forked from sei-protocol/sei-tendermint
-
Notifications
You must be signed in to change notification settings - Fork 0
/
utils.go
52 lines (45 loc) · 1.49 KB
/
utils.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
package privval
import (
"errors"
"fmt"
"net"
"github.com/anchorageoss/sei-tendermint/crypto/ed25519"
"github.com/anchorageoss/sei-tendermint/libs/log"
tmnet "github.com/anchorageoss/sei-tendermint/libs/net"
)
// IsConnTimeout returns a boolean indicating whether the error is known to
// report that a connection timeout occurred. This detects both fundamental
// network timeouts, as well as ErrConnTimeout errors.
func IsConnTimeout(err error) bool {
_, ok := errors.Unwrap(err).(timeoutError)
switch {
case errors.As(err, &EndpointTimeoutError{}):
return true
case ok:
return true
default:
return false
}
}
// NewSignerListener creates a new SignerListenerEndpoint using the corresponding listen address
func NewSignerListener(listenAddr string, logger log.Logger) (*SignerListenerEndpoint, error) {
protocol, address := tmnet.ProtocolAndAddress(listenAddr)
if protocol != "unix" && protocol != "tcp" { //nolint:goconst
return nil, fmt.Errorf("unsupported address family %q, want unix or tcp", protocol)
}
ln, err := net.Listen(protocol, address)
if err != nil {
return nil, err
}
var listener net.Listener
switch protocol {
case "unix":
listener = NewUnixListener(ln)
case "tcp":
// TODO: persist this key so external signer can actually authenticate us
listener = NewTCPListener(ln, ed25519.GenPrivKey())
default:
panic("invalid protocol: " + protocol) // semantically unreachable
}
return NewSignerListenerEndpoint(logger.With("module", "privval"), listener), nil
}