Unverified Commit 5fae68e6 authored by Andronik Ordian's avatar Andronik Ordian Committed by GitHub
Browse files

network-bridge: remove action_sink abstraction (#3308)

* network-bridge: remove action_sink abstraction

* another wtf

* filter out event stream

* Revert "filter out event stream"

This reverts commit 63bd8f5d.

* retain cleanup though
parent 122734f1
Pipeline #143240 passed with stages
in 35 minutes and 52 seconds
...@@ -49,7 +49,6 @@ use polkadot_node_subsystem_util::metrics::{self, prometheus}; ...@@ -49,7 +49,6 @@ use polkadot_node_subsystem_util::metrics::{self, prometheus};
pub use polkadot_node_network_protocol::peer_set::{peer_sets_info, IsAuthority}; pub use polkadot_node_network_protocol::peer_set::{peer_sets_info, IsAuthority};
use std::collections::{HashMap, hash_map, HashSet}; use std::collections::{HashMap, hash_map, HashSet};
use std::iter::ExactSizeIterator;
use std::sync::Arc; use std::sync::Arc;
mod validator_discovery; mod validator_discovery;
...@@ -413,7 +412,7 @@ where ...@@ -413,7 +412,7 @@ where
&shared, &shared,
finalized_number, finalized_number,
&metrics, &metrics,
).await?; );
} }
} }
} }
...@@ -443,7 +442,7 @@ where ...@@ -443,7 +442,7 @@ where
action = "ReportPeer" action = "ReportPeer"
); );
} }
network_service.report_peer(peer, rep).await? network_service.report_peer(peer, rep);
} }
NetworkBridgeMessage::DisconnectPeer(peer, peer_set) => { NetworkBridgeMessage::DisconnectPeer(peer, peer_set) => {
tracing::trace!( tracing::trace!(
...@@ -452,7 +451,7 @@ where ...@@ -452,7 +451,7 @@ where
?peer, ?peer,
peer_set = ?peer_set, peer_set = ?peer_set,
); );
network_service.disconnect_peer(peer, peer_set).await?; network_service.disconnect_peer(peer, peer_set);
} }
NetworkBridgeMessage::SendValidationMessage(peers, msg) => { NetworkBridgeMessage::SendValidationMessage(peers, msg) => {
tracing::trace!( tracing::trace!(
...@@ -467,7 +466,7 @@ where ...@@ -467,7 +466,7 @@ where
PeerSet::Validation, PeerSet::Validation,
WireMessage::ProtocolMessage(msg), WireMessage::ProtocolMessage(msg),
&metrics, &metrics,
).await? );
} }
NetworkBridgeMessage::SendValidationMessages(msgs) => { NetworkBridgeMessage::SendValidationMessages(msgs) => {
tracing::trace!( tracing::trace!(
...@@ -483,7 +482,7 @@ where ...@@ -483,7 +482,7 @@ where
PeerSet::Validation, PeerSet::Validation,
WireMessage::ProtocolMessage(msg), WireMessage::ProtocolMessage(msg),
&metrics, &metrics,
).await? );
} }
} }
NetworkBridgeMessage::SendCollationMessage(peers, msg) => { NetworkBridgeMessage::SendCollationMessage(peers, msg) => {
...@@ -499,7 +498,7 @@ where ...@@ -499,7 +498,7 @@ where
PeerSet::Collation, PeerSet::Collation,
WireMessage::ProtocolMessage(msg), WireMessage::ProtocolMessage(msg),
&metrics, &metrics,
).await? );
} }
NetworkBridgeMessage::SendCollationMessages(msgs) => { NetworkBridgeMessage::SendCollationMessages(msgs) => {
tracing::trace!( tracing::trace!(
...@@ -515,7 +514,7 @@ where ...@@ -515,7 +514,7 @@ where
PeerSet::Collation, PeerSet::Collation,
WireMessage::ProtocolMessage(msg), WireMessage::ProtocolMessage(msg),
&metrics, &metrics,
).await? );
} }
} }
NetworkBridgeMessage::SendRequests(reqs, if_disconnected) => { NetworkBridgeMessage::SendRequests(reqs, if_disconnected) => {
...@@ -595,15 +594,16 @@ where ...@@ -595,15 +594,16 @@ where
async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
mut sender: impl SubsystemSender, mut sender: impl SubsystemSender,
mut network_service: impl Network, mut network_service: impl Network,
mut network_stream: BoxStream<'static, NetworkEvent>, network_stream: BoxStream<'static, NetworkEvent>,
mut authority_discovery_service: AD, mut authority_discovery_service: AD,
mut request_multiplexer: RequestMultiplexer, mut request_multiplexer: RequestMultiplexer,
metrics: Metrics, metrics: Metrics,
shared: Shared, shared: Shared,
) -> Result<(), UnexpectedAbort> { ) -> Result<(), UnexpectedAbort> {
let mut network_stream = network_stream.fuse();
loop { loop {
futures::select! { futures::select! {
network_event = network_stream.next().fuse() => match network_event { network_event = network_stream.next() => match network_event {
None => return Err(UnexpectedAbort::EventStreamConcluded), None => return Err(UnexpectedAbort::EventStreamConcluded),
Some(NetworkEvent::Dht(_)) Some(NetworkEvent::Dht(_))
| Some(NetworkEvent::SyncConnected { .. }) | Some(NetworkEvent::SyncConnected { .. })
...@@ -668,7 +668,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -668,7 +668,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
local_view, local_view,
), ),
&metrics, &metrics,
).await?; );
} }
PeerSet::Collation => { PeerSet::Collation => {
dispatch_collation_events_to_all( dispatch_collation_events_to_all(
...@@ -690,7 +690,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -690,7 +690,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
local_view, local_view,
), ),
&metrics, &metrics,
).await?; );
} }
} }
} }
...@@ -754,7 +754,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -754,7 +754,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
action = "ReportPeer" action = "ReportPeer"
); );
network_service.report_peer(remote, MALFORMED_MESSAGE_COST).await?; network_service.report_peer(remote, MALFORMED_MESSAGE_COST);
continue; continue;
} }
Ok(v) => v, Ok(v) => v,
...@@ -778,7 +778,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -778,7 +778,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
action = "ReportPeer" action = "ReportPeer"
); );
network_service.report_peer(remote, MALFORMED_MESSAGE_COST).await?; network_service.report_peer(remote, MALFORMED_MESSAGE_COST);
continue; continue;
} }
Ok(c_messages) => { Ok(c_messages) => {
...@@ -803,7 +803,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -803,7 +803,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
); );
for report in reports { for report in reports {
network_service.report_peer(remote.clone(), report).await?; network_service.report_peer(remote.clone(), report);
} }
dispatch_validation_events_to_all(events, &mut sender).await; dispatch_validation_events_to_all(events, &mut sender).await;
...@@ -819,7 +819,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -819,7 +819,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
); );
for report in reports { for report in reports {
network_service.report_peer(remote.clone(), report).await?; network_service.report_peer(remote.clone(), report);
} }
...@@ -833,10 +833,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>( ...@@ -833,10 +833,7 @@ async fn handle_network_messages<AD: validator_discovery::AuthorityDiscovery>(
req_res_event = request_multiplexer.next().fuse() => match req_res_event { req_res_event = request_multiplexer.next().fuse() => match req_res_event {
None => return Err(UnexpectedAbort::RequestStreamConcluded), None => return Err(UnexpectedAbort::RequestStreamConcluded),
Some(Err(err)) => { Some(Err(err)) => {
sender.send_message(NetworkBridgeMessage::ReportPeer( network_service.report_peer(err.peer, MALFORMED_MESSAGE_COST);
err.peer,
MALFORMED_MESSAGE_COST,
).into()).await;
} }
Some(Ok(msg)) => { Some(Ok(msg)) => {
sender.send_message(msg).await; sender.send_message(msg).await;
...@@ -953,14 +950,14 @@ fn construct_view(live_heads: impl DoubleEndedIterator<Item = Hash>, finalized_n ...@@ -953,14 +950,14 @@ fn construct_view(live_heads: impl DoubleEndedIterator<Item = Hash>, finalized_n
) )
} }
async fn update_our_view( fn update_our_view(
net: &mut impl Network, net: &mut impl Network,
ctx: &mut impl SubsystemContext<Message = NetworkBridgeMessage>, ctx: &mut impl SubsystemContext<Message = NetworkBridgeMessage>,
live_heads: &[ActivatedLeaf], live_heads: &[ActivatedLeaf],
shared: &Shared, shared: &Shared,
finalized_number: BlockNumber, finalized_number: BlockNumber,
metrics: &Metrics, metrics: &Metrics,
) -> SubsystemResult<()> { ) {
let new_view = construct_view(live_heads.iter().map(|v| v.hash), finalized_number); let new_view = construct_view(live_heads.iter().map(|v| v.hash), finalized_number);
let (validation_peers, collation_peers) = { let (validation_peers, collation_peers) = {
...@@ -973,11 +970,11 @@ async fn update_our_view( ...@@ -973,11 +970,11 @@ async fn update_our_view(
// there is no need to send anything. // there is no need to send anything.
match shared.local_view { match shared.local_view {
Some(ref v) if v.check_heads_eq(&new_view) => { Some(ref v) if v.check_heads_eq(&new_view) => {
return Ok(()) return;
} }
None if live_heads.is_empty() => { None if live_heads.is_empty() => {
shared.local_view = Some(new_view); shared.local_view = Some(new_view);
return Ok(()) return;
} }
_ => { _ => {
shared.local_view = Some(new_view.clone()); shared.local_view = Some(new_view.clone());
...@@ -996,14 +993,14 @@ async fn update_our_view( ...@@ -996,14 +993,14 @@ async fn update_our_view(
validation_peers, validation_peers,
WireMessage::ViewUpdate(new_view.clone()), WireMessage::ViewUpdate(new_view.clone()),
metrics, metrics,
).await?; );
send_collation_message( send_collation_message(
net, net,
collation_peers, collation_peers,
WireMessage::ViewUpdate(new_view), WireMessage::ViewUpdate(new_view),
metrics, metrics,
).await?; );
let our_view = OurView::new( let our_view = OurView::new(
live_heads.iter().take(MAX_VIEW_HEADS).cloned().map(|a| (a.hash, a.span)), live_heads.iter().take(MAX_VIEW_HEADS).cloned().map(|a| (a.hash, a.span)),
...@@ -1019,8 +1016,6 @@ async fn update_our_view( ...@@ -1019,8 +1016,6 @@ async fn update_our_view(
NetworkBridgeEvent::OurViewChange(our_view), NetworkBridgeEvent::OurViewChange(our_view),
ctx.sender(), ctx.sender(),
); );
Ok(())
} }
// Handle messages on a specific peer-set. The peer is expected to be connected on that // Handle messages on a specific peer-set. The peer is expected to be connected on that
...@@ -1075,30 +1070,22 @@ fn handle_peer_messages<M>( ...@@ -1075,30 +1070,22 @@ fn handle_peer_messages<M>(
(outgoing_messages, reports) (outgoing_messages, reports)
} }
async fn send_validation_message<I>( fn send_validation_message(
net: &mut impl Network, net: &mut impl Network,
peers: I, peers: Vec<PeerId>,
message: WireMessage<protocol_v1::ValidationProtocol>, message: WireMessage<protocol_v1::ValidationProtocol>,
metrics: &Metrics, metrics: &Metrics,
) -> SubsystemResult<()> ) {
where send_message(net, peers, PeerSet::Validation, message, metrics);
I: IntoIterator<Item=PeerId>,
I::IntoIter: ExactSizeIterator,
{
send_message(net, peers, PeerSet::Validation, message, metrics).await
} }
async fn send_collation_message<I>( fn send_collation_message(
net: &mut impl Network, net: &mut impl Network,
peers: I, peers: Vec<PeerId>,
message: WireMessage<protocol_v1::CollationProtocol>, message: WireMessage<protocol_v1::CollationProtocol>,
metrics: &Metrics, metrics: &Metrics,
) -> SubsystemResult<()> ) {
where send_message(net, peers, PeerSet::Collation, message, metrics)
I: IntoIterator<Item=PeerId>,
I::IntoIter: ExactSizeIterator,
{
send_message(net, peers, PeerSet::Collation, message, metrics).await
} }
......
...@@ -16,11 +16,9 @@ ...@@ -16,11 +16,9 @@
use std::borrow::Cow; use std::borrow::Cow;
use std::collections::HashSet; use std::collections::HashSet;
use std::pin::Pin;
use std::sync::Arc; use std::sync::Arc;
use async_trait::async_trait; use async_trait::async_trait;
use futures::future::BoxFuture;
use futures::prelude::*; use futures::prelude::*;
use futures::stream::BoxStream; use futures::stream::BoxStream;
...@@ -36,7 +34,6 @@ use polkadot_node_network_protocol::{ ...@@ -36,7 +34,6 @@ use polkadot_node_network_protocol::{
PeerId, UnifiedReputationChange as Rep, PeerId, UnifiedReputationChange as Rep,
}; };
use polkadot_primitives::v1::{AuthorityDiscoveryId, Block, Hash}; use polkadot_primitives::v1::{AuthorityDiscoveryId, Block, Hash};
use polkadot_subsystem::{SubsystemError, SubsystemResult};
use crate::validator_discovery::AuthorityDiscovery; use crate::validator_discovery::AuthorityDiscovery;
...@@ -47,62 +44,32 @@ use super::LOG_TARGET; ...@@ -47,62 +44,32 @@ use super::LOG_TARGET;
/// This function is only used internally by the network-bridge, which is responsible to only send /// This function is only used internally by the network-bridge, which is responsible to only send
/// messages that are compatible with the passed peer set, as that is currently not enforced by /// messages that are compatible with the passed peer set, as that is currently not enforced by
/// this function. These are messages of type `WireMessage` parameterized on the matching type. /// this function. These are messages of type `WireMessage` parameterized on the matching type.
pub(crate) async fn send_message<M, I>( pub(crate) fn send_message<M>(
net: &mut impl Network, net: &mut impl Network,
peers: I, mut peers: Vec<PeerId>,
peer_set: PeerSet, peer_set: PeerSet,
message: M, message: M,
metrics: &super::Metrics, metrics: &super::Metrics,
) -> SubsystemResult<()> )
where where
M: Encode + Clone, M: Encode + Clone,
I: IntoIterator<Item = PeerId>,
I::IntoIter: ExactSizeIterator,
{ {
let mut message_producer = stream::iter({ let message = {
let peers = peers.into_iter();
let n_peers = peers.len();
let mut message = {
let encoded = message.encode(); let encoded = message.encode();
metrics.on_notification_sent(peer_set, encoded.len(), n_peers); metrics.on_notification_sent(peer_set, encoded.len(), peers.len());
encoded
Some(encoded)
}; };
peers.enumerate().map(move |(i, peer)| {
// optimization: avoid cloning the message for the last peer in the // optimization: avoid cloning the message for the last peer in the
// list. The message payload can be quite large. If the underlying // list. The message payload can be quite large. If the underlying
// network used `Bytes` this would not be necessary. // network used `Bytes` this would not be necessary.
let message = if i == n_peers - 1 { let last_peer = peers.pop();
message peers.into_iter().for_each(|peer| {
.take() net.write_notification(peer, peer_set, message.clone());
.expect("Only taken in last iteration of loop, never afterwards; qed")
} else {
message
.as_ref()
.expect("Only taken in last iteration of loop, we are not there yet; qed")
.clone()
};
Ok(NetworkAction::WriteNotification(peer, peer_set, message))
})
}); });
if let Some(peer) = last_peer {
net.action_sink().send_all(&mut message_producer).await net.write_notification(peer, peer_set, message);
} }
/// An action to be carried out by the network.
///
/// This type is used for implementing `Sink` in order to communicate asynchronously with the
/// underlying network implementation in the `Network` trait.
#[derive(Debug, PartialEq)]
pub enum NetworkAction {
/// Note a change in reputation for a peer.
ReputationChange(PeerId, Rep),
/// Disconnect a peer from the given peer-set.
DisconnectPeer(PeerId, PeerSet),
/// Write a notification to a given peer on the given peer-set.
WriteNotification(PeerId, PeerSet, Vec<u8>),
} }
/// An abstraction over networking for the purposes of this subsystem. /// An abstraction over networking for the purposes of this subsystem.
...@@ -117,14 +84,18 @@ pub trait Network: Clone + Send + 'static { ...@@ -117,14 +84,18 @@ pub trait Network: Clone + Send + 'static {
/// Ask the network to keep a substream open with these nodes and not disconnect from them /// Ask the network to keep a substream open with these nodes and not disconnect from them
/// until removed from the protocol's peer set. /// until removed from the protocol's peer set.
/// Note that `out_peers` setting has no effect on this. /// Note that `out_peers` setting has no effect on this.
async fn add_to_peers_set(&mut self, protocol: Cow<'static, str>, multiaddresses: HashSet<Multiaddr>) -> Result<(), String>; async fn add_to_peers_set(
/// Cancels the effects of `add_to_peers_set`. &mut self,
async fn remove_from_peers_set(&mut self, protocol: Cow<'static, str>, multiaddresses: HashSet<Multiaddr>) -> Result<(), String>; protocol: Cow<'static, str>,
multiaddresses: HashSet<Multiaddr>,
) -> Result<(), String>;
/// Get access to an underlying sink for all network actions. /// Cancels the effects of `add_to_peers_set`.
fn action_sink<'a>( async fn remove_from_peers_set(
&'a mut self, &mut self,
) -> Pin<Box<dyn Sink<NetworkAction, Error = SubsystemError> + Send + 'a>>; protocol: Cow<'static, str>,
multiaddresses: HashSet<Multiaddr>,
) -> Result<(), String>;
/// Send a request to a remote peer. /// Send a request to a remote peer.
async fn start_request<AD: AuthorityDiscovery>( async fn start_request<AD: AuthorityDiscovery>(
...@@ -135,47 +106,18 @@ pub trait Network: Clone + Send + 'static { ...@@ -135,47 +106,18 @@ pub trait Network: Clone + Send + 'static {
); );
/// Report a given peer as either beneficial (+) or costly (-) according to the given scalar. /// Report a given peer as either beneficial (+) or costly (-) according to the given scalar.
fn report_peer( fn report_peer(&self, who: PeerId, cost_benefit: Rep);
&mut self,
who: PeerId,
cost_benefit: Rep,
) -> BoxFuture<SubsystemResult<()>> {
async move {
self.action_sink()
.send(NetworkAction::ReputationChange(who, cost_benefit))
.await
}
.boxed()
}
/// Disconnect a given peer from the peer set specified without harming reputation. /// Disconnect a given peer from the peer set specified without harming reputation.
fn disconnect_peer( fn disconnect_peer(&self, who: PeerId, peer_set: PeerSet);
&mut self,
who: PeerId,
peer_set: PeerSet,
) -> BoxFuture<SubsystemResult<()>> {
async move {
self.action_sink()
.send(NetworkAction::DisconnectPeer(who, peer_set))
.await
}
.boxed()
}
/// Write a notification to a peer on the given peer-set's protocol. /// Write a notification to a peer on the given peer-set's protocol.
fn write_notification( fn write_notification(
&mut self, &self,
who: PeerId, who: PeerId,
peer_set: PeerSet, peer_set: PeerSet,
message: Vec<u8>, message: Vec<u8>,
) -> BoxFuture<SubsystemResult<()>> { );
async move {
self.action_sink()
.send(NetworkAction::WriteNotification(who, peer_set, message))
.await
}
.boxed()
}
} }
#[async_trait] #[async_trait]
...@@ -184,56 +126,42 @@ impl Network for Arc<NetworkService<Block, Hash>> { ...@@ -184,56 +126,42 @@ impl Network for Arc<NetworkService<Block, Hash>> {
NetworkService::event_stream(self, "polkadot-network-bridge").boxed() NetworkService::event_stream(self, "polkadot-network-bridge").boxed()
} }
async fn add_to_peers_set(&mut self, protocol: Cow<'static, str>, multiaddresses: HashSet<Multiaddr>) -> Result<(), String> { async fn add_to_peers_set(
&mut self,
protocol: Cow<'static, str>,
multiaddresses: HashSet<Multiaddr>,
) -> Result<(), String> {
sc_network::NetworkService::add_peers_to_reserved_set(&**self, protocol, multiaddresses) sc_network::NetworkService::add_peers_to_reserved_set(&**self, protocol, multiaddresses)
} }
async fn remove_from_peers_set(&mut self, protocol: Cow<'static, str>, multiaddresses: HashSet<Multiaddr>) -> Result<(), String> { async fn remove_from_peers_set(
sc_network::NetworkService::remove_peers_from_reserved_set(&**self, protocol.clone(), multiaddresses.clone())?; &mut self,
protocol: Cow<'static, str>,
multiaddresses: HashSet<Multiaddr>,
) -> Result<(), String> {
sc_network::NetworkService::remove_peers_from_reserved_set(
&**self,
protocol.clone(),
multiaddresses.clone(),
)?;
sc_network::NetworkService::remove_from_peers_set(&**self, protocol, multiaddresses) sc_network::NetworkService::remove_from_peers_set(&**self, protocol, multiaddresses)
} }
fn action_sink<'a>( fn report_peer(&self, who: PeerId, cost_benefit: Rep) {
&'a mut self, sc_network::NetworkService::report_peer(&**self, who, cost_benefit.into_base_rep());