mirror of
https://github.com/yggdrasil-network/yggdrasil-go.git
synced 2025-01-04 22:27:48 +00:00
252 lines
6.3 KiB
Go
252 lines
6.3 KiB
Go
package core
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ed25519"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/url"
|
|
"time"
|
|
|
|
iwe "github.com/Arceliar/ironwood/encrypted"
|
|
iwn "github.com/Arceliar/ironwood/network"
|
|
iwt "github.com/Arceliar/ironwood/types"
|
|
"github.com/Arceliar/phony"
|
|
"github.com/gologme/log"
|
|
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/address"
|
|
"github.com/yggdrasil-network/yggdrasil-go/src/version"
|
|
)
|
|
|
|
// The Core object represents the Yggdrasil node. You should create a Core
|
|
// object for each Yggdrasil node you plan to run.
|
|
type Core struct {
|
|
// This is the main data structure that holds everything else for a node
|
|
// We're going to keep our own copy of the provided config - that way we can
|
|
// guarantee that it will be covered by the mutex
|
|
phony.Inbox
|
|
*iwe.PacketConn
|
|
ctx context.Context
|
|
cancel context.CancelFunc
|
|
secret ed25519.PrivateKey
|
|
public ed25519.PublicKey
|
|
links links
|
|
proto protoHandler
|
|
log Logger
|
|
addPeerTimer *time.Timer
|
|
config struct {
|
|
tls *tls.Config // immutable after startup
|
|
//_peers map[Peer]*linkInfo // configurable after startup
|
|
_listeners map[ListenAddress]struct{} // configurable after startup
|
|
nodeinfo NodeInfo // immutable after startup
|
|
nodeinfoPrivacy NodeInfoPrivacy // immutable after startup
|
|
_allowedPublicKeys map[[32]byte]struct{} // configurable after startup
|
|
}
|
|
pathNotify func(ed25519.PublicKey)
|
|
}
|
|
|
|
func New(cert *tls.Certificate, logger Logger, opts ...SetupOption) (*Core, error) {
|
|
c := &Core{
|
|
log: logger,
|
|
}
|
|
c.ctx, c.cancel = context.WithCancel(context.Background())
|
|
if c.log == nil {
|
|
c.log = log.New(io.Discard, "", 0)
|
|
}
|
|
|
|
if name := version.BuildName(); name != "unknown" {
|
|
c.log.Infoln("Build name:", name)
|
|
}
|
|
if version := version.BuildVersion(); version != "unknown" {
|
|
c.log.Infoln("Build version:", version)
|
|
}
|
|
|
|
var err error
|
|
c.config._listeners = map[ListenAddress]struct{}{}
|
|
c.config._allowedPublicKeys = map[[32]byte]struct{}{}
|
|
for _, opt := range opts {
|
|
switch opt.(type) {
|
|
case Peer, ListenAddress:
|
|
// We can't do peers yet as the links aren't set up.
|
|
continue
|
|
default:
|
|
if err = c._applyOption(opt); err != nil {
|
|
return nil, fmt.Errorf("failed to apply configuration option %T: %w", opt, err)
|
|
}
|
|
}
|
|
}
|
|
if cert == nil || cert.PrivateKey == nil {
|
|
return nil, fmt.Errorf("no private key supplied")
|
|
}
|
|
var ok bool
|
|
if c.secret, ok = cert.PrivateKey.(ed25519.PrivateKey); !ok {
|
|
return nil, fmt.Errorf("private key must be ed25519")
|
|
}
|
|
if len(c.secret) != ed25519.PrivateKeySize {
|
|
return nil, fmt.Errorf("private key is incorrect length")
|
|
}
|
|
c.public = c.secret.Public().(ed25519.PublicKey)
|
|
|
|
if c.config.tls, err = c.generateTLSConfig(cert); err != nil {
|
|
return nil, fmt.Errorf("error generating TLS config: %w", err)
|
|
}
|
|
keyXform := func(key ed25519.PublicKey) ed25519.PublicKey {
|
|
return address.SubnetForKey(key).GetKey()
|
|
}
|
|
if c.PacketConn, err = iwe.NewPacketConn(
|
|
c.secret,
|
|
iwn.WithBloomTransform(keyXform),
|
|
iwn.WithPeerMaxMessageSize(65535*2),
|
|
iwn.WithPathNotify(c.doPathNotify),
|
|
); err != nil {
|
|
return nil, fmt.Errorf("error creating encryption: %w", err)
|
|
}
|
|
c.proto.init(c)
|
|
if err := c.links.init(c); err != nil {
|
|
return nil, fmt.Errorf("error initialising links: %w", err)
|
|
}
|
|
for _, opt := range opts {
|
|
switch opt.(type) {
|
|
case Peer, ListenAddress:
|
|
// Now do the peers and listeners.
|
|
if err = c._applyOption(opt); err != nil {
|
|
return nil, fmt.Errorf("failed to apply configuration option %T: %w", opt, err)
|
|
}
|
|
default:
|
|
continue
|
|
}
|
|
}
|
|
if err := c.proto.nodeinfo.setNodeInfo(c.config.nodeinfo, bool(c.config.nodeinfoPrivacy)); err != nil {
|
|
return nil, fmt.Errorf("error setting node info: %w", err)
|
|
}
|
|
for listenaddr := range c.config._listeners {
|
|
u, err := url.Parse(string(listenaddr))
|
|
if err != nil {
|
|
c.log.Errorf("Invalid listener URI %q specified, ignoring\n", listenaddr)
|
|
continue
|
|
}
|
|
if _, err = c.links.listen(u, ""); err != nil {
|
|
c.log.Errorf("Failed to start listener %q: %s\n", listenaddr, err)
|
|
}
|
|
}
|
|
return c, nil
|
|
}
|
|
|
|
func (c *Core) RetryPeersNow() {
|
|
phony.Block(&c.links, func() {
|
|
for _, l := range c.links._links {
|
|
select {
|
|
case l.kick <- struct{}{}:
|
|
default:
|
|
}
|
|
}
|
|
})
|
|
}
|
|
|
|
// Stop shuts down the Yggdrasil node.
|
|
func (c *Core) Stop() {
|
|
phony.Block(c, func() {
|
|
c.log.Infoln("Stopping...")
|
|
_ = c._close()
|
|
c.log.Infoln("Stopped")
|
|
})
|
|
}
|
|
|
|
// This function is unsafe and should only be ran by the core actor.
|
|
func (c *Core) _close() error {
|
|
c.cancel()
|
|
c.links.shutdown()
|
|
err := c.PacketConn.Close()
|
|
if c.addPeerTimer != nil {
|
|
c.addPeerTimer.Stop()
|
|
c.addPeerTimer = nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (c *Core) MTU() uint64 {
|
|
const sessionTypeOverhead = 1
|
|
MTU := c.PacketConn.MTU() - sessionTypeOverhead
|
|
if MTU > 65535 {
|
|
MTU = 65535
|
|
}
|
|
return MTU
|
|
}
|
|
|
|
func (c *Core) ReadFrom(p []byte) (n int, from net.Addr, err error) {
|
|
buf := allocBytes(int(c.PacketConn.MTU()))
|
|
defer freeBytes(buf)
|
|
for {
|
|
bs := buf
|
|
n, from, err = c.PacketConn.ReadFrom(bs)
|
|
if err != nil {
|
|
return 0, from, err
|
|
}
|
|
if n == 0 {
|
|
continue
|
|
}
|
|
switch bs[0] {
|
|
case typeSessionTraffic:
|
|
// This is what we want to handle here
|
|
case typeSessionProto:
|
|
var key keyArray
|
|
copy(key[:], from.(iwt.Addr))
|
|
data := append([]byte(nil), bs[1:n]...)
|
|
c.proto.handleProto(nil, key, data)
|
|
continue
|
|
default:
|
|
continue
|
|
}
|
|
bs = bs[1:n]
|
|
copy(p, bs)
|
|
if len(p) < len(bs) {
|
|
n = len(p)
|
|
} else {
|
|
n = len(bs)
|
|
}
|
|
return
|
|
}
|
|
}
|
|
|
|
func (c *Core) WriteTo(p []byte, addr net.Addr) (n int, err error) {
|
|
buf := allocBytes(0)
|
|
defer freeBytes(buf)
|
|
buf = append(buf, typeSessionTraffic)
|
|
buf = append(buf, p...)
|
|
n, err = c.PacketConn.WriteTo(buf, addr)
|
|
if n > 0 {
|
|
n -= 1
|
|
}
|
|
return
|
|
}
|
|
|
|
func (c *Core) doPathNotify(key ed25519.PublicKey) {
|
|
c.Act(nil, func() {
|
|
if c.pathNotify != nil {
|
|
c.pathNotify(key)
|
|
}
|
|
})
|
|
}
|
|
|
|
func (c *Core) SetPathNotify(notify func(ed25519.PublicKey)) {
|
|
c.Act(nil, func() {
|
|
c.pathNotify = notify
|
|
})
|
|
}
|
|
|
|
type Logger interface {
|
|
Printf(string, ...interface{})
|
|
Println(...interface{})
|
|
Infof(string, ...interface{})
|
|
Infoln(...interface{})
|
|
Warnf(string, ...interface{})
|
|
Warnln(...interface{})
|
|
Errorf(string, ...interface{})
|
|
Errorln(...interface{})
|
|
Debugf(string, ...interface{})
|
|
Debugln(...interface{})
|
|
Traceln(...interface{})
|
|
}
|