c-ipfs/core/null.c

162 lines
5.2 KiB
C
Raw Normal View History

2017-02-10 01:10:21 +00:00
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#include <string.h>
2017-02-10 01:10:21 +00:00
#include <unistd.h>
#include <pthread.h>
#include "libp2p/net/p2pnet.h"
#include "libp2p/record/message.h"
#include "libp2p/net/multistream.h"
2017-02-10 01:10:21 +00:00
#include "ipfs/core/daemon.h"
#include "ipfs/routing/routing.h"
#include "ipfs/core/ipfs_node.h"
2017-03-02 21:18:02 +00:00
#include "libp2p/secio/secio.h"
2017-03-19 19:40:16 +00:00
#include "libp2p/nodeio/nodeio.h"
2017-03-30 18:59:31 +00:00
#include "libp2p/routing/dht_protocol.h"
2017-03-19 19:40:16 +00:00
#include "ipfs/merkledag/merkledag.h"
#include "ipfs/merkledag/node.h"
2017-02-10 01:10:21 +00:00
#define BUF_SIZE 4096
2017-03-30 18:59:31 +00:00
/***
* Compare incoming to see if they are requesting a protocol upgrade
* @param incoming the incoming string
* @param incoming_size the size of the incoming string
* @param test the protocol string to compare it with (i.e. "/secio" or "/nodeio"
* @returns true(1) if there was a match, false(0) otherwise
*/
int protocol_compare(unsigned char* incoming, size_t incoming_size, const char* test) {
int test_size = strlen(test);
if (incoming_size >= test_size && strncmp((char*)incoming, test, test_size) == 0)
2017-03-19 19:40:16 +00:00
return 1;
return 0;
}
2017-03-30 18:59:31 +00:00
/**
* We've received a connection. Find out what they want
*/
2017-02-10 01:10:21 +00:00
void *ipfs_null_connection (void *ptr)
{
struct null_connection_params *connection_param = NULL;
2017-02-10 01:10:21 +00:00
connection_param = (struct null_connection_params*) ptr;
// TODO: when should we exit the for loop and disconnect?
2017-03-19 19:40:16 +00:00
struct SessionContext session;
session.insecure_stream = libp2p_net_multistream_stream_new(connection_param->socket);
session.default_stream = session.insecure_stream;
2017-02-10 01:10:21 +00:00
fprintf(stderr, "Connection %d, count %d\n", connection_param->socket, *(connection_param->count));
2017-03-19 19:40:16 +00:00
if (libp2p_net_multistream_negotiate(session.insecure_stream)) {
for(;;) {
2017-03-02 21:18:02 +00:00
// check if they're looking for an upgrade (i.e. secio)
unsigned char* results = NULL;
size_t bytes_read;
2017-03-19 19:40:16 +00:00
session.default_stream->read(&session, &results, &bytes_read);
2017-03-30 18:59:31 +00:00
if (protocol_compare(results, bytes_read, "/secio")) {
2017-03-19 19:40:16 +00:00
if (!libp2p_secio_handshake(&session, &connection_param->local_node->identity->private_key, 1)) {
2017-03-02 21:18:02 +00:00
// rejecting connection
break;
2017-02-27 17:27:40 +00:00
}
2017-03-30 18:59:31 +00:00
} else if (protocol_compare(results, bytes_read, "/nodeio")) {
2017-03-19 19:40:16 +00:00
if (!libp2p_nodeio_handshake(&session))
break;
// loop through file requests
int _continue = 1;
while(_continue) {
unsigned char* hash;
size_t hash_length = 0;
_continue = session.default_stream->read(&session, &hash, &hash_length);
if (hash_length < 20) {
_continue = 0;
continue;
}
else {
// try to get the Node
struct Node* node = NULL;
if (!ipfs_merkledag_get(hash, hash_length, &node, connection_param->local_node->repo)) {
_continue = 0;
continue;
}
size_t results_size = ipfs_node_protobuf_encode_size(node);
unsigned char results[results_size];
if (!ipfs_node_protobuf_encode(node, results, results_size, &results_size)) {
_continue = 0;
continue;
}
// send it to the requestor
session.default_stream->write(&session, results, results_size);
}
}
2017-03-30 18:59:31 +00:00
} else if (protocol_compare(results, bytes_read, "/kad/")) {
2017-04-03 17:42:35 +00:00
fprintf(stderr, "Attempting kademlia connection...\n");
if (!libp2p_routing_dht_handshake(&session)) {
fprintf(stderr, "kademlia connection handshake failed\n");
2017-03-30 18:59:31 +00:00
break;
2017-04-03 17:42:35 +00:00
}
2017-03-30 18:59:31 +00:00
// this handles 1 transaction
libp2p_routing_dht_handle_message(&session, connection_param->local_node->peerstore, connection_param->local_node->providerstore);
2017-04-03 17:42:35 +00:00
fprintf(stderr, "kademlia message handled\n");
2017-03-19 19:40:16 +00:00
}
else {
2017-03-30 18:59:31 +00:00
// oops there was a problem
//TODO: Handle this
}
}
2017-04-03 17:42:35 +00:00
} else {
fprintf(stderr, "Multistream negotiation failed\n");
}
2017-03-19 19:40:16 +00:00
if (session.default_stream != NULL) {
session.default_stream->close(&session);
}
2017-02-10 01:10:21 +00:00
(*(connection_param->count))--; // update counter.
free (connection_param);
return (void*) 1;
}
void *ipfs_null_listen (void *ptr)
{
int socketfd, s, count = 0;
pthread_t pth_connection;
struct IpfsNodeListenParams *listen_param;
2017-02-10 01:10:21 +00:00
struct null_connection_params *connection_param;
listen_param = (struct IpfsNodeListenParams*) ptr;
2017-02-10 01:10:21 +00:00
if ((socketfd = socket_listen(socket_tcp4(), &(listen_param->ipv4), &(listen_param->port))) <= 0) {
perror("fail to init null router.");
exit (1);
}
fprintf(stderr, "Null listening on %d\n", listen_param->port);
for (;;) {
s = socket_accept4(socketfd, &(listen_param->ipv4), &(listen_param->port));
if (count >= CONNECTIONS) { // limit reached.
close (s);
continue;
}
count++;
connection_param = malloc (sizeof (struct null_connection_params));
if (connection_param) {
connection_param->socket = s;
connection_param->count = &count;
connection_param->local_node = listen_param->local_node;
2017-02-10 01:10:21 +00:00
// Create pthread for ipfs_null_connection.
if (pthread_create(&pth_connection, NULL, ipfs_null_connection, connection_param)) {
fprintf(stderr, "Error creating thread for connection %d\n", count);
close (s);
} else {
pthread_detach (pth_connection);
}
}
}
return (void*) 2;
}