2019-08-20 16:18:15 +00:00
|
|
|
## Nim-LibP2P
|
2019-09-24 17:48:23 +00:00
|
|
|
## Copyright (c) 2019 Status Research & Development GmbH
|
2019-08-20 16:18:15 +00:00
|
|
|
## Licensed under either of
|
|
|
|
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
|
|
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
|
|
## at your option.
|
|
|
|
## This file may not be copied, modified, or distributed except according to
|
|
|
|
## those terms.
|
|
|
|
|
2019-12-04 04:44:54 +00:00
|
|
|
import chronos, chronicles, sequtils
|
2019-09-24 16:16:39 +00:00
|
|
|
import transport,
|
|
|
|
../wire,
|
|
|
|
../connection,
|
|
|
|
../multiaddress,
|
|
|
|
../multicodec,
|
|
|
|
../stream/chronosstream
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2019-09-12 00:15:04 +00:00
|
|
|
logScope:
|
|
|
|
topic = "TcpTransport"
|
|
|
|
|
2019-08-20 16:18:15 +00:00
|
|
|
type TcpTransport* = ref object of Transport
|
|
|
|
server*: StreamServer
|
|
|
|
|
2020-04-06 21:33:44 +00:00
|
|
|
proc cleanup(t: Transport, conn: Connection) {.async.} =
|
|
|
|
await conn.closeEvent.wait()
|
|
|
|
t.connections.keepItIf(it != conn)
|
|
|
|
|
2019-08-28 19:03:58 +00:00
|
|
|
proc connHandler*(t: Transport,
|
|
|
|
server: StreamServer,
|
2019-09-24 16:16:39 +00:00
|
|
|
client: StreamTransport,
|
|
|
|
initiator: bool = false):
|
2019-08-30 22:16:37 +00:00
|
|
|
Future[Connection] {.async, gcsafe.} =
|
2019-09-23 21:51:28 +00:00
|
|
|
trace "handling connection for", address = $client.remoteAddress
|
2019-08-22 21:35:47 +00:00
|
|
|
let conn: Connection = newConnection(newChronosStream(server, client))
|
2019-10-08 21:01:50 +00:00
|
|
|
conn.observedAddrs = MultiAddress.init(client.remoteAddress)
|
2019-09-05 15:20:05 +00:00
|
|
|
if not initiator:
|
2020-04-05 02:44:44 +00:00
|
|
|
if not isNil(t.handler):
|
|
|
|
asyncCheck t.handler(conn)
|
2020-04-06 21:33:44 +00:00
|
|
|
|
|
|
|
t.connections.add(conn)
|
|
|
|
asyncCheck t.cleanup(conn)
|
|
|
|
|
2019-08-22 21:35:47 +00:00
|
|
|
result = conn
|
|
|
|
|
2019-08-20 16:18:15 +00:00
|
|
|
proc connCb(server: StreamServer,
|
2019-08-30 15:28:07 +00:00
|
|
|
client: StreamTransport) {.async, gcsafe.} =
|
2019-09-23 21:51:28 +00:00
|
|
|
trace "incomming connection for", address = $client.remoteAddress
|
2019-08-21 22:53:16 +00:00
|
|
|
let t: Transport = cast[Transport](server.udata)
|
Noise (#90)
* Start ChaCha20Poly1305 integration (BearSSL)
* Add Curve25519 (BearSSL) required operations for noise
* Fix curve mulgen iterate/derive
* Fix misleading header
* Add chachapoly proper test
* Curve25519 integration tests (failing, something is wrong)
* Add few converters, finish c25519 integration tests
* Remove implicit converters
* removed internal globals
* Start noise implementation
* Fix public() using proper bear mulgen
* Noise protocol WIP
* Noise progress
* Add a quick nim version of HKDF
* Converted hkdf to iterator, useful for noise
* Noise protocol implementation progress
* Noise progress
* XX handshake almost there
* noise progress
* Noise, testing handshake with test vectors
* Noise handshake progress, still wrong somewhere!
* Noise handshake success!
* Full verified noise XX handshake completed
* Fix and rewrite test to be similar to switch one
* Start with connection upgrade
* Switch chachapoly to CT implementations
* Improve HKDF implementation
* Use a type insted of tuple for HandshakeResult
* Remove unnecessary Let
* More cosmetic fixes
* Properly check randomBytes result
* Fix chachapoly signature
* Noise full circle (altho dispatcher is nil cursed)
* Allow nil aads in chachapoly routines
* Noise implementation up to running full test
* Use bearssl HKDF as well
* Directly use bearssl rng for curve25519 keys
* Add a (disabled/no CI) noise interop test server
* WIP on fixing interop issues
* More fixes in noise implementation for interop
* bump chronos requirement (nimble)
* Add a chachapoly test for very small size payloads
* Noise, more tracing
* Add 2 properly working noise tests
* Fix payload packing, following the spec properly (and not go version but
rather rust)
* Sanity, replace discard with asyncCheck
* Small fixes and optimization
* Use stew endian2 rather then system endian module
* Update nimble deps (chronos)
* Minor cosmetic/code sanity fixes
* Noise, handle Nonce max
* Noise tests, make sure to close secured conns
* More polish, improve code readability too
* More polish and testing again which test fails
* Further polishing
* Restore noise tests
* Remove useless Future[void]
* Remove useless CipherState initializer
* add a proper read wait future in second noise test
* Remove noise generic secure implementation for now
* Few fixes to run eth2 sim
* Add more debug info in noise traces
* Merge size + payload write in sendEncryptedMessage
* Revert secure interface, add outgoing property directly in newNoise
* remove sendEncrypted and receiveEncrypted
* Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
|
|
|
asyncCheck t.connHandler(server, client)
|
2019-08-20 16:18:15 +00:00
|
|
|
|
|
|
|
method init*(t: TcpTransport) =
|
|
|
|
t.multicodec = multiCodec("tcp")
|
|
|
|
|
2019-08-30 15:28:07 +00:00
|
|
|
method close*(t: TcpTransport): Future[void] {.async, gcsafe.} =
|
2019-08-20 16:18:15 +00:00
|
|
|
## start the transport
|
2019-09-23 21:51:28 +00:00
|
|
|
trace "stopping transport"
|
2019-08-21 23:13:20 +00:00
|
|
|
await procCall Transport(t).close() # call base
|
2019-08-21 22:53:16 +00:00
|
|
|
|
2020-04-06 03:56:17 +00:00
|
|
|
# server can be nil
|
2020-04-07 15:49:56 +00:00
|
|
|
if not isNil(t.server):
|
2020-04-06 03:56:17 +00:00
|
|
|
t.server.stop()
|
|
|
|
t.server.close()
|
2020-04-06 21:33:44 +00:00
|
|
|
await t.server.join()
|
|
|
|
trace "transport stopped"
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2019-08-26 15:37:15 +00:00
|
|
|
method listen*(t: TcpTransport,
|
|
|
|
ma: MultiAddress,
|
2019-09-25 17:36:39 +00:00
|
|
|
handler: ConnHandler):
|
2019-09-12 00:15:04 +00:00
|
|
|
Future[Future[void]] {.async, gcsafe.} =
|
|
|
|
discard await procCall Transport(t).listen(ma, handler) # call base
|
2019-08-21 23:13:20 +00:00
|
|
|
|
|
|
|
## listen on the transport
|
2019-09-12 00:15:04 +00:00
|
|
|
t.server = createStreamServer(t.ma, connCb, {}, t)
|
|
|
|
t.server.start()
|
2019-09-25 17:36:39 +00:00
|
|
|
|
|
|
|
# always get the resolved address in case we're bound to 0.0.0.0:0
|
2019-10-08 21:01:50 +00:00
|
|
|
t.ma = MultiAddress.init(t.server.sock.getLocalAddress())
|
2019-09-12 00:15:04 +00:00
|
|
|
result = t.server.join()
|
2019-11-06 18:25:33 +00:00
|
|
|
trace "started node on", address = t.ma
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2019-08-26 15:37:15 +00:00
|
|
|
method dial*(t: TcpTransport,
|
2019-09-24 16:16:39 +00:00
|
|
|
address: MultiAddress):
|
2019-08-30 22:16:37 +00:00
|
|
|
Future[Connection] {.async, gcsafe.} =
|
2019-09-23 21:51:28 +00:00
|
|
|
trace "dialing remote peer", address = $address
|
2019-08-20 16:18:15 +00:00
|
|
|
## dial a peer
|
|
|
|
let client: StreamTransport = await connect(address)
|
2019-09-05 15:20:05 +00:00
|
|
|
result = await t.connHandler(t.server, client, true)
|
2019-08-22 00:23:13 +00:00
|
|
|
|
2019-12-10 20:50:35 +00:00
|
|
|
method handles*(t: TcpTransport, address: MultiAddress): bool {.gcsafe.} =
|
2019-12-04 04:44:54 +00:00
|
|
|
if procCall Transport(t).handles(address):
|
|
|
|
result = address.protocols.filterIt( it == multiCodec("tcp") ).len > 0
|