github.com/lightningdevkit/rust-lightning.git
synced 2025-02-24 23:08:36 +01:00
Use a message buffer abstraction in OnionMessenger
Onion messages are buffered for sending to the next node. Since the network has limited adoption, connecting directly to a peer may be necessary. Add an OnionMessageBuffer abstraction that can differentiate between connected peers and those are pending a connection. This allows for buffering messages before a connection is established and applying different buffer policies for peers yet to be connected.
This commit is contained in:
parent
37150b4d69
commit
79f212b70a
2 changed files with 104 additions and 37 deletions
|
@ -269,7 +269,7 @@ mod tests {
|
||||||
"Received an onion message with path_id None and a reply_path: Custom(TestCustomMessage)"
|
"Received an onion message with path_id None and a reply_path: Custom(TestCustomMessage)"
|
||||||
.to_string())), Some(&1));
|
.to_string())), Some(&1));
|
||||||
assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(),
|
assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(),
|
||||||
"Sending onion message: TestCustomMessage".to_string())), Some(&1));
|
"Sending onion message when responding to Custom onion message with path_id None: TestCustomMessage".to_string())), Some(&1));
|
||||||
}
|
}
|
||||||
|
|
||||||
let two_unblinded_hops_om = "\
|
let two_unblinded_hops_om = "\
|
||||||
|
|
|
@ -150,13 +150,70 @@ where
|
||||||
entropy_source: ES,
|
entropy_source: ES,
|
||||||
node_signer: NS,
|
node_signer: NS,
|
||||||
logger: L,
|
logger: L,
|
||||||
pending_messages: Mutex<HashMap<PublicKey, VecDeque<OnionMessage>>>,
|
message_buffers: Mutex<HashMap<PublicKey, OnionMessageBuffer>>,
|
||||||
secp_ctx: Secp256k1<secp256k1::All>,
|
secp_ctx: Secp256k1<secp256k1::All>,
|
||||||
message_router: MR,
|
message_router: MR,
|
||||||
offers_handler: OMH,
|
offers_handler: OMH,
|
||||||
custom_handler: CMH,
|
custom_handler: CMH,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// [`OnionMessage`]s buffered to be sent.
|
||||||
|
enum OnionMessageBuffer {
|
||||||
|
/// Messages for a node connected as a peer.
|
||||||
|
ConnectedPeer(VecDeque<OnionMessage>),
|
||||||
|
|
||||||
|
/// Messages for a node that is not yet connected.
|
||||||
|
PendingConnection(VecDeque<OnionMessage>),
|
||||||
|
}
|
||||||
|
|
||||||
|
impl OnionMessageBuffer {
|
||||||
|
fn pending_messages(&self) -> &VecDeque<OnionMessage> {
|
||||||
|
match self {
|
||||||
|
OnionMessageBuffer::ConnectedPeer(pending_messages) => pending_messages,
|
||||||
|
OnionMessageBuffer::PendingConnection(pending_messages) => pending_messages,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn enqueue_message(&mut self, message: OnionMessage) {
|
||||||
|
let pending_messages = match self {
|
||||||
|
OnionMessageBuffer::ConnectedPeer(pending_messages) => pending_messages,
|
||||||
|
OnionMessageBuffer::PendingConnection(pending_messages) => pending_messages,
|
||||||
|
};
|
||||||
|
|
||||||
|
pending_messages.push_back(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
fn dequeue_message(&mut self) -> Option<OnionMessage> {
|
||||||
|
let pending_messages = match self {
|
||||||
|
OnionMessageBuffer::ConnectedPeer(pending_messages) => pending_messages,
|
||||||
|
OnionMessageBuffer::PendingConnection(pending_messages) => {
|
||||||
|
debug_assert!(false);
|
||||||
|
pending_messages
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
pending_messages.pop_front()
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
fn release_pending_messages(&mut self) -> VecDeque<OnionMessage> {
|
||||||
|
let pending_messages = match self {
|
||||||
|
OnionMessageBuffer::ConnectedPeer(pending_messages) => pending_messages,
|
||||||
|
OnionMessageBuffer::PendingConnection(pending_messages) => pending_messages,
|
||||||
|
};
|
||||||
|
|
||||||
|
core::mem::take(pending_messages)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn mark_connected(&mut self) {
|
||||||
|
if let OnionMessageBuffer::PendingConnection(pending_messages) = self {
|
||||||
|
let mut new_pending_messages = VecDeque::new();
|
||||||
|
core::mem::swap(pending_messages, &mut new_pending_messages);
|
||||||
|
*self = OnionMessageBuffer::ConnectedPeer(new_pending_messages);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// An [`OnionMessage`] for [`OnionMessenger`] to send.
|
/// An [`OnionMessage`] for [`OnionMessenger`] to send.
|
||||||
///
|
///
|
||||||
/// These are obtained when released from [`OnionMessenger`]'s handlers after which they are
|
/// These are obtained when released from [`OnionMessenger`]'s handlers after which they are
|
||||||
|
@ -502,7 +559,7 @@ where
|
||||||
OnionMessenger {
|
OnionMessenger {
|
||||||
entropy_source,
|
entropy_source,
|
||||||
node_signer,
|
node_signer,
|
||||||
pending_messages: Mutex::new(HashMap::new()),
|
message_buffers: Mutex::new(HashMap::new()),
|
||||||
secp_ctx,
|
secp_ctx,
|
||||||
logger,
|
logger,
|
||||||
message_router,
|
message_router,
|
||||||
|
@ -518,21 +575,23 @@ where
|
||||||
pub fn send_onion_message<T: OnionMessageContents>(
|
pub fn send_onion_message<T: OnionMessageContents>(
|
||||||
&self, path: OnionMessagePath, contents: T, reply_path: Option<BlindedPath>
|
&self, path: OnionMessagePath, contents: T, reply_path: Option<BlindedPath>
|
||||||
) -> Result<(), SendError> {
|
) -> Result<(), SendError> {
|
||||||
|
|
||||||
log_trace!(self.logger, "Sending onion message: {:?}", contents);
|
log_trace!(self.logger, "Sending onion message: {:?}", contents);
|
||||||
|
|
||||||
let (first_node_id, onion_msg) = create_onion_message(
|
let (first_node_id, onion_message) = create_onion_message(
|
||||||
&self.entropy_source, &self.node_signer, &self.secp_ctx, path, contents, reply_path
|
&self.entropy_source, &self.node_signer, &self.secp_ctx, path, contents, reply_path
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
let mut pending_per_peer_msgs = self.pending_messages.lock().unwrap();
|
let mut message_buffers = self.message_buffers.lock().unwrap();
|
||||||
if outbound_buffer_full(&first_node_id, &pending_per_peer_msgs) { return Err(SendError::BufferFull) }
|
if outbound_buffer_full(&first_node_id, &message_buffers) {
|
||||||
match pending_per_peer_msgs.entry(first_node_id) {
|
return Err(SendError::BufferFull);
|
||||||
|
}
|
||||||
|
|
||||||
|
match message_buffers.entry(first_node_id) {
|
||||||
hash_map::Entry::Vacant(_) => Err(SendError::InvalidFirstHop),
|
hash_map::Entry::Vacant(_) => Err(SendError::InvalidFirstHop),
|
||||||
hash_map::Entry::Occupied(mut e) => {
|
hash_map::Entry::Occupied(mut e) => {
|
||||||
e.get_mut().push_back(onion_msg);
|
e.get_mut().enqueue_message(onion_message);
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -565,7 +624,7 @@ where
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
let peers = self.pending_messages.lock().unwrap().keys().copied().collect();
|
let peers = self.message_buffers.lock().unwrap().keys().copied().collect();
|
||||||
let path = match self.message_router.find_path(sender, peers, destination) {
|
let path = match self.message_router.find_path(sender, peers, destination) {
|
||||||
Ok(path) => path,
|
Ok(path) => path,
|
||||||
Err(()) => {
|
Err(()) => {
|
||||||
|
@ -578,30 +637,29 @@ where
|
||||||
|
|
||||||
if let Err(e) = self.send_onion_message(path, contents, reply_path) {
|
if let Err(e) = self.send_onion_message(path, contents, reply_path) {
|
||||||
log_trace!(self.logger, "Failed sending onion message {}: {:?}", log_suffix, e);
|
log_trace!(self.logger, "Failed sending onion message {}: {:?}", log_suffix, e);
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
pub(super) fn release_pending_msgs(&self) -> HashMap<PublicKey, VecDeque<OnionMessage>> {
|
pub(super) fn release_pending_msgs(&self) -> HashMap<PublicKey, VecDeque<OnionMessage>> {
|
||||||
let mut pending_msgs = self.pending_messages.lock().unwrap();
|
let mut message_buffers = self.message_buffers.lock().unwrap();
|
||||||
let mut msgs = HashMap::new();
|
let mut msgs = HashMap::new();
|
||||||
// We don't want to disconnect the peers by removing them entirely from the original map, so we
|
// We don't want to disconnect the peers by removing them entirely from the original map, so we
|
||||||
// swap the pending message buffers individually.
|
// release the pending message buffers individually.
|
||||||
for (peer_node_id, pending_messages) in &mut *pending_msgs {
|
for (peer_node_id, buffer) in &mut *message_buffers {
|
||||||
msgs.insert(*peer_node_id, core::mem::take(pending_messages));
|
msgs.insert(*peer_node_id, buffer.release_pending_messages());
|
||||||
}
|
}
|
||||||
msgs
|
msgs
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn outbound_buffer_full(peer_node_id: &PublicKey, buffer: &HashMap<PublicKey, VecDeque<OnionMessage>>) -> bool {
|
fn outbound_buffer_full(peer_node_id: &PublicKey, buffer: &HashMap<PublicKey, OnionMessageBuffer>) -> bool {
|
||||||
const MAX_TOTAL_BUFFER_SIZE: usize = (1 << 20) * 128;
|
const MAX_TOTAL_BUFFER_SIZE: usize = (1 << 20) * 128;
|
||||||
const MAX_PER_PEER_BUFFER_SIZE: usize = (1 << 10) * 256;
|
const MAX_PER_PEER_BUFFER_SIZE: usize = (1 << 10) * 256;
|
||||||
let mut total_buffered_bytes = 0;
|
let mut total_buffered_bytes = 0;
|
||||||
let mut peer_buffered_bytes = 0;
|
let mut peer_buffered_bytes = 0;
|
||||||
for (pk, peer_buf) in buffer {
|
for (pk, peer_buf) in buffer {
|
||||||
for om in peer_buf {
|
for om in peer_buf.pending_messages() {
|
||||||
let om_len = om.serialized_length();
|
let om_len = om.serialized_length();
|
||||||
if pk == peer_node_id {
|
if pk == peer_node_id {
|
||||||
peer_buffered_bytes += om_len;
|
peer_buffered_bytes += om_len;
|
||||||
|
@ -660,24 +718,28 @@ where
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
Ok(PeeledOnion::Forward(next_node_id, onion_message)) => {
|
Ok(PeeledOnion::Forward(next_node_id, onion_message)) => {
|
||||||
let mut pending_per_peer_msgs = self.pending_messages.lock().unwrap();
|
let mut message_buffers = self.message_buffers.lock().unwrap();
|
||||||
if outbound_buffer_full(&next_node_id, &pending_per_peer_msgs) {
|
if outbound_buffer_full(&next_node_id, &message_buffers) {
|
||||||
log_trace!(self.logger, "Dropping forwarded onion message to peer {:?}: outbound buffer full", next_node_id);
|
log_trace!(self.logger, "Dropping forwarded onion message to peer {:?}: outbound buffer full", next_node_id);
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(fuzzing)]
|
#[cfg(fuzzing)]
|
||||||
pending_per_peer_msgs.entry(next_node_id).or_insert_with(VecDeque::new);
|
message_buffers
|
||||||
|
.entry(next_node_id)
|
||||||
|
.or_insert_with(|| OnionMessageBuffer::ConnectedPeer(VecDeque::new()));
|
||||||
|
|
||||||
match pending_per_peer_msgs.entry(next_node_id) {
|
match message_buffers.entry(next_node_id) {
|
||||||
hash_map::Entry::Vacant(_) => {
|
hash_map::Entry::Occupied(mut e) if matches!(
|
||||||
|
e.get(), OnionMessageBuffer::ConnectedPeer(..)
|
||||||
|
) => {
|
||||||
|
e.get_mut().enqueue_message(onion_message);
|
||||||
|
log_trace!(self.logger, "Forwarding an onion message to peer {}", next_node_id);
|
||||||
|
},
|
||||||
|
_ => {
|
||||||
log_trace!(self.logger, "Dropping forwarded onion message to disconnected peer {:?}", next_node_id);
|
log_trace!(self.logger, "Dropping forwarded onion message to disconnected peer {:?}", next_node_id);
|
||||||
return
|
return
|
||||||
},
|
},
|
||||||
hash_map::Entry::Occupied(mut e) => {
|
|
||||||
e.get_mut().push_back(onion_message);
|
|
||||||
log_trace!(self.logger, "Forwarding an onion message to peer {}", next_node_id);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
|
@ -688,15 +750,22 @@ where
|
||||||
|
|
||||||
fn peer_connected(&self, their_node_id: &PublicKey, init: &msgs::Init, _inbound: bool) -> Result<(), ()> {
|
fn peer_connected(&self, their_node_id: &PublicKey, init: &msgs::Init, _inbound: bool) -> Result<(), ()> {
|
||||||
if init.features.supports_onion_messages() {
|
if init.features.supports_onion_messages() {
|
||||||
let mut peers = self.pending_messages.lock().unwrap();
|
self.message_buffers.lock().unwrap()
|
||||||
peers.insert(their_node_id.clone(), VecDeque::new());
|
.entry(*their_node_id)
|
||||||
|
.or_insert_with(|| OnionMessageBuffer::ConnectedPeer(VecDeque::new()))
|
||||||
|
.mark_connected();
|
||||||
|
} else {
|
||||||
|
self.message_buffers.lock().unwrap().remove(their_node_id);
|
||||||
}
|
}
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
fn peer_disconnected(&self, their_node_id: &PublicKey) {
|
fn peer_disconnected(&self, their_node_id: &PublicKey) {
|
||||||
let mut pending_msgs = self.pending_messages.lock().unwrap();
|
match self.message_buffers.lock().unwrap().remove(their_node_id) {
|
||||||
pending_msgs.remove(their_node_id);
|
Some(OnionMessageBuffer::ConnectedPeer(..)) => {},
|
||||||
|
_ => debug_assert!(false),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn provided_node_features(&self) -> NodeFeatures {
|
fn provided_node_features(&self) -> NodeFeatures {
|
||||||
|
@ -737,11 +806,9 @@ where
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
let mut pending_msgs = self.pending_messages.lock().unwrap();
|
self.message_buffers.lock().unwrap()
|
||||||
if let Some(msgs) = pending_msgs.get_mut(&peer_node_id) {
|
.get_mut(&peer_node_id)
|
||||||
return msgs.pop_front()
|
.and_then(|buffer| buffer.dequeue_message())
|
||||||
}
|
|
||||||
None
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue