micro/tunnel/session.go

413 lines
7.7 KiB
Go
Raw Normal View History

2019-08-06 13:45:25 +03:00
package tunnel
2019-08-07 20:44:33 +03:00
import (
"errors"
2019-08-30 22:05:00 +03:00
"io"
"time"
2019-08-06 13:45:25 +03:00
2019-08-07 20:44:33 +03:00
"github.com/micro/go-micro/transport"
2019-08-11 20:11:33 +03:00
"github.com/micro/go-micro/util/log"
2019-08-07 20:44:33 +03:00
)
2019-08-06 13:45:25 +03:00
2019-08-30 22:05:00 +03:00
// session is our pseudo session for transport.Socket
type session struct {
2019-09-03 17:56:37 +03:00
// the tunnel id
tunnel string
2019-08-30 22:05:00 +03:00
// the channel name
channel string
2019-08-07 20:44:33 +03:00
// the session id based on Micro.Tunnel-Session
session string
// closed
closed chan bool
// remote addr
remote string
// local addr
local string
// send chan
send chan *message
// recv chan
recv chan *message
// wait until we have a connection
wait chan bool
// if the discovery worked
discovered bool
// if the session was accepted
accepted bool
2019-08-30 22:05:00 +03:00
// outbound marks the session as outbound dialled connection
2019-08-14 19:14:39 +03:00
outbound bool
2019-08-30 22:05:00 +03:00
// lookback marks the session as a loopback on the inbound
loopback bool
2019-10-15 17:40:04 +03:00
// mode of the connection
mode Mode
// the timeout
timeout time.Duration
2019-08-29 14:42:27 +03:00
// the link on which this message was received
link string
2019-08-30 22:05:00 +03:00
// the error response
errChan chan error
2019-08-06 13:45:25 +03:00
}
2019-08-07 20:44:33 +03:00
// message is sent over the send channel
type message struct {
2019-08-29 14:42:27 +03:00
// type of message
typ string
2019-08-07 20:44:33 +03:00
// tunnel id
2019-09-03 17:56:37 +03:00
tunnel string
2019-08-30 22:05:00 +03:00
// channel name
channel string
2019-08-07 20:44:33 +03:00
// the session id
session string
2019-08-14 19:14:39 +03:00
// outbound marks the message as outbound
outbound bool
// loopback marks the message intended for loopback
loopback bool
2019-10-15 17:40:04 +03:00
// mode of the connection
mode Mode
2019-08-29 14:42:27 +03:00
// the link to send the message on
link string
2019-08-07 20:44:33 +03:00
// transport data
data *transport.Message
2019-08-30 22:05:00 +03:00
// the error channel
errChan chan error
2019-08-07 20:44:33 +03:00
}
2019-08-30 22:05:00 +03:00
func (s *session) Remote() string {
2019-08-07 20:44:33 +03:00
return s.remote
}
2019-08-30 22:05:00 +03:00
func (s *session) Local() string {
2019-08-07 20:44:33 +03:00
return s.local
2019-08-06 13:45:25 +03:00
}
2019-09-11 22:07:43 +03:00
func (s *session) Link() string {
return s.link
}
2019-08-30 22:05:00 +03:00
func (s *session) Id() string {
return s.session
2019-08-07 20:44:33 +03:00
}
2019-08-30 22:05:00 +03:00
func (s *session) Channel() string {
return s.channel
2019-08-07 20:44:33 +03:00
}
2019-09-04 14:18:37 +03:00
// newMessage creates a new message based on the session
2019-09-04 14:16:31 +03:00
func (s *session) newMessage(typ string) *message {
return &message{
2019-10-15 17:40:04 +03:00
typ: typ,
tunnel: s.tunnel,
channel: s.channel,
session: s.session,
outbound: s.outbound,
loopback: s.loopback,
mode: s.mode,
link: s.link,
errChan: s.errChan,
}
2019-09-04 14:16:31 +03:00
}
// waitFor waits for the message type required until the timeout specified
func (s *session) waitFor(msgType string, timeout time.Duration) (*message, error) {
now := time.Now()
after := func(timeout time.Duration) time.Duration {
d := time.Since(now)
// dial timeout minus time since
wait := timeout - d
if wait < time.Duration(0) {
return time.Duration(0)
}
return wait
}
// wait for the message type
for {
select {
case msg := <-s.recv:
// ignore what we don't want
if msg.typ != msgType {
log.Debugf("Tunnel received non %s message in waiting for %s", msg.typ, msgType)
continue
}
// got the message
return msg, nil
case <-time.After(after(timeout)):
return nil, ErrDialTimeout
case <-s.closed:
return nil, io.EOF
}
}
}
// Discover attempts to discover the link for a specific channel
func (s *session) Discover() error {
// create a new discovery message for this channel
msg := s.newMessage("discover")
msg.mode = Broadcast
msg.outbound = true
msg.link = ""
// send the discovery message
s.send <- msg
// set time now
now := time.Now()
after := func() time.Duration {
d := time.Since(now)
// dial timeout minus time since
wait := s.timeout - d
if wait < time.Duration(0) {
return time.Duration(0)
}
return wait
}
// wait to hear back about the sent message
select {
case <-time.After(after()):
return ErrDialTimeout
case err := <-s.errChan:
if err != nil {
return err
}
}
var err error
// set a new dialTimeout
dialTimeout := after()
// set a shorter delay for multicast
if s.mode != Unicast {
// shorten this
dialTimeout = time.Millisecond * 500
}
// wait for announce
_, err = s.waitFor("announce", dialTimeout)
// if its multicast just go ahead because this is best effort
if s.mode != Unicast {
s.discovered = true
s.accepted = true
return nil
}
if err != nil {
return err
}
// set discovered
s.discovered = true
return nil
}
2019-09-04 14:16:31 +03:00
// Open will fire the open message for the session. This is called by the dialler.
func (s *session) Open() error {
// create a new message
msg := s.newMessage("open")
// send open message
s.send <- msg
// wait for an error response for send
select {
case err := <-msg.errChan:
if err != nil {
return err
}
case <-s.closed:
return io.EOF
}
2019-10-15 17:40:04 +03:00
// don't wait on multicast/broadcast
if s.mode == Multicast {
s.accepted = true
return nil
}
// now wait for the accept
msg, err := s.waitFor("accept", s.timeout)
if err != nil {
return err
}
// set to accepted
s.accepted = true
// set link
s.link = msg.link
return nil
}
2019-09-04 13:58:03 +03:00
// Accept sends the accept response to an open message from a dialled connection
func (s *session) Accept() error {
2019-09-04 14:16:31 +03:00
msg := s.newMessage("accept")
// send the accept message
select {
case <-s.closed:
return io.EOF
case s.send <- msg:
2019-10-07 20:29:49 +03:00
// no op here
}
2019-10-15 17:40:04 +03:00
// don't wait on multicast/broadcast
if s.mode == Multicast {
2019-10-15 17:40:04 +03:00
return nil
}
// wait for send response
select {
case err := <-s.errChan:
if err != nil {
return err
}
case <-s.closed:
return io.EOF
}
return nil
}
2019-09-04 13:58:03 +03:00
// Announce sends an announcement to notify that this session exists. This is primarily used by the listener.
func (s *session) Announce() error {
2019-09-04 14:16:31 +03:00
msg := s.newMessage("announce")
// we don't need an error back
msg.errChan = nil
// announce to all
2019-10-15 17:40:04 +03:00
msg.mode = Broadcast
2019-09-04 14:16:31 +03:00
// we don't need the link
msg.link = ""
2019-09-04 13:58:03 +03:00
select {
case s.send <- msg:
return nil
case <-s.closed:
return io.EOF
}
}
// Send is used to send a message
2019-08-30 22:05:00 +03:00
func (s *session) Send(m *transport.Message) error {
2019-08-07 20:44:33 +03:00
select {
case <-s.closed:
return io.EOF
2019-08-07 20:44:33 +03:00
default:
// no op
}
2019-08-11 20:11:33 +03:00
2019-11-25 18:34:41 +03:00
// get the token
token, ok := m.Header["Micro-Tunnel-Token"]
if !ok {
// TODO: should we continue or return error
log.Debugf("no token found, insecure channel")
}
// encrypt the transport message payload
body, err := Encrypt(m.Body, token+s.channel+s.session)
if err != nil {
return err
}
2019-08-11 20:11:33 +03:00
// make copy
data := &transport.Message{
Header: make(map[string]string),
2019-11-25 18:34:41 +03:00
Body: body,
2019-08-11 20:11:33 +03:00
}
for k, v := range m.Header {
2019-11-25 18:34:41 +03:00
// TODO: should we also encrypt headers?
2019-08-11 20:11:33 +03:00
data.Header[k] = v
}
2019-09-04 14:16:31 +03:00
// create a new message
msg := s.newMessage("session")
// set the data
msg.data = data
2019-09-04 14:16:31 +03:00
// if multicast don't set the link
if s.mode == Multicast {
2019-09-04 14:16:31 +03:00
msg.link = ""
}
2019-11-03 19:12:17 +03:00
log.Tracef("Appending %+v to send backlog", msg)
2019-09-04 13:58:03 +03:00
// send the actual message
2019-08-11 20:11:33 +03:00
s.send <- msg
2019-08-30 22:05:00 +03:00
// wait for an error response
select {
case err := <-msg.errChan:
return err
case <-s.closed:
return io.EOF
}
2019-08-06 13:45:25 +03:00
}
2019-09-04 13:58:03 +03:00
// Recv is used to receive a message
2019-08-30 22:05:00 +03:00
func (s *session) Recv(m *transport.Message) error {
2019-08-07 20:44:33 +03:00
select {
case <-s.closed:
2019-08-30 22:05:00 +03:00
return errors.New("session is closed")
2019-08-07 20:44:33 +03:00
default:
// no op
}
// recv from backlog
msg := <-s.recv
2019-08-30 22:05:00 +03:00
// check the error if one exists
select {
case err := <-msg.errChan:
return err
default:
}
2019-11-25 18:34:41 +03:00
// TODO: if we encrypt headers we will have to decrypt them here
token, ok := msg.data.Header["Micro-Tunnel-Token"]
if !ok {
// TODO: should we continue or return error
log.Debugf("no token found, insecure channel")
}
2019-11-03 19:12:17 +03:00
log.Tracef("Received %+v from recv backlog", msg)
2019-11-25 18:34:41 +03:00
// decrypt the received payload using the token
body, err := Decrypt(msg.data.Body, token+s.channel+s.session)
if err != nil {
return err
}
msg.data.Body = body
2019-08-07 20:44:33 +03:00
// set message
*m = *msg.data
// return nil
return nil
2019-08-06 13:45:25 +03:00
}
2019-09-04 13:58:03 +03:00
// Close closes the session by sending a close message
2019-08-30 22:05:00 +03:00
func (s *session) Close() error {
2019-08-07 20:44:33 +03:00
select {
case <-s.closed:
// no op
default:
close(s.closed)
// append to backlog
2019-09-04 14:16:31 +03:00
msg := s.newMessage("close")
// no error response on close
msg.errChan = nil
// send the close message
select {
case s.send <- msg:
default:
}
2019-08-07 20:44:33 +03:00
}
2019-08-07 20:44:33 +03:00
return nil
2019-08-06 13:45:25 +03:00
}