2021-06-16 16:19:45 -04:00
|
|
|
package common
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/ecdsa"
|
|
|
|
crand "crypto/rand"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
mrand "math/rand"
|
parent 3179532b645549c103266e007694d2c81a7091b4
author shashankshampi <shashank.sanket1995@gmail.com> 1729780155 +0530
committer shashankshampi <shashank.sanket1995@gmail.com> 1730274350 +0530
test: Code Migration from status-cli-tests
fix_: functional tests (#5979)
* fix_: generate on test-functional
* chore(test)_: fix functional test assertion
---------
Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com>
feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977)
* feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766)
The original GH issue https://github.com/status-im/status-mobile/issues/21113
came from a request from the Legal team. We must show to Status v1 users the new
terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2
from the stores.
The solution we use is to create a flag in the accounts table, named
hasAcceptedTerms. The flag will be set to true on the first account ever
created in v2 and we provide a native call in mobile/status.go#AcceptTerms,
which allows the client to persist the user's choice in case they are upgrading
(from v1 -> v2, or from a v2 older than this PR).
This solution is not the best because we should store the setting in a separate
table, not in the accounts table.
Related Mobile PR https://github.com/status-im/status-mobile/pull/21124
* fix(test)_: Compare addresses using uppercased strings
---------
Co-authored-by: Icaro Motta <icaro.ldm@gmail.com>
test_: restore account (#5960)
feat_: `LogOnPanic` linter (#5969)
* feat_: LogOnPanic linter
* fix_: add missing defer LogOnPanic
* chore_: make vendor
* fix_: tests, address pr comments
* fix_: address pr comments
fix(ci)_: remove workspace and tmp dir
This ensures we do not encounter weird errors like:
```
+ ln -s /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907 /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go
ln: failed to create symbolic link '/home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go': File exists
script returned exit code 1
```
Signed-off-by: Jakub Sokołowski <jakub@status.im>
chore_: enable windows and macos CI build (#5840)
- Added support for Windows and macOS in CI pipelines
- Added missing dependencies for Windows and x86-64-darwin
- Resolved macOS SDK version compatibility for darwin-x86_64
The `mkShell` override was necessary to ensure compatibility with the newer
macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures
because of the missing libs and frameworks. OverrideSDK creates a mapping from
the default SDK in all package categories to the requested SDK (11.0).
fix(contacts)_: fix trust status not being saved to cache when changed (#5965)
Fixes https://github.com/status-im/status-desktop/issues/16392
cleanup
added logger and cleanup
review comments changes
fix_: functional tests (#5979)
* fix_: generate on test-functional
* chore(test)_: fix functional test assertion
---------
Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com>
feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977)
* feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766)
The original GH issue https://github.com/status-im/status-mobile/issues/21113
came from a request from the Legal team. We must show to Status v1 users the new
terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2
from the stores.
The solution we use is to create a flag in the accounts table, named
hasAcceptedTerms. The flag will be set to true on the first account ever
created in v2 and we provide a native call in mobile/status.go#AcceptTerms,
which allows the client to persist the user's choice in case they are upgrading
(from v1 -> v2, or from a v2 older than this PR).
This solution is not the best because we should store the setting in a separate
table, not in the accounts table.
Related Mobile PR https://github.com/status-im/status-mobile/pull/21124
* fix(test)_: Compare addresses using uppercased strings
---------
Co-authored-by: Icaro Motta <icaro.ldm@gmail.com>
test_: restore account (#5960)
feat_: `LogOnPanic` linter (#5969)
* feat_: LogOnPanic linter
* fix_: add missing defer LogOnPanic
* chore_: make vendor
* fix_: tests, address pr comments
* fix_: address pr comments
chore_: enable windows and macos CI build (#5840)
- Added support for Windows and macOS in CI pipelines
- Added missing dependencies for Windows and x86-64-darwin
- Resolved macOS SDK version compatibility for darwin-x86_64
The `mkShell` override was necessary to ensure compatibility with the newer
macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures
because of the missing libs and frameworks. OverrideSDK creates a mapping from
the default SDK in all package categories to the requested SDK (11.0).
fix(contacts)_: fix trust status not being saved to cache when changed (#5965)
Fixes https://github.com/status-im/status-desktop/issues/16392
test_: remove port bind
chore(wallet)_: move route execution code to separate module
chore_: replace geth logger with zap logger (#5962)
closes: #6002
feat(telemetry)_: add metrics for message reliability (#5899)
* feat(telemetry)_: track message reliability
Add metrics for dial errors, missed messages,
missed relevant messages, and confirmed delivery.
* fix_: handle error from json marshal
chore_: use zap logger as request logger
iterates: status-im/status-desktop#16536
test_: unique project per run
test_: use docker compose v2, more concrete project name
fix(codecov)_: ignore folders without tests
Otherwise Codecov reports incorrect numbers when making changes.
https://docs.codecov.com/docs/ignoring-paths
Signed-off-by: Jakub Sokołowski <jakub@status.im>
test_: verify schema of signals during init; fix schema verification warnings (#5947)
fix_: update defaultGorushURL (#6011)
fix(tests)_: use non-standard port to avoid conflicts
We have observed `nimbus-eth2` build failures reporting this port:
```json
{
"lvl": "NTC",
"ts": "2024-10-28 13:51:32.308+00:00",
"msg": "REST HTTP server could not be started",
"topics": "beacnde",
"address": "127.0.0.1:5432",
"reason": "(98) Address already in use"
}
```
https://ci.status.im/job/nimbus-eth2/job/platforms/job/linux/job/x86_64/job/main/job/PR-6683/3/
Signed-off-by: Jakub Sokołowski <jakub@status.im>
fix_: create request logger ad-hoc in tests
Fixes `TestCall` failing when run concurrently.
chore_: configure codecov (#6005)
* chore_: configure codecov
* fix_: after_n_builds
2024-10-24 19:59:15 +05:30
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/multiformats/go-multiaddr"
|
2021-06-16 16:19:45 -04:00
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
)
|
|
|
|
|
|
|
|
// IsPubKeyEqual checks that two public keys are equal
|
|
|
|
func IsPubKeyEqual(a, b *ecdsa.PublicKey) bool {
|
|
|
|
if !ValidatePublicKey(a) {
|
|
|
|
return false
|
|
|
|
} else if !ValidatePublicKey(b) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
// the curve is always the same, just compare the points
|
|
|
|
return a.X.Cmp(b.X) == 0 && a.Y.Cmp(b.Y) == 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// ValidatePublicKey checks the format of the given public key.
|
|
|
|
func ValidatePublicKey(k *ecdsa.PublicKey) bool {
|
|
|
|
return k != nil && k.X != nil && k.Y != nil && k.X.Sign() != 0 && k.Y.Sign() != 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// BytesToUintLittleEndian converts the slice to 64-bit unsigned integer.
|
|
|
|
func BytesToUintLittleEndian(b []byte) (res uint64) {
|
|
|
|
mul := uint64(1)
|
|
|
|
for i := 0; i < len(b); i++ {
|
|
|
|
res += uint64(b[i]) * mul
|
|
|
|
mul *= 256
|
|
|
|
}
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
// BytesToUintBigEndian converts the slice to 64-bit unsigned integer.
|
|
|
|
func BytesToUintBigEndian(b []byte) (res uint64) {
|
|
|
|
for i := 0; i < len(b); i++ {
|
|
|
|
res *= 256
|
|
|
|
res += uint64(b[i])
|
|
|
|
}
|
|
|
|
return res
|
|
|
|
}
|
|
|
|
|
|
|
|
// ContainsOnlyZeros checks if the data contain only zeros.
|
|
|
|
func ContainsOnlyZeros(data []byte) bool {
|
|
|
|
for _, b := range data {
|
|
|
|
if b != 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateSecureRandomData generates random data where extra security is required.
|
|
|
|
// The purpose of this function is to prevent some bugs in software or in hardware
|
|
|
|
// from delivering not-very-random data. This is especially useful for AES nonce,
|
|
|
|
// where true randomness does not really matter, but it is very important to have
|
|
|
|
// a unique nonce for every message.
|
|
|
|
func GenerateSecureRandomData(length int) ([]byte, error) {
|
|
|
|
x := make([]byte, length)
|
|
|
|
y := make([]byte, length)
|
|
|
|
res := make([]byte, length)
|
|
|
|
|
|
|
|
_, err := crand.Read(x)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else if !ValidateDataIntegrity(x, length) {
|
|
|
|
return nil, errors.New("crypto/rand failed to generate secure random data")
|
|
|
|
}
|
|
|
|
_, err = mrand.Read(y) // nolint: gosec
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
} else if !ValidateDataIntegrity(y, length) {
|
|
|
|
return nil, errors.New("math/rand failed to generate secure random data")
|
|
|
|
}
|
|
|
|
for i := 0; i < length; i++ {
|
|
|
|
res[i] = x[i] ^ y[i]
|
|
|
|
}
|
|
|
|
if !ValidateDataIntegrity(res, length) {
|
|
|
|
return nil, errors.New("failed to generate secure random data")
|
|
|
|
}
|
|
|
|
return res, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GenerateRandomID generates a random string, which is then returned to be used as a key id
|
|
|
|
func GenerateRandomID() (id string, err error) {
|
|
|
|
buf, err := GenerateSecureRandomData(KeyIDSize)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if !ValidateDataIntegrity(buf, KeyIDSize) {
|
|
|
|
return "", fmt.Errorf("error in generateRandomID: crypto/rand failed to generate random data")
|
|
|
|
}
|
|
|
|
id = common.Bytes2Hex(buf)
|
|
|
|
return id, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// ValidateDataIntegrity returns false if the data have the wrong or contains all zeros,
|
|
|
|
// which is the simplest and the most common bug.
|
|
|
|
func ValidateDataIntegrity(k []byte, expectedSize int) bool {
|
|
|
|
if len(k) != expectedSize {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if expectedSize > 3 && ContainsOnlyZeros(k) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
parent 3179532b645549c103266e007694d2c81a7091b4
author shashankshampi <shashank.sanket1995@gmail.com> 1729780155 +0530
committer shashankshampi <shashank.sanket1995@gmail.com> 1730274350 +0530
test: Code Migration from status-cli-tests
fix_: functional tests (#5979)
* fix_: generate on test-functional
* chore(test)_: fix functional test assertion
---------
Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com>
feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977)
* feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766)
The original GH issue https://github.com/status-im/status-mobile/issues/21113
came from a request from the Legal team. We must show to Status v1 users the new
terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2
from the stores.
The solution we use is to create a flag in the accounts table, named
hasAcceptedTerms. The flag will be set to true on the first account ever
created in v2 and we provide a native call in mobile/status.go#AcceptTerms,
which allows the client to persist the user's choice in case they are upgrading
(from v1 -> v2, or from a v2 older than this PR).
This solution is not the best because we should store the setting in a separate
table, not in the accounts table.
Related Mobile PR https://github.com/status-im/status-mobile/pull/21124
* fix(test)_: Compare addresses using uppercased strings
---------
Co-authored-by: Icaro Motta <icaro.ldm@gmail.com>
test_: restore account (#5960)
feat_: `LogOnPanic` linter (#5969)
* feat_: LogOnPanic linter
* fix_: add missing defer LogOnPanic
* chore_: make vendor
* fix_: tests, address pr comments
* fix_: address pr comments
fix(ci)_: remove workspace and tmp dir
This ensures we do not encounter weird errors like:
```
+ ln -s /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907 /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go
ln: failed to create symbolic link '/home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go': File exists
script returned exit code 1
```
Signed-off-by: Jakub Sokołowski <jakub@status.im>
chore_: enable windows and macos CI build (#5840)
- Added support for Windows and macOS in CI pipelines
- Added missing dependencies for Windows and x86-64-darwin
- Resolved macOS SDK version compatibility for darwin-x86_64
The `mkShell` override was necessary to ensure compatibility with the newer
macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures
because of the missing libs and frameworks. OverrideSDK creates a mapping from
the default SDK in all package categories to the requested SDK (11.0).
fix(contacts)_: fix trust status not being saved to cache when changed (#5965)
Fixes https://github.com/status-im/status-desktop/issues/16392
cleanup
added logger and cleanup
review comments changes
fix_: functional tests (#5979)
* fix_: generate on test-functional
* chore(test)_: fix functional test assertion
---------
Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com>
feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977)
* feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766)
The original GH issue https://github.com/status-im/status-mobile/issues/21113
came from a request from the Legal team. We must show to Status v1 users the new
terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2
from the stores.
The solution we use is to create a flag in the accounts table, named
hasAcceptedTerms. The flag will be set to true on the first account ever
created in v2 and we provide a native call in mobile/status.go#AcceptTerms,
which allows the client to persist the user's choice in case they are upgrading
(from v1 -> v2, or from a v2 older than this PR).
This solution is not the best because we should store the setting in a separate
table, not in the accounts table.
Related Mobile PR https://github.com/status-im/status-mobile/pull/21124
* fix(test)_: Compare addresses using uppercased strings
---------
Co-authored-by: Icaro Motta <icaro.ldm@gmail.com>
test_: restore account (#5960)
feat_: `LogOnPanic` linter (#5969)
* feat_: LogOnPanic linter
* fix_: add missing defer LogOnPanic
* chore_: make vendor
* fix_: tests, address pr comments
* fix_: address pr comments
chore_: enable windows and macos CI build (#5840)
- Added support for Windows and macOS in CI pipelines
- Added missing dependencies for Windows and x86-64-darwin
- Resolved macOS SDK version compatibility for darwin-x86_64
The `mkShell` override was necessary to ensure compatibility with the newer
macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures
because of the missing libs and frameworks. OverrideSDK creates a mapping from
the default SDK in all package categories to the requested SDK (11.0).
fix(contacts)_: fix trust status not being saved to cache when changed (#5965)
Fixes https://github.com/status-im/status-desktop/issues/16392
test_: remove port bind
chore(wallet)_: move route execution code to separate module
chore_: replace geth logger with zap logger (#5962)
closes: #6002
feat(telemetry)_: add metrics for message reliability (#5899)
* feat(telemetry)_: track message reliability
Add metrics for dial errors, missed messages,
missed relevant messages, and confirmed delivery.
* fix_: handle error from json marshal
chore_: use zap logger as request logger
iterates: status-im/status-desktop#16536
test_: unique project per run
test_: use docker compose v2, more concrete project name
fix(codecov)_: ignore folders without tests
Otherwise Codecov reports incorrect numbers when making changes.
https://docs.codecov.com/docs/ignoring-paths
Signed-off-by: Jakub Sokołowski <jakub@status.im>
test_: verify schema of signals during init; fix schema verification warnings (#5947)
fix_: update defaultGorushURL (#6011)
fix(tests)_: use non-standard port to avoid conflicts
We have observed `nimbus-eth2` build failures reporting this port:
```json
{
"lvl": "NTC",
"ts": "2024-10-28 13:51:32.308+00:00",
"msg": "REST HTTP server could not be started",
"topics": "beacnde",
"address": "127.0.0.1:5432",
"reason": "(98) Address already in use"
}
```
https://ci.status.im/job/nimbus-eth2/job/platforms/job/linux/job/x86_64/job/main/job/PR-6683/3/
Signed-off-by: Jakub Sokołowski <jakub@status.im>
fix_: create request logger ad-hoc in tests
Fixes `TestCall` failing when run concurrently.
chore_: configure codecov (#6005)
* chore_: configure codecov
* fix_: after_n_builds
2024-10-24 19:59:15 +05:30
|
|
|
|
|
|
|
func ParseDialErrors(errMsg string) []DialError {
|
|
|
|
// Regular expression to match the array of failed dial attempts
|
|
|
|
re := regexp.MustCompile(`all dials failed\n((?:\s*\*\s*\[.*\].*\n?)+)`)
|
|
|
|
|
|
|
|
match := re.FindStringSubmatch(errMsg)
|
|
|
|
if len(match) < 2 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Split the matched string into individual dial attempts
|
|
|
|
dialAttempts := strings.Split(strings.TrimSpace(match[1]), "\n")
|
|
|
|
|
|
|
|
// Regular expression to extract multiaddr and error message
|
|
|
|
reAttempt := regexp.MustCompile(`\[(.*?)\]\s*(.*)`)
|
|
|
|
|
|
|
|
var dialErrors []DialError
|
|
|
|
for _, attempt := range dialAttempts {
|
|
|
|
attempt = strings.TrimSpace(strings.Trim(attempt, "* "))
|
|
|
|
matches := reAttempt.FindStringSubmatch(attempt)
|
|
|
|
if len(matches) != 3 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
errMsg := strings.TrimSpace(matches[2])
|
|
|
|
ma, err := multiaddr.NewMultiaddr(matches[1])
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
protocols := ma.Protocols()
|
|
|
|
protocolsStr := "/"
|
|
|
|
for i, protocol := range protocols {
|
|
|
|
protocolsStr += protocol.Name
|
|
|
|
if i < len(protocols)-1 {
|
|
|
|
protocolsStr += "/"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
dialErrors = append(dialErrors, DialError{
|
|
|
|
Protocols: protocolsStr,
|
|
|
|
MultiAddr: matches[1],
|
|
|
|
ErrMsg: errMsg,
|
|
|
|
ErrType: CategorizeDialError(errMsg),
|
|
|
|
})
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return dialErrors
|
|
|
|
}
|
|
|
|
|
|
|
|
// DialErrorType represents the type of dial error
|
|
|
|
type DialErrorType int
|
|
|
|
|
|
|
|
const (
|
|
|
|
ErrorUnknown DialErrorType = iota
|
|
|
|
ErrorIOTimeout
|
|
|
|
ErrorConnectionRefused
|
|
|
|
ErrorRelayCircuitFailed
|
|
|
|
ErrorRelayNoReservation
|
|
|
|
ErrorSecurityNegotiationFailed
|
|
|
|
ErrorConcurrentDialSucceeded
|
|
|
|
ErrorConcurrentDialFailed
|
|
|
|
ErrorConnectionsPerIPLimitExceeded
|
|
|
|
ErrorStreamReset
|
|
|
|
ErrorRelayResourceLimitExceeded
|
|
|
|
ErrorOpeningHopStreamToRelay
|
|
|
|
ErrorDialBackoff
|
|
|
|
)
|
|
|
|
|
|
|
|
func (det DialErrorType) String() string {
|
|
|
|
return [...]string{
|
|
|
|
"Unknown",
|
|
|
|
"I/O Timeout",
|
|
|
|
"Connection Refused",
|
|
|
|
"Relay Circuit Failed",
|
|
|
|
"Relay No Reservation",
|
|
|
|
"Security Negotiation Failed",
|
|
|
|
"Concurrent Dial Succeeded",
|
|
|
|
"Concurrent Dial Failed",
|
|
|
|
"Connections Per IP Limit Exceeded",
|
|
|
|
"Stream Reset",
|
|
|
|
"Relay Resource Limit Exceeded",
|
|
|
|
"Error Opening Hop Stream to Relay",
|
|
|
|
"Dial Backoff",
|
|
|
|
}[det]
|
|
|
|
}
|
|
|
|
|
|
|
|
func CategorizeDialError(errMsg string) DialErrorType {
|
|
|
|
switch {
|
|
|
|
case strings.Contains(errMsg, "i/o timeout"):
|
|
|
|
return ErrorIOTimeout
|
|
|
|
case strings.Contains(errMsg, "connect: connection refused"):
|
|
|
|
return ErrorConnectionRefused
|
|
|
|
case strings.Contains(errMsg, "error opening relay circuit: CONNECTION_FAILED"):
|
|
|
|
return ErrorRelayCircuitFailed
|
|
|
|
case strings.Contains(errMsg, "error opening relay circuit: NO_RESERVATION"):
|
|
|
|
return ErrorRelayNoReservation
|
|
|
|
case strings.Contains(errMsg, "failed to negotiate security protocol"):
|
|
|
|
return ErrorSecurityNegotiationFailed
|
|
|
|
case strings.Contains(errMsg, "concurrent active dial succeeded"):
|
|
|
|
return ErrorConcurrentDialSucceeded
|
|
|
|
case strings.Contains(errMsg, "concurrent active dial through the same relay failed"):
|
|
|
|
return ErrorConcurrentDialFailed
|
|
|
|
case strings.Contains(errMsg, "connections per ip limit exceeded"):
|
|
|
|
return ErrorConnectionsPerIPLimitExceeded
|
|
|
|
case strings.Contains(errMsg, "stream reset"):
|
|
|
|
return ErrorStreamReset
|
|
|
|
case strings.Contains(errMsg, "error opening relay circuit: RESOURCE_LIMIT_EXCEEDED"):
|
|
|
|
return ErrorRelayResourceLimitExceeded
|
|
|
|
case strings.Contains(errMsg, "error opening hop stream to relay: connection failed"):
|
|
|
|
return ErrorOpeningHopStreamToRelay
|
|
|
|
case strings.Contains(errMsg, "dial backoff"):
|
|
|
|
return ErrorDialBackoff
|
|
|
|
default:
|
|
|
|
return ErrorUnknown
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DialError represents a single dial error with its multiaddr and error message
|
|
|
|
type DialError struct {
|
|
|
|
MultiAddr string
|
|
|
|
ErrMsg string
|
|
|
|
ErrType DialErrorType
|
|
|
|
Protocols string
|
|
|
|
}
|