2022-07-01 20:19:57 +02:00
|
|
|
# Nim-LibP2P
|
2023-01-20 15:47:40 +01:00
|
|
|
# Copyright (c) 2023 Status Research & Development GmbH
|
2022-07-01 20:19:57 +02:00
|
|
|
# Licensed under either of
|
|
|
|
# * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
|
|
# * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
|
|
# at your option.
|
|
|
|
# This file may not be copied, modified, or distributed except according to
|
|
|
|
# those terms.
|
2021-01-20 11:28:32 -06:00
|
|
|
|
2022-10-29 23:26:44 +02:00
|
|
|
{.push gcsafe.}
|
2023-06-07 13:12:49 +02:00
|
|
|
{.push raises: [].}
|
2021-05-21 10:27:01 -06:00
|
|
|
|
2023-05-18 10:24:17 +02:00
|
|
|
import std/[sequtils, strutils]
|
2021-01-20 11:28:32 -06:00
|
|
|
import pkg/[chronos, chronicles, metrics]
|
|
|
|
|
|
|
|
import ../stream/connection,
|
|
|
|
../protocols/secure/secure,
|
|
|
|
../protocols/identify,
|
2023-03-08 12:30:19 +01:00
|
|
|
../muxers/muxer,
|
2021-01-20 11:28:32 -06:00
|
|
|
../multistream,
|
2021-05-21 10:27:01 -06:00
|
|
|
../connmanager,
|
2021-09-08 11:07:46 +02:00
|
|
|
../errors,
|
|
|
|
../utility
|
2021-01-20 11:28:32 -06:00
|
|
|
|
|
|
|
export connmanager, connection, identify, secure, multistream
|
|
|
|
|
2023-04-14 16:23:19 +02:00
|
|
|
declarePublicCounter(libp2p_failed_upgrades_incoming, "incoming connections failed upgrades")
|
|
|
|
declarePublicCounter(libp2p_failed_upgrades_outgoing, "outgoing connections failed upgrades")
|
2021-01-20 11:28:32 -06:00
|
|
|
|
2021-05-21 10:27:01 -06:00
|
|
|
logScope:
|
|
|
|
topics = "libp2p upgrade"
|
|
|
|
|
2021-01-20 11:28:32 -06:00
|
|
|
type
|
2021-05-21 10:27:01 -06:00
|
|
|
UpgradeFailedError* = object of LPError
|
2021-01-20 11:28:32 -06:00
|
|
|
|
|
|
|
Upgrade* = ref object of RootObj
|
|
|
|
ms*: MultistreamSelect
|
|
|
|
connManager*: ConnManager
|
|
|
|
secureManagers*: seq[Secure]
|
|
|
|
|
2023-04-14 16:23:19 +02:00
|
|
|
method upgrade*(
|
2021-03-18 09:20:36 -06:00
|
|
|
self: Upgrade,
|
2022-09-05 14:31:14 +02:00
|
|
|
conn: Connection,
|
2023-04-14 16:23:19 +02:00
|
|
|
direction: Direction,
|
2023-03-08 12:30:19 +01:00
|
|
|
peerId: Opt[PeerId]): Future[Muxer] {.base.} =
|
2021-01-20 11:28:32 -06:00
|
|
|
doAssert(false, "Not implemented!")
|
|
|
|
|
2021-03-18 09:20:36 -06:00
|
|
|
proc secure*(
|
|
|
|
self: Upgrade,
|
2022-09-05 14:31:14 +02:00
|
|
|
conn: Connection,
|
2023-03-08 12:30:19 +01:00
|
|
|
direction: Direction,
|
2022-09-05 14:31:14 +02:00
|
|
|
peerId: Opt[PeerId]): Future[Connection] {.async, gcsafe.} =
|
2021-03-18 09:20:36 -06:00
|
|
|
if self.secureManagers.len <= 0:
|
2021-01-20 11:28:32 -06:00
|
|
|
raise newException(UpgradeFailedError, "No secure managers registered!")
|
|
|
|
|
2023-03-08 12:30:19 +01:00
|
|
|
let codec =
|
|
|
|
if direction == Out: await self.ms.select(conn, self.secureManagers.mapIt(it.codec))
|
|
|
|
else: await MultistreamSelect.handle(conn, self.secureManagers.mapIt(it.codec))
|
2021-01-20 11:28:32 -06:00
|
|
|
if codec.len == 0:
|
|
|
|
raise newException(UpgradeFailedError, "Unable to negotiate a secure channel!")
|
|
|
|
|
|
|
|
trace "Securing connection", conn, codec
|
2021-03-18 09:20:36 -06:00
|
|
|
let secureProtocol = self.secureManagers.filterIt(it.codec == codec)
|
2021-01-20 11:28:32 -06:00
|
|
|
|
|
|
|
# ms.select should deal with the correctness of this
|
|
|
|
# let's avoid duplicating checks but detect if it fails to do it properly
|
|
|
|
doAssert(secureProtocol.len > 0)
|
|
|
|
|
2023-03-08 12:30:19 +01:00
|
|
|
return await secureProtocol[0].secure(conn, direction == Out, peerId)
|