-
Notifications
You must be signed in to change notification settings - Fork 984
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement /plaintext/2.0.0 #1236
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
I think, however, that we should keep plaintext 1, as this is a very low-maintenance low-effort burden.
Could you keep the current PlainTextConfig
and name it PlainText1Config
, and name your new object the PlainText2Config
?
protocols/plaintext/src/lib.rs
Outdated
} | ||
|
||
pub struct PlainTextMiddleware<S> { | ||
pub inner: Framed<S, BytesMut>, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That shouldn't be public.
protocols/plaintext/src/lib.rs
Outdated
|
||
fn upgrade_outbound(self, socket: Negotiated<C>, _: Self::Info) -> Self::Future { | ||
Box::new(self.handshake(socket)) | ||
// future::ok(i) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Commented-out code that should be removed.
protocols/plaintext/src/lib.rs
Outdated
|
||
fn upgrade_inbound(self, socket: Negotiated<C>, _: Self::Info) -> Self::Future { | ||
Box::new(self.handshake(socket)) | ||
// future::ok(i) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Commented-out code that should be removed.
protocols/plaintext/src/lib.rs
Outdated
#[derive(Clone)] | ||
pub struct PlainTextConfig { | ||
// peerId: PeerId, | ||
pub key: identity::Keypair, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd prefer if this was a PublicKey
instead of a Keypair
.
protocols/plaintext/src/lib.rs
Outdated
|
||
#[derive(Clone)] | ||
pub struct PlainTextConfig { | ||
// peerId: PeerId, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Commented out code to remove.
Thank you for your review!
That makes sense. 💡 I'll update entire the codes to compatible to the plaintext/2.0.0 spec (and to include your advice) as this PR is still draft. 😃 |
I've added a |
I've tested that examples/ping works fine with the sample code below:
pub fn build_tcp_ws_plaintext_mplex_yamux(keypair: identity::Keypair)
-> impl Transport<Output = (PeerId, impl core::muxing::StreamMuxer<OutboundSubstream = impl Send, Substream = impl Send, Error = impl Into<io::Error>> + Send + Sync), Error = impl error::Error + Send, Listener = impl Send, Dial = impl Send, ListenerUpgrade = impl Send> + Clone
{
// An another keys for testing the validation
let _another_keys = identity::Keypair::generate_ed25519();
CommonTransport::new()
.with_upgrade(PlainText2Config { pubkey: keypair.public(), peer_id: keypair.public().into_peer_id() })
.and_then(move |output, endpoint| {
let peer_id = output.remote_key.into_peer_id();
let peer_id2 = peer_id.clone();
let upgrade = core::upgrade::SelectUpgrade::new(yamux::Config::default(), mplex::MplexConfig::new())
// TODO: use a single `.map` instead of two maps
.map_inbound(move |muxer| (peer_id, muxer))
.map_outbound(move |muxer| (peer_id2, muxer));
core::upgrade::apply(output.stream, upgrade, endpoint)
.map(|(id, muxer)| (id, core::muxing::StreamMuxerBox::new(muxer)))
})
.with_timeout(Duration::from_secs(20))
}
// ...
// ...
- let transport = libp2p::build_development_transport(id_keys);
+ let transport = libp2p::build_tcp_ws_plaintext_mplex_yamux(id_keys);
// ...
// ... Yes, there is no test codes about |
Hmm... I couldn't find how fix it. In my local machine, it is done successfully. 🙄 |
It seems that the error is related to this 👀 : rust-libp2p/core/src/identity.rs Lines 24 to 25 in 057b379
but still I can't find how fix the error as I'm new to Rust and WASM... |
Ok, the CI has passed! @tomaka This PR is ready for review. 🙏 |
protocols/plaintext/src/lib.rs
Outdated
@@ -55,3 +70,130 @@ impl<C> OutboundUpgrade<C> for PlainTextConfig { | |||
} | |||
} | |||
|
|||
#[derive(Clone)] | |||
pub struct PlainText2Config { | |||
pub peer_id: PeerId, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suppose that's the remote's PeerId
? If so that should be removed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From the other conversation, this seems to be our local PeerId
. I think it should be automatically generated from the pubkey
then, and not provided by the configuration.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Deleted the PeerId
via abe8499
protocols/plaintext/src/lib.rs
Outdated
#[derive(Clone)] | ||
pub struct PlainText2Config { | ||
pub peer_id: PeerId, | ||
pub pubkey: identity::PublicKey, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess that's our local public key? This fields needs some documentation explaining what it is.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, that is our local public key. Is it better to rename from pubkey
to local_pubkey
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes please, rename to local_public_key
.
As a side note, if #1240 is accepted, it would be nice if the output of the |
Co-Authored-By: Roman Borschel <romanb@users.noreply.github.com>
It seems that the Docker image should be updated. cc: @tomaka $ docker run --rm tomaka/rust-mingw-docker cargo -V
cargo 1.34.0 (6789d8a0a 2019-04-01) |
I've finished to update this PR but the CI failed, maybe the failure is not related to changes on this PR. |
The failure will be fixed in #1261 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally looks good to me now, I only made one more suggestion. Thanks for your effort @ackintosh.
|
||
/// Failed to parse one of the handshake protobuf messages. | ||
HandshakeParsingFailure, | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Another option is to collapse HandshakeParsingFailure
and ProtobufError
into the variant
InvalidPayload(Option<ProtobufError>)
Just a thought, because it seems weird to me to have two different error variants for basically the same kind of error (that all or part of the received message payload is invalid / cannot be parsed).
@romanb Thanks for your review! I've updated. |
@tomaka Is this OK to merge from your point of view? |
Yes! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GitHub prevents me from merging if I don't explicitly approve 😅
* Configurable multistream-select protocol. Add V1Lazy variant. (#1245) Make the multistream-select protocol (version) configurable on transport upgrades as well as for individual substreams. Add a "lazy" variant of multistream-select 1.0 that delays sending of negotiation protocol frames as much as possible but is only safe to use under additional assumptions that go beyond what is required by the multistream-select v1 specification. * Improve the code readability of the chat example (#1253) * Add bridged chats (#1252) * Try fix CI (#1261) * Print Rust version on CI * Don't print where not appropriate * Change caching strategy * Remove win32 build * Remove win32 from list * Update libsecp256k1 dep to 0.3.0 (#1258) * Update libsecp256k1 dep to 0.3.0 * Sign now cannot fail * Upgrade url and percent-encoding deps to 2.1.0 (#1267) * Upgrade percent-encoding dep to 2.1.0 * Upgrade url dep to 2.1.0 * Revert CIPHERS set to null (#1273) * Update dependency versions (#1265) * Update versions of many dependencies * Bump version of rand * Updates for changed APIs in rand, ring, and webpki * Replace references to `snow::Session` `Session` no longer exists in `snow` but the replacement is two structs `HandshakeState` and `TransportState` Something will have to be done to harmonize `NoiseOutput.session` * Add precise type for UnparsedPublicKey * Update data structures/functions to match new snow's API * Delete diff.diff Remove accidentally committed diff file * Remove commented lines in identity/rsa.rs * Bump libsecp256k1 to 0.3.1 * Implement /plaintext/2.0.0 (#1236) * WIP * plaintext/2.0.0 * Refactor protobuf related issues to compatible with the spec * Rename: new PlainTextConfig -> PlainText2Config * Keep plaintext/1.0.0 as PlainText1Config * Config contains pubkey * Rename: proposition -> exchange * Add PeerId to Exchange * Check the validity of the remote's `Exchange` * Tweak * Delete unused import * Add debug log * Delete unused field: public_key_encoded * Delete unused field: local * Delete unused field: exchange_bytes * The inner instance should not be public * identity::Publickey::Rsa is not available on wasm * Delete PeerId from Config as it should be generated from the pubkey * Catch up for #1240 * Tweak * Update protocols/plaintext/src/error.rs Co-Authored-By: Pierre Krieger <pierre.krieger1708@gmail.com> * Update protocols/plaintext/src/handshake.rs Co-Authored-By: Pierre Krieger <pierre.krieger1708@gmail.com> * Update protocols/plaintext/src/error.rs Co-Authored-By: Pierre Krieger <pierre.krieger1708@gmail.com> * Update protocols/plaintext/src/error.rs Co-Authored-By: Roman Borschel <romanb@users.noreply.github.com> * Update protocols/plaintext/src/error.rs Co-Authored-By: Roman Borschel <romanb@users.noreply.github.com> * Rename: pubkey -> local_public_key * Delete unused error * Rename: PeerIdValidationFailed -> InvalidPeerId * Fix: HandShake -> Handshake * Use bytes insteadof Publickey to avoid code duplication * Replace with ProtobufError * Merge HandshakeContext<()> into HandshakeContext<Local> * Improve the peer ID validation to simplify the handshake * Propagate Remote to allow extracting the PeerId from the Remote * Collapse the same kind of errors into the variant * [noise]: `sodiumoxide 0.2.5` (#1276) Fixes rustsec/advisory-db#192 * examples/ipfs-kad.rs: Remove outdated reference to `without_init` (#1280) * CircleCI Test Fix (#1282) * Disabling "Docker Layer Caching" because it breaks one of the circleci checks * Bump to trigger CircleCI build * unbump * zeroize: Upgrade to v1.0 (#1284) v1.0 final release is out. Release notes: iqlusioninc/crates#279 * *: Consolidate protobuf scripts and update to rust-protobuf 2.8.1 (#1275) * *: Consolidate protobuf generation scripts * *: Update to rust-protobuf 2.8.1 * *: Mark protobuf generated modules with '_proto' * examples: Add distributed key value store (#1281) * examples: Add distributed key value store This commit adds a basic distributed key value store supporting GET and PUT commands using Kademlia and mDNS. * examples/distributed-key-value-store: Fix typo * Simple Warning Cleanup (#1278) * Cleaning up warnings - removing unused `use` * Cleaning up warnings - unused tuple value * Cleaning up warnings - removing dead code * Cleaning up warnings - fixing deprecated name * Cleaning up warnings - removing dead code * Revert "Cleaning up warnings - removing dead code" This reverts commit f18a765. * Enable the std feature of ring (#1289)
This PR closes #1208 🚀
TODO:
PlainText1Config
PlainText2Config