// Copyright 2018 Parity Technologies (UK) Ltd. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the "Software"), // to deal in the Software without restriction, including without limitation // the rights to use, copy, modify, merge, publish, distribute, sublicense, // and/or sell copies of the Software, and to permit persons to whom the // Software is furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER // DEALINGS IN THE SOFTWARE. use crate::handler::{self, Handler, InEvent}; use crate::protocol::{Info, UpgradeError}; use libp2p_core::multiaddr::Protocol; use libp2p_core::transport::PortUse; use libp2p_core::{multiaddr, ConnectedPoint, Endpoint, Multiaddr}; use libp2p_identity::PeerId; use libp2p_identity::PublicKey; use libp2p_swarm::behaviour::{ConnectionClosed, ConnectionEstablished, DialFailure, FromSwarm}; use libp2p_swarm::{ ConnectionDenied, DialError, ExternalAddresses, ListenAddresses, NetworkBehaviour, NotifyHandler, PeerAddresses, StreamUpgradeError, THandlerInEvent, ToSwarm, _address_translation, }; use libp2p_swarm::{ConnectionId, THandler, THandlerOutEvent}; use std::collections::hash_map::Entry; use std::num::NonZeroUsize; use std::{ collections::{HashMap, HashSet, VecDeque}, task::Context, task::Poll, time::Duration, }; /// Whether an [`Multiaddr`] is a valid for the QUIC transport. fn is_quic_addr(addr: &Multiaddr, v1: bool) -> bool { use Protocol::*; let mut iter = addr.iter(); let Some(first) = iter.next() else { return false; }; let Some(second) = iter.next() else { return false; }; let Some(third) = iter.next() else { return false; }; let fourth = iter.next(); let fifth = iter.next(); matches!(first, Ip4(_) | Ip6(_) | Dns(_) | Dns4(_) | Dns6(_)) && matches!(second, Udp(_)) && if v1 { matches!(third, QuicV1) } else { matches!(third, Quic) } && matches!(fourth, Some(P2p(_)) | None) && fifth.is_none() } fn is_tcp_addr(addr: &Multiaddr) -> bool { use Protocol::*; let mut iter = addr.iter(); let first = match iter.next() { None => return false, Some(p) => p, }; let second = match iter.next() { None => return false, Some(p) => p, }; matches!(first, Ip4(_) | Ip6(_) | Dns(_) | Dns4(_) | Dns6(_)) && matches!(second, Tcp(_)) } /// Network behaviour that automatically identifies nodes periodically, returns information /// about them, and answers identify queries from other nodes. /// /// All external addresses of the local node supposedly observed by remotes /// are reported via [`ToSwarm::NewExternalAddrCandidate`]. pub struct Behaviour { config: Config, /// For each peer we're connected to, the observed address to send back to it. connected: HashMap>, /// The address a remote observed for us. our_observed_addresses: HashMap, /// The outbound connections established without port reuse (require translation) outbound_connections_with_ephemeral_port: HashSet, /// Pending events to be emitted when polled. events: VecDeque>, /// The addresses of all peers that we have discovered. discovered_peers: PeerCache, listen_addresses: ListenAddresses, external_addresses: ExternalAddresses, } /// Configuration for the [`identify::Behaviour`](Behaviour). #[non_exhaustive] #[derive(Debug, Clone)] pub struct Config { /// Application-specific version of the protocol family used by the peer, /// e.g. `ipfs/1.0.0` or `polkadot/1.0.0`. pub protocol_version: String, /// The public key of the local node. To report on the wire. pub local_public_key: PublicKey, /// Name and version of the local peer implementation, similar to the /// `User-Agent` header in the HTTP protocol. /// /// Defaults to `rust-libp2p/`. pub agent_version: String, /// The interval at which identification requests are sent to /// the remote on established connections after the first request, /// i.e. the delay between identification requests. /// /// Defaults to 5 minutes. pub interval: Duration, /// Whether new or expired listen addresses of the local node should /// trigger an active push of an identify message to all connected peers. /// /// Enabling this option can result in connected peers being informed /// earlier about new or expired listen addresses of the local node, /// i.e. before the next periodic identify request with each peer. /// /// Disabled by default. pub push_listen_addr_updates: bool, /// How many entries of discovered peers to keep before we discard /// the least-recently used one. /// /// Disabled by default. pub cache_size: usize, } impl Config { /// Creates a new configuration for the identify [`Behaviour`] that /// advertises the given protocol version and public key. pub fn new(protocol_version: String, local_public_key: PublicKey) -> Self { Self { protocol_version, agent_version: format!("rust-libp2p/{}", env!("CARGO_PKG_VERSION")), local_public_key, interval: Duration::from_secs(5 * 60), push_listen_addr_updates: false, cache_size: 100, } } /// Configures the agent version sent to peers. pub fn with_agent_version(mut self, v: String) -> Self { self.agent_version = v; self } /// Configures the interval at which identification requests are /// sent to peers after the initial request. pub fn with_interval(mut self, d: Duration) -> Self { self.interval = d; self } /// Configures whether new or expired listen addresses of the local /// node should trigger an active push of an identify message to all /// connected peers. pub fn with_push_listen_addr_updates(mut self, b: bool) -> Self { self.push_listen_addr_updates = b; self } /// Configures the size of the LRU cache, caching addresses of discovered peers. pub fn with_cache_size(mut self, cache_size: usize) -> Self { self.cache_size = cache_size; self } } impl Behaviour { /// Creates a new identify [`Behaviour`]. pub fn new(config: Config) -> Self { let discovered_peers = match NonZeroUsize::new(config.cache_size) { None => PeerCache::disabled(), Some(size) => PeerCache::enabled(size), }; Self { config, connected: HashMap::new(), our_observed_addresses: Default::default(), outbound_connections_with_ephemeral_port: Default::default(), events: VecDeque::new(), discovered_peers, listen_addresses: Default::default(), external_addresses: Default::default(), } } /// Initiates an active push of the local peer information to the given peers. pub fn push(&mut self, peers: I) where I: IntoIterator, { for p in peers { if !self.connected.contains_key(&p) { tracing::debug!(peer=%p, "Not pushing to peer because we are not connected"); continue; } self.events.push_back(ToSwarm::NotifyHandler { peer_id: p, handler: NotifyHandler::Any, event: InEvent::Push, }); } } fn on_connection_established( &mut self, ConnectionEstablished { peer_id, connection_id: conn, endpoint, failed_addresses, .. }: ConnectionEstablished, ) { let addr = match endpoint { ConnectedPoint::Dialer { address, .. } => address.clone(), ConnectedPoint::Listener { send_back_addr, .. } => send_back_addr.clone(), }; self.connected .entry(peer_id) .or_default() .insert(conn, addr); if let Some(cache) = self.discovered_peers.0.as_mut() { for addr in failed_addresses { cache.remove(&peer_id, addr); } } } fn all_addresses(&self) -> HashSet { self.listen_addresses .iter() .chain(self.external_addresses.iter()) .cloned() .collect() } fn emit_new_external_addr_candidate_event( &mut self, connection_id: ConnectionId, observed: &Multiaddr, ) { if self .outbound_connections_with_ephemeral_port .contains(&connection_id) { // Apply address translation to the candidate address. // For TCP without port-reuse, the observed address contains an ephemeral port which needs to be replaced by the port of a listen address. let translated_addresses = { let mut addrs: Vec<_> = self .listen_addresses .iter() .filter_map(|server| { if (is_tcp_addr(server) && is_tcp_addr(observed)) || (is_quic_addr(server, true) && is_quic_addr(observed, true)) || (is_quic_addr(server, false) && is_quic_addr(observed, false)) { _address_translation(server, observed) } else { None } }) .collect(); // remove duplicates addrs.sort_unstable(); addrs.dedup(); addrs }; // If address translation yielded nothing, broadcast the original candidate address. if translated_addresses.is_empty() { self.events .push_back(ToSwarm::NewExternalAddrCandidate(observed.clone())); } else { for addr in translated_addresses { self.events .push_back(ToSwarm::NewExternalAddrCandidate(addr)); } } return; } // outgoing connection dialed with port reuse // incomming connection self.events .push_back(ToSwarm::NewExternalAddrCandidate(observed.clone())); } } impl NetworkBehaviour for Behaviour { type ConnectionHandler = Handler; type ToSwarm = Event; fn handle_established_inbound_connection( &mut self, _: ConnectionId, peer: PeerId, _: &Multiaddr, remote_addr: &Multiaddr, ) -> Result, ConnectionDenied> { Ok(Handler::new( self.config.interval, peer, self.config.local_public_key.clone(), self.config.protocol_version.clone(), self.config.agent_version.clone(), remote_addr.clone(), self.all_addresses(), )) } fn handle_established_outbound_connection( &mut self, connection_id: ConnectionId, peer: PeerId, addr: &Multiaddr, _: Endpoint, port_use: PortUse, ) -> Result, ConnectionDenied> { // Contrary to inbound events, outbound events are full-p2p qualified // so we remove /p2p/ in order to be homogeneous // this will avoid Autonatv2 to probe twice the same address (fully-p2p-qualified + not fully-p2p-qualified) let mut addr = addr.clone(); if matches!(addr.iter().last(), Some(multiaddr::Protocol::P2p(_))) { addr.pop(); } if port_use == PortUse::New { self.outbound_connections_with_ephemeral_port .insert(connection_id); } Ok(Handler::new( self.config.interval, peer, self.config.local_public_key.clone(), self.config.protocol_version.clone(), self.config.agent_version.clone(), addr.clone(), // TODO: This is weird? That is the public address we dialed, shouldn't need to tell the other party? self.all_addresses(), )) } fn on_connection_handler_event( &mut self, peer_id: PeerId, connection_id: ConnectionId, event: THandlerOutEvent, ) { match event { handler::Event::Identified(mut info) => { // Remove invalid multiaddrs. info.listen_addrs .retain(|addr| multiaddr_matches_peer_id(addr, &peer_id)); let observed = info.observed_addr.clone(); self.events .push_back(ToSwarm::GenerateEvent(Event::Received { connection_id, peer_id, info: info.clone(), })); if let Some(ref mut discovered_peers) = self.discovered_peers.0 { for address in &info.listen_addrs { if discovered_peers.add(peer_id, address.clone()) { self.events.push_back(ToSwarm::NewExternalAddrOfPeer { peer_id, address: address.clone(), }); } } } match self.our_observed_addresses.entry(connection_id) { Entry::Vacant(not_yet_observed) => { not_yet_observed.insert(observed.clone()); self.emit_new_external_addr_candidate_event(connection_id, &observed); } Entry::Occupied(already_observed) if already_observed.get() == &observed => { // No-op, we already observed this address. } Entry::Occupied(mut already_observed) => { tracing::info!( old_address=%already_observed.get(), new_address=%observed, "Our observed address on connection {connection_id} changed", ); *already_observed.get_mut() = observed.clone(); self.emit_new_external_addr_candidate_event(connection_id, &observed); } } } handler::Event::Identification => { self.events.push_back(ToSwarm::GenerateEvent(Event::Sent { connection_id, peer_id, })); } handler::Event::IdentificationPushed(info) => { self.events.push_back(ToSwarm::GenerateEvent(Event::Pushed { connection_id, peer_id, info, })); } handler::Event::IdentificationError(error) => { self.events.push_back(ToSwarm::GenerateEvent(Event::Error { connection_id, peer_id, error, })); } } } #[tracing::instrument(level = "trace", name = "NetworkBehaviour::poll", skip(self))] fn poll(&mut self, _: &mut Context<'_>) -> Poll>> { if let Some(event) = self.events.pop_front() { return Poll::Ready(event); } Poll::Pending } fn handle_pending_outbound_connection( &mut self, _connection_id: ConnectionId, maybe_peer: Option, _addresses: &[Multiaddr], _effective_role: Endpoint, ) -> Result, ConnectionDenied> { let peer = match maybe_peer { None => return Ok(vec![]), Some(peer) => peer, }; Ok(self.discovered_peers.get(&peer)) } fn on_swarm_event(&mut self, event: FromSwarm) { let listen_addr_changed = self.listen_addresses.on_swarm_event(&event); let external_addr_changed = self.external_addresses.on_swarm_event(&event); if listen_addr_changed || external_addr_changed { // notify all connected handlers about our changed addresses let change_events = self .connected .iter() .flat_map(|(peer, map)| map.keys().map(|id| (*peer, id))) .map(|(peer_id, connection_id)| ToSwarm::NotifyHandler { peer_id, handler: NotifyHandler::One(*connection_id), event: InEvent::AddressesChanged(self.all_addresses()), }) .collect::>(); self.events.extend(change_events) } if listen_addr_changed && self.config.push_listen_addr_updates { // trigger an identify push for all connected peers let push_events = self.connected.keys().map(|peer| ToSwarm::NotifyHandler { peer_id: *peer, handler: NotifyHandler::Any, event: InEvent::Push, }); self.events.extend(push_events); } match event { FromSwarm::ConnectionEstablished(connection_established) => { self.on_connection_established(connection_established) } FromSwarm::ConnectionClosed(ConnectionClosed { peer_id, connection_id, remaining_established, .. }) => { if remaining_established == 0 { self.connected.remove(&peer_id); } else if let Some(addrs) = self.connected.get_mut(&peer_id) { addrs.remove(&connection_id); } self.our_observed_addresses.remove(&connection_id); self.outbound_connections_with_ephemeral_port .remove(&connection_id); } FromSwarm::DialFailure(DialFailure { peer_id, error, .. }) => { if let (Some(peer_id), Some(cache), DialError::Transport(errors)) = (peer_id, self.discovered_peers.0.as_mut(), error) { for (addr, _error) in errors { cache.remove(&peer_id, addr); } } } _ => {} } } } /// Event emitted by the `Identify` behaviour. #[allow(clippy::large_enum_variant)] #[derive(Debug)] pub enum Event { /// Identification information has been received from a peer. Received { /// Identifier of the connection. connection_id: ConnectionId, /// The peer that has been identified. peer_id: PeerId, /// The information provided by the peer. info: Info, }, /// Identification information of the local node has been sent to a peer in /// response to an identification request. Sent { /// Identifier of the connection. connection_id: ConnectionId, /// The peer that the information has been sent to. peer_id: PeerId, }, /// Identification information of the local node has been actively pushed to /// a peer. Pushed { /// Identifier of the connection. connection_id: ConnectionId, /// The peer that the information has been sent to. peer_id: PeerId, /// The full Info struct we pushed to the remote peer. Clients must /// do some diff'ing to know what has changed since the last push. info: Info, }, /// Error while attempting to identify the remote. Error { /// Identifier of the connection. connection_id: ConnectionId, /// The peer with whom the error originated. peer_id: PeerId, /// The error that occurred. error: StreamUpgradeError, }, } impl Event { pub fn connection_id(&self) -> ConnectionId { match self { Event::Received { connection_id, .. } | Event::Sent { connection_id, .. } | Event::Pushed { connection_id, .. } | Event::Error { connection_id, .. } => *connection_id, } } } /// If there is a given peer_id in the multiaddr, make sure it is the same as /// the given peer_id. If there is no peer_id for the peer in the mutiaddr, this returns true. fn multiaddr_matches_peer_id(addr: &Multiaddr, peer_id: &PeerId) -> bool { let last_component = addr.iter().last(); if let Some(multiaddr::Protocol::P2p(multi_addr_peer_id)) = last_component { return multi_addr_peer_id == *peer_id; } true } struct PeerCache(Option); impl PeerCache { fn disabled() -> Self { Self(None) } fn enabled(size: NonZeroUsize) -> Self { Self(Some(PeerAddresses::new(size))) } fn get(&mut self, peer: &PeerId) -> Vec { if let Some(cache) = self.0.as_mut() { cache.get(peer).collect() } else { Vec::new() } } } #[cfg(test)] mod tests { use super::*; #[test] fn check_multiaddr_matches_peer_id() { let peer_id = PeerId::random(); let other_peer_id = PeerId::random(); let mut addr: Multiaddr = "/ip4/147.75.69.143/tcp/4001" .parse() .expect("failed to parse multiaddr"); let addr_without_peer_id: Multiaddr = addr.clone(); let mut addr_with_other_peer_id = addr.clone(); addr.push(multiaddr::Protocol::P2p(peer_id)); addr_with_other_peer_id.push(multiaddr::Protocol::P2p(other_peer_id)); assert!(multiaddr_matches_peer_id(&addr, &peer_id)); assert!(!multiaddr_matches_peer_id( &addr_with_other_peer_id, &peer_id )); assert!(multiaddr_matches_peer_id(&addr_without_peer_id, &peer_id)); } }