mirror of
https://github.com/varun-r-mallya/py-libp2p.git
synced 2026-02-11 23:51:07 +00:00
Typing and linting fixes
This commit is contained in:
@ -3,7 +3,6 @@ from typing import Optional
|
||||
from libp2p.crypto.keys import PrivateKey, PublicKey
|
||||
from libp2p.network.connection.raw_connection_interface import IRawConnection
|
||||
from libp2p.peer.id import ID
|
||||
from libp2p.security.base_transport import BaseSecureTransport
|
||||
from libp2p.security.secure_conn_interface import ISecureConn
|
||||
|
||||
|
||||
@ -21,12 +20,13 @@ class BaseSession(ISecureConn):
|
||||
|
||||
def __init__(
|
||||
self,
|
||||
transport: BaseSecureTransport,
|
||||
local_peer: ID,
|
||||
local_private_key: PrivateKey,
|
||||
conn: IRawConnection,
|
||||
peer_id: Optional[ID] = None,
|
||||
) -> None:
|
||||
self.local_peer = transport.local_peer
|
||||
self.local_private_key = transport.local_private_key
|
||||
self.local_peer = local_peer
|
||||
self.local_private_key = local_private_key
|
||||
self.remote_peer_id = peer_id
|
||||
self.remote_permanent_pubkey = None
|
||||
|
||||
|
||||
@ -21,3 +21,7 @@ class InvalidSignatureOnExchange(SecioException):
|
||||
|
||||
class HandshakeFailed(SecioException):
|
||||
pass
|
||||
|
||||
|
||||
class IncompatibleChoices(SecioException):
|
||||
pass
|
||||
|
||||
@ -25,6 +25,7 @@ from libp2p.security.secure_conn_interface import ISecureConn
|
||||
|
||||
from .exceptions import (
|
||||
HandshakeFailed,
|
||||
IncompatibleChoices,
|
||||
InvalidSignatureOnExchange,
|
||||
PeerMismatchException,
|
||||
SecioException,
|
||||
@ -43,17 +44,20 @@ DEFAULT_SUPPORTED_CIPHERS = "AES-128"
|
||||
DEFAULT_SUPPORTED_HASHES = "SHA256"
|
||||
|
||||
|
||||
@dataclass
|
||||
class SecureSession(BaseSession):
|
||||
local_peer: PeerID
|
||||
local_encryption_parameters: AuthenticatedEncryptionParameters
|
||||
def __init__(
|
||||
self,
|
||||
local_peer: PeerID,
|
||||
local_private_key: PrivateKey,
|
||||
local_encryption_parameters: AuthenticatedEncryptionParameters,
|
||||
remote_peer: PeerID,
|
||||
remote_encryption_parameters: AuthenticatedEncryptionParameters,
|
||||
conn: IRawConnection,
|
||||
) -> None:
|
||||
super().__init__(local_peer, local_private_key, conn, remote_peer)
|
||||
|
||||
remote_peer: PeerID
|
||||
remote_encryption_parameters: AuthenticatedEncryptionParameters
|
||||
|
||||
conn: IRawConnection
|
||||
|
||||
def __post_init__(self):
|
||||
self.local_encryption_parameters = local_encryption_parameters
|
||||
self.remote_encryption_parameters = remote_encryption_parameters
|
||||
self._initialize_authenticated_encryption_for_local_peer()
|
||||
self._initialize_authenticated_encryption_for_remote_peer()
|
||||
|
||||
@ -68,7 +72,8 @@ class SecureSession(BaseSession):
|
||||
|
||||
async def _read_msg(self) -> bytes:
|
||||
# TODO do we need to serialize reads?
|
||||
msg = await read_next_message(self.conn)
|
||||
# TODO do not expose reader
|
||||
msg = await read_next_message(self.conn.reader)
|
||||
return self.remote_encrypter.decrypt_if_valid(msg)
|
||||
|
||||
async def write(self, data: bytes) -> None:
|
||||
@ -135,6 +140,9 @@ class EncryptionParameters:
|
||||
|
||||
ephemeral_public_key: PublicKey
|
||||
|
||||
def __init__(self) -> None:
|
||||
pass
|
||||
|
||||
|
||||
@dataclass
|
||||
class SessionParameters:
|
||||
@ -148,6 +156,9 @@ class SessionParameters:
|
||||
order: int
|
||||
shared_key: bytes
|
||||
|
||||
def __init__(self) -> None:
|
||||
pass
|
||||
|
||||
|
||||
async def _response_to_msg(conn: IRawConnection, msg: bytes) -> bytes:
|
||||
# TODO clean up ``IRawConnection`` so that we don't have to break
|
||||
@ -182,6 +193,7 @@ def _select_parameter_from_order(
|
||||
for first, second in zip(first_choices, second_choices):
|
||||
if first == second:
|
||||
return first
|
||||
raise IncompatibleChoices()
|
||||
|
||||
|
||||
def _select_encryption_parameters(
|
||||
@ -302,7 +314,9 @@ async def _establish_session_parameters(
|
||||
|
||||
|
||||
def _mk_session_from(
|
||||
session_parameters: SessionParameters, conn: IRawConnection
|
||||
local_private_key: PrivateKey,
|
||||
session_parameters: SessionParameters,
|
||||
conn: IRawConnection,
|
||||
) -> SecureSession:
|
||||
key_set1, key_set2 = initialize_pair_for_encryption(
|
||||
session_parameters.local_encryption_parameters.cipher_type,
|
||||
@ -315,6 +329,7 @@ def _mk_session_from(
|
||||
|
||||
session = SecureSession(
|
||||
session_parameters.local_peer,
|
||||
local_private_key,
|
||||
key_set1,
|
||||
session_parameters.remote_peer,
|
||||
key_set2,
|
||||
@ -329,7 +344,7 @@ async def _finish_handshake(session: ISecureConn, remote_nonce: bytes) -> bytes:
|
||||
|
||||
|
||||
async def create_secure_session(
|
||||
transport: BaseSecureTransport, conn: IRawConnection, remote_peer: PeerID = None
|
||||
transport: "SecIOTransport", conn: IRawConnection, remote_peer: PeerID = None
|
||||
) -> ISecureConn:
|
||||
"""
|
||||
Attempt the initial `secio` handshake with the remote peer.
|
||||
@ -348,7 +363,7 @@ async def create_secure_session(
|
||||
conn.close()
|
||||
raise e
|
||||
|
||||
session = _mk_session_from(session_parameters, conn)
|
||||
session = _mk_session_from(local_private_key, session_parameters, conn)
|
||||
|
||||
received_nonce = await _finish_handshake(session, remote_nonce)
|
||||
if received_nonce != local_nonce:
|
||||
|
||||
Reference in New Issue
Block a user