2017-12-29 04:16:20 +00:00
package yggdrasil
// This part does most of the work to handle packets to/from yourself
// It also manages crypto and dht info
2018-01-26 23:30:51 +00:00
// TODO clean up old/unused code, maybe improve comments on whatever is left
2017-12-29 04:16:20 +00:00
// Send:
2019-03-28 19:09:19 +00:00
// Receive a packet from the adapter
2017-12-29 04:16:20 +00:00
// Look up session (if none exists, trigger a search)
// Hand off to session (which encrypts, etc)
// Session will pass it back to router.out, which hands it off to the self peer
// The self peer triggers a lookup to find which peer to send to next
// And then passes it to that's peer's peer.out function
// The peer.out function sends it over the wire to the matching peer
// Recv:
// A packet comes in off the wire, and goes to a peer.handlePacket
// The peer does a lookup, sees no better peer than the self
// Hands it to the self peer.out, which passes it to router.in
// If it's dht/seach/etc. traffic, the router passes it to that part
// If it's an encapsulated IPv6 packet, the router looks up the session for it
// The packet is passed to the session, which decrypts it, router.recvPacket
2019-03-28 19:09:19 +00:00
// The router then runs some sanity checks before passing it to the adapter
2017-12-29 04:16:20 +00:00
2018-06-12 22:50:08 +00:00
import (
2019-04-22 01:38:14 +00:00
//"bytes"
2019-04-22 22:12:13 +00:00
2018-06-12 22:50:08 +00:00
"time"
2018-01-04 22:37:51 +00:00
2018-12-15 02:49:18 +00:00
"github.com/yggdrasil-network/yggdrasil-go/src/address"
"github.com/yggdrasil-network/yggdrasil-go/src/crypto"
"github.com/yggdrasil-network/yggdrasil-go/src/util"
2019-08-23 23:47:15 +00:00
"github.com/Arceliar/phony"
2018-06-12 22:50:08 +00:00
)
2017-12-29 04:16:20 +00:00
2019-03-28 19:09:19 +00:00
// The router struct has channels to/from the adapter device and a self peer (0), which is how messages are passed between this node and the peers/switch layer.
2018-06-10 23:03:28 +00:00
// The router's mainLoop goroutine is responsible for managing all information related to the dht, searches, and crypto sessions.
2017-12-29 04:16:20 +00:00
type router struct {
2019-08-23 23:47:15 +00:00
phony . Actor
2018-12-29 18:51:51 +00:00
core * Core
2018-12-30 12:04:42 +00:00
reconfigure chan chan error
2018-12-29 18:51:51 +00:00
addr address . Address
subnet address . Subnet
2019-08-23 23:47:15 +00:00
out func ( [ ] byte ) // packets we're sending to the network, link to peer's "in"
2019-04-22 22:12:13 +00:00
nodeinfo nodeinfo
2019-03-28 09:50:13 +00:00
}
2019-03-28 19:09:19 +00:00
// Initializes the router struct, which includes setting up channels to/from the adapter.
2017-12-29 04:16:20 +00:00
func ( r * router ) init ( core * Core ) {
2018-01-04 22:37:51 +00:00
r . core = core
2018-12-30 12:04:42 +00:00
r . reconfigure = make ( chan chan error , 1 )
2018-12-15 02:49:18 +00:00
r . addr = * address . AddrForNodeID ( & r . core . dht . nodeID )
r . subnet = * address . SubnetForNodeID ( & r . core . dht . nodeID )
2019-03-04 20:33:08 +00:00
self := linkInterface {
name : "(self)" ,
info : linkInfo {
local : "(self)" ,
remote : "(self)" ,
linkType : "self" ,
} ,
}
p := r . core . peers . newPeer ( & r . core . boxPub , & r . core . sigPub , & crypto . BoxSharedKey { } , & self , nil )
2019-08-23 23:47:15 +00:00
p . out = func ( packets [ ] [ ] byte ) {
// TODO make peers and/or the switch into actors, have them pass themselves as the from field
r . handlePackets ( r , packets )
}
2019-08-23 23:55:41 +00:00
r . out = p . handlePacket // TODO if the peer becomes its own actor, then send a message here
2019-01-16 13:23:26 +00:00
r . nodeinfo . init ( r . core )
2019-03-28 00:30:25 +00:00
r . core . config . Mutex . RLock ( )
r . nodeinfo . setNodeInfo ( r . core . config . Current . NodeInfo , r . core . config . Current . NodeInfoPrivacy )
r . core . config . Mutex . RUnlock ( )
2018-05-27 21:13:37 +00:00
}
2018-06-10 23:03:28 +00:00
// Starts the mainLoop goroutine.
2018-05-27 21:13:37 +00:00
func ( r * router ) start ( ) error {
2019-01-27 13:31:43 +00:00
r . core . log . Infoln ( "Starting router" )
2018-01-04 22:37:51 +00:00
go r . mainLoop ( )
2018-05-27 21:13:37 +00:00
return nil
2017-12-29 04:16:20 +00:00
}
2019-08-23 23:47:15 +00:00
// In practice, the switch will call this with 1 packet
func ( r * router ) handlePackets ( from phony . IActor , packets [ ] [ ] byte ) {
r . EnqueueFrom ( from , func ( ) {
for _ , packet := range packets {
r . handlePacket ( packet )
}
} )
}
// Insert a peer info into the dht, TODO? make the dht a separate actor
func ( r * router ) insertPeer ( from phony . IActor , info * dhtInfo ) {
r . EnqueueFrom ( from , func ( ) {
r . core . dht . insertPeer ( info )
} )
}
// Reset sessions and DHT after the switch sees our coords change
func ( r * router ) reset ( from phony . IActor ) {
r . EnqueueFrom ( from , func ( ) {
r . core . sessions . reset ( )
r . core . dht . reset ( )
} )
}
// TODO remove reconfigure so this is just a ticker loop
// and then find something better than a ticker loop to schedule things...
2017-12-29 04:16:20 +00:00
func ( r * router ) mainLoop ( ) {
2018-01-04 22:37:51 +00:00
ticker := time . NewTicker ( time . Second )
defer ticker . Stop ( )
for {
select {
case <- ticker . C :
2019-08-23 23:47:15 +00:00
r . SyncExec ( func ( ) {
2018-01-04 22:37:51 +00:00
// Any periodic maintenance stuff goes here
2018-06-07 04:10:33 +00:00
r . core . switchTable . doMaintenance ( )
2018-01-04 22:37:51 +00:00
r . core . dht . doMaintenance ( )
2018-06-22 01:31:30 +00:00
r . core . sessions . cleanup ( )
2019-08-23 23:47:15 +00:00
} )
2018-12-30 12:04:42 +00:00
case e := <- r . reconfigure :
2019-08-23 23:47:15 +00:00
r . SyncExec ( func ( ) {
current := r . core . config . GetCurrent ( )
e <- r . nodeinfo . setNodeInfo ( current . NodeInfo , current . NodeInfoPrivacy )
} )
2018-01-04 22:37:51 +00:00
}
}
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Checks incoming traffic type and passes it to the appropriate handler.
2019-08-23 23:47:15 +00:00
func ( r * router ) handlePacket ( packet [ ] byte ) {
2018-01-04 22:37:51 +00:00
pType , pTypeLen := wire_decode_uint64 ( packet )
if pTypeLen == 0 {
return
}
switch pType {
case wire_Traffic :
r . handleTraffic ( packet )
case wire_ProtocolTraffic :
r . handleProto ( packet )
2018-06-12 22:50:08 +00:00
default :
2018-01-04 22:37:51 +00:00
}
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Handles incoming traffic, i.e. encapuslated ordinary IPv6 packets.
2019-03-28 19:09:19 +00:00
// Passes them to the crypto session worker to be decrypted and sent to the adapter.
2017-12-29 04:16:20 +00:00
func ( r * router ) handleTraffic ( packet [ ] byte ) {
2018-12-15 02:49:18 +00:00
defer util . PutBytes ( packet )
2018-01-04 22:37:51 +00:00
p := wire_trafficPacket { }
if ! p . decode ( packet ) {
return
}
2018-06-02 20:21:05 +00:00
sinfo , isIn := r . core . sessions . getSessionForHandle ( & p . Handle )
2019-08-06 00:11:28 +00:00
if ! isIn {
2019-08-05 23:49:15 +00:00
util . PutBytes ( p . Payload )
2018-01-04 22:37:51 +00:00
return
}
2019-04-22 01:38:14 +00:00
select {
2019-08-07 00:25:55 +00:00
case sinfo . fromRouter <- p :
2019-08-04 07:21:41 +00:00
case <- sinfo . cancel . Finished ( ) :
2019-04-22 01:38:14 +00:00
util . PutBytes ( p . Payload )
}
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Handles protocol traffic by decrypting it, checking its type, and passing it to the appropriate handler for that traffic type.
2017-12-29 04:16:20 +00:00
func ( r * router ) handleProto ( packet [ ] byte ) {
2018-01-04 22:37:51 +00:00
// First parse the packet
p := wire_protoTrafficPacket { }
if ! p . decode ( packet ) {
return
}
// Now try to open the payload
2018-12-15 02:49:18 +00:00
var sharedKey * crypto . BoxSharedKey
2018-06-02 20:21:05 +00:00
if p . ToKey == r . core . boxPub {
2018-01-04 22:37:51 +00:00
// Try to open using our permanent key
2018-06-02 20:21:05 +00:00
sharedKey = r . core . sessions . getSharedKey ( & r . core . boxPriv , & p . FromKey )
2018-01-04 22:37:51 +00:00
} else {
return
}
2018-12-15 02:49:18 +00:00
bs , isOK := crypto . BoxOpen ( sharedKey , p . Payload , & p . Nonce )
2018-01-04 22:37:51 +00:00
if ! isOK {
return
}
// Now do something with the bytes in bs...
2019-03-28 19:09:19 +00:00
// send dht messages to dht, sessionRefresh to sessions, data to adapter...
2018-01-04 22:37:51 +00:00
// For data, should check that key and IP match...
bsType , bsTypeLen := wire_decode_uint64 ( bs )
if bsTypeLen == 0 {
return
}
switch bsType {
case wire_SessionPing :
2018-06-02 20:21:05 +00:00
r . handlePing ( bs , & p . FromKey )
2018-01-04 22:37:51 +00:00
case wire_SessionPong :
2018-06-02 20:21:05 +00:00
r . handlePong ( bs , & p . FromKey )
2018-12-15 22:37:11 +00:00
case wire_NodeInfoRequest :
2018-10-21 21:58:27 +00:00
fallthrough
2018-12-15 22:37:11 +00:00
case wire_NodeInfoResponse :
r . handleNodeInfo ( bs , & p . FromKey )
2018-01-04 22:37:51 +00:00
case wire_DHTLookupRequest :
2018-06-02 20:21:05 +00:00
r . handleDHTReq ( bs , & p . FromKey )
2018-01-04 22:37:51 +00:00
case wire_DHTLookupResponse :
2018-06-02 20:21:05 +00:00
r . handleDHTRes ( bs , & p . FromKey )
2018-06-10 23:03:28 +00:00
default :
2018-12-15 02:49:18 +00:00
util . PutBytes ( packet )
2018-01-04 22:37:51 +00:00
}
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Decodes session pings from wire format and passes them to sessions.handlePing where they either create or update a session.
2018-12-15 02:49:18 +00:00
func ( r * router ) handlePing ( bs [ ] byte , fromKey * crypto . BoxPubKey ) {
2018-01-04 22:37:51 +00:00
ping := sessionPing { }
if ! ping . decode ( bs ) {
return
}
2018-06-02 21:19:42 +00:00
ping . SendPermPub = * fromKey
2018-01-04 22:37:51 +00:00
r . core . sessions . handlePing ( & ping )
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Handles session pongs (which are really pings with an extra flag to prevent acknowledgement).
2018-12-15 02:49:18 +00:00
func ( r * router ) handlePong ( bs [ ] byte , fromKey * crypto . BoxPubKey ) {
2018-01-04 22:37:51 +00:00
r . handlePing ( bs , fromKey )
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Decodes dht requests and passes them to dht.handleReq to trigger a lookup/response.
2018-12-15 02:49:18 +00:00
func ( r * router ) handleDHTReq ( bs [ ] byte , fromKey * crypto . BoxPubKey ) {
2018-01-04 22:37:51 +00:00
req := dhtReq { }
if ! req . decode ( bs ) {
return
}
2018-06-02 21:19:42 +00:00
req . Key = * fromKey
2018-01-04 22:37:51 +00:00
r . core . dht . handleReq ( & req )
2017-12-29 04:16:20 +00:00
}
2018-06-10 23:03:28 +00:00
// Decodes dht responses and passes them to dht.handleRes to update the DHT table and further pass them to the search code (if applicable).
2018-12-15 02:49:18 +00:00
func ( r * router ) handleDHTRes ( bs [ ] byte , fromKey * crypto . BoxPubKey ) {
2018-01-04 22:37:51 +00:00
res := dhtRes { }
if ! res . decode ( bs ) {
return
}
2018-06-02 21:19:42 +00:00
res . Key = * fromKey
2018-01-04 22:37:51 +00:00
r . core . dht . handleRes ( & res )
2017-12-29 04:16:20 +00:00
}
2018-12-15 22:37:11 +00:00
// Decodes nodeinfo request
2018-12-16 00:11:02 +00:00
func ( r * router ) handleNodeInfo ( bs [ ] byte , fromKey * crypto . BoxPubKey ) {
2018-12-15 22:37:11 +00:00
req := nodeinfoReqRes { }
2018-10-21 21:58:27 +00:00
if ! req . decode ( bs ) {
return
}
req . SendPermPub = * fromKey
2019-01-14 19:05:16 +00:00
r . nodeinfo . handleNodeInfo ( & req )
2018-10-21 21:58:27 +00:00
}
2019-08-23 23:47:15 +00:00
// TODO remove this, have things either be actors that send message or else call SyncExec directly
2018-01-21 18:55:45 +00:00
func ( r * router ) doAdmin ( f func ( ) ) {
2019-08-23 23:47:15 +00:00
r . SyncExec ( f )
2018-01-21 18:55:45 +00:00
}