implementation

This commit is contained in:
Tiago Batista Cardoso
2026-01-15 22:01:48 +01:00
committed by TIBERGHIEN corentin
parent 003d55bd75
commit 60145f279a
5 changed files with 181 additions and 95 deletions

View File

@@ -380,7 +380,7 @@ impl eframe::App for P2PClientApp {
{ {
//todo!(); //todo!();
let _ = self.network_cmd_tx.send(NetworkCommand::Discover( let _ = self.network_cmd_tx.send(NetworkCommand::Discover(
peer.clone(), peer.0.clone(),
"root".to_string(), "root".to_string(),
self.connected_address.clone(), self.connected_address.clone(),
)); ));
@@ -405,10 +405,29 @@ impl eframe::App for P2PClientApp {
} }
_ => {} _ => {}
} }
if ui.button("Send Ping").clicked() {
let res = self
.network_cmd_tx
.send(NetworkCommand::Ping(peer.0.to_string()));
}
if ui.button("Send Nat Traversal Request").clicked() {
match self.network_cmd_tx.send(NetworkCommand::NatTraversal(
peer.0.to_string(),
self.connected_address.clone(),
)) {
Ok(_) => {
print!("[+] successfully sent nat traversal request")
}
Err(_) => {
print!("[-] failed to send nat traversal request")
}
}
}
if ui.button("Infos").clicked() { if ui.button("Infos").clicked() {
// action 3 // action 3
ui.close(); ui.close();
} }
// ... autres boutons // ... autres boutons
}); });
} }

View File

@@ -12,22 +12,18 @@ use crate::{
cryptographic_signature::CryptographicSignature, cryptographic_signature::CryptographicSignature,
message_handling::EventType, message_handling::EventType,
messages_channels::{MultipleSenders, start_receving_thread}, messages_channels::{MultipleSenders, start_receving_thread},
messages_structure::{ROOTREQUEST, construct_message}, messages_structure::{
peers_refresh::HandshakeHistory, NATTRAVERSALREQUEST, NATTRAVERSALREQUEST2, ROOTREQUEST, construct_message,
registration::{
get_socket_address, parse_addresses, perform_handshake, register_with_the_server,
}, },
peers_refresh::HandshakeHistory,
registration::{parse_addresses, perform_handshake, register_with_the_server},
server_communication::{generate_id, get_peer_list}, server_communication::{generate_id, get_peer_list},
}; };
use std::{io::Error, net::UdpSocket};
use std::{ use std::{
fmt, net::SocketAddr,
sync::{Arc, Mutex}, sync::{Arc, Mutex},
}; };
use std::{
io::Error,
net::{SocketAddr, UdpSocket},
str::FromStr,
};
pub struct P2PSharedData { pub struct P2PSharedData {
shared_socket: Arc<UdpSocket>, shared_socket: Arc<UdpSocket>,
@@ -38,6 +34,8 @@ pub struct P2PSharedData {
handshake_peers: Arc<HandshakeHistory>, handshake_peers: Arc<HandshakeHistory>,
} }
use bytes::Bytes;
impl P2PSharedData { impl P2PSharedData {
pub fn new( pub fn new(
username: String, username: String,
@@ -116,9 +114,10 @@ pub enum NetworkCommand {
ServerHandshake(String, String), // ServerName ServerHandshake(String, String), // ServerName
FetchPeerList(String), // ServerIP FetchPeerList(String), // ServerIP
RegisterAsPeer(String), RegisterAsPeer(String),
Ping(), Ping(String),
ConnectPeer(String), // IP:PORT NatTraversal(String, String),
RequestFileTree(String), // peer_id ConnectPeer((String, bool)), // IP:PORT
RequestFileTree(String), // peer_id
RequestDirectoryContent(String, String), RequestDirectoryContent(String, String),
RequestChunk(String, String), RequestChunk(String, String),
Disconnect(), Disconnect(),
@@ -193,9 +192,9 @@ pub fn start_p2p_executor(
println!("no shared data"); println!("no shared data");
} }
} }
NetworkCommand::ConnectPeer(addr) => { NetworkCommand::ConnectPeer((username, connected)) => {
println!("[Network] ConnectPeer() called"); println!("[Network] ConnectPeer() called");
println!("[Network] Attempting to connect to: {}", addr); println!("[Network] Attempting to connect to: {}", username);
// Network logic to connect... // Network logic to connect...
// If successful, send an event back: // If successful, send an event back:
// event_tx.send(NetworkEvent::PeerConnected(addr)).unwrap(); // event_tx.send(NetworkEvent::PeerConnected(addr)).unwrap();
@@ -333,7 +332,7 @@ pub fn start_p2p_executor(
NetworkCommand::RegisterAsPeer(_) => { NetworkCommand::RegisterAsPeer(_) => {
println!("[Network] RegisterAsPeer() called"); println!("[Network] RegisterAsPeer() called");
} }
NetworkCommand::Ping() => { NetworkCommand::Ping(String) => {
println!("[Network] Ping() called"); println!("[Network] Ping() called");
} }
NetworkCommand::Disconnect() => { NetworkCommand::Disconnect() => {
@@ -352,6 +351,41 @@ pub fn start_p2p_executor(
println!("no p2p data"); println!("no p2p data");
} }
} }
NetworkCommand::NatTraversal(username, ip) => {
if let Some(sd) = shared_data.as_ref() {
println!("username:{}, ip:{}", username, ip);
// user server to send nattraversal request
let server_addr_query =
get_socket_address(sd.servername().clone(), ip.clone());
let peer_addr_query = get_socket_address(username.clone(), ip.clone());
match server_addr_query.await {
Some(server_addr) => {
let natreq = construct_message(
NATTRAVERSALREQUEST,
ip.to_string().into_bytes(),
8,
&sd.cryptopair(),
);
sd.senders_ref().send_via(
0,
natreq.expect(
"couldnt construct message nattraversalrequest2",
),
server_addr.to_string(),
false,
sd.messages_list_ref(),
);
}
None => {
let err_msg =
format!("failed to retreive socket address").to_string();
let res = event_tx.send(NetworkEvent::Error(err_msg));
}
}
}
}
} }
} }
@@ -365,3 +399,34 @@ pub fn start_p2p_executor(
} }
}) })
} }
///
/// sends a get request to the server to get the socket address of the given peer
///
pub async fn get_socket_address(username: String, ip: String) -> Option<SocketAddr> {
let client = reqwest::Client::new();
let uri = format!("{}/peers/{}/addresses", ip, username);
let res = client.get(uri).send().await.expect("couldnt get response");
if res.status().is_success() {
println!("Successfully retreived the addresses.");
} else {
eprintln!(
"Failed to get the peers addresses from the server. Status: {}",
res.status()
);
}
let body: Bytes = res.bytes().await.expect("couldnt get bytes");
match String::from_utf8(body.to_vec()) {
Ok(s) => {
let addresses = parse_addresses(&s);
if let Some(first) = addresses.first() {
Some(first.clone())
} else {
None
}
}
Err(_) => None,
}
}

View File

@@ -79,6 +79,7 @@ pub fn handle_recevied_message(
ip, ip,
messages_list, messages_list,
handhsake_history, handhsake_history,
senders,
); );
match resp { match resp {
@@ -169,6 +170,7 @@ pub fn parse_message(
ip: SocketAddr, ip: SocketAddr,
messages_list: &Arc<Mutex<HashMap<i32, EventType>>>, messages_list: &Arc<Mutex<HashMap<i32, EventType>>>,
handhsake_history_mutex: &Arc<Mutex<HandshakeHistory>>, handhsake_history_mutex: &Arc<Mutex<HandshakeHistory>>,
senders: &MultipleSenders,
) -> Option<Vec<u8>> { ) -> Option<Vec<u8>> {
let mut handhsake_history = handhsake_history_mutex.lock().unwrap(); let mut handhsake_history = handhsake_history_mutex.lock().unwrap();
let cmd_tx_clone = cmd_tx.clone(); let cmd_tx_clone = cmd_tx.clone();
@@ -258,6 +260,50 @@ pub fn parse_message(
// //
// rien ? // rien ?
// si NATTRAVERSALREQUEST alors // si NATTRAVERSALREQUEST alors
NATTRAVERSALREQUEST => {
// send ok & send nattraversalrequest2 to peer
constructed_message = construct_message(OK, Vec::new(), id, crypto_pair);
let ilength = u16::from_be_bytes(length_bytes);
let received_address =
&received_message[LENGTH + EXTENSIONS..LENGTH + ilength as usize];
let address = String::from_utf8(received_address.to_vec()).expect("wrong name");
let natreq2 = construct_message(
NATTRAVERSALREQUEST2,
ip.to_string().into_bytes(),
id,
crypto_pair,
);
senders.send_via(
0,
natreq2.expect("couldnt construct message nattraversalrequest2"),
address,
false,
&messages_list,
);
}
NATTRAVERSALREQUEST2 => {
// send ok & send ping to peer
constructed_message = construct_message(OK, Vec::new(), id, crypto_pair);
let ilength = u16::from_be_bytes(length_bytes);
let received_address =
&received_message[LENGTH + EXTENSIONS..LENGTH + ilength as usize];
let address = String::from_utf8(received_address.to_vec()).expect("wrong name");
let pingreq = construct_message(PING, Vec::new(), id, crypto_pair);
senders.send_via(
0,
pingreq.expect("couldnt construct message ping request"),
address,
false,
&messages_list,
);
}
// //
// ERROR // ERROR
// //

View File

@@ -1,7 +1,4 @@
use crate::{ use crate::cryptographic_signature::{CryptographicSignature, sign_message};
cryptographic_signature::{CryptographicSignature, sign_message},
server_communication::generate_id,
};
const ID: usize = 4; const ID: usize = 4;
const TYPE: usize = 5; const TYPE: usize = 5;
@@ -9,18 +6,18 @@ const LENGTH: usize = 7;
const EXTENSIONS: usize = 4; const EXTENSIONS: usize = 4;
const SIGNATURE: usize = 64; const SIGNATURE: usize = 64;
const PING: u8 = 0; pub(crate) const PING: u8 = 0;
const OK: u8 = 128; pub(crate) const OK: u8 = 128;
const ERROR: u8 = 129; pub(crate) const ERROR: u8 = 129;
const HELLO: u8 = 1; pub(crate) const HELLO: u8 = 1;
const HELLOREPLY: u8 = 130; pub(crate) const HELLOREPLY: u8 = 130;
pub const ROOTREQUEST: u8 = 2; pub(crate) const ROOTREQUEST: u8 = 2;
const ROOTREPLY: u8 = 131; pub(crate) const ROOTREPLY: u8 = 131;
const DATUMREQUEST: u8 = 3; pub(crate) const DATUMREQUEST: u8 = 3;
const NODATUM: u8 = 133; pub(crate) const NODATUM: u8 = 133;
const DATUM: u8 = 132; pub(crate) const DATUM: u8 = 132;
const NATTRAVERSALREQUEST: u8 = 4; pub(crate) const NATTRAVERSALREQUEST: u8 = 4;
const NATTRAVERSALREQUEST2: u8 = 5; pub(crate) const NATTRAVERSALREQUEST2: u8 = 5;
pub fn construct_message( pub fn construct_message(
msgtype: u8, msgtype: u8,

View File

@@ -1,11 +1,11 @@
use bytes::Bytes; use bytes::Bytes;
use getrandom::Error;
use crate::NetworkEvent; use crate::NetworkEvent;
use crate::P2PSharedData; use crate::P2PSharedData;
use crate::cryptographic_signature::{CryptographicSignature, formatPubKey, sign_message}; use crate::cryptographic_signature::{CryptographicSignature, formatPubKey, sign_message};
use crate::get_socket_address;
use crate::message_handling::EventType; use crate::message_handling::EventType;
use crate::messages_channels::{Message, MultipleSenders}; use crate::messages_channels::MultipleSenders;
use crate::messages_structure::construct_message; use crate::messages_structure::construct_message;
use crate::server_communication::generate_id; use crate::server_communication::generate_id;
use crossbeam_channel::{Receiver, Sender}; use crossbeam_channel::{Receiver, Sender};
@@ -33,26 +33,6 @@ pub async fn register_with_the_server(
Ok(()) Ok(())
} }
///
/// sends a get request to the server to get the socket address of the given peer
///
pub async fn get_socket_address(username: String, ip: String) -> Result<Bytes, reqwest::Error> {
let client = reqwest::Client::new();
let uri = format!("{}/peers/{}/addresses", ip, username);
let res = client.get(uri).send().await?;
if res.status().is_success() {
println!("Successfully retreived the addresses.");
} else {
eprintln!(
"Failed to get the peers addresses from the server. Status: {}",
res.status()
);
}
let body: Bytes = res.bytes().await?;
Ok(body)
}
pub fn parse_addresses(input: &String) -> Vec<SocketAddr> { pub fn parse_addresses(input: &String) -> Vec<SocketAddr> {
let mut addrs = Vec::new(); let mut addrs = Vec::new();
for line in input.lines() { for line in input.lines() {
@@ -84,49 +64,28 @@ pub async fn perform_handshake(
let id = generate_id(); let id = generate_id();
let server_addr_query = get_socket_address(username.clone(), ip.clone()); let server_addr_query = get_socket_address(username.clone(), ip.clone());
match server_addr_query.await { match server_addr_query.await {
Ok(sockaddr_bytes) => { Some(sockaddr_bytes) => {
match String::from_utf8(sockaddr_bytes.to_vec()) { sd.set_servername(username);
Ok(s) => { // first: &SocketAddr
let addresses = parse_addresses(&s); let mut payload = Vec::new();
if let Some(first) = addresses.first() { payload.extend_from_slice(&0u32.to_be_bytes());
sd.set_servername(username); payload.extend_from_slice(&crypto_pair.username.clone().as_bytes());
// first: &SocketAddr let hello_handshake = construct_message(1, payload, id, crypto_pair);
let mut payload = Vec::new(); match hello_handshake {
payload.extend_from_slice(&0u32.to_be_bytes()); Some(handshake_message) => {
payload.extend_from_slice(&crypto_pair.username.clone().as_bytes()); senders.send_via(
let hello_handshake = construct_message(1, payload, id, crypto_pair); 0,
match hello_handshake { handshake_message,
Some(handshake_message) => { sockaddr_bytes.to_string(),
senders.send_via( is_server_handshake,
0, messages_list,
handshake_message, );
first.to_string(),
is_server_handshake,
messages_list,
);
}
None => {}
}
//let res = event_tx
// .send(NetworkEvent::());
} else {
//let res = event_tx.send(NetworkEvent::Error());
let err_msg =
format!("no valid socket addresses found in: {}", s).to_string();
let res = event_tx.send(NetworkEvent::Error(err_msg));
}
}
Err(e) => {
//let res = event_tx.send(NetworkEvent::Error());
let err_msg =
format!("invalid UTF-8 in socket address bytes: {}", e).to_string();
let res = event_tx.send(NetworkEvent::Error(err_msg));
} }
None => {}
} }
} }
Err(e) => { None => {
let err_msg = format!("failed to retreive socket address: {}", e).to_string(); let err_msg = format!("failed to retreive socket address:").to_string();
let res = event_tx.send(NetworkEvent::Error(err_msg)); let res = event_tx.send(NetworkEvent::Error(err_msg));
} }
} }