openethereum/util/src/network/host.rs

982 lines
32 KiB
Rust
Raw Normal View History

2016-02-05 13:40:41 +01:00
// Copyright 2015, 2016 Ethcore (UK) Ltd.
// This file is part of Parity.
// Parity is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
2016-02-16 02:05:36 +01:00
use std::net::{SocketAddr};
use std::collections::{HashMap};
use std::hash::{Hasher};
2015-11-29 11:50:28 +01:00
use std::str::{FromStr};
2016-01-21 16:48:37 +01:00
use std::sync::*;
use std::ops::*;
use std::cmp::min;
2016-02-15 18:36:34 +01:00
use std::path::{Path, PathBuf};
use std::io::{Read, Write};
use std::fs;
2015-11-29 11:50:28 +01:00
use mio::*;
use mio::tcp::*;
2016-02-01 17:57:22 +01:00
use target_info::Target;
2015-11-29 11:50:28 +01:00
use hash::*;
use crypto::*;
2016-01-09 10:27:41 +01:00
use sha3::Hashable;
2015-12-02 20:11:13 +01:00
use rlp::*;
use network::handshake::Handshake;
2015-12-17 11:42:30 +01:00
use network::session::{Session, SessionData};
use error::*;
use io::*;
2016-02-13 22:57:39 +01:00
use network::{NetworkProtocolHandler, PROTOCOL_VERSION};
2016-02-14 01:03:48 +01:00
use network::node_table::*;
2016-01-24 18:53:54 +01:00
use network::stats::NetworkStats;
2016-02-02 14:54:46 +01:00
use network::error::DisconnectReason;
2016-02-13 22:57:39 +01:00
use network::discovery::{Discovery, TableUpdates, NodeEntry};
2016-02-16 02:05:36 +01:00
use network::ip_utils::{map_external_address, select_public_address};
2016-01-15 00:50:48 +01:00
type Slab<T> = ::slab::Slab<T, usize>;
2015-11-29 11:50:28 +01:00
2016-01-04 13:49:32 +01:00
const _DEFAULT_PORT: u16 = 30304;
const MAX_SESSIONS: usize = 1024;
const MAX_HANDSHAKES: usize = 64;
const MAX_HANDSHAKES_PER_ROUND: usize = 8;
2016-01-14 16:52:10 +01:00
const MAINTENANCE_TIMEOUT: u64 = 1000;
2015-11-29 11:50:28 +01:00
#[derive(Debug)]
2016-01-23 02:36:58 +01:00
/// Network service configuration
pub struct NetworkConfiguration {
2016-02-12 09:52:32 +01:00
/// Directory path to store network configuration. None means nothing will be saved
pub config_path: Option<String>,
2016-02-16 02:05:36 +01:00
/// IP address to listen for incoming connections. Listen to all connections by default
pub listen_address: Option<SocketAddr>,
/// IP address to advertise. Detected automatically if none.
pub public_address: Option<SocketAddr>,
/// Port for UDP connections, same as TCP by default
pub udp_port: Option<u16>,
2016-01-23 02:36:58 +01:00
/// Enable NAT configuration
pub nat_enabled: bool,
/// Enable discovery
pub discovery_enabled: bool,
/// Pin to boot nodes only
pub pin: bool,
/// List of initial node addresses
pub boot_nodes: Vec<String>,
2016-01-24 18:53:54 +01:00
/// Use provided node key instead of default
pub use_secret: Option<Secret>,
2016-02-13 22:57:39 +01:00
/// Number of connected peers to maintain
pub ideal_peers: u32,
2015-11-29 11:50:28 +01:00
}
impl NetworkConfiguration {
2016-01-23 02:36:58 +01:00
/// Create a new instance of default settings.
pub fn new() -> NetworkConfiguration {
2016-01-08 13:49:00 +01:00
NetworkConfiguration {
2016-02-12 09:52:32 +01:00
config_path: None,
2016-02-16 02:05:36 +01:00
listen_address: None,
public_address: None,
udp_port: None,
2016-01-08 13:49:00 +01:00
nat_enabled: true,
discovery_enabled: true,
pin: false,
boot_nodes: Vec::new(),
2016-01-24 18:53:54 +01:00
use_secret: None,
2016-02-14 17:42:03 +01:00
ideal_peers: 25,
2016-01-08 13:49:00 +01:00
}
}
2016-01-24 18:53:54 +01:00
/// Create new default configuration with sepcified listen port.
pub fn new_with_port(port: u16) -> NetworkConfiguration {
let mut config = NetworkConfiguration::new();
2016-02-16 02:05:36 +01:00
config.listen_address = Some(SocketAddr::from_str(&format!("0.0.0.0:{}", port)).unwrap());
2016-01-24 18:53:54 +01:00
config
}
2015-11-29 11:50:28 +01:00
}
// Tokens
const TCP_ACCEPT: usize = LAST_HANDSHAKE + 1;
const IDLE: usize = LAST_HANDSHAKE + 2;
const DISCOVERY: usize = LAST_HANDSHAKE + 3;
const DISCOVERY_REFRESH: usize = LAST_HANDSHAKE + 4;
const DISCOVERY_ROUND: usize = LAST_HANDSHAKE + 5;
const FIRST_SESSION: usize = 0;
const LAST_SESSION: usize = FIRST_SESSION + MAX_SESSIONS - 1;
const FIRST_HANDSHAKE: usize = LAST_SESSION + 1;
const LAST_HANDSHAKE: usize = FIRST_HANDSHAKE + MAX_HANDSHAKES - 1;
const USER_TIMER: usize = LAST_HANDSHAKE + 256;
2015-12-17 11:42:30 +01:00
2016-01-10 22:42:27 +01:00
/// Protocol handler level packet id
2015-12-22 22:23:43 +01:00
pub type PacketId = u8;
2016-01-10 22:42:27 +01:00
/// Protocol / handler id
2015-12-17 11:42:30 +01:00
pub type ProtocolId = &'static str;
2015-11-29 11:50:28 +01:00
2016-01-10 22:42:27 +01:00
/// Messages used to communitate with the event loop from other threads.
2016-01-21 16:48:37 +01:00
#[derive(Clone)]
pub enum NetworkIoMessage<Message> where Message: Send + Sync + Clone {
2016-01-10 22:42:27 +01:00
/// Register a new protocol handler.
2015-12-17 11:42:30 +01:00
AddHandler {
/// Handler shared instance.
2016-01-21 16:48:37 +01:00
handler: Arc<NetworkProtocolHandler<Message> + Sync>,
/// Protocol Id.
2015-12-17 11:42:30 +01:00
protocol: ProtocolId,
/// Supported protocol versions.
2015-12-17 11:42:30 +01:00
versions: Vec<u8>,
},
/// Register a new protocol timer
2016-01-21 16:48:37 +01:00
AddTimer {
/// Protocol Id.
2016-01-21 16:48:37 +01:00
protocol: ProtocolId,
/// Timer token.
2016-01-21 16:48:37 +01:00
token: TimerToken,
/// Timer delay in milliseconds.
2016-01-21 16:48:37 +01:00
delay: u64,
},
2016-02-02 14:54:46 +01:00
/// Disconnect a peer
2016-02-02 21:10:16 +01:00
Disconnect(PeerId),
/// User message
2016-01-13 23:13:57 +01:00
User(Message),
2015-11-29 11:50:28 +01:00
}
2016-01-10 22:42:27 +01:00
/// Local (temporary) peer session ID.
2015-12-22 22:23:43 +01:00
pub type PeerId = usize;
2015-12-17 11:42:30 +01:00
2015-12-02 20:11:13 +01:00
#[derive(Debug, PartialEq, Eq)]
2016-01-10 22:42:27 +01:00
/// Protocol info
2015-12-02 20:11:13 +01:00
pub struct CapabilityInfo {
2015-12-17 11:42:30 +01:00
pub protocol: ProtocolId,
pub version: u8,
2016-01-10 22:42:27 +01:00
/// Total number of packet IDs this protocol support.
2015-12-17 11:42:30 +01:00
pub packet_count: u8,
2015-12-02 20:11:13 +01:00
}
impl Encodable for CapabilityInfo {
2016-01-27 12:14:57 +01:00
fn rlp_append(&self, s: &mut RlpStream) {
s.begin_list(2);
s.append(&self.protocol);
s.append(&self.version);
2015-12-02 20:11:13 +01:00
}
}
2016-01-10 22:42:27 +01:00
/// IO access point. This is passed to all IO handlers and provides an interface to the IO subsystem.
2016-01-21 16:48:37 +01:00
pub struct NetworkContext<'s, Message> where Message: Send + Sync + Clone + 'static, 's {
io: &'s IoContext<NetworkIoMessage<Message>>,
2016-01-13 13:56:48 +01:00
protocol: ProtocolId,
sessions: Arc<RwLock<Slab<SharedSession>>>,
session: Option<StreamToken>,
2015-12-17 11:42:30 +01:00
}
2016-01-21 16:48:37 +01:00
impl<'s, Message> NetworkContext<'s, Message> where Message: Send + Sync + Clone + 'static, {
/// Create a new network IO access point. Takes references to all the data that can be updated within the IO handler.
2016-01-21 16:48:37 +01:00
fn new(io: &'s IoContext<NetworkIoMessage<Message>>,
2016-01-13 13:56:48 +01:00
protocol: ProtocolId,
session: Option<StreamToken>, sessions: Arc<RwLock<Slab<SharedSession>>>) -> NetworkContext<'s, Message> {
NetworkContext {
io: io,
2015-12-17 11:42:30 +01:00
protocol: protocol,
session: session,
sessions: sessions,
2015-12-17 11:42:30 +01:00
}
}
2015-12-30 12:23:36 +01:00
/// Send a packet over the network to another peer.
2016-01-21 16:48:37 +01:00
pub fn send(&self, peer: PeerId, packet_id: PacketId, data: Vec<u8>) -> Result<(), UtilError> {
let session = { self.sessions.read().unwrap().get(peer).cloned() };
if let Some(session) = session {
session.lock().unwrap().deref_mut().send_packet(self.protocol, packet_id as u8, &data).unwrap_or_else(|e| {
2016-01-21 16:48:37 +01:00
warn!(target: "net", "Send error: {:?}", e);
}); //TODO: don't copy vector data
try!(self.io.update_registration(peer));
2016-01-21 16:48:37 +01:00
} else {
2016-02-14 01:03:48 +01:00
trace!(target: "net", "Send: Peer no longer exist")
2015-12-22 22:23:43 +01:00
}
2015-12-17 11:42:30 +01:00
Ok(())
}
2015-12-30 12:23:36 +01:00
/// Respond to a current network message. Panics if no there is no packet in the context.
2016-01-21 16:48:37 +01:00
pub fn respond(&self, packet_id: PacketId, data: Vec<u8>) -> Result<(), UtilError> {
2015-12-22 22:23:43 +01:00
match self.session {
Some(session) => self.send(session, packet_id, data),
2015-12-17 11:42:30 +01:00
None => {
panic!("Respond: Session does not exist")
}
}
}
2015-12-30 12:23:36 +01:00
/// Disable current protocol capability for given peer. If no capabilities left peer gets disconnected.
2016-02-02 14:54:46 +01:00
pub fn disable_peer(&self, peer: PeerId) {
2015-12-22 22:23:43 +01:00
//TODO: remove capability, disconnect if no capabilities left
2016-02-02 14:54:46 +01:00
self.disconnect_peer(peer);
}
/// Disconnect peer. Reconnect can be attempted later.
pub fn disconnect_peer(&self, peer: PeerId) {
2016-02-02 21:10:16 +01:00
self.io.message(NetworkIoMessage::Disconnect(peer));
2015-12-02 20:11:13 +01:00
}
2015-12-28 11:41:51 +01:00
2016-01-21 16:48:37 +01:00
/// Register a new IO timer. 'IoHandler::timeout' will be called with the token.
pub fn register_timer(&self, token: TimerToken, ms: u64) -> Result<(), UtilError> {
self.io.message(NetworkIoMessage::AddTimer {
token: token,
delay: ms,
protocol: self.protocol,
});
Ok(())
}
2016-01-14 16:52:10 +01:00
/// Returns peer identification string
pub fn peer_info(&self, peer: PeerId) -> String {
let session = { self.sessions.read().unwrap().get(peer).cloned() };
if let Some(session) = session {
return session.lock().unwrap().info.client_version.clone()
2016-01-14 16:52:10 +01:00
}
"unknown".to_owned()
2016-01-14 16:52:10 +01:00
}
2015-12-17 11:42:30 +01:00
}
2016-01-10 22:42:27 +01:00
/// Shared host information
pub struct HostInfo {
2016-01-10 22:42:27 +01:00
/// Our private and public keys.
2016-01-08 13:49:00 +01:00
keys: KeyPair,
2016-01-10 22:42:27 +01:00
/// Current network configuration
2016-01-08 13:49:00 +01:00
config: NetworkConfiguration,
2016-01-10 22:42:27 +01:00
/// Connection nonce.
2015-12-02 20:11:13 +01:00
nonce: H256,
2016-01-10 22:42:27 +01:00
/// RLPx protocol version
2015-12-02 20:11:13 +01:00
pub protocol_version: u32,
2016-01-10 22:42:27 +01:00
/// Client identifier
2015-12-02 20:11:13 +01:00
pub client_version: String,
2016-01-10 22:42:27 +01:00
/// TCP connection port.
2015-12-02 20:11:13 +01:00
pub listen_port: u16,
2016-01-10 22:42:27 +01:00
/// Registered capabilities (handlers)
2015-12-02 20:11:13 +01:00
pub capabilities: Vec<CapabilityInfo>
}
impl HostInfo {
2016-01-10 22:42:27 +01:00
/// Returns public key
pub fn id(&self) -> &NodeId {
self.keys.public()
}
2016-01-10 22:42:27 +01:00
/// Returns secret key
pub fn secret(&self) -> &Secret {
self.keys.secret()
}
2016-01-10 22:42:27 +01:00
/// Increments and returns connection nonce.
pub fn next_nonce(&mut self) -> H256 {
self.nonce = self.nonce.sha3();
2016-01-19 12:14:29 +01:00
self.nonce.clone()
}
}
type SharedSession = Arc<Mutex<Session>>;
type SharedHandshake = Arc<Mutex<Handshake>>;
2016-01-21 16:48:37 +01:00
#[derive(Copy, Clone)]
struct ProtocolTimer {
pub protocol: ProtocolId,
pub token: TimerToken, // Handler level token
}
2016-01-10 22:42:27 +01:00
/// Root IO handler. Manages protocol handlers, IO timers and network connections.
2016-01-21 16:48:37 +01:00
pub struct Host<Message> where Message: Send + Sync + Clone {
pub info: RwLock<HostInfo>,
tcp_listener: Mutex<TcpListener>,
handshakes: Arc<RwLock<Slab<SharedHandshake>>>,
sessions: Arc<RwLock<Slab<SharedSession>>>,
discovery: Option<Mutex<Discovery>>,
2016-02-12 09:52:32 +01:00
nodes: RwLock<NodeTable>,
2016-01-21 16:48:37 +01:00
handlers: RwLock<HashMap<ProtocolId, Arc<NetworkProtocolHandler<Message>>>>,
timers: RwLock<HashMap<TimerToken, ProtocolTimer>>,
timer_counter: RwLock<usize>,
2016-01-24 18:53:54 +01:00
stats: Arc<NetworkStats>,
2016-02-16 02:05:36 +01:00
public_endpoint: NodeEndpoint,
pinned_nodes: Vec<NodeId>,
2015-11-29 11:50:28 +01:00
}
2016-01-21 16:48:37 +01:00
impl<Message> Host<Message> where Message: Send + Sync + Clone {
2016-01-23 02:36:58 +01:00
/// Create a new instance
pub fn new(config: NetworkConfiguration) -> Host<Message> {
2016-02-16 02:05:36 +01:00
let listen_address = match config.listen_address {
None => SocketAddr::from_str("0.0.0.0:30304").unwrap(),
Some(addr) => addr,
};
let udp_port = config.udp_port.unwrap_or(listen_address.port());
let public_endpoint = match config.public_address {
None => {
let public_address = select_public_address(listen_address.port());
let local_endpoint = NodeEndpoint { address: public_address, udp_port: udp_port };
if config.nat_enabled {
match map_external_address(&local_endpoint) {
Some(endpoint) => {
info!("NAT Mappped to external address {}", endpoint.address);
endpoint
},
None => local_endpoint
}
} else {
local_endpoint
}
}
Some(addr) => NodeEndpoint { address: addr, udp_port: udp_port }
};
2016-02-10 16:45:54 +01:00
2016-01-08 13:49:00 +01:00
// Setup the server socket
2016-02-16 02:05:36 +01:00
let tcp_listener = TcpListener::bind(&listen_address).unwrap();
2016-02-15 18:36:34 +01:00
let keys = if let Some(ref secret) = config.use_secret {
KeyPair::from_secret(secret.clone()).unwrap()
} else {
config.config_path.clone().and_then(|ref p| load_key(&Path::new(&p)))
.map_or_else(|| {
let key = KeyPair::create().unwrap();
if let Some(path) = config.config_path.clone() {
save_key(&Path::new(&path), &key.secret());
}
key
},
|s| KeyPair::from_secret(s).expect("Error creating node secret key"))
};
let discovery = if config.discovery_enabled && !config.pin {
Some(Discovery::new(&keys, listen_address.clone(), public_endpoint.clone(), DISCOVERY))
} else { None };
2016-02-12 09:52:32 +01:00
let path = config.config_path.clone();
2016-01-21 16:48:37 +01:00
let mut host = Host::<Message> {
info: RwLock::new(HostInfo {
2016-02-12 09:52:32 +01:00
keys: keys,
config: config,
2015-12-02 20:11:13 +01:00
nonce: H256::random(),
2016-02-13 22:57:39 +01:00
protocol_version: PROTOCOL_VERSION,
2016-02-01 17:57:22 +01:00
client_version: format!("Parity/{}/{}-{}-{}", env!("CARGO_PKG_VERSION"), Target::arch(), Target::env(), Target::os()),
listen_port: 0,
2015-12-17 11:42:30 +01:00
capabilities: Vec::new(),
2016-01-21 16:48:37 +01:00
}),
discovery: discovery.map(Mutex::new),
2016-01-21 16:48:37 +01:00
tcp_listener: Mutex::new(tcp_listener),
handshakes: Arc::new(RwLock::new(Slab::new_starting_at(FIRST_HANDSHAKE, MAX_HANDSHAKES))),
sessions: Arc::new(RwLock::new(Slab::new_starting_at(FIRST_SESSION, MAX_SESSIONS))),
2016-02-12 09:52:32 +01:00
nodes: RwLock::new(NodeTable::new(path)),
2016-01-21 16:48:37 +01:00
handlers: RwLock::new(HashMap::new()),
timers: RwLock::new(HashMap::new()),
timer_counter: RwLock::new(USER_TIMER),
2016-01-24 18:53:54 +01:00
stats: Arc::new(NetworkStats::default()),
2016-02-16 02:05:36 +01:00
public_endpoint: public_endpoint,
pinned_nodes: Vec::new(),
2016-01-21 16:48:37 +01:00
};
2016-02-16 02:05:36 +01:00
let port = listen_address.port();
2016-01-21 16:48:37 +01:00
host.info.write().unwrap().deref_mut().listen_port = port;
2016-01-23 02:36:58 +01:00
let boot_nodes = host.info.read().unwrap().config.boot_nodes.clone();
for n in boot_nodes {
host.add_node(&n);
2016-01-23 02:36:58 +01:00
}
if let Some(ref mut discovery) = host.discovery {
discovery.lock().unwrap().init_node_list(host.nodes.read().unwrap().unordered_entries());
}
2016-01-21 16:48:37 +01:00
host
2016-01-08 13:49:00 +01:00
}
2015-11-29 11:50:28 +01:00
2016-01-24 18:53:54 +01:00
pub fn stats(&self) -> Arc<NetworkStats> {
self.stats.clone()
}
2016-01-21 16:48:37 +01:00
pub fn add_node(&mut self, id: &str) {
2015-11-29 11:50:28 +01:00
match Node::from_str(id) {
Err(e) => { warn!("Could not add node: {:?}", e); },
2015-12-02 12:07:46 +01:00
Ok(n) => {
2016-02-13 22:57:39 +01:00
let entry = NodeEntry { endpoint: n.endpoint.clone(), id: n.id.clone() };
self.pinned_nodes.push(n.id.clone());
2016-02-12 09:52:32 +01:00
self.nodes.write().unwrap().add_node(n);
if let Some(ref mut discovery) = self.discovery {
discovery.lock().unwrap().add_node(entry);
}
2015-12-02 12:07:46 +01:00
}
2015-11-29 11:50:28 +01:00
}
}
2016-01-21 16:48:37 +01:00
pub fn client_version(&self) -> String {
self.info.read().unwrap().client_version.clone()
}
2016-02-16 02:05:36 +01:00
pub fn client_url(&self) -> String {
format!("{}", Node::new(self.info.read().unwrap().id().clone(), self.public_endpoint.clone()))
2016-01-21 16:48:37 +01:00
}
fn maintain_network(&self, io: &IoContext<NetworkIoMessage<Message>>) {
2016-02-02 20:58:12 +01:00
self.keep_alive(io);
self.connect_peers(io);
2016-01-08 13:49:00 +01:00
}
2015-11-29 11:50:28 +01:00
fn have_session(&self, id: &NodeId) -> bool {
self.sessions.read().unwrap().iter().any(|e| e.lock().unwrap().info.id.eq(&id))
2016-02-14 01:03:48 +01:00
}
fn session_count(&self) -> usize {
self.sessions.read().unwrap().count()
2015-11-29 11:50:28 +01:00
}
fn connecting_to(&self, id: &NodeId) -> bool {
self.handshakes.read().unwrap().iter().any(|e| e.lock().unwrap().id.eq(&id))
2016-02-14 01:03:48 +01:00
}
fn handshake_count(&self) -> usize {
self.handshakes.read().unwrap().count()
2015-11-29 11:50:28 +01:00
}
2016-02-02 20:58:12 +01:00
fn keep_alive(&self, io: &IoContext<NetworkIoMessage<Message>>) {
let mut to_kill = Vec::new();
for e in self.sessions.write().unwrap().iter_mut() {
let mut s = e.lock().unwrap();
if !s.keep_alive(io) {
s.disconnect(DisconnectReason::PingTimeout);
to_kill.push(s.token());
2016-02-02 20:58:12 +01:00
}
}
for p in to_kill {
2016-02-14 01:03:48 +01:00
self.kill_connection(p, io, true);
2016-02-02 20:58:12 +01:00
}
}
2016-01-21 16:48:37 +01:00
fn connect_peers(&self, io: &IoContext<NetworkIoMessage<Message>>) {
2016-02-14 01:03:48 +01:00
let ideal_peers = { self.info.read().unwrap().deref().config.ideal_peers };
let pin = { self.info.read().unwrap().deref().config.pin };
let session_count = self.session_count();
if session_count >= ideal_peers as usize {
2016-02-14 01:03:48 +01:00
return;
2015-11-29 11:50:28 +01:00
}
2016-02-14 01:03:48 +01:00
let handshake_count = self.handshake_count();
2016-02-16 02:05:36 +01:00
// allow 16 slots for incoming connections
let handshake_limit = MAX_HANDSHAKES - 16;
if handshake_count >= handshake_limit {
2016-02-14 01:03:48 +01:00
return;
2015-11-29 11:50:28 +01:00
}
let nodes = if pin { self.pinned_nodes.clone() } else { self.nodes.read().unwrap().nodes() };
for id in nodes.iter().filter(|ref id| !self.have_session(id) && !self.connecting_to(id))
2016-02-16 02:05:36 +01:00
.take(min(MAX_HANDSHAKES_PER_ROUND, handshake_limit - handshake_count)) {
2016-02-14 01:03:48 +01:00
self.connect_peer(&id, io);
2015-11-29 11:50:28 +01:00
}
2016-02-14 01:03:48 +01:00
debug!(target: "net", "Connecting peers: {} sessions, {} pending", self.session_count(), self.handshake_count());
2016-01-08 13:49:00 +01:00
}
2015-11-29 11:50:28 +01:00
2016-01-19 12:14:29 +01:00
#[allow(single_match)]
2016-01-21 16:48:37 +01:00
fn connect_peer(&self, id: &NodeId, io: &IoContext<NetworkIoMessage<Message>>) {
2015-11-29 11:50:28 +01:00
if self.have_session(id)
{
2016-02-14 01:03:48 +01:00
trace!("Aborted connect. Node already connected.");
2015-11-29 11:50:28 +01:00
return;
}
2016-01-21 16:48:37 +01:00
if self.connecting_to(id) {
2016-02-14 01:03:48 +01:00
trace!("Aborted connect. Node already connecting.");
2015-11-29 11:50:28 +01:00
return;
}
let socket = {
2016-01-21 16:48:37 +01:00
let address = {
let mut nodes = self.nodes.write().unwrap();
2016-02-14 17:42:03 +01:00
if let Some(node) = nodes.get_mut(id) {
node.last_attempted = Some(::time::now());
node.endpoint.address
}
2016-02-14 17:45:00 +01:00
else {
debug!("Connection to expired node aborted");
return;
}
2016-01-21 16:48:37 +01:00
};
match TcpStream::connect(&address) {
Ok(socket) => socket,
2016-02-16 17:54:34 +01:00
Err(e) => {
warn!("Can't connect to node: {:?}", e);
return;
}
2015-11-29 11:50:28 +01:00
}
};
2016-01-24 18:53:54 +01:00
self.create_connection(socket, Some(id), io);
}
2015-11-29 11:50:28 +01:00
2016-01-24 18:53:54 +01:00
#[allow(block_in_if_condition_stmt)]
fn create_connection(&self, socket: TcpStream, id: Option<&NodeId>, io: &IoContext<NetworkIoMessage<Message>>) {
2016-01-21 16:48:37 +01:00
let nonce = self.info.write().unwrap().next_nonce();
let mut handshakes = self.handshakes.write().unwrap();
if handshakes.insert_with(|token| {
2016-01-24 18:53:54 +01:00
let mut handshake = Handshake::new(token, id, socket, &nonce, self.stats.clone()).expect("Can't create handshake");
handshake.start(io, &self.info.read().unwrap(), id.is_some()).and_then(|_| io.register_stream(token)).unwrap_or_else (|e| {
2016-01-21 16:48:37 +01:00
debug!(target: "net", "Handshake create error: {:?}", e);
});
Arc::new(Mutex::new(handshake))
2016-01-21 16:48:37 +01:00
}).is_none() {
debug!("Max handshakes reached");
}
}
2015-11-29 11:50:28 +01:00
2016-01-24 18:53:54 +01:00
fn accept(&self, io: &IoContext<NetworkIoMessage<Message>>) {
2016-01-10 22:42:27 +01:00
trace!(target: "net", "accept");
2016-01-24 18:53:54 +01:00
loop {
let socket = match self.tcp_listener.lock().unwrap().accept() {
Ok(None) => break,
Ok(Some((sock, _addr))) => sock,
Err(e) => {
warn!("Error accepting connection: {:?}", e);
break
},
};
self.create_connection(socket, None, io);
}
io.update_registration(TCP_ACCEPT).expect("Error registering TCP listener");
2015-11-29 11:50:28 +01:00
}
fn handshake_writable(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
let handshake = { self.handshakes.read().unwrap().get(token).cloned() };
if let Some(handshake) = handshake {
let mut h = handshake.lock().unwrap();
if let Err(e) = h.writable(io, &self.info.read().unwrap()) {
debug!(target: "net", "Handshake write error: {}:{:?}", token, e);
2016-01-08 13:55:44 +01:00
}
2016-01-22 01:27:51 +01:00
}
2015-11-29 11:50:28 +01:00
}
2015-12-17 11:42:30 +01:00
fn session_writable(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
let session = { self.sessions.read().unwrap().get(token).cloned() };
if let Some(session) = session {
let mut s = session.lock().unwrap();
if let Err(e) = s.writable(io, &self.info.read().unwrap()) {
debug!(target: "net", "Session write error: {}:{:?}", token, e);
}
io.update_registration(token).unwrap_or_else(|e| debug!(target: "net", "Session registration error: {:?}", e));
}
}
2016-01-21 16:48:37 +01:00
fn connection_closed(&self, token: TimerToken, io: &IoContext<NetworkIoMessage<Message>>) {
2016-02-14 01:03:48 +01:00
self.kill_connection(token, io, true);
2016-01-10 14:02:01 +01:00
}
2015-12-17 11:42:30 +01:00
fn handshake_readable(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
let mut create_session = false;
let mut kill = false;
let handshake = { self.handshakes.read().unwrap().get(token).cloned() };
if let Some(handshake) = handshake {
let mut h = handshake.lock().unwrap();
if let Err(e) = h.readable(io, &self.info.read().unwrap()) {
debug!(target: "net", "Handshake read error: {}:{:?}", token, e);
kill = true;
}
if h.done() {
create_session = true;
}
}
if kill {
self.kill_connection(token, io, true); //TODO: mark connection as dead an check in kill_connection
return;
} else if create_session {
self.start_session(token, io);
io.update_registration(token).unwrap_or_else(|e| debug!(target: "net", "Session registration error: {:?}", e));
}
io.update_registration(token).unwrap_or_else(|e| debug!(target: "net", "Token registration error: {:?}", e));
}
fn session_readable(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
2015-12-22 22:23:43 +01:00
let mut ready_data: Vec<ProtocolId> = Vec::new();
let mut packet_data: Option<(ProtocolId, PacketId, Vec<u8>)> = None;
2016-01-21 16:48:37 +01:00
let mut kill = false;
let session = { self.sessions.read().unwrap().get(token).cloned() };
if let Some(session) = session {
let mut s = session.lock().unwrap();
match s.readable(io, &self.info.read().unwrap()) {
Err(e) => {
debug!(target: "net", "Session read error: {}:{:?}", token, e);
kill = true;
},
Ok(SessionData::Ready) => {
for (p, _) in self.handlers.read().unwrap().iter() {
if s.have_capability(p) {
ready_data.push(p);
}
2016-01-21 16:48:37 +01:00
}
},
Ok(SessionData::Packet {
data,
protocol,
packet_id,
}) => {
match self.handlers.read().unwrap().get(protocol) {
None => { warn!(target: "net", "No handler found for protocol: {:?}", protocol) },
Some(_) => packet_data = Some((protocol, packet_id, data)),
2016-01-21 16:48:37 +01:00
}
},
Ok(SessionData::None) => {},
2016-01-08 13:55:44 +01:00
}
2016-01-22 01:27:51 +01:00
}
2015-12-02 12:07:46 +01:00
if kill {
2016-02-14 01:03:48 +01:00
self.kill_connection(token, io, true); //TODO: mark connection as dead an check in kill_connection
2015-12-02 12:07:46 +01:00
}
2015-12-22 22:23:43 +01:00
for p in ready_data {
2016-01-21 16:48:37 +01:00
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
h.connected(&NetworkContext::new(io, p, Some(token), self.sessions.clone()), &token);
2015-12-22 22:23:43 +01:00
}
if let Some((p, packet_id, data)) = packet_data {
2016-01-21 16:48:37 +01:00
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
h.read(&NetworkContext::new(io, p, Some(token), self.sessions.clone()), &token, packet_id, &data[1..]);
2016-01-10 14:02:01 +01:00
}
2016-01-21 16:48:37 +01:00
io.update_registration(token).unwrap_or_else(|e| debug!(target: "net", "Token registration error: {:?}", e));
2015-11-29 11:50:28 +01:00
}
2016-01-21 16:48:37 +01:00
fn start_session(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
let mut handshakes = self.handshakes.write().unwrap();
if handshakes.get(token).is_none() {
return;
}
// turn a handshake into a session
let mut sessions = self.sessions.write().unwrap();
2016-02-14 11:54:08 +01:00
let mut h = handshakes.remove(token).unwrap();
// wait for other threads to stop using it
{
while Arc::get_mut(&mut h).is_none() {
h.lock().ok();
}
}
let h = Arc::try_unwrap(h).ok().unwrap().into_inner().unwrap();
2016-02-15 19:54:27 +01:00
let originated = h.originated;
2016-02-14 12:11:18 +01:00
let mut session = match Session::new(h, &self.info.read().unwrap()) {
Ok(s) => s,
Err(e) => {
2016-02-14 17:45:00 +01:00
debug!("Session creation error: {:?}", e);
2016-02-14 12:11:18 +01:00
return;
}
};
let result = sessions.insert_with(move |session_token| {
2016-02-14 12:11:18 +01:00
session.set_token(session_token);
io.update_registration(session_token).expect("Error updating session registration");
self.stats.inc_sessions();
2016-02-15 19:54:27 +01:00
if !originated {
// Add it no node table
if let Ok(address) = session.remote_addr() {
let entry = NodeEntry { id: session.id().clone(), endpoint: NodeEndpoint { address: address, udp_port: address.port() } };
self.nodes.write().unwrap().add_node(Node::new(entry.id.clone(), entry.endpoint.clone()));
if let Some(ref discovery) = self.discovery {
discovery.lock().unwrap().add_node(entry);
}
2016-02-15 19:54:27 +01:00
}
}
Arc::new(Mutex::new(session))
});
if result.is_none() {
warn!("Max sessions reached");
2016-02-14 02:11:55 +01:00
}
2015-11-29 11:50:28 +01:00
}
2016-01-21 16:48:37 +01:00
fn connection_timeout(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>) {
2016-02-14 01:03:48 +01:00
self.kill_connection(token, io, true)
2015-12-02 12:07:46 +01:00
}
2016-01-08 13:55:44 +01:00
2016-02-14 01:03:48 +01:00
fn kill_connection(&self, token: StreamToken, io: &IoContext<NetworkIoMessage<Message>>, remote: bool) {
2016-01-10 14:02:01 +01:00
let mut to_disconnect: Vec<ProtocolId> = Vec::new();
2016-02-14 02:11:55 +01:00
let mut failure_id = None;
match token {
FIRST_HANDSHAKE ... LAST_HANDSHAKE => {
let mut handshakes = self.handshakes.write().unwrap();
if let Some(handshake) = handshakes.get(token).cloned() {
failure_id = Some(handshake.lock().unwrap().id().clone());
handshakes.remove(token);
}
},
FIRST_SESSION ... LAST_SESSION => {
let mut sessions = self.sessions.write().unwrap();
if let Some(session) = sessions.get(token).cloned() {
let s = session.lock().unwrap();
if s.is_ready() {
2016-01-21 16:48:37 +01:00
for (p, _) in self.handlers.read().unwrap().iter() {
if s.have_capability(p) {
to_disconnect.push(p);
}
}
}
failure_id = Some(s.id().clone());
sessions.remove(token);
2016-01-10 14:02:01 +01:00
}
},
_ => {},
2016-01-10 14:02:01 +01:00
}
io.deregister_stream(token).expect("Error deregistering stream");
2016-02-14 02:11:55 +01:00
if let Some(id) = failure_id {
if remote {
self.nodes.write().unwrap().note_failure(&id);
}
}
2016-01-10 14:02:01 +01:00
for p in to_disconnect {
2016-01-21 16:48:37 +01:00
let h = self.handlers.read().unwrap().get(p).unwrap().clone();
h.disconnected(&NetworkContext::new(io, p, Some(token), self.sessions.clone()), &token);
2016-01-15 00:50:48 +01:00
}
2015-11-29 11:50:28 +01:00
}
2016-02-12 09:52:32 +01:00
fn update_nodes(&self, io: &IoContext<NetworkIoMessage<Message>>, node_changes: TableUpdates) {
let mut to_remove: Vec<PeerId> = Vec::new();
2016-02-14 02:11:55 +01:00
{
{
let handshakes = self.handshakes.write().unwrap();
for c in handshakes.iter() {
let h = c.lock().unwrap();
if node_changes.removed.contains(&h.id()) {
to_remove.push(h.token());
2016-02-12 09:52:32 +01:00
}
}
}
{
let sessions = self.sessions.write().unwrap();
for c in sessions.iter() {
let s = c.lock().unwrap();
if node_changes.removed.contains(&s.id()) {
to_remove.push(s.token());
2016-02-12 09:52:32 +01:00
}
}
}
}
for i in to_remove {
2016-02-14 01:03:48 +01:00
self.kill_connection(i, io, false);
2016-02-12 09:52:32 +01:00
}
self.nodes.write().unwrap().update(node_changes);
}
2016-01-08 13:55:44 +01:00
}
2015-11-29 11:50:28 +01:00
2016-01-21 16:48:37 +01:00
impl<Message> IoHandler<NetworkIoMessage<Message>> for Host<Message> where Message: Send + Sync + Clone + 'static {
/// Initialize networking
2016-01-21 16:48:37 +01:00
fn initialize(&self, io: &IoContext<NetworkIoMessage<Message>>) {
io.register_stream(TCP_ACCEPT).expect("Error registering TCP listener");
io.register_timer(IDLE, MAINTENANCE_TIMEOUT).expect("Error registering Network idle timer");
if self.discovery.is_some() {
2016-02-16 17:54:34 +01:00
io.register_stream(DISCOVERY).expect("Error registering UDP listener");
io.register_timer(DISCOVERY_REFRESH, 7200).expect("Error registering discovery timer");
io.register_timer(DISCOVERY_ROUND, 300).expect("Error registering discovery timer");
}
}
2016-01-21 16:48:37 +01:00
fn stream_hup(&self, io: &IoContext<NetworkIoMessage<Message>>, stream: StreamToken) {
trace!(target: "net", "Hup: {}", stream);
match stream {
FIRST_SESSION ... LAST_SESSION => self.connection_closed(stream, io),
FIRST_HANDSHAKE ... LAST_HANDSHAKE => self.connection_closed(stream, io),
_ => warn!(target: "net", "Unexpected hup"),
};
}
2016-01-21 16:48:37 +01:00
fn stream_readable(&self, io: &IoContext<NetworkIoMessage<Message>>, stream: StreamToken) {
match stream {
FIRST_SESSION ... LAST_SESSION => self.session_readable(stream, io),
FIRST_HANDSHAKE ... LAST_HANDSHAKE => self.handshake_readable(stream, io),
2016-02-12 09:52:32 +01:00
DISCOVERY => {
if let Some(node_changes) = self.discovery.as_ref().unwrap().lock().unwrap().readable() {
2016-02-12 09:52:32 +01:00
self.update_nodes(io, node_changes);
}
2016-02-16 23:33:32 +01:00
io.update_registration(DISCOVERY).expect("Error updating discovery registration");
2016-02-12 09:52:32 +01:00
},
2016-01-13 15:08:36 +01:00
TCP_ACCEPT => self.accept(io),
_ => panic!("Received unknown readable token"),
2016-01-08 13:55:44 +01:00
}
}
2016-01-21 16:48:37 +01:00
fn stream_writable(&self, io: &IoContext<NetworkIoMessage<Message>>, stream: StreamToken) {
match stream {
FIRST_SESSION ... LAST_SESSION => self.session_writable(stream, io),
FIRST_HANDSHAKE ... LAST_HANDSHAKE => self.handshake_writable(stream, io),
2016-02-13 22:57:39 +01:00
DISCOVERY => {
self.discovery.as_ref().unwrap().lock().unwrap().writable();
2016-02-16 23:33:32 +01:00
io.update_registration(DISCOVERY).expect("Error updating discovery registration");
2016-02-13 22:57:39 +01:00
}
_ => panic!("Received unknown writable token"),
2015-11-29 11:50:28 +01:00
}
2016-01-08 13:55:44 +01:00
}
2016-01-08 13:49:00 +01:00
2016-01-21 16:48:37 +01:00
fn timeout(&self, io: &IoContext<NetworkIoMessage<Message>>, token: TimerToken) {
match token {
IDLE => self.maintain_network(io),
FIRST_SESSION ... LAST_SESSION => self.connection_timeout(token, io),
FIRST_HANDSHAKE ... LAST_HANDSHAKE => self.connection_timeout(token, io),
2016-02-12 09:52:32 +01:00
DISCOVERY_REFRESH => {
self.discovery.as_ref().unwrap().lock().unwrap().refresh();
2016-02-16 23:33:32 +01:00
io.update_registration(DISCOVERY).expect("Error updating discovery registration");
2016-02-12 09:52:32 +01:00
},
DISCOVERY_ROUND => {
if let Some(node_changes) = self.discovery.as_ref().unwrap().lock().unwrap().round() {
2016-02-13 22:57:39 +01:00
self.update_nodes(io, node_changes);
}
2016-02-16 23:33:32 +01:00
io.update_registration(DISCOVERY).expect("Error updating discovery registration");
2016-02-12 09:52:32 +01:00
},
_ => match self.timers.read().unwrap().get(&token).cloned() {
Some(timer) => match self.handlers.read().unwrap().get(timer.protocol).cloned() {
2016-01-21 16:48:37 +01:00
None => { warn!(target: "net", "No handler found for protocol: {:?}", timer.protocol) },
Some(h) => { h.timeout(&NetworkContext::new(io, timer.protocol, None, self.sessions.clone()), timer.token); }
2016-01-21 16:48:37 +01:00
},
None => { warn!("Unknown timer token: {}", token); } // timer is not registerd through us
2015-12-17 11:42:30 +01:00
}
}
2016-01-08 13:55:44 +01:00
}
2015-12-17 11:42:30 +01:00
2016-01-21 16:48:37 +01:00
fn message(&self, io: &IoContext<NetworkIoMessage<Message>>, message: &NetworkIoMessage<Message>) {
2016-01-19 12:14:29 +01:00
match *message {
NetworkIoMessage::AddHandler {
2016-01-21 16:48:37 +01:00
ref handler,
ref protocol,
ref versions
2016-01-08 13:55:44 +01:00
} => {
2016-01-21 16:48:37 +01:00
let h = handler.clone();
h.initialize(&NetworkContext::new(io, protocol, None, self.sessions.clone()));
2016-01-21 16:48:37 +01:00
self.handlers.write().unwrap().insert(protocol, h);
let mut info = self.info.write().unwrap();
2016-01-08 13:55:44 +01:00
for v in versions {
2016-01-21 16:48:37 +01:00
info.capabilities.push(CapabilityInfo { protocol: protocol, version: *v, packet_count:0 });
2016-01-08 13:55:44 +01:00
}
},
NetworkIoMessage::AddTimer {
2016-01-21 16:48:37 +01:00
ref protocol,
ref delay,
ref token,
} => {
let handler_token = {
let mut timer_counter = self.timer_counter.write().unwrap();
let counter = timer_counter.deref_mut();
let handler_token = *counter;
*counter += 1;
handler_token
};
self.timers.write().unwrap().insert(handler_token, ProtocolTimer { protocol: protocol, token: *token });
io.register_timer(handler_token, *delay).expect("Error registering timer");
},
2016-02-02 21:10:16 +01:00
NetworkIoMessage::Disconnect(ref peer) => {
let session = { self.sessions.read().unwrap().get(*peer).cloned() };
if let Some(session) = session {
session.lock().unwrap().disconnect(DisconnectReason::DisconnectRequested);
2016-02-02 14:54:46 +01:00
}
2016-02-14 01:03:48 +01:00
self.kill_connection(*peer, io, false);
2016-02-02 14:54:46 +01:00
},
2016-01-19 12:14:29 +01:00
NetworkIoMessage::User(ref message) => {
2016-01-21 16:48:37 +01:00
for (p, h) in self.handlers.read().unwrap().iter() {
h.message(&NetworkContext::new(io, p, None, self.sessions.clone()), &message);
2015-12-28 11:41:51 +01:00
}
}
2015-11-29 11:50:28 +01:00
}
}
2016-01-21 16:48:37 +01:00
fn register_stream(&self, stream: StreamToken, reg: Token, event_loop: &mut EventLoop<IoManager<NetworkIoMessage<Message>>>) {
match stream {
FIRST_SESSION ... LAST_SESSION => {
warn!("Unexpected session stream registration");
}
FIRST_HANDSHAKE ... LAST_HANDSHAKE => {
let connection = { self.handshakes.read().unwrap().get(stream).cloned() };
2016-02-14 02:11:55 +01:00
if let Some(connection) = connection {
connection.lock().unwrap().register_socket(reg, event_loop).expect("Error registering socket");
}
2016-01-21 16:48:37 +01:00
}
DISCOVERY => self.discovery.as_ref().unwrap().lock().unwrap().register_socket(event_loop).expect("Error registering discovery socket"),
2016-01-21 16:48:37 +01:00
TCP_ACCEPT => event_loop.register(self.tcp_listener.lock().unwrap().deref(), Token(TCP_ACCEPT), EventSet::all(), PollOpt::edge()).expect("Error registering stream"),
2016-01-21 23:33:52 +01:00
_ => warn!("Unexpected stream registration")
2016-01-21 16:48:37 +01:00
}
}
2016-01-22 18:13:59 +01:00
fn deregister_stream(&self, stream: StreamToken, event_loop: &mut EventLoop<IoManager<NetworkIoMessage<Message>>>) {
match stream {
FIRST_SESSION ... LAST_SESSION => {
let mut connections = self.sessions.write().unwrap();
2016-01-22 18:13:59 +01:00
if let Some(connection) = connections.get(stream).cloned() {
connection.lock().unwrap().deregister_socket(event_loop).expect("Error deregistering socket");
2016-01-22 18:13:59 +01:00
connections.remove(stream);
}
}
FIRST_HANDSHAKE ... LAST_HANDSHAKE => {
let mut connections = self.handshakes.write().unwrap();
if let Some(connection) = connections.get(stream).cloned() {
connection.lock().unwrap().deregister_socket(event_loop).expect("Error deregistering socket");
connections.remove(stream);
}
}
2016-02-12 09:52:32 +01:00
DISCOVERY => (),
2016-01-22 18:13:59 +01:00
TCP_ACCEPT => event_loop.deregister(self.tcp_listener.lock().unwrap().deref()).unwrap(),
_ => warn!("Unexpected stream deregistration")
}
}
2016-01-21 16:48:37 +01:00
fn update_stream(&self, stream: StreamToken, reg: Token, event_loop: &mut EventLoop<IoManager<NetworkIoMessage<Message>>>) {
match stream {
FIRST_SESSION ... LAST_SESSION => {
let connection = { self.sessions.read().unwrap().get(stream).cloned() };
if let Some(connection) = connection {
connection.lock().unwrap().update_socket(reg, event_loop).expect("Error updating socket");
}
}
FIRST_HANDSHAKE ... LAST_HANDSHAKE => {
let connection = { self.handshakes.read().unwrap().get(stream).cloned() };
if let Some(connection) = connection {
connection.lock().unwrap().update_socket(reg, event_loop).expect("Error updating socket");
}
2016-01-21 16:48:37 +01:00
}
DISCOVERY => self.discovery.as_ref().unwrap().lock().unwrap().update_registration(event_loop).expect("Error reregistering discovery socket"),
2016-01-21 16:48:37 +01:00
TCP_ACCEPT => event_loop.reregister(self.tcp_listener.lock().unwrap().deref(), Token(TCP_ACCEPT), EventSet::all(), PollOpt::edge()).expect("Error reregistering stream"),
_ => warn!("Unexpected stream update")
}
}
2016-01-08 13:55:44 +01:00
}
2016-02-15 18:36:34 +01:00
fn save_key(path: &Path, key: &Secret) {
let mut path_buf = PathBuf::from(path);
if let Err(e) = fs::create_dir_all(path_buf.as_path()) {
warn!("Error creating key directory: {:?}", e);
return;
};
path_buf.push("key");
let mut file = match fs::File::create(path_buf.as_path()) {
Ok(file) => file,
Err(e) => {
warn!("Error creating key file: {:?}", e);
return;
}
};
if let Err(e) = file.write(&key.hex().into_bytes()) {
warn!("Error writing key file: {:?}", e);
}
}
fn load_key(path: &Path) -> Option<Secret> {
let mut path_buf = PathBuf::from(path);
path_buf.push("key");
let mut file = match fs::File::open(path_buf.as_path()) {
Ok(file) => file,
Err(e) => {
debug!("Error opening key file: {:?}", e);
return None;
}
};
let mut buf = String::new();
match file.read_to_string(&mut buf) {
Ok(_) => {},
Err(e) => {
warn!("Error reading key file: {:?}", e);
return None;
}
}
match Secret::from_str(&buf) {
Ok(key) => Some(key),
Err(e) => {
warn!("Error parsing key file: {:?}", e);
None
}
}
}
2016-02-16 21:25:01 +01:00
#[test]
fn key_save_load() {
use tests::helpers::RandomTempPath;
let temp_path = RandomTempPath::create_dir();
let key = H256::random();
save_key(temp_path.as_path(), &key);
let r = load_key(temp_path.as_path());
assert_eq!(key, r.unwrap());
}