2019-08-05 19:41:48 +01:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
2019-08-07 18:44:33 +01:00
|
|
|
"errors"
|
2019-09-04 20:18:26 +01:00
|
|
|
"math/rand"
|
2019-08-30 20:05:00 +01:00
|
|
|
"strings"
|
2019-08-05 19:41:48 +01:00
|
|
|
"sync"
|
2019-08-15 16:52:16 +01:00
|
|
|
"time"
|
2019-08-05 19:41:48 +01:00
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
"github.com/google/uuid"
|
2020-07-27 13:22:00 +01:00
|
|
|
"github.com/micro/go-micro/v3/logger"
|
|
|
|
"github.com/micro/go-micro/v3/transport"
|
2019-08-05 19:41:48 +01:00
|
|
|
)
|
|
|
|
|
2019-08-15 16:52:16 +01:00
|
|
|
var (
|
2019-09-05 18:13:02 +01:00
|
|
|
// DiscoverTime sets the time at which we fire discover messages
|
2019-12-12 12:27:46 +00:00
|
|
|
DiscoverTime = 30 * time.Second
|
2019-08-15 18:18:58 +01:00
|
|
|
// KeepAliveTime defines time interval we send keepalive messages to outbound links
|
|
|
|
KeepAliveTime = 30 * time.Second
|
|
|
|
// ReconnectTime defines time interval we periodically attempt to reconnect dead links
|
|
|
|
ReconnectTime = 5 * time.Second
|
2020-08-06 18:50:35 +01:00
|
|
|
|
|
|
|
// create a logger
|
|
|
|
log = logger.NewHelper(logger.DefaultLogger).WithFields(map[string]interface{}{"package": "tunnel"})
|
2019-08-15 16:52:16 +01:00
|
|
|
)
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// tun represents a network tunnel
|
2019-08-05 19:41:48 +01:00
|
|
|
type tun struct {
|
2019-08-07 18:44:33 +01:00
|
|
|
options Options
|
|
|
|
|
2019-08-05 19:41:48 +01:00
|
|
|
sync.RWMutex
|
2019-08-07 18:44:33 +01:00
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// the unique id for this tunnel
|
|
|
|
id string
|
|
|
|
|
2019-11-25 18:56:00 +00:00
|
|
|
// tunnel token for session encryption
|
2019-08-13 20:11:23 +01:00
|
|
|
token string
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// to indicate if we're connected or not
|
2019-08-05 19:41:48 +01:00
|
|
|
connected bool
|
2019-08-07 18:44:33 +01:00
|
|
|
|
|
|
|
// the send channel for all messages
|
|
|
|
send chan *message
|
|
|
|
|
|
|
|
// close channel
|
|
|
|
closed chan bool
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// a map of sessions based on Micro-Tunnel-Channel
|
|
|
|
sessions map[string]*session
|
2019-08-07 18:44:33 +01:00
|
|
|
|
|
|
|
// outbound links
|
|
|
|
links map[string]*link
|
|
|
|
|
|
|
|
// listener
|
|
|
|
listener transport.Listener
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// create new tunnel on top of a link
|
|
|
|
func newTunnel(opts ...Option) *tun {
|
2019-12-12 12:27:46 +00:00
|
|
|
rand.Seed(time.Now().UnixNano())
|
2019-08-07 18:44:33 +01:00
|
|
|
options := DefaultOptions()
|
2019-08-05 19:41:48 +01:00
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
return &tun{
|
2019-08-30 20:05:00 +01:00
|
|
|
options: options,
|
|
|
|
id: options.Id,
|
|
|
|
token: options.Token,
|
|
|
|
send: make(chan *message, 128),
|
|
|
|
closed: make(chan bool),
|
|
|
|
sessions: make(map[string]*session),
|
|
|
|
links: make(map[string]*link),
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-08-05 19:41:48 +01:00
|
|
|
|
2019-08-14 13:26:23 +01:00
|
|
|
// Init initializes tunnel options
|
|
|
|
func (t *tun) Init(opts ...Option) error {
|
2019-08-22 16:31:37 +01:00
|
|
|
t.Lock()
|
2019-08-14 13:26:23 +01:00
|
|
|
for _, o := range opts {
|
|
|
|
o(&t.options)
|
|
|
|
}
|
2019-12-11 14:37:03 +00:00
|
|
|
t.Unlock()
|
2019-08-14 13:26:23 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// getSession returns a session from the internal session map.
|
|
|
|
// It does this based on the Micro-Tunnel-Channel and Micro-Tunnel-Session
|
|
|
|
func (t *tun) getSession(channel, session string) (*session, bool) {
|
|
|
|
// get the session
|
2019-08-07 18:44:33 +01:00
|
|
|
t.RLock()
|
2019-08-30 20:05:00 +01:00
|
|
|
s, ok := t.sessions[channel+session]
|
2019-08-07 18:44:33 +01:00
|
|
|
t.RUnlock()
|
|
|
|
return s, ok
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// delSession deletes a session if it exists
|
2019-09-04 09:48:05 +01:00
|
|
|
func (t *tun) delSession(channel, session string) {
|
|
|
|
t.Lock()
|
2019-11-30 01:14:40 +00:00
|
|
|
if s, ok := t.sessions[channel+session]; ok {
|
|
|
|
s.Close()
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
delete(t.sessions, channel+session)
|
|
|
|
t.Unlock()
|
|
|
|
}
|
|
|
|
|
2019-09-05 15:16:11 +01:00
|
|
|
// listChannels returns a list of listening channels
|
|
|
|
func (t *tun) listChannels() []string {
|
|
|
|
t.RLock()
|
|
|
|
|
2019-12-03 22:59:44 +03:00
|
|
|
//nolint:prealloc
|
2019-09-05 15:16:11 +01:00
|
|
|
var channels []string
|
|
|
|
for _, session := range t.sessions {
|
|
|
|
if session.session != "listener" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
channels = append(channels, session.channel)
|
|
|
|
}
|
2019-12-11 14:37:03 +00:00
|
|
|
|
|
|
|
t.RUnlock()
|
|
|
|
|
2019-09-05 15:16:11 +01:00
|
|
|
return channels
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// newSession creates a new session and saves it
|
2020-03-11 20:55:39 +03:00
|
|
|
func (t *tun) newSession(channel, sessionId string) (*session, bool, error) {
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// new session
|
|
|
|
s := &session{
|
2019-09-03 15:56:37 +01:00
|
|
|
tunnel: t.id,
|
2019-08-30 20:05:00 +01:00
|
|
|
channel: channel,
|
|
|
|
session: sessionId,
|
2019-11-25 18:56:00 +00:00
|
|
|
token: t.token,
|
2019-08-07 18:44:33 +01:00
|
|
|
closed: make(chan bool),
|
|
|
|
recv: make(chan *message, 128),
|
|
|
|
send: t.send,
|
2019-08-30 20:05:00 +01:00
|
|
|
errChan: make(chan error, 1),
|
2020-03-09 20:10:08 +03:00
|
|
|
key: []byte(t.token + channel + sessionId),
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2020-03-11 20:55:39 +03:00
|
|
|
gcm, err := newCipher(s.key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, false, err
|
|
|
|
}
|
|
|
|
s.gcm = gcm
|
2019-08-07 18:44:33 +01:00
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// save session
|
2019-08-07 18:44:33 +01:00
|
|
|
t.Lock()
|
2019-08-30 20:05:00 +01:00
|
|
|
_, ok := t.sessions[channel+sessionId]
|
2019-08-07 18:44:33 +01:00
|
|
|
if ok {
|
2019-08-30 20:05:00 +01:00
|
|
|
// session already exists
|
2019-08-07 18:44:33 +01:00
|
|
|
t.Unlock()
|
2020-03-11 20:55:39 +03:00
|
|
|
return nil, false, nil
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-08-14 01:23:03 +01:00
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
t.sessions[channel+sessionId] = s
|
2019-08-07 18:44:33 +01:00
|
|
|
t.Unlock()
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// return session
|
2020-03-11 20:55:39 +03:00
|
|
|
return s, true, nil
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// TODO: use tunnel id as part of the session
|
2019-08-30 20:05:00 +01:00
|
|
|
func (t *tun) newSessionId() string {
|
2019-08-07 18:44:33 +01:00
|
|
|
return uuid.New().String()
|
2019-08-06 11:45:25 +01:00
|
|
|
}
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// announce will send a message to the link to tell the other side of a channel mapping we have.
|
|
|
|
// This usually happens if someone calls Dial and sends a discover message but otherwise we
|
|
|
|
// periodically send these messages to asynchronously manage channel mappings.
|
2019-09-05 18:13:02 +01:00
|
|
|
func (t *tun) announce(channel, session string, link *link) {
|
|
|
|
// create the "announce" response message for a discover request
|
|
|
|
msg := &transport.Message{
|
|
|
|
Header: map[string]string{
|
|
|
|
"Micro-Tunnel": "announce",
|
|
|
|
"Micro-Tunnel-Id": t.id,
|
|
|
|
"Micro-Tunnel-Channel": channel,
|
|
|
|
"Micro-Tunnel-Session": session,
|
|
|
|
"Micro-Tunnel-Link": link.id,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// if no channel is present we've been asked to discover all channels
|
|
|
|
if len(channel) == 0 {
|
|
|
|
// get the list of channels
|
|
|
|
channels := t.listChannels()
|
|
|
|
|
|
|
|
// if there are no channels continue
|
|
|
|
if len(channels) == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// create a list of channels as comma separated list
|
|
|
|
channel = strings.Join(channels, ",")
|
|
|
|
// set channels as header
|
|
|
|
msg.Header["Micro-Tunnel-Channel"] = channel
|
|
|
|
} else {
|
|
|
|
// otherwise look for a single channel mapping
|
|
|
|
// looking for existing mapping as a listener
|
|
|
|
_, exists := t.getSession(channel, "listener")
|
|
|
|
if !exists {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Debugf("Tunnel sending announce for discovery of channel(s) %s", channel)
|
|
|
|
}
|
2019-09-05 18:13:02 +01:00
|
|
|
// send back the announcement
|
|
|
|
if err := link.Send(msg); err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel failed to send announcement for channel(s) %s message: %v", channel, err)
|
|
|
|
}
|
2019-09-05 18:13:02 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
// manage monitors outbound links and attempts to reconnect to the failed ones
|
2020-01-08 14:48:38 +00:00
|
|
|
func (t *tun) manage(reconnect time.Duration) {
|
|
|
|
r := time.NewTicker(reconnect)
|
|
|
|
defer r.Stop()
|
2019-08-15 18:18:58 +01:00
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
2020-01-08 14:48:38 +00:00
|
|
|
case <-r.C:
|
2019-12-07 23:28:39 +00:00
|
|
|
t.manageLinks()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-09-25 12:14:09 +01:00
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
// manageLink sends channel discover requests periodically and
|
|
|
|
// keepalive messages to link
|
|
|
|
func (t *tun) manageLink(link *link) {
|
|
|
|
keepalive := time.NewTicker(KeepAliveTime)
|
|
|
|
defer keepalive.Stop()
|
|
|
|
discover := time.NewTicker(DiscoverTime)
|
|
|
|
defer discover.Stop()
|
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
wait := func(d time.Duration) {
|
|
|
|
// jitter
|
2019-12-12 17:10:32 +00:00
|
|
|
j := rand.Int63n(int64(d.Seconds() / 2.0))
|
2019-12-12 12:27:46 +00:00
|
|
|
time.Sleep(time.Duration(j) * time.Second)
|
|
|
|
}
|
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
|
|
|
case <-link.closed:
|
|
|
|
return
|
|
|
|
case <-discover.C:
|
2019-12-12 13:34:08 +00:00
|
|
|
// wait half the discover time
|
|
|
|
wait(DiscoverTime)
|
|
|
|
|
|
|
|
// send a discovery message to the link
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel sending discover to link: %v", link.Remote())
|
|
|
|
}
|
2019-12-12 13:34:08 +00:00
|
|
|
if err := t.sendMsg("discover", link); err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel failed to send discover to link %s: %v", link.Remote(), err)
|
|
|
|
}
|
2019-12-12 13:34:08 +00:00
|
|
|
}
|
2019-12-08 12:12:20 +00:00
|
|
|
case <-keepalive.C:
|
2019-12-12 13:34:08 +00:00
|
|
|
// wait half the keepalive time
|
|
|
|
wait(KeepAliveTime)
|
|
|
|
|
|
|
|
// send keepalive message
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel sending keepalive to link: %v", link.Remote())
|
|
|
|
}
|
2019-12-12 13:34:08 +00:00
|
|
|
if err := t.sendMsg("keepalive", link); err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel error sending keepalive to link %v: %v", link.Remote(), err)
|
|
|
|
}
|
2019-12-12 13:34:08 +00:00
|
|
|
t.delLink(link.Remote())
|
|
|
|
return
|
|
|
|
}
|
2019-12-08 12:12:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
// manageLinks is a function that can be called to immediately to link setup
|
2019-12-11 14:37:03 +00:00
|
|
|
// it purges dead links while generating new links for any nodes not connected
|
2019-12-07 23:28:39 +00:00
|
|
|
func (t *tun) manageLinks() {
|
2019-12-11 14:37:03 +00:00
|
|
|
delLinks := make(map[*link]string)
|
|
|
|
connected := make(map[string]bool)
|
2019-09-25 12:14:09 +01:00
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
t.RLock()
|
2019-09-25 12:14:09 +01:00
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
// get list of nodes from options
|
|
|
|
nodes := t.options.Nodes
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
// check the link status and purge dead links
|
|
|
|
for node, link := range t.links {
|
|
|
|
// check link status
|
|
|
|
switch link.State() {
|
2019-12-11 14:37:03 +00:00
|
|
|
case "closed", "error":
|
|
|
|
delLinks[link] = node
|
|
|
|
default:
|
|
|
|
connected[node] = true
|
2019-12-07 23:28:39 +00:00
|
|
|
}
|
|
|
|
}
|
2019-09-25 12:14:09 +01:00
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
t.RUnlock()
|
2019-09-02 12:05:47 +01:00
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
// build a list of links to connect to
|
|
|
|
var connect []string
|
|
|
|
|
|
|
|
for _, node := range nodes {
|
|
|
|
// check if we're connected
|
|
|
|
if _, ok := connected[node]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// add nodes to connect o
|
|
|
|
connect = append(connect, node)
|
|
|
|
}
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
// delete the dead links
|
|
|
|
if len(delLinks) > 0 {
|
|
|
|
t.Lock()
|
2019-12-11 14:37:03 +00:00
|
|
|
|
|
|
|
for link, node := range delLinks {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel deleting dead link for %s", node)
|
|
|
|
}
|
2019-12-11 14:37:03 +00:00
|
|
|
// check if the link exists
|
|
|
|
l, ok := t.links[node]
|
|
|
|
if ok {
|
|
|
|
// close and delete
|
|
|
|
l.Close()
|
2019-12-07 23:28:39 +00:00
|
|
|
delete(t.links, node)
|
2019-09-02 12:05:47 +01:00
|
|
|
}
|
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
// if the link does not match our own
|
|
|
|
if l != link {
|
|
|
|
// close our link just in case
|
|
|
|
link.Close()
|
|
|
|
}
|
2019-08-15 18:18:58 +01:00
|
|
|
}
|
2019-12-07 23:28:39 +00:00
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
t.Unlock()
|
|
|
|
}
|
2019-12-07 23:28:39 +00:00
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
// establish new links
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
for _, node := range connect {
|
|
|
|
wg.Add(1)
|
|
|
|
|
2019-12-08 00:53:55 +00:00
|
|
|
go func(node string) {
|
2019-12-07 23:28:39 +00:00
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// create new link
|
2019-12-11 14:37:03 +00:00
|
|
|
// if we're using quic it should be a max 10 second handshake period
|
2019-12-07 23:28:39 +00:00
|
|
|
link, err := t.setupLink(node)
|
|
|
|
if err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel failed to setup node link to %s: %v", node, err)
|
|
|
|
}
|
2019-12-07 23:28:39 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Lock()
|
2019-12-08 12:12:20 +00:00
|
|
|
|
|
|
|
// just check nothing else was setup in the interim
|
|
|
|
if _, ok := t.links[node]; ok {
|
|
|
|
link.Close()
|
2019-12-12 12:27:46 +00:00
|
|
|
t.Unlock()
|
2019-12-08 12:12:20 +00:00
|
|
|
return
|
|
|
|
}
|
2019-12-11 14:37:03 +00:00
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
// save the link
|
2019-12-07 23:28:39 +00:00
|
|
|
t.links[node] = link
|
2019-12-12 12:27:46 +00:00
|
|
|
|
|
|
|
t.Unlock()
|
2019-12-08 00:53:55 +00:00
|
|
|
}(node)
|
2019-12-07 23:28:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// wait for all threads to finish
|
|
|
|
wg.Wait()
|
2019-08-15 16:52:16 +01:00
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// process outgoing messages sent by all local sessions
|
2019-08-07 18:44:33 +01:00
|
|
|
func (t *tun) process() {
|
|
|
|
// manage the send buffer
|
2019-08-30 20:05:00 +01:00
|
|
|
// all pseudo sessions throw everything down this
|
2019-08-07 18:44:33 +01:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case msg := <-t.send:
|
2019-12-12 12:27:46 +00:00
|
|
|
// build a list of links to send to
|
2019-09-12 16:22:43 -07:00
|
|
|
var sendTo []*link
|
2019-12-12 12:27:46 +00:00
|
|
|
var err error
|
2019-08-30 20:05:00 +01:00
|
|
|
|
2019-12-12 23:20:31 +00:00
|
|
|
t.RLock()
|
|
|
|
|
2019-09-12 16:22:43 -07:00
|
|
|
// build the list of links ot send to
|
2019-12-12 23:20:31 +00:00
|
|
|
for _, link := range t.links {
|
2019-10-25 14:16:22 +01:00
|
|
|
// get the values we need
|
|
|
|
link.RLock()
|
|
|
|
id := link.id
|
|
|
|
connected := link.connected
|
|
|
|
loopback := link.loopback
|
|
|
|
_, exists := link.channels[msg.channel]
|
|
|
|
link.RUnlock()
|
|
|
|
|
2019-08-28 23:12:22 +01:00
|
|
|
// if the link is not connected skip it
|
2019-10-25 14:16:22 +01:00
|
|
|
if !connected {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Link for node %s not connected", id)
|
|
|
|
}
|
2020-01-13 20:06:02 +00:00
|
|
|
err = ErrLinkDisconnected
|
2019-08-28 23:12:22 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the link was a loopback accepted connection
|
|
|
|
// and the message is being sent outbound via
|
|
|
|
// a dialled connection don't use this link
|
2019-10-25 14:16:22 +01:00
|
|
|
if loopback && msg.outbound {
|
2020-01-13 20:06:02 +00:00
|
|
|
err = ErrLinkLoopback
|
2019-08-14 17:14:39 +01:00
|
|
|
continue
|
|
|
|
}
|
2019-08-28 23:12:22 +01:00
|
|
|
|
|
|
|
// if the message was being returned by the loopback listener
|
|
|
|
// send it back up the loopback link only
|
2019-10-25 14:16:22 +01:00
|
|
|
if msg.loopback && !loopback {
|
2020-01-13 20:06:02 +00:00
|
|
|
err = ErrLinkRemote
|
2019-08-28 23:12:22 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// check the multicast mappings
|
2019-10-15 15:55:08 +01:00
|
|
|
if msg.mode == Multicast {
|
2019-09-04 09:48:05 +01:00
|
|
|
// channel mapping not found in link
|
2019-10-25 14:16:22 +01:00
|
|
|
if !exists {
|
2019-09-04 09:48:05 +01:00
|
|
|
continue
|
|
|
|
}
|
2019-09-04 18:46:20 +01:00
|
|
|
} else {
|
|
|
|
// if we're picking the link check the id
|
|
|
|
// this is where we explicitly set the link
|
|
|
|
// in a message received via the listen method
|
2019-10-25 14:16:22 +01:00
|
|
|
if len(msg.link) > 0 && id != msg.link {
|
2020-01-13 20:06:02 +00:00
|
|
|
err = ErrLinkNotFound
|
2019-09-04 18:46:20 +01:00
|
|
|
continue
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
|
2019-09-12 16:22:43 -07:00
|
|
|
// add to link list
|
|
|
|
sendTo = append(sendTo, link)
|
|
|
|
}
|
|
|
|
|
2019-12-12 23:20:31 +00:00
|
|
|
t.RUnlock()
|
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// no links to send to
|
|
|
|
if len(sendTo) == 0 {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("No links to send message type: %s channel: %s", msg.typ, msg.channel)
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
t.respond(msg, err)
|
|
|
|
continue
|
|
|
|
}
|
2019-09-12 16:22:43 -07:00
|
|
|
|
|
|
|
// send the message
|
2020-01-25 23:16:00 +00:00
|
|
|
go t.sendTo(sendTo, msg)
|
2019-12-12 12:27:46 +00:00
|
|
|
case <-t.closed:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// send response back for a message to the caller
|
|
|
|
func (t *tun) respond(msg *message, err error) {
|
|
|
|
select {
|
|
|
|
case msg.errChan <- err:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// sendTo sends a message to the chosen links
|
|
|
|
func (t *tun) sendTo(links []*link, msg *message) error {
|
|
|
|
// the function that sends the actual message
|
|
|
|
send := func(link *link, msg *transport.Message) error {
|
|
|
|
if err := link.Send(msg); err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel error sending %+v to %s: %v", msg.Header, link.Remote(), err)
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
t.delLink(link.Remote())
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
newMsg := &transport.Message{
|
|
|
|
Header: make(map[string]string),
|
|
|
|
}
|
|
|
|
|
|
|
|
// set the data
|
|
|
|
if msg.data != nil {
|
|
|
|
for k, v := range msg.data.Header {
|
|
|
|
newMsg.Header[k] = v
|
|
|
|
}
|
|
|
|
newMsg.Body = msg.data.Body
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// set message head
|
|
|
|
newMsg.Header["Micro-Tunnel"] = msg.typ
|
|
|
|
// set the tunnel id on the outgoing message
|
|
|
|
newMsg.Header["Micro-Tunnel-Id"] = msg.tunnel
|
|
|
|
// set the tunnel channel on the outgoing message
|
|
|
|
newMsg.Header["Micro-Tunnel-Channel"] = msg.channel
|
|
|
|
// set the session id
|
|
|
|
newMsg.Header["Micro-Tunnel-Session"] = msg.session
|
|
|
|
|
|
|
|
// error channel for call
|
|
|
|
errChan := make(chan error, len(links))
|
|
|
|
|
2019-12-13 15:27:47 +00:00
|
|
|
// execute in parallel
|
|
|
|
sendTo := func(l *link, m *transport.Message, errChan chan error) {
|
|
|
|
errChan <- send(l, m)
|
|
|
|
}
|
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// send the message
|
|
|
|
for _, link := range links {
|
|
|
|
// send the message via the current link
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel sending %+v to %s", newMsg.Header, link.Remote())
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
|
|
|
|
// blast it in a go routine since its multicast/broadcast
|
|
|
|
if msg.mode > Unicast {
|
|
|
|
// make a copy
|
|
|
|
m := &transport.Message{
|
|
|
|
Header: make(map[string]string),
|
2019-12-12 17:10:32 +00:00
|
|
|
Body: make([]byte, len(newMsg.Body)),
|
2019-12-12 12:27:46 +00:00
|
|
|
}
|
|
|
|
copy(m.Body, newMsg.Body)
|
|
|
|
for k, v := range newMsg.Header {
|
|
|
|
m.Header[k] = v
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-08-29 12:42:27 +01:00
|
|
|
|
2019-12-13 15:27:47 +00:00
|
|
|
go sendTo(link, m, errChan)
|
2019-08-30 20:05:00 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-08-30 20:05:00 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// otherwise send as unicast
|
|
|
|
if err := send(link, newMsg); err != nil {
|
|
|
|
// put in the error chan if it failed
|
|
|
|
errChan <- err
|
|
|
|
continue
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// sent successfully so just return
|
|
|
|
t.respond(msg, nil)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// either all unicast attempts failed or we're
|
|
|
|
// checking the multicast/broadcast attempts
|
|
|
|
|
|
|
|
var err error
|
|
|
|
|
|
|
|
// check all the errors
|
|
|
|
for i := 0; i < len(links); i++ {
|
|
|
|
err = <-errChan
|
|
|
|
// success
|
|
|
|
if err == nil {
|
|
|
|
break
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
|
|
|
|
// return error. it's non blocking
|
|
|
|
t.respond(msg, err)
|
|
|
|
return err
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-09-12 16:22:43 -07:00
|
|
|
func (t *tun) delLink(remote string) {
|
2019-09-04 09:48:05 +01:00
|
|
|
t.Lock()
|
2019-09-12 16:22:43 -07:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// get the link
|
2019-09-12 16:22:43 -07:00
|
|
|
for id, link := range t.links {
|
|
|
|
if link.id != remote {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// close and delete
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel deleting link node: %s remote: %s", id, link.Remote())
|
|
|
|
}
|
2019-09-12 16:22:43 -07:00
|
|
|
link.Close()
|
|
|
|
delete(t.links, id)
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
2019-12-11 14:37:03 +00:00
|
|
|
|
2019-12-12 21:49:39 +00:00
|
|
|
t.Unlock()
|
2019-12-12 12:27:46 +00:00
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// process incoming messages
|
2019-08-14 17:14:39 +01:00
|
|
|
func (t *tun) listen(link *link) {
|
2019-08-28 23:12:22 +01:00
|
|
|
// remove the link on exit
|
|
|
|
defer func() {
|
2019-09-04 09:48:05 +01:00
|
|
|
t.delLink(link.Remote())
|
2019-08-28 23:12:22 +01:00
|
|
|
}()
|
|
|
|
|
|
|
|
// let us know if its a loopback
|
|
|
|
var loopback bool
|
2019-10-25 14:16:22 +01:00
|
|
|
var connected bool
|
|
|
|
|
|
|
|
// set the connected value
|
|
|
|
link.RLock()
|
|
|
|
connected = link.connected
|
|
|
|
link.RUnlock()
|
2019-08-28 23:12:22 +01:00
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
for {
|
|
|
|
// process anything via the net interface
|
|
|
|
msg := new(transport.Message)
|
2019-08-28 23:12:22 +01:00
|
|
|
if err := link.Recv(msg); err != nil {
|
2019-10-23 16:05:21 +01:00
|
|
|
log.Debugf("Tunnel link %s receive error: %v", link.Remote(), err)
|
2019-08-07 18:44:33 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-25 18:56:00 +00:00
|
|
|
// TODO: figure out network authentication
|
|
|
|
// for now we use tunnel token to encrypt/decrypt
|
|
|
|
// session communication, but we will probably need
|
|
|
|
// some sort of network authentication (token) to avoid
|
|
|
|
// having rogue actors spamming the network
|
2019-08-30 20:05:00 +01:00
|
|
|
|
2019-09-03 15:56:37 +01:00
|
|
|
// message type
|
|
|
|
mtype := msg.Header["Micro-Tunnel"]
|
|
|
|
// the tunnel id
|
|
|
|
id := msg.Header["Micro-Tunnel-Id"]
|
|
|
|
// the tunnel channel
|
|
|
|
channel := msg.Header["Micro-Tunnel-Channel"]
|
|
|
|
// the session id
|
|
|
|
sessionId := msg.Header["Micro-Tunnel-Session"]
|
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// if its not connected throw away the link
|
|
|
|
// the first message we process needs to be connect
|
2019-10-25 14:16:22 +01:00
|
|
|
if !connected && mtype != "connect" {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s not connected", link.id)
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// this state machine block handles the only message types
|
|
|
|
// that we know or care about; connect, close, open, accept,
|
|
|
|
// discover, announce, session, keepalive
|
2019-09-03 15:56:37 +01:00
|
|
|
switch mtype {
|
2019-08-14 13:00:10 +01:00
|
|
|
case "connect":
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s received connect message", link.Remote())
|
|
|
|
}
|
2019-08-30 20:05:00 +01:00
|
|
|
|
2019-09-04 18:46:20 +01:00
|
|
|
link.Lock()
|
2019-10-25 14:16:22 +01:00
|
|
|
|
|
|
|
// check if we're connecting to ourselves?
|
2019-08-30 20:05:00 +01:00
|
|
|
if id == t.id {
|
2019-08-14 17:14:39 +01:00
|
|
|
link.loopback = true
|
2019-08-28 23:12:22 +01:00
|
|
|
loopback = true
|
2019-08-13 20:11:23 +01:00
|
|
|
}
|
2019-08-20 17:20:21 +01:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// set to remote node
|
2019-09-12 17:12:49 -07:00
|
|
|
link.id = link.Remote()
|
2019-08-28 23:12:22 +01:00
|
|
|
// set as connected
|
|
|
|
link.connected = true
|
2019-10-25 14:16:22 +01:00
|
|
|
connected = true
|
|
|
|
|
2019-09-04 18:46:20 +01:00
|
|
|
link.Unlock()
|
2019-08-28 23:12:22 +01:00
|
|
|
|
|
|
|
// save the link once connected
|
|
|
|
t.Lock()
|
|
|
|
t.links[link.Remote()] = link
|
|
|
|
t.Unlock()
|
|
|
|
|
2019-12-08 13:45:24 +00:00
|
|
|
// send back an announcement of our channels discovery
|
2019-09-05 18:13:02 +01:00
|
|
|
go t.announce("", "", link)
|
2019-12-08 13:45:24 +00:00
|
|
|
// ask for the things on the other wise
|
|
|
|
go t.sendMsg("discover", link)
|
2019-08-20 17:20:21 +01:00
|
|
|
// nothing more to do
|
2019-08-14 13:00:10 +01:00
|
|
|
continue
|
2019-08-13 20:11:23 +01:00
|
|
|
case "close":
|
2019-12-01 19:36:16 +00:00
|
|
|
// if there is no channel then we close the link
|
|
|
|
// as its a signal from the other side to close the connection
|
2019-09-04 09:48:05 +01:00
|
|
|
if len(channel) == 0 {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s received close message", link.Remote())
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s received close message for %s", link.Remote(), channel)
|
|
|
|
}
|
2019-12-01 19:36:16 +00:00
|
|
|
// the entire listener was closed by the remote side so we need to
|
|
|
|
// remove the channel mapping for it. should we also close sessions?
|
2019-09-04 09:48:05 +01:00
|
|
|
if sessionId == "listener" {
|
2019-10-25 14:16:22 +01:00
|
|
|
link.delChannel(channel)
|
2019-12-12 23:20:31 +00:00
|
|
|
// TODO: find all the non listener unicast sessions
|
|
|
|
// and close them. think aboud edge cases first
|
2019-09-04 09:48:05 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-12-01 19:36:16 +00:00
|
|
|
// assuming there's a channel and session
|
2019-09-04 09:48:05 +01:00
|
|
|
// try get the dialing socket
|
2019-12-01 19:36:16 +00:00
|
|
|
s, exists := t.getSession(channel, sessionId)
|
2019-12-01 19:43:36 +00:00
|
|
|
if exists && !loopback {
|
2019-12-05 23:11:42 +00:00
|
|
|
// only delete the session if its unicast
|
|
|
|
// otherwise ignore close on the multicast
|
2019-12-01 19:43:36 +00:00
|
|
|
if s.mode == Unicast {
|
|
|
|
// only delete this if its unicast
|
|
|
|
// but not if its a loopback conn
|
|
|
|
t.delSession(channel, sessionId)
|
|
|
|
continue
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
// otherwise its a session mapping of sorts
|
2019-08-15 18:18:58 +01:00
|
|
|
case "keepalive":
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s received keepalive", link.Remote())
|
|
|
|
}
|
2019-08-29 12:42:27 +01:00
|
|
|
// save the keepalive
|
2019-10-25 14:16:22 +01:00
|
|
|
link.keepalive()
|
2019-08-15 16:52:16 +01:00
|
|
|
continue
|
2019-09-04 09:48:05 +01:00
|
|
|
// a new connection dialled outbound
|
|
|
|
case "open":
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel link %s received open %s %s", link.id, channel, sessionId)
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
// we just let it pass through to be processed
|
|
|
|
// an accept returned by the listener
|
|
|
|
case "accept":
|
2019-09-04 18:46:20 +01:00
|
|
|
s, exists := t.getSession(channel, sessionId)
|
2019-12-05 23:11:42 +00:00
|
|
|
// just set accepted on anything not unicast
|
2019-10-15 15:40:04 +01:00
|
|
|
if exists && s.mode > Unicast {
|
2019-09-04 18:46:20 +01:00
|
|
|
s.accepted = true
|
|
|
|
continue
|
|
|
|
}
|
2019-12-05 23:11:42 +00:00
|
|
|
// if its already accepted move on
|
2019-09-04 18:46:20 +01:00
|
|
|
if exists && s.accepted {
|
|
|
|
continue
|
|
|
|
}
|
2019-12-05 23:11:42 +00:00
|
|
|
// otherwise we're going to process to accept
|
2019-09-04 09:48:05 +01:00
|
|
|
// a continued session
|
2019-09-03 15:56:37 +01:00
|
|
|
case "session":
|
2019-08-20 17:20:21 +01:00
|
|
|
// process message
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel received %+v from %s", msg.Header, link.Remote())
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
// an announcement of a channel listener
|
|
|
|
case "announce":
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel received %+v from %s", msg.Header, link.Remote())
|
|
|
|
}
|
2019-09-05 18:13:02 +01:00
|
|
|
// process the announcement
|
2019-09-05 15:16:11 +01:00
|
|
|
channels := strings.Split(channel, ",")
|
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// update mapping in the link
|
2019-10-25 14:16:22 +01:00
|
|
|
link.setChannel(channels...)
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-09-05 15:16:11 +01:00
|
|
|
// this was an announcement not intended for anything
|
2019-12-05 23:11:42 +00:00
|
|
|
// if the dialing side sent "discover" then a session
|
|
|
|
// id would be present. We skip in case of multicast.
|
|
|
|
switch sessionId {
|
|
|
|
case "listener", "multicast", "":
|
2019-09-05 15:16:11 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// get the session that asked for the discovery
|
|
|
|
s, exists := t.getSession(channel, sessionId)
|
|
|
|
if exists {
|
|
|
|
// don't bother it's already discovered
|
|
|
|
if s.discovered {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
msg := &message{
|
2019-09-04 09:48:05 +01:00
|
|
|
typ: "announce",
|
|
|
|
tunnel: id,
|
|
|
|
channel: channel,
|
|
|
|
session: sessionId,
|
|
|
|
link: link.id,
|
|
|
|
}
|
2019-12-05 23:11:42 +00:00
|
|
|
|
|
|
|
// send the announce back to the caller
|
|
|
|
select {
|
|
|
|
case <-s.closed:
|
|
|
|
case s.recv <- msg:
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
continue
|
|
|
|
case "discover":
|
2019-09-05 18:13:02 +01:00
|
|
|
// send back an announcement
|
|
|
|
go t.announce(channel, sessionId, link)
|
2019-09-04 09:48:05 +01:00
|
|
|
continue
|
2019-08-20 17:20:21 +01:00
|
|
|
default:
|
|
|
|
// blackhole it
|
|
|
|
continue
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// strip tunnel message header
|
2019-11-01 15:07:53 +00:00
|
|
|
for k := range msg.Header {
|
2019-08-30 20:05:00 +01:00
|
|
|
if strings.HasPrefix(k, "Micro-Tunnel") {
|
|
|
|
delete(msg.Header, k)
|
|
|
|
}
|
|
|
|
}
|
2019-08-20 17:20:21 +01:00
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// if the session id is blank there's nothing we can do
|
|
|
|
// TODO: check this is the case, is there any reason
|
|
|
|
// why we'd have a blank session? Is the tunnel
|
|
|
|
// used for some other purpose?
|
2019-08-30 20:05:00 +01:00
|
|
|
if len(channel) == 0 || len(sessionId) == 0 {
|
2019-08-07 18:44:33 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
var s *session
|
2019-08-07 18:44:33 +01:00
|
|
|
var exists bool
|
|
|
|
|
2019-08-28 23:12:22 +01:00
|
|
|
// If its a loopback connection then we've enabled link direction
|
|
|
|
// listening side is used for listening, the dialling side for dialling
|
2019-08-13 20:11:23 +01:00
|
|
|
switch {
|
2019-09-04 09:48:05 +01:00
|
|
|
case loopback, mtype == "open":
|
2019-08-30 20:05:00 +01:00
|
|
|
s, exists = t.getSession(channel, "listener")
|
2019-09-04 09:48:05 +01:00
|
|
|
// only return accept to the session
|
|
|
|
case mtype == "accept":
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel received accept message for channel: %s session: %s", channel, sessionId)
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
s, exists = t.getSession(channel, sessionId)
|
|
|
|
if exists && s.accepted {
|
|
|
|
continue
|
|
|
|
}
|
2019-08-13 20:11:23 +01:00
|
|
|
default:
|
2019-08-30 20:05:00 +01:00
|
|
|
// get the session based on the tunnel id and session
|
2019-08-13 20:11:23 +01:00
|
|
|
// this could be something we dialed in which case
|
|
|
|
// we have a session for it otherwise its a listener
|
2019-08-30 20:05:00 +01:00
|
|
|
s, exists = t.getSession(channel, sessionId)
|
2019-08-14 01:23:03 +01:00
|
|
|
if !exists {
|
|
|
|
// try get it based on just the tunnel id
|
|
|
|
// the assumption here is that a listener
|
|
|
|
// has no session but its set a listener session
|
2019-08-30 20:05:00 +01:00
|
|
|
s, exists = t.getSession(channel, "listener")
|
2019-08-14 01:23:03 +01:00
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-08-28 23:12:22 +01:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// bail if no session or listener has been found
|
2019-08-07 18:44:33 +01:00
|
|
|
if !exists {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel skipping no channel: %s session: %s exists", channel, sessionId)
|
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
// drop it, we don't care about
|
|
|
|
// messages we don't know about
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// is the session closed?
|
2019-08-07 18:44:33 +01:00
|
|
|
select {
|
|
|
|
case <-s.closed:
|
|
|
|
// closed
|
2019-08-30 20:05:00 +01:00
|
|
|
delete(t.sessions, channel)
|
2019-08-07 18:44:33 +01:00
|
|
|
continue
|
|
|
|
default:
|
2019-12-05 23:11:42 +00:00
|
|
|
// otherwise process
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel using channel: %s session: %s type: %s", s.channel, s.session, mtype)
|
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
// construct a new transport message
|
|
|
|
tmsg := &transport.Message{
|
|
|
|
Header: msg.Header,
|
|
|
|
Body: msg.Body,
|
|
|
|
}
|
|
|
|
|
|
|
|
// construct the internal message
|
|
|
|
imsg := &message{
|
2019-09-03 15:56:37 +01:00
|
|
|
tunnel: id,
|
|
|
|
typ: mtype,
|
2019-08-30 20:05:00 +01:00
|
|
|
channel: channel,
|
|
|
|
session: sessionId,
|
2019-12-01 19:36:16 +00:00
|
|
|
mode: s.mode,
|
2019-08-28 23:12:22 +01:00
|
|
|
data: tmsg,
|
2019-08-29 12:42:27 +01:00
|
|
|
link: link.id,
|
2019-08-28 23:12:22 +01:00
|
|
|
loopback: loopback,
|
2019-08-30 20:05:00 +01:00
|
|
|
errChan: make(chan error, 1),
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// append to recv backlog
|
|
|
|
// we don't block if we can't pass it on
|
|
|
|
select {
|
|
|
|
case s.recv <- imsg:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-12-08 13:45:24 +00:00
|
|
|
func (t *tun) sendMsg(method string, link *link) error {
|
|
|
|
return link.Send(&transport.Message{
|
|
|
|
Header: map[string]string{
|
|
|
|
"Micro-Tunnel": method,
|
|
|
|
"Micro-Tunnel-Id": t.id,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-08-15 19:24:24 +01:00
|
|
|
// setupLink connects to node and returns link if successful
|
|
|
|
// It returns error if the link failed to be established
|
|
|
|
func (t *tun) setupLink(node string) (*link, error) {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel setting up link: %s", node)
|
|
|
|
}
|
2019-08-15 18:18:58 +01:00
|
|
|
c, err := t.options.Transport.Dial(node)
|
|
|
|
if err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel failed to connect to %s: %v", node, err)
|
|
|
|
}
|
2019-08-15 18:18:58 +01:00
|
|
|
return nil, err
|
|
|
|
}
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel connected to %s", node)
|
|
|
|
}
|
2019-10-24 17:51:41 +01:00
|
|
|
// create a new link
|
|
|
|
link := newLink(c)
|
2020-01-08 14:48:38 +00:00
|
|
|
|
2019-10-24 17:51:41 +01:00
|
|
|
// set link id to remote side
|
2020-01-08 14:48:38 +00:00
|
|
|
link.Lock()
|
2019-10-24 17:51:41 +01:00
|
|
|
link.id = c.Remote()
|
2020-01-08 14:48:38 +00:00
|
|
|
link.Unlock()
|
2019-10-24 17:51:41 +01:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// send the first connect message
|
2019-12-08 13:45:24 +00:00
|
|
|
if err := t.sendMsg("connect", link); err != nil {
|
2019-12-08 00:53:55 +00:00
|
|
|
link.Close()
|
2019-08-15 18:18:58 +01:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-08-29 12:42:27 +01:00
|
|
|
// we made the outbound connection
|
|
|
|
// and sent the connect message
|
2019-09-04 09:48:05 +01:00
|
|
|
link.connected = true
|
2019-08-15 18:18:58 +01:00
|
|
|
|
|
|
|
// process incoming messages
|
|
|
|
go t.listen(link)
|
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
// manage keepalives and discovery messages
|
|
|
|
go t.manageLink(link)
|
2019-09-05 18:13:02 +01:00
|
|
|
|
2019-08-15 18:18:58 +01:00
|
|
|
return link, nil
|
|
|
|
}
|
|
|
|
|
2019-12-08 13:45:24 +00:00
|
|
|
func (t *tun) setupLinks() {
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
|
|
|
for _, node := range t.options.Nodes {
|
|
|
|
wg.Add(1)
|
|
|
|
|
|
|
|
go func(node string) {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// we're not trying to fix existing links
|
|
|
|
if _, ok := t.links[node]; ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// create new link
|
|
|
|
link, err := t.setupLink(node)
|
|
|
|
if err != nil {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel failed to setup node link to %s: %v", node, err)
|
|
|
|
}
|
2019-12-08 13:45:24 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// save the link
|
|
|
|
t.links[node] = link
|
|
|
|
}(node)
|
|
|
|
}
|
|
|
|
|
|
|
|
// wait for all threads to finish
|
|
|
|
wg.Wait()
|
|
|
|
}
|
|
|
|
|
2019-08-14 13:26:23 +01:00
|
|
|
// connect the tunnel to all the nodes and listen for incoming tunnel connections
|
2019-08-07 18:44:33 +01:00
|
|
|
func (t *tun) connect() error {
|
|
|
|
l, err := t.options.Transport.Listen(t.options.Address)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// save the listener
|
|
|
|
t.listener = l
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// accept inbound connections
|
|
|
|
err := l.Accept(func(sock transport.Socket) {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel accepted connection from %s", sock.Remote())
|
|
|
|
}
|
2019-08-28 23:12:22 +01:00
|
|
|
// create a new link
|
2019-08-29 12:42:27 +01:00
|
|
|
link := newLink(sock)
|
2019-08-07 18:44:33 +01:00
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
// manage the link
|
|
|
|
go t.manageLink(link)
|
2019-09-12 17:12:49 -07:00
|
|
|
|
2019-08-28 23:12:22 +01:00
|
|
|
// listen for inbound messages.
|
|
|
|
// only save the link once connected.
|
|
|
|
// we do this inside liste
|
2019-08-14 17:14:39 +01:00
|
|
|
t.listen(link)
|
2019-08-07 18:44:33 +01:00
|
|
|
})
|
|
|
|
|
2019-08-29 12:42:27 +01:00
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
2019-08-07 18:44:33 +01:00
|
|
|
|
|
|
|
// still connected but the tunnel died
|
|
|
|
if err != nil && t.connected {
|
2020-02-23 16:45:20 +03:00
|
|
|
log.Errorf("Tunnel listener died: %v", err)
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2019-08-05 19:41:48 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-14 13:26:23 +01:00
|
|
|
// Connect the tunnel
|
|
|
|
func (t *tun) Connect() error {
|
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
|
|
|
// already connected
|
|
|
|
if t.connected {
|
2019-12-08 12:12:20 +00:00
|
|
|
// do it immediately
|
2019-12-08 13:45:24 +00:00
|
|
|
t.setupLinks()
|
2019-10-13 18:36:22 +01:00
|
|
|
// setup links
|
2019-08-14 13:26:23 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-12-07 23:28:39 +00:00
|
|
|
// connect the tunnel: start the listener
|
2019-08-14 13:26:23 +01:00
|
|
|
if err := t.connect(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// set as connected
|
|
|
|
t.connected = true
|
|
|
|
// create new close channel
|
|
|
|
t.closed = make(chan bool)
|
|
|
|
|
2019-12-05 15:50:32 +00:00
|
|
|
// process outbound messages to be sent
|
|
|
|
// process sends to all links
|
|
|
|
go t.process()
|
|
|
|
|
2019-12-08 13:45:24 +00:00
|
|
|
// call setup before managing them
|
|
|
|
t.setupLinks()
|
|
|
|
|
2019-12-08 12:12:20 +00:00
|
|
|
// manage the links
|
2020-01-08 14:48:38 +00:00
|
|
|
go t.manage(ReconnectTime)
|
2019-12-08 12:12:20 +00:00
|
|
|
|
2019-08-14 13:26:23 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
func (t *tun) close() error {
|
2019-09-04 18:46:20 +01:00
|
|
|
// close all the sessions
|
|
|
|
for id, s := range t.sessions {
|
|
|
|
s.Close()
|
|
|
|
delete(t.sessions, id)
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// close all the links
|
2019-08-15 18:18:58 +01:00
|
|
|
for node, link := range t.links {
|
2019-08-07 18:44:33 +01:00
|
|
|
link.Send(&transport.Message{
|
|
|
|
Header: map[string]string{
|
2019-11-25 18:56:00 +00:00
|
|
|
"Micro-Tunnel": "close",
|
|
|
|
"Micro-Tunnel-Id": t.id,
|
2019-08-07 18:44:33 +01:00
|
|
|
},
|
|
|
|
})
|
|
|
|
link.Close()
|
2019-08-15 18:18:58 +01:00
|
|
|
delete(t.links, node)
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// close the listener
|
2019-09-05 15:23:19 +01:00
|
|
|
// this appears to be blocking
|
|
|
|
return t.listener.Close()
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// pickLink will pick the best link based on connectivity, delay, rate and length
|
|
|
|
func (t *tun) pickLink(links []*link) *link {
|
|
|
|
var metric float64
|
|
|
|
var chosen *link
|
|
|
|
|
|
|
|
// find the best link
|
|
|
|
for i, link := range links {
|
|
|
|
// don't use disconnected or errored links
|
|
|
|
if link.State() != "connected" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-12-12 13:04:34 +00:00
|
|
|
// skip the loopback
|
|
|
|
if link.Loopback() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// get the link state info
|
|
|
|
d := float64(link.Delay())
|
|
|
|
l := float64(link.Length())
|
|
|
|
r := link.Rate()
|
|
|
|
|
|
|
|
// metric = delay x length x rate
|
|
|
|
m := d * l * r
|
|
|
|
|
|
|
|
// first link so just and go
|
|
|
|
if i == 0 {
|
|
|
|
metric = m
|
|
|
|
chosen = link
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// we found a better metric
|
|
|
|
if m < metric {
|
|
|
|
metric = m
|
|
|
|
chosen = link
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if there's no link we're just going to mess around
|
|
|
|
if chosen == nil {
|
|
|
|
i := rand.Intn(len(links))
|
|
|
|
return links[i]
|
|
|
|
}
|
|
|
|
|
|
|
|
// we chose the link with;
|
|
|
|
// the lowest delay e.g least messages queued
|
|
|
|
// the lowest rate e.g the least messages flowing
|
|
|
|
// the lowest length e.g the smallest roundtrip time
|
|
|
|
return chosen
|
|
|
|
}
|
|
|
|
|
2019-08-21 12:55:10 +01:00
|
|
|
func (t *tun) Address() string {
|
|
|
|
t.RLock()
|
|
|
|
defer t.RUnlock()
|
|
|
|
|
|
|
|
if !t.connected {
|
|
|
|
return t.options.Address
|
|
|
|
}
|
|
|
|
|
|
|
|
return t.listener.Addr()
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// Close the tunnel
|
|
|
|
func (t *tun) Close() error {
|
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
|
|
|
if !t.connected {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debug("Tunnel closing")
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-08-05 19:41:48 +01:00
|
|
|
select {
|
|
|
|
case <-t.closed:
|
2019-08-07 18:44:33 +01:00
|
|
|
return nil
|
2019-08-05 19:41:48 +01:00
|
|
|
default:
|
2019-08-07 18:44:33 +01:00
|
|
|
close(t.closed)
|
|
|
|
t.connected = false
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
|
2019-10-11 11:02:45 +01:00
|
|
|
// send a close message
|
|
|
|
// we don't close the link
|
|
|
|
// just the tunnel
|
|
|
|
return t.close()
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// Dial an address
|
2019-09-04 09:48:05 +01:00
|
|
|
func (t *tun) Dial(channel string, opts ...DialOption) (Session, error) {
|
2019-12-12 12:27:46 +00:00
|
|
|
// get the options
|
|
|
|
options := DialOptions{
|
|
|
|
Timeout: DefaultDialTimeout,
|
|
|
|
Wait: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel dialing %s", channel)
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
|
|
|
|
// create a new session
|
2020-03-11 20:55:39 +03:00
|
|
|
c, ok, err := t.newSession(channel, t.newSessionId())
|
|
|
|
if err != nil {
|
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
} else if !ok {
|
2019-08-30 20:05:00 +01:00
|
|
|
return nil, errors.New("error dialing " + channel)
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// set remote
|
2019-08-30 20:05:00 +01:00
|
|
|
c.remote = channel
|
2019-08-07 18:44:33 +01:00
|
|
|
// set local
|
|
|
|
c.local = "local"
|
2019-08-30 20:05:00 +01:00
|
|
|
// outbound session
|
2019-08-14 17:14:39 +01:00
|
|
|
c.outbound = true
|
2019-12-12 12:27:46 +00:00
|
|
|
// set the mode of connection unicast/multicast/broadcast
|
2019-10-15 15:40:04 +01:00
|
|
|
c.mode = options.Mode
|
2019-09-04 09:48:05 +01:00
|
|
|
// set the dial timeout
|
2019-12-07 23:28:39 +00:00
|
|
|
c.dialTimeout = options.Timeout
|
|
|
|
// set read timeout set to never
|
|
|
|
c.readTimeout = time.Duration(-1)
|
2019-12-12 12:27:46 +00:00
|
|
|
// set the link
|
|
|
|
c.link = options.Link
|
2019-09-04 18:46:20 +01:00
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
var links []*link
|
2019-10-22 18:43:09 +01:00
|
|
|
// did we measure the rtt
|
|
|
|
var measured bool
|
2019-09-04 20:18:26 +01:00
|
|
|
|
2019-10-24 16:07:31 +01:00
|
|
|
t.RLock()
|
2019-10-25 14:16:22 +01:00
|
|
|
|
|
|
|
// non multicast so we need to find the link
|
2019-10-24 16:07:31 +01:00
|
|
|
for _, link := range t.links {
|
|
|
|
// use the link specified it its available
|
2019-12-12 12:27:46 +00:00
|
|
|
if len(c.link) > 0 && link.id != c.link {
|
2019-10-24 16:07:31 +01:00
|
|
|
continue
|
|
|
|
}
|
2019-09-11 11:57:41 -07:00
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// get the channel
|
|
|
|
lastMapped := link.getChannel(channel)
|
2019-09-04 09:48:05 +01:00
|
|
|
|
2019-10-24 16:07:31 +01:00
|
|
|
// we have at least one channel mapping
|
2019-10-25 14:16:22 +01:00
|
|
|
if !lastMapped.IsZero() {
|
|
|
|
links = append(links, link)
|
2019-10-24 16:07:31 +01:00
|
|
|
c.discovered = true
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
2019-10-24 16:07:31 +01:00
|
|
|
}
|
2019-10-25 14:16:22 +01:00
|
|
|
|
2019-10-24 16:07:31 +01:00
|
|
|
t.RUnlock()
|
2019-10-25 14:16:22 +01:00
|
|
|
|
2019-12-12 12:27:46 +00:00
|
|
|
// link option was specified to pick the link
|
|
|
|
if len(options.Link) > 0 {
|
|
|
|
// link not found and one was specified so error out
|
|
|
|
if len(links) == 0 {
|
|
|
|
// delete session and return error
|
|
|
|
t.delSession(c.channel, c.session)
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel deleting session %s %s: %v", c.session, c.channel, ErrLinkNotFound)
|
|
|
|
}
|
2019-12-12 12:27:46 +00:00
|
|
|
return nil, ErrLinkNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
// assume discovered because we picked
|
|
|
|
c.discovered = true
|
|
|
|
|
|
|
|
// link asked for and found and now
|
|
|
|
// we've been asked not to wait so return
|
|
|
|
if !options.Wait {
|
|
|
|
c.accepted = true
|
|
|
|
return c, nil
|
|
|
|
}
|
2019-09-11 11:57:41 -07:00
|
|
|
}
|
|
|
|
|
2019-09-05 07:41:19 +01:00
|
|
|
// discovered so set the link if not multicast
|
2019-10-15 15:40:04 +01:00
|
|
|
if c.discovered && c.mode == Unicast {
|
2019-12-12 12:27:46 +00:00
|
|
|
// pick a link if not specified
|
|
|
|
if len(c.link) == 0 {
|
|
|
|
// pickLink will pick the best link
|
|
|
|
link := t.pickLink(links)
|
|
|
|
// set the link
|
|
|
|
c.link = link.id
|
|
|
|
}
|
2019-09-04 20:18:26 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// if its not already discovered we need to attempt to do so
|
2019-09-04 09:48:05 +01:00
|
|
|
if !c.discovered {
|
2019-10-22 18:43:09 +01:00
|
|
|
// piggy back roundtrip
|
|
|
|
nowRTT := time.Now()
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// attempt to discover the link
|
|
|
|
err := c.Discover()
|
2019-09-05 15:16:11 +01:00
|
|
|
if err != nil {
|
2019-10-16 20:44:22 +01:00
|
|
|
t.delSession(c.channel, c.session)
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel deleting session %s %s: %v", c.session, c.channel, err)
|
|
|
|
}
|
2019-09-05 15:16:11 +01:00
|
|
|
return nil, err
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
2019-09-05 17:40:41 +01:00
|
|
|
|
2019-10-22 18:43:09 +01:00
|
|
|
// set roundtrip
|
|
|
|
d := time.Since(nowRTT)
|
|
|
|
|
|
|
|
// set the link time
|
|
|
|
t.RLock()
|
2019-10-22 19:38:29 +01:00
|
|
|
link, ok := t.links[c.link]
|
2019-10-22 18:43:09 +01:00
|
|
|
t.RUnlock()
|
|
|
|
|
|
|
|
if ok {
|
|
|
|
// set the rountrip time
|
|
|
|
link.setRTT(d)
|
2019-10-22 19:38:29 +01:00
|
|
|
// set measured to true
|
|
|
|
measured = true
|
2019-10-22 18:43:09 +01:00
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// return early if its not unicast
|
2019-12-11 14:37:03 +00:00
|
|
|
// we will not wait for "open" for multicast
|
2019-12-12 12:27:46 +00:00
|
|
|
// and we will not wait it told not to
|
|
|
|
if c.mode != Unicast || !options.Wait {
|
2019-12-11 14:37:03 +00:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// Note: we go no further for multicast or broadcast.
|
|
|
|
// This is a unicast session so we call "open" and wait
|
|
|
|
// for an "accept"
|
2019-09-05 15:16:11 +01:00
|
|
|
|
2019-10-22 18:43:09 +01:00
|
|
|
// reset now in case we use it
|
2019-10-25 14:16:22 +01:00
|
|
|
now := time.Now()
|
2019-10-22 18:43:09 +01:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
// try to open the session
|
2019-10-25 14:16:22 +01:00
|
|
|
if err := c.Open(); err != nil {
|
2019-09-04 09:48:05 +01:00
|
|
|
// delete the session
|
|
|
|
t.delSession(c.channel, c.session)
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel deleting session %s %s: %v", c.session, c.channel, err)
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-10-25 14:16:22 +01:00
|
|
|
// set time take to open
|
|
|
|
d := time.Since(now)
|
|
|
|
|
2019-10-22 18:43:09 +01:00
|
|
|
// if we haven't measured the roundtrip do it now
|
2019-12-05 23:11:42 +00:00
|
|
|
if !measured {
|
2019-10-22 18:43:09 +01:00
|
|
|
// set the link time
|
|
|
|
t.RLock()
|
|
|
|
link, ok := t.links[c.link]
|
|
|
|
t.RUnlock()
|
2019-10-25 14:16:22 +01:00
|
|
|
|
2019-10-22 18:43:09 +01:00
|
|
|
if ok {
|
|
|
|
// set the rountrip time
|
2019-10-25 14:16:22 +01:00
|
|
|
link.setRTT(d)
|
2019-10-22 18:43:09 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accept a connection on the address
|
2019-10-15 15:40:04 +01:00
|
|
|
func (t *tun) Listen(channel string, opts ...ListenOption) (Listener, error) {
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.DebugLevel, log) {
|
|
|
|
log.Debugf("Tunnel listening on %s", channel)
|
|
|
|
}
|
2019-12-07 23:28:39 +00:00
|
|
|
options := ListenOptions{
|
|
|
|
// Read timeout defaults to never
|
|
|
|
Timeout: time.Duration(-1),
|
|
|
|
}
|
|
|
|
|
2019-10-15 15:40:04 +01:00
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// create a new session by hashing the address
|
2020-03-11 20:55:39 +03:00
|
|
|
c, ok, err := t.newSession(channel, "listener")
|
|
|
|
if err != nil {
|
|
|
|
if logger.V(logger.ErrorLevel, log) {
|
|
|
|
log.Error(err)
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
} else if !ok {
|
2019-08-30 20:05:00 +01:00
|
|
|
return nil, errors.New("already listening on " + channel)
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// delete function removes the session when closed
|
2019-09-04 09:48:05 +01:00
|
|
|
delFunc := func() {
|
|
|
|
t.delSession(channel, "listener")
|
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
// set remote. it will be replaced by the first message received
|
|
|
|
c.remote = "remote"
|
|
|
|
// set local
|
2019-08-30 20:05:00 +01:00
|
|
|
c.local = channel
|
2019-10-15 15:40:04 +01:00
|
|
|
// set mode
|
|
|
|
c.mode = options.Mode
|
2019-12-07 23:28:39 +00:00
|
|
|
// set the timeout
|
|
|
|
c.readTimeout = options.Timeout
|
2019-08-07 18:44:33 +01:00
|
|
|
|
|
|
|
tl := &tunListener{
|
2019-08-30 20:05:00 +01:00
|
|
|
channel: channel,
|
2019-11-25 18:56:00 +00:00
|
|
|
// tunnel token
|
|
|
|
token: t.token,
|
2019-08-07 18:44:33 +01:00
|
|
|
// the accept channel
|
2019-08-30 20:05:00 +01:00
|
|
|
accept: make(chan *session, 128),
|
2019-08-07 18:44:33 +01:00
|
|
|
// the channel to close
|
|
|
|
closed: make(chan bool),
|
2019-08-08 15:20:53 +01:00
|
|
|
// tunnel closed channel
|
|
|
|
tunClosed: t.closed,
|
2019-08-30 20:05:00 +01:00
|
|
|
// the listener session
|
|
|
|
session: c,
|
2019-09-04 09:48:05 +01:00
|
|
|
// delete session
|
|
|
|
delFunc: delFunc,
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// this kicks off the internal message processor
|
2019-08-30 20:05:00 +01:00
|
|
|
// for the listener so it can create pseudo sessions
|
2019-08-07 18:44:33 +01:00
|
|
|
// per session if they do not exist or pass messages
|
|
|
|
// to the existign sessions
|
|
|
|
go tl.process()
|
|
|
|
|
|
|
|
// return the listener
|
|
|
|
return tl, nil
|
2019-08-05 19:41:48 +01:00
|
|
|
}
|
2019-08-20 17:21:35 +01:00
|
|
|
|
2019-09-04 15:41:57 +01:00
|
|
|
func (t *tun) Links() []Link {
|
2019-12-11 14:37:03 +00:00
|
|
|
t.RLock()
|
2019-12-12 21:49:39 +00:00
|
|
|
links := make([]Link, 0, len(t.links))
|
2019-12-11 14:37:03 +00:00
|
|
|
|
2019-09-04 15:41:57 +01:00
|
|
|
for _, link := range t.links {
|
|
|
|
links = append(links, link)
|
|
|
|
}
|
|
|
|
|
2019-12-11 14:37:03 +00:00
|
|
|
t.RUnlock()
|
|
|
|
|
2019-09-04 15:41:57 +01:00
|
|
|
return links
|
|
|
|
}
|
|
|
|
|
2019-08-20 17:21:35 +01:00
|
|
|
func (t *tun) String() string {
|
|
|
|
return "mucp"
|
|
|
|
}
|