2019-04-18 16:38:24 +01:00
package yggdrasil
import (
"errors"
2019-04-21 12:28:46 +01:00
"fmt"
2019-04-20 11:53:38 +01:00
"sync"
2019-04-22 11:20:35 +01:00
"sync/atomic"
2019-04-18 16:38:24 +01:00
"time"
"github.com/yggdrasil-network/yggdrasil-go/src/crypto"
2019-04-18 23:38:23 +01:00
"github.com/yggdrasil-network/yggdrasil-go/src/util"
2019-04-18 16:38:24 +01:00
)
2019-05-29 20:16:17 +01:00
// ConnError implements the net.Error interface
2019-04-26 19:31:47 -05:00
type ConnError struct {
error
timeout bool
temporary bool
2019-05-29 20:16:17 +01:00
maxsize int
2019-04-26 19:31:47 -05:00
}
2019-05-29 20:16:17 +01:00
// Timeout returns true if the error relates to a timeout condition on the
// connection.
2019-04-26 19:31:47 -05:00
func ( e * ConnError ) Timeout ( ) bool {
return e . timeout
}
2019-05-29 20:16:17 +01:00
// Temporary return true if the error is temporary or false if it is a permanent
// error condition.
2019-04-26 19:31:47 -05:00
func ( e * ConnError ) Temporary ( ) bool {
return e . temporary
}
2019-05-29 20:16:17 +01:00
// PacketTooBig returns in response to sending a packet that is too large, and
// if so, the maximum supported packet size that should be used for the
// connection.
func ( e * ConnError ) PacketTooBig ( ) ( bool , int ) {
return e . maxsize > 0 , e . maxsize
}
2019-04-18 23:38:23 +01:00
type Conn struct {
core * Core
nodeID * crypto . NodeID
nodeMask * crypto . NodeID
2019-04-26 18:07:57 -05:00
mutex sync . RWMutex
2019-04-26 19:31:47 -05:00
closed bool
2019-04-21 20:38:14 -05:00
session * sessionInfo
2019-06-28 18:42:31 -05:00
readDeadline atomic . Value // time.Time // TODO timer
writeDeadline atomic . Value // time.Time // TODO timer
2019-04-26 18:07:57 -05:00
}
2019-04-26 19:31:47 -05:00
// TODO func NewConn() that initializes additional fields as needed
2019-04-26 18:07:57 -05:00
func newConn ( core * Core , nodeID * crypto . NodeID , nodeMask * crypto . NodeID , session * sessionInfo ) * Conn {
conn := Conn {
2019-06-28 18:42:31 -05:00
core : core ,
nodeID : nodeID ,
nodeMask : nodeMask ,
session : session ,
2019-04-26 18:07:57 -05:00
}
return & conn
2019-04-18 23:38:23 +01:00
}
2019-04-21 12:28:46 +01:00
func ( c * Conn ) String ( ) string {
2019-04-22 15:00:19 +01:00
return fmt . Sprintf ( "conn=%p" , c )
2019-04-21 12:28:46 +01:00
}
2019-06-29 12:14:44 -05:00
// This should never be called from the router goroutine
2019-06-28 18:42:31 -05:00
func ( c * Conn ) search ( ) error {
2019-06-29 12:14:44 -05:00
var sinfo * searchInfo
var isIn bool
c . core . router . doAdmin ( func ( ) { sinfo , isIn = c . core . searches . searches [ * c . nodeID ] } )
2019-06-28 18:42:31 -05:00
if ! isIn {
done := make ( chan struct { } , 1 )
var sess * sessionInfo
var err error
searchCompleted := func ( sinfo * sessionInfo , e error ) {
sess = sinfo
err = e
// FIXME close can be called multiple times, do a non-blocking send instead
select {
case done <- struct { } { } :
default :
2019-04-22 20:06:39 +01:00
}
2019-04-18 23:38:23 +01:00
}
2019-06-29 12:14:44 -05:00
c . core . router . doAdmin ( func ( ) {
sinfo = c . core . searches . newIterSearch ( c . nodeID , c . nodeMask , searchCompleted )
sinfo . continueSearch ( )
} )
2019-06-28 18:42:31 -05:00
<- done
c . session = sess
if c . session == nil && err == nil {
panic ( "search failed but returend no error" )
2019-04-26 19:31:47 -05:00
}
2019-06-28 18:42:31 -05:00
c . nodeID = crypto . GetNodeID ( & c . session . theirPermPub )
for i := range c . nodeMask {
c . nodeMask [ i ] = 0xFF
2019-04-18 16:38:24 +01:00
}
2019-06-28 18:42:31 -05:00
return err
2019-04-21 20:38:14 -05:00
} else {
2019-06-28 18:42:31 -05:00
return errors . New ( "search already exists" )
2019-04-18 16:38:24 +01:00
}
2019-06-28 18:42:31 -05:00
return nil
2019-04-18 16:38:24 +01:00
}
2019-04-26 19:31:47 -05:00
func getDeadlineTimer ( value * atomic . Value ) * time . Timer {
2019-04-26 22:42:05 -05:00
timer := time . NewTimer ( 24 * 365 * time . Hour ) // FIXME for some reason setting this to 0 doesn't always let it stop and drain the channel correctly
2019-04-26 19:31:47 -05:00
util . TimerStop ( timer )
if deadline , ok := value . Load ( ) . ( time . Time ) ; ok {
timer . Reset ( time . Until ( deadline ) )
}
return timer
}
2019-04-18 16:38:24 +01:00
func ( c * Conn ) Read ( b [ ] byte ) ( int , error ) {
2019-04-22 15:00:19 +01:00
// Take a copy of the session object
2019-04-22 11:20:35 +01:00
sinfo := c . session
2019-04-26 19:31:47 -05:00
timer := getDeadlineTimer ( & c . readDeadline )
defer util . TimerStop ( timer )
2019-05-31 17:51:01 -05:00
for {
// Wait for some traffic to come through from the session
select {
case <- timer . C :
return 0 , ConnError { errors . New ( "timeout" ) , true , false , 0 }
case p , ok := <- sinfo . recv :
// If the session is closed then do nothing
if ! ok {
return 0 , errors . New ( "session is closed" )
}
defer util . PutBytes ( p . Payload )
var err error
done := make ( chan struct { } )
workerFunc := func ( ) {
defer close ( done )
// If the nonce is bad then drop the packet and return an error
if ! sinfo . nonceIsOK ( & p . Nonce ) {
err = ConnError { errors . New ( "packet dropped due to invalid nonce" ) , false , true , 0 }
return
}
// Decrypt the packet
bs , isOK := crypto . BoxOpen ( & sinfo . sharedSesKey , p . Payload , & p . Nonce )
defer util . PutBytes ( bs ) // FIXME commenting this out leads to illegal buffer reuse, this implies there's a memory error somewhere and that this is just flooding things out of the finite pool of old slices that get reused
// Check if we were unable to decrypt the packet for some reason and
// return an error if we couldn't
if ! isOK {
err = ConnError { errors . New ( "packet dropped due to decryption failure" ) , false , true , 0 }
return
}
// Return the newly decrypted buffer back to the slice we were given
copy ( b , bs )
// Trim the slice down to size based on the data we received
if len ( bs ) < len ( b ) {
b = b [ : len ( bs ) ]
}
// Update the session
sinfo . updateNonce ( & p . Nonce )
sinfo . time = time . Now ( )
sinfo . bytesRecvd += uint64 ( len ( b ) )
2019-04-19 21:23:15 +01:00
}
2019-05-31 17:51:01 -05:00
// Hand over to the session worker
select { // Send to worker
case sinfo . worker <- workerFunc :
case <- timer . C :
return 0 , ConnError { errors . New ( "timeout" ) , true , false , 0 }
2019-04-19 21:23:15 +01:00
}
2019-05-31 17:51:01 -05:00
<- done // Wait for the worker to finish, failing this can cause memory errors (util.[Get||Put]Bytes stuff)
// Something went wrong in the session worker so abort
if err != nil {
if ce , ok := err . ( * ConnError ) ; ok && ce . Temporary ( ) {
continue
}
return 0 , err
2019-04-19 23:47:11 +01:00
}
2019-05-31 17:51:01 -05:00
// If we've reached this point then everything went to plan, return the
// number of bytes we populated back into the given slice
return len ( b ) , nil
2019-04-19 10:55:15 +01:00
}
2019-04-18 23:38:23 +01:00
}
2019-04-18 16:38:24 +01:00
}
2019-04-19 10:55:15 +01:00
func ( c * Conn ) Write ( b [ ] byte ) ( bytesWritten int , err error ) {
2019-04-22 11:20:35 +01:00
sinfo := c . session
2019-04-21 20:38:14 -05:00
var packet [ ] byte
2019-04-26 19:31:47 -05:00
done := make ( chan struct { } )
2019-05-29 20:16:17 +01:00
written := len ( b )
2019-04-26 19:31:47 -05:00
workerFunc := func ( ) {
defer close ( done )
2019-05-29 20:16:17 +01:00
// Does the packet exceed the permitted size for the session?
if uint16 ( len ( b ) ) > sinfo . getMTU ( ) {
written , err = 0 , ConnError { errors . New ( "packet too big" ) , true , false , int ( sinfo . getMTU ( ) ) }
return
}
2019-04-22 15:00:19 +01:00
// Encrypt the packet
2019-04-21 20:38:14 -05:00
payload , nonce := crypto . BoxSeal ( & sinfo . sharedSesKey , b , & sinfo . myNonce )
defer util . PutBytes ( payload )
2019-04-22 15:00:19 +01:00
// Construct the wire packet to send to the router
2019-04-21 20:38:14 -05:00
p := wire_trafficPacket {
Coords : sinfo . coords ,
Handle : sinfo . theirHandle ,
Nonce : * nonce ,
Payload : payload ,
}
packet = p . encode ( )
sinfo . bytesSent += uint64 ( len ( b ) )
2019-06-28 18:42:31 -05:00
// The rest of this work is session keep-alive traffic
doSearch := func ( ) {
routerWork := func ( ) {
// Check to see if there is a search already matching the destination
sinfo , isIn := c . core . searches . searches [ * c . nodeID ]
if ! isIn {
// Nothing was found, so create a new search
searchCompleted := func ( sinfo * sessionInfo , e error ) { }
sinfo = c . core . searches . newIterSearch ( c . nodeID , c . nodeMask , searchCompleted )
c . core . log . Debugf ( "%s DHT search started: %p" , c . String ( ) , sinfo )
}
// Continue the search
sinfo . continueSearch ( )
}
go func ( ) { c . core . router . admin <- routerWork } ( )
}
switch {
case ! sinfo . init :
2019-06-28 20:02:58 -05:00
sinfo . core . sessions . ping ( sinfo )
2019-06-28 18:42:31 -05:00
case time . Since ( sinfo . time ) > 6 * time . Second :
if sinfo . time . Before ( sinfo . pingTime ) && time . Since ( sinfo . pingTime ) > 6 * time . Second {
// TODO double check that the above condition is correct
doSearch ( )
} else {
sinfo . core . sessions . ping ( sinfo )
}
default : // Don't do anything, to keep traffic throttled
}
2019-04-26 19:31:47 -05:00
}
2019-05-23 20:27:52 -05:00
// Set up a timer so this doesn't block forever
timer := getDeadlineTimer ( & c . writeDeadline )
defer util . TimerStop ( timer )
2019-04-26 19:31:47 -05:00
// Hand over to the session worker
select { // Send to worker
case sinfo . worker <- workerFunc :
case <- timer . C :
2019-05-29 20:16:17 +01:00
return 0 , ConnError { errors . New ( "timeout" ) , true , false , 0 }
2019-04-26 19:31:47 -05:00
}
2019-05-23 20:27:52 -05:00
// Wait for the worker to finish, otherwise there are memory errors ([Get||Put]Bytes stuff)
<- done
2019-04-22 15:00:19 +01:00
// Give the packet to the router
2019-05-29 20:16:17 +01:00
if written > 0 {
sinfo . core . router . out ( packet )
}
2019-04-22 15:00:19 +01:00
// Finally return the number of bytes we wrote
2019-05-29 20:16:17 +01:00
return written , err
2019-04-18 16:38:24 +01:00
}
func ( c * Conn ) Close ( ) error {
2019-04-26 19:31:47 -05:00
c . mutex . Lock ( )
defer c . mutex . Unlock ( )
if c . session != nil {
// Close the session, if it hasn't been closed already
c . session . close ( )
}
2019-04-22 15:00:19 +01:00
// This can't fail yet - TODO?
2019-04-26 19:31:47 -05:00
c . closed = true
2019-04-18 16:38:24 +01:00
return nil
}
func ( c * Conn ) LocalAddr ( ) crypto . NodeID {
return * crypto . GetNodeID ( & c . session . core . boxPub )
}
func ( c * Conn ) RemoteAddr ( ) crypto . NodeID {
2019-04-20 16:32:27 +01:00
c . mutex . RLock ( )
defer c . mutex . RUnlock ( )
return * c . nodeID
2019-04-18 16:38:24 +01:00
}
func ( c * Conn ) SetDeadline ( t time . Time ) error {
c . SetReadDeadline ( t )
c . SetWriteDeadline ( t )
return nil
}
func ( c * Conn ) SetReadDeadline ( t time . Time ) error {
2019-04-22 11:20:35 +01:00
c . readDeadline . Store ( t )
2019-04-18 16:38:24 +01:00
return nil
}
func ( c * Conn ) SetWriteDeadline ( t time . Time ) error {
2019-04-22 11:20:35 +01:00
c . writeDeadline . Store ( t )
2019-04-18 16:38:24 +01:00
return nil
}