mirror of
https://github.com/ipfs/kubo.git
synced 2026-02-23 19:37:46 +08:00
this is a major refactor of the entire codebase it changes the monolithic peer.Peer into using a peer.ID and a peer.Peerstore. Other changes: - removed handshake3. - testutil vastly simplified peer - secio bugfix + debugging logs - testutil: RandKeyPair - backpressure bugfix: w.o.w. - peer: added hex enc/dec - peer: added a PeerInfo struct PeerInfo is a small struct used to pass around a peer with a set of addresses and keys. This is not meant to be a complete view of the system, but rather to model updates to the peerstore. It is used by things like the routing system. - updated peer/queue + peerset - latency metrics - testutil: use crand for PeerID gen RandPeerID generates random "valid" peer IDs. it does not NEED to generate keys because it is as if we lost the key right away. fine to read some randomness and hash it. to generate proper keys and an ID, use: sk, pk, _ := testutil.RandKeyPair() id, _ := peer.IDFromPublicKey(pk) Also added RandPeerIDFatal helper - removed old spipe - updated seccat - core: cleanup initIdentity - removed old getFromPeerList
162 lines
3.3 KiB
Go
162 lines
3.3 KiB
Go
package peer
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
ic "github.com/jbenet/go-ipfs/crypto"
|
|
u "github.com/jbenet/go-ipfs/util"
|
|
|
|
b58 "github.com/jbenet/go-ipfs/Godeps/_workspace/src/github.com/jbenet/go-base58"
|
|
)
|
|
|
|
var gen1 keyset // generated
|
|
var gen2 keyset // generated
|
|
var man keyset // manual
|
|
|
|
func init() {
|
|
if err := gen1.generate(); err != nil {
|
|
panic(err)
|
|
}
|
|
if err := gen2.generate(); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
skManBytes = strings.Replace(skManBytes, "\n", "", -1)
|
|
if err := man.load(hpkpMan, skManBytes); err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
type keyset struct {
|
|
sk ic.PrivKey
|
|
pk ic.PubKey
|
|
hpk string
|
|
hpkp string
|
|
}
|
|
|
|
func (ks *keyset) generate() error {
|
|
var err error
|
|
ks.sk, ks.pk, err = ic.GenerateKeyPair(ic.RSA, 1024)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
bpk, err := ks.pk.Bytes()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.hpk = string(u.Hash(bpk))
|
|
ks.hpkp = b58.Encode([]byte(ks.hpk))
|
|
return nil
|
|
}
|
|
|
|
func (ks *keyset) load(hpkp, skBytesStr string) error {
|
|
skBytes, err := base64.StdEncoding.DecodeString(skBytesStr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.sk, err = ic.UnmarshalPrivateKey(skBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.pk = ks.sk.GetPublic()
|
|
bpk, err := ks.pk.Bytes()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ks.hpk = string(u.Hash(bpk))
|
|
ks.hpkp = b58.Encode([]byte(ks.hpk))
|
|
if ks.hpkp != hpkp {
|
|
return fmt.Errorf("hpkp doesn't match key. %s", hpkp)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func TestIDMatchesPublicKey(t *testing.T) {
|
|
|
|
test := func(ks keyset) {
|
|
p1, err := IDB58Decode(ks.hpkp)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if ks.hpk != string(p1) {
|
|
t.Error("p1 and hpk differ")
|
|
}
|
|
|
|
if !p1.MatchesPublicKey(ks.pk) {
|
|
t.Fatal("p1 does not match pk")
|
|
}
|
|
|
|
p2, err := IDFromPublicKey(ks.pk)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if p1 != p2 {
|
|
t.Error("p1 and p2 differ", p1.Pretty(), p2.Pretty())
|
|
}
|
|
|
|
if p2.Pretty() != ks.hpkp {
|
|
t.Error("hpkp and p2.Pretty differ", ks.hpkp, p2.Pretty())
|
|
}
|
|
}
|
|
|
|
test(gen1)
|
|
test(gen2)
|
|
test(man)
|
|
}
|
|
|
|
func TestIDMatchesPrivateKey(t *testing.T) {
|
|
|
|
test := func(ks keyset) {
|
|
p1, err := IDB58Decode(ks.hpkp)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if ks.hpk != string(p1) {
|
|
t.Error("p1 and hpk differ")
|
|
}
|
|
|
|
if !p1.MatchesPrivateKey(ks.sk) {
|
|
t.Fatal("p1 does not match sk")
|
|
}
|
|
|
|
p2, err := IDFromPrivateKey(ks.sk)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if p1 != p2 {
|
|
t.Error("p1 and p2 differ", p1.Pretty(), p2.Pretty())
|
|
}
|
|
}
|
|
|
|
test(gen1)
|
|
test(gen2)
|
|
test(man)
|
|
}
|
|
|
|
var hpkpMan = `QmRK3JgmVEGiewxWbhpXLJyjWuGuLeSTMTndA1coMHEy5o`
|
|
var skManBytes = `
|
|
CAAS4AQwggJcAgEAAoGBAL7w+Wc4VhZhCdM/+Hccg5Nrf4q9NXWwJylbSrXz/unFS24wyk6pEk0zi3W
|
|
7li+vSNVO+NtJQw9qGNAMtQKjVTP+3Vt/jfQRnQM3s6awojtjueEWuLYVt62z7mofOhCtj+VwIdZNBo
|
|
/EkLZ0ETfcvN5LVtLYa8JkXybnOPsLvK+PAgMBAAECgYBdk09HDM7zzL657uHfzfOVrdslrTCj6p5mo
|
|
DzvCxLkkjIzYGnlPuqfNyGjozkpSWgSUc+X+EGLLl3WqEOVdWJtbM61fewEHlRTM5JzScvwrJ39t7o6
|
|
CCAjKA0cBWBd6UWgbN/t53RoWvh9HrA2AW5YrT0ZiAgKe9y7EMUaENVJ8QJBAPhpdmb4ZL4Fkm4OKia
|
|
NEcjzn6mGTlZtef7K/0oRC9+2JkQnCuf6HBpaRhJoCJYg7DW8ZY+AV6xClKrgjBOfERMCQQDExhnzu2
|
|
dsQ9k8QChBlpHO0TRbZBiQfC70oU31kM1AeLseZRmrxv9Yxzdl8D693NNWS2JbKOXl0kMHHcuGQLMVA
|
|
kBZ7WvkmPV3aPL6jnwp2pXepntdVnaTiSxJ1dkXShZ/VSSDNZMYKY306EtHrIu3NZHtXhdyHKcggDXr
|
|
qkBrdgErAkAlpGPojUwemOggr4FD8sLX1ot2hDJyyV7OK2FXfajWEYJyMRL1Gm9Uk1+Un53RAkJneqp
|
|
JGAzKpyttXBTIDO51AkEA98KTiROMnnU8Y6Mgcvr68/SMIsvCYMt9/mtwSBGgl80VaTQ5Hpaktl6Xbh
|
|
VUt5Wv0tRxlXZiViCGCD1EtrrwTw==
|
|
`
|