mirror of
https://gitlab.com/pulsechaincom/go-pulse.git
synced 2024-12-25 21:07:17 +00:00
a17a1f9208
* Added filters / watches * Removed event dep
247 lines
4.8 KiB
Go
247 lines
4.8 KiB
Go
package whisper
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/ecdsa"
|
|
"errors"
|
|
"fmt"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/event/filter"
|
|
"github.com/ethereum/go-ethereum/p2p"
|
|
"gopkg.in/fatih/set.v0"
|
|
)
|
|
|
|
// MOVE ME
|
|
type Hash struct {
|
|
hash string
|
|
}
|
|
|
|
var EmptyHash Hash
|
|
|
|
func H(hash []byte) Hash {
|
|
return Hash{string(hash)}
|
|
}
|
|
func HS(hash string) Hash {
|
|
return Hash{hash}
|
|
}
|
|
|
|
func (self Hash) Compare(other Hash) int {
|
|
return bytes.Compare([]byte(self.hash), []byte(other.hash))
|
|
}
|
|
|
|
// MOVE ME END
|
|
|
|
const (
|
|
statusMsg = 0x0
|
|
envelopesMsg = 0x01
|
|
)
|
|
|
|
type MessageEvent struct {
|
|
To *ecdsa.PrivateKey
|
|
From *ecdsa.PublicKey
|
|
Message *Message
|
|
}
|
|
|
|
const DefaultTtl = 50 * time.Second
|
|
|
|
type Whisper struct {
|
|
protocol p2p.Protocol
|
|
filters *filter.Filters
|
|
|
|
mmu sync.RWMutex
|
|
messages map[Hash]*Envelope
|
|
expiry map[uint32]*set.SetNonTS
|
|
|
|
quit chan struct{}
|
|
|
|
keys []*ecdsa.PrivateKey
|
|
}
|
|
|
|
func New() *Whisper {
|
|
whisper := &Whisper{
|
|
messages: make(map[Hash]*Envelope),
|
|
filters: filter.New(),
|
|
expiry: make(map[uint32]*set.SetNonTS),
|
|
quit: make(chan struct{}),
|
|
}
|
|
whisper.filters.Start()
|
|
go whisper.update()
|
|
|
|
// XXX TODO REMOVE TESTING CODE
|
|
msg := NewMessage([]byte(fmt.Sprintf("Hello world. This is whisper-go. Incase you're wondering; the time is %v", time.Now())))
|
|
envelope, _ := msg.Seal(DefaultPow, Opts{
|
|
Ttl: DefaultTtl,
|
|
})
|
|
if err := whisper.Send(envelope); err != nil {
|
|
fmt.Println(err)
|
|
}
|
|
// XXX TODO REMOVE TESTING CODE
|
|
|
|
// p2p whisper sub protocol handler
|
|
whisper.protocol = p2p.Protocol{
|
|
Name: "shh",
|
|
Version: 2,
|
|
Length: 2,
|
|
Run: whisper.msgHandler,
|
|
}
|
|
|
|
return whisper
|
|
}
|
|
|
|
func (self *Whisper) Stop() {
|
|
close(self.quit)
|
|
}
|
|
|
|
func (self *Whisper) Send(envelope *Envelope) error {
|
|
return self.add(envelope)
|
|
}
|
|
|
|
func (self *Whisper) NewIdentity() *ecdsa.PrivateKey {
|
|
key, err := crypto.GenerateKey()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
self.keys = append(self.keys, key)
|
|
|
|
return key
|
|
}
|
|
|
|
func (self *Whisper) HasIdentity(key *ecdsa.PrivateKey) bool {
|
|
for _, key := range self.keys {
|
|
if key.D.Cmp(key.D) == 0 {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (self *Whisper) Watch(opts Filter) int {
|
|
return self.filters.Install(filter.Generic{
|
|
Str1: string(crypto.FromECDSA(opts.To)),
|
|
Str2: string(crypto.FromECDSAPub(opts.From)),
|
|
Fn: func(data interface{}) {
|
|
opts.Fn(data.(*Message))
|
|
},
|
|
})
|
|
}
|
|
|
|
// Main handler for passing whisper messages to whisper peer objects
|
|
func (self *Whisper) msgHandler(peer *p2p.Peer, ws p2p.MsgReadWriter) error {
|
|
wpeer := NewPeer(self, peer, ws)
|
|
// initialise whisper peer (handshake/status)
|
|
if err := wpeer.init(); err != nil {
|
|
return err
|
|
}
|
|
// kick of the main handler for broadcasting/managing envelopes
|
|
go wpeer.start()
|
|
defer wpeer.stop()
|
|
|
|
// Main *read* loop. Writing is done by the peer it self.
|
|
for {
|
|
msg, err := ws.ReadMsg()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
envelope, err := NewEnvelopeFromReader(msg.Payload)
|
|
if err != nil {
|
|
peer.Infoln(err)
|
|
continue
|
|
}
|
|
|
|
if err := self.add(envelope); err != nil {
|
|
// TODO Punish peer here. Invalid envelope.
|
|
peer.Infoln(err)
|
|
}
|
|
wpeer.addKnown(envelope)
|
|
}
|
|
}
|
|
|
|
// takes care of adding envelopes to the messages pool. At this moment no sanity checks are being performed.
|
|
func (self *Whisper) add(envelope *Envelope) error {
|
|
if !envelope.valid() {
|
|
return errors.New("invalid pow provided for envelope")
|
|
}
|
|
|
|
self.mmu.Lock()
|
|
defer self.mmu.Unlock()
|
|
|
|
hash := envelope.Hash()
|
|
self.messages[hash] = envelope
|
|
if self.expiry[envelope.Expiry] == nil {
|
|
self.expiry[envelope.Expiry] = set.NewNonTS()
|
|
}
|
|
|
|
if !self.expiry[envelope.Expiry].Has(hash) {
|
|
self.expiry[envelope.Expiry].Add(hash)
|
|
self.postEvent(envelope)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (self *Whisper) update() {
|
|
expire := time.NewTicker(800 * time.Millisecond)
|
|
out:
|
|
for {
|
|
select {
|
|
case <-expire.C:
|
|
self.expire()
|
|
case <-self.quit:
|
|
break out
|
|
}
|
|
}
|
|
}
|
|
|
|
func (self *Whisper) expire() {
|
|
self.mmu.Lock()
|
|
defer self.mmu.Unlock()
|
|
|
|
now := uint32(time.Now().Unix())
|
|
for then, hashSet := range self.expiry {
|
|
if then > now {
|
|
continue
|
|
}
|
|
|
|
hashSet.Each(func(v interface{}) bool {
|
|
delete(self.messages, v.(Hash))
|
|
return true
|
|
})
|
|
self.expiry[then].Clear()
|
|
}
|
|
}
|
|
|
|
func (self *Whisper) envelopes() (envelopes []*Envelope) {
|
|
self.mmu.RLock()
|
|
defer self.mmu.RUnlock()
|
|
|
|
envelopes = make([]*Envelope, len(self.messages))
|
|
i := 0
|
|
for _, envelope := range self.messages {
|
|
envelopes[i] = envelope
|
|
i++
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func (self *Whisper) postEvent(envelope *Envelope) {
|
|
for _, key := range self.keys {
|
|
if message, err := envelope.Open(key); err == nil {
|
|
// Create a custom filter?
|
|
self.filters.Notify(filter.Generic{
|
|
Str1: string(crypto.FromECDSA(key)), Str2: string(crypto.FromECDSAPub(message.Recover())),
|
|
}, message)
|
|
} else {
|
|
fmt.Println(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (self *Whisper) Protocol() p2p.Protocol {
|
|
return self.protocol
|
|
}
|