mhchia
f0df2d189f
Plaintext: use existing msgio reader
2020-02-28 15:49:59 +08:00
mhchia
3c2e835725
Security: SecureSession
...
Make security sessions(secio, noise) share the same implementation
`BaseSession` to avoid duplicate implementation of buffered read.
2020-02-28 15:49:59 +08:00
mhchia
897e66b7e1
Add the skeletons of noise transport and conn
2020-02-07 17:47:50 +08:00
mhchia
f1dbd52d67
Merge branch 'master' into feature/trio
2020-02-06 10:39:54 +08:00
mhchia
5b4b65faa8
Change default value of read()
...
From `n = -1` to `n = None`, to comply with trio API
2020-01-26 23:03:38 +08:00
Jonathan de Jong
b1248ff315
enforced f-strings everywhere, %s on logging
...
extended _multiaddr_from_socket to support UDP and IPv6 automatically
changed TCPListener to use _ip4_or_6_from_multiaddr to get host, and not ip4 only
enforced `from error` everywhere with raises
added call braces to exceptions
2019-12-19 17:31:18 +01:00
Piper Merriam
ded3792924
Merge pull request #331 from dmuhs/fix/docs-format
...
Add automatic docstring formatting
2019-10-28 09:39:52 -06:00
Alex Stokes
f2bfc68f6d
Re-generate protobufs
2019-10-25 18:51:57 +09:00
Dominik Muhs
bafdd8512d
Enforce pre-summary newline in docstrings
2019-10-24 20:10:45 +02:00
Dominik Muhs
7ad96d167c
Rename InsecureSession initiator flag
2019-10-24 19:18:29 +02:00
Dominik Muhs
eef505f2d9
Add automatic docstring formatter and apply
2019-10-24 08:41:10 +02:00
NIC619
49bd460e37
Catch SedesException
in deserialize_public_key
2019-10-17 15:19:39 +08:00
Alex Stokes
6e53849604
Delete utils in favor of serialization module
2019-09-24 09:51:31 -07:00
NIC619
7fc958e7be
Add exception raised to docstring
2019-09-19 22:19:36 +08:00
NIC619
0080466d86
Handle RawConnError
in InsecureSession.run_handshake
2019-09-16 19:16:41 +08:00
Alex Stokes
2025a5c7f1
Restore initiator
flag to BaseSession
type
2019-09-08 15:40:02 -04:00
Alex Stokes
b214f88f75
Avoid using message-based IO in the plaintext
protocol
...
Can reuse the machinery in `secio` but need to generalize the
"buffering" there
2019-09-04 10:12:43 -07:00
Alex Stokes
fc3e3a4be5
Changes to type hints to match new abstractions
2019-09-04 10:12:43 -07:00
Alex Stokes
376a5d4fc6
Adjust callsite
2019-08-24 22:37:45 +02:00
mhchia
c1eacf221f
PR feedback
...
- Check if the received peer id matches the one we initialize the
session with.
- Move the check inside `run_handshake`
2019-08-22 22:53:49 +08:00
Kevin Mai-Husan Chia
7c630df610
Update libp2p/security/insecure/transport.py
...
Co-Authored-By: NIC Lin <twedusuck@gmail.com>
2019-08-22 22:53:49 +08:00
mhchia
16a4fd33c1
PR feedbacks
...
- Move exceptions to exceptions.py
- Raise `UpgradeFailure` in upgrader
- Refine the try/catch for upgraders in swarm
2019-08-22 22:53:49 +08:00
mhchia
3e04480d62
Raise HandshakeFailure
in transport
...
Change the exception handling flow.
Raise `SecurityUpgradeFailure` in security_multistream.
2019-08-22 22:53:48 +08:00
mhchia
80452d9589
Fix make_exchange_message
to use the new API
2019-08-22 22:53:48 +08:00
mhchia
921bfb65cc
Verify the remote pubkey and peer_id
...
- Add `from_bytes` in RSAPublicKey and Secp256k1PublicKey
- Add `pubkey_from_protobuf` to parse pubkey from protobuf
- Verify key and peer_id in `InsecureSession.run_handshake`
2019-08-22 22:53:48 +08:00
mhchia
ef476e555b
Use RawConnection.read
...
Instead of accessing its reader and writer directly.
TODO: considering add `ReaderWriterCloser` interface and let connection
and stream inherit from it.
2019-08-22 22:53:48 +08:00
mhchia
0b466ddc86
Add lock to RawConnection
...
To avoid `self.writer.drain()` is called in parallel.
Reference: https://bugs.python.org/issue29930
2019-08-22 22:53:47 +08:00
mhchia
5768daa9bf
PR feedbacks
...
- Nits
- Add `SecurityUpgradeFailure` and handle `UpgradeFailure` in Swarm.
2019-08-22 22:53:47 +08:00
Kevin Mai-Husan Chia
2a1367b011
Apply suggestions from code review
...
Co-Authored-By: NIC Lin <twedusuck@gmail.com>
2019-08-22 22:53:47 +08:00
mhchia
bb7d37fd4f
Fix msg encoding
...
- Change varint-prefix encode to fixedint-prefix(4 bytes) encode.
2019-08-22 22:53:46 +08:00
mhchia
22b1a5395d
A working plaintext 2.0 without validation
2019-08-22 22:53:46 +08:00
mhchia
59b373b48a
Add plaintext.proto
...
Update Makefile to handle the import in `plaintext.proto`.
Import path is modified to be relative to the project root.
And we run `protoc` from where `Makefile` locates, i.e. the project
root.
Reference:
- plaintext.proto: 62b2c6c482/sec/insecure/pb/plaintext.proto
2019-08-22 22:53:46 +08:00
mhchia
dbd4ed44dd
Fix the issue when importing from other package
2019-08-22 15:36:17 +08:00
mhchia
8596f7390f
PR feedback: set protocol_id to constants
2019-08-21 11:43:24 +08:00
Alex Stokes
e7d2681fc0
Move base implementations into BaseSession
2019-08-15 16:33:34 -07:00
Alex Stokes
7942b7eaa7
Expose writer
2019-08-15 16:33:34 -07:00
Alex Stokes
879cbf1abd
Add an "insecure session" that satisfies the ISecureConn
interface
2019-08-15 16:33:33 -07:00
Alex Stokes
1e5357a1e1
Update the ISecureConn
interface following the reference and simplify accordingly
2019-08-15 16:33:33 -07:00
Alex Stokes
b98025c379
Move security transports into their respective sub-packages
2019-08-15 16:33:33 -07:00