107 lines
3.8 KiB
Python
107 lines
3.8 KiB
Python
from abc import ABC
|
|
from typing import TYPE_CHECKING, Dict, NewType
|
|
|
|
from libp2p.protocol_muxer.multiselect import Multiselect
|
|
from libp2p.protocol_muxer.multiselect_client import MultiselectClient
|
|
|
|
if TYPE_CHECKING:
|
|
from libp2p.network.connection.raw_connection_interface import IRawConnection
|
|
from libp2p.peer.id import ID
|
|
from .typing import TSecurityDetails
|
|
from .secure_conn_interface import ISecureConn
|
|
from .secure_transport_interface import ISecureTransport
|
|
|
|
|
|
TProtocol = NewType("TProtocol", str)
|
|
|
|
|
|
"""
|
|
Represents a secured connection object, which includes a connection and details about the security
|
|
involved in the secured connection
|
|
|
|
Relevant go repo: https://github.com/libp2p/go-conn-security/blob/master/interface.go
|
|
"""
|
|
|
|
|
|
class SecurityMultistream(ABC):
|
|
transports: Dict[TProtocol, "ISecureTransport"]
|
|
multiselect: "Multiselect"
|
|
multiselect_client: "MultiselectClient"
|
|
|
|
def __init__(self) -> None:
|
|
# Map protocol to secure transport
|
|
self.transports = {}
|
|
|
|
# Create multiselect
|
|
self.multiselect = Multiselect()
|
|
|
|
# Create multiselect client
|
|
self.multiselect_client = MultiselectClient()
|
|
|
|
def add_transport(self, protocol: TProtocol, transport: "ISecureTransport") -> None:
|
|
# Associate protocol with transport
|
|
self.transports[protocol] = transport
|
|
|
|
# Add protocol and handler to multiselect
|
|
# Note: None is added as the handler for the given protocol since
|
|
# we only care about selecting the protocol, not any handler function
|
|
self.multiselect.add_handler(protocol, None)
|
|
|
|
async def secure_inbound(self, conn: "IRawConnection") -> "ISecureConn":
|
|
"""
|
|
Secure the connection, either locally or by communicating with opposing node via conn,
|
|
for an inbound connection (i.e. we are not the initiator)
|
|
:return: secure connection object (that implements secure_conn_interface)
|
|
"""
|
|
|
|
# Select a secure transport
|
|
transport = await self.select_transport(conn, False)
|
|
|
|
# Create secured connection
|
|
secure_conn = await transport.secure_inbound(conn)
|
|
|
|
return secure_conn
|
|
|
|
async def secure_outbound(
|
|
self, conn: "IRawConnection", peer_id: "ID"
|
|
) -> "ISecureConn":
|
|
"""
|
|
Secure the connection, either locally or by communicating with opposing node via conn,
|
|
for an inbound connection (i.e. we are the initiator)
|
|
:return: secure connection object (that implements secure_conn_interface)
|
|
"""
|
|
|
|
# Select a secure transport
|
|
transport = await self.select_transport(conn, True)
|
|
|
|
# Create secured connection
|
|
secure_conn = await transport.secure_outbound(conn, peer_id)
|
|
|
|
return secure_conn
|
|
|
|
async def select_transport(
|
|
self, conn: "IRawConnection", initiator: bool
|
|
) -> "ISecureTransport":
|
|
"""
|
|
Select a transport that both us and the node on the
|
|
other end of conn support and agree on
|
|
:param conn: conn to choose a transport over
|
|
:param initiator: true if we are the initiator, false otherwise
|
|
:return: selected secure transport
|
|
"""
|
|
# TODO: Is conn acceptable to multiselect/multiselect_client
|
|
# instead of stream? In go repo, they pass in a raw conn
|
|
# (https://raw.githubusercontent.com/libp2p/go-conn-security-multistream/master/ssms.go)
|
|
|
|
protocol = None
|
|
if initiator:
|
|
# Select protocol if initiator
|
|
protocol = await self.multiselect_client.select_one_of(
|
|
list(self.transports.keys()), conn
|
|
)
|
|
else:
|
|
# Select protocol if non-initiator
|
|
protocol, _ = await self.multiselect.negotiate(conn)
|
|
# Return transport from protocol
|
|
return self.transports[protocol]
|