WIP: Cleanup
This commit is contained in:
parent
31c48fbafd
commit
302d27692b
@ -7,7 +7,7 @@
|
||||
* (startupCount << 48) + counter
|
||||
* pass startup count to newRoutingTable function (or global?)
|
||||
* write / increment on startup
|
||||
* Use startup counter for trace IDs as well.
|
||||
* Use startup counter for trace IDs as well (see Globals)
|
||||
* Double buffering in IFReader and ConnReader ?
|
||||
* Clean up state machine - one class w/
|
||||
* type stateFunc func(msg any) stateFunc
|
||||
|
@ -44,7 +44,3 @@ func (r *ConnReader) handleNextPacket() {
|
||||
|
||||
r.RemotePeers[h.SourceIP].Load().HandlePacket(h, remoteAddr, buf)
|
||||
}
|
||||
|
||||
func (r *ConnReader) logf(format string, args ...any) {
|
||||
log.Printf("[ConnReader] "+format, args...)
|
||||
}
|
||||
|
@ -1,191 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"reflect"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func newRoutePairForTesting() (*remotePeer, *remotePeer) {
|
||||
keys1 := generateKeys()
|
||||
keys2 := generateKeys()
|
||||
|
||||
r1 := newRemotePeer(1)
|
||||
r1.PubSignKey = keys1.PubSignKey
|
||||
r1.ControlCipher = newControlCipher(keys1.PrivKey, keys2.PubKey)
|
||||
r1.DataCipher = newDataCipher()
|
||||
|
||||
r2 := newRemotePeer(2)
|
||||
r2.PubSignKey = keys2.PubSignKey
|
||||
r2.ControlCipher = newControlCipher(keys2.PrivKey, keys1.PubKey)
|
||||
r2.DataCipher = r1.DataCipher
|
||||
|
||||
return r1, r2
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := r1.EncryptControlPacket(in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
iMsg, err := r2.DecryptControlPacket(netip.AddrPort{}, h, enc, tmp)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
msg, ok := iMsg.(controlMsg[packetSyn])
|
||||
if !ok {
|
||||
t.Fatal(ok)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(msg.Packet, in) {
|
||||
t.Fatal(msg)
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
func TestDecryptControlPacket_decryptionFailed(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
for i := range enc {
|
||||
x := bytes.Clone(enc)
|
||||
x[i]++
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, x, tmp)
|
||||
if !errors.Is(err, errDecryptionFailed) {
|
||||
t.Fatal(i, err)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket_duplicate(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
if _, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp)
|
||||
if !errors.Is(err, errDuplicateSeqNum) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket_invalidPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := testPacket("hello!")
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp)
|
||||
if !errors.Is(err, errUnknownPacketType) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
out, err := decryptDataPacket(r1, h, bytes.Clone(enc), out)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if !bytes.Equal(data, out) {
|
||||
t.Fatal(data, out)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket_incorrectCipher(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, bytes.Clone(out))
|
||||
h := parseHeader(enc)
|
||||
|
||||
r1.DataCipher = newDataCipher()
|
||||
_, err := decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if !errors.Is(err, errDecryptionFailed) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket_duplicate(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, bytes.Clone(out))
|
||||
h := parseHeader(enc)
|
||||
|
||||
_, err := decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
_, err = decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if !errors.Is(err, errDuplicateSeqNum) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
*/
|
@ -3,8 +3,6 @@ package peer
|
||||
import "errors"
|
||||
|
||||
var (
|
||||
errDecryptionFailed = errors.New("decryption failed")
|
||||
errDuplicateSeqNum = errors.New("duplicate sequence number")
|
||||
errMalformedPacket = errors.New("malformed packet")
|
||||
errUnknownPacketType = errors.New("unknown packet type")
|
||||
)
|
||||
|
@ -31,10 +31,6 @@ var multicastAddr = net.UDPAddrFromAddrPort(netip.AddrPortFrom(
|
||||
netip.AddrFrom4([4]byte{224, 0, 0, 157}),
|
||||
4560))
|
||||
|
||||
type marshaller interface {
|
||||
Marshal([]byte) []byte
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type Globals struct {
|
||||
@ -62,6 +58,7 @@ type Globals struct {
|
||||
IFace io.ReadWriteCloser
|
||||
|
||||
// For trace ID.
|
||||
NewTraceID func() uint64
|
||||
}
|
||||
|
||||
func NewGlobals(
|
||||
@ -90,6 +87,12 @@ func NewGlobals(
|
||||
|
||||
g.IFace = iface
|
||||
|
||||
// TODO: Initialize w/ startup count.
|
||||
traceID := uint64(time.Now().Unix()<<30) + 1
|
||||
g.NewTraceID = func() uint64 {
|
||||
return atomic.AddUint64(&traceID, 1)
|
||||
}
|
||||
|
||||
for i := range g.RemotePeers {
|
||||
g.RemotePeers[i] = &atomic.Pointer[Remote]{}
|
||||
}
|
||||
|
@ -2,18 +2,9 @@ package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
"unsafe"
|
||||
)
|
||||
|
||||
// TODO: Initialize w/ startup counter.
|
||||
var traceIDCounter uint64 = uint64(time.Now().Unix()<<30) + 1
|
||||
|
||||
func newTraceID() uint64 {
|
||||
return atomic.AddUint64(&traceIDCounter, 1)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type binWriter struct {
|
||||
|
@ -55,7 +55,6 @@ func newPeerMain(args mainArgs) *peerMain {
|
||||
|
||||
localPeer := state.Peers[config.LocalPeerIP]
|
||||
|
||||
log.Printf("XXXXX %v %v", config.LocalPeerIP, localPeer)
|
||||
myAddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf(":%d", localPeer.Port))
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to resolve UDP address: %v", err)
|
||||
|
@ -1,114 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/rand"
|
||||
mrand "math/rand"
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
)
|
||||
|
||||
// A test peer.
|
||||
type P struct {
|
||||
cryptoKeys
|
||||
RT *atomic.Pointer[routingTable]
|
||||
Conn *TestUDPConn
|
||||
IFace *TestIFace
|
||||
ConnReader *ConnReader
|
||||
IFReader *IFReader
|
||||
}
|
||||
|
||||
func NewPeerForTesting(n *TestNetwork, ip byte, addr netip.AddrPort) P {
|
||||
p := P{
|
||||
cryptoKeys: generateKeys(),
|
||||
RT: &atomic.Pointer[routingTable]{},
|
||||
IFace: NewTestIFace(),
|
||||
}
|
||||
|
||||
rt := newRoutingTable(ip, addr)
|
||||
p.RT.Store(&rt)
|
||||
p.Conn = n.NewUDPConn(addr)
|
||||
//p.ConnWriter = NewConnWriter(p.Conn.WriteToUDPAddrPort, p.RT)
|
||||
|
||||
return p
|
||||
}
|
||||
|
||||
func ConnectPeers(p1, p2 *P) {
|
||||
rt1 := p1.RT.Load()
|
||||
rt2 := p2.RT.Load()
|
||||
|
||||
ip1 := rt1.LocalIP
|
||||
ip2 := rt2.LocalIP
|
||||
|
||||
rt1.Peers[ip2].Up = true
|
||||
rt1.Peers[ip2].Direct = true
|
||||
rt1.Peers[ip2].Relay = true
|
||||
rt1.Peers[ip2].DirectAddr = rt2.LocalAddr
|
||||
rt1.Peers[ip2].PubSignKey = p2.PubSignKey
|
||||
rt1.Peers[ip2].ControlCipher = newControlCipher(p1.PrivKey, p2.PubKey)
|
||||
rt1.Peers[ip2].DataCipher = newDataCipher()
|
||||
|
||||
rt2.Peers[ip1].Up = true
|
||||
rt2.Peers[ip1].Direct = true
|
||||
rt2.Peers[ip1].Relay = true
|
||||
rt2.Peers[ip1].DirectAddr = rt1.LocalAddr
|
||||
rt2.Peers[ip1].PubSignKey = p1.PubSignKey
|
||||
rt2.Peers[ip1].ControlCipher = newControlCipher(p2.PrivKey, p1.PubKey)
|
||||
rt2.Peers[ip1].DataCipher = rt1.Peers[ip2].DataCipher
|
||||
}
|
||||
|
||||
func NewPeersForTesting() (p1, p2, p3 P) {
|
||||
n := NewTestNetwork()
|
||||
|
||||
p1 = NewPeerForTesting(
|
||||
n,
|
||||
1,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 1}), 100))
|
||||
|
||||
p2 = NewPeerForTesting(
|
||||
n,
|
||||
2,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 2}), 200))
|
||||
|
||||
p3 = NewPeerForTesting(
|
||||
n,
|
||||
3,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 3}), 300))
|
||||
|
||||
ConnectPeers(&p1, &p2)
|
||||
ConnectPeers(&p1, &p3)
|
||||
ConnectPeers(&p2, &p3)
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
func RandPacket() []byte {
|
||||
n := mrand.Intn(1200)
|
||||
b := make([]byte, n)
|
||||
rand.Read(b)
|
||||
return b
|
||||
}
|
||||
|
||||
func ModifyPacket(in []byte) []byte {
|
||||
x := make([]byte, 1)
|
||||
|
||||
for {
|
||||
rand.Read(x)
|
||||
out := bytes.Clone(in)
|
||||
idx := mrand.Intn(len(out))
|
||||
if out[idx] != x[0] {
|
||||
out[idx] = x[0]
|
||||
return out
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type UnknownControlPacket struct {
|
||||
TraceID uint64
|
||||
}
|
||||
|
||||
func (p UnknownControlPacket) Marshal(buf []byte) []byte {
|
||||
return newBinWriter(buf).Byte(255).Uint64(p.TraceID).Build()
|
||||
}
|
@ -1,371 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func TestPeerState_OnPeerUpdate_nilPeer(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_OnPeerUpdate_publicLocalIsServer(t *testing.T) {
|
||||
keys := generateKeys()
|
||||
h := NewPeerStateTestHarness()
|
||||
|
||||
state := h.State.(*stateDisconnected)
|
||||
state.localAddr = addrPort4(1, 1, 1, 2, 200)
|
||||
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
/*
|
||||
|
||||
func TestPeerState_OnPeerUpdate_clientDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
}
|
||||
|
||||
/*
|
||||
func TestPeerState_OnPeerUpdate_clientRelayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
}
|
||||
|
||||
/*
|
||||
func TestStateServer_directSyn(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
ack := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, ack.TraceID, synMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.IP, 3)
|
||||
assertEqual(t, ack.PossibleAddrs[0].IsValid(), false)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateServer_relayedSyn(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
state := h.ConfigServer_Relayed(t)
|
||||
|
||||
state.pubAddrs.Store(addrPort4(4, 5, 6, 7, 1234))
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: false,
|
||||
},
|
||||
}
|
||||
synMsg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 3, 300)
|
||||
synMsg.Packet.PossibleAddrs[1] = addrPort4(2, 2, 2, 3, 300)
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
|
||||
ack := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, ack.TraceID, synMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.IP, 3)
|
||||
assertEqual(t, ack.PossibleAddrs[0], addrPort4(4, 5, 6, 7, 1234))
|
||||
assertEqual(t, ack.PossibleAddrs[1].IsValid(), false)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
assertType[packetProbe](t, h.Sent[1].Packet)
|
||||
assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
assertEqual(t, h.Sent[1].Peer.DirectAddr, addrPort4(1, 1, 1, 3, 300))
|
||||
assertEqual(t, h.Sent[2].Peer.DirectAddr, addrPort4(2, 2, 2, 3, 300))
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
probeMsg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetProbe{TraceID: newTraceID()},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(probeMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
probe := assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, probe.TraceID, probeMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, addrPort4(1, 1, 1, 3, 300))
|
||||
}
|
||||
|
||||
func TestStateServer_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
// Ping shouldn't timeout.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
// Advance the time, then ping.
|
||||
state := assertType[*stateServer](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-timeoutInterval - time.Second)
|
||||
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnAck_incorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID + 1},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnPingTimer(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, another syn should be sent. Additionally, we should remain
|
||||
// in the same state.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
state := assertType[*stateClientDirect](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-(timeoutInterval + time.Second))
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, we should timeout, causing the client to reset. Another SYN
|
||||
// will be sent when re-entering the state, but the connection should be down.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_noAddrs(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
// If we haven't had an ack yet, we won't have addresses to probe. Therefore
|
||||
// we'll have just one more syn packet sent.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_withAddrs(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{Packet: packetAck{TraceID: syn.TraceID}}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 300)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 300)
|
||||
|
||||
h.State = h.State.OnMsg(ack)
|
||||
|
||||
// Add a local discovery address. Note that the port will be configured port
|
||||
// and no the one provided here.
|
||||
h.State = h.State.OnMsg(controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(2, 2, 2, 3, 300),
|
||||
})
|
||||
|
||||
// We should see one SYN and three probe packets.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 5)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
assertType[packetProbe](t, h.Sent[3].Packet)
|
||||
assertType[packetProbe](t, h.Sent[4].Packet)
|
||||
|
||||
assertEqual(t, h.Sent[2].Peer.DirectAddr, addrPort4(1, 1, 1, 1, 300))
|
||||
assertEqual(t, h.Sent[3].Peer.DirectAddr, addrPort4(1, 1, 1, 2, 300))
|
||||
assertEqual(t, h.Sent[4].Peer.DirectAddr, addrPort4(2, 2, 2, 3, 456))
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
state := assertType[*stateClientRelayed](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-(timeoutInterval + time.Second))
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, we should timeout, causing the client to reset. Another SYN
|
||||
// will be sent when re-entering the state, but the connection should be down.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientRelayed](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnProbe_unknownAddr(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.OnProbe(controlMsg[packetProbe]{
|
||||
Packet: packetProbe{TraceID: newTraceID()},
|
||||
})
|
||||
|
||||
assertType[*stateClientRelayed](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnProbe_upgradeDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{Packet: packetAck{TraceID: syn.TraceID}}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 300)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 300)
|
||||
|
||||
h.State = h.State.OnMsg(ack)
|
||||
h.OnPingTimer()
|
||||
|
||||
probe := assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
h.OnProbe(controlMsg[packetProbe]{Packet: probe})
|
||||
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
}
|
||||
*/
|
@ -8,8 +8,6 @@ import (
|
||||
"sync/atomic"
|
||||
"time"
|
||||
"vppn/m"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
@ -40,7 +38,6 @@ type Remote struct {
|
||||
Globals
|
||||
RemotePeerIP byte // Immutable.
|
||||
|
||||
limiter *ratelimiter.Limiter
|
||||
dupCheck *dupCheck
|
||||
sendCounter uint64 // init to startupCount << 48. Atomic access only.
|
||||
|
||||
@ -53,10 +50,6 @@ func newRemote(g Globals, remotePeerIP byte) *Remote {
|
||||
r := &Remote{
|
||||
Globals: g,
|
||||
RemotePeerIP: remotePeerIP,
|
||||
limiter: ratelimiter.New(ratelimiter.Config{
|
||||
FillPeriod: 20 * time.Millisecond,
|
||||
MaxWaitCount: 1,
|
||||
}),
|
||||
dupCheck: newDupCheck(0),
|
||||
sendCounter: uint64(time.Now().Unix()<<30) + 1,
|
||||
messages: make(chan any, 8),
|
||||
@ -88,7 +81,7 @@ func (r *Remote) updateConf(conf remoteConfig) {
|
||||
|
||||
func (r *Remote) sendUDP(b []byte, addr netip.AddrPort) {
|
||||
if _, err := r.SendUDP(b, addr); err != nil {
|
||||
r.logf("Failed to send URP packet: %v", err)
|
||||
r.logf("Failed to send UDP packet: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
@ -124,15 +117,14 @@ func (r *Remote) SendDataTo(data []byte) {
|
||||
return
|
||||
}
|
||||
|
||||
if conf.Direct {
|
||||
r.sendDataDirect(conf, data)
|
||||
} else {
|
||||
r.sendDataRelayed(conf, data)
|
||||
}
|
||||
}
|
||||
// Direct:
|
||||
|
||||
// sendDataRelayed sends data to the remote via the relay.
|
||||
func (r *Remote) sendDataRelayed(conf remoteConfig, data []byte) {
|
||||
if conf.Direct {
|
||||
r.sendUDP(r.encryptData(conf, conf.Peer.PeerIP, data), conf.DirectAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed:
|
||||
relay := r.RelayHandler.Load()
|
||||
|
||||
if relay == nil {
|
||||
@ -143,11 +135,6 @@ func (r *Remote) sendDataRelayed(conf remoteConfig, data []byte) {
|
||||
relay.relayData(conf.Peer.PeerIP, r.encryptData(conf, conf.Peer.PeerIP, data))
|
||||
}
|
||||
|
||||
// sendDataDirect sends data to the remote directly.
|
||||
func (r *Remote) sendDataDirect(conf remoteConfig, data []byte) {
|
||||
r.sendUDP(r.encryptData(conf, conf.Peer.PeerIP, data), conf.DirectAddr)
|
||||
}
|
||||
|
||||
func (r *Remote) relayData(toIP byte, enc []byte) {
|
||||
conf := r.conf()
|
||||
if !conf.Up || !conf.Direct {
|
||||
@ -158,11 +145,6 @@ func (r *Remote) relayData(toIP byte, enc []byte) {
|
||||
}
|
||||
|
||||
func (r *Remote) sendControl(conf remoteConfig, data []byte) {
|
||||
if err := r.limiter.Limit(); err != nil {
|
||||
r.logf("Rate limiter")
|
||||
return
|
||||
}
|
||||
|
||||
// Direct:
|
||||
|
||||
if conf.Direct {
|
||||
|
@ -9,6 +9,11 @@ import (
|
||||
|
||||
type stateFunc func(msg any) stateFunc
|
||||
|
||||
type sentProbe struct {
|
||||
SentAt time.Time
|
||||
Addr netip.AddrPort
|
||||
}
|
||||
|
||||
type remoteFSM struct {
|
||||
*Remote
|
||||
|
||||
@ -196,7 +201,7 @@ func (r *remoteFSM) stateServer_onSyn(msg controlMsg[packetSyn]) {
|
||||
break
|
||||
}
|
||||
r.logf("Probing %v...", addr)
|
||||
r.sendControlToAddr(packetProbe{TraceID: newTraceID()}.Marshal(r.buf), addr)
|
||||
r.sendControlToAddr(packetProbe{TraceID: r.NewTraceID()}.Marshal(r.buf), addr)
|
||||
}
|
||||
}
|
||||
|
||||
@ -264,7 +269,7 @@ func (r *remoteFSM) stateClientInit(iMsg any) stateFunc {
|
||||
|
||||
func (r *remoteFSM) stateClientInit_sendInit() {
|
||||
conf := r.conf()
|
||||
r.traceID = newTraceID()
|
||||
r.traceID = r.NewTraceID()
|
||||
init := packetInit{
|
||||
TraceID: r.traceID,
|
||||
Direct: conf.Direct,
|
||||
@ -311,7 +316,7 @@ func (r *remoteFSM) enterClient() stateFunc {
|
||||
conf := r.conf()
|
||||
r.probes = make(map[uint64]sentProbe, 8)
|
||||
|
||||
r.traceID = newTraceID()
|
||||
r.traceID = r.NewTraceID()
|
||||
r.stateClient_sendSyn(conf)
|
||||
|
||||
r.pingTimer.Reset(pingInterval)
|
||||
@ -377,7 +382,7 @@ func (r *remoteFSM) stateClient_cleanProbes() {
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_sendProbeTo(addr netip.AddrPort) {
|
||||
probe := packetProbe{TraceID: newTraceID()}
|
||||
probe := packetProbe{TraceID: r.NewTraceID()}
|
||||
r.probes[probe.TraceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addr,
|
||||
@ -403,7 +408,7 @@ func (r *remoteFSM) stateClient_onProbe(msg controlMsg[packetProbe]) {
|
||||
conf.DirectAddr = sent.Addr
|
||||
r.updateConf(conf)
|
||||
|
||||
r.traceID = newTraceID()
|
||||
r.traceID = r.NewTraceID()
|
||||
r.stateClient_sendSyn(conf)
|
||||
r.logf("Successful probe to %v.", sent.Addr)
|
||||
}
|
||||
|
@ -1,138 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
)
|
||||
|
||||
// TODO: Remove
|
||||
func newRemotePeer(ip byte) *remotePeer {
|
||||
counter := uint64(time.Now().Unix()<<30 + 1)
|
||||
return &remotePeer{
|
||||
IP: ip,
|
||||
counter: &counter,
|
||||
dupCheck: newDupCheck(0),
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type remotePeer struct {
|
||||
localIP byte
|
||||
IP byte // VPN IP of peer (last byte).
|
||||
Up bool // True if data can be sent on the peer.
|
||||
Relay bool // True if the peer is a relay.
|
||||
Direct bool // True if this is a direct connection.
|
||||
DirectAddr netip.AddrPort // Remote address if directly connected.
|
||||
PubSignKey []byte
|
||||
ControlCipher *controlCipher
|
||||
DataCipher *dataCipher
|
||||
|
||||
counter *uint64 // For sending to. Atomic access only.
|
||||
dupCheck *dupCheck // For receiving from. Not safe for concurrent use.
|
||||
}
|
||||
|
||||
func (p remotePeer) EncryptDataPacket(destIP byte, data, out []byte) []byte {
|
||||
h := Header{
|
||||
StreamID: dataStreamID,
|
||||
Counter: atomic.AddUint64(p.counter, 1),
|
||||
SourceIP: p.localIP,
|
||||
DestIP: destIP,
|
||||
}
|
||||
return p.DataCipher.Encrypt(h, data, out)
|
||||
}
|
||||
|
||||
// Decrypts and de-dups incoming data packets.
|
||||
func (p remotePeer) DecryptDataPacket(h Header, enc, out []byte) ([]byte, error) {
|
||||
dec, ok := p.DataCipher.Decrypt(enc, out)
|
||||
if !ok {
|
||||
return nil, errDecryptionFailed
|
||||
}
|
||||
|
||||
if p.dupCheck.IsDup(h.Counter) {
|
||||
return nil, errDuplicateSeqNum
|
||||
}
|
||||
|
||||
return dec, nil
|
||||
}
|
||||
|
||||
// Peer must have a ControlCipher.
|
||||
func (p remotePeer) EncryptControlPacket(pkt marshaller, tmp, out []byte) []byte {
|
||||
tmp = pkt.Marshal(tmp)
|
||||
h := Header{
|
||||
StreamID: controlStreamID,
|
||||
Counter: atomic.AddUint64(p.counter, 1),
|
||||
SourceIP: p.localIP,
|
||||
DestIP: p.IP,
|
||||
}
|
||||
|
||||
return p.ControlCipher.Encrypt(h, tmp, out)
|
||||
}
|
||||
|
||||
// Returns a controlMsg[PacketType]. Peer must have a non-nil ControlCipher.
|
||||
//
|
||||
// This function also drops packets with duplicate sequence numbers.
|
||||
func (p remotePeer) DecryptControlPacket(fromAddr netip.AddrPort, h Header, enc, tmp []byte) (any, error) {
|
||||
out, ok := p.ControlCipher.Decrypt(enc, tmp)
|
||||
if !ok {
|
||||
return nil, errDecryptionFailed
|
||||
}
|
||||
|
||||
if p.dupCheck.IsDup(h.Counter) {
|
||||
return nil, errDuplicateSeqNum
|
||||
}
|
||||
|
||||
msg, err := parseControlMsg(h.SourceIP, fromAddr, out)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return msg, nil
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type routingTable struct {
|
||||
// The LocalIP is the configured IP address of the local peer on the VPN.
|
||||
//
|
||||
// This value is constant.
|
||||
LocalIP byte
|
||||
|
||||
// The LocalAddr is the configured local public address of the peer on the
|
||||
// internet. If LocalAddr.IsValid(), then the local peer has a public
|
||||
// address.
|
||||
//
|
||||
// This value is constant.
|
||||
LocalAddr netip.AddrPort
|
||||
|
||||
// The remote peer configurations. These are updated by
|
||||
Peers [256]remotePeer
|
||||
|
||||
// The current relay's VPN IP address, or zero if no relay is available.
|
||||
RelayIP byte
|
||||
}
|
||||
|
||||
func newRoutingTable(localIP byte, localAddr netip.AddrPort) routingTable {
|
||||
rt := routingTable{
|
||||
LocalIP: localIP,
|
||||
LocalAddr: localAddr,
|
||||
}
|
||||
|
||||
for i := range rt.Peers {
|
||||
counter := uint64(time.Now().Unix()<<30 + 1)
|
||||
rt.Peers[i] = remotePeer{
|
||||
localIP: localIP,
|
||||
IP: byte(i),
|
||||
counter: &counter,
|
||||
dupCheck: newDupCheck(0),
|
||||
}
|
||||
}
|
||||
|
||||
return rt
|
||||
}
|
||||
|
||||
func (rt *routingTable) GetRelay() (remotePeer, bool) {
|
||||
relay := rt.Peers[rt.RelayIP]
|
||||
return relay, relay.Up && relay.Direct
|
||||
}
|
@ -1,169 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"reflect"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
dec, err := peer1.DecryptDataPacket(h, enc, newBuf())
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if !bytes.Equal(orig, dec) {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket_packetAltered(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
|
||||
for range 2048 {
|
||||
_, err := peer1.DecryptDataPacket(h, ModifyPacket(enc), newBuf())
|
||||
if err == nil {
|
||||
t.Fatal(enc)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket_duplicateSequenceNumber(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
h := parseHeader(enc)
|
||||
|
||||
if _, err := peer1.DecryptDataPacket(h, enc, newBuf()); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptDataPacket(h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
ctrlMsg, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf())
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
dec, ok := ctrlMsg.(controlMsg[packetProbe])
|
||||
if !ok {
|
||||
t.Fatal(ctrlMsg)
|
||||
}
|
||||
|
||||
if dec.SrcIP != 1 || dec.SrcAddr != p1.RT.Load().LocalAddr {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(dec.Packet, orig) {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_packetAltered(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
for range 2048 {
|
||||
ctrlMsg, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, ModifyPacket(enc), newBuf())
|
||||
if err == nil {
|
||||
t.Fatal(ctrlMsg)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_duplicateSequenceNumber(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_unknownPacketType(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := UnknownControlPacket{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
@ -1,162 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type sentProbe struct {
|
||||
SentAt time.Time
|
||||
Addr netip.AddrPort
|
||||
}
|
||||
|
||||
type stateClient struct {
|
||||
*peerData
|
||||
lastSeen time.Time
|
||||
syn packetSyn
|
||||
probes map[uint64]sentProbe
|
||||
}
|
||||
|
||||
func enterStateClient(data *peerData) peerState {
|
||||
ip, ipValid := netip.AddrFromSlice(data.peer.PublicIP)
|
||||
|
||||
data.staged.Relay = data.peer.Relay && ipValid
|
||||
data.staged.Direct = ipValid
|
||||
data.staged.DirectAddr = netip.AddrPortFrom(ip, data.peer.Port)
|
||||
data.publish(data.staged)
|
||||
|
||||
state := &stateClient{
|
||||
peerData: data,
|
||||
lastSeen: time.Now(),
|
||||
syn: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: data.staged.DataCipher.Key(),
|
||||
Direct: data.staged.Direct,
|
||||
PossibleAddrs: data.pubAddrs.Get(),
|
||||
},
|
||||
probes: map[uint64]sentProbe{},
|
||||
}
|
||||
|
||||
state.Send(state.staged, state.syn)
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state.logf("==> Client")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateClient) logf(str string, args ...any) {
|
||||
s.peerData.logf("CLNT | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateClient) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetAck]:
|
||||
s.onAck(msg)
|
||||
case controlMsg[packetProbe]:
|
||||
return s.onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
s.onLocalDiscovery(msg)
|
||||
case pingTimerMsg:
|
||||
return s.onPingTimer()
|
||||
default:
|
||||
s.logf("Ignoring message: %v", raw)
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onAck(msg controlMsg[packetAck]) {
|
||||
if msg.Packet.TraceID != s.syn.TraceID {
|
||||
return
|
||||
}
|
||||
|
||||
s.lastSeen = time.Now()
|
||||
|
||||
if !s.staged.Up {
|
||||
s.staged.Up = true
|
||||
s.publish(s.staged)
|
||||
s.logf("Got ACK.")
|
||||
}
|
||||
|
||||
if s.staged.Direct {
|
||||
s.pubAddrs.Store(msg.Packet.ToAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed below.
|
||||
|
||||
s.cleanProbes()
|
||||
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
s.sendProbeTo(addr)
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClient) onPingTimer() peerState {
|
||||
if time.Since(s.lastSeen) > timeoutInterval {
|
||||
if s.staged.Up {
|
||||
s.logf("Timeout.")
|
||||
}
|
||||
return initPeerState(s.peerData, s.peer)
|
||||
}
|
||||
|
||||
s.Send(s.staged, s.syn)
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onProbe(msg controlMsg[packetProbe]) peerState {
|
||||
if s.staged.Direct {
|
||||
return s
|
||||
}
|
||||
|
||||
s.cleanProbes()
|
||||
|
||||
sent, ok := s.probes[msg.Packet.TraceID]
|
||||
if !ok {
|
||||
return s
|
||||
}
|
||||
|
||||
s.staged.Direct = true
|
||||
s.staged.DirectAddr = sent.Addr
|
||||
s.publish(s.staged)
|
||||
|
||||
s.syn.TraceID = newTraceID()
|
||||
s.syn.Direct = true
|
||||
s.Send(s.staged, s.syn)
|
||||
s.logf("Successful probe to %v.", sent.Addr)
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onLocalDiscovery(msg controlMsg[packetLocalDiscovery]) {
|
||||
if s.staged.Direct {
|
||||
return
|
||||
}
|
||||
|
||||
// The source port will be the multicast port, so we'll have to
|
||||
// construct the correct address using the peer's listed port.
|
||||
addr := netip.AddrPortFrom(msg.SrcAddr.Addr(), s.peer.Port)
|
||||
s.sendProbeTo(addr)
|
||||
}
|
||||
|
||||
func (s *stateClient) cleanProbes() {
|
||||
for key, sent := range s.probes {
|
||||
if time.Since(sent.SentAt) > pingInterval {
|
||||
delete(s.probes, key)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClient) sendProbeTo(addr netip.AddrPort) {
|
||||
probe := packetProbe{TraceID: newTraceID()}
|
||||
s.probes[probe.TraceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addr,
|
||||
}
|
||||
s.logf("Probing %v...", addr)
|
||||
s.SendTo(probe, addr)
|
||||
}
|
@ -1,193 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestStateClient_peerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateClient_initialPackets(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetInit](t, h.Sent[0].Packet)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_incorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: newTraceID()},
|
||||
}
|
||||
h.OnAck(ack)
|
||||
|
||||
// Nothing should have happened.
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_direct_downToUp(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
syn := assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
|
||||
h.OnAck(ack)
|
||||
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_relayed_sendsProbes(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
syn := assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 2, 3, 4, 100)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(2, 3, 4, 5, 200)
|
||||
|
||||
h.OnAck(ack)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, ack.Packet.PossibleAddrs[0])
|
||||
assertType[packetProbe](t, h.Sent[1].Packet)
|
||||
assertEqual(t, h.Sent[1].Peer.DirectAddr, ack.Packet.PossibleAddrs[1])
|
||||
}
|
||||
|
||||
func TestStateClient_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onPing_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
state := assertType[*stateClient](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-2 * timeoutInterval)
|
||||
state.staged.Up = true
|
||||
h.OnPingTimer()
|
||||
|
||||
newState := assertType[*stateClientInit](t, h.State)
|
||||
assertEqual(t, newState.staged.Up, false)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetInit](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_direct(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
h.OnProbe(probe)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_noMatch(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
h.OnProbe(probe)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_directUpgrade(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
state := assertType[*stateClient](t, h.State)
|
||||
traceID := newTraceID()
|
||||
state.probes[traceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addrPort4(1, 2, 3, 4, 500),
|
||||
}
|
||||
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{TraceID: traceID},
|
||||
}
|
||||
|
||||
assertEqual(t, h.Published.Direct, false)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnProbe(probe)
|
||||
assertEqual(t, h.Published.Direct, true)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onLocalDiscovery_direct(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
pkt := controlMsg[packetLocalDiscovery]{
|
||||
Packet: packetLocalDiscovery{},
|
||||
}
|
||||
|
||||
h.OnLocalDiscovery(pkt)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onLocalDiscovery_relayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
pkt := controlMsg[packetLocalDiscovery]{
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 500),
|
||||
Packet: packetLocalDiscovery{},
|
||||
}
|
||||
|
||||
h.OnLocalDiscovery(pkt)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, addrPort4(1, 2, 3, 4, 456))
|
||||
}
|
@ -1,104 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type stateClientInit struct {
|
||||
*peerData
|
||||
startedAt time.Time
|
||||
traceID uint64
|
||||
}
|
||||
|
||||
func enterStateClientInit(data *peerData) peerState {
|
||||
ip, ipValid := netip.AddrFromSlice(data.peer.PublicIP)
|
||||
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = ipValid
|
||||
data.staged.DirectAddr = netip.AddrPortFrom(ip, data.peer.Port)
|
||||
data.staged.PubSignKey = data.peer.PubSignKey
|
||||
data.staged.ControlCipher = newControlCipher(data.privKey, data.peer.PubKey)
|
||||
data.staged.DataCipher = newDataCipher()
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
state := &stateClientInit{
|
||||
peerData: data,
|
||||
startedAt: time.Now(),
|
||||
traceID: newTraceID(),
|
||||
}
|
||||
state.sendInit()
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state.logf("==> ClientInit")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateClientInit) logf(str string, args ...any) {
|
||||
s.peerData.logf("INIT | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
return s.onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
s.logf("Unexpected SYN")
|
||||
return s
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
return s
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
return s.onPing()
|
||||
default:
|
||||
s.logf("Ignoring message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClientInit) onInit(msg controlMsg[packetInit]) peerState {
|
||||
if msg.Packet.TraceID != s.traceID {
|
||||
s.logf("Invalid trace ID on INIT.")
|
||||
return s
|
||||
}
|
||||
s.logf("Got INIT version %d.", msg.Packet.Version)
|
||||
return enterStateClient(s.peerData)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) onPing() peerState {
|
||||
if time.Since(s.startedAt) < timeoutInterval {
|
||||
s.sendInit()
|
||||
return s
|
||||
}
|
||||
|
||||
if s.staged.Direct {
|
||||
s.staged.Direct = false
|
||||
s.publish(s.staged)
|
||||
s.startedAt = time.Now()
|
||||
s.sendInit()
|
||||
s.logf("Direct connection failed. Attempting indirect connection.")
|
||||
return s
|
||||
}
|
||||
|
||||
s.logf("Timeout.")
|
||||
return initPeerState(s.peerData, s.peer)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) sendInit() {
|
||||
s.traceID = newTraceID()
|
||||
init := packetInit{
|
||||
TraceID: s.traceID,
|
||||
Direct: s.staged.Direct,
|
||||
Version: version,
|
||||
}
|
||||
s.Send(s.staged, init)
|
||||
}
|
@ -1,92 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestPeerState_ClientInit_initWithIncorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
|
||||
init.TraceID = newTraceID()
|
||||
h.OnInit(controlMsg[packetInit]{Packet: init})
|
||||
|
||||
assertType[*stateClientInit](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_init(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{Packet: init})
|
||||
|
||||
assertType[*stateClient](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
for range 3 {
|
||||
h.OnPingTimer()
|
||||
}
|
||||
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
|
||||
for i := range h.Sent {
|
||||
assertType[packetInit](t, h.Sent[i].Packet)
|
||||
}
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPingTimeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
state := assertType[*stateClientInit](t, h.State)
|
||||
state.startedAt = time.Now().Add(-2 * timeoutInterval)
|
||||
assertEqual(t, state.staged.Direct, true)
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// Should now try indirect connection.
|
||||
state = assertType[*stateClientInit](t, h.State)
|
||||
assertEqual(t, state.staged.Direct, false)
|
||||
|
||||
// Should re-initialize the peer after another timeout, so should be direct
|
||||
// again.
|
||||
state.startedAt = time.Now().Add(-2 * timeoutInterval)
|
||||
h.OnPingTimer()
|
||||
|
||||
assertEqual(t, state.staged.Direct, true)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPeerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
h.PeerUpdate(nil)
|
||||
|
||||
// Should have moved into the client state due to timeout.
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_ignoreMessage(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
h.OnProbe(controlMsg[packetProbe]{})
|
||||
|
||||
// Shouldn't do anything.
|
||||
assertType[*stateClientInit](t, h.State)
|
||||
}
|
@ -1,50 +0,0 @@
|
||||
package peer
|
||||
|
||||
import "net/netip"
|
||||
|
||||
type stateDisconnected struct {
|
||||
*peerData
|
||||
}
|
||||
|
||||
func enterStateDisconnected(data *peerData) peerState {
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = false
|
||||
data.staged.DirectAddr = netip.AddrPort{}
|
||||
data.staged.PubSignKey = nil
|
||||
data.staged.ControlCipher = nil
|
||||
data.staged.DataCipher = nil
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
data.pingTimer.Stop()
|
||||
|
||||
return &stateDisconnected{data}
|
||||
}
|
||||
|
||||
func (s *stateDisconnected) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
s.logf("Unexpected INIT")
|
||||
return s
|
||||
case controlMsg[packetSyn]:
|
||||
s.logf("Unexpected SYN")
|
||||
return s
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
s.logf("Unexpected probe")
|
||||
return s
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
s.logf("Unexpected ping")
|
||||
return s
|
||||
default:
|
||||
s.logf("Ignoring message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
@ -1,136 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type stateServer struct {
|
||||
*peerData
|
||||
lastSeen time.Time
|
||||
synTraceID uint64 // Last syn trace ID.
|
||||
}
|
||||
|
||||
func enterStateServer(data *peerData) peerState {
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = false
|
||||
data.staged.DirectAddr = netip.AddrPort{}
|
||||
data.staged.PubSignKey = data.peer.PubSignKey
|
||||
data.staged.ControlCipher = newControlCipher(data.privKey, data.peer.PubKey)
|
||||
data.staged.DataCipher = nil
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state := &stateServer{
|
||||
peerData: data,
|
||||
lastSeen: time.Now(),
|
||||
}
|
||||
state.logf("==> Server")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateServer) logf(str string, args ...any) {
|
||||
s.peerData.logf("SRVR | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateServer) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
return s.onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
return s.onSyn(msg)
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
return s.onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
return s.onPingTimer()
|
||||
default:
|
||||
s.logf("Unexpected message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateServer) onInit(msg controlMsg[packetInit]) peerState {
|
||||
s.staged.Up = false
|
||||
s.staged.Direct = msg.Packet.Direct
|
||||
s.staged.DirectAddr = msg.SrcAddr
|
||||
s.publish(s.staged)
|
||||
|
||||
init := packetInit{
|
||||
TraceID: msg.Packet.TraceID,
|
||||
Direct: s.staged.Direct,
|
||||
Version: version,
|
||||
}
|
||||
|
||||
s.Send(s.staged, init)
|
||||
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onSyn(msg controlMsg[packetSyn]) peerState {
|
||||
s.lastSeen = time.Now()
|
||||
p := msg.Packet
|
||||
|
||||
// Before we can respond to this packet, we need to make sure the
|
||||
// route is setup properly.
|
||||
//
|
||||
// The client will update the syn's TraceID whenever there's a change.
|
||||
// The server will follow the client's request.
|
||||
if p.TraceID != s.synTraceID || !s.staged.Up {
|
||||
s.synTraceID = p.TraceID
|
||||
s.staged.Up = true
|
||||
s.staged.Direct = p.Direct
|
||||
s.staged.DataCipher = newDataCipherFromKey(p.SharedKey)
|
||||
s.staged.DirectAddr = msg.SrcAddr
|
||||
s.publish(s.staged)
|
||||
s.logf("Got SYN.")
|
||||
}
|
||||
|
||||
// Always respond.
|
||||
s.Send(s.staged, packetAck{
|
||||
TraceID: p.TraceID,
|
||||
ToAddr: s.staged.DirectAddr,
|
||||
PossibleAddrs: s.pubAddrs.Get(),
|
||||
})
|
||||
|
||||
if p.Direct {
|
||||
return s
|
||||
}
|
||||
|
||||
// Send probes if not a direct connection.
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
s.logf("Probing %v...", addr)
|
||||
s.SendTo(packetProbe{TraceID: newTraceID()}, addr)
|
||||
}
|
||||
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onProbe(msg controlMsg[packetProbe]) peerState {
|
||||
if msg.SrcAddr.IsValid() {
|
||||
s.logf("Probe response %v...", msg.SrcAddr)
|
||||
s.SendTo(packetProbe{TraceID: msg.Packet.TraceID}, msg.SrcAddr)
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onPingTimer() peerState {
|
||||
if time.Since(s.lastSeen) > timeoutInterval && s.staged.Up {
|
||||
s.staged.Up = false
|
||||
s.publish(s.staged)
|
||||
s.logf("Timeout.")
|
||||
}
|
||||
return s
|
||||
}
|
@ -1,164 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestStateServer_peerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onInit(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
|
||||
msg := controlMsg[packetInit]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetInit{
|
||||
TraceID: newTraceID(),
|
||||
Direct: true,
|
||||
Version: 4,
|
||||
},
|
||||
}
|
||||
|
||||
h.OnInit(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
assertEqual(t, resp.Version, version)
|
||||
}
|
||||
|
||||
func TestStateServer_onSynDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
|
||||
msg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
msg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 1000)
|
||||
msg.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 2000)
|
||||
|
||||
h.OnSyn(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
}
|
||||
|
||||
func TestStateServer_onSynRelayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
msg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 1000)
|
||||
msg.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 2000)
|
||||
|
||||
h.OnSyn(msg)
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
|
||||
for i, pkt := range h.Sent[1:] {
|
||||
assertEqual(t, pkt.Peer.DirectAddr, msg.Packet.PossibleAddrs[i])
|
||||
assertType[packetProbe](t, pkt.Packet)
|
||||
}
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
h.OnProbe(msg)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe_valid(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 100),
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
h.OnProbe(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
}
|
||||
|
||||
func TestStateServer_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onPing_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
state := assertType[*stateServer](t, h.State)
|
||||
state.staged.Up = true
|
||||
state.lastSeen = time.Now().Add(-2 * timeoutInterval)
|
||||
|
||||
h.OnPingTimer()
|
||||
state = assertType[*stateServer](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
assertEqual(t, state.staged.Up, false)
|
||||
}
|
||||
|
||||
func TestStateServer_onLocalDiscovery(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 100),
|
||||
}
|
||||
h.OnLocalDiscovery(msg)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
msg := controlMsg[packetAck]{}
|
||||
h.OnAck(msg)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
@ -1,151 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"testing"
|
||||
"time"
|
||||
"vppn/m"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
type PeerStateControlMsg struct {
|
||||
Peer remotePeer
|
||||
Packet any
|
||||
}
|
||||
|
||||
type PeerStateTestHarness struct {
|
||||
data *peerData
|
||||
State peerState
|
||||
Published remotePeer
|
||||
Sent []PeerStateControlMsg
|
||||
}
|
||||
|
||||
func NewPeerStateTestHarness() *PeerStateTestHarness {
|
||||
h := &PeerStateTestHarness{}
|
||||
|
||||
keys := generateKeys()
|
||||
|
||||
state := &peerData{
|
||||
publish: func(rp remotePeer) {
|
||||
h.Published = rp
|
||||
},
|
||||
sendControlPacket: func(rp remotePeer, pkt marshaller) {
|
||||
h.Sent = append(h.Sent, PeerStateControlMsg{rp, pkt})
|
||||
},
|
||||
pingTimer: time.NewTicker(pingInterval),
|
||||
localIP: 2,
|
||||
remoteIP: 3,
|
||||
privKey: keys.PrivKey,
|
||||
pubAddrs: newPubAddrStore(netip.AddrPort{}),
|
||||
limiter: ratelimiter.New(ratelimiter.Config{
|
||||
FillPeriod: 20 * time.Millisecond,
|
||||
MaxWaitCount: 1,
|
||||
}),
|
||||
}
|
||||
h.data = state
|
||||
|
||||
h.State = enterStateDisconnected(state)
|
||||
return h
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) PeerUpdate(p *m.Peer) {
|
||||
h.State = h.State.OnMsg(peerUpdateMsg{p})
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnInit(msg controlMsg[packetInit]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnSyn(msg controlMsg[packetSyn]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnAck(msg controlMsg[packetAck]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnProbe(msg controlMsg[packetProbe]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnLocalDiscovery(msg controlMsg[packetLocalDiscovery]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnPingTimer() {
|
||||
h.State = h.State.OnMsg(pingTimerMsg{})
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigServer_Public(t *testing.T) *stateServer {
|
||||
keys := generateKeys()
|
||||
|
||||
state := h.State.(*stateDisconnected)
|
||||
state.localAddr = addrPort4(1, 1, 1, 2, 200)
|
||||
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
PublicIP: []byte{1, 1, 1, 3},
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigServer_Relayed(t *testing.T) *stateServer {
|
||||
keys := generateKeys()
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientInit(t *testing.T) *stateClientInit {
|
||||
// Remote IP should be less than local IP.
|
||||
h.data.localIP = 4
|
||||
keys := generateKeys()
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
PublicIP: []byte{1, 2, 3, 4},
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateClientInit](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientDirect(t *testing.T) *stateClient {
|
||||
h.ConfigClientInit(t)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{
|
||||
Packet: init,
|
||||
})
|
||||
|
||||
return assertType[*stateClient](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientRelayed(t *testing.T) *stateClient {
|
||||
h.ConfigClientInit(t)
|
||||
state := assertType[*stateClientInit](t, h.State)
|
||||
state.peer.PublicIP = nil // Force relay.
|
||||
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{
|
||||
Packet: init,
|
||||
})
|
||||
|
||||
return assertType[*stateClient](t, h.State)
|
||||
}
|
@ -1,109 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
"net/netip"
|
||||
"strings"
|
||||
"time"
|
||||
"vppn/m"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
type peerState interface {
|
||||
OnMsg(raw any) peerState
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type peerData struct {
|
||||
// Output.
|
||||
publish func(remotePeer)
|
||||
sendControlPacket func(remotePeer, marshaller)
|
||||
pingTimer *time.Ticker
|
||||
|
||||
// Immutable data.
|
||||
localIP byte
|
||||
remoteIP byte
|
||||
privKey []byte
|
||||
localAddr netip.AddrPort // If valid, then local peer is publicly accessible.
|
||||
|
||||
pubAddrs *pubAddrStore
|
||||
|
||||
// The purpose of this state machine is to manage the RemotePeer object,
|
||||
// publishing it as necessary.
|
||||
staged remotePeer // Local copy of shared data. See publish().
|
||||
|
||||
// Mutable peer data.
|
||||
peer *m.Peer
|
||||
|
||||
// We rate limit per remote endpoint because if we don't we tend to lose
|
||||
// packets.
|
||||
limiter *ratelimiter.Limiter
|
||||
}
|
||||
|
||||
func (s *peerData) logf(format string, args ...any) {
|
||||
b := strings.Builder{}
|
||||
name := ""
|
||||
if s.peer != nil {
|
||||
name = s.peer.Name
|
||||
}
|
||||
b.WriteString(fmt.Sprintf("%03d", s.remoteIP))
|
||||
|
||||
b.WriteString(fmt.Sprintf("%30s: ", name))
|
||||
|
||||
if s.staged.Direct {
|
||||
b.WriteString("DIRECT | ")
|
||||
} else {
|
||||
b.WriteString("RELAYED | ")
|
||||
}
|
||||
|
||||
if s.staged.Up {
|
||||
b.WriteString("UP | ")
|
||||
} else {
|
||||
b.WriteString("DOWN | ")
|
||||
}
|
||||
|
||||
log.Printf(b.String()+format, args...)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (s *peerData) SendTo(pkt marshaller, addr netip.AddrPort) {
|
||||
if !addr.IsValid() {
|
||||
return
|
||||
}
|
||||
route := s.staged
|
||||
route.Direct = true
|
||||
route.DirectAddr = addr
|
||||
s.Send(route, pkt)
|
||||
}
|
||||
|
||||
func (s *peerData) Send(peer remotePeer, pkt marshaller) {
|
||||
if err := s.limiter.Limit(); err != nil {
|
||||
s.logf("Rate limited.")
|
||||
return
|
||||
}
|
||||
s.sendControlPacket(peer, pkt)
|
||||
}
|
||||
|
||||
func initPeerState(data *peerData, peer *m.Peer) peerState {
|
||||
data.peer = peer
|
||||
|
||||
if peer == nil {
|
||||
return enterStateDisconnected(data)
|
||||
}
|
||||
|
||||
if _, isValid := netip.AddrFromSlice(peer.PublicIP); isValid {
|
||||
if data.localAddr.IsValid() && data.localIP < data.remoteIP {
|
||||
return enterStateServer(data)
|
||||
}
|
||||
return enterStateClientInit(data)
|
||||
}
|
||||
|
||||
if data.localAddr.IsValid() || data.localIP < data.remoteIP {
|
||||
return enterStateServer(data)
|
||||
}
|
||||
return enterStateClientInit(data)
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user