/******************************************************************************* * libretroshare/src/retroshare: rspeers.h * * * * libretroshare: retroshare core library * * * * Copyright (C) 2004-2008 by Robert Fernie * * Copyright (C) 2018-2020 Gioacchino Mazzurco * * Copyright (C) 2020 AsociaciĆ³n Civil Altermundi * * * * This program is free software: you can redistribute it and/or modify * * it under the terms of the GNU Lesser General Public License as * * published by the Free Software Foundation, either version 3 of the * * License, or (at your option) any later version. * * * * This program is distributed in the hope that it will be useful, * * but WITHOUT ANY WARRANTY; without even the implied warranty of * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * * GNU Lesser General Public License for more details. * * * * You should have received a copy of the GNU Lesser General Public License * * along with this program. If not, see . * * * *******************************************************************************/ #pragma once #include #include #include #include "retroshare/rstypes.h" #include "retroshare/rsfiles.h" #include "retroshare/rsids.h" #include "util/rsurl.h" #include "util/rsdeprecate.h" #include "util/rstime.h" #include "retroshare/rsevents.h" class RsPeers; /** * Pointer to global instance of RsPeers service implementation * @jsonapi{development} */ extern RsPeers* rsPeers; /* TODO: 2015/12/31 As for type safetyness all those constant must be declared as enum! * C++ now supports typed enum so there is no ambiguity in serialization size */ /* Trust Levels. Should be the same values than what is declared in PGPHandler.h */ const uint32_t RS_TRUST_LVL_UNDEFINED = 0; const uint32_t RS_TRUST_LVL_UNKNOWN = 1; const uint32_t RS_TRUST_LVL_NEVER = 2; const uint32_t RS_TRUST_LVL_MARGINAL = 3; const uint32_t RS_TRUST_LVL_FULL = 4; const uint32_t RS_TRUST_LVL_ULTIMATE = 5; const uint32_t SELF_SIGNATURE_RESULT_PENDING = 0x00; const uint32_t SELF_SIGNATURE_RESULT_SUCCESS = 0x01; const uint32_t SELF_SIGNATURE_RESULT_FAILED = 0x02; /* Net Mode */ const uint32_t RS_NETMODE_UDP = 0x0001; const uint32_t RS_NETMODE_UPNP = 0x0002; const uint32_t RS_NETMODE_EXT = 0x0003; const uint32_t RS_NETMODE_HIDDEN = 0x0004; const uint32_t RS_NETMODE_UNREACHABLE = 0x0005; /* Hidden Type */ const uint32_t RS_HIDDEN_TYPE_NONE = 0x0000; const uint32_t RS_HIDDEN_TYPE_UNKNOWN = 0x0001; const uint32_t RS_HIDDEN_TYPE_TOR = 0x0002; const uint32_t RS_HIDDEN_TYPE_I2P = 0x0004; /* mask to match all valid hidden types */ const uint32_t RS_HIDDEN_TYPE_MASK = RS_HIDDEN_TYPE_I2P | RS_HIDDEN_TYPE_TOR; /* Visibility parameter for discovery */ const uint32_t RS_VS_DISC_OFF = 0x0000; const uint32_t RS_VS_DISC_MINIMAL = 0x0001; const uint32_t RS_VS_DISC_FULL = 0x0002; const uint32_t RS_VS_DHT_OFF = 0x0000; const uint32_t RS_VS_DHT_PASSIVE = 0x0001; const uint32_t RS_VS_DHT_FULL = 0x0002; /* State */ const uint32_t RS_PEER_STATE_FRIEND = 0x0001; const uint32_t RS_PEER_STATE_ONLINE = 0x0002; const uint32_t RS_PEER_STATE_CONNECTED = 0x0004; const uint32_t RS_PEER_STATE_UNREACHABLE= 0x0008; // Service option flags. // const ServicePermissionFlags RS_NODE_PERM_NONE ( 0x00000000 ) ;// 0x1, 0x2 and Ox4 are deprecated. const ServicePermissionFlags RS_NODE_PERM_DIRECT_DL ( 0x00000008 ) ;// Accept to directly DL from this peer (breaks anonymity) const ServicePermissionFlags RS_NODE_PERM_ALLOW_PUSH ( 0x00000010 ) ;// Auto-DL files recommended by this peer const ServicePermissionFlags RS_NODE_PERM_REQUIRE_WL ( 0x00000020 ) ;// Require white list clearance for connection const ServicePermissionFlags RS_NODE_PERM_DEFAULT = RS_NODE_PERM_DIRECT_DL ; const ServicePermissionFlags RS_NODE_PERM_ALL = RS_NODE_PERM_DIRECT_DL | RS_NODE_PERM_ALLOW_PUSH | RS_NODE_PERM_REQUIRE_WL; // ... /* Connect state */ const uint32_t RS_PEER_CONNECTSTATE_OFFLINE = 0; const uint32_t RS_PEER_CONNECTSTATE_TRYING_TCP = 2; const uint32_t RS_PEER_CONNECTSTATE_TRYING_UDP = 3; const uint32_t RS_PEER_CONNECTSTATE_CONNECTED_TCP = 4; const uint32_t RS_PEER_CONNECTSTATE_CONNECTED_UDP = 5; const uint32_t RS_PEER_CONNECTSTATE_CONNECTED_TOR = 6; const uint32_t RS_PEER_CONNECTSTATE_CONNECTED_I2P = 7; const uint32_t RS_PEER_CONNECTSTATE_CONNECTED_UNKNOWN = 8; /* Error codes for certificate cleaning and cert parsing. Numbers should not overlap. */ const int RS_PEER_CERT_CLEANING_CODE_NO_ERROR = 0x00 ; const int RS_PEER_CERT_CLEANING_CODE_UNKOWN_ERROR = 0x01 ; const int RS_PEER_CERT_CLEANING_CODE_NO_BEGIN_TAG = 0x02 ; const int RS_PEER_CERT_CLEANING_CODE_NO_END_TAG = 0x03 ; const int RS_PEER_CERT_CLEANING_CODE_NO_CHECKSUM = 0x04 ; const int RS_PEER_CERT_CLEANING_CODE_WRONG_NUMBER = 0x05 ; const int RS_PEER_CERT_CLEANING_CODE_WRONG_RADIX_CHAR = 0x06 ; const uint32_t CERTIFICATE_PARSING_ERROR_NO_ERROR = 0x10 ; const uint32_t CERTIFICATE_PARSING_ERROR_SIZE_ERROR = 0x11 ; const uint32_t CERTIFICATE_PARSING_ERROR_INVALID_LOCATION_ID = 0x12 ; const uint32_t CERTIFICATE_PARSING_ERROR_INVALID_EXTERNAL_IP = 0x13 ; const uint32_t CERTIFICATE_PARSING_ERROR_INVALID_LOCAL_IP = 0x14 ; const uint32_t CERTIFICATE_PARSING_ERROR_INVALID_CHECKSUM_SECTION = 0x15 ; const uint32_t CERTIFICATE_PARSING_ERROR_CHECKSUM_ERROR = 0x16 ; const uint32_t CERTIFICATE_PARSING_ERROR_UNKNOWN_SECTION_PTAG = 0x17 ; const uint32_t CERTIFICATE_PARSING_ERROR_MISSING_CHECKSUM = 0x18 ; const uint32_t CERTIFICATE_PARSING_ERROR_WRONG_VERSION = 0x19 ; const uint32_t CERTIFICATE_PARSING_ERROR_MISSING_PGP_FINGERPRINT = 0x1a ; const uint32_t CERTIFICATE_PARSING_ERROR_MISSING_LOCATION_ID = 0x1b ; const uint32_t PGP_KEYRING_REMOVAL_ERROR_NO_ERROR = 0x20 ; const uint32_t PGP_KEYRING_REMOVAL_ERROR_CANT_REMOVE_SECRET_KEYS = 0x21 ; const uint32_t PGP_KEYRING_REMOVAL_ERROR_CANNOT_CREATE_BACKUP = 0x22 ; const uint32_t PGP_KEYRING_REMOVAL_ERROR_CANNOT_WRITE_BACKUP = 0x23 ; const uint32_t PGP_KEYRING_REMOVAL_ERROR_DATA_INCONSISTENCY = 0x24 ; /* LinkType Flags */ // CONNECTION const uint32_t RS_NET_CONN_TRANS_MASK = 0x0000ffff; const uint32_t RS_NET_CONN_TRANS_TCP_MASK = 0x0000000f; const uint32_t RS_NET_CONN_TRANS_TCP_UNKNOWN = 0x00000001; const uint32_t RS_NET_CONN_TRANS_TCP_LOCAL = 0x00000002; const uint32_t RS_NET_CONN_TRANS_TCP_EXTERNAL = 0x00000004; const uint32_t RS_NET_CONN_TRANS_UDP_MASK = 0x000000f0; const uint32_t RS_NET_CONN_TRANS_UDP_UNKNOWN = 0x00000010; const uint32_t RS_NET_CONN_TRANS_UDP_DIRECT = 0x00000020; const uint32_t RS_NET_CONN_TRANS_UDP_PROXY = 0x00000040; const uint32_t RS_NET_CONN_TRANS_UDP_RELAY = 0x00000080; const uint32_t RS_NET_CONN_TRANS_OTHER_MASK = 0x00000f00; const uint32_t RS_NET_CONN_TRANS_UNKNOWN = 0x00001000; const uint32_t RS_NET_CONN_SPEED_MASK = 0x000f0000; const uint32_t RS_NET_CONN_SPEED_UNKNOWN = 0x00000000; const uint32_t RS_NET_CONN_SPEED_TRICKLE = 0x00010000; const uint32_t RS_NET_CONN_SPEED_LOW = 0x00020000; const uint32_t RS_NET_CONN_SPEED_NORMAL = 0x00040000; const uint32_t RS_NET_CONN_SPEED_HIGH = 0x00080000; const uint32_t RS_NET_CONN_QUALITY_MASK = 0x00f00000; const uint32_t RS_NET_CONN_QUALITY_UNKNOWN = 0x00000000; // THIS INFO MUST BE SUPPLIED BY PEERMGR.... const uint32_t RS_NET_CONN_TYPE_MASK = 0x0f000000; const uint32_t RS_NET_CONN_TYPE_UNKNOWN = 0x00000000; const uint32_t RS_NET_CONN_TYPE_ACQUAINTANCE = 0x01000000; const uint32_t RS_NET_CONN_TYPE_FRIEND = 0x02000000; const uint32_t RS_NET_CONN_TYPE_SERVER = 0x04000000; const uint32_t RS_NET_CONN_TYPE_CLIENT = 0x08000000; // working state of proxy const uint32_t RS_NET_PROXY_STATUS_UNKNOWN = 0x0000 ; const uint32_t RS_NET_PROXY_STATUS_OK = 0x0001 ; // Potential certificate parsing errors. /* Groups */ static const RsNodeGroupId RS_GROUP_ID_FRIENDS ("00000000000000000000000000000001"); static const RsNodeGroupId RS_GROUP_ID_FAMILY ("00000000000000000000000000000002"); static const RsNodeGroupId RS_GROUP_ID_COWORKERS ("00000000000000000000000000000003"); static const RsNodeGroupId RS_GROUP_ID_OTHERS ("00000000000000000000000000000004"); static const RsNodeGroupId RS_GROUP_ID_FAVORITES ("00000000000000000000000000000005"); #define RS_GROUP_DEFAULT_NAME_FRIENDS "Friends" #define RS_GROUP_DEFAULT_NAME_FAMILY "Family" #define RS_GROUP_DEFAULT_NAME_COWORKERS "Co-Workers" #define RS_GROUP_DEFAULT_NAME_OTHERS "Other Contacts" #define RS_GROUP_DEFAULT_NAME_FAVORITES "Favorites" const uint32_t RS_GROUP_FLAG_STANDARD = 0x0001; /* A couple of helper functions for translating the numbers games */ std::string RsPeerTrustString(uint32_t trustLvl); std::string RsPeerNetModeString(uint32_t netModel); std::string RsPeerLastConnectString(uint32_t lastConnect); //===================================================================================================// // Connexion and security events // //===================================================================================================// enum class RsAuthSslError: uint8_t { // NO_ERROR = 0x00, // enabling break windows build MISSING_AUTHENTICATION_INFO = 0x01, PGP_SIGNATURE_VALIDATION_FAILED = 0x02, MISMATCHED_PGP_ID = 0x03, NO_CERTIFICATE_SUPPLIED = 0x04, NOT_A_FRIEND = 0x05, MISSING_CERTIFICATE = 0x06, IP_IS_BLACKLISTED = 0x07, PEER_REFUSED_CONNECTION = 0x08, UNKNOWN_ERROR = 0x09, }; /** * Event triggered by AuthSSL when authentication of a connection attempt either * fail or success */ struct RsAuthSslConnectionAutenticationEvent : RsEvent { RsAuthSslConnectionAutenticationEvent() : RsEvent(RsEventType::AUTHSSL_CONNECTION_AUTENTICATION) {} RsPeerId mSslId; std::string mSslCn; RsPgpId mPgpId; RsUrl mLocator; std::string mErrorMsg; RsAuthSslError mErrorCode; ///* @see RsEvent @see RsSerializable void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext& ctx) override { RsEvent::serial_process(j, ctx); RS_SERIAL_PROCESS(mSslId); RS_SERIAL_PROCESS(mSslCn); RS_SERIAL_PROCESS(mPgpId); RS_SERIAL_PROCESS(mLocator); RS_SERIAL_PROCESS(mErrorMsg); RS_SERIAL_PROCESS(mErrorCode); } ~RsAuthSslConnectionAutenticationEvent() override; }; enum class RsConnectionEventCode: uint8_t { UNKNOWN = 0x00, PEER_CONNECTED = 0x01, PEER_DISCONNECTED = 0x02, PEER_TIME_SHIFT = 0x03, // mTimeShift = time shift in seconds PEER_REPORTS_WRONG_IP = 0x04, // mPeerLocator = address reported, mOwnLocator = own address PEER_ADDED = 0x05, PEER_REMOVED = 0x06, }; struct RsConnectionEvent : RsEvent { RsConnectionEvent() : RsEvent(RsEventType::PEER_CONNECTION), mConnectionInfoCode(RsConnectionEventCode::UNKNOWN), mTimeShift(0) {} RsConnectionEventCode mConnectionInfoCode; RsPeerId mSslId; RsUrl mOwnLocator; RsUrl mReportedLocator; /** If there is a time shift with the peer aka * mConnectionInfoCode == PEER_TIME_SHIFT contains the time shift value in * seconds */ rstime_t mTimeShift; ///* @see RsEvent @see RsSerializable void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext& ctx ) override { RsEvent::serial_process(j, ctx); RS_SERIAL_PROCESS(mConnectionInfoCode); RS_SERIAL_PROCESS(mSslId); RS_SERIAL_PROCESS(mOwnLocator); RS_SERIAL_PROCESS(mReportedLocator); RS_SERIAL_PROCESS(mTimeShift); } ~RsConnectionEvent() override; }; enum class RsNetworkEventCode: uint8_t { UNKNOWN = 0x00, LOCAL_IP_UPDATED = 0x01, EXTERNAL_IP_UPDATED = 0x02, DNS_UPDATED = 0x03, }; struct RsNetworkEvent : RsEvent { RsNetworkEvent() : RsEvent(RsEventType::NETWORK), mNetworkEventCode(RsNetworkEventCode::UNKNOWN){} RsNetworkEventCode mNetworkEventCode; std::string mIPAddress; // local or external IP depending on the event type std::string mDNS; // local or external IP depending on the event type ///* @see RsEvent @see RsSerializable void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext& ctx ) override { RsEvent::serial_process(j, ctx); RS_SERIAL_PROCESS(mNetworkEventCode); RS_SERIAL_PROCESS(mIPAddress); RS_SERIAL_PROCESS(mDNS); } }; //===================================================================================================// // Peer Details // //===================================================================================================// /* We should definitely split this into 2 sub-structures: * PGP info (or profile info) with all info related to PGP keys * peer info: all network related information * * Plus top level information: * isOnlyPgpDetail (this could be obsolete if the methods to query about PGP info is a different function) * peer Id */ struct RsPeerDetails : RsSerializable { RsPeerDetails(); /* Auth details */ bool isOnlyGPGdetail; RsPeerId id; RsPgpId gpg_id; std::string name; std::string email; std::string location; std::string org; RsPgpId issuer; RsPgpFingerprint fpr; /* pgp fingerprint */ std::string authcode; // TODO: 2015/12/31 (cyril) what is this used for ????? std::list gpgSigners; uint32_t trustLvl; uint32_t validLvl; bool skip_pgp_signature_validation; bool ownsign; /* we have signed the remote peer GPG key */ bool hasSignedMe; /* the remote peer has signed my GPG key */ bool accept_connection; /* Peer permission flags. What services the peer can use (Only valid if friend).*/ ServicePermissionFlags service_perm_flags ; /* Network details (only valid if friend) */ uint32_t state; bool actAsServer; // TODO: 2015/12/31 to take advantage of multiple connection this must be // replaced by a set of addresses std::string connectAddr ; // current address if connected. uint16_t connectPort ; // Hidden Node details. bool isHiddenNode; std::string hiddenNodeAddress; uint16_t hiddenNodePort; uint32_t hiddenType; // Filled in for Standard Node. std::string localAddr; uint16_t localPort; std::string extAddr; uint16_t extPort; std::string dyndns; std::list ipAddressList; uint32_t netMode; /* vis State */ uint16_t vs_disc; uint16_t vs_dht; /* basic stats */ uint32_t lastConnect; /* how long ago */ uint32_t lastUsed; /* how long ago since last used: signature verif, connect attempt, etc */ uint32_t connectState; /* RS_PEER_CONNECTSTATE_... */ std::string connectStateString; /* Additional string like ip address */ uint32_t connectPeriod; bool foundDHT; /* have we been denied */ bool wasDeniedConnection; rstime_t deniedTS; /* linkType */ uint32_t linkType; /// @see RsSerializable virtual void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext& ctx ) { RS_SERIAL_PROCESS(isOnlyGPGdetail); RS_SERIAL_PROCESS(id); RS_SERIAL_PROCESS(gpg_id); RS_SERIAL_PROCESS(name); RS_SERIAL_PROCESS(email); RS_SERIAL_PROCESS(location); RS_SERIAL_PROCESS(org); RS_SERIAL_PROCESS(issuer); RS_SERIAL_PROCESS(fpr); RS_SERIAL_PROCESS(authcode); RS_SERIAL_PROCESS(gpgSigners); RS_SERIAL_PROCESS(trustLvl); RS_SERIAL_PROCESS(validLvl); RS_SERIAL_PROCESS(ownsign); RS_SERIAL_PROCESS(hasSignedMe); RS_SERIAL_PROCESS(accept_connection); RS_SERIAL_PROCESS(service_perm_flags); RS_SERIAL_PROCESS(state); RS_SERIAL_PROCESS(actAsServer); RS_SERIAL_PROCESS(connectAddr); RS_SERIAL_PROCESS(connectPort); RS_SERIAL_PROCESS(isHiddenNode); RS_SERIAL_PROCESS(hiddenNodeAddress); RS_SERIAL_PROCESS(hiddenNodePort); RS_SERIAL_PROCESS(hiddenType); RS_SERIAL_PROCESS(localAddr); RS_SERIAL_PROCESS(localPort); RS_SERIAL_PROCESS(extAddr); RS_SERIAL_PROCESS(extPort); RS_SERIAL_PROCESS(dyndns); RS_SERIAL_PROCESS(ipAddressList); RS_SERIAL_PROCESS(netMode); RS_SERIAL_PROCESS(vs_disc); RS_SERIAL_PROCESS(vs_dht); RS_SERIAL_PROCESS(lastConnect); RS_SERIAL_PROCESS(lastUsed); RS_SERIAL_PROCESS(connectState); RS_SERIAL_PROCESS(connectStateString); RS_SERIAL_PROCESS(connectPeriod); RS_SERIAL_PROCESS(foundDHT); RS_SERIAL_PROCESS(wasDeniedConnection); RS_SERIAL_PROCESS(deniedTS); RS_SERIAL_PROCESS(linkType); } }; // This class is used to get info about crytographic algorithms used with a // particular peer. struct RsPeerCryptoParams { int connexion_state; std::string cipher_name; }; struct RsGroupInfo : RsSerializable { RsGroupInfo(); RsNodeGroupId id; std::string name; uint32_t flag; std::set peerIds; /// @see RsSerializable void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext &ctx) { RS_SERIAL_PROCESS(id); RS_SERIAL_PROCESS(name); RS_SERIAL_PROCESS(flag); RS_SERIAL_PROCESS(peerIds); } }; /** Event emitted when a peer change state */ struct RsPeerStateChangedEvent : RsEvent { /// @param[in] sslId is of the peer which changed state explicit RsPeerStateChangedEvent(RsPeerId sslId); /// Storage fot the id of the peer that changed state RsPeerId mSslId; void serial_process( RsGenericSerializer::SerializeJob j, RsGenericSerializer::SerializeContext& ctx) override { RsEvent::serial_process(j, ctx); RS_SERIAL_PROCESS(mSslId); } }; enum class RetroshareInviteFlags:uint32_t { NOTHING = 0x00, CURRENT_LOCAL_IP = 0x01, FULL_IP_HISTORY = 0x02, DNS = 0x04, RADIX_FORMAT = 0x08, PGP_SIGNATURES = 0x10, CURRENT_EXTERNAL_IP = 0x20, SLICE_TO_80_CHARS = 0x40, ALL = 0xff, }; RS_REGISTER_ENUM_FLAGS_TYPE(RetroshareInviteFlags) /** The Main Interface Class - for information about your Peers * A peer is another RS instance, means associated with an SSL certificate * A same GPG person can have multiple peer running with different SSL certs * signed by the same GPG key * Thus a peer have SSL cert details, and also the parent GPG details */ class RsPeers { public: static const RetroshareInviteFlags defaultCertificateFlags ; // LOCAL_IP | EXTERNAL_IP | DNS /** * @brief Get own SSL peer id * @return own peer id */ virtual RsPeerId getOwnId() = 0; virtual bool haveSecretKey(const RsPgpId& gpg_id) = 0 ; /** * @brief Get trusted peers list * @jsonapi{development} * @param[out] sslIds storage for the trusted peers * @return false if error occurred, true otherwise */ virtual bool getFriendList(std::list& sslIds) = 0; /** * @brief Get trusted PGP ids list * @jsonapi{development} * @param[out] pgpIds storage for the trusted PGP ids * @return false if error occurred, true otherwise */ virtual bool getPgpFriendList(std::vector& pgpIds) = 0; /** * @brief Get connected peers list * @jsonapi{development} * @param[out] sslIds storage for the peers * @return false if error occurred, true otherwise */ virtual bool getOnlineList(std::list &sslIds) = 0; /** * @brief Get peers count * @jsonapi{development} * @param[out] peersCount storage for trusted peers count * @param[out] onlinePeersCount storage for online peers count * @param[in] countLocations true to count multiple locations of same owner * @return false if error occurred, true otherwise */ virtual bool getPeersCount( uint32_t& peersCount, uint32_t& onlinePeersCount, bool countLocations = true ) = 0; RS_DEPRECATED virtual bool getPeerCount(unsigned int *pnFriendCount, unsigned int *pnnOnlineCount, bool ssl) = 0; /** * @brief Check if there is an established connection to the given peer * @jsonapi{development} * @param[in] sslId id of the peer to check * @return true if the connection is establisced, false otherwise */ virtual bool isOnline(const RsPeerId &sslId) = 0; /** * @brief Check if given peer is a trusted node * @jsonapi{development} * @param[in] sslId id of the peer to check * @return true if the node is trusted, false otherwise */ virtual bool isFriend(const RsPeerId& sslId) = 0; /** * @brief Check if given PGP id is trusted * @jsonapi{development} * @param[in] pgpId PGP id to check * @return true if the PGP id is trusted, false otherwise */ virtual bool isPgpFriend(const RsPgpId& pgpId) = 0; /** * @brief Check if given peer is a trusted SSL node pending PGP approval * Peers added through short invite remain in this state as long as their * PGP key is not received and verified/approved by the user. * @jsonapi{development} * @param[in] sslId id of the peer to check * @return true if the node is trusted, false otherwise */ virtual bool isSslOnlyFriend(const RsPeerId& sslId) = 0; virtual std::string getPeerName(const RsPeerId &ssl_id) = 0; virtual std::string getGPGName(const RsPgpId& gpg_id) = 0; /** * @brief Get details details of the given peer * @jsonapi{development} * @param[in] sslId id of the peer * @param[out] det storage for the details of the peer * @return false if error occurred, true otherwise */ virtual bool getPeerDetails(const RsPeerId& sslId, RsPeerDetails& det) = 0; virtual bool getGPGDetails(const RsPgpId& gpg_id, RsPeerDetails &d) = 0; /* Using PGP Ids */ virtual const RsPgpId& getGPGOwnId() = 0; /** * @brief Get PGP id for the given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer * @return PGP id of the peer */ virtual RsPgpId getGPGId(const RsPeerId& sslId) = 0; virtual bool isKeySupported(const RsPgpId& gpg_ids) = 0; RS_DEPRECATED_FOR(getPgpFriendList) virtual bool getGPGAcceptedList(std::list &gpg_ids) = 0; virtual bool getGPGSignedList(std::list &gpg_ids) = 0;// keys signed by our own PGP key. virtual bool getGPGValidList(std::list &gpg_ids) = 0;// all PGP keys without filtering virtual bool getGPGAllList(std::list &gpg_ids) = 0;// all PGP keys as well virtual bool getAssociatedSSLIds(const RsPgpId& gpg_id, std::list& ids) = 0; virtual bool gpgSignData(const void *data, const uint32_t len, unsigned char *sign, unsigned int *signlen, std::string reason = "") = 0; /** * @brief Convert PGP fingerprint to PGP id * @jsonapi{development} * Helper method useful while we port the whole RetroShare codebase from * RsPgpId to RsPgpFingerprint * @param[in] fpr PGP fingerprint to convert * @return PGP id corresponding to the fingerprint */ virtual RsPgpId pgpIdFromFingerprint(const RsPgpFingerprint& fpr) = 0; // Note: the two methods below could be unified. The fact that one of them can take an optional RsPeerDetails struct as parameter // seems quite inconsistent. /** * @brief Add trusted node * @jsonapi{development} * @param[in] sslId SSL id of the node to add * @param[in] gpgId PGP id of the node to add * @param[in] flags service permissions flag * @return false if error occurred, true otherwise */ virtual bool addFriend( const RsPeerId& sslId, const RsPgpId& gpgId, ServicePermissionFlags flags = RS_NODE_PERM_DEFAULT ) = 0; /** * @brief Add SSL-only trusted node * When adding an SSL-only node, it is authorized to connect. Every time a * connection is established the user is notified about the need to verify * the PGP fingerprint, until she does, at that point the node become a full * SSL+PGP friend. * @jsonapi{development} * @param[in] sslId SSL id of the node to add * @param[in] pgpId PGP id of the node to add. Will be used for validation when the key is available. * @param[in] details Optional extra details known about the node to add * @return false if error occurred, true otherwise */ virtual bool addSslOnlyFriend( const RsPeerId& sslId, const RsPgpId& pgpId, const RsPeerDetails& details = RsPeerDetails() ) = 0; /** * @brief Revoke connection trust from to node * @jsonapi{development} * @param[in] pgpId PGP id of the node * @return false if error occurred, true otherwise */ virtual bool removeFriend(const RsPgpId& pgpId) = 0; /** * @brief Remove location of a trusted node, useful to prune old unused * locations of a trusted peer without revoking trust * @jsonapi{development} * @param[in] sslId SSL id of the location to remove * @return false if error occurred, true otherwise */ virtual bool removeFriendLocation(const RsPeerId& sslId) = 0; /* keyring management */ virtual bool removeKeysFromPGPKeyring( const std::set& pgpIds, std::string& backupFile, uint32_t& errorCode ) = 0; /* Network Stuff */ /** * @brief Trigger connection attempt to given node * @jsonapi{development} * @param[in] sslId SSL id of the node to connect * @return false if error occurred, true otherwise */ virtual bool connectAttempt(const RsPeerId& sslId) = 0; virtual bool setLocation(const RsPeerId &ssl_id, const std::string &location) = 0; // location is shown in the gui to differentiate ssl certs virtual bool setHiddenNode(const RsPeerId &id, const std::string &hidden_node_address) = 0; virtual bool setHiddenNode(const RsPeerId &id, const std::string &address, uint16_t port) = 0; virtual bool isHiddenNode(const RsPeerId &id) = 0; /** * @brief Add URL locator for given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] locator peer url locator * @return false if error occurred, true otherwise */ virtual bool addPeerLocator(const RsPeerId& sslId, const RsUrl& locator) = 0; /** * @brief Set local IPv4 address for the given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] addr string representation of the local IPv4 address * @param[in] port local listening port * @return false if error occurred, true otherwise */ virtual bool setLocalAddress( const RsPeerId& sslId, const std::string& addr, uint16_t port ) = 0; /** * @brief Set external IPv4 address for given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] addr string representation of the external IPv4 address * @param[in] port external listening port * @return false if error occurred, true otherwise */ virtual bool setExtAddress( const RsPeerId& sslId, const std::string &addr, uint16_t port ) = 0; /** * @brief Set (dynamical) domain name associated to the given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] addr domain name string representation * @return false if error occurred, true otherwise */ virtual bool setDynDNS(const RsPeerId& sslId, const std::string& addr) = 0; /** * @brief Set network mode of the given peer * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] netMode one of RS_NETMODE_* * @return false if error occurred, true otherwise */ virtual bool setNetworkMode(const RsPeerId &sslId, uint32_t netMode) = 0; /** * @brief set DHT and discovery modes * @jsonapi{development} * @param[in] sslId SSL id of the peer, own id is accepted too * @param[in] vsDisc one of RS_VS_DISC_* * @param[in] vsDht one of RS_VS_DHT_* * @return false if error occurred, true otherwise */ virtual bool setVisState( const RsPeerId& sslId, uint16_t vsDisc, uint16_t vsDht ) = 0; /** * @brief getProxyServer get the proxy details of TOR/I2P * @jsonapi{development} * @param[in] type one of RS_HIDDEN_TYPE_* * @param[out] addr string containing proxy address * @param[out] port port number of type uint16_t * @param[out] status_flags flags which tells the status of the proxy * @return always true */ virtual bool getProxyServer(const uint32_t type, std::string &addr, uint16_t &port,uint32_t& status_flags) = 0; /** * @brief setProxyServer set the proxy details of TOR/I2P * @jsonapi{development} * @param[in] type one of RS_HIDDEN_TYPE_* * @param[in] addr string containing proxy address to be set * @param[in] port port number of type uint16_t to be set * @return false if error occured, true otherwise */ virtual bool setProxyServer(const uint32_t type, const std::string &addr, const uint16_t port) = 0; virtual void getIPServersList(std::list& ip_servers) = 0; virtual void getCurrentExtIPList(std::list& ip_list) = 0; virtual void allowServerIPDetermination(bool) = 0; virtual bool resetOwnExternalAddressList() = 0; virtual bool getAllowServerIPDetermination() = 0 ; /** * @brief Get RetroShare invite of the given peer * @jsonapi{development} * @param[in] sslId Id of the peer of which we want to generate an invite, * a null id (all 0) is passed, an invite for own node is returned. * @param[in] inviteFlags specify extra data to include in the invite * @return invite string */ virtual std::string GetRetroshareInvite( const RsPeerId& sslId = RsPeerId(), RetroshareInviteFlags inviteFlags = RsPeers::defaultCertificateFlags ) = 0; /** * @brief Get RetroShare short invite of the given peer * @jsonapi{development} * @param[out] invite storage for the generated invite * @param[in] sslId Id of the peer of which we want to generate an invite, * a null id (all 0) is passed, an invite for own node is returned. * @param[in] inviteFlags specify extra data to include in the invite and * format. * @param[in] baseUrl URL into which to sneak in the RetroShare invite * radix, this is primarly useful to trick other applications into making * the invite clickable, or to disguise the RetroShare invite into a * "normal" looking web link. Used only if formatRadix is false. * @return false if error occurred, true otherwise */ virtual bool getShortInvite( std::string& invite, const RsPeerId& sslId = RsPeerId(), RetroshareInviteFlags inviteFlags = RsPeers::defaultCertificateFlags, const std::string& baseUrl = "https://me.retroshare.cc/" ) = 0; /** * @brief Parse the give short invite to extract contained information * @jsonapi{development} * @param[in] invite string containing the short invite to parse. Radix64 format only. * @param[out] details storage for the extracted information, consider it * @param[out] err_code storage for the error code * @return false if error occurred, true otherwise */ virtual bool parseShortInvite( const std::string& invite, RsPeerDetails& details,uint32_t& err_code ) = 0; /** * @brief Add trusted node from invite * @jsonapi{development} * @param[in] invite invite string being it in cert or URL format * @param[in] flags service permissions flag * @return false if error occurred, true otherwise */ virtual bool acceptInvite( const std::string& invite, ServicePermissionFlags flags = RS_NODE_PERM_DEFAULT ) = 0; RS_DEPRECATED /// This function doesn't provide meaningful error reporting virtual std::string getPGPKey(const RsPgpId& pgp_id,bool include_signatures) = 0; virtual bool GetPGPBase64StringAndCheckSum(const RsPgpId& gpg_id,std::string& gpg_base64_string,std::string& gpg_base64_checksum) = 0; /** * @brief Import certificate into the keyring * @jsonapi{development} * @param[in] cert string representation of the certificate * @param[out] sslId storage for the SSL id of the certificate * @param[out] pgpId storage for the PGP id of the certificate * @param[out] errorString storage for the possible error string * @return false if error occurred, true otherwise */ virtual bool loadCertificateFromString( const std::string& cert, RsPeerId& sslId, RsPgpId& pgpId, std::string& errorString) = 0; /** * @brief Examine certificate and get details without importing into * the keyring * @jsonapi{development} * @param[in] cert string representation of the certificate * @param[out] certDetails storage for the certificate details * @param[out] errorCode storage for possible error number * @return false if error occurred, true otherwise */ virtual bool loadDetailsFromStringCert( const std::string& cert, RsPeerDetails& certDetails, uint32_t& errorCode ) = 0; virtual bool loadPgpKeyFromBinaryData( const unsigned char *bin_key_data, uint32_t bin_key_len, RsPgpId& gpg_id, std::string& error_string )=0; // Certificate utils virtual bool cleanCertificate( const std::string& certstr, std::string& cleanCert, bool& is_short_format, uint32_t& error_code, RsPeerDetails& details) = 0; virtual std::string saveCertificateToString(const RsPeerId &id) = 0; virtual bool signGPGCertificate(const RsPgpId &gpg_id,const std::string& gpg_passphrase) = 0; virtual bool trustGPGCertificate(const RsPgpId &gpg_id, uint32_t trustlvl) = 0; /* Group Stuff */ /** * @brief addGroup create a new group * @jsonapi{development} * @param[in] groupInfo * @return */ virtual bool addGroup(RsGroupInfo& groupInfo) = 0; /** * @brief editGroup edit an existing group * @jsonapi{development} * @param[in] groupId * @param[in] groupInfo * @return */ virtual bool editGroup(const RsNodeGroupId& groupId, RsGroupInfo& groupInfo) = 0; /** * @brief removeGroup remove a group * @jsonapi{development} * @param[in] groupId * @return */ virtual bool removeGroup(const RsNodeGroupId& groupId) = 0; /** * @brief getGroupInfo get group information to one group * @jsonapi{development} * @param[in] groupId * @param[out] groupInfo * @return */ virtual bool getGroupInfo(const RsNodeGroupId& groupId, RsGroupInfo& groupInfo) = 0; /** * @brief getGroupInfoByName get group information by group name * @jsonapi{development} * @param[in] groupName * @param[out] groupInfo * @return */ virtual bool getGroupInfoByName(const std::string& groupName, RsGroupInfo& groupInfo) = 0; /** * @brief getGroupInfoList get list of all groups * @jsonapi{development} * @param[out] groupInfoList * @return */ virtual bool getGroupInfoList(std::list& groupInfoList) = 0; // groupId == "" && assign == false -> remove from all groups /** * @brief assignPeerToGroup add a peer to a group * @jsonapi{development} * @param[in] groupId * @param[in] peerId * @param[in] assign true to assign a peer, false to remove a peer * @return */ virtual bool assignPeerToGroup(const RsNodeGroupId& groupId, const RsPgpId& peerId, bool assign) = 0; /** * @brief assignPeersToGroup add a list of peers to a group * @jsonapi{development} * @param[in] groupId * @param[in] peerIds * @param[in] assign true to assign a peer, false to remove a peer * @return */ virtual bool assignPeersToGroup(const RsNodeGroupId& groupId, const std::list& peerIds, bool assign) = 0; /* Group sharing permission */ // Given // - the peer id // - the permission flags of a given hash, e.g. a combination of // RS_DIR_FLAGS_NETWORK_WIDE_OTHERS, RS_DIR_FLAGS_NETWORK_WIDE_GROUPS, RS_DIR_FLAGS_BROWSABLE_OTHERS and RS_DIR_FLAGS_BROWSABLE_GROUPS // - the parent groups of the file // // ... computes the sharing file permission hint flags set for this peer, that is a combination of // RS_FILE_HINTS_NETWORK_WIDE and RS_FILE_HINTS_BROWSABLE. // virtual FileSearchFlags computePeerPermissionFlags( const RsPeerId& peer_id, FileStorageFlags file_sharing_flags, const std::list& file_parent_groups) = 0; /* Service permission flags */ virtual ServicePermissionFlags servicePermissionFlags(const RsPgpId& gpg_id) = 0; virtual ServicePermissionFlags servicePermissionFlags(const RsPeerId& ssl_id) = 0; virtual void setServicePermissionFlags(const RsPgpId& gpg_id,const ServicePermissionFlags& flags) = 0; virtual bool setPeerMaximumRates(const RsPgpId& pid,uint32_t maxUploadRate,uint32_t maxDownloadRate) =0; virtual bool getPeerMaximumRates(const RsPeerId& pid,uint32_t& maxUploadRate,uint32_t& maxDownloadRate) =0; virtual bool getPeerMaximumRates(const RsPgpId& pid,uint32_t& maxUploadRate,uint32_t& maxDownloadRate) =0; RS_DEPRECATED_FOR(isPgpFriend) virtual bool isGPGAccepted(const RsPgpId &gpg_id_is_friend) = 0; virtual ~RsPeers(); };