Print timeout during request too
[dnsseed-rust] / src / main.rs
index be4c8fcfd07d32b52dd0f506f9b9f905a39ed914..0e90a32f54360d6e71c1dcca2c11be838ce9122b 100644 (file)
@@ -9,7 +9,7 @@ use std::collections::HashMap;
 use std::sync::{Arc, Mutex};
 use std::sync::atomic::{Ordering, AtomicBool};
 use std::time::{Duration, Instant};
-use std::net::SocketAddr;
+use std::net::{SocketAddr, ToSocketAddrs};
 
 use bitcoin_hashes::sha256d;
 
@@ -183,15 +183,39 @@ pub fn scan_node(scan_time: Instant, node: SocketAddr) {
                        let old_state = store.set_node_state(node, state_lock.fail_reason, 0);
                        if old_state != state_lock.fail_reason && state_lock.msg.0 != "" && state_lock.msg.1 {
                                printer.add_line(format!("Updating {} from {} to {}", node, old_state.to_str(), &state_lock.msg.0), state_lock.msg.1);
+                       } else if old_state != state_lock.fail_reason && state_lock.fail_reason == AddressState::TimeoutDuringRequest {
+                               printer.add_line(format!("Updating {} from {} to Timeout During Request (ver: {}, vack: {}, addr: {}, block: {})",
+                                       node, old_state.to_str(), state_lock.recvd_version, state_lock.recvd_verack, state_lock.recvd_addrs, state_lock.recvd_block), true);
                        }
                }
                future::ok(())
        }));
 }
 
+fn poll_dnsseeds() {
+       tokio::spawn(future::lazy(|| {
+               let printer = unsafe { PRINTER.as_ref().unwrap() };
+               let store = unsafe { DATA_STORE.as_ref().unwrap() };
+
+               let mut new_addrs = 0;
+               for seed in ["seed.bitcoin.sipa.be", "dnsseed.bitcoin.dashjr.org", "seed.bitcoinstats.com", "seed.bitcoin.jonasschnelli.ch", "seed.btc.petertodd.org", "seed.bitcoin.sprovoost.nl", "dnsseed.emzy.de"].iter() {
+                       new_addrs += store.add_fresh_addrs((*seed, 8333u16).to_socket_addrs().unwrap_or(Vec::new().into_iter()));
+                       new_addrs += store.add_fresh_addrs((("x9.".to_string() + seed).as_str(), 8333u16).to_socket_addrs().unwrap_or(Vec::new().into_iter()));
+               }
+               printer.add_line(format!("Added {} new addresses from other DNS seeds", new_addrs), false);
+               Delay::new(Instant::now() + Duration::from_secs(60)).then(|_| {
+                       if !START_SHUTDOWN.load(Ordering::Relaxed) {
+                               poll_dnsseeds();
+                       }
+                       future::ok(())
+               })
+       }));
+}
+
 fn scan_net() {
        tokio::spawn(future::lazy(|| {
                let store = unsafe { DATA_STORE.as_ref().unwrap() };
+
                let mut scan_nodes = store.get_next_scan_nodes();
                let per_iter_time = Duration::from_millis(1000 / store.get_u64(U64Setting::ConnsPerSec));
                let start_time = Instant::now();
@@ -270,6 +294,7 @@ fn make_trusted_conn(trusted_sockaddr: SocketAddr) {
                                                if top_height >= starting_height as u64 {
                                                        if !SCANNING.swap(true, Ordering::SeqCst) {
                                                                scan_net();
+                                                               poll_dnsseeds();
                                                        }
                                                }
                                        } else {