2019-08-07 20:44:33 +03:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io"
|
2019-09-04 11:48:05 +03:00
|
|
|
"time"
|
2019-08-11 20:11:33 +03:00
|
|
|
|
|
|
|
"github.com/micro/go-micro/util/log"
|
2019-08-07 20:44:33 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
type tunListener struct {
|
|
|
|
// address of the listener
|
2019-08-30 22:05:00 +03:00
|
|
|
channel string
|
2019-11-25 21:56:00 +03:00
|
|
|
// token is the tunnel token
|
|
|
|
token string
|
2019-08-07 20:44:33 +03:00
|
|
|
// the accept channel
|
2019-08-30 22:05:00 +03:00
|
|
|
accept chan *session
|
2019-08-07 20:44:33 +03:00
|
|
|
// the channel to close
|
|
|
|
closed chan bool
|
2019-08-08 17:20:53 +03:00
|
|
|
// the tunnel closed channel
|
|
|
|
tunClosed chan bool
|
2019-08-30 22:05:00 +03:00
|
|
|
// the listener session
|
|
|
|
session *session
|
2019-09-04 11:48:05 +03:00
|
|
|
// del func to kill listener
|
|
|
|
delFunc func()
|
|
|
|
}
|
|
|
|
|
2019-12-06 02:11:42 +03:00
|
|
|
// periodically announce self the channel being listened on
|
2019-09-04 11:48:05 +03:00
|
|
|
func (t *tunListener) announce() {
|
2019-09-05 17:16:11 +03:00
|
|
|
tick := time.NewTicker(time.Second * 30)
|
2019-09-04 11:48:05 +03:00
|
|
|
defer tick.Stop()
|
|
|
|
|
|
|
|
// first announcement
|
2019-09-04 13:58:03 +03:00
|
|
|
t.session.Announce()
|
2019-09-04 11:48:05 +03:00
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-tick.C:
|
2019-09-04 13:58:03 +03:00
|
|
|
t.session.Announce()
|
2019-09-04 11:48:05 +03:00
|
|
|
case <-t.closed:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *tunListener) process() {
|
|
|
|
// our connection map for session
|
2019-08-30 22:05:00 +03:00
|
|
|
conns := make(map[string]*session)
|
2019-08-07 20:44:33 +03:00
|
|
|
|
2019-09-04 11:48:05 +03:00
|
|
|
defer func() {
|
|
|
|
// close the sessions
|
2019-12-06 02:11:42 +03:00
|
|
|
for id, conn := range conns {
|
2019-09-04 11:48:05 +03:00
|
|
|
conn.Close()
|
2019-12-06 02:11:42 +03:00
|
|
|
delete(conns, id)
|
2019-09-04 11:48:05 +03:00
|
|
|
}
|
2019-12-06 02:11:42 +03:00
|
|
|
// unassign
|
|
|
|
conns = nil
|
2019-09-04 11:48:05 +03:00
|
|
|
}()
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
2019-09-04 11:48:05 +03:00
|
|
|
case <-t.tunClosed:
|
|
|
|
t.Close()
|
|
|
|
return
|
2019-08-07 20:44:33 +03:00
|
|
|
// receive a new message
|
2019-08-30 22:05:00 +03:00
|
|
|
case m := <-t.session.recv:
|
2019-12-06 02:11:42 +03:00
|
|
|
var sessionId string
|
|
|
|
|
|
|
|
// get the session id
|
|
|
|
switch m.mode {
|
|
|
|
case Multicast, Broadcast:
|
|
|
|
// use channel name if multicast/broadcast
|
|
|
|
sessionId = m.channel
|
|
|
|
log.Tracef("Tunnel listener using session %s for real session %s", sessionId, m.session)
|
|
|
|
default:
|
|
|
|
// use session id if unicast
|
|
|
|
sessionId = m.session
|
|
|
|
}
|
|
|
|
|
2019-08-30 22:05:00 +03:00
|
|
|
// get a session
|
2019-12-06 02:11:42 +03:00
|
|
|
sess, ok := conns[sessionId]
|
|
|
|
log.Debugf("Tunnel listener received channel %s session %s type %s exists: %t", m.channel, sessionId, m.typ, ok)
|
2019-08-07 20:44:33 +03:00
|
|
|
if !ok {
|
2019-11-30 04:14:40 +03:00
|
|
|
// we only process open and session types
|
2019-09-04 17:55:37 +03:00
|
|
|
switch m.typ {
|
|
|
|
case "open", "session":
|
|
|
|
default:
|
2019-09-04 11:48:05 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-08-30 22:05:00 +03:00
|
|
|
// create a new session session
|
|
|
|
sess = &session{
|
|
|
|
// the id of the remote side
|
2019-09-03 17:56:37 +03:00
|
|
|
tunnel: m.tunnel,
|
2019-08-30 22:05:00 +03:00
|
|
|
// the channel
|
|
|
|
channel: m.channel,
|
2019-08-07 20:44:33 +03:00
|
|
|
// the session id
|
2019-12-06 02:11:42 +03:00
|
|
|
session: sessionId,
|
2019-11-25 21:56:00 +03:00
|
|
|
// tunnel token
|
|
|
|
token: t.token,
|
2019-08-29 01:12:22 +03:00
|
|
|
// is loopback conn
|
|
|
|
loopback: m.loopback,
|
2019-08-29 14:42:27 +03:00
|
|
|
// the link the message was received on
|
|
|
|
link: m.link,
|
2019-10-15 17:40:04 +03:00
|
|
|
// set the connection mode
|
2019-12-01 22:36:16 +03:00
|
|
|
mode: m.mode,
|
2019-08-07 20:44:33 +03:00
|
|
|
// close chan
|
|
|
|
closed: make(chan bool),
|
|
|
|
// recv called by the acceptor
|
|
|
|
recv: make(chan *message, 128),
|
|
|
|
// use the internal send buffer
|
2019-08-30 22:05:00 +03:00
|
|
|
send: t.session.send,
|
|
|
|
// error channel
|
|
|
|
errChan: make(chan error, 1),
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
|
2019-08-30 22:05:00 +03:00
|
|
|
// save the session
|
2019-12-06 02:11:42 +03:00
|
|
|
conns[sessionId] = sess
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
2019-09-04 11:48:05 +03:00
|
|
|
// send to accept chan
|
2019-08-30 22:05:00 +03:00
|
|
|
case t.accept <- sess:
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
2019-09-04 11:48:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// an existing session was found
|
|
|
|
|
|
|
|
switch m.typ {
|
|
|
|
case "close":
|
2019-12-06 02:11:42 +03:00
|
|
|
// received a close message
|
2019-09-04 11:48:05 +03:00
|
|
|
select {
|
2019-12-06 02:11:42 +03:00
|
|
|
// check if the session is closed
|
2019-09-04 11:48:05 +03:00
|
|
|
case <-sess.closed:
|
|
|
|
// no op
|
2019-12-06 02:11:42 +03:00
|
|
|
delete(conns, sessionId)
|
2019-09-04 11:48:05 +03:00
|
|
|
default:
|
2019-12-06 02:11:42 +03:00
|
|
|
if sess.mode == Unicast {
|
|
|
|
// only close if unicast session
|
|
|
|
// close and delete session
|
|
|
|
close(sess.closed)
|
|
|
|
delete(conns, sessionId)
|
|
|
|
}
|
2019-09-04 11:48:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// continue
|
|
|
|
continue
|
|
|
|
case "session":
|
|
|
|
// operate on this
|
|
|
|
default:
|
|
|
|
// non operational type
|
|
|
|
continue
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// send this to the accept chan
|
|
|
|
select {
|
2019-08-30 22:05:00 +03:00
|
|
|
case <-sess.closed:
|
2019-12-06 02:11:42 +03:00
|
|
|
delete(conns, sessionId)
|
2019-08-30 22:05:00 +03:00
|
|
|
case sess.recv <- m:
|
2019-12-06 02:11:42 +03:00
|
|
|
log.Debugf("Tunnel listener sent to recv chan channel %s session %s type %s", m.channel, sessionId, m.typ)
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-30 22:05:00 +03:00
|
|
|
func (t *tunListener) Channel() string {
|
|
|
|
return t.channel
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
|
2019-08-08 17:20:53 +03:00
|
|
|
// Close closes tunnel listener
|
2019-08-07 20:44:33 +03:00
|
|
|
func (t *tunListener) Close() error {
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return nil
|
|
|
|
default:
|
2019-09-04 11:48:05 +03:00
|
|
|
// close and delete
|
|
|
|
t.delFunc()
|
|
|
|
t.session.Close()
|
2019-08-07 20:44:33 +03:00
|
|
|
close(t.closed)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Everytime accept is called we essentially block till we get a new connection
|
2019-08-30 22:05:00 +03:00
|
|
|
func (t *tunListener) Accept() (Session, error) {
|
2019-08-07 20:44:33 +03:00
|
|
|
select {
|
2019-08-30 22:05:00 +03:00
|
|
|
// if the session is closed return
|
2019-08-07 20:44:33 +03:00
|
|
|
case <-t.closed:
|
|
|
|
return nil, io.EOF
|
2019-08-08 17:20:53 +03:00
|
|
|
case <-t.tunClosed:
|
|
|
|
// close the listener when the tunnel closes
|
|
|
|
return nil, io.EOF
|
2019-08-07 20:44:33 +03:00
|
|
|
// wait for a new connection
|
|
|
|
case c, ok := <-t.accept:
|
2019-09-04 11:48:05 +03:00
|
|
|
// check if the accept chan is closed
|
2019-08-07 20:44:33 +03:00
|
|
|
if !ok {
|
|
|
|
return nil, io.EOF
|
|
|
|
}
|
2019-09-04 11:48:05 +03:00
|
|
|
// send back the accept
|
|
|
|
if err := c.Accept(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-08-07 20:44:33 +03:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
}
|