Commit Graph

813 Commits

Author SHA1 Message Date
10e30beb42 Disable "friendly" IDs for tests that expect a full string 2019-08-24 22:57:22 +02:00
a363ba97d1 Work in terms of the IRawConnection abstraction 2019-08-24 22:52:09 +02:00
eb5ef39399 Convert message IO to work w/ a RawConnection. 2019-08-24 22:47:56 +02:00
7c004a4e14 Mypy fixes 2019-08-24 22:38:26 +02:00
44e5de636f Add "friendly" peer ID string representation for debugging 2019-08-24 22:38:26 +02:00
852609c85d Clean up base session type 2019-08-24 22:38:26 +02:00
9355f33da8 Add basic test for secio
Two peers in-memory can create a secure, bidirectional channel
2019-08-24 22:38:26 +02:00
b8c0ef9ebb Fix bugs in secio implementation 2019-08-24 22:38:25 +02:00
228032805a Some code cleanup 2019-08-24 22:38:25 +02:00
3f4589d497 Get tests working 2019-08-24 22:38:25 +02:00
d176115972 Add secio to security upgrader suite 2019-08-24 22:37:46 +02:00
376a5d4fc6 Adjust callsite 2019-08-24 22:37:45 +02:00
1adef05e94 Typing and linting fixes 2019-08-24 22:37:45 +02:00
0fa3331b8c Add clearer indication of "self encryption" 2019-08-24 22:37:45 +02:00
8e913a3faa Dispatch serialization of keys based on key type
- Add some tests to check high-level roundtrip
2019-08-24 22:37:45 +02:00
4d30b31c55 Finish first pass at secio implementation 2019-08-24 22:37:45 +02:00
af2e50aaf4 Add facility for authenticated encryption 2019-08-24 22:37:45 +02:00
228c17ae9e Add ECDH key exchange utility 2019-08-24 22:37:44 +02:00
fb13dfa7b3 Add sign and verify operations for secp256k1 keys 2019-08-24 22:37:44 +02:00
3c97a5a0ed Add ECC key implementation 2019-08-24 22:37:44 +02:00
91e11f3ec0 [wip] more secio implementation 2019-08-24 22:37:44 +02:00
0cc3fc24a7 Add source for some secure bytes, e.g. to provide a nonce 2019-08-24 22:37:44 +02:00
b59c5d6ca1 Add "msgio" functions 2019-08-24 22:37:44 +02:00
26165b0729 [wip] sketch of secio handshake 2019-08-24 22:37:44 +02:00
fd08bcf624 Add secio protobufs 2019-08-24 22:37:43 +02:00
23f53ef954 Allow optional peer ID in a security session 2019-08-24 22:37:43 +02:00
27c0a4f77b formatting 2019-08-24 22:37:43 +02:00
3e07faf343 Merge pull request #266 from ralexstokes/remove-unrelated-cde
Remove test suite for `asyncio`, *not* `py-libp2p`
2019-08-24 22:22:06 +02:00
d764ca2884 Merge pull request #265 from ralexstokes/add-wait-closed
Add call to `wait_closed` method of asyncio.StreamWriter
2019-08-24 22:17:29 +02:00
7ccdeaf308 Remove test suite for asyncio, *not* py-libp2p 2019-08-24 22:10:47 +02:00
5b32bfdd3f Add call to wait_closed method of asyncio.StreamWriter 2019-08-24 22:06:24 +02:00
d9883ee4f0 Merge pull request #263 from ralexstokes/remove-stream-from-connection
Encapsulate the concept of a stream to the stream multiplexer
2019-08-24 21:58:59 +02:00
9c5fb4fa5a Encapsulate concept of a "stream id" to a "muxed" connection 2019-08-24 21:50:07 +02:00
e29c1507bf remove unused fields 2019-08-24 21:50:06 +02:00
9a74797068 Merge pull request #264 from ralexstokes/remove-simple-security
Removes the SimpleSecurityTransport
2019-08-24 21:49:29 +02:00
73495038e1 remove simple security 2019-08-24 21:39:25 +02:00
1790e48c99 Remove deprecated file 2019-08-24 21:36:30 +02:00
da3c8be464 Merge pull request #253 from mhchia/feature/plaintext-2.0.0
Add `/plaintext/2.0.0` secure channel
2019-08-22 23:40:02 +08:00
b516579256 Remove the unnecessary RSAPrivateKey.from_bytes 2019-08-22 22:54:14 +08:00
c1eacf221f PR feedback
- Check if the received peer id matches the one we initialize the
session with.
- Move the check inside `run_handshake`
2019-08-22 22:53:49 +08:00
7c630df610 Update libp2p/security/insecure/transport.py
Co-Authored-By: NIC Lin <twedusuck@gmail.com>
2019-08-22 22:53:49 +08:00
16a4fd33c1 PR feedbacks
- Move exceptions to exceptions.py
- Raise `UpgradeFailure` in upgrader
- Refine the try/catch for upgraders in swarm
2019-08-22 22:53:49 +08:00
3e04480d62 Raise HandshakeFailure in transport
Change the exception handling flow.
Raise `SecurityUpgradeFailure` in security_multistream.
2019-08-22 22:53:48 +08:00
80452d9589 Fix make_exchange_message to use the new API 2019-08-22 22:53:48 +08:00
921bfb65cc Verify the remote pubkey and peer_id
- Add `from_bytes` in RSAPublicKey and Secp256k1PublicKey
- Add `pubkey_from_protobuf` to parse pubkey from protobuf
- Verify key and peer_id in `InsecureSession.run_handshake`
2019-08-22 22:53:48 +08:00
ef476e555b Use RawConnection.read
Instead of accessing its reader and writer directly.

TODO: considering add `ReaderWriterCloser` interface and let connection
and stream inherit from it.
2019-08-22 22:53:48 +08:00
0b466ddc86 Add lock to RawConnection
To avoid `self.writer.drain()` is called in parallel.
Reference: https://bugs.python.org/issue29930
2019-08-22 22:53:47 +08:00
5768daa9bf PR feedbacks
- Nits
- Add `SecurityUpgradeFailure` and handle `UpgradeFailure` in Swarm.
2019-08-22 22:53:47 +08:00
2a1367b011 Apply suggestions from code review
Co-Authored-By: NIC Lin <twedusuck@gmail.com>
2019-08-22 22:53:47 +08:00
0b62321265 Fix test_security_multistream
By passing initiator keypairs to node.
2019-08-22 22:53:47 +08:00