It's running in a signed applet.

On Sat, Sep 22, 2012 at 6:27 PM, Greg Bildson <[email protected]> wrote:

> Is it running in the normal security context or a signed app?
>
>
>   ------------------------------
> *From:* Will Holcomb <[email protected]>
> *To:* P2P Hackers <[email protected]>
> *Sent:* Saturday, September 22, 2012 1:02 PM
> *Subject:* [p2p-hackers] porting the clj-telehash chat demo to rhino
>
> The clojure telehash 
> project<https://www.assembla.com/code/clj-telehash/git/nodes>includes a chat 
> application as one of the samples. I have been attempting
> to port it to run in the 
> browser<http://will.tip.dhappy.org/lib/telehash/demo/chat/>as a rhino script 
> executing in a java applet.
>
> The application never finds any other switches (counterpartySwitchForEndFound
> is never called). I'm hoping that maybe someone here can tell me what I'm
> missing.
>
> var InterestingEndsHolderImpl =
> Packages.telehash.switchimpl.api.InterestingEndsHolderImpl
> var ApplicationPortImpl =
> Packages.telehash.switchimpl.api.ApplicationPortImpl
>
> var interestingEndsHolder = new InterestingEndsHolderImpl()
> var applicationPort = new ApplicationPortImpl()
>
> var SwitchListener = Packages.telehash.api.SwitchListener
> var TelexListener = Packages.telehash.api.TelexListener
>
> applicationPort.addSwitchListener( new SwitchListener( {
>     counterpartySwitchForEndFound : function( hash, counterpartySwitch ) {
>     print( "counterpartySwitchForEndFound: " + hash )
>         if( ! applicationPort.hash( self ).equals( hash ) ) {
>             interestingEndsHolder.put( hash, counterpartySwitch )
>
>             if( counterpartySwitch.isConnected() ) {
>                 print( "Switch Connected: " + counterpartySwitch.getIP() +
> ":" + counterpartySwitch.getPort() )
>             }
>
>             var telexListenerScope = counterpartySwitch.addTelexListener(
> new TelexListener( {
>                 receivedTelex : function( telex ) {
>                     print( 'Recieved telex:' )
>                     if( telex.containsKey( 'simplechat' ) ) {
>                         var chat_telex = telex.get( 'simplechat' )
>                         print( contactName + ": " + chat_telex.get( 'msg'
> ).toString() )
>                     }
>                 }
>             } ) )
>         }
>     }
> } ) )
>
> applicationPort.startSwitch()
>
> print( "Adding Own End: " + applicationPort.hash( username ) )
> applicationPort.addOwnEnd( applicationPort.hash( username ) )
>
> print( "Adding Other End: " + applicationPort.hash( contactName ) )
> applicationPort.addOtherEnd( applicationPort.hash( contactName ) )
>
> You can run this code by checking out the git 
> repo<https://github.com/wholcomb/telehash-demo>and running: java
> -classpath
> /usr/share/java/js.jar:/usr/share/java/jline.jar:lib/telehash/jar
> org.mozilla.javascript.tools.shell.Main test/clj-telehash/rhino
>
> Currently it outputs:
>
> Adding Own End: 3e3e5802bd4cad8e29e144b515307d8204a3202a
> Adding Other End: da6645f6e22bf5f75974dc7eed5fcd6160d6b51e
> "Starting other threads ..."
>
> I've run 
> wireshark<http://will.tip.dhappy.org/lib/telehash/demo/chat/packet/log>and 
> there is definitely traffic. Any help would be much appreciated.
>
> -Will
>
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to