// Copyright 2018 Parity Technologies (UK) Ltd. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the "Software"), // to deal in the Software without restriction, including without limitation // the rights to use, copy, modify, merge, publish, distribute, sublicense, // and/or sell copies of the Software, and to permit persons to whom the // Software is furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER // DEALINGS IN THE SOFTWARE. use crate::protocol::{Identify, InboundPush, Info, OutboundPush, Push, UpgradeError}; use either::Either; use futures::future::BoxFuture; use futures::prelude::*; use futures::stream::FuturesUnordered; use futures_timer::Delay; use libp2p_core::upgrade::SelectUpgrade; use libp2p_core::Multiaddr; use libp2p_identity::PeerId; use libp2p_identity::PublicKey; use libp2p_swarm::handler::{ ConnectionEvent, DialUpgradeError, FullyNegotiatedInbound, FullyNegotiatedOutbound, ProtocolSupport, }; use libp2p_swarm::{ ConnectionHandler, ConnectionHandlerEvent, KeepAlive, StreamProtocol, StreamUpgradeError, SubstreamProtocol, SupportedProtocols, }; use log::{warn, Level}; use smallvec::SmallVec; use std::collections::HashSet; use std::{io, task::Context, task::Poll, time::Duration}; /// Protocol handler for sending and receiving identification requests. /// /// Outbound requests are sent periodically. The handler performs expects /// at least one identification request to be answered by the remote before /// permitting the underlying connection to be closed. pub struct Handler { remote_peer_id: PeerId, inbound_identify_push: Option>>, /// Pending events to yield. events: SmallVec< [ConnectionHandlerEvent>, (), Event, io::Error>; 4], >, /// Pending identification replies, awaiting being sent. pending_replies: FuturesUnordered>>, /// Future that fires when we need to identify the node again. trigger_next_identify: Delay, /// Whether we have exchanged at least one periodic identify. exchanged_one_periodic_identify: bool, /// The interval of `trigger_next_identify`, i.e. the recurrent delay. interval: Duration, /// The public key of the local peer. public_key: PublicKey, /// Application-specific version of the protocol family used by the peer, /// e.g. `ipfs/1.0.0` or `polkadot/1.0.0`. protocol_version: String, /// Name and version of the peer, similar to the `User-Agent` header in /// the HTTP protocol. agent_version: String, /// Address observed by or for the remote. observed_addr: Multiaddr, local_supported_protocols: SupportedProtocols, remote_supported_protocols: HashSet, external_addresses: HashSet, } /// An event from `Behaviour` with the information requested by the `Handler`. #[derive(Debug)] pub enum InEvent { AddressesChanged(HashSet), Push, } /// Event produced by the `Handler`. #[derive(Debug)] #[allow(clippy::large_enum_variant)] pub enum Event { /// We obtained identification information from the remote. Identified(Info), /// We replied to an identification request from the remote. Identification, /// We actively pushed our identification information to the remote. IdentificationPushed, /// Failed to identify the remote, or to reply to an identification request. IdentificationError(StreamUpgradeError), } impl Handler { /// Creates a new `Handler`. #[allow(clippy::too_many_arguments)] pub fn new( initial_delay: Duration, interval: Duration, remote_peer_id: PeerId, public_key: PublicKey, protocol_version: String, agent_version: String, observed_addr: Multiaddr, external_addresses: HashSet, ) -> Self { Self { remote_peer_id, inbound_identify_push: Default::default(), events: SmallVec::new(), pending_replies: FuturesUnordered::new(), trigger_next_identify: Delay::new(initial_delay), exchanged_one_periodic_identify: false, interval, public_key, protocol_version, agent_version, observed_addr, local_supported_protocols: SupportedProtocols::default(), remote_supported_protocols: HashSet::default(), external_addresses, } } fn on_fully_negotiated_inbound( &mut self, FullyNegotiatedInbound { protocol: output, .. }: FullyNegotiatedInbound< ::InboundProtocol, ::InboundOpenInfo, >, ) { match output { future::Either::Left(substream) => { let info = self.build_info(); self.pending_replies .push(crate::protocol::send(substream, info).boxed()); } future::Either::Right(fut) => { if self.inbound_identify_push.replace(fut).is_some() { warn!( "New inbound identify push stream from {} while still \ upgrading previous one. Replacing previous with new.", self.remote_peer_id, ); } } } } fn on_fully_negotiated_outbound( &mut self, FullyNegotiatedOutbound { protocol: output, .. }: FullyNegotiatedOutbound< ::OutboundProtocol, ::OutboundOpenInfo, >, ) { match output { future::Either::Left(remote_info) => { self.update_supported_protocols_for_remote(&remote_info); self.events .push(ConnectionHandlerEvent::NotifyBehaviour(Event::Identified( remote_info, ))); } future::Either::Right(()) => self.events.push(ConnectionHandlerEvent::NotifyBehaviour( Event::IdentificationPushed, )), } } fn on_dial_upgrade_error( &mut self, DialUpgradeError { error: err, .. }: DialUpgradeError< ::OutboundOpenInfo, ::OutboundProtocol, >, ) { let err = err.map_upgrade_err(|e| e.into_inner()); self.events.push(ConnectionHandlerEvent::NotifyBehaviour( Event::IdentificationError(err), )); self.trigger_next_identify.reset(self.interval); } fn build_info(&mut self) -> Info { Info { public_key: self.public_key.clone(), protocol_version: self.protocol_version.clone(), agent_version: self.agent_version.clone(), listen_addrs: Vec::from_iter(self.external_addresses.iter().cloned()), protocols: Vec::from_iter(self.local_supported_protocols.iter().cloned()), observed_addr: self.observed_addr.clone(), } } fn update_supported_protocols_for_remote(&mut self, remote_info: &Info) { let new_remote_protocols = HashSet::from_iter(remote_info.protocols.clone()); let remote_added_protocols = new_remote_protocols .difference(&self.remote_supported_protocols) .cloned() .collect::>(); let remote_removed_protocols = self .remote_supported_protocols .difference(&new_remote_protocols) .cloned() .collect::>(); if !remote_added_protocols.is_empty() { self.events .push(ConnectionHandlerEvent::ReportRemoteProtocols( ProtocolSupport::Added(remote_added_protocols), )); } if !remote_removed_protocols.is_empty() { self.events .push(ConnectionHandlerEvent::ReportRemoteProtocols( ProtocolSupport::Removed(remote_removed_protocols), )); } self.remote_supported_protocols = new_remote_protocols; } fn local_protocols_to_string(&mut self) -> String { self.local_supported_protocols .iter() .map(|p| p.to_string()) .collect::>() .join(", ") } } impl ConnectionHandler for Handler { type FromBehaviour = InEvent; type ToBehaviour = Event; type Error = io::Error; type InboundProtocol = SelectUpgrade>; type OutboundProtocol = Either>; type OutboundOpenInfo = (); type InboundOpenInfo = (); fn listen_protocol(&self) -> SubstreamProtocol { SubstreamProtocol::new(SelectUpgrade::new(Identify, Push::inbound()), ()) } fn on_behaviour_event(&mut self, event: Self::FromBehaviour) { match event { InEvent::AddressesChanged(addresses) => { self.external_addresses = addresses; } InEvent::Push => { let info = self.build_info(); self.events .push(ConnectionHandlerEvent::OutboundSubstreamRequest { protocol: SubstreamProtocol::new(Either::Right(Push::outbound(info)), ()), }); } } } fn connection_keep_alive(&self) -> KeepAlive { if self.inbound_identify_push.is_some() { return KeepAlive::Yes; } if !self.pending_replies.is_empty() { return KeepAlive::Yes; } KeepAlive::No } fn poll( &mut self, cx: &mut Context<'_>, ) -> Poll< ConnectionHandlerEvent, > { if let Some(event) = self.events.pop() { return Poll::Ready(event); } // Poll the future that fires when we need to identify the node again. if let Poll::Ready(()) = self.trigger_next_identify.poll_unpin(cx) { self.trigger_next_identify.reset(self.interval); let ev = ConnectionHandlerEvent::OutboundSubstreamRequest { protocol: SubstreamProtocol::new(Either::Left(Identify), ()), }; return Poll::Ready(ev); } if let Some(Poll::Ready(res)) = self .inbound_identify_push .as_mut() .map(|f| f.poll_unpin(cx)) { self.inbound_identify_push.take(); if let Ok(info) = res { self.update_supported_protocols_for_remote(&info); return Poll::Ready(ConnectionHandlerEvent::NotifyBehaviour(Event::Identified( info, ))); } } // Check for pending replies to send. if let Poll::Ready(Some(result)) = self.pending_replies.poll_next_unpin(cx) { let event = result .map(|()| Event::Identification) .unwrap_or_else(|err| Event::IdentificationError(StreamUpgradeError::Apply(err))); self.exchanged_one_periodic_identify = true; return Poll::Ready(ConnectionHandlerEvent::NotifyBehaviour(event)); } Poll::Pending } fn on_connection_event( &mut self, event: ConnectionEvent< Self::InboundProtocol, Self::OutboundProtocol, Self::InboundOpenInfo, Self::OutboundOpenInfo, >, ) { match event { ConnectionEvent::FullyNegotiatedInbound(fully_negotiated_inbound) => { self.on_fully_negotiated_inbound(fully_negotiated_inbound) } ConnectionEvent::FullyNegotiatedOutbound(fully_negotiated_outbound) => { self.on_fully_negotiated_outbound(fully_negotiated_outbound) } ConnectionEvent::DialUpgradeError(dial_upgrade_error) => { self.on_dial_upgrade_error(dial_upgrade_error) } ConnectionEvent::AddressChange(_) | ConnectionEvent::ListenUpgradeError(_) | ConnectionEvent::RemoteProtocolsChange(_) => {} ConnectionEvent::LocalProtocolsChange(change) => { let before = log::log_enabled!(Level::Debug) .then(|| self.local_protocols_to_string()) .unwrap_or_default(); let protocols_changed = self.local_supported_protocols.on_protocols_change(change); let after = log::log_enabled!(Level::Debug) .then(|| self.local_protocols_to_string()) .unwrap_or_default(); if protocols_changed && self.exchanged_one_periodic_identify { log::debug!( "Supported listen protocols changed from [{before}] to [{after}], pushing to {}", self.remote_peer_id ); let info = self.build_info(); self.events .push(ConnectionHandlerEvent::OutboundSubstreamRequest { protocol: SubstreamProtocol::new( Either::Right(Push::outbound(info)), (), ), }); } } } } }