mirror of https://github.com/libp2p/go-libp2p.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
186 lines
5.1 KiB
186 lines
5.1 KiB
// Package peer implements an object used to represent peers in the libp2p network.
|
|
package peer
|
|
|
|
import (
|
|
"encoding/hex"
|
|
"errors"
|
|
"fmt"
|
|
|
|
ic "github.com/libp2p/go-libp2p-core/crypto"
|
|
b58 "github.com/mr-tron/base58/base58"
|
|
mh "github.com/multiformats/go-multihash"
|
|
)
|
|
|
|
var (
|
|
// ErrEmptyPeerID is an error for empty peer ID.
|
|
ErrEmptyPeerID = errors.New("empty peer ID")
|
|
// ErrNoPublicKey is an error for peer IDs that don't embed public keys
|
|
ErrNoPublicKey = errors.New("public key is not embedded in peer ID")
|
|
)
|
|
|
|
// AdvancedEnableInlining enables automatically inlining keys shorter than
|
|
// 42 bytes into the peer ID (using the "identity" multihash function).
|
|
//
|
|
// WARNING: This flag will likely be set to false in the future and eventually
|
|
// be removed in favor of using a hash function specified by the key itself.
|
|
// See: https://github.com/libp2p/specs/issues/138
|
|
//
|
|
// DO NOT change this flag unless you know what you're doing.
|
|
//
|
|
// This currently defaults to true for backwards compatibility but will likely
|
|
// be set to false by default when an upgrade path is determined.
|
|
var AdvancedEnableInlining = true
|
|
|
|
const maxInlineKeyLength = 42
|
|
|
|
// ID is a libp2p peer identity.
|
|
//
|
|
// Peer IDs are derived by hashing a peer's public key and encoding the
|
|
// hash output as a multihash. See IDFromPublicKey for details.
|
|
type ID string
|
|
|
|
// Pretty returns a base58-encoded string representation of the ID.
|
|
func (id ID) Pretty() string {
|
|
return IDB58Encode(id)
|
|
}
|
|
|
|
// Loggable returns a pretty peer ID string in loggable JSON format.
|
|
func (id ID) Loggable() map[string]interface{} {
|
|
return map[string]interface{}{
|
|
"peerID": id.Pretty(),
|
|
}
|
|
}
|
|
|
|
func (id ID) String() string {
|
|
return id.Pretty()
|
|
}
|
|
|
|
// String prints out the peer ID.
|
|
//
|
|
// TODO(brian): ensure correctness at ID generation and
|
|
// enforce this by only exposing functions that generate
|
|
// IDs safely. Then any peer.ID type found in the
|
|
// codebase is known to be correct.
|
|
func (id ID) ShortString() string {
|
|
pid := id.Pretty()
|
|
if len(pid) <= 10 {
|
|
return fmt.Sprintf("<peer.ID %s>", pid)
|
|
}
|
|
return fmt.Sprintf("<peer.ID %s*%s>", pid[:2], pid[len(pid)-6:])
|
|
}
|
|
|
|
// MatchesPrivateKey tests whether this ID was derived from the secret key sk.
|
|
func (id ID) MatchesPrivateKey(sk ic.PrivKey) bool {
|
|
return id.MatchesPublicKey(sk.GetPublic())
|
|
}
|
|
|
|
// MatchesPublicKey tests whether this ID was derived from the public key pk.
|
|
func (id ID) MatchesPublicKey(pk ic.PubKey) bool {
|
|
oid, err := IDFromPublicKey(pk)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return oid == id
|
|
}
|
|
|
|
// ExtractPublicKey attempts to extract the public key from an ID
|
|
//
|
|
// This method returns ErrNoPublicKey if the peer ID looks valid but it can't extract
|
|
// the public key.
|
|
func (id ID) ExtractPublicKey() (ic.PubKey, error) {
|
|
decoded, err := mh.Decode([]byte(id))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if decoded.Code != mh.ID {
|
|
return nil, ErrNoPublicKey
|
|
}
|
|
pk, err := ic.UnmarshalPublicKey(decoded.Digest)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return pk, nil
|
|
}
|
|
|
|
// Validate checks if ID is empty or not.
|
|
func (id ID) Validate() error {
|
|
if id == ID("") {
|
|
return ErrEmptyPeerID
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// IDFromString casts a string to the ID type, and validates
|
|
// the value to make sure it is a multihash.
|
|
func IDFromString(s string) (ID, error) {
|
|
if _, err := mh.Cast([]byte(s)); err != nil {
|
|
return ID(""), err
|
|
}
|
|
return ID(s), nil
|
|
}
|
|
|
|
// IDFromBytes casts a byte slice to the ID type, and validates
|
|
// the value to make sure it is a multihash.
|
|
func IDFromBytes(b []byte) (ID, error) {
|
|
if _, err := mh.Cast(b); err != nil {
|
|
return ID(""), err
|
|
}
|
|
return ID(b), nil
|
|
}
|
|
|
|
// IDB58Decode accepts a base58-encoded multihash representing a peer ID
|
|
// and returns the decoded ID if the input is valid.
|
|
func IDB58Decode(s string) (ID, error) {
|
|
m, err := mh.FromB58String(s)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return ID(m), err
|
|
}
|
|
|
|
// IDB58Encode returns the base58-encoded multihash representation of the ID.
|
|
func IDB58Encode(id ID) string {
|
|
return b58.Encode([]byte(id))
|
|
}
|
|
|
|
// IDHexDecode accepts a hex-encoded multihash representing a peer ID
|
|
// and returns the decoded ID if the input is valid.
|
|
func IDHexDecode(s string) (ID, error) {
|
|
m, err := mh.FromHexString(s)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return ID(m), err
|
|
}
|
|
|
|
// IDHexEncode returns the hex-encoded multihash representation of the ID.
|
|
func IDHexEncode(id ID) string {
|
|
return hex.EncodeToString([]byte(id))
|
|
}
|
|
|
|
// IDFromPublicKey returns the Peer ID corresponding to the public key pk.
|
|
func IDFromPublicKey(pk ic.PubKey) (ID, error) {
|
|
b, err := pk.Bytes()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
var alg uint64 = mh.SHA2_256
|
|
if AdvancedEnableInlining && len(b) <= maxInlineKeyLength {
|
|
alg = mh.ID
|
|
}
|
|
hash, _ := mh.Sum(b, alg, -1)
|
|
return ID(hash), nil
|
|
}
|
|
|
|
// IDFromPrivateKey returns the Peer ID corresponding to the secret key sk.
|
|
func IDFromPrivateKey(sk ic.PrivKey) (ID, error) {
|
|
return IDFromPublicKey(sk.GetPublic())
|
|
}
|
|
|
|
// IDSlice for sorting peers
|
|
type IDSlice []ID
|
|
|
|
func (es IDSlice) Len() int { return len(es) }
|
|
func (es IDSlice) Swap(i, j int) { es[i], es[j] = es[j], es[i] }
|
|
func (es IDSlice) Less(i, j int) bool { return string(es[i]) < string(es[j]) }
|
|
|