2019-07-28 22:30:51 +08:00
|
|
|
import hashlib
|
2019-08-01 06:00:12 +08:00
|
|
|
from typing import Union
|
2019-07-27 16:27:01 +08:00
|
|
|
|
2018-11-19 00:22:56 +08:00
|
|
|
import base58
|
2019-07-28 22:30:51 +08:00
|
|
|
|
2018-11-29 23:06:40 +08:00
|
|
|
import multihash
|
|
|
|
|
2019-07-28 22:30:51 +08:00
|
|
|
from Crypto.PublicKey.RSA import RsaKey
|
|
|
|
|
2018-11-29 23:06:40 +08:00
|
|
|
# MaxInlineKeyLength is the maximum length a key can be for it to be inlined in
|
|
|
|
# the peer ID.
|
|
|
|
# * When `len(pubKey.Bytes()) <= MaxInlineKeyLength`, the peer ID is the
|
|
|
|
# identity multihash hash of the public key.
|
|
|
|
# * When `len(pubKey.Bytes()) > MaxInlineKeyLength`, the peer ID is the
|
|
|
|
# sha2-256 multihash of the public key.
|
|
|
|
MAX_INLINE_KEY_LENGTH = 42
|
|
|
|
|
2018-11-19 00:22:56 +08:00
|
|
|
|
|
|
|
class ID:
|
|
|
|
|
2019-07-31 19:26:13 +08:00
|
|
|
_bytes: bytes
|
2019-07-31 21:35:50 +08:00
|
|
|
_xor_id: int = None
|
2019-07-27 16:27:01 +08:00
|
|
|
|
2019-07-31 19:26:13 +08:00
|
|
|
def __init__(self, peer_id_bytes: bytes) -> None:
|
|
|
|
self._bytes = peer_id_bytes
|
2018-11-19 00:22:56 +08:00
|
|
|
|
2019-07-31 19:26:13 +08:00
|
|
|
@property
|
|
|
|
def xor_id(self) -> int:
|
|
|
|
if not self._xor_id:
|
|
|
|
self._xor_id = int(digest(self._bytes).hex(), 16)
|
|
|
|
return self._xor_id
|
2019-07-24 22:33:32 +08:00
|
|
|
|
2019-07-31 19:26:13 +08:00
|
|
|
def to_bytes(self) -> bytes:
|
|
|
|
return self._bytes
|
2019-04-21 05:35:05 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def pretty(self) -> str:
|
2019-07-31 19:26:13 +08:00
|
|
|
return base58.b58encode(self._bytes).decode()
|
2019-04-25 10:11:54 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def __str__(self) -> str:
|
2019-07-31 19:26:13 +08:00
|
|
|
return self.pretty()
|
2018-11-19 00:22:56 +08:00
|
|
|
|
2018-11-27 07:24:29 +08:00
|
|
|
__repr__ = __str__
|
2018-11-29 23:06:40 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def __eq__(self, other: object) -> bool:
|
2019-08-01 13:25:20 +08:00
|
|
|
# pylint: disable=protected-access, no-else-return
|
2019-07-31 19:26:13 +08:00
|
|
|
if isinstance(other, bytes):
|
|
|
|
return self._bytes == other
|
|
|
|
elif isinstance(other, ID):
|
|
|
|
return self._bytes == other._bytes
|
|
|
|
else:
|
2019-07-27 16:27:01 +08:00
|
|
|
return NotImplemented
|
2018-11-29 23:06:40 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def __hash__(self) -> int:
|
2019-07-31 19:26:13 +08:00
|
|
|
return hash(self._bytes)
|
2018-11-29 23:06:40 +08:00
|
|
|
|
2019-07-31 19:31:58 +08:00
|
|
|
@classmethod
|
2019-08-01 13:25:20 +08:00
|
|
|
def from_base58(cls, b58_encoded_peer_id_str: str) -> "ID":
|
2019-07-31 19:31:58 +08:00
|
|
|
peer_id_bytes = base58.b58decode(b58_encoded_peer_id_str)
|
|
|
|
pid = ID(peer_id_bytes)
|
|
|
|
return pid
|
|
|
|
|
|
|
|
@classmethod
|
2019-08-01 13:25:20 +08:00
|
|
|
def from_pubkey(cls, key: RsaKey) -> "ID":
|
2019-07-31 19:31:58 +08:00
|
|
|
# export into binary format
|
|
|
|
key_bin = key.exportKey("DER")
|
|
|
|
|
|
|
|
algo: int = multihash.Func.sha2_256
|
|
|
|
# TODO: seems identity is not yet supported in pymultihash
|
|
|
|
# if len(b) <= MAX_INLINE_KEY_LENGTH:
|
|
|
|
# algo multihash.func.identity
|
|
|
|
|
|
|
|
mh_digest: multihash.Multihash = multihash.digest(key_bin, algo)
|
|
|
|
return cls(mh_digest.encode())
|
|
|
|
|
|
|
|
@classmethod
|
2019-08-01 13:25:20 +08:00
|
|
|
def from_privkey(cls, key: RsaKey) -> "ID":
|
2019-07-31 19:31:58 +08:00
|
|
|
return cls.from_pubkey(key.publickey())
|
|
|
|
|
2018-11-29 23:06:40 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def id_b58_encode(peer_id: ID) -> str:
|
2018-11-29 23:06:40 +08:00
|
|
|
"""
|
|
|
|
return a b58-encoded string
|
|
|
|
"""
|
2019-08-01 13:25:20 +08:00
|
|
|
# pylint: disable=protected-access
|
2019-07-31 19:26:13 +08:00
|
|
|
return base58.b58encode(peer_id.to_bytes()).decode()
|
2018-11-29 23:06:40 +08:00
|
|
|
|
|
|
|
|
2019-07-31 19:26:13 +08:00
|
|
|
def id_b58_decode(b58_encoded_peer_id_str: str) -> ID:
|
2018-11-29 23:06:40 +08:00
|
|
|
"""
|
|
|
|
return a base58-decoded peer ID
|
|
|
|
"""
|
2019-07-31 19:26:13 +08:00
|
|
|
return ID(base58.b58decode(b58_encoded_peer_id_str))
|
2018-11-29 23:06:40 +08:00
|
|
|
|
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def id_from_public_key(key: RsaKey) -> ID:
|
2018-11-29 23:06:40 +08:00
|
|
|
# export into binary format
|
|
|
|
key_bin = key.exportKey("DER")
|
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
algo: int = multihash.Func.sha2_256
|
2018-11-29 23:06:40 +08:00
|
|
|
# TODO: seems identity is not yet supported in pymultihash
|
|
|
|
# if len(b) <= MAX_INLINE_KEY_LENGTH:
|
|
|
|
# algo multihash.func.identity
|
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
mh_digest: multihash.Multihash = multihash.digest(key_bin, algo)
|
2018-11-29 23:06:40 +08:00
|
|
|
return ID(mh_digest.encode())
|
|
|
|
|
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def id_from_private_key(key: RsaKey) -> ID:
|
2018-11-29 23:06:40 +08:00
|
|
|
return id_from_public_key(key.publickey())
|
2019-04-25 10:11:54 +08:00
|
|
|
|
2019-08-01 06:00:12 +08:00
|
|
|
|
2019-07-27 16:27:01 +08:00
|
|
|
def digest(data: Union[str, bytes]) -> bytes:
|
2019-07-30 23:41:28 +08:00
|
|
|
if isinstance(data, str):
|
2019-08-01 06:00:12 +08:00
|
|
|
data = data.encode("utf8")
|
2019-07-29 12:42:13 +08:00
|
|
|
return hashlib.sha1(data).digest()
|