good morning!!!!

Skip to content
Snippets Groups Projects
  1. Feb 19, 2021
  2. Feb 12, 2021
  3. Dec 15, 2020
  4. Dec 10, 2020
  5. Oct 21, 2020
    • Zsolt Felföldi's avatar
      les: remove clientPeerSet and serverSet (#21566) · 85d81b2c
      Zsolt Felföldi authored
      * les: move NodeStateMachine from clientPool to LesServer
      
      * les: new header broadcaster
      
      * les: peerCommons.headInfo always contains last announced head
      
      * les: remove clientPeerSet and serverSet
      
      * les: fixed panic
      
      * les: fixed --nodiscover option
      
      * les: disconnect all peers at ns.Stop()
      
      * les: added comments and fixed signed broadcasts
      
      * les: removed unused parameter, fixed tests
      85d81b2c
  6. May 22, 2020
    • Zsolt Felföldi's avatar
      les, les/lespay: implement new server pool (#20758) · b4a26811
      Zsolt Felföldi authored
      This PR reimplements the light client server pool. It is also a first step
      to move certain logic into a new lespay package. This package will contain
      the implementation of the lespay token sale functions, the token buying and
      selling logic and other components related to peer selection/prioritization
      and service quality evaluation. Over the long term this package will be
      reusable for incentivizing future protocols.
      
      Since the LES peer logic is now based on enode.Iterator, it can now use
      DNS-based fallback discovery to find servers.
      
      This document describes the function of the new components:
      https://gist.github.com/zsfelfoldi/3c7ace895234b7b345ab4f71dab102d4
      b4a26811
  7. Apr 09, 2020
  8. Nov 18, 2019
    • Felix Lange's avatar
      build: use golangci-lint (#20295) · 68948644
      Felix Lange authored
      * build: use golangci-lint
      
      This changes build/ci.go to download and run golangci-lint instead
      of gometalinter.
      
      * core/state: fix unnecessary conversion
      
      * p2p/simulations: fix lock copying (found by go vet)
      
      * signer/core: fix unnecessary conversions
      
      * crypto/ecies: remove unused function cmpPublic
      
      * core/rawdb: remove unused function print
      
      * core/state: remove unused function xTestFuzzCutter
      
      * core/vm: disable TestWriteExpectedValues in a different way
      
      * core/forkid: remove unused function checksum
      
      * les: remove unused type proofsData
      
      * cmd/utils: remove unused functions prefixedNames, prefixFor
      
      * crypto/bn256: run goimports
      
      * p2p/nat: fix goimports lint issue
      
      * cmd/clef: avoid using unkeyed struct fields
      
      * les: cancel context in testRequest
      
      * rlp: delete unreachable code
      
      * core: gofmt
      
      * internal/build: simplify DownloadFile for Go 1.11 compatibility
      
      * build: remove go test --short flag
      
      * .travis.yml: disable build cache
      
      * whisper/whisperv6: fix ineffectual assignment in TestWhisperIdentityManagement
      
      * .golangci.yml: enable goconst and ineffassign linters
      
      * build: print message when there are no lint issues
      
      * internal/build: refactor download a bit
      68948644
  9. Jul 08, 2019
    • Martin Holst Swende's avatar
      eth, les: add sanity checks for unbounded block fields (#19573) · cdfe9a3a
      Martin Holst Swende authored
      This PR adds some hardening in the lower levels of the protocol stack, to bail early on invalid data. Primarily, attacks that this PR protects against are on the "annoyance"-level, which would otherwise write a couple of megabytes of data into the log output, which is a bit resource intensive.
      cdfe9a3a
  10. May 30, 2019
  11. May 13, 2019
    • Zsolt Felföldi's avatar
      les, light: implement ODR transaction lookup by hash (#19069) · 40cdcf8c
      Zsolt Felföldi authored
      * les, light: implement ODR transaction lookup by hash
      
      * les: delete useless file
      
      * internal/ethapi: always use backend to find transaction
      
      * les, eth, internal/ethapi: renamed GetCanonicalTransaction to GetTransaction
      
      * light: add canonical header verification to GetTransaction
      40cdcf8c
  12. Apr 08, 2019
  13. Feb 26, 2019
    • Zsolt Felföldi's avatar
      les, les/flowcontrol: improved request serving and flow control (#18230) · c2003ed6
      Zsolt Felföldi authored
      This change
      
      - implements concurrent LES request serving even for a single peer.
      - replaces the request cost estimation method with a cost table based on
        benchmarks which gives much more consistent results. Until now the
        allowed number of light peers was just a guess which probably contributed
        a lot to the fluctuating quality of available service. Everything related
        to request cost is implemented in a single object, the 'cost tracker'. It
        uses a fixed cost table with a global 'correction factor'. Benchmark code
        is included and can be run at any time to adapt costs to low-level
        implementation changes.
      - reimplements flowcontrol.ClientManager in a cleaner and more efficient
        way, with added capabilities: There is now control over bandwidth, which
        allows using the flow control parameters for client prioritization.
        Target utilization over 100 percent is now supported to model concurrent
        request processing. Total serving bandwidth is reduced during block
        processing to prevent database contention.
      - implements an RPC API for the LES servers allowing server operators to
        assign priority bandwidth to certain clients and change prioritized
        status even while the client is connected. The new API is meant for
        cases where server operators charge for LES using an off-protocol mechanism.
      - adds a unit test for the new client manager.
      - adds an end-to-end test using the network simulator that tests bandwidth
        control functions through the new API.
      c2003ed6
  14. Feb 21, 2019
  15. Sep 24, 2018
    • Felix Lange's avatar
      all: new p2p node representation (#17643) · 30cd5c18
      Felix Lange authored
      Package p2p/enode provides a generalized representation of p2p nodes
      which can contain arbitrary information in key/value pairs. It is also
      the new home for the node database. The "v4" identity scheme is also
      moved here from p2p/enr to remove the dependency on Ethereum crypto from
      that package.
      
      Record signature handling is changed significantly. The identity scheme
      registry is removed and acceptable schemes must be passed to any method
      that needs identity. This means records must now be validated explicitly
      after decoding.
      
      The enode API is designed to make signature handling easy and safe: most
      APIs around the codebase work with enode.Node, which is a wrapper around
      a valid record. Going from enr.Record to enode.Node requires a valid
      signature.
      
      * p2p/discover: port to p2p/enode
      
      This ports the discovery code to the new node representation in
      p2p/enode. The wire protocol is unchanged, this can be considered a
      refactoring change. The Kademlia table can now deal with nodes using an
      arbitrary identity scheme. This requires a few incompatible API changes:
      
        - Table.Lookup is not available anymore. It used to take a public key
          as argument because v4 protocol requires one. Its replacement is
          LookupRandom.
        - Table.Resolve takes *enode.Node instead of NodeID. This is also for
          v4 protocol compatibility because nodes cannot be looked up by ID
          alone.
        - Types Node and NodeID are gone. Further commits in the series will be
          fixes all over the the codebase to deal with those removals.
      
      * p2p: port to p2p/enode and discovery changes
      
      This adapts package p2p to the changes in p2p/discover. All uses of
      discover.Node and discover.NodeID are replaced by their equivalents from
      p2p/enode.
      
      New API is added to retrieve the enode.Node instance of a peer. The
      behavior of Server.Self with discovery disabled is improved. It now
      tries much harder to report a working IP address, falling back to
      127.0.0.1 if no suitable address can be determined through other means.
      These changes were needed for tests of other packages later in the
      series.
      
      * p2p/simulations, p2p/testing: port to p2p/enode
      
      No surprises here, mostly replacements of discover.Node, discover.NodeID
      with their new equivalents. The 'interesting' API changes are:
      
       - testing.ProtocolSession tracks complete nodes, not just their IDs.
       - adapters.NodeConfig has a new method to create a complete node.
      
      These changes were needed to make swarm tests work.
      
      Note that the NodeID change makes the code incompatible with old
      simulation snapshots.
      
      * whisper/whisperv5, whisper/whisperv6: port to p2p/enode
      
      This port was easy because whisper uses []byte for node IDs and
      URL strings in the API.
      
      * eth: port to p2p/enode
      
      Again, easy to port because eth uses strings for node IDs and doesn't
      care about node information in any way.
      
      * les: port to p2p/enode
      
      Apart from replacing discover.NodeID with enode.ID, most changes are in
      the server pool code. It now deals with complete nodes instead
      of (Pubkey, IP, Port) triples. The database format is unchanged for now,
      but we should probably change it to use the node database later.
      
      * node: port to p2p/enode
      
      This change simply replaces discover.Node and discover.NodeID with their
      new equivalents.
      
      * swarm/network: port to p2p/enode
      
      Swarm has its own node address representation, BzzAddr, containing both
      an overlay address (the hash of a secp256k1 public key) and an underlay
      address (enode:// URL).
      
      There are no changes to the BzzAddr format in this commit, but certain
      operations such as creating a BzzAddr from a node ID are now impossible
      because node IDs aren't public keys anymore.
      
      Most swarm-related changes in the series remove uses of
      NewAddrFromNodeID, replacing it with NewAddr which takes a complete node
      as argument. ToOverlayAddr is removed because we can just use the node
      ID directly.
      30cd5c18
  16. May 07, 2018
  17. May 03, 2018
  18. Jan 26, 2018
  19. Jan 22, 2018
    • Zsolt Felföldi's avatar
      p2p, p2p/discover, p2p/discv5: implement UDP port sharing (#15200) · 92580d69
      Zsolt Felföldi authored
      This commit affects p2p/discv5 "topic discovery" by running it on
      the same UDP port where the old discovery works. This is realized
      by giving an "unhandled" packet channel to the old v4 discovery
      packet handler where all invalid packets are sent. These packets
      are then processed by v5. v5 packets are always invalid when
      interpreted by v4 and vice versa. This is ensured by adding one
      to the first byte of the packet hash in v5 packets.
      
      DiscoveryV5Bootnodes is also changed to point to new bootnodes
      that are implementing the changed packet format with modified
      hash. Existing and new v5 bootnodes are both running on different
      ports ATM.
      92580d69
  20. Oct 25, 2017
  21. Oct 24, 2017
    • Zsolt Felföldi's avatar
      les, light: LES/2 protocol version (#14970) · ca376ead
      Zsolt Felföldi authored
      This PR implements the new LES protocol version extensions:
      
      * new and more efficient Merkle proofs reply format (when replying to
        a multiple Merkle proofs request, we just send a single set of trie
        nodes containing all necessary nodes)
      * BBT (BloomBitsTrie) works similarly to the existing CHT and contains
        the bloombits search data to speed up log searches
      * GetTxStatusMsg returns the inclusion position or the
        pending/queued/unknown state of a transaction referenced by hash
      * an optional signature of new block data (number/hash/td) can be
        included in AnnounceMsg to provide an option for "very light
        clients" (mobile/embedded devices) to skip expensive Ethash check
        and accept multiple signatures of somewhat trusted servers (still a
        lot better than trusting a single server completely and retrieving
        everything through RPC). The new client mode is not implemented in
        this PR, just the protocol extension.
      ca376ead
  22. Aug 08, 2017
  23. Nov 09, 2016
  24. Sep 02, 2016
  25. Jul 22, 2016
  26. Jul 04, 2016
  27. Oct 28, 2015
  28. Oct 19, 2015
  29. Sep 11, 2015
  30. Aug 24, 2015
  31. Aug 21, 2015
  32. Jul 25, 2015
  33. Jul 23, 2015
  34. Jul 22, 2015
  35. Jul 07, 2015
Loading