2018-10-10 12:23:21 +02:00
|
|
|
# pylint: disable=too-many-ancestors
|
|
|
|
"""
|
|
|
|
src/network/tcp.py
|
|
|
|
==================
|
|
|
|
"""
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
import math
|
|
|
|
import random
|
2018-10-10 12:23:21 +02:00
|
|
|
import socket
|
|
|
|
import time
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2018-10-10 12:23:21 +02:00
|
|
|
import addresses
|
|
|
|
import helper_random
|
|
|
|
import knownnodes
|
|
|
|
import network.asyncore_pollchoose as asyncore
|
|
|
|
import network.connectionpool
|
|
|
|
import protocol
|
|
|
|
import shared
|
|
|
|
import state
|
|
|
|
from bmconfigparser import BMConfigParser
|
2017-05-27 19:09:21 +02:00
|
|
|
from debug import logger
|
2017-07-10 07:10:05 +02:00
|
|
|
from helper_random import randomBytes
|
2017-05-27 19:09:21 +02:00
|
|
|
from inventory import Inventory
|
|
|
|
from network.advanceddispatcher import AdvancedDispatcher
|
2018-10-10 12:23:21 +02:00
|
|
|
from network.bmproto import BMProto
|
2017-10-20 01:21:49 +02:00
|
|
|
from network.dandelion import Dandelion
|
2017-05-27 19:09:21 +02:00
|
|
|
from network.objectracker import ObjectTracker
|
2018-10-10 12:23:21 +02:00
|
|
|
from network.socks4a import Socks4aConnection
|
|
|
|
from network.socks5 import Socks5Connection
|
2017-05-27 19:09:21 +02:00
|
|
|
from network.tls import TLSDispatcher
|
2018-10-10 12:23:21 +02:00
|
|
|
from queues import UISignalQueue, invQueue, receiveDataQueue
|
2017-05-27 19:09:21 +02:00
|
|
|
|
|
|
|
|
2018-10-10 12:23:21 +02:00
|
|
|
class TCPConnection(BMProto, TLSDispatcher): # pylint: disable=too-many-instance-attributes
|
|
|
|
"""
|
|
|
|
|
|
|
|
.. todo:: Look to understand and/or fix the non-parent-init-called
|
|
|
|
"""
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
def __init__(self, address=None, sock=None):
|
2017-05-29 00:24:07 +02:00
|
|
|
BMProto.__init__(self, address=address, sock=sock)
|
2017-05-27 19:09:21 +02:00
|
|
|
self.verackReceived = False
|
|
|
|
self.verackSent = False
|
|
|
|
self.streams = [0]
|
|
|
|
self.fullyEstablished = False
|
|
|
|
self.connectedAt = 0
|
|
|
|
self.skipUntil = 0
|
|
|
|
if address is None and sock is not None:
|
|
|
|
self.destination = state.Peer(sock.getpeername()[0], sock.getpeername()[1])
|
|
|
|
self.isOutbound = False
|
|
|
|
TLSDispatcher.__init__(self, sock, server_side=True)
|
|
|
|
self.connectedAt = time.time()
|
2017-05-27 22:30:30 +02:00
|
|
|
logger.debug("Received connection from %s:%i", self.destination.host, self.destination.port)
|
2017-07-10 07:10:05 +02:00
|
|
|
self.nodeid = randomBytes(8)
|
2017-06-10 10:13:49 +02:00
|
|
|
elif address is not None and sock is not None:
|
|
|
|
TLSDispatcher.__init__(self, sock, server_side=False)
|
|
|
|
self.isOutbound = True
|
|
|
|
logger.debug("Outbound proxy connection to %s:%i", self.destination.host, self.destination.port)
|
2017-05-27 19:09:21 +02:00
|
|
|
else:
|
|
|
|
self.destination = address
|
|
|
|
self.isOutbound = True
|
|
|
|
if ":" in address.host:
|
|
|
|
self.create_socket(socket.AF_INET6, socket.SOCK_STREAM)
|
|
|
|
else:
|
|
|
|
self.create_socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
TLSDispatcher.__init__(self, sock, server_side=False)
|
|
|
|
self.connect(self.destination)
|
2017-05-27 22:30:30 +02:00
|
|
|
logger.debug("Connecting to %s:%i", self.destination.host, self.destination.port)
|
2017-05-29 00:24:07 +02:00
|
|
|
encodedAddr = protocol.encodeHost(self.destination.host)
|
2018-10-10 12:23:21 +02:00
|
|
|
self.local = all([
|
|
|
|
protocol.checkIPAddress(encodedAddr, True),
|
|
|
|
not protocol.checkSocksIP(self.destination.host)
|
|
|
|
])
|
|
|
|
ObjectTracker.__init__(self) # pylint: disable=non-parent-init-called
|
2017-05-27 19:09:21 +02:00
|
|
|
self.bm_proto_reset()
|
2017-05-31 10:17:36 +02:00
|
|
|
self.set_state("bm_header", expectBytes=protocol.Header.size)
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2018-10-10 12:23:21 +02:00
|
|
|
def antiIntersectionDelay(self, initial=False):
|
|
|
|
"""
|
|
|
|
This is a defense against the so called intersection attacks.
|
|
|
|
|
|
|
|
It is called when you notice peer is requesting non-existing objects, or right after the connection is
|
|
|
|
established. It will estimate how long an object will take to propagate across the network, and skip processing
|
|
|
|
"getdata" requests until then. This means an attacker only has one shot per IP to perform the attack.
|
|
|
|
"""
|
2017-05-27 19:09:21 +02:00
|
|
|
# estimated time for a small object to propagate across the whole network
|
2018-10-10 12:23:21 +02:00
|
|
|
max_known_nodes = max(len(knownnodes.knownNodes[x]) for x in knownnodes.knownNodes)
|
|
|
|
delay = math.ceil(math.log(max_known_nodes + 2, 20)) * (0.2 + invQueue.queueCount / 2.0)
|
2017-05-27 19:09:21 +02:00
|
|
|
# take the stream with maximum amount of nodes
|
|
|
|
# +2 is to avoid problems with log(0) and log(1)
|
|
|
|
# 20 is avg connected nodes count
|
|
|
|
# 0.2 is avg message transmission time
|
|
|
|
if delay > 0:
|
|
|
|
if initial:
|
|
|
|
self.skipUntil = self.connectedAt + delay
|
|
|
|
if self.skipUntil > time.time():
|
2017-07-05 09:27:52 +02:00
|
|
|
logger.debug("Initial skipping processing getdata for %.2fs", self.skipUntil - time.time())
|
2017-05-27 19:09:21 +02:00
|
|
|
else:
|
2017-09-25 01:17:04 +02:00
|
|
|
logger.debug("Skipping processing getdata due to missing object for %.2fs", delay)
|
2017-05-27 19:09:21 +02:00
|
|
|
self.skipUntil = time.time() + delay
|
|
|
|
|
2017-07-06 19:45:36 +02:00
|
|
|
def state_connection_fully_established(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""
|
|
|
|
State after the bitmessage protocol handshake is completed (version/verack exchange, and if both side support
|
|
|
|
TLS, the TLS handshake as well).
|
|
|
|
"""
|
2017-07-06 19:45:36 +02:00
|
|
|
self.set_connection_fully_established()
|
|
|
|
self.set_state("bm_header")
|
|
|
|
self.bm_proto_reset()
|
|
|
|
return True
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
def set_connection_fully_established(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Initiate inventory synchronisation."""
|
2017-05-29 00:24:07 +02:00
|
|
|
if not self.isOutbound and not self.local:
|
|
|
|
shared.clientHasReceivedIncomingConnections = True
|
|
|
|
UISignalQueue.put(('setStatusIcon', 'green'))
|
2017-10-19 08:39:09 +02:00
|
|
|
UISignalQueue.put(('updateNetworkStatusTab', (self.isOutbound, True, self.destination)))
|
2017-05-27 19:09:21 +02:00
|
|
|
self.antiIntersectionDelay(True)
|
|
|
|
self.fullyEstablished = True
|
2017-07-05 09:17:01 +02:00
|
|
|
if self.isOutbound:
|
|
|
|
knownnodes.increaseRating(self.destination)
|
2017-10-20 01:21:49 +02:00
|
|
|
if self.isOutbound:
|
|
|
|
Dandelion().maybeAddStem(self)
|
2017-05-27 19:09:21 +02:00
|
|
|
self.sendAddr()
|
|
|
|
self.sendBigInv()
|
|
|
|
|
|
|
|
def sendAddr(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Send a partial list of known addresses to peer."""
|
2017-05-27 19:09:21 +02:00
|
|
|
# We are going to share a maximum number of 1000 addrs (per overlapping
|
|
|
|
# stream) with our peer. 500 from overlapping streams, 250 from the
|
|
|
|
# left child stream, and 250 from the right child stream.
|
|
|
|
maxAddrCount = BMConfigParser().safeGetInt("bitmessagesettings", "maxaddrperstreamsend", 500)
|
|
|
|
|
|
|
|
# init
|
|
|
|
templist = []
|
|
|
|
addrs = {}
|
|
|
|
for stream in self.streams:
|
|
|
|
with knownnodes.knownNodesLock:
|
2018-10-10 12:23:21 +02:00
|
|
|
if knownnodes.knownNodes[stream]:
|
2017-05-27 19:09:21 +02:00
|
|
|
filtered = {k: v for k, v in knownnodes.knownNodes[stream].items()
|
2018-10-10 12:23:21 +02:00
|
|
|
if v["lastseen"] > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
2017-05-27 19:09:21 +02:00
|
|
|
elemCount = len(filtered)
|
|
|
|
if elemCount > maxAddrCount:
|
|
|
|
elemCount = maxAddrCount
|
|
|
|
# only if more recent than 3 hours
|
2018-03-21 14:56:27 +01:00
|
|
|
addrs[stream] = helper_random.randomsample(filtered.items(), elemCount)
|
2017-05-27 19:09:21 +02:00
|
|
|
# sent 250 only if the remote isn't interested in it
|
2018-10-10 12:23:21 +02:00
|
|
|
if knownnodes.knownNodes[stream * 2] and stream not in self.streams:
|
|
|
|
filtered = {k: v for k, v in knownnodes.knownNodes[stream * 2].items()
|
|
|
|
if v["lastseen"] > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
2017-05-27 19:09:21 +02:00
|
|
|
elemCount = len(filtered)
|
|
|
|
if elemCount > maxAddrCount / 2:
|
|
|
|
elemCount = int(maxAddrCount / 2)
|
2018-03-21 14:56:27 +01:00
|
|
|
addrs[stream * 2] = helper_random.randomsample(filtered.items(), elemCount)
|
2018-10-10 12:23:21 +02:00
|
|
|
if knownnodes.knownNodes[(stream * 2) + 1] and stream not in self.streams:
|
|
|
|
filtered = {k: v for k, v in knownnodes.knownNodes[stream * 2 + 1].items()
|
|
|
|
if v["lastseen"] > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
2017-05-27 19:09:21 +02:00
|
|
|
elemCount = len(filtered)
|
|
|
|
if elemCount > maxAddrCount / 2:
|
|
|
|
elemCount = int(maxAddrCount / 2)
|
2018-03-21 14:56:27 +01:00
|
|
|
addrs[stream * 2 + 1] = helper_random.randomsample(filtered.items(), elemCount)
|
2018-10-10 12:23:21 +02:00
|
|
|
for substream in addrs:
|
2017-07-05 09:17:01 +02:00
|
|
|
for peer, params in addrs[substream]:
|
|
|
|
templist.append((substream, peer, params["lastseen"]))
|
2018-10-10 12:23:21 +02:00
|
|
|
if templist:
|
2017-07-06 19:45:36 +02:00
|
|
|
self.append_write_buf(BMProto.assembleAddr(templist))
|
2017-05-27 19:09:21 +02:00
|
|
|
|
|
|
|
def sendBigInv(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Send hashes of all inventory objects, chunked as the protocol has a per-command limit."""
|
2017-07-06 19:45:36 +02:00
|
|
|
def sendChunk():
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Send one chunk of inv entries in one command"""
|
2017-07-06 19:45:36 +02:00
|
|
|
if objectCount == 0:
|
|
|
|
return
|
|
|
|
logger.debug('Sending huge inv message with %i objects to just this one peer', objectCount)
|
|
|
|
self.append_write_buf(protocol.CreatePacket('inv', addresses.encodeVarint(objectCount) + payload))
|
|
|
|
|
|
|
|
# Select all hashes for objects in this stream.
|
|
|
|
bigInvList = {}
|
|
|
|
for stream in self.streams:
|
|
|
|
# may lock for a long time, but I think it's better than thousands of small locks
|
|
|
|
with self.objectsNewToThemLock:
|
|
|
|
for objHash in Inventory().unexpired_hashes_by_stream(stream):
|
2017-09-25 01:17:04 +02:00
|
|
|
# don't advertise stem objects on bigInv
|
2018-02-03 11:46:39 +01:00
|
|
|
if Dandelion().hasHash(objHash):
|
2017-09-25 01:17:04 +02:00
|
|
|
continue
|
2017-07-06 19:45:36 +02:00
|
|
|
bigInvList[objHash] = 0
|
|
|
|
objectCount = 0
|
|
|
|
payload = b''
|
|
|
|
# Now let us start appending all of these hashes together. They will be
|
|
|
|
# sent out in a big inv message to our new peer.
|
2018-10-10 12:23:21 +02:00
|
|
|
for obj_hash, _ in bigInvList.items():
|
|
|
|
payload += obj_hash
|
2017-07-06 19:45:36 +02:00
|
|
|
objectCount += 1
|
2018-06-14 12:47:46 +02:00
|
|
|
|
|
|
|
# Remove -1 below when sufficient time has passed for users to
|
|
|
|
# upgrade to versions of PyBitmessage that accept inv with 50,000
|
|
|
|
# items
|
|
|
|
if objectCount >= BMProto.maxObjectCount - 1:
|
2017-12-29 08:41:15 +01:00
|
|
|
sendChunk()
|
2017-07-06 19:45:36 +02:00
|
|
|
payload = b''
|
|
|
|
objectCount = 0
|
|
|
|
|
|
|
|
# flush
|
|
|
|
sendChunk()
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2017-06-03 16:30:05 +02:00
|
|
|
def handle_connect(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Callback for TCP connection being established."""
|
2017-05-27 19:09:21 +02:00
|
|
|
try:
|
2017-06-03 16:30:05 +02:00
|
|
|
AdvancedDispatcher.handle_connect(self)
|
2017-05-27 19:09:21 +02:00
|
|
|
except socket.error as e:
|
2018-10-10 12:23:21 +02:00
|
|
|
if e.errno in asyncore._DISCONNECTED: # pylint: disable=protected-access
|
|
|
|
logger.debug("%s:%i: Connection failed: %s", self.destination.host, self.destination.port, str(e))
|
2017-05-27 21:52:56 +02:00
|
|
|
return
|
2017-07-10 07:10:05 +02:00
|
|
|
self.nodeid = randomBytes(8)
|
2018-10-10 12:23:21 +02:00
|
|
|
self.append_write_buf(
|
|
|
|
protocol.assembleVersionMessage(
|
|
|
|
self.destination.host,
|
|
|
|
self.destination.port,
|
|
|
|
network.connectionpool.BMConnectionPool().streams,
|
|
|
|
False,
|
|
|
|
nodeid=self.nodeid))
|
2017-05-27 21:52:56 +02:00
|
|
|
self.connectedAt = time.time()
|
2017-07-08 06:54:25 +02:00
|
|
|
receiveDataQueue.put(self.destination)
|
2017-05-27 21:52:56 +02:00
|
|
|
|
|
|
|
def handle_read(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Callback for reading from a socket"""
|
2017-06-10 10:13:49 +02:00
|
|
|
TLSDispatcher.handle_read(self)
|
2017-07-05 09:17:01 +02:00
|
|
|
if self.isOutbound and self.fullyEstablished:
|
|
|
|
for s in self.streams:
|
|
|
|
try:
|
|
|
|
with knownnodes.knownNodesLock:
|
|
|
|
knownnodes.knownNodes[s][self.destination]["lastseen"] = time.time()
|
|
|
|
except KeyError:
|
|
|
|
pass
|
2017-07-08 06:54:25 +02:00
|
|
|
receiveDataQueue.put(self.destination)
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2017-05-27 21:52:56 +02:00
|
|
|
def handle_write(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Callback for writing to a socket"""
|
2017-06-10 10:13:49 +02:00
|
|
|
TLSDispatcher.handle_write(self)
|
2017-07-05 09:17:01 +02:00
|
|
|
|
2017-10-19 09:08:05 +02:00
|
|
|
def handle_close(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Callback for connection being closed."""
|
2017-07-05 09:17:01 +02:00
|
|
|
if self.isOutbound and not self.fullyEstablished:
|
|
|
|
knownnodes.decreaseRating(self.destination)
|
2017-10-19 08:39:09 +02:00
|
|
|
if self.fullyEstablished:
|
|
|
|
UISignalQueue.put(('updateNetworkStatusTab', (self.isOutbound, False, self.destination)))
|
2017-10-20 01:21:49 +02:00
|
|
|
if self.isOutbound:
|
|
|
|
Dandelion().maybeRemoveStem(self)
|
2017-10-19 09:08:05 +02:00
|
|
|
BMProto.handle_close(self)
|
2017-05-27 19:09:21 +02:00
|
|
|
|
|
|
|
|
|
|
|
class Socks5BMConnection(Socks5Connection, TCPConnection):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""SOCKS5 wrapper for TCP connections"""
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
def __init__(self, address):
|
|
|
|
Socks5Connection.__init__(self, address=address)
|
2017-06-10 10:13:49 +02:00
|
|
|
TCPConnection.__init__(self, address=address, sock=self.socket)
|
|
|
|
self.set_state("init")
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2017-06-24 12:23:56 +02:00
|
|
|
def state_proxy_handshake_done(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""State when SOCKS5 connection succeeds, we need to send a Bitmessage handshake to peer."""
|
2017-06-24 12:23:56 +02:00
|
|
|
Socks5Connection.state_proxy_handshake_done(self)
|
2017-07-10 07:10:05 +02:00
|
|
|
self.nodeid = randomBytes(8)
|
2018-10-10 12:23:21 +02:00
|
|
|
self.append_write_buf(
|
|
|
|
protocol.assembleVersionMessage(
|
|
|
|
self.destination.host,
|
|
|
|
self.destination.port,
|
|
|
|
network.connectionpool.BMConnectionPool().streams,
|
|
|
|
False,
|
|
|
|
nodeid=self.nodeid))
|
2017-06-10 10:13:49 +02:00
|
|
|
self.set_state("bm_header", expectBytes=protocol.Header.size)
|
2017-07-06 19:45:36 +02:00
|
|
|
return True
|
2017-05-27 19:09:21 +02:00
|
|
|
|
|
|
|
|
|
|
|
class Socks4aBMConnection(Socks4aConnection, TCPConnection):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""SOCKS4a wrapper for TCP connections"""
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
def __init__(self, address):
|
|
|
|
Socks4aConnection.__init__(self, address=address)
|
2017-06-10 10:13:49 +02:00
|
|
|
TCPConnection.__init__(self, address=address, sock=self.socket)
|
|
|
|
self.set_state("init")
|
2017-05-27 19:09:21 +02:00
|
|
|
|
2017-06-24 12:23:56 +02:00
|
|
|
def state_proxy_handshake_done(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""State when SOCKS4a connection succeeds, we need to send a Bitmessage handshake to peer."""
|
2017-06-24 12:23:56 +02:00
|
|
|
Socks4aConnection.state_proxy_handshake_done(self)
|
2017-07-10 07:10:05 +02:00
|
|
|
self.nodeid = randomBytes(8)
|
2018-10-10 12:23:21 +02:00
|
|
|
self.append_write_buf(
|
|
|
|
protocol.assembleVersionMessage(
|
|
|
|
self.destination.host,
|
|
|
|
self.destination.port,
|
|
|
|
network.connectionpool.BMConnectionPool().streams,
|
|
|
|
False,
|
|
|
|
nodeid=self.nodeid))
|
2017-06-10 10:13:49 +02:00
|
|
|
self.set_state("bm_header", expectBytes=protocol.Header.size)
|
2017-07-06 19:45:36 +02:00
|
|
|
return True
|
2017-05-27 19:09:21 +02:00
|
|
|
|
|
|
|
|
|
|
|
class TCPServer(AdvancedDispatcher):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""TCP connection server for Bitmessage protocol"""
|
|
|
|
|
|
|
|
def __init__(self, host='127.0.0.1', port=8444): # pylint: disable=redefined-outer-name
|
2017-05-27 19:09:21 +02:00
|
|
|
if not hasattr(self, '_map'):
|
|
|
|
AdvancedDispatcher.__init__(self)
|
|
|
|
self.create_socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
self.set_reuse_addr()
|
2017-08-09 17:29:23 +02:00
|
|
|
for attempt in range(50):
|
|
|
|
try:
|
|
|
|
if attempt > 0:
|
|
|
|
port = random.randint(32767, 65535)
|
|
|
|
self.bind((host, port))
|
|
|
|
except socket.error as e:
|
|
|
|
if e.errno in (asyncore.EADDRINUSE, asyncore.WSAEADDRINUSE):
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
if attempt > 0:
|
|
|
|
BMConfigParser().set("bitmessagesettings", "port", str(port))
|
|
|
|
BMConfigParser().save()
|
|
|
|
break
|
2017-05-30 23:53:43 +02:00
|
|
|
self.destination = state.Peer(host, port)
|
2017-08-09 17:29:23 +02:00
|
|
|
self.bound = True
|
2017-05-27 19:09:21 +02:00
|
|
|
self.listen(5)
|
|
|
|
|
2017-08-09 17:29:23 +02:00
|
|
|
def is_bound(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Is the socket bound?"""
|
2017-08-09 17:29:23 +02:00
|
|
|
try:
|
|
|
|
return self.bound
|
|
|
|
except AttributeError:
|
|
|
|
return False
|
|
|
|
|
2017-05-27 19:09:21 +02:00
|
|
|
def handle_accept(self):
|
2018-10-10 12:23:21 +02:00
|
|
|
"""Incoming connection callback"""
|
2017-05-27 19:09:21 +02:00
|
|
|
pair = self.accept()
|
|
|
|
if pair is not None:
|
2018-10-10 12:23:21 +02:00
|
|
|
sock, _ = pair
|
2017-05-31 00:04:21 +02:00
|
|
|
state.ownAddresses[state.Peer(sock.getsockname()[0], sock.getsockname()[1])] = True
|
2017-06-21 12:16:33 +02:00
|
|
|
if len(network.connectionpool.BMConnectionPool().inboundConnections) + \
|
2018-10-10 12:23:21 +02:00
|
|
|
len(network.connectionpool.BMConnectionPool().outboundConnections) > \
|
|
|
|
BMConfigParser().safeGetInt("bitmessagesettings", "maxtotalconnections") + \
|
|
|
|
BMConfigParser().safeGetInt("bitmessagesettings", "maxbootstrapconnections") + 10:
|
2018-01-02 14:29:21 +01:00
|
|
|
# 10 is a sort of buffer, in between it will go through the version handshake
|
|
|
|
# and return an error to the peer
|
|
|
|
logger.warning("Server full, dropping connection")
|
2017-06-24 12:23:56 +02:00
|
|
|
sock.close()
|
2017-06-21 12:16:33 +02:00
|
|
|
return
|
2017-05-27 19:09:21 +02:00
|
|
|
try:
|
|
|
|
network.connectionpool.BMConnectionPool().addConnection(TCPConnection(sock=sock))
|
|
|
|
except socket.error:
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
# initial fill
|
|
|
|
|
|
|
|
for host in (("127.0.0.1", 8448),):
|
|
|
|
direct = TCPConnection(host)
|
2018-10-10 12:23:21 +02:00
|
|
|
while asyncore.socket_map:
|
2017-05-27 19:09:21 +02:00
|
|
|
print "loop, state = %s" % (direct.state)
|
|
|
|
asyncore.loop(timeout=10, count=1)
|
|
|
|
continue
|