10#include <chainparams.h>
29#include <validation.h>
42 "Returns the number of connections to other nodes.\n",
60 "Requests that a ping be sent to all other nodes, to measure ping "
62 "Results provided in getpeerinfo, pingtime and pingwait fields are "
64 "Ping command is handled in queue with all other commands, so it "
65 "measures processing backlog, not just network ping.\n",
85 "Returns data about each connected network node as a json array of "
99 "(host:port) The IP address and port of the peer"},
101 "(ip:port) Bind address of the connection to the peer"},
103 "(ip:port) Local address as reported by the peer"},
105 "The total number of addresses processed, excluding those "
106 "dropped due to rate limiting"},
108 "The total number of addresses dropped due to rate "
116 "The AS in the BGP route to the peer used for "
118 "peer selection (only available if the asmap config flag "
121 "The services offered"},
124 "the services offered, in human-readable form",
126 "the service name if it is recognised"}}},
128 "Whether peer has asked us to relay transactions to it"},
135 " of the last valid transaction received from this "
139 " of the last block received from this peer"},
142 "The total bytes received"},
146 "The time offset in seconds"},
148 "ping time (if available)"},
150 "minimum observed ping time (if any at all)"},
152 "ping wait (if non-zero)"},
154 "The peer version, such as 70001"},
157 "Inbound (true) or Outbound (false)"},
159 "Whether we selected peer as (compact blocks) "
160 "high-bandwidth peer"},
162 "Whether peer selected us as (compact blocks) "
163 "high-bandwidth peer"},
165 "Type of connection: \n" +
168 "The starting height (block) of the peer"},
171 "The current height of header pre-synchronization with "
172 "this peer, or -1 if no low-work sync is in progress"},
174 "The last header we have in common with this peer"},
176 "The last block we have in common with this peer"},
182 "The heights of blocks we're currently asking from "
186 "Whether we participate in address relay with this peer"},
188 "The minimum fee rate for transactions this peer accepts"},
193 "The total bytes sent aggregated by message type\n"
194 "When a message type is not listed in this json object, "
195 "the bytes sent are 0.\n"
196 "Only known message types can appear as keys in the "
202 "The total bytes received aggregated by message type\n"
203 "When a message type is not listed in this json object, "
204 "the bytes received are 0.\n"
205 "Only known message types can appear as keys in the "
206 "object and all bytes received\n"
207 "of unknown message types are listed under '" +
210 "DEPRECATED: Avalanche availability score of this node "
211 "(if any). Only present if the "
212 "deprecatedrpc=node_availability_score option is enabled"},
225 std::vector<CNodeStats> vstats;
235 obj.
pushKV(
"id", stats.nodeid);
236 obj.
pushKV(
"addr", stats.m_addr_name);
237 if (stats.addrBind.IsValid()) {
238 obj.
pushKV(
"addrbind", stats.addrBind.ToString());
240 if (!(stats.addrLocal.empty())) {
241 obj.
pushKV(
"addrlocal", stats.addrLocal);
244 if (stats.m_mapped_as != 0) {
245 obj.
pushKV(
"mapped_as", uint64_t(stats.m_mapped_as));
253 obj.
pushKV(
"last_transaction",
255 if (
node.avalanche) {
261 obj.
pushKV(
"bytessent", stats.nSendBytes);
262 obj.
pushKV(
"bytesrecv", stats.nRecvBytes);
264 obj.
pushKV(
"timeoffset", stats.nTimeOffset);
265 if (stats.m_last_ping_time > 0us) {
269 if (stats.m_min_ping_time < std::chrono::microseconds::max()) {
277 obj.
pushKV(
"version", stats.nVersion);
281 obj.
pushKV(
"subver", stats.cleanSubVer);
282 obj.
pushKV(
"inbound", stats.fInbound);
283 obj.
pushKV(
"bip152_hb_to", stats.m_bip152_highbandwidth_to);
284 obj.
pushKV(
"bip152_hb_from", stats.m_bip152_highbandwidth_from);
294 obj.
pushKV(
"inflight", heights);
296 obj.
pushKV(
"minfeefilter",
298 obj.
pushKV(
"addr_relay_enabled",
301 obj.
pushKV(
"addr_rate_limited",
305 for (
const auto &permission :
309 obj.
pushKV(
"permissions", permissions);
312 for (
const auto &i : stats.mapSendBytesPerMsgCmd) {
314 sendPerMsgCmd.
pushKV(i.first, i.second);
317 obj.
pushKV(
"bytessent_per_msg", sendPerMsgCmd);
320 for (
const auto &i : stats.mapRecvBytesPerMsgCmd) {
322 recvPerMsgCmd.
pushKV(i.first, i.second);
325 obj.
pushKV(
"bytesrecv_per_msg", recvPerMsgCmd);
326 obj.
pushKV(
"connection_type",
330 "node_availability_score") &&
331 stats.m_availabilityScore) {
332 obj.
pushKV(
"availability_score",
333 *stats.m_availabilityScore);
347 "Attempts to add or remove a node from the addnode list.\n"
348 "Or try a connection to a node once.\n"
349 "Nodes added using addnode (or -connect) are protected from "
350 "DoS disconnection and are not required to be\n"
351 "full nodes as other outbound peers are (though such peers "
352 "will not be synced from).\n",
355 "The address of the peer to connect to"},
357 "'add' to add a node to the list, 'remove' to remove a "
358 "node from the list, 'onetry' to try a connection to the "
367 const auto command{self.
Arg<std::string>(
"command")};
368 if (command !=
"onetry" && command !=
"add" &&
369 command !=
"remove") {
370 throw std::runtime_error(self.
ToString());
376 const auto node_arg{self.
Arg<std::string>(
"node")};
379 if (command ==
"onetry") {
382 addr,
false,
nullptr,
387 if ((command ==
"add") && (!connman.
AddNode(node_arg))) {
389 "Error: Node already added");
390 }
else if ((command ==
"remove") &&
394 "Error: Node could not be removed. It has not been "
395 "added previously.");
406 "\nOpen an outbound connection to a specified node. This RPC is for "
410 "The IP address and port to attempt connecting to."},
412 "Type of connection to open (\"outbound-full-relay\", "
413 "\"block-relay-only\", \"addr-fetch\", \"feeler\" or "
421 "Address of newly added connection."},
423 "Type of connection opened."},
427 "\"192.168.0.6:8333\" \"outbound-full-relay\"") +
429 "\"192.168.0.6:8333\" \"outbound-full-relay\"")},
432 if (config.GetChainParams().NetworkIDString() !=
434 throw std::runtime_error(
"addconnection is for regression "
435 "testing (-regtest mode) only.");
440 const std::string address = request.params[0].get_str();
441 const std::string conn_type_in{
444 if (conn_type_in ==
"outbound-full-relay") {
446 }
else if (conn_type_in ==
"block-relay-only") {
448 }
else if (conn_type_in ==
"addr-fetch") {
450 }
else if (conn_type_in ==
"feeler") {
452 }
else if (conn_type_in ==
"avalanche") {
453 if (!
node.avalanche) {
455 "Error: avalanche outbound requested "
456 "but avalanche is not enabled.");
465 const bool success = connman.
AddConnection(address, conn_type);
468 "Error: Already at capacity for specified "
473 info.
pushKV(
"address", address);
474 info.
pushKV(
"connection_type", conn_type_in);
484 "Immediately disconnects from the specified peer node.\n"
485 "\nStrictly one out of 'address' and 'nodeid' can be provided to "
486 "identify the node.\n"
487 "\nTo disconnect by nodeid, either set 'address' to the empty string, "
488 "or call using the named 'nodeid' argument only.\n",
492 "The IP address/port of the node"},
495 "The node ID (see getpeerinfo for node IDs)"},
508 const UniValue &address_arg = request.params[0];
509 const UniValue &id_arg = request.params[1];
515 (address_arg.
isStr() &&
516 address_arg.
get_str().empty()))) {
523 "Only one of address and nodeid should be provided.");
528 "Node not found in connected nodes");
539 "Returns information about the given added node, or all added nodes\n"
540 "(note that onetry addnodes are not listed here)\n",
543 "If provided, return information about this specific node, "
544 "otherwise all nodes are returned."},
556 "The node IP address or name (as provided to addnode)"},
560 "Only when connected = true",
567 "The bitcoin server IP and port we're "
570 "connection, inbound or outbound"},
584 if (!request.params[0].isNull()) {
587 if (info.strAddedNode == request.params[0].get_str()) {
588 vInfo.assign(1, info);
595 "Error: Node has not been added.");
603 obj.
pushKV(
"addednode", info.strAddedNode);
604 obj.
pushKV(
"connected", info.fConnected);
606 if (info.fConnected) {
608 address.
pushKV(
"address", info.resolvedAddress.ToString());
609 address.
pushKV(
"connected",
610 info.fInbound ?
"inbound" :
"outbound");
613 obj.
pushKV(
"addresses", addresses);
625 "Returns information about network traffic, including bytes in, "
627 "and current time.\n",
635 "Total bytes received"},
644 "Length of the measuring timeframe in seconds"},
647 "True if target is reached"},
649 "True if serving historical blocks"},
651 "Bytes left in current time cycle"},
653 "Seconds left in current time cycle"},
672 outboundLimit.
pushKV(
"target_reached",
674 outboundLimit.
pushKV(
"serve_historical_blocks",
676 outboundLimit.
pushKV(
"bytes_left_in_cycle",
679 "time_left_in_cycle",
681 obj.
pushKV(
"uploadtarget", outboundLimit);
689 for (
int n = 0; n <
NET_MAX; ++n) {
713 "Returns an object containing various state info regarding P2P "
723 "the server subversion string"},
725 "the protocol version"},
727 "the services we offer to the network"},
729 "localservicesnames",
730 "the services we offer to the network, in human-readable form",
735 "true if transaction relay is requested from peers"},
738 "the total number of connections"},
740 "the number of inbound connections"},
742 "the number of outbound connections"},
744 "whether p2p networking is enabled"},
747 "information per network",
756 "is the network limited using -onlynet?"},
758 "is the network reachable?"},
760 "(\"host:port\") the proxy that is used for this "
761 "network, or empty if none"},
763 "Whether randomized credentials are used"},
767 "minimum relay fee for transactions in " + ticker +
"/kB"},
770 "list of local addresses",
782 "any network and blockchain warnings"},
800 obj.
pushKV(
"localrelay", !
node.peerman->IgnoresIncomingTxs());
804 obj.
pushKV(
"networkactive",
node.connman->GetNetworkActive());
805 obj.
pushKV(
"connections",
node.connman->GetNodeCount(
807 obj.
pushKV(
"connections_in",
809 obj.
pushKV(
"connections_out",
node.connman->GetNodeCount(
817 node.mempool->m_min_relay_feerate.GetFeePerK());
822 for (
const std::pair<const CNetAddr, LocalServiceInfo> &item :
825 rec.
pushKV(
"address", item.first.ToString());
826 rec.
pushKV(
"port", item.second.nPort);
827 rec.
pushKV(
"score", item.second.nScore);
831 obj.
pushKV(
"localaddresses", localAddresses);
841 "Attempts to add or remove an IP/Subnet from the banned list.\n",
844 "The IP/Subnet (see getpeerinfo for nodes IP) with an optional "
845 "netmask (default is /32 = single IP)"},
847 "'add' to add an IP/Subnet to the list, 'remove' to remove an "
848 "IP/Subnet from the list"},
850 "time in seconds how long (or until when if [absolute] is set) "
851 "the IP is banned (0 or empty means using the default time of 24h "
852 "which can also be overwritten by the -bantime startup argument)"},
854 "If set, the bantime must be an absolute timestamp expressed in " +
864 std::string strCommand;
865 if (!request.params[1].isNull()) {
866 strCommand = request.params[1].
get_str();
869 if (strCommand !=
"add" && strCommand !=
"remove") {
876 "Error: Ban database not loaded");
881 bool isSubnet =
false;
883 if (request.params[0].get_str().find(
'/') != std::string::npos) {
889 LookupHost(request.params[0].get_str(), resolved,
false);
897 "Error: Invalid IP/Subnet");
900 if (strCommand ==
"add") {
901 if (isSubnet ?
node.banman->IsBanned(subNet)
902 :
node.banman->IsBanned(netAddr)) {
904 "Error: IP/Subnet already banned");
909 if (!request.params[2].isNull()) {
910 banTime = request.params[2].getInt<int64_t>();
914 if (request.params[3].isTrue()) {
921 node.connman->DisconnectNode(subNet);
926 node.connman->DisconnectNode(netAddr);
929 }
else if (strCommand ==
"remove") {
930 if (!(isSubnet ?
node.banman->Unban(subNet)
931 :
node.banman->Unban(netAddr))) {
934 "Error: Unban failed. Requested address/subnet "
935 "was not previously manually banned.");
946 "List all manually banned IPs/Subnets.\n",
969 "Error: Ban database not loaded");
973 node.banman->GetBanned(banMap);
976 for (
const auto &entry : banMap) {
977 const CBanEntry &banEntry = entry.second;
979 rec.
pushKV(
"address", entry.first.ToString());
986 return bannedAddresses;
994 "Clear all banned IPs.\n",
1005 "Error: Peer-to-peer functionality missing or disabled");
1008 node.banman->ClearBanned();
1018 "Disable/enable all p2p network activity.\n",
1021 "true to enable networking, false to disable"},
1040 "Return known addresses, which can potentially be used to find new "
1041 "nodes in the network.\n",
1044 "The maximum number of addresses to return. Specify 0 to return "
1045 "all known addresses."},
1047 "Return only addresses of the specified network. Can be one of: " +
1060 " when the node was last seen"},
1062 "The services offered by the node"},
1064 "The address of the node"},
1066 "The port number of the node"},
1069 ") the node connected through"},
1075 "network=onion count=12") +
1083 const int count{request.params[0].isNull()
1085 : request.params[0].getInt<
int>()};
1088 "Address count out of range");
1091 const std::optional<Network> network{
1092 request.params[1].isNull()
1094 : std::optional<Network>{
1099 request.params[1].get_str()));
1102 const std::vector<CAddress> vAddr{
1106 for (
const CAddress &addr : vAddr) {
1110 int64_t{TicksSinceEpoch<std::chrono::seconds>(addr.nTime)});
1111 obj.
pushKV(
"services", uint64_t(addr.nServices));
1112 obj.
pushKV(
"address", addr.ToStringIP());
1113 obj.
pushKV(
"port", addr.GetPort());
1125 "Add the address of a potential peer to the address manager. This "
1126 "RPC is for testing only.\n",
1129 "The IP address of the peer"},
1131 "The port of the peer"},
1133 "If true, attempt to add the peer to the tried addresses table"},
1141 "whether the peer address was successfully added to the "
1151 if (!
node.addrman) {
1154 "Error: Address manager functionality missing or disabled");
1157 const std::string &addr_string{request.params[0].get_str()};
1158 const uint16_t port{
1159 static_cast<uint16_t
>(request.params[1].getInt<
int>())};
1160 const bool tried{request.params[2].isTrue()};
1164 bool success{
false};
1166 if (
LookupHost(addr_string, net_addr,
false)) {
1168 address.nTime = Now<NodeSeconds>();
1171 if (
node.addrman->Add({address}, address)) {
1176 node.addrman->Good(address);
1181 obj.
pushKV(
"success", success);
1190 "Send a p2p message to a peer specified by id.\n"
1191 "The message type and body must be provided, the message header will "
1193 "This RPC is for testing only.",
1196 "The peer to send the message to."},
1198 strprintf(
"The message type (maximum length %i)",
1201 "The serialized message body to send, in hex, without a message "
1209 const NodeId peer_id{request.params[0].
getInt<int64_t>()};
1210 const std::string &msg_type{request.params[1].get_str()};
1214 strprintf(
"Error: msg_type too long, max length is %i",
1217 auto msg{TryParseHex<uint8_t>(request.params[2].get_str())};
1218 if (!msg.has_value()) {
1220 "Error parsing input for msg");
1227 msg_ser.
data = msg.value();
1228 msg_ser.
m_type = msg_type;
1237 "Error: Could not send message to peer");
1252 {
"network",
ping, },
1269 for (
const auto &c : commands) {
A CService with information about it as peer.
static const std::string REGTEST
std::chrono::seconds GetMaxOutboundTimeLeftInCycle() const
returns the time in second left in the current max outbound cycle in case of no limit,...
bool OutboundTargetReached(bool historicalBlockServingLimit) const
check if the outbound target is reached.
bool ForNode(NodeId id, std::function< bool(CNode *pnode)> func)
bool AddConnection(const std::string &address, ConnectionType conn_type)
Attempts to open a connection.
bool RemoveAddedNode(const std::string &node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
bool GetNetworkActive() const
uint64_t GetOutboundTargetBytesLeft() const
response the bytes left in the current max outbound cycle in case of no limit, it will always respons...
std::chrono::seconds GetMaxOutboundTimeframe() const
bool DisconnectNode(const std::string &node)
uint64_t GetMaxOutboundTarget() const
size_t GetNodeCount(ConnectionDirection) const
void GetNodeStats(std::vector< CNodeStats > &vstats) const
std::vector< AddedNodeInfo > GetAddedNodeInfo() const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
uint64_t GetTotalBytesRecv() const
std::vector< CAddress > GetAddresses(size_t max_addresses, size_t max_pct, std::optional< Network > network) const
Return all or many randomly selected addresses, optionally by network.
void SetNetworkActive(bool active)
void OpenNetworkConnection(const CAddress &addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound, const char *strDest, ConnectionType conn_type)
bool AddNode(const std::string &node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
void PushMessage(CNode *pnode, CSerializedNetMsg &&msg)
uint64_t GetTotalBytesSent() const
Information about a peer.
void appendCommand(const std::string &name, const CRPCCommand *pcmd)
Appends a CRPCCommand to the dispatch table.
std::string ToStringIPPort() const
static std::vector< std::string > ToStrings(NetPermissionFlags flags)
virtual void SendPings()=0
Send ping message to all peers.
virtual bool GetNodeStateStats(NodeId nodeid, CNodeStateStats &stats) const =0
Get statistics from node state.
auto Arg(size_t i) const
Helper to get a required or default-valued request argument.
std::string ToString() const
void push_back(UniValue val)
const std::string & get_str() const
void pushKV(std::string key, UniValue val)
bool randomize_credentials
static constexpr int CLIENT_VERSION
bitcoind-res.rc includes this file, but it cannot cope with real c++ code.
RecursiveMutex cs_main
Mutex to guard access to validation specific variables, such as reading or changing the chainstate.
static path absolute(const path &p)
const std::string NET_MESSAGE_COMMAND_OTHER
GlobalMutex g_maplocalhost_mutex
std::string ConnectionTypeAsString(ConnectionType conn_type)
Convert ConnectionType enum to a string value.
std::string userAgent(const Config &config)
bool IsReachable(enum Network net)
const std::vector< std::string > CONNECTION_TYPE_DOC
ConnectionType
Different types of connections to a peer.
@ BLOCK_RELAY
We use block-relay-only connections to help prevent against partition attacks.
@ MANUAL
We open manual connections to addresses that users explicitly inputted via the addnode RPC,...
@ OUTBOUND_FULL_RELAY
These are the default connections that we use to connect with the network.
@ FEELER
Feeler connections are short-lived connections made to check that a node is alive.
@ AVALANCHE_OUTBOUND
Special case of connection to a full relay outbound with avalanche service enabled.
@ ADDR_FETCH
AddrFetch connections are short lived connections used to solicit addresses from peers.
std::map< CSubNet, CBanEntry > banmap_t
@ NET_MAX
Dummy value to indicate the number of NET_* constants.
@ NET_UNROUTABLE
Addresses from these networks are not publicly routable on the global Internet.
@ NET_INTERNAL
A set of addresses that represent the hash of a string or FQDN.
std::string GetNetworkName(enum Network net)
bool GetProxy(enum Network net, proxyType &proxyInfoOut)
bool LookupSubNet(const std::string &strSubnet, CSubNet &ret, DNSLookupFn dns_lookup_function)
Parse and resolve a specified subnet string into the appropriate internal representation.
enum Network ParseNetwork(const std::string &net_in)
bool LookupHost(const std::string &name, std::vector< CNetAddr > &vIP, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
std::vector< std::string > GetNetworkNames(bool append_unroutable)
Return a vector of publicly routable Network names; optionally append NET_UNROUTABLE.
ServiceFlags
nServices flags.
UniValue JSONRPCError(int code, const std::string &message)
void RegisterNetRPCCommands(CRPCTable &t)
Register P2P networking RPC commands.
static RPCHelpMan getnetworkinfo()
static RPCHelpMan addconnection()
static RPCHelpMan getaddednodeinfo()
static RPCHelpMan clearbanned()
static RPCHelpMan getnettotals()
static RPCHelpMan addnode()
static RPCHelpMan getnodeaddresses()
static RPCHelpMan setban()
static UniValue GetNetworksInfo()
static RPCHelpMan getconnectioncount()
static RPCHelpMan disconnectnode()
static RPCHelpMan listbanned()
static RPCHelpMan setnetworkactive()
static RPCHelpMan addpeeraddress()
static RPCHelpMan getpeerinfo()
static RPCHelpMan sendmsgtopeer()
@ RPC_CLIENT_NODE_NOT_CONNECTED
Node to disconnect not found in connected nodes.
@ RPC_CLIENT_INVALID_IP_OR_SUBNET
Invalid IP/Subnet.
@ RPC_MISC_ERROR
General application defined errors std::exception thrown in command handling.
@ RPC_CLIENT_NODE_ALREADY_ADDED
Node is already added.
@ RPC_INVALID_PARAMETER
Invalid, missing or duplicate parameter.
@ RPC_DATABASE_ERROR
Database error.
@ RPC_CLIENT_NODE_NOT_ADDED
Node has not been added before.
@ RPC_CLIENT_NODE_CAPACITY_REACHED
Max number of outbound or block-relay connections already open.
@ RPC_CLIENT_P2P_DISABLED
No valid connection manager instance found.
std::string HelpExampleCli(const std::string &methodname, const std::string &args)
UniValue GetServicesNames(ServiceFlags services)
Returns, given services flags, a list of humanly readable (known) network services.
std::string HelpExampleRpc(const std::string &methodname, const std::string &args)
const std::string UNIX_EPOCH_TIME
String used to describe UNIX epoch time in documentation, factored out to a constant for consistency.
bool IsDeprecatedRPCEnabled(const ArgsManager &args, const std::string &method)
NodeContext & EnsureAnyNodeContext(const std::any &context)
PeerManager & EnsurePeerman(const NodeContext &node)
ArgsManager & EnsureArgsman(const NodeContext &node)
CConnman & EnsureConnman(const NodeContext &node)
auto Join(const std::vector< T > &list, const BaseType &separator, UnaryOp unary_op) -> decltype(unary_op(list.at(0)))
Join a list of items.
std::string TrimString(std::string_view str, std::string_view pattern=" \f\n\r\t\v")
std::chrono::microseconds m_ping_wait
Amount m_fee_filter_received
std::vector< int > vHeightInFlight
bool m_addr_relay_enabled
uint64_t m_addr_rate_limited
uint64_t m_addr_processed
ServiceFlags their_services
POD that contains various stats about a node.
std::vector< uint8_t > data
static const Currency & get()
@ STR_HEX
Special type that is a STR with only hex chars.
std::string DefaultHint
Hint for default value.
@ NUM_TIME
Special numeric to denote unix epoch time.
@ OBJ_DYN
Special dictionary with keys that are not literals.
@ STR_HEX
Special string with only hex chars.
NodeContext struct containing references to chain state and connection state.
int64_t GetTimeMillis()
Returns the system time (not mockable)
constexpr int64_t count_seconds(std::chrono::seconds t)
double CountSecondsDouble(SecondsDouble t)
Helper to count the seconds in any std::chrono::duration type.
int64_t GetTimeOffset()
"Never go to sea with two chronometers; take one or three." Our three time sources are:
const UniValue NullUniValue
static const int PROTOCOL_VERSION
network protocol versioning
bilingual_str GetWarnings(bool verbose)
Format a string that describes several potential problems detected by the core.