mirror of
https://github.com/status-im/status-go.git
synced 2025-01-10 06:36:32 +00:00
eeca435064
Update vendor Integrate rendezvous into status node Add a test with failover using rendezvous Use multiple servers in client Use discovery V5 by default and test that node can be started with rendezvous discovet Fix linter Update rendezvous client to one with instrumented stream Address feedback Fix test with updated topic limits Apply several suggestions Change log to debug for request errors because we continue execution Remove web3js after rebase Update rendezvous package
82 lines
2.1 KiB
Go
82 lines
2.1 KiB
Go
// Package secio is used to encrypt `go-libp2p-conn` connections. Connections wrapped by secio use secure sessions provided by this package to encrypt all traffic. A TLS-like handshake is used to setup the communication channel.
|
|
package secio
|
|
|
|
import (
|
|
"context"
|
|
"net"
|
|
"time"
|
|
|
|
cs "github.com/libp2p/go-conn-security"
|
|
ci "github.com/libp2p/go-libp2p-crypto"
|
|
peer "github.com/libp2p/go-libp2p-peer"
|
|
)
|
|
|
|
// ID is secio's protocol ID (used when negotiating with multistream)
|
|
const ID = "/secio/1.0.0"
|
|
|
|
// SessionGenerator constructs secure communication sessions for a peer.
|
|
type Transport struct {
|
|
LocalID peer.ID
|
|
PrivateKey ci.PrivKey
|
|
}
|
|
|
|
func New(sk ci.PrivKey) (*Transport, error) {
|
|
id, err := peer.IDFromPrivateKey(sk)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &Transport{
|
|
LocalID: id,
|
|
PrivateKey: sk,
|
|
}, nil
|
|
}
|
|
|
|
var _ cs.Transport = (*Transport)(nil)
|
|
|
|
func (sg *Transport) SecureInbound(ctx context.Context, insecure net.Conn) (cs.Conn, error) {
|
|
return newSecureSession(ctx, sg.LocalID, sg.PrivateKey, insecure, "")
|
|
}
|
|
func (sg *Transport) SecureOutbound(ctx context.Context, insecure net.Conn, p peer.ID) (cs.Conn, error) {
|
|
return newSecureSession(ctx, sg.LocalID, sg.PrivateKey, insecure, p)
|
|
}
|
|
|
|
func (s *secureSession) SetReadDeadline(t time.Time) error {
|
|
return s.insecure.SetReadDeadline(t)
|
|
}
|
|
|
|
func (s *secureSession) SetWriteDeadline(t time.Time) error {
|
|
return s.insecure.SetWriteDeadline(t)
|
|
}
|
|
|
|
func (s *secureSession) SetDeadline(t time.Time) error {
|
|
return s.insecure.SetDeadline(t)
|
|
}
|
|
|
|
func (s *secureSession) RemoteAddr() net.Addr {
|
|
return s.insecure.RemoteAddr()
|
|
}
|
|
|
|
func (s *secureSession) LocalAddr() net.Addr {
|
|
return s.insecure.LocalAddr()
|
|
}
|
|
|
|
// LocalPeer retrieves the local peer.
|
|
func (s *secureSession) LocalPeer() peer.ID {
|
|
return s.localPeer
|
|
}
|
|
|
|
// LocalPrivateKey retrieves the local peer's PrivateKey
|
|
func (s *secureSession) LocalPrivateKey() ci.PrivKey {
|
|
return s.localKey
|
|
}
|
|
|
|
// RemotePeer retrieves the remote peer.
|
|
func (s *secureSession) RemotePeer() peer.ID {
|
|
return s.remotePeer
|
|
}
|
|
|
|
// RemotePublicKey retrieves the remote public key.
|
|
func (s *secureSession) RemotePublicKey() ci.PubKey {
|
|
return s.remote.permanentPubKey
|
|
}
|