// Copyright 2018 Parity Technologies (UK) Ltd. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the "Software"), // to deal in the Software without restriction, including without limitation // the rights to use, copy, modify, merge, publish, distribute, sublicense, // and/or sell copies of the Software, and to permit persons to whom the // Software is furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER // DEALINGS IN THE SOFTWARE. use crate::protocol::{Identify, InboundPush, Info, OutboundPush, Push, UpgradeError}; use either::Either; use futures::future::BoxFuture; use futures::prelude::*; use futures::stream::FuturesUnordered; use futures_timer::Delay; use libp2p_core::upgrade::SelectUpgrade; use libp2p_core::Multiaddr; use libp2p_identity::PeerId; use libp2p_identity::PublicKey; use libp2p_swarm::handler::{ ConnectionEvent, DialUpgradeError, FullyNegotiatedInbound, FullyNegotiatedOutbound, ProtocolSupport, }; use libp2p_swarm::{ ConnectionHandler, ConnectionHandlerEvent, KeepAlive, StreamProtocol, StreamUpgradeError, SubstreamProtocol, SupportedProtocols, }; use log::warn; use smallvec::SmallVec; use std::collections::HashSet; use std::{io, task::Context, task::Poll, time::Duration}; /// Protocol handler for sending and receiving identification requests. /// /// Outbound requests are sent periodically. The handler performs expects /// at least one identification request to be answered by the remote before /// permitting the underlying connection to be closed. pub struct Handler { remote_peer_id: PeerId, inbound_identify_push: Option>>, /// Pending events to yield. events: SmallVec< [ConnectionHandlerEvent>, (), Event, io::Error>; 4], >, /// Pending identification replies, awaiting being sent. pending_replies: FuturesUnordered>>, /// Future that fires when we need to identify the node again. trigger_next_identify: Delay, /// The interval of `trigger_next_identify`, i.e. the recurrent delay. interval: Duration, /// The public key of the local peer. public_key: PublicKey, /// Application-specific version of the protocol family used by the peer, /// e.g. `ipfs/1.0.0` or `polkadot/1.0.0`. protocol_version: String, /// Name and version of the peer, similar to the `User-Agent` header in /// the HTTP protocol. agent_version: String, /// Address observed by or for the remote. observed_addr: Multiaddr, local_supported_protocols: SupportedProtocols, remote_supported_protocols: HashSet, external_addresses: HashSet, } /// An event from `Behaviour` with the information requested by the `Handler`. #[derive(Debug)] pub enum InEvent { AddressesChanged(HashSet), Push, } /// Event produced by the `Handler`. #[derive(Debug)] #[allow(clippy::large_enum_variant)] pub enum Event { /// We obtained identification information from the remote. Identified(Info), /// We replied to an identification request from the remote. Identification, /// We actively pushed our identification information to the remote. IdentificationPushed, /// Failed to identify the remote, or to reply to an identification request. IdentificationError(StreamUpgradeError), } impl Handler { /// Creates a new `Handler`. #[allow(clippy::too_many_arguments)] pub fn new( initial_delay: Duration, interval: Duration, remote_peer_id: PeerId, public_key: PublicKey, protocol_version: String, agent_version: String, observed_addr: Multiaddr, external_addresses: HashSet, ) -> Self { Self { remote_peer_id, inbound_identify_push: Default::default(), events: SmallVec::new(), pending_replies: FuturesUnordered::new(), trigger_next_identify: Delay::new(initial_delay), interval, public_key, protocol_version, agent_version, observed_addr, local_supported_protocols: SupportedProtocols::default(), remote_supported_protocols: HashSet::default(), external_addresses, } } fn on_fully_negotiated_inbound( &mut self, FullyNegotiatedInbound { protocol: output, .. }: FullyNegotiatedInbound< ::InboundProtocol, ::InboundOpenInfo, >, ) { match output { future::Either::Left(substream) => { let info = self.build_info(); self.pending_replies .push(crate::protocol::send(substream, info).boxed()); } future::Either::Right(fut) => { if self.inbound_identify_push.replace(fut).is_some() { warn!( "New inbound identify push stream from {} while still \ upgrading previous one. Replacing previous with new.", self.remote_peer_id, ); } } } } fn on_fully_negotiated_outbound( &mut self, FullyNegotiatedOutbound { protocol: output, .. }: FullyNegotiatedOutbound< ::OutboundProtocol, ::OutboundOpenInfo, >, ) { match output { future::Either::Left(remote_info) => { self.update_supported_protocols_for_remote(&remote_info); self.events .push(ConnectionHandlerEvent::Custom(Event::Identified( remote_info, ))); } future::Either::Right(()) => self .events .push(ConnectionHandlerEvent::Custom(Event::IdentificationPushed)), } } fn on_dial_upgrade_error( &mut self, DialUpgradeError { error: err, .. }: DialUpgradeError< ::OutboundOpenInfo, ::OutboundProtocol, >, ) { let err = err.map_upgrade_err(|e| e.into_inner()); self.events .push(ConnectionHandlerEvent::Custom(Event::IdentificationError( err, ))); self.trigger_next_identify.reset(self.interval); } fn build_info(&mut self) -> Info { Info { public_key: self.public_key.clone(), protocol_version: self.protocol_version.clone(), agent_version: self.agent_version.clone(), listen_addrs: Vec::from_iter(self.external_addresses.iter().cloned()), protocols: Vec::from_iter(self.local_supported_protocols.iter().cloned()), observed_addr: self.observed_addr.clone(), } } fn update_supported_protocols_for_remote(&mut self, remote_info: &Info) { let new_remote_protocols = HashSet::from_iter(remote_info.protocols.clone()); let remote_added_protocols = new_remote_protocols .difference(&self.remote_supported_protocols) .cloned() .collect::>(); let remote_removed_protocols = self .remote_supported_protocols .difference(&new_remote_protocols) .cloned() .collect::>(); if !remote_added_protocols.is_empty() { self.events .push(ConnectionHandlerEvent::ReportRemoteProtocols( ProtocolSupport::Added(remote_added_protocols), )); } if !remote_removed_protocols.is_empty() { self.events .push(ConnectionHandlerEvent::ReportRemoteProtocols( ProtocolSupport::Removed(remote_removed_protocols), )); } self.remote_supported_protocols = new_remote_protocols; } } impl ConnectionHandler for Handler { type InEvent = InEvent; type OutEvent = Event; type Error = io::Error; type InboundProtocol = SelectUpgrade>; type OutboundProtocol = Either>; type OutboundOpenInfo = (); type InboundOpenInfo = (); fn listen_protocol(&self) -> SubstreamProtocol { SubstreamProtocol::new(SelectUpgrade::new(Identify, Push::inbound()), ()) } fn on_behaviour_event(&mut self, event: Self::InEvent) { match event { InEvent::AddressesChanged(addresses) => { self.external_addresses = addresses; } InEvent::Push => { let info = self.build_info(); self.events .push(ConnectionHandlerEvent::OutboundSubstreamRequest { protocol: SubstreamProtocol::new(Either::Right(Push::outbound(info)), ()), }); } } } fn connection_keep_alive(&self) -> KeepAlive { if self.inbound_identify_push.is_some() { return KeepAlive::Yes; } if !self.pending_replies.is_empty() { return KeepAlive::Yes; } KeepAlive::No } fn poll( &mut self, cx: &mut Context<'_>, ) -> Poll< ConnectionHandlerEvent, > { if let Some(event) = self.events.pop() { return Poll::Ready(event); } // Poll the future that fires when we need to identify the node again. if let Poll::Ready(()) = self.trigger_next_identify.poll_unpin(cx) { self.trigger_next_identify.reset(self.interval); let ev = ConnectionHandlerEvent::OutboundSubstreamRequest { protocol: SubstreamProtocol::new(Either::Left(Identify), ()), }; return Poll::Ready(ev); } if let Some(Poll::Ready(res)) = self .inbound_identify_push .as_mut() .map(|f| f.poll_unpin(cx)) { self.inbound_identify_push.take(); if let Ok(info) = res { self.update_supported_protocols_for_remote(&info); return Poll::Ready(ConnectionHandlerEvent::Custom(Event::Identified(info))); } } // Check for pending replies to send. if let Poll::Ready(Some(result)) = self.pending_replies.poll_next_unpin(cx) { let event = result .map(|()| Event::Identification) .unwrap_or_else(|err| Event::IdentificationError(StreamUpgradeError::Apply(err))); return Poll::Ready(ConnectionHandlerEvent::Custom(event)); } Poll::Pending } fn on_connection_event( &mut self, event: ConnectionEvent< Self::InboundProtocol, Self::OutboundProtocol, Self::InboundOpenInfo, Self::OutboundOpenInfo, >, ) { match event { ConnectionEvent::FullyNegotiatedInbound(fully_negotiated_inbound) => { self.on_fully_negotiated_inbound(fully_negotiated_inbound) } ConnectionEvent::FullyNegotiatedOutbound(fully_negotiated_outbound) => { self.on_fully_negotiated_outbound(fully_negotiated_outbound) } ConnectionEvent::DialUpgradeError(dial_upgrade_error) => { self.on_dial_upgrade_error(dial_upgrade_error) } ConnectionEvent::AddressChange(_) | ConnectionEvent::ListenUpgradeError(_) | ConnectionEvent::RemoteProtocolsChange(_) => {} ConnectionEvent::LocalProtocolsChange(change) => { self.local_supported_protocols.on_protocols_change(change); } } } }