2019-09-06 06:51:46 +00:00
|
|
|
## Nim-LibP2P
|
2019-09-24 17:48:23 +00:00
|
|
|
## Copyright (c) 2019 Status Research & Development GmbH
|
2019-09-06 06:51:46 +00:00
|
|
|
## Licensed under either of
|
|
|
|
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
|
|
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
|
|
## at your option.
|
|
|
|
## This file may not be copied, modified, or distributed except according to
|
|
|
|
## those terms.
|
|
|
|
|
2021-05-21 16:27:01 +00:00
|
|
|
{.push raises: [Defect].}
|
|
|
|
|
2022-05-24 13:10:57 +00:00
|
|
|
import std/[strformat]
|
2020-07-07 11:14:11 +00:00
|
|
|
import chronos, chronicles, bearssl
|
2020-03-09 17:27:57 +00:00
|
|
|
import ../protocol,
|
2020-05-07 20:37:46 +00:00
|
|
|
../../stream/streamseq,
|
2020-06-19 17:29:43 +00:00
|
|
|
../../stream/connection,
|
2020-06-24 15:08:44 +00:00
|
|
|
../../multiaddress,
|
2020-11-24 00:22:15 +00:00
|
|
|
../../peerinfo,
|
|
|
|
../../errors
|
2019-09-06 06:51:46 +00:00
|
|
|
|
2020-09-21 09:16:29 +00:00
|
|
|
export protocol
|
|
|
|
|
2020-06-20 10:56:55 +00:00
|
|
|
logScope:
|
2020-12-01 17:34:27 +00:00
|
|
|
topics = "libp2p secure"
|
2020-06-20 10:56:55 +00:00
|
|
|
|
2020-11-05 03:52:54 +00:00
|
|
|
const
|
|
|
|
SecureConnTrackerName* = "SecureConn"
|
|
|
|
|
2019-09-06 06:51:46 +00:00
|
|
|
type
|
|
|
|
Secure* = ref object of LPProtocol # base type for secure managers
|
2020-04-03 20:36:51 +00:00
|
|
|
|
2020-03-09 17:27:57 +00:00
|
|
|
SecureConn* = ref object of Connection
|
2020-06-19 17:29:43 +00:00
|
|
|
stream*: Connection
|
2020-05-07 20:37:46 +00:00
|
|
|
buf: StreamSeq
|
2020-03-09 17:27:57 +00:00
|
|
|
|
2020-09-06 08:31:47 +00:00
|
|
|
func shortLog*(conn: SecureConn): auto =
|
2021-05-21 16:27:01 +00:00
|
|
|
try:
|
|
|
|
if conn.isNil: "SecureConn(nil)"
|
2021-09-08 09:07:46 +00:00
|
|
|
else: &"{shortLog(conn.peerId)}:{conn.oid}"
|
2021-05-21 16:27:01 +00:00
|
|
|
except ValueError as exc:
|
|
|
|
raise newException(Defect, exc.msg)
|
|
|
|
|
2020-09-06 08:31:47 +00:00
|
|
|
chronicles.formatIt(SecureConn): shortLog(it)
|
|
|
|
|
2021-10-25 08:26:32 +00:00
|
|
|
proc new*(T: type SecureConn,
|
2020-09-06 08:31:47 +00:00
|
|
|
conn: Connection,
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId: PeerId,
|
2021-12-16 10:05:20 +00:00
|
|
|
observedAddr: MultiAddress,
|
2020-09-06 08:31:47 +00:00
|
|
|
timeout: Duration = DefaultConnectionTimeout): T =
|
|
|
|
result = T(stream: conn,
|
2021-09-08 09:07:46 +00:00
|
|
|
peerId: peerId,
|
2020-06-24 15:08:44 +00:00
|
|
|
observedAddr: observedAddr,
|
2020-08-10 22:17:11 +00:00
|
|
|
closeEvent: conn.closeEvent,
|
2021-01-04 18:59:05 +00:00
|
|
|
upgraded: conn.upgraded,
|
2020-11-01 22:23:26 +00:00
|
|
|
timeout: timeout,
|
|
|
|
dir: conn.dir)
|
2020-06-24 15:08:44 +00:00
|
|
|
result.initStream()
|
|
|
|
|
2020-06-19 17:29:43 +00:00
|
|
|
method initStream*(s: SecureConn) =
|
|
|
|
if s.objName.len == 0:
|
2021-06-14 08:26:11 +00:00
|
|
|
s.objName = SecureConnTrackerName
|
2020-06-19 17:29:43 +00:00
|
|
|
|
|
|
|
procCall Connection(s).initStream()
|
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
method closeImpl*(s: SecureConn) {.async.} =
|
2020-11-01 22:23:26 +00:00
|
|
|
trace "Closing secure conn", s, dir = s.dir
|
2020-06-19 17:29:43 +00:00
|
|
|
if not(isNil(s.stream)):
|
|
|
|
await s.stream.close()
|
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
await procCall Connection(s).closeImpl()
|
2020-07-09 20:21:47 +00:00
|
|
|
|
2020-03-09 17:27:57 +00:00
|
|
|
method readMessage*(c: SecureConn): Future[seq[byte]] {.async, base.} =
|
|
|
|
doAssert(false, "Not implemented!")
|
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
method handshake*(s: Secure,
|
|
|
|
conn: Connection,
|
|
|
|
initiator: bool): Future[SecureConn] {.async, base.} =
|
2020-02-25 05:06:57 +00:00
|
|
|
doAssert(false, "Not implemented!")
|
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
proc handleConn(s: Secure,
|
2020-07-08 00:33:05 +00:00
|
|
|
conn: Connection,
|
2020-12-09 14:56:40 +00:00
|
|
|
initiator: bool): Future[Connection] {.async.} =
|
2020-03-08 03:14:56 +00:00
|
|
|
var sconn = await s.handshake(conn, initiator)
|
2021-03-02 23:23:40 +00:00
|
|
|
# mark connection bottom level transport direction
|
|
|
|
# this is the safest place to do this
|
|
|
|
# we require this information in for example gossipsub
|
|
|
|
sconn.transportDir = if initiator: Direction.Out else: Direction.In
|
2020-09-04 16:30:45 +00:00
|
|
|
|
|
|
|
proc cleanup() {.async.} =
|
|
|
|
try:
|
2020-12-09 14:56:40 +00:00
|
|
|
let futs = [conn.join(), sconn.join()]
|
2020-11-25 13:35:25 +00:00
|
|
|
await futs[0] or futs[1]
|
|
|
|
for f in futs:
|
2020-11-28 15:48:06 +00:00
|
|
|
if not f.finished: await f.cancelAndWait() # cancel outstanding join()
|
2020-11-25 13:35:25 +00:00
|
|
|
|
|
|
|
await allFuturesThrowing(
|
|
|
|
sconn.close(), conn.close())
|
2020-11-01 20:49:25 +00:00
|
|
|
except CancelledError:
|
|
|
|
# This is top-level procedure which will work as separate task, so it
|
2020-11-01 22:23:26 +00:00
|
|
|
# do not need to propagate CancelledError.
|
2020-11-01 20:49:25 +00:00
|
|
|
discard
|
2020-09-04 16:30:45 +00:00
|
|
|
except CatchableError as exc:
|
2020-12-09 14:56:40 +00:00
|
|
|
debug "error cleaning up secure connection", err = exc.msg, sconn
|
2020-09-04 16:30:45 +00:00
|
|
|
|
2020-07-09 08:53:19 +00:00
|
|
|
if not isNil(sconn):
|
2020-09-04 16:30:45 +00:00
|
|
|
# All the errors are handled inside `cleanup()` procedure.
|
|
|
|
asyncSpawn cleanup()
|
2020-02-25 05:06:57 +00:00
|
|
|
|
2020-06-24 15:08:44 +00:00
|
|
|
return sconn
|
2020-02-25 05:06:57 +00:00
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
method init*(s: Secure) =
|
2020-07-07 11:14:11 +00:00
|
|
|
procCall LPProtocol(s).init()
|
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
proc handle(conn: Connection, proto: string) {.async.} =
|
2020-09-06 08:31:47 +00:00
|
|
|
trace "handling connection upgrade", proto, conn
|
2020-02-25 05:06:57 +00:00
|
|
|
try:
|
2020-07-08 00:33:05 +00:00
|
|
|
# We don't need the result but we
|
|
|
|
# definitely need to await the handshake
|
2020-03-24 06:34:02 +00:00
|
|
|
discard await s.handleConn(conn, false)
|
2020-09-06 08:31:47 +00:00
|
|
|
trace "connection secured", conn
|
2020-06-29 15:15:31 +00:00
|
|
|
except CancelledError as exc:
|
2020-09-06 08:31:47 +00:00
|
|
|
warn "securing connection canceled", conn
|
2020-06-29 15:15:31 +00:00
|
|
|
await conn.close()
|
2020-08-06 18:14:40 +00:00
|
|
|
raise exc
|
2020-02-25 05:06:57 +00:00
|
|
|
except CatchableError as exc:
|
2020-09-06 08:31:47 +00:00
|
|
|
warn "securing connection failed", err = exc.msg, conn
|
2020-05-23 16:51:54 +00:00
|
|
|
await conn.close()
|
2020-02-25 05:06:57 +00:00
|
|
|
|
|
|
|
s.handler = handle
|
|
|
|
|
2020-07-08 00:33:05 +00:00
|
|
|
method secure*(s: Secure,
|
|
|
|
conn: Connection,
|
|
|
|
initiator: bool):
|
2020-12-09 14:56:40 +00:00
|
|
|
Future[Connection] {.base.} =
|
2020-09-16 09:55:25 +00:00
|
|
|
s.handleConn(conn, initiator)
|
2020-05-07 20:37:46 +00:00
|
|
|
|
|
|
|
method readOnce*(s: SecureConn,
|
|
|
|
pbytes: pointer,
|
|
|
|
nbytes: int):
|
2020-12-09 14:56:40 +00:00
|
|
|
Future[int] {.async.} =
|
2020-09-16 09:55:25 +00:00
|
|
|
doAssert(nbytes > 0, "nbytes must be positive integer")
|
2020-06-29 15:15:31 +00:00
|
|
|
|
2020-12-09 14:56:40 +00:00
|
|
|
if s.isEof:
|
|
|
|
raise newLPStreamEOFError()
|
|
|
|
|
2020-06-29 15:15:31 +00:00
|
|
|
if s.buf.data().len() == 0:
|
2020-12-09 14:56:40 +00:00
|
|
|
try:
|
|
|
|
let buf = await s.readMessage() # Always returns >0 bytes or raises
|
|
|
|
s.activity = true
|
|
|
|
s.buf.add(buf)
|
|
|
|
except LPStreamEOFError as err:
|
|
|
|
s.isEof = true
|
|
|
|
await s.close()
|
|
|
|
raise err
|
|
|
|
except CatchableError as err:
|
|
|
|
debug "Error while reading message from secure connection, closing.",
|
|
|
|
error = err.name,
|
|
|
|
message = err.msg,
|
|
|
|
connection = s
|
2020-10-19 05:13:14 +00:00
|
|
|
await s.close()
|
|
|
|
raise err
|
2020-06-29 15:15:31 +00:00
|
|
|
|
|
|
|
var p = cast[ptr UncheckedArray[byte]](pbytes)
|
|
|
|
return s.buf.consumeTo(toOpenArray(p, 0, nbytes - 1))
|