mirror of
https://github.com/fluencelabs/rust-libp2p
synced 2025-05-30 11:11:21 +00:00
Implement `Transport::dial_as_listener` for QUIC as specified by the [DCUtR spec](https://github.com/libp2p/specs/blob/master/relay/DCUtR.md). To facilitate hole punching in QUIC, one side needs to send random UDP packets to establish a mapping in the routing table of the NAT device. If successful, our listener will emit a new inbound connection. This connection needs to then be sent to the dialing task. We achieve this by storing a `HashMap` of hole punch attempts indexed by the remote's `SocketAddr`. A matching incoming connection is then sent via a oneshot channel to the dialing task which continues with upgrading the connection. Related #2883. Pull-Request: #3964.
153 lines
5.2 KiB
Rust
153 lines
5.2 KiB
Rust
// Copyright 2020 Parity Technologies (UK) Ltd.
|
|
// Copyright 2021 Protocol Labs.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the "Software"),
|
|
// to deal in the Software without restriction, including without limitation
|
|
// the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
// and/or sell copies of the Software, and to permit persons to whom the
|
|
// Software is furnished to do so, subject to the following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included in
|
|
// all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
// FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
// DEALINGS IN THE SOFTWARE.
|
|
|
|
#![doc = include_str!("../README.md")]
|
|
|
|
use clap::Parser;
|
|
use futures::stream::StreamExt;
|
|
use futures::{executor::block_on, future::Either};
|
|
use libp2p::{
|
|
core::multiaddr::Protocol,
|
|
core::muxing::StreamMuxerBox,
|
|
core::upgrade,
|
|
core::{Multiaddr, Transport},
|
|
identify, identity,
|
|
identity::PeerId,
|
|
noise, ping, relay,
|
|
swarm::{NetworkBehaviour, SwarmBuilder, SwarmEvent},
|
|
tcp,
|
|
};
|
|
use libp2p_quic as quic;
|
|
use std::error::Error;
|
|
use std::net::{Ipv4Addr, Ipv6Addr};
|
|
|
|
fn main() -> Result<(), Box<dyn Error>> {
|
|
env_logger::init();
|
|
|
|
let opt = Opt::parse();
|
|
println!("opt: {opt:?}");
|
|
|
|
// Create a static known PeerId based on given secret
|
|
let local_key: identity::Keypair = generate_ed25519(opt.secret_key_seed);
|
|
let local_peer_id = PeerId::from(local_key.public());
|
|
println!("Local peer id: {local_peer_id:?}");
|
|
|
|
let tcp_transport = tcp::async_io::Transport::default();
|
|
|
|
let tcp_transport = tcp_transport
|
|
.upgrade(upgrade::Version::V1Lazy)
|
|
.authenticate(
|
|
noise::Config::new(&local_key).expect("Signing libp2p-noise static DH keypair failed."),
|
|
)
|
|
.multiplex(libp2p::yamux::Config::default());
|
|
|
|
let quic_transport = quic::async_std::Transport::new(quic::Config::new(&local_key));
|
|
|
|
let transport = quic_transport
|
|
.or_transport(tcp_transport)
|
|
.map(|either_output, _| match either_output {
|
|
Either::Left((peer_id, muxer)) => (peer_id, StreamMuxerBox::new(muxer)),
|
|
Either::Right((peer_id, muxer)) => (peer_id, StreamMuxerBox::new(muxer)),
|
|
})
|
|
.boxed();
|
|
|
|
let behaviour = Behaviour {
|
|
relay: relay::Behaviour::new(local_peer_id, Default::default()),
|
|
ping: ping::Behaviour::new(ping::Config::new()),
|
|
identify: identify::Behaviour::new(identify::Config::new(
|
|
"/TODO/0.0.1".to_string(),
|
|
local_key.public(),
|
|
)),
|
|
};
|
|
|
|
let mut swarm = SwarmBuilder::without_executor(transport, behaviour, local_peer_id).build();
|
|
|
|
// Listen on all interfaces
|
|
let listen_addr_tcp = Multiaddr::empty()
|
|
.with(match opt.use_ipv6 {
|
|
Some(true) => Protocol::from(Ipv6Addr::UNSPECIFIED),
|
|
_ => Protocol::from(Ipv4Addr::UNSPECIFIED),
|
|
})
|
|
.with(Protocol::Tcp(opt.port));
|
|
swarm.listen_on(listen_addr_tcp)?;
|
|
|
|
let listen_addr_quic = Multiaddr::empty()
|
|
.with(match opt.use_ipv6 {
|
|
Some(true) => Protocol::from(Ipv6Addr::UNSPECIFIED),
|
|
_ => Protocol::from(Ipv4Addr::UNSPECIFIED),
|
|
})
|
|
.with(Protocol::Udp(opt.port))
|
|
.with(Protocol::QuicV1);
|
|
swarm.listen_on(listen_addr_quic)?;
|
|
|
|
block_on(async {
|
|
loop {
|
|
match swarm.next().await.expect("Infinite Stream.") {
|
|
SwarmEvent::Behaviour(event) => {
|
|
if let BehaviourEvent::Identify(identify::Event::Received {
|
|
info: identify::Info { observed_addr, .. },
|
|
..
|
|
}) = &event
|
|
{
|
|
swarm.add_external_address(observed_addr.clone());
|
|
}
|
|
|
|
println!("{event:?}")
|
|
}
|
|
SwarmEvent::NewListenAddr { address, .. } => {
|
|
println!("Listening on {address:?}");
|
|
}
|
|
_ => {}
|
|
}
|
|
}
|
|
})
|
|
}
|
|
|
|
#[derive(NetworkBehaviour)]
|
|
struct Behaviour {
|
|
relay: relay::Behaviour,
|
|
ping: ping::Behaviour,
|
|
identify: identify::Behaviour,
|
|
}
|
|
|
|
fn generate_ed25519(secret_key_seed: u8) -> identity::Keypair {
|
|
let mut bytes = [0u8; 32];
|
|
bytes[0] = secret_key_seed;
|
|
|
|
identity::Keypair::ed25519_from_bytes(bytes).expect("only errors on wrong length")
|
|
}
|
|
|
|
#[derive(Debug, Parser)]
|
|
#[clap(name = "libp2p relay")]
|
|
struct Opt {
|
|
/// Determine if the relay listen on ipv6 or ipv4 loopback address. the default is ipv4
|
|
#[clap(long)]
|
|
use_ipv6: Option<bool>,
|
|
|
|
/// Fixed value to generate deterministic peer id
|
|
#[clap(long)]
|
|
secret_key_seed: u8,
|
|
|
|
/// The port used to listen on all interfaces
|
|
#[clap(long)]
|
|
port: u16,
|
|
}
|