fix(dcutr): always check for relayed connection first#3982
fix(dcutr): always check for relayed connection first#3982mergify[bot] merged 11 commits intolibp2p:masterfrom
Conversation
|
Is it okay that sometimes QUIC client cannot connect to a server with DCUtR example? |
Do you suspect this issue to be due to this change? |
mxinden
left a comment
There was a problem hiding this comment.
@arpankapoor what problem is this pull request solving? Why is it relevant to first check whether the connection is relayed. Isn't first checking self.outgoing_direct_connection_attempts and then is_relayed just the same?
The current version of the code returns a Related comment. |
I just dug into this a bit more and the reason our tests are passing this is because we only assert that the direct connection is established but we don't assert that we report the correct event (which is only reported by the |
thomaseizinger
left a comment
There was a problem hiding this comment.
I think this can actually be simplified a lot further, please see comments!
| ))); // TODO: We could make two `handler::relayed::Handler` here, one inbound one outbound. | ||
| } | ||
|
|
||
| if let Some(&relayed_connection_id) = self.direct_to_relayed_connections.get(&connection_id) |
There was a problem hiding this comment.
I don't think this can ever be hit actually. In hole-punching, we cannot for sure tell which inbound connection was the one that the remote achieved through hole punching.
Plus, all this state tracking here uses ConnectionIds that are created as part of dialing, i.e. outbound connections.
So unless I am missing something, this function can be reduced to always return a dummy::ConnectionHandler for non-relayed connections.
@mxinden Thoughts?
There was a problem hiding this comment.
I think I agree with your assessment. I'll make this change after @mxinden's comments.
There was a problem hiding this comment.
You are right @thomaseizinger.
For what it is worth, likely my train of thought that ended up with the code above:
In NetworkBehaviour::on_connection_handler_event on OutboundConnectNegotiated we trigger a Dial with role_override() (i.e. as_listener) and then insert the maybe_direct_connection_id from the DialOpts into self.direct_to_relayed_connections.
rust-libp2p/protocols/dcutr/src/behaviour_impl.rs
Lines 379 to 395 in d4c4078
On success this would be reported to the Behaviour via NetworkBehaviour::handle_established_outbound_connection and not as assumed here in NetworkBehaviour::handle_established_inbound_connection.
There was a problem hiding this comment.
How about adding an assert here, that connection_id is not in self.direct_to_relayed_connections?
mxinden
left a comment
There was a problem hiding this comment.
Overall this looks good to me. Thank you for the work here. I find this domain very tricky.
| ))); // TODO: We could make two `handler::relayed::Handler` here, one inbound one outbound. | ||
| } | ||
|
|
||
| if let Some(&relayed_connection_id) = self.direct_to_relayed_connections.get(&connection_id) |
There was a problem hiding this comment.
You are right @thomaseizinger.
For what it is worth, likely my train of thought that ended up with the code above:
In NetworkBehaviour::on_connection_handler_event on OutboundConnectNegotiated we trigger a Dial with role_override() (i.e. as_listener) and then insert the maybe_direct_connection_id from the DialOpts into self.direct_to_relayed_connections.
rust-libp2p/protocols/dcutr/src/behaviour_impl.rs
Lines 379 to 395 in d4c4078
On success this would be reported to the Behaviour via NetworkBehaviour::handle_established_outbound_connection and not as assumed here in NetworkBehaviour::handle_established_inbound_connection.
| ))); // TODO: We could make two `handler::relayed::Handler` here, one inbound one outbound. | ||
| } | ||
|
|
||
| if let Some(&relayed_connection_id) = self.direct_to_relayed_connections.get(&connection_id) |
There was a problem hiding this comment.
How about adding an assert here, that connection_id is not in self.direct_to_relayed_connections?
I've applied the changes you suggested. Please let me know if you'd like anything else updated/changed. |
mxinden
left a comment
There was a problem hiding this comment.
This looks good to me. Thanks @arpankapoor for the work.
Will give @thomaseizinger a chance to review as well.
|
Moving an out-of-band discussion here:
I am fairly certain, unless @thomaseizinger raises any larger objections, that this pull request will make it into This is a bug fix and it does not break our public API. Thus, in case you want this before |
| return Ok(Either::Right(Either::Left( | ||
| handler::direct::Handler::default(), | ||
| ))); |
There was a problem hiding this comment.
With recent refactorings in libp2p-swarm, there is actually no more need for handler::direct::Handler at all. The only thing that it does is report an event to the behaviour that is then bubbled to the user. The behaviour could as well just bubble the event to the user here already and return just a dummy handler.
The above improvement is only slightly related to this pull request. In case you want to tackle it @arpankapoor in this pull request, that would be much appreciated. Though I am happy to merge as is and tackle it some other time.
Idea raised by @thomaseizinger in a synchronous discussion just now.
There was a problem hiding this comment.
I am in favor of that refactoring but no need to include in this PR.
There was a problem hiding this comment.
Yeah, it could be tackled in another PR perhaps.
There was a problem hiding this comment.
Thanks! I'll merge this as is then :)
There was a problem hiding this comment.
Tracked here #4013. Also unresolving here for easier discovery in the future.
Description
For a non-relay connection, check if it corresponds to a direct connection upgrade.
As discussed in #3964.
Notes & open questions
Change checklist