1#![doc(
4 html_logo_url = "https://raw.githubusercontent.com/paradigmxyz/reth/main/assets/reth-docs.png",
5 html_favicon_url = "https://avatars0.githubusercontent.com/u/97369466?s=256",
6 issue_tracker_base_url = "https://github.com/paradigmxyz/reth/issues/"
7)]
8#![cfg_attr(not(test), warn(unused_crate_dependencies))]
9#![cfg_attr(docsrs, feature(doc_cfg, doc_auto_cfg))]
10
11use std::{
12 collections::HashSet,
13 fmt,
14 net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
15 sync::Arc,
16 time::Duration,
17};
18
19use ::enr::Enr;
20use alloy_primitives::bytes::Bytes;
21use discv5::ListenConfig;
22use enr::{discv4_id_to_discv5_id, EnrCombinedKeyWrapper};
23use futures::future::join_all;
24use itertools::Itertools;
25use rand::{Rng, RngCore};
26use reth_ethereum_forks::{EnrForkIdEntry, ForkId};
27use reth_network_peers::{NodeRecord, PeerId};
28use secp256k1::SecretKey;
29use tokio::{sync::mpsc, task};
30use tracing::{debug, error, trace};
31
32pub mod config;
33pub mod enr;
34pub mod error;
35pub mod filter;
36pub mod metrics;
37pub mod network_stack_id;
38
39pub use discv5::{self, IpMode};
40
41pub use config::{
42 BootNode, Config, ConfigBuilder, DEFAULT_COUNT_BOOTSTRAP_LOOKUPS, DEFAULT_DISCOVERY_V5_ADDR,
43 DEFAULT_DISCOVERY_V5_ADDR_IPV6, DEFAULT_DISCOVERY_V5_LISTEN_CONFIG, DEFAULT_DISCOVERY_V5_PORT,
44 DEFAULT_SECONDS_BOOTSTRAP_LOOKUP_INTERVAL, DEFAULT_SECONDS_LOOKUP_INTERVAL,
45};
46pub use enr::enr_to_discv4_id;
47pub use error::Error;
48pub use filter::{FilterOutcome, MustNotIncludeKeys};
49pub use network_stack_id::NetworkStackId;
50
51use metrics::{DiscoveredPeersMetrics, Discv5Metrics};
52
53pub const MAX_KBUCKET_INDEX: usize = 255;
57
58pub const DEFAULT_MIN_TARGET_KBUCKET_INDEX: usize = 0;
64
65#[derive(Clone)]
67pub struct Discv5 {
68 discv5: Arc<discv5::Discv5>,
70 rlpx_ip_mode: IpMode,
72 fork_key: Option<&'static [u8]>,
74 discovered_peer_filter: MustNotIncludeKeys,
76 metrics: Discv5Metrics,
78}
79
80impl Discv5 {
81 pub fn add_node(&self, node_record: Enr<SecretKey>) -> Result<(), Error> {
87 let EnrCombinedKeyWrapper(enr) = node_record.into();
88 self.discv5.add_enr(enr).map_err(Error::AddNodeFailed)
89 }
90
91 pub fn set_eip868_in_local_enr(&self, key: Vec<u8>, rlp: Bytes) {
97 let Ok(key_str) = std::str::from_utf8(&key) else {
98 error!(target: "net::discv5",
99 err="key not utf-8",
100 "failed to update local enr"
101 );
102 return
103 };
104 if let Err(err) = self.discv5.enr_insert(key_str, &rlp) {
105 error!(target: "net::discv5",
106 %err,
107 "failed to update local enr"
108 );
109 }
110 }
111
112 pub fn encode_and_set_eip868_in_local_enr(
116 &self,
117 key: Vec<u8>,
118 value: impl alloy_rlp::Encodable,
119 ) {
120 let mut buf = Vec::new();
121 value.encode(&mut buf);
122 self.set_eip868_in_local_enr(key, buf.into())
123 }
124
125 pub fn ban(&self, peer_id: PeerId, ip: IpAddr) {
129 match discv4_id_to_discv5_id(peer_id) {
130 Ok(node_id) => {
131 self.discv5.ban_node(&node_id, None);
132 self.ban_ip(ip);
133 }
134 Err(err) => error!(target: "net::discv5",
135 %err,
136 "failed to ban peer"
137 ),
138 }
139 }
140
141 pub fn ban_ip(&self, ip: IpAddr) {
145 self.discv5.ban_ip(ip, None);
146 }
147
148 pub fn node_record(&self) -> Option<NodeRecord> {
154 let enr: Enr<_> = EnrCombinedKeyWrapper(self.discv5.local_enr()).into();
155 enr.try_into().ok()
156 }
157
158 pub async fn start(
162 sk: &SecretKey,
163 discv5_config: Config,
164 ) -> Result<(Self, mpsc::Receiver<discv5::Event>, NodeRecord), Error> {
165 let (enr, bc_enr, fork_key, rlpx_ip_mode) = build_local_enr(sk, &discv5_config);
169
170 trace!(target: "net::discv5",
171 ?enr,
172 "local ENR"
173 );
174
175 let Config {
179 discv5_config,
180 bootstrap_nodes,
181 lookup_interval,
182 bootstrap_lookup_interval,
183 bootstrap_lookup_countdown,
184 discovered_peer_filter,
185 ..
186 } = discv5_config;
187
188 let EnrCombinedKeyWrapper(enr) = enr.into();
189 let sk = discv5::enr::CombinedKey::secp256k1_from_bytes(&mut sk.secret_bytes()).unwrap();
190 let mut discv5 = match discv5::Discv5::new(enr, sk, discv5_config) {
191 Ok(discv5) => discv5,
192 Err(err) => return Err(Error::InitFailure(err)),
193 };
194 discv5.start().await.map_err(Error::Discv5Error)?;
195
196 let discv5_updates = discv5.event_stream().await.map_err(Error::Discv5Error)?;
198
199 let discv5 = Arc::new(discv5);
200
201 bootstrap(bootstrap_nodes, &discv5).await?;
205
206 let metrics = Discv5Metrics::default();
207
208 spawn_populate_kbuckets_bg(
212 lookup_interval,
213 bootstrap_lookup_interval,
214 bootstrap_lookup_countdown,
215 metrics.clone(),
216 discv5.clone(),
217 );
218
219 Ok((
220 Self { discv5, rlpx_ip_mode, fork_key, discovered_peer_filter, metrics },
221 discv5_updates,
222 bc_enr,
223 ))
224 }
225
226 pub fn on_discv5_update(&self, update: discv5::Event) -> Option<DiscoveredPeer> {
228 #[allow(clippy::match_same_arms)]
229 match update {
230 discv5::Event::SocketUpdated(_) | discv5::Event::TalkRequest(_) |
231 discv5::Event::Discovered(_) => None,
233 discv5::Event::NodeInserted { replaced: _, .. } => {
234
235 self.metrics.discovered_peers.increment_kbucket_insertions(1);
240
241 None
242 }
243 discv5::Event::SessionEstablished(enr, remote_socket) => {
244 self.metrics.discovered_peers.increment_established_sessions_raw(1);
252
253 self.on_discovered_peer(&enr, remote_socket)
254 }
255 discv5::Event::UnverifiableEnr {
256 enr,
257 socket,
258 node_id: _,
259 } => {
260 trace!(target: "net::discv5",
275 ?enr,
276 %socket,
277 "discovered unverifiable enr, source socket doesn't match socket advertised in ENR"
278 );
279
280 self.metrics.discovered_peers.increment_unverifiable_enrs_raw_total(1);
281
282 self.on_discovered_peer(&enr, socket)
283 }
284 _ => None
285 }
286 }
287
288 pub fn on_discovered_peer(
290 &self,
291 enr: &discv5::Enr,
292 socket: SocketAddr,
293 ) -> Option<DiscoveredPeer> {
294 self.metrics.discovered_peers_advertised_networks.increment_once_by_network_type(enr);
295
296 let node_record = match self.try_into_reachable(enr, socket) {
297 Ok(enr_bc) => enr_bc,
298 Err(err) => {
299 trace!(target: "net::discv5",
300 %err,
301 ?enr,
302 "discovered peer is unreachable"
303 );
304
305 self.metrics.discovered_peers.increment_established_sessions_unreachable_enr(1);
306
307 return None
308 }
309 };
310 if let FilterOutcome::Ignore { reason } = self.filter_discovered_peer(enr) {
311 trace!(target: "net::discv5",
312 ?enr,
313 reason,
314 "filtered out discovered peer"
315 );
316
317 self.metrics.discovered_peers.increment_established_sessions_filtered(1);
318
319 return None
320 }
321
322 let fork_id = (self.fork_key == Some(NetworkStackId::ETH))
324 .then(|| self.get_fork_id(enr).ok())
325 .flatten();
326
327 trace!(target: "net::discv5",
328 ?fork_id,
329 ?enr,
330 "discovered peer"
331 );
332
333 Some(DiscoveredPeer { node_record, fork_id })
334 }
335
336 pub fn try_into_reachable(
339 &self,
340 enr: &discv5::Enr,
341 socket: SocketAddr,
342 ) -> Result<NodeRecord, Error> {
343 let id = enr_to_discv4_id(enr).ok_or(Error::IncompatibleKeyType)?;
344
345 if enr.tcp4().is_none() && enr.tcp6().is_none() {
346 return Err(Error::UnreachableRlpx)
347 }
348 let Some(tcp_port) = (match self.rlpx_ip_mode {
349 IpMode::Ip4 => enr.tcp4(),
350 IpMode::Ip6 => enr.tcp6(),
351 _ => unimplemented!("dual-stack support not implemented for rlpx"),
352 }) else {
353 return Err(Error::IpVersionMismatchRlpx(self.rlpx_ip_mode))
354 };
355
356 Ok(NodeRecord { address: socket.ip(), tcp_port, udp_port: socket.port(), id })
357 }
358
359 pub fn filter_discovered_peer(&self, enr: &discv5::Enr) -> FilterOutcome {
362 self.discovered_peer_filter.filter(enr)
363 }
364
365 pub fn get_fork_id<K: discv5::enr::EnrKey>(
368 &self,
369 enr: &discv5::enr::Enr<K>,
370 ) -> Result<ForkId, Error> {
371 let Some(key) = self.fork_key else { return Err(Error::NetworkStackIdNotConfigured) };
372 let fork_id = enr
373 .get_decodable::<EnrForkIdEntry>(key)
374 .ok_or(Error::ForkMissing(key))?
375 .map(Into::into)?;
376
377 Ok(fork_id)
378 }
379
380 pub fn with_discv5<F, R>(&self, f: F) -> R
386 where
387 F: FnOnce(&discv5::Discv5) -> R,
388 {
389 f(&self.discv5)
390 }
391
392 pub const fn ip_mode(&self) -> IpMode {
398 self.rlpx_ip_mode
399 }
400
401 pub const fn fork_key(&self) -> Option<&[u8]> {
403 self.fork_key
404 }
405}
406
407impl fmt::Debug for Discv5 {
408 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
409 "{ .. }".fmt(f)
410 }
411}
412
413#[derive(Debug)]
415pub struct DiscoveredPeer {
416 pub node_record: NodeRecord,
418 pub fork_id: Option<ForkId>,
420}
421
422pub fn build_local_enr(
424 sk: &SecretKey,
425 config: &Config,
426) -> (Enr<SecretKey>, NodeRecord, Option<&'static [u8]>, IpMode) {
427 let mut builder = discv5::enr::Enr::builder();
428
429 let Config { discv5_config, fork, tcp_socket, other_enr_kv_pairs, .. } = config;
430
431 let socket = match discv5_config.listen_config {
432 ListenConfig::Ipv4 { ip, port } => {
433 if ip != Ipv4Addr::UNSPECIFIED {
434 builder.ip4(ip);
435 }
436 builder.udp4(port);
437 builder.tcp4(tcp_socket.port());
438
439 (ip, port).into()
440 }
441 ListenConfig::Ipv6 { ip, port } => {
442 if ip != Ipv6Addr::UNSPECIFIED {
443 builder.ip6(ip);
444 }
445 builder.udp6(port);
446 builder.tcp6(tcp_socket.port());
447
448 (ip, port).into()
449 }
450 ListenConfig::DualStack { ipv4, ipv4_port, ipv6, ipv6_port } => {
451 if ipv4 != Ipv4Addr::UNSPECIFIED {
452 builder.ip4(ipv4);
453 }
454 builder.udp4(ipv4_port);
455 builder.tcp4(tcp_socket.port());
456
457 if ipv6 != Ipv6Addr::UNSPECIFIED {
458 builder.ip6(ipv6);
459 }
460 builder.udp6(ipv6_port);
461
462 (ipv6, ipv6_port).into()
463 }
464 };
465
466 let rlpx_ip_mode = if tcp_socket.is_ipv4() { IpMode::Ip4 } else { IpMode::Ip6 };
467
468 let network_stack_id = fork.as_ref().map(|(network_stack_id, fork_value)| {
470 builder.add_value_rlp(network_stack_id, alloy_rlp::encode(fork_value).into());
471 *network_stack_id
472 });
473
474 for (key, value) in other_enr_kv_pairs {
476 builder.add_value_rlp(key, value.clone().into());
477 }
478
479 let enr = builder.build(sk).expect("should build enr v4");
482
483 let bc_enr = NodeRecord::from_secret_key(socket, sk);
485
486 (enr, bc_enr, network_stack_id, rlpx_ip_mode)
487}
488
489pub async fn bootstrap(
491 bootstrap_nodes: HashSet<BootNode>,
492 discv5: &Arc<discv5::Discv5>,
493) -> Result<(), Error> {
494 trace!(target: "net::discv5",
495 ?bootstrap_nodes,
496 "adding bootstrap nodes .."
497 );
498
499 let mut enr_requests = vec![];
500 for node in bootstrap_nodes {
501 match node {
502 BootNode::Enr(node) => {
503 if let Err(err) = discv5.add_enr(node) {
504 return Err(Error::AddNodeFailed(err))
505 }
506 }
507 BootNode::Enode(enode) => {
508 let discv5 = discv5.clone();
509 enr_requests.push(async move {
510 if let Err(err) = discv5.request_enr(enode.to_string()).await {
511 debug!(target: "net::discv5",
512 ?enode,
513 %err,
514 "failed adding boot node"
515 );
516 }
517 })
518 }
519 }
520 }
521
522 Ok(_ = join_all(enr_requests).await)
524}
525
526pub fn spawn_populate_kbuckets_bg(
528 lookup_interval: u64,
529 bootstrap_lookup_interval: u64,
530 bootstrap_lookup_countdown: u64,
531 metrics: Discv5Metrics,
532 discv5: Arc<discv5::Discv5>,
533) {
534 task::spawn({
535 let local_node_id = discv5.local_enr().node_id();
536 let lookup_interval = Duration::from_secs(lookup_interval);
537 let metrics = metrics.discovered_peers;
538 let mut kbucket_index = MAX_KBUCKET_INDEX;
539 let pulse_lookup_interval = Duration::from_secs(bootstrap_lookup_interval);
540 async move {
543 for i in (0..bootstrap_lookup_countdown).rev() {
546 let target = discv5::enr::NodeId::random();
547
548 trace!(target: "net::discv5",
549 %target,
550 bootstrap_boost_runs_countdown=i,
551 lookup_interval=format!("{:#?}", pulse_lookup_interval),
552 "starting bootstrap boost lookup query"
553 );
554
555 lookup(target, &discv5, &metrics).await;
556
557 tokio::time::sleep(pulse_lookup_interval).await;
558 }
559
560 loop {
562 let target = get_lookup_target(kbucket_index, local_node_id);
565
566 trace!(target: "net::discv5",
567 %target,
568 lookup_interval=format!("{:#?}", lookup_interval),
569 "starting periodic lookup query"
570 );
571
572 lookup(target, &discv5, &metrics).await;
573
574 if kbucket_index > DEFAULT_MIN_TARGET_KBUCKET_INDEX {
575 kbucket_index -= 1
577 } else {
578 kbucket_index = MAX_KBUCKET_INDEX
580 }
581
582 tokio::time::sleep(lookup_interval).await;
583 }
584 }
585 });
586}
587
588pub fn get_lookup_target(
590 kbucket_index: usize,
591 local_node_id: discv5::enr::NodeId,
592) -> discv5::enr::NodeId {
593 let mut target = local_node_id.raw();
595
596 let bit_offset = MAX_KBUCKET_INDEX.saturating_sub(kbucket_index);
598 let (byte, bit) = (bit_offset / 8, bit_offset % 8);
599 target[byte] ^= 1 << (7 - bit);
601
602 let mut rng = rand::thread_rng();
604 if bit < 7 {
606 let bits_to_randomize = 0xff >> (bit + 1);
608 target[byte] &= !bits_to_randomize;
610 target[byte] |= rng.gen::<u8>() & bits_to_randomize;
612 }
613 rng.fill_bytes(&mut target[byte + 1..]);
615
616 target.into()
617}
618
619pub async fn lookup(
621 target: discv5::enr::NodeId,
622 discv5: &discv5::Discv5,
623 metrics: &DiscoveredPeersMetrics,
624) {
625 metrics.set_total_sessions(discv5.metrics().active_sessions);
626 metrics.set_total_kbucket_peers(
627 discv5.with_kbuckets(|kbuckets| kbuckets.read().iter_ref().count()),
628 );
629
630 match discv5.find_node(target).await {
631 Err(err) => trace!(target: "net::discv5",
632 %err,
633 "lookup query failed"
634 ),
635 Ok(peers) => trace!(target: "net::discv5",
636 target=format!("{:#?}", target),
637 peers_count=peers.len(),
638 peers=format!("[{:#}]", peers.iter()
639 .map(|enr| enr.node_id()
640 ).format(", ")),
641 "peers returned by lookup query"
642 ),
643 }
644
645 debug!(target: "net::discv5",
649 connected_peers=discv5.connected_peers(),
650 "connected peers in routing table"
651 );
652}
653
654#[cfg(test)]
655mod test {
656 use super::*;
657 use ::enr::{CombinedKey, EnrKey};
658 use rand::thread_rng;
659 use reth_chainspec::MAINNET;
660 use tracing::trace;
661
662 fn discv5_noop() -> Discv5 {
663 let sk = CombinedKey::generate_secp256k1();
664 Discv5 {
665 discv5: Arc::new(
666 discv5::Discv5::new(
667 Enr::empty(&sk).unwrap(),
668 sk,
669 discv5::ConfigBuilder::new(DEFAULT_DISCOVERY_V5_LISTEN_CONFIG).build(),
670 )
671 .unwrap(),
672 ),
673 rlpx_ip_mode: IpMode::Ip4,
674 fork_key: None,
675 discovered_peer_filter: MustNotIncludeKeys::default(),
676 metrics: Discv5Metrics::default(),
677 }
678 }
679
680 async fn start_discovery_node(
681 udp_port_discv5: u16,
682 ) -> (Discv5, mpsc::Receiver<discv5::Event>, NodeRecord) {
683 let secret_key = SecretKey::new(&mut thread_rng());
684
685 let discv5_addr: SocketAddr = format!("127.0.0.1:{udp_port_discv5}").parse().unwrap();
686 let rlpx_addr: SocketAddr = "127.0.0.1:30303".parse().unwrap();
687
688 let discv5_listen_config = ListenConfig::from(discv5_addr);
689 let discv5_config = Config::builder(rlpx_addr)
690 .discv5_config(discv5::ConfigBuilder::new(discv5_listen_config).build())
691 .build();
692
693 Discv5::start(&secret_key, discv5_config).await.expect("should build discv5")
694 }
695
696 #[tokio::test(flavor = "multi_thread")]
697 async fn discv5() {
698 reth_tracing::init_test_tracing();
699
700 let (node_1, mut stream_1, _) = start_discovery_node(30344).await;
704 let node_1_enr = node_1.with_discv5(|discv5| discv5.local_enr());
705
706 let (node_2, mut stream_2, _) = start_discovery_node(30355).await;
708 let node_2_enr = node_2.with_discv5(|discv5| discv5.local_enr());
709
710 trace!(target: "net::discv5::test",
711 node_1_node_id=format!("{:#}", node_1_enr.node_id()),
712 node_2_node_id=format!("{:#}", node_2_enr.node_id()),
713 "started nodes"
714 );
715
716 let node_2_enr_reth_compatible_ty: Enr<SecretKey> =
720 EnrCombinedKeyWrapper(node_2_enr.clone()).into();
721 node_1.add_node(node_2_enr_reth_compatible_ty).unwrap();
722
723 assert!(
725 node_1.with_discv5(|discv5| discv5.table_entries_id().contains(&node_2_enr.node_id()))
726 );
727
728 node_1.with_discv5(|discv5| discv5.send_ping(node_2_enr.clone())).await.unwrap();
730
731 let event_1_v5 = stream_1.recv().await.unwrap();
733
734 assert!(matches!(
735 event_1_v5,
736 discv5::Event::SessionEstablished(node, socket) if node == node_2_enr && socket == node_2_enr.udp4_socket().unwrap().into()
737 ));
738
739 let event_2_v5 = stream_2.recv().await.unwrap();
741 assert!(matches!(
742 event_2_v5,
743 discv5::Event::NodeInserted { node_id, replaced } if node_id == node_1_enr.node_id() && replaced.is_none()
744 ));
745 }
746
747 #[test]
748 fn discovered_enr_disc_socket_missing() {
749 reth_tracing::init_test_tracing();
750
751 const REMOTE_RLPX_PORT: u16 = 30303;
753 let remote_socket = "104.28.44.25:9000".parse().unwrap();
754 let remote_key = CombinedKey::generate_secp256k1();
755 let remote_enr = Enr::builder().tcp4(REMOTE_RLPX_PORT).build(&remote_key).unwrap();
756
757 let discv5 = discv5_noop();
758
759 let filtered_peer = discv5.on_discovered_peer(&remote_enr, remote_socket);
761
762 assert_eq!(
763 NodeRecord {
764 address: remote_socket.ip(),
765 udp_port: remote_socket.port(),
766 tcp_port: REMOTE_RLPX_PORT,
767 id: enr_to_discv4_id(&remote_enr).unwrap(),
768 },
769 filtered_peer.unwrap().node_record
770 )
771 }
772
773 #[allow(unreachable_pub)]
776 #[allow(unused)]
777 #[allow(clippy::assign_op_pattern)]
778 mod sigp {
779 use alloy_primitives::U256;
780 use enr::{
781 k256::sha2::digest::generic_array::{typenum::U32, GenericArray},
782 NodeId,
783 };
784
785 #[derive(Clone, Debug)]
795 pub struct Key<T> {
796 preimage: T,
797 hash: GenericArray<u8, U32>,
798 }
799
800 impl<T> PartialEq for Key<T> {
801 fn eq(&self, other: &Self) -> bool {
802 self.hash == other.hash
803 }
804 }
805
806 impl<T> Eq for Key<T> {}
807
808 impl<TPeerId> AsRef<Self> for Key<TPeerId> {
809 fn as_ref(&self) -> &Self {
810 self
811 }
812 }
813
814 impl<T> Key<T> {
815 pub const fn new_raw(preimage: T, hash: GenericArray<u8, U32>) -> Self {
817 Self { preimage, hash }
818 }
819
820 pub const fn preimage(&self) -> &T {
822 &self.preimage
823 }
824
825 pub fn into_preimage(self) -> T {
827 self.preimage
828 }
829
830 pub fn distance<U>(&self, other: &Key<U>) -> Distance {
832 let a = U256::from_be_slice(self.hash.as_slice());
833 let b = U256::from_be_slice(other.hash.as_slice());
834 Distance(a ^ b)
835 }
836
837 pub fn log2_distance<U>(&self, other: &Key<U>) -> Option<u64> {
841 let xor_dist = self.distance(other);
842 let log_dist = (256 - xor_dist.0.leading_zeros() as u64);
843 (log_dist != 0).then_some(log_dist)
844 }
845 }
846
847 impl From<NodeId> for Key<NodeId> {
848 fn from(node_id: NodeId) -> Self {
849 Self { preimage: node_id, hash: *GenericArray::from_slice(&node_id.raw()) }
850 }
851 }
852
853 #[derive(Copy, Clone, PartialEq, Eq, Default, PartialOrd, Ord, Debug)]
855 pub struct Distance(pub(super) U256);
856 }
857
858 #[test]
859 fn select_lookup_target() {
860 for bucket_index in 0..=MAX_KBUCKET_INDEX {
861 let sk = CombinedKey::generate_secp256k1();
862 let local_node_id = discv5::enr::NodeId::from(sk.public());
863 let target = get_lookup_target(bucket_index, local_node_id);
864
865 let local_node_id = sigp::Key::from(local_node_id);
866 let target = sigp::Key::from(target);
867
868 assert_eq!(local_node_id.log2_distance(&target), Some(bucket_index as u64 + 1));
869 }
870 }
871
872 #[test]
873 fn build_enr_from_config() {
874 const TCP_PORT: u16 = 30303;
875 let fork_id = MAINNET.latest_fork_id();
876
877 let config = Config::builder((Ipv4Addr::UNSPECIFIED, TCP_PORT).into())
878 .fork(NetworkStackId::ETH, fork_id)
879 .build();
880
881 let sk = SecretKey::new(&mut thread_rng());
882 let (enr, _, _, _) = build_local_enr(&sk, &config);
883
884 let decoded_fork_id = enr
885 .get_decodable::<EnrForkIdEntry>(NetworkStackId::ETH)
886 .unwrap()
887 .map(Into::into)
888 .unwrap();
889
890 assert_eq!(fork_id, decoded_fork_id);
891 assert_eq!(TCP_PORT, enr.tcp4().unwrap()); }
893}