44 to.resize(from.size());
45 for (
size_t i = 0; i < from.size(); ++i) {
75 const std::string& std_b64 =
SwapBase64(i2p_b64);
78 throw std::runtime_error(
strprintf(
"Cannot decode Base64: \"%s\"", i2p_b64));
80 return std::move(*decoded);
92 hasher.
Write(dest.data(), dest.size());
97 const std::string addr_str =
EncodeBase32(hash,
false) +
".b32.i2p";
99 throw std::runtime_error(
strprintf(
"Cannot parse I2P address: \"%s\"", addr_str));
120 const Proxy& control_host,
122 : m_private_key_file{private_key_file},
123 m_control_host{control_host},
124 m_interrupt{interrupt},
130 : m_control_host{control_host},
131 m_interrupt{interrupt},
150 }
catch (
const std::runtime_error& e) {
162 bool disconnect{
false};
167 errmsg =
"wait on socket failed";
176 std::string peer_dest;
179 }
catch (
const std::runtime_error& e) {
187 }
catch (
const std::runtime_error& e) {
193 if (peer_dest.find(
"RESULT=I2P_ERROR") != std::string::npos) {
194 errmsg =
strprintf(
"unexpected reply that hints the session is unusable: %s", peer_dest);
233 std::string session_id;
234 std::unique_ptr<Sock> sock;
241 session_id = m_session_id;
246 const Reply& lookup_reply =
249 const std::string& dest = lookup_reply.
Get(
"VALUE");
252 *sock,
strprintf(
"STREAM CONNECT ID=%s DESTINATION=%s SILENT=false", session_id, dest),
255 const std::string& result = connect_reply.
Get(
"RESULT");
257 if (result ==
"OK") {
258 conn.
sock = std::move(sock);
262 if (result ==
"INVALID_ID") {
265 throw std::runtime_error(
"Invalid session id");
268 if (result ==
"CANT_REACH_PEER" || result ==
"TIMEOUT") {
272 throw std::runtime_error(
strprintf(
"\"%s\"", connect_reply.
full));
273 }
catch (
const std::runtime_error& e) {
284 const auto& pos =
keys.find(key);
285 if (pos ==
keys.end() || !pos->second.has_value()) {
286 throw std::runtime_error(
289 return pos->second.value();
293 const std::string& request,
294 bool check_result_ok)
const
301 reply.
request = request.substr(0, 14) ==
"SESSION CREATE" ?
"SESSION CREATE ..." : request;
307 static constexpr auto recv_timeout = 3min;
311 for (
const auto& kv :
Split(reply.
full,
' ')) {
312 const auto& pos = std::find(kv.begin(), kv.end(),
'=');
313 if (pos != kv.end()) {
314 reply.
keys.emplace(std::string{kv.begin(), pos}, std::string{pos + 1, kv.end()});
316 reply.
keys.emplace(std::string{kv.begin(), kv.end()}, std::nullopt);
320 if (check_result_ok && reply.
Get(
"RESULT") !=
"OK") {
321 throw std::runtime_error(
322 strprintf(
"Unexpected reply to \"%s\": \"%s\"", request, reply.
full));
346 if (m_control_sock && !m_control_sock->IsConnected(errmsg)) {
369 std::string(m_private_key.begin(), m_private_key.end()))) {
370 throw std::runtime_error(
380 static constexpr size_t DEST_LEN_BASE = 387;
381 static constexpr size_t CERT_LEN_POS = 385;
385 if (m_private_key.size() < CERT_LEN_POS +
sizeof(cert_len)) {
386 throw std::runtime_error(
strprintf(
"The private key is too short (%d < %d)",
387 m_private_key.size(),
388 CERT_LEN_POS +
sizeof(cert_len)));
391 memcpy(&cert_len, &m_private_key.at(CERT_LEN_POS),
sizeof(cert_len));
394 const size_t dest_len = DEST_LEN_BASE + cert_len;
396 if (dest_len > m_private_key.size()) {
397 throw std::runtime_error(
strprintf(
"Certificate length (%d) designates that the private key should "
398 "be %d bytes, but it is only %d bytes",
401 m_private_key.size()));
404 return Binary{m_private_key.begin(), m_private_key.begin() + dest_len};
410 if (m_control_sock && m_control_sock->IsConnected(errmsg)) {
414 const auto session_type =
m_transient ?
"transient" :
"persistent";
426 strprintf(
"SESSION CREATE STYLE=STREAM ID=%s DESTINATION=TRANSIENT SIGNATURE_TYPE=7 "
427 "i2cp.leaseSetEncType=4,0 inbound.quantity=1 outbound.quantity=1",
436 m_private_key.assign(
data.begin(),
data.end());
444 strprintf(
"SESSION CREATE STYLE=STREAM ID=%s DESTINATION=%s "
445 "i2cp.leaseSetEncType=4,0 inbound.quantity=3 outbound.quantity=3",
451 m_session_id = session_id;
452 m_control_sock = std::move(sock);
457 m_my_addr.ToStringAddrPort());
465 *sock,
strprintf(
"STREAM ACCEPT ID=%s SILENT=false", m_session_id),
false);
467 const std::string& result = reply.
Get(
"RESULT");
469 if (result ==
"OK") {
473 if (result ==
"INVALID_ID") {
483 if (m_control_sock) {
484 if (m_session_id.empty()) {
489 m_control_sock.reset();
491 m_session_id.clear();
std::string ToStringAddr() const
bool SetSpecial(const std::string &addr)
Parse a Tor or I2P address and set this object to it.
A hasher class for SHA-256.
static const size_t OUTPUT_SIZE
void Finalize(unsigned char hash[OUTPUT_SIZE])
CSHA256 & Write(const unsigned char *data, size_t len)
A combination of a network address (CNetAddr) and a (TCP) port.
std::string ToStringAddrPort() const
A helper class for interruptible sleeps.
std::string ToString() const
std::unique_ptr< Sock > Connect() const
RAII helper class that manages a socket and closes it automatically when it goes out of scope.
virtual void SendComplete(Span< const unsigned char > data, std::chrono::milliseconds timeout, CThreadInterrupt &interrupt) const
Send the given data, retrying on transient errors.
static constexpr Event RECV
If passed to Wait(), then it will wait for readiness to read from the socket.
virtual std::string RecvUntilTerminator(uint8_t terminator, std::chrono::milliseconds timeout, CThreadInterrupt &interrupt, size_t max_data) const
Read from socket until a terminator character is encountered.
std::string GetHex() const
Path class wrapper to block calls to the fs::path(std::string) implicit constructor and the fs::path:...
const fs::path m_private_key_file
The name of the file where this peer's private key is stored (in binary).
Reply SendRequestAndGetReply(const Sock &sock, const std::string &request, bool check_result_ok=true) const
Send request and get a reply from the SAM proxy.
Session(const fs::path &private_key_file, const Proxy &control_host, CThreadInterrupt *interrupt)
Construct a session.
bool Listen(Connection &conn) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Start listening for an incoming connection.
void CreateIfNotCreatedAlready() EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Create the session if not already created.
void Disconnect() EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Destroy the session, closing the internally used sockets.
std::unique_ptr< Sock > Hello() const EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Open a new connection to the SAM proxy.
void CheckControlSock() EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Check the control socket for errors and possibly disconnect.
std::unique_ptr< Sock > StreamAccept() EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Open a new connection to the SAM proxy and issue "STREAM ACCEPT" request using the existing session i...
Binary MyDestination() const EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Derive own destination from m_private_key.
~Session()
Destroy the session, closing the internally used sockets.
const bool m_transient
Whether this is a transient session (the I2P private key will not be read or written to disk).
void GenerateAndSavePrivateKey(const Sock &sock) EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Generate a new destination with the SAM proxy, set m_private_key to it and save it on disk to m_priva...
bool Connect(const CService &to, Connection &conn, bool &proxy_error) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Connect to an I2P peer.
CThreadInterrupt *const m_interrupt
Cease network activity when this is signaled.
void DestGenerate(const Sock &sock) EXCLUSIVE_LOCKS_REQUIRED(m_mutex)
Generate a new destination with the SAM proxy and set m_private_key to it.
Mutex m_mutex
Mutex protecting the members that can be concurrently accessed.
bool Accept(Connection &conn) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Wait for and accept a new incoming connection.
const Proxy m_control_host
The SAM control service proxy.
BSWAP_CONSTEXPR uint16_t be16toh_internal(uint16_t big_endian_16bits)
#define LogPrintLevel(category, level,...)
static auto quoted(const std::string &s)
static std::string PathToString(const path &path)
Convert path object to a byte string.
static constexpr size_t MAX_MSG_SIZE
The maximum size of an incoming message from the I2P SAM proxy (in bytes).
static CNetAddr DestB64ToAddr(const std::string &dest)
Derive the .b32.i2p address of an I2P destination (I2P-style Base64).
static std::string SwapBase64(const std::string &from)
Swap Standard Base64 <-> I2P Base64.
static CNetAddr DestBinToAddr(const Binary &dest)
Derive the .b32.i2p address of an I2P destination (binary).
std::vector< uint8_t > Binary
Binary data.
static Binary DecodeI2PBase64(const std::string &i2p_b64)
Decode an I2P-style Base64 string.
std::vector< T > Split(const Span< const char > &sp, std::string_view separators)
Split a string on any char found in separators, returning a vector.
static constexpr uint16_t I2P_SAM31_PORT
SAM 3.1 and earlier do not support specifying ports and force the port to 0.
uint256 GetRandHash() noexcept
Generate a random uint256.
bool WriteBinaryFile(const fs::path &filename, const std::string &data)
Write contents of std::string to a file.
std::pair< bool, std::string > ReadBinaryFile(const fs::path &filename, size_t maxsize)
Read full contents of a file and return them in a std::string.
static constexpr auto MAX_WAIT_FOR_IO
Maximum time to wait for I/O readiness.
An established connection with another peer.
std::unique_ptr< Sock > sock
Connected socket.
CService me
Our I2P address.
CService peer
The peer's I2P address.
A reply from the SAM proxy.
std::string Get(const std::string &key) const
Get the value of a given key.
std::string full
Full, unparsed reply.
std::unordered_map< std::string, std::optional< std::string > > keys
A map of keywords from the parsed reply.
std::string request
Request, used for detailed error reporting.
#define AssertLockNotHeld(cs)
std::string Capitalize(std::string str)
Capitalizes the first character of the given string.
std::string EncodeBase64(Span< const unsigned char > input)
std::string EncodeBase32(Span< const unsigned char > input, bool pad)
Base32 encode.
std::optional< std::vector< unsigned char > > DecodeBase64(std::string_view str)