2019-08-07 18:44:33 +01:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io"
|
2019-12-12 17:10:32 +00:00
|
|
|
"sync"
|
2019-08-11 18:11:33 +01:00
|
|
|
|
2020-03-11 20:55:39 +03:00
|
|
|
"github.com/micro/go-micro/v2/logger"
|
2019-08-07 18:44:33 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
type tunListener struct {
|
|
|
|
// address of the listener
|
2019-08-30 20:05:00 +01:00
|
|
|
channel string
|
2019-11-25 18:56:00 +00:00
|
|
|
// token is the tunnel token
|
|
|
|
token string
|
2019-08-07 18:44:33 +01:00
|
|
|
// the accept channel
|
2019-08-30 20:05:00 +01:00
|
|
|
accept chan *session
|
2019-08-08 15:20:53 +01:00
|
|
|
// the tunnel closed channel
|
|
|
|
tunClosed chan bool
|
2019-08-30 20:05:00 +01:00
|
|
|
// the listener session
|
|
|
|
session *session
|
2019-09-04 09:48:05 +01:00
|
|
|
// del func to kill listener
|
|
|
|
delFunc func()
|
2019-12-12 17:10:32 +00:00
|
|
|
|
|
|
|
sync.RWMutex
|
|
|
|
// the channel to close
|
|
|
|
closed chan bool
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
func (t *tunListener) process() {
|
|
|
|
// our connection map for session
|
2019-08-30 20:05:00 +01:00
|
|
|
conns := make(map[string]*session)
|
2019-08-07 18:44:33 +01:00
|
|
|
|
2019-09-04 09:48:05 +01:00
|
|
|
defer func() {
|
|
|
|
// close the sessions
|
2019-12-05 23:11:42 +00:00
|
|
|
for id, conn := range conns {
|
2019-09-04 09:48:05 +01:00
|
|
|
conn.Close()
|
2019-12-05 23:11:42 +00:00
|
|
|
delete(conns, id)
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
2019-12-05 23:11:42 +00:00
|
|
|
// unassign
|
|
|
|
conns = nil
|
2019-09-04 09:48:05 +01:00
|
|
|
}()
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
2019-09-04 09:48:05 +01:00
|
|
|
case <-t.tunClosed:
|
|
|
|
t.Close()
|
|
|
|
return
|
2019-08-07 18:44:33 +01:00
|
|
|
// receive a new message
|
2019-08-30 20:05:00 +01:00
|
|
|
case m := <-t.session.recv:
|
2019-12-08 00:53:55 +00:00
|
|
|
var sessionId string
|
|
|
|
var linkId string
|
|
|
|
|
2019-12-12 17:10:32 +00:00
|
|
|
switch t.session.mode {
|
2019-12-08 00:53:55 +00:00
|
|
|
case Multicast:
|
|
|
|
sessionId = "multicast"
|
|
|
|
linkId = "multicast"
|
|
|
|
case Broadcast:
|
|
|
|
sessionId = "broadcast"
|
|
|
|
linkId = "broadcast"
|
|
|
|
default:
|
|
|
|
sessionId = m.session
|
|
|
|
linkId = m.link
|
|
|
|
}
|
2019-12-05 23:11:42 +00:00
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// get a session
|
2019-12-05 23:11:42 +00:00
|
|
|
sess, ok := conns[sessionId]
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel listener received channel %s session %s type %s exists: %t", m.channel, m.session, m.typ, ok)
|
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
if !ok {
|
2019-11-30 01:14:40 +00:00
|
|
|
// we only process open and session types
|
2019-09-04 15:55:37 +01:00
|
|
|
switch m.typ {
|
|
|
|
case "open", "session":
|
|
|
|
default:
|
2019-09-04 09:48:05 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// create a new session session
|
|
|
|
sess = &session{
|
2020-02-24 17:15:20 +03:00
|
|
|
// the session key
|
2020-03-09 20:10:08 +03:00
|
|
|
key: []byte(t.token + m.channel + sessionId),
|
2019-08-30 20:05:00 +01:00
|
|
|
// the id of the remote side
|
2019-09-03 15:56:37 +01:00
|
|
|
tunnel: m.tunnel,
|
2019-08-30 20:05:00 +01:00
|
|
|
// the channel
|
|
|
|
channel: m.channel,
|
2019-08-07 18:44:33 +01:00
|
|
|
// the session id
|
2019-12-05 23:11:42 +00:00
|
|
|
session: sessionId,
|
2019-11-25 18:56:00 +00:00
|
|
|
// tunnel token
|
|
|
|
token: t.token,
|
2019-08-28 23:12:22 +01:00
|
|
|
// is loopback conn
|
|
|
|
loopback: m.loopback,
|
2019-08-29 12:42:27 +01:00
|
|
|
// the link the message was received on
|
2019-12-08 00:53:55 +00:00
|
|
|
link: linkId,
|
2019-10-15 15:40:04 +01:00
|
|
|
// set the connection mode
|
2019-12-12 17:10:32 +00:00
|
|
|
mode: t.session.mode,
|
2019-08-07 18:44:33 +01:00
|
|
|
// close chan
|
|
|
|
closed: make(chan bool),
|
|
|
|
// recv called by the acceptor
|
|
|
|
recv: make(chan *message, 128),
|
|
|
|
// use the internal send buffer
|
2019-08-30 20:05:00 +01:00
|
|
|
send: t.session.send,
|
|
|
|
// error channel
|
|
|
|
errChan: make(chan error, 1),
|
2019-12-07 23:28:39 +00:00
|
|
|
// set the read timeout
|
|
|
|
readTimeout: t.session.readTimeout,
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
// save the session
|
2019-12-05 23:11:42 +00:00
|
|
|
conns[sessionId] = sess
|
2019-08-07 18:44:33 +01:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
2019-09-04 09:48:05 +01:00
|
|
|
// send to accept chan
|
2019-08-30 20:05:00 +01:00
|
|
|
case t.accept <- sess:
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// an existing session was found
|
|
|
|
|
|
|
|
switch m.typ {
|
|
|
|
case "close":
|
2019-12-12 17:10:32 +00:00
|
|
|
// don't close multicast sessions
|
|
|
|
if sess.mode > Unicast {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-12-05 23:11:42 +00:00
|
|
|
// received a close message
|
2019-09-04 09:48:05 +01:00
|
|
|
select {
|
2019-12-05 23:11:42 +00:00
|
|
|
// check if the session is closed
|
2019-09-04 09:48:05 +01:00
|
|
|
case <-sess.closed:
|
|
|
|
// no op
|
2019-12-05 23:11:42 +00:00
|
|
|
delete(conns, sessionId)
|
2019-09-04 09:48:05 +01:00
|
|
|
default:
|
2019-12-07 23:28:39 +00:00
|
|
|
// only close if unicast session
|
|
|
|
// close and delete session
|
|
|
|
close(sess.closed)
|
|
|
|
delete(conns, sessionId)
|
2019-09-04 09:48:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// continue
|
|
|
|
continue
|
|
|
|
case "session":
|
|
|
|
// operate on this
|
|
|
|
default:
|
|
|
|
// non operational type
|
|
|
|
continue
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// send this to the accept chan
|
|
|
|
select {
|
2019-08-30 20:05:00 +01:00
|
|
|
case <-sess.closed:
|
2019-12-05 23:11:42 +00:00
|
|
|
delete(conns, sessionId)
|
2019-08-30 20:05:00 +01:00
|
|
|
case sess.recv <- m:
|
2020-03-11 20:55:39 +03:00
|
|
|
if logger.V(logger.TraceLevel, log) {
|
|
|
|
log.Tracef("Tunnel listener sent to recv chan channel %s session %s type %s", m.channel, sessionId, m.typ)
|
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:05:00 +01:00
|
|
|
func (t *tunListener) Channel() string {
|
|
|
|
return t.channel
|
2019-08-07 18:44:33 +01:00
|
|
|
}
|
|
|
|
|
2019-08-08 15:20:53 +01:00
|
|
|
// Close closes tunnel listener
|
2019-08-07 18:44:33 +01:00
|
|
|
func (t *tunListener) Close() error {
|
2019-12-12 17:10:32 +00:00
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
2019-08-07 18:44:33 +01:00
|
|
|
select {
|
|
|
|
case <-t.closed:
|
|
|
|
return nil
|
|
|
|
default:
|
2019-09-04 09:48:05 +01:00
|
|
|
// close and delete
|
|
|
|
t.delFunc()
|
|
|
|
t.session.Close()
|
2019-08-07 18:44:33 +01:00
|
|
|
close(t.closed)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Everytime accept is called we essentially block till we get a new connection
|
2019-08-30 20:05:00 +01:00
|
|
|
func (t *tunListener) Accept() (Session, error) {
|
2019-08-07 18:44:33 +01:00
|
|
|
select {
|
2019-08-30 20:05:00 +01:00
|
|
|
// if the session is closed return
|
2019-08-07 18:44:33 +01:00
|
|
|
case <-t.closed:
|
|
|
|
return nil, io.EOF
|
2019-08-08 15:20:53 +01:00
|
|
|
case <-t.tunClosed:
|
|
|
|
// close the listener when the tunnel closes
|
|
|
|
return nil, io.EOF
|
2019-08-07 18:44:33 +01:00
|
|
|
// wait for a new connection
|
|
|
|
case c, ok := <-t.accept:
|
2019-09-04 09:48:05 +01:00
|
|
|
// check if the accept chan is closed
|
2019-08-07 18:44:33 +01:00
|
|
|
if !ok {
|
|
|
|
return nil, io.EOF
|
|
|
|
}
|
2019-12-06 00:18:40 +00:00
|
|
|
// return without accept
|
|
|
|
if c.mode != Unicast {
|
|
|
|
return c, nil
|
|
|
|
}
|
2019-09-04 09:48:05 +01:00
|
|
|
// send back the accept
|
|
|
|
if err := c.Accept(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-08-07 18:44:33 +01:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
}
|