You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
265 lines
8.5 KiB
265 lines
8.5 KiB
use crate::{
|
|
bitcoin,
|
|
database::Database,
|
|
execution_params::ExecutionParams,
|
|
monero, network,
|
|
network::{transport, TokioExecutor},
|
|
protocol::{
|
|
alice,
|
|
alice::{Behaviour, Builder, OutEvent, QuoteResponse, State0, State3, TransferProof},
|
|
bob::{EncryptedSignature, QuoteRequest},
|
|
SwapAmounts,
|
|
},
|
|
seed::Seed,
|
|
};
|
|
use anyhow::{anyhow, Context, Result};
|
|
use libp2p::{
|
|
core::Multiaddr, futures::FutureExt, request_response::ResponseChannel, PeerId, Swarm,
|
|
};
|
|
use rand::rngs::OsRng;
|
|
use std::{collections::HashMap, sync::Arc};
|
|
use tokio::sync::{broadcast, mpsc};
|
|
use tracing::{debug, error, trace};
|
|
use uuid::Uuid;
|
|
|
|
// TODO: Use dynamic
|
|
const RATE: u32 = 100;
|
|
|
|
#[allow(missing_debug_implementations)]
|
|
pub struct MpscChannels<T> {
|
|
sender: mpsc::Sender<T>,
|
|
receiver: mpsc::Receiver<T>,
|
|
}
|
|
|
|
impl<T> Default for MpscChannels<T> {
|
|
fn default() -> Self {
|
|
let (sender, receiver) = mpsc::channel(100);
|
|
MpscChannels { sender, receiver }
|
|
}
|
|
}
|
|
|
|
#[allow(missing_debug_implementations)]
|
|
pub struct BroadcastChannels<T>
|
|
where
|
|
T: Clone,
|
|
{
|
|
sender: broadcast::Sender<T>,
|
|
}
|
|
|
|
impl<T> Default for BroadcastChannels<T>
|
|
where
|
|
T: Clone,
|
|
{
|
|
fn default() -> Self {
|
|
let (sender, _receiver) = broadcast::channel(100);
|
|
BroadcastChannels { sender }
|
|
}
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct EventLoopHandle {
|
|
recv_encrypted_signature: broadcast::Receiver<EncryptedSignature>,
|
|
send_transfer_proof: mpsc::Sender<(PeerId, TransferProof)>,
|
|
}
|
|
|
|
impl EventLoopHandle {
|
|
pub async fn recv_encrypted_signature(&mut self) -> Result<EncryptedSignature> {
|
|
self.recv_encrypted_signature
|
|
.recv()
|
|
.await
|
|
.context("Failed to receive Bitcoin encrypted signature from Bob")
|
|
}
|
|
pub async fn send_transfer_proof(&mut self, bob: PeerId, msg: TransferProof) -> Result<()> {
|
|
let _ = self.send_transfer_proof.send((bob, msg)).await?;
|
|
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
#[allow(missing_debug_implementations)]
|
|
pub struct EventLoop {
|
|
swarm: libp2p::Swarm<Behaviour>,
|
|
peer_id: PeerId,
|
|
execution_params: ExecutionParams,
|
|
bitcoin_wallet: Arc<bitcoin::Wallet>,
|
|
monero_wallet: Arc<monero::Wallet>,
|
|
db: Arc<Database>,
|
|
listen_address: Multiaddr,
|
|
|
|
// Amounts agreed upon for swaps currently in the execution setup phase
|
|
// Note: We can do one execution setup per peer at a given time.
|
|
swap_amounts: HashMap<PeerId, SwapAmounts>,
|
|
|
|
recv_encrypted_signature: broadcast::Sender<EncryptedSignature>,
|
|
send_transfer_proof: mpsc::Receiver<(PeerId, TransferProof)>,
|
|
|
|
// Only used to produce new handles
|
|
send_transfer_proof_sender: mpsc::Sender<(PeerId, TransferProof)>,
|
|
}
|
|
|
|
impl EventLoop {
|
|
pub fn new(
|
|
listen_address: Multiaddr,
|
|
seed: Seed,
|
|
execution_params: ExecutionParams,
|
|
bitcoin_wallet: Arc<bitcoin::Wallet>,
|
|
monero_wallet: Arc<monero::Wallet>,
|
|
db: Arc<Database>,
|
|
) -> Result<Self> {
|
|
let identity = network::Seed::new(seed).derive_libp2p_identity();
|
|
let behaviour = Behaviour::default();
|
|
let transport = transport::build(&identity)?;
|
|
let peer_id = PeerId::from(identity.public());
|
|
|
|
let mut swarm = libp2p::swarm::SwarmBuilder::new(transport, behaviour, peer_id)
|
|
.executor(Box::new(TokioExecutor {
|
|
handle: tokio::runtime::Handle::current(),
|
|
}))
|
|
.build();
|
|
|
|
Swarm::listen_on(&mut swarm, listen_address.clone())
|
|
.with_context(|| format!("Address is not supported: {:#}", listen_address))?;
|
|
|
|
let recv_encrypted_signature = BroadcastChannels::default();
|
|
let send_transfer_proof = MpscChannels::default();
|
|
|
|
Ok(EventLoop {
|
|
swarm,
|
|
peer_id,
|
|
execution_params,
|
|
bitcoin_wallet,
|
|
monero_wallet,
|
|
db,
|
|
listen_address,
|
|
swap_amounts: Default::default(),
|
|
recv_encrypted_signature: recv_encrypted_signature.sender,
|
|
send_transfer_proof: send_transfer_proof.receiver,
|
|
send_transfer_proof_sender: send_transfer_proof.sender,
|
|
})
|
|
}
|
|
|
|
pub fn new_handle(&self) -> EventLoopHandle {
|
|
EventLoopHandle {
|
|
recv_encrypted_signature: self.recv_encrypted_signature.subscribe(),
|
|
send_transfer_proof: self.send_transfer_proof_sender.clone(),
|
|
}
|
|
}
|
|
|
|
pub fn peer_id(&self) -> PeerId {
|
|
self.peer_id
|
|
}
|
|
|
|
pub async fn run(&mut self) {
|
|
loop {
|
|
tokio::select! {
|
|
swarm_event = self.swarm.next().fuse() => {
|
|
match swarm_event {
|
|
OutEvent::ConnectionEstablished(alice) => {
|
|
debug!("Connection Established with {}", alice);
|
|
}
|
|
OutEvent::QuoteRequest { msg, channel, bob_peer_id } => {
|
|
let _ = self.handle_quote_request(msg, channel, bob_peer_id).await;
|
|
}
|
|
OutEvent::ExecutionSetupDone{bob_peer_id, state3} => {
|
|
let _ = self.handle_execution_setup_done(bob_peer_id, *state3).await;
|
|
}
|
|
OutEvent::TransferProofAcknowledged => {
|
|
trace!("Bob acknowledged transfer proof");
|
|
}
|
|
OutEvent::EncryptedSignature{ msg, channel } => {
|
|
let _ = self.recv_encrypted_signature.send(*msg);
|
|
// Send back empty response so that the request/response protocol completes.
|
|
if let Err(error) = self.swarm.send_encrypted_signature_ack(channel) {
|
|
error!("Failed to send Encrypted Signature ack: {:?}", error);
|
|
}
|
|
}
|
|
OutEvent::ResponseSent => {}
|
|
OutEvent::Failure(err) => {
|
|
error!("Communication error: {:#}", err);
|
|
}
|
|
}
|
|
},
|
|
transfer_proof = self.send_transfer_proof.recv().fuse() => {
|
|
if let Some((bob_peer_id, msg)) = transfer_proof {
|
|
self.swarm.send_transfer_proof(bob_peer_id, msg);
|
|
}
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
async fn handle_quote_request(
|
|
&mut self,
|
|
quote_request: QuoteRequest,
|
|
channel: ResponseChannel<QuoteResponse>,
|
|
bob_peer_id: PeerId,
|
|
) -> Result<()> {
|
|
// 1. Check if acceptable request
|
|
// 2. Send response
|
|
|
|
let btc_amount = quote_request.btc_amount;
|
|
let xmr_amount = btc_amount.as_btc() * RATE as f64;
|
|
let xmr_amount = monero::Amount::from_monero(xmr_amount)?;
|
|
let quote_response = QuoteResponse { xmr_amount };
|
|
|
|
self.swarm
|
|
.send_quote_response(channel, quote_response)
|
|
.context("Failed to send quote response")?;
|
|
|
|
// 3. Start setup execution
|
|
|
|
let state0 = State0::new(
|
|
btc_amount,
|
|
xmr_amount,
|
|
self.execution_params,
|
|
self.bitcoin_wallet.as_ref(),
|
|
&mut OsRng,
|
|
)
|
|
.await?;
|
|
|
|
// if a node restart during execution setup, the swap is aborted (safely).
|
|
self.swap_amounts.insert(bob_peer_id, SwapAmounts {
|
|
btc: btc_amount,
|
|
xmr: xmr_amount,
|
|
});
|
|
|
|
self.swarm.start_execution_setup(bob_peer_id, state0);
|
|
// Continues once the execution setup protocol is done
|
|
Ok(())
|
|
}
|
|
|
|
async fn handle_execution_setup_done(
|
|
&mut self,
|
|
bob_peer_id: PeerId,
|
|
state3: State3,
|
|
) -> Result<()> {
|
|
let swap_id = Uuid::new_v4();
|
|
let handle = self.new_handle();
|
|
|
|
let swap_amounts = self.swap_amounts.remove(&bob_peer_id).ok_or_else(|| {
|
|
anyhow!(
|
|
"execution setup done for an unknown peer id: {}, node restarted in between?",
|
|
bob_peer_id
|
|
)
|
|
})?;
|
|
|
|
let swap = Builder::new(
|
|
self.peer_id,
|
|
self.execution_params,
|
|
swap_id,
|
|
self.bitcoin_wallet.clone(),
|
|
self.monero_wallet.clone(),
|
|
self.db.clone(),
|
|
self.listen_address.clone(),
|
|
handle,
|
|
)
|
|
.with_init_params(swap_amounts, bob_peer_id, state3)
|
|
.build()
|
|
.await?;
|
|
|
|
tokio::spawn(async move { alice::run(swap).await });
|
|
|
|
Ok(())
|
|
}
|
|
}
|