Skip to content

Commit 3ff9598

Browse files
committed
autonatv2: implement specs
1 parent 1e2adf3 commit 3ff9598

18 files changed

+3057
-14
lines changed

config/config.go

+83
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ import (
2424
"github.com/libp2p/go-libp2p/p2p/host/autonat"
2525
"github.com/libp2p/go-libp2p/p2p/host/autorelay"
2626
bhost "github.com/libp2p/go-libp2p/p2p/host/basic"
27+
blankhost "github.com/libp2p/go-libp2p/p2p/host/blank"
2728
"github.com/libp2p/go-libp2p/p2p/host/eventbus"
2829
"github.com/libp2p/go-libp2p/p2p/host/peerstore/pstoremem"
2930
rcmgr "github.com/libp2p/go-libp2p/p2p/host/resource-manager"
@@ -131,6 +132,8 @@ type Config struct {
131132
SwarmOpts []swarm.Option
132133

133134
DisableIdentifyAddressDiscovery bool
135+
136+
DisableAutoNATv2 bool
134137
}
135138

136139
func (cfg *Config) makeSwarm(eventBus event.Bus, enableMetrics bool) (*swarm.Swarm, error) {
@@ -193,6 +196,76 @@ func (cfg *Config) makeSwarm(eventBus event.Bus, enableMetrics bool) (*swarm.Swa
193196
return swarm.NewSwarm(pid, cfg.Peerstore, eventBus, opts...)
194197
}
195198

199+
func (cfg *Config) makeAutoNATHost() (host.Host, error) {
200+
autonatPrivKey, _, err := crypto.GenerateEd25519Key(rand.Reader)
201+
if err != nil {
202+
return nil, err
203+
}
204+
ps, err := pstoremem.NewPeerstore()
205+
if err != nil {
206+
return nil, err
207+
}
208+
209+
autoNatCfg := Config{
210+
Transports: cfg.Transports,
211+
Muxers: cfg.Muxers,
212+
SecurityTransports: cfg.SecurityTransports,
213+
Insecure: cfg.Insecure,
214+
PSK: cfg.PSK,
215+
ConnectionGater: cfg.ConnectionGater,
216+
Reporter: cfg.Reporter,
217+
PeerKey: autonatPrivKey,
218+
Peerstore: ps,
219+
DialRanker: swarm.NoDelayDialRanker,
220+
SwarmOpts: []swarm.Option{
221+
// Disable black hole detection on autonat dialers
222+
// It is better to attempt a dial and fail for AutoNAT use cases
223+
swarm.WithUDPBlackHoleConfig(false, 0, 0),
224+
swarm.WithIPv6BlackHoleConfig(false, 0, 0),
225+
},
226+
}
227+
fxopts, err := autoNatCfg.addTransports()
228+
if err != nil {
229+
return nil, err
230+
}
231+
var dialerHost host.Host
232+
fxopts = append(fxopts,
233+
fx.Provide(eventbus.NewBus),
234+
fx.Provide(func(lifecycle fx.Lifecycle, b event.Bus) (*swarm.Swarm, error) {
235+
lifecycle.Append(fx.Hook{
236+
OnStop: func(context.Context) error {
237+
return ps.Close()
238+
}})
239+
sw, err := autoNatCfg.makeSwarm(b, false)
240+
return sw, err
241+
}),
242+
fx.Provide(func(sw *swarm.Swarm) *blankhost.BlankHost {
243+
return blankhost.NewBlankHost(sw)
244+
}),
245+
fx.Provide(func(bh *blankhost.BlankHost) host.Host {
246+
return bh
247+
}),
248+
fx.Provide(func() crypto.PrivKey { return autonatPrivKey }),
249+
fx.Provide(func(bh host.Host) peer.ID { return bh.ID() }),
250+
fx.Invoke(func(bh *blankhost.BlankHost) {
251+
dialerHost = bh
252+
}),
253+
)
254+
app := fx.New(fxopts...)
255+
if err := app.Err(); err != nil {
256+
return nil, err
257+
}
258+
err = app.Start(context.Background())
259+
if err != nil {
260+
return nil, err
261+
}
262+
go func() {
263+
<-dialerHost.Network().(*swarm.Swarm).Done()
264+
app.Stop(context.Background())
265+
}()
266+
return dialerHost, nil
267+
}
268+
196269
func (cfg *Config) addTransports() ([]fx.Option, error) {
197270
fxopts := []fx.Option{
198271
fx.WithLogger(func() fxevent.Logger { return getFXLogger() }),
@@ -291,6 +364,14 @@ func (cfg *Config) addTransports() ([]fx.Option, error) {
291364
}
292365

293366
func (cfg *Config) newBasicHost(swrm *swarm.Swarm, eventBus event.Bus) (*bhost.BasicHost, error) {
367+
var autonatv2Dialer host.Host
368+
if !cfg.DisableAutoNATv2 {
369+
ah, err := cfg.makeAutoNATHost()
370+
if err != nil {
371+
return nil, err
372+
}
373+
autonatv2Dialer = ah
374+
}
294375
h, err := bhost.NewHost(swrm, &bhost.HostOpts{
295376
EventBus: eventBus,
296377
ConnManager: cfg.ConnManager,
@@ -306,6 +387,8 @@ func (cfg *Config) newBasicHost(swrm *swarm.Swarm, eventBus event.Bus) (*bhost.B
306387
EnableMetrics: !cfg.DisableMetrics,
307388
PrometheusRegisterer: cfg.PrometheusRegisterer,
308389
DisableIdentifyAddressDiscovery: cfg.DisableIdentifyAddressDiscovery,
390+
EnableAutoNATv2: !cfg.DisableAutoNATv2,
391+
AutoNATv2Dialer: autonatv2Dialer,
309392
})
310393
if err != nil {
311394
return nil, err

core/network/network.go

+17
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,20 @@ type Network interface {
161161
ResourceManager() ResourceManager
162162
}
163163

164+
// Dialability indicates how dialable a (peer, addr) combination is.
165+
type Dialability int
166+
167+
const (
168+
// DialabilityUnknown indicates that the dialer cannot dial the (peer, addr) combination
169+
DialabilityUnknown Dialability = iota
170+
171+
// DialabilityDialable indicates that the dialer can dial the (peer, addr) combination
172+
DialabilityDialable
173+
174+
// DialabilityUndialable indicates that the dialer cannot dial the (peer, addr) combinaton
175+
DialabilityUndialable
176+
)
177+
164178
// Dialer represents a service that can dial out to peers
165179
// (this is usually just a Network, but other services may not need the whole
166180
// stack, and thus it becomes easier to mock)
@@ -194,6 +208,9 @@ type Dialer interface {
194208
// Notify/StopNotify register and unregister a notifiee for signals
195209
Notify(Notifiee)
196210
StopNotify(Notifiee)
211+
212+
// CanDial returns whether the dialer can dial peer p at addr
213+
CanDial(p peer.ID, addr ma.Multiaddr) Dialability
197214
}
198215

199216
// AddrDelay provides an address along with the delay after which the address

options.go

+8
Original file line numberDiff line numberDiff line change
@@ -609,3 +609,11 @@ func DisableIdentifyAddressDiscovery() Option {
609609
return nil
610610
}
611611
}
612+
613+
// DisableAutoNATv2 disables autonat
614+
func DisableAutoNATv2() Option {
615+
return func(cfg *Config) error {
616+
cfg.DisableAutoNATv2 = true
617+
return nil
618+
}
619+
}

p2p/host/basic/basic_host.go

+15
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ import (
2424
"github.com/libp2p/go-libp2p/p2p/host/eventbus"
2525
"github.com/libp2p/go-libp2p/p2p/host/pstoremanager"
2626
"github.com/libp2p/go-libp2p/p2p/host/relaysvc"
27+
"github.com/libp2p/go-libp2p/p2p/protocol/autonatv2"
2728
relayv2 "github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/relay"
2829
"github.com/libp2p/go-libp2p/p2p/protocol/holepunch"
2930
"github.com/libp2p/go-libp2p/p2p/protocol/identify"
@@ -105,6 +106,8 @@ type BasicHost struct {
105106
caBook peerstore.CertifiedAddrBook
106107

107108
autoNat autonat.AutoNAT
109+
110+
autonatv2 *autonatv2.AutoNAT
108111
}
109112

110113
var _ host.Host = (*BasicHost)(nil)
@@ -167,6 +170,8 @@ type HostOpts struct {
167170

168171
// DisableIdentifyAddressDiscovery disables address discovery using peer provided observed addresses in identify
169172
DisableIdentifyAddressDiscovery bool
173+
EnableAutoNATv2 bool
174+
AutoNATv2Dialer host.Host
170175
}
171176

172177
// NewHost constructs a new *BasicHost and activates it by attaching its stream and connection handlers to the given inet.Network.
@@ -310,6 +315,13 @@ func NewHost(n network.Network, opts *HostOpts) (*BasicHost, error) {
310315
h.pings = ping.NewPingService(h)
311316
}
312317

318+
if opts.EnableAutoNATv2 {
319+
h.autonatv2, err = autonatv2.New(h, opts.AutoNATv2Dialer)
320+
if err != nil {
321+
return nil, fmt.Errorf("failed to create autonatv2: %w", err)
322+
}
323+
}
324+
313325
n.SetStreamHandler(h.newStreamHandler)
314326

315327
// register to be notified when the network's listen addrs change,
@@ -1100,6 +1112,9 @@ func (h *BasicHost) Close() error {
11001112
if h.hps != nil {
11011113
h.hps.Close()
11021114
}
1115+
if h.autonatv2 != nil {
1116+
h.autonatv2.Close()
1117+
}
11031118

11041119
_ = h.emitters.evtLocalProtocolsUpdated.Close()
11051120
_ = h.emitters.evtLocalAddrsUpdated.Close()

p2p/net/mock/mock_peernet.go

+4
Original file line numberDiff line numberDiff line change
@@ -434,3 +434,7 @@ func (pn *peernet) notifyAll(notification func(f network.Notifiee)) {
434434
func (pn *peernet) ResourceManager() network.ResourceManager {
435435
return &network.NullResourceManager{}
436436
}
437+
438+
func (pn *peernet) CanDial(p peer.ID, addr ma.Multiaddr) network.Dialability {
439+
return network.DialabilityUnknown
440+
}

p2p/net/swarm/black_hole_detector.go

+28
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,13 @@ func (b *blackHoleFilter) updateState() {
144144
}
145145
}
146146

147+
func (b *blackHoleFilter) State() blackHoleState {
148+
b.mu.Lock()
149+
defer b.mu.Unlock()
150+
151+
return b.state
152+
}
153+
147154
func (b *blackHoleFilter) trackMetrics() {
148155
if b.metricsTracer == nil {
149156
return
@@ -244,6 +251,27 @@ func (d *blackHoleDetector) RecordResult(addr ma.Multiaddr, success bool) {
244251
}
245252
}
246253

254+
func (d *blackHoleDetector) State(addr ma.Multiaddr) blackHoleState {
255+
if !manet.IsPublicAddr(addr) {
256+
return blackHoleStateAllowed
257+
}
258+
259+
if d.udp != nil && isProtocolAddr(addr, ma.P_UDP) {
260+
udpState := d.udp.State()
261+
if udpState != blackHoleStateAllowed {
262+
return udpState
263+
}
264+
}
265+
266+
if d.ipv6 != nil && isProtocolAddr(addr, ma.P_IP6) {
267+
ipv6State := d.ipv6.State()
268+
if ipv6State != blackHoleStateAllowed {
269+
return ipv6State
270+
}
271+
}
272+
return blackHoleStateAllowed
273+
}
274+
247275
// blackHoleConfig is the config used for black hole detection
248276
type blackHoleConfig struct {
249277
// Enabled enables black hole detection

p2p/net/swarm/black_hole_detector_test.go

+12
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ func TestBlackHoleFilterReset(t *testing.T) {
1717
if bhf.HandleRequest() != blackHoleResultProbing {
1818
t.Fatalf("expected calls up to n to be probes")
1919
}
20+
if bhf.State() != blackHoleStateProbing {
21+
t.Fatalf("expected state to be probing got %s", bhf.State())
22+
}
2023
bhf.RecordResult(false)
2124
}
2225

@@ -26,6 +29,9 @@ func TestBlackHoleFilterReset(t *testing.T) {
2629
if (i%n == 0 && result != blackHoleResultProbing) || (i%n != 0 && result != blackHoleResultBlocked) {
2730
t.Fatalf("expected every nth dial to be a probe")
2831
}
32+
if bhf.State() != blackHoleStateBlocked {
33+
t.Fatalf("expected state to be blocked, got %s", bhf.State())
34+
}
2935
}
3036

3137
bhf.RecordResult(true)
@@ -34,12 +40,18 @@ func TestBlackHoleFilterReset(t *testing.T) {
3440
if bhf.HandleRequest() != blackHoleResultProbing {
3541
t.Fatalf("expected black hole detector state to reset after success")
3642
}
43+
if bhf.State() != blackHoleStateProbing {
44+
t.Fatalf("expected state to be probing got %s", bhf.State())
45+
}
3746
bhf.RecordResult(false)
3847
}
3948

4049
// next call should be blocked
4150
if bhf.HandleRequest() != blackHoleResultBlocked {
4251
t.Fatalf("expected dial to be blocked")
52+
if bhf.State() != blackHoleStateBlocked {
53+
t.Fatalf("expected state to be blocked, got %s", bhf.State())
54+
}
4355
}
4456
}
4557

p2p/net/swarm/swarm.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ func WithDialRanker(d network.DialRanker) Option {
112112
}
113113
}
114114

115-
// WithUDPBlackHoleConfig configures swarm to use c as the config for UDP black hole detection
115+
// WithUDPBlackHoleConfig configures swarm to use the provided config for UDP black hole detection
116116
// n is the size of the sliding window used to evaluate black hole state
117117
// min is the minimum number of successes out of n required to not block requests
118118
func WithUDPBlackHoleConfig(enabled bool, n, min int) Option {
@@ -122,7 +122,7 @@ func WithUDPBlackHoleConfig(enabled bool, n, min int) Option {
122122
}
123123
}
124124

125-
// WithIPv6BlackHoleConfig configures swarm to use c as the config for IPv6 black hole detection
125+
// WithIPv6BlackHoleConfig configures swarm to use the provided config for IPv6 black hole detection
126126
// n is the size of the sliding window used to evaluate black hole state
127127
// min is the minimum number of successes out of n required to not block requests
128128
func WithIPv6BlackHoleConfig(enabled bool, n, min int) Option {

p2p/net/swarm/swarm_dial.go

+20
Original file line numberDiff line numberDiff line change
@@ -416,6 +416,26 @@ func (s *Swarm) dialNextAddr(ctx context.Context, p peer.ID, addr ma.Multiaddr,
416416
return nil
417417
}
418418

419+
func (s *Swarm) CanDial(p peer.ID, addr ma.Multiaddr) network.Dialability {
420+
dialable, _ := s.filterKnownUndialables(p, []ma.Multiaddr{addr})
421+
if len(dialable) == 0 {
422+
return network.DialabilityUndialable
423+
}
424+
425+
bhState := s.bhd.State(addr)
426+
switch bhState {
427+
case blackHoleStateAllowed:
428+
return network.DialabilityDialable
429+
case blackHoleStateProbing:
430+
return network.DialabilityUnknown
431+
case blackHoleStateBlocked:
432+
return network.DialabilityUndialable
433+
default:
434+
log.Errorf("SWARM BUG: unhandled black hole state for dilability check %s", bhState)
435+
return network.DialabilityUnknown
436+
}
437+
}
438+
419439
func (s *Swarm) nonProxyAddr(addr ma.Multiaddr) bool {
420440
t := s.TransportForDialing(addr)
421441
return !t.Proxy()

0 commit comments

Comments
 (0)