nim-libp2p/libp2p/transports/tcptransport.nim

83 lines
2.8 KiB
Nim
Raw Normal View History

## Nim-LibP2P
2019-09-24 17:48:23 +00:00
## Copyright (c) 2019 Status Research & Development GmbH
## Licensed under either of
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
## at your option.
## This file may not be copied, modified, or distributed except according to
## those terms.
import chronos, chronicles, sequtils
import transport,
../wire,
../connection,
../multiaddress,
../multicodec,
../stream/chronosstream
2019-09-12 00:15:04 +00:00
logScope:
topic = "TcpTransport"
type TcpTransport* = ref object of Transport
server*: StreamServer
2019-08-28 19:03:58 +00:00
proc connHandler*(t: Transport,
server: StreamServer,
client: StreamTransport,
initiator: bool = false):
2019-08-30 22:16:37 +00:00
Future[Connection] {.async, gcsafe.} =
trace "handling connection for", address = $client.remoteAddress
let conn: Connection = newConnection(newChronosStream(server, client))
conn.observedAddrs = MultiAddress.init(client.remoteAddress)
2019-09-05 15:20:05 +00:00
if not initiator:
let handlerFut = if isNil(t.handler): nil else: t.handler(conn)
2019-09-05 15:20:05 +00:00
let connHolder: ConnHolder = ConnHolder(connection: conn,
connFuture: handlerFut)
t.connections.add(connHolder)
result = conn
proc connCb(server: StreamServer,
2019-08-30 15:28:07 +00:00
client: StreamTransport) {.async, gcsafe.} =
trace "incomming connection for", address = $client.remoteAddress
2019-08-21 22:53:16 +00:00
let t: Transport = cast[Transport](server.udata)
Noise (#90) * Start ChaCha20Poly1305 integration (BearSSL) * Add Curve25519 (BearSSL) required operations for noise * Fix curve mulgen iterate/derive * Fix misleading header * Add chachapoly proper test * Curve25519 integration tests (failing, something is wrong) * Add few converters, finish c25519 integration tests * Remove implicit converters * removed internal globals * Start noise implementation * Fix public() using proper bear mulgen * Noise protocol WIP * Noise progress * Add a quick nim version of HKDF * Converted hkdf to iterator, useful for noise * Noise protocol implementation progress * Noise progress * XX handshake almost there * noise progress * Noise, testing handshake with test vectors * Noise handshake progress, still wrong somewhere! * Noise handshake success! * Full verified noise XX handshake completed * Fix and rewrite test to be similar to switch one * Start with connection upgrade * Switch chachapoly to CT implementations * Improve HKDF implementation * Use a type insted of tuple for HandshakeResult * Remove unnecessary Let * More cosmetic fixes * Properly check randomBytes result * Fix chachapoly signature * Noise full circle (altho dispatcher is nil cursed) * Allow nil aads in chachapoly routines * Noise implementation up to running full test * Use bearssl HKDF as well * Directly use bearssl rng for curve25519 keys * Add a (disabled/no CI) noise interop test server * WIP on fixing interop issues * More fixes in noise implementation for interop * bump chronos requirement (nimble) * Add a chachapoly test for very small size payloads * Noise, more tracing * Add 2 properly working noise tests * Fix payload packing, following the spec properly (and not go version but rather rust) * Sanity, replace discard with asyncCheck * Small fixes and optimization * Use stew endian2 rather then system endian module * Update nimble deps (chronos) * Minor cosmetic/code sanity fixes * Noise, handle Nonce max * Noise tests, make sure to close secured conns * More polish, improve code readability too * More polish and testing again which test fails * Further polishing * Restore noise tests * Remove useless Future[void] * Remove useless CipherState initializer * add a proper read wait future in second noise test * Remove noise generic secure implementation for now * Few fixes to run eth2 sim * Add more debug info in noise traces * Merge size + payload write in sendEncryptedMessage * Revert secure interface, add outgoing property directly in newNoise * remove sendEncrypted and receiveEncrypted * Use openarray in chachapoly and curve25519 helpers
2020-03-17 12:30:01 +00:00
asyncCheck t.connHandler(server, client)
method init*(t: TcpTransport) =
t.multicodec = multiCodec("tcp")
2019-08-30 15:28:07 +00:00
method close*(t: TcpTransport): Future[void] {.async, gcsafe.} =
## start the transport
trace "stopping transport"
await procCall Transport(t).close() # call base
2019-08-21 22:53:16 +00:00
t.server.stop()
2019-09-13 00:56:32 +00:00
t.server.close()
trace "transport stopped"
2019-08-26 15:37:15 +00:00
method listen*(t: TcpTransport,
ma: MultiAddress,
2019-09-25 17:36:39 +00:00
handler: ConnHandler):
2019-09-12 00:15:04 +00:00
Future[Future[void]] {.async, gcsafe.} =
discard await procCall Transport(t).listen(ma, handler) # call base
## listen on the transport
2019-09-12 00:15:04 +00:00
t.server = createStreamServer(t.ma, connCb, {}, t)
t.server.start()
2019-09-25 17:36:39 +00:00
# always get the resolved address in case we're bound to 0.0.0.0:0
t.ma = MultiAddress.init(t.server.sock.getLocalAddress())
2019-09-12 00:15:04 +00:00
result = t.server.join()
trace "started node on", address = t.ma
2019-08-26 15:37:15 +00:00
method dial*(t: TcpTransport,
address: MultiAddress):
2019-08-30 22:16:37 +00:00
Future[Connection] {.async, gcsafe.} =
trace "dialing remote peer", address = $address
## dial a peer
let client: StreamTransport = await connect(address)
2019-09-05 15:20:05 +00:00
result = await t.connHandler(t.server, client, true)
method handles*(t: TcpTransport, address: MultiAddress): bool {.gcsafe.} =
if procCall Transport(t).handles(address):
result = address.protocols.filterIt( it == multiCodec("tcp") ).len > 0