1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// Copyright 2017-2020 Parity Technologies (UK) Ltd.
//
// Permission is hereby granted, free of charge, to any person obtaining a
// copy of this software and associated documentation files (the "Software"),
// to deal in the Software without restriction, including without limitation
// the rights to use, copy, modify, merge, publish, distribute, sublicense,
// and/or sell copies of the Software, and to permit persons to whom the
// Software is furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
// FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
// DEALINGS IN THE SOFTWARE.

//! Future that drives a QUIC connection until is has performed its TLS handshake.

use crate::{Connection, Error};

use futures::prelude::*;
use futures_timer::Delay;
use libp2p_identity::PeerId;
use std::{
    pin::Pin,
    task::{Context, Poll},
    time::Duration,
};

/// A QUIC connection currently being negotiated.
#[derive(Debug)]
pub struct Connecting {
    connection: Option<Connection>,
    timeout: Delay,
}

impl Connecting {
    pub(crate) fn new(connection: Connection, timeout: Duration) -> Self {
        Connecting {
            connection: Some(connection),
            timeout: Delay::new(timeout),
        }
    }
}

impl Future for Connecting {
    type Output = Result<(PeerId, Connection), Error>;

    fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
        let connection = self
            .connection
            .as_mut()
            .expect("Future polled after it has completed");

        loop {
            let event = match connection.poll_event(cx) {
                Poll::Ready(Some(event)) => event,
                Poll::Ready(None) => return Poll::Ready(Err(Error::EndpointDriverCrashed)),
                Poll::Pending => {
                    return self
                        .timeout
                        .poll_unpin(cx)
                        .map(|()| Err(Error::HandshakeTimedOut));
                }
            };
            match event {
                quinn_proto::Event::Connected => {
                    // Parse the remote's Id identity from the certificate.
                    let identity = connection
                        .peer_identity()
                        .expect("connection got identity because it passed TLS handshake; qed");
                    let certificates: Box<Vec<rustls::Certificate>> =
                        identity.downcast().expect("we rely on rustls feature; qed");
                    let end_entity = certificates
                        .get(0)
                        .expect("there should be exactly one certificate; qed");
                    let p2p_cert = libp2p_tls::certificate::parse(end_entity)
                        .expect("the certificate was validated during TLS handshake; qed");
                    let peer_id = p2p_cert.peer_id();

                    return Poll::Ready(Ok((peer_id, self.connection.take().unwrap())));
                }
                quinn_proto::Event::ConnectionLost { reason } => {
                    return Poll::Ready(Err(Error::Connection(reason.into())))
                }
                quinn_proto::Event::HandshakeDataReady | quinn_proto::Event::Stream(_) => {}
                quinn_proto::Event::DatagramReceived => {
                    debug_assert!(false, "Datagrams are not supported")
                }
            }
        }
    }
}