Compare commits
18 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
75c7c2d3d9 | ||
|
c61319ed16 | ||
|
0a7328ed5f | ||
|
5f0b00ff46 | ||
|
e91cbfe957 | ||
|
7c476fc332 | ||
|
69823d1d19 | ||
|
b7cb4e20f0 | ||
|
6382c13d1a | ||
|
1ca55158c2 | ||
|
302d27692b | ||
|
31c48fbafd | ||
|
3c4534f620 | ||
|
169231d848 | ||
|
f4589a1031 | ||
|
ab246b2a90 | ||
b9e773ec83 | |||
|
d558ebbd14 |
19
README.md
19
README.md
@ -1,5 +1,9 @@
|
||||
# vppn: Virtual Potentially Private Network
|
||||
|
||||
## TO DO
|
||||
|
||||
* Double buffering in IFReader and ConnReader ?
|
||||
|
||||
## Hub Server Configuration
|
||||
|
||||
```
|
||||
@ -9,7 +13,6 @@ adduser user
|
||||
# Enable ssh.
|
||||
cp -r ~/.ssh /home/user/
|
||||
chown -R user:user /home/user/.ssh
|
||||
|
||||
```
|
||||
|
||||
Upload `hub` executable:
|
||||
@ -38,6 +41,7 @@ Add and start the hub server:
|
||||
|
||||
```
|
||||
systemctl daemon-reload
|
||||
systemctl enable hub
|
||||
systemctl start hub
|
||||
```
|
||||
|
||||
@ -55,17 +59,24 @@ Install the binary somewhere, for example `~/bin/vppn`.
|
||||
|
||||
Create systemd file in `/etc/systemd/system/vppn.service`.
|
||||
|
||||
|
||||
```
|
||||
[Service]
|
||||
AmbientCapabilities=CAP_NET_BIND_SERVICE CAP_NET_ADMIN
|
||||
Type=simple
|
||||
User=user
|
||||
WorkingDirectory=/home/user/
|
||||
ExecStart=/home/user/vppn -name vppn -hub-address https://my.hub -api-key 1234567890
|
||||
ExecStart=/home/user/vppn -name mynetwork -hub-address https://my.hub -api-key 1234567890
|
||||
Restart=always
|
||||
RestartSec=8
|
||||
|
||||
[Install]
|
||||
WantedBy=default.target
|
||||
WantedBy=multi-user.target
|
||||
```
|
||||
|
||||
Add and start the service:
|
||||
|
||||
```
|
||||
systemctl daemon-reload
|
||||
systemctl enable vppn
|
||||
systemctl start vppn
|
||||
```
|
||||
|
BIN
cmd/hub/hub
Executable file
BIN
cmd/hub/hub
Executable file
Binary file not shown.
10
go.mod
10
go.mod
@ -3,13 +3,13 @@ module vppn
|
||||
go 1.24.1
|
||||
|
||||
require (
|
||||
git.crumpington.com/lib/go v0.8.1
|
||||
golang.org/x/crypto v0.29.0
|
||||
golang.org/x/sys v0.27.0
|
||||
git.crumpington.com/lib/go v0.9.0
|
||||
golang.org/x/crypto v0.36.0
|
||||
golang.org/x/sys v0.31.0
|
||||
)
|
||||
|
||||
require (
|
||||
github.com/mattn/go-sqlite3 v1.14.24 // indirect
|
||||
golang.org/x/net v0.31.0 // indirect
|
||||
golang.org/x/text v0.20.0 // indirect
|
||||
golang.org/x/net v0.37.0 // indirect
|
||||
golang.org/x/text v0.23.0 // indirect
|
||||
)
|
||||
|
20
go.sum
20
go.sum
@ -1,12 +1,12 @@
|
||||
git.crumpington.com/lib/go v0.8.1 h1:rWjddllSxQ4yReraqDaGZAod4NpRD9LtGx1yV71ytcU=
|
||||
git.crumpington.com/lib/go v0.8.1/go.mod h1:XjQaf2NFlje9BJ1EevZL8NNioPrAe7WwHpKUhcDw2Lk=
|
||||
git.crumpington.com/lib/go v0.9.0 h1:QXoMhsycSgEUWNiiPZWl0jgBls+NI9TNR5Z6nNXslCM=
|
||||
git.crumpington.com/lib/go v0.9.0/go.mod h1:i3DXiPDo/pgPMHAxUTpyo1Xj2spcvXwXcBef3aSYlnQ=
|
||||
github.com/mattn/go-sqlite3 v1.14.24 h1:tpSp2G2KyMnnQu99ngJ47EIkWVmliIizyZBfPrBWDRM=
|
||||
github.com/mattn/go-sqlite3 v1.14.24/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y=
|
||||
golang.org/x/crypto v0.29.0 h1:L5SG1JTTXupVV3n6sUqMTeWbjAyfPwoda2DLX8J8FrQ=
|
||||
golang.org/x/crypto v0.29.0/go.mod h1:+F4F4N5hv6v38hfeYwTdx20oUvLLc+QfrE9Ax9HtgRg=
|
||||
golang.org/x/net v0.31.0 h1:68CPQngjLL0r2AlUKiSxtQFKvzRVbnzLwMUn5SzcLHo=
|
||||
golang.org/x/net v0.31.0/go.mod h1:P4fl1q7dY2hnZFxEk4pPSkDHF+QqjitcnDjUQyMM+pM=
|
||||
golang.org/x/sys v0.27.0 h1:wBqf8DvsY9Y/2P8gAfPDEYNuS30J4lPHJxXSb/nJZ+s=
|
||||
golang.org/x/sys v0.27.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
||||
golang.org/x/text v0.20.0 h1:gK/Kv2otX8gz+wn7Rmb3vT96ZwuoxnQlY+HlJVj7Qug=
|
||||
golang.org/x/text v0.20.0/go.mod h1:D4IsuqiFMhST5bX19pQ9ikHC2GsaKyk/oF+pn3ducp4=
|
||||
golang.org/x/crypto v0.36.0 h1:AnAEvhDddvBdpY+uR+MyHmuZzzNqXSe/GvuDeob5L34=
|
||||
golang.org/x/crypto v0.36.0/go.mod h1:Y4J0ReaxCR1IMaabaSMugxJES1EpwhBHhv2bDHklZvc=
|
||||
golang.org/x/net v0.37.0 h1:1zLorHbz+LYj7MQlSf1+2tPIIgibq2eL5xkrGk6f+2c=
|
||||
golang.org/x/net v0.37.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=
|
||||
golang.org/x/sys v0.31.0 h1:ioabZlmFYtWhL+TRYpcnNlLwhyxaM9kWTDEmfnprqik=
|
||||
golang.org/x/sys v0.31.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
||||
golang.org/x/text v0.23.0 h1:D71I7dUrlY+VX0gQShAThNGHFxZ13dGLBHQLVl1mJlY=
|
||||
golang.org/x/text v0.23.0/go.mod h1:/BLNzu4aZCJ1+kcD0DNRotWKage4q2rGVAg4o22unh4=
|
||||
|
@ -54,17 +54,11 @@ func (a *API) ensurePassword() error {
|
||||
log.Printf("Setting password: %s", pwd)
|
||||
|
||||
hashed, err := bcrypt.GenerateFromPassword([]byte(pwd), bcrypt.DefaultCost)
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
conf := &Config{
|
||||
ConfigID: 1,
|
||||
VPNNetwork: []byte{10, 1, 1, 0},
|
||||
Password: hashed,
|
||||
}
|
||||
|
||||
conf := &Config{ConfigID: 1, Password: hashed}
|
||||
return db.Config_Insert(a.db, conf)
|
||||
}
|
||||
|
||||
@ -80,10 +74,6 @@ func (a *API) Config_Update(conf *Config) error {
|
||||
return db.Config_Update(a.db, conf)
|
||||
}
|
||||
|
||||
func (a *API) Config_UpdatePassword(pwdHash []byte) error {
|
||||
return db.Config_UpdatePassword(a.db, pwdHash)
|
||||
}
|
||||
|
||||
func (a *API) Session_Delete(sessionID string) error {
|
||||
return db.Session_Delete(a.db, sessionID)
|
||||
}
|
||||
@ -137,6 +127,24 @@ func (a *API) Session_SignIn(s *Session, pwd string) error {
|
||||
return db.Session_SetSignedIn(a.db, s.SessionID)
|
||||
}
|
||||
|
||||
func (a *API) Network_Create(n *Network) error {
|
||||
n.NetworkID = idgen.NextID(0)
|
||||
return db.Network_Insert(a.db, n)
|
||||
}
|
||||
|
||||
func (a *API) Network_Delete(n *Network) error {
|
||||
return db.Network_Delete(a.db, n.NetworkID)
|
||||
}
|
||||
|
||||
func (a *API) Network_Get(id int64) (*Network, error) {
|
||||
return db.Network_Get(a.db, id)
|
||||
}
|
||||
|
||||
func (a *API) Network_List() ([]*Network, error) {
|
||||
const query = db.Network_SelectQuery + ` ORDER BY Name ASC`
|
||||
return db.Network_List(a.db, query)
|
||||
}
|
||||
|
||||
func (a *API) Peer_CreateNew(p *Peer) error {
|
||||
p.Version = idgen.NextID(0)
|
||||
p.PubKey = []byte{}
|
||||
@ -146,7 +154,7 @@ func (a *API) Peer_CreateNew(p *Peer) error {
|
||||
return db.Peer_Insert(a.db, p)
|
||||
}
|
||||
|
||||
func (a *API) Peer_Init(peer *Peer, args m.PeerInitArgs) (*m.PeerConfig, error) {
|
||||
func (a *API) Peer_Init(peer *Peer, args m.PeerInitArgs) error {
|
||||
a.lock.Lock()
|
||||
defer a.lock.Unlock()
|
||||
|
||||
@ -154,19 +162,7 @@ func (a *API) Peer_Init(peer *Peer, args m.PeerInitArgs) (*m.PeerConfig, error)
|
||||
peer.PubKey = args.EncPubKey
|
||||
peer.PubSignKey = args.PubSignKey
|
||||
|
||||
if err := db.Peer_UpdateFull(a.db, peer); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
conf := a.Config_Get()
|
||||
|
||||
return &m.PeerConfig{
|
||||
PeerIP: peer.PeerIP,
|
||||
Network: conf.VPNNetwork,
|
||||
PublicIP: peer.PublicIP,
|
||||
Port: peer.Port,
|
||||
Relay: peer.Relay,
|
||||
}, nil
|
||||
return db.Peer_UpdateFull(a.db, peer)
|
||||
}
|
||||
|
||||
func (a *API) Peer_Update(p *Peer) error {
|
||||
@ -177,16 +173,16 @@ func (a *API) Peer_Update(p *Peer) error {
|
||||
return db.Peer_Update(a.db, p)
|
||||
}
|
||||
|
||||
func (a *API) Peer_Delete(ip byte) error {
|
||||
return db.Peer_Delete(a.db, ip)
|
||||
func (a *API) Peer_Delete(networkID int64, peerIP byte) error {
|
||||
return db.Peer_Delete(a.db, networkID, peerIP)
|
||||
}
|
||||
|
||||
func (a *API) Peer_List() ([]*Peer, error) {
|
||||
return db.Peer_ListAll(a.db)
|
||||
func (a *API) Peer_List(networkID int64) ([]*Peer, error) {
|
||||
return db.Peer_ListAll(a.db, networkID)
|
||||
}
|
||||
|
||||
func (a *API) Peer_Get(ip byte) (*Peer, error) {
|
||||
return db.Peer_Get(a.db, ip)
|
||||
func (a *API) Peer_Get(networkID int64, ip byte) (*Peer, error) {
|
||||
return db.Peer_Get(a.db, networkID, ip)
|
||||
}
|
||||
|
||||
func (a *API) Peer_GetByAPIKey(key string) (*Peer, error) {
|
||||
|
@ -16,13 +16,11 @@ type TX interface {
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type Config struct {
|
||||
ConfigID int64
|
||||
HubAddress string
|
||||
VPNNetwork []byte
|
||||
Password []byte
|
||||
ConfigID int64
|
||||
Password []byte
|
||||
}
|
||||
|
||||
const Config_SelectQuery = "SELECT ConfigID,HubAddress,VPNNetwork,Password FROM config"
|
||||
const Config_SelectQuery = "SELECT ConfigID,Password FROM config"
|
||||
|
||||
func Config_Insert(
|
||||
tx TX,
|
||||
@ -33,7 +31,7 @@ func Config_Insert(
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = tx.Exec("INSERT INTO config(ConfigID,HubAddress,VPNNetwork,Password) VALUES(?,?,?,?)", row.ConfigID, row.HubAddress, row.VPNNetwork, row.Password)
|
||||
_, err = tx.Exec("INSERT INTO config(ConfigID,Password) VALUES(?,?)", row.ConfigID, row.Password)
|
||||
return err
|
||||
}
|
||||
|
||||
@ -46,7 +44,7 @@ func Config_Update(
|
||||
return err
|
||||
}
|
||||
|
||||
result, err := tx.Exec("UPDATE config SET HubAddress=?,VPNNetwork=? WHERE ConfigID=?", row.HubAddress, row.VPNNetwork, row.ConfigID)
|
||||
result, err := tx.Exec("UPDATE config SET Password=? WHERE ConfigID=?", row.Password, row.ConfigID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -74,7 +72,7 @@ func Config_UpdateFull(
|
||||
return err
|
||||
}
|
||||
|
||||
result, err := tx.Exec("UPDATE config SET HubAddress=?,VPNNetwork=?,Password=? WHERE ConfigID=?", row.HubAddress, row.VPNNetwork, row.Password, row.ConfigID)
|
||||
result, err := tx.Exec("UPDATE config SET Password=? WHERE ConfigID=?", row.Password, row.ConfigID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -124,8 +122,8 @@ func Config_Get(
|
||||
err error,
|
||||
) {
|
||||
row = &Config{}
|
||||
r := tx.QueryRow("SELECT ConfigID,HubAddress,VPNNetwork,Password FROM config WHERE ConfigID=?", ConfigID)
|
||||
err = r.Scan(&row.ConfigID, &row.HubAddress, &row.VPNNetwork, &row.Password)
|
||||
r := tx.QueryRow("SELECT ConfigID,Password FROM config WHERE ConfigID=?", ConfigID)
|
||||
err = r.Scan(&row.ConfigID, &row.Password)
|
||||
return
|
||||
}
|
||||
|
||||
@ -139,7 +137,7 @@ func Config_GetWhere(
|
||||
) {
|
||||
row = &Config{}
|
||||
r := tx.QueryRow(query, args...)
|
||||
err = r.Scan(&row.ConfigID, &row.HubAddress, &row.VPNNetwork, &row.Password)
|
||||
err = r.Scan(&row.ConfigID, &row.Password)
|
||||
return
|
||||
}
|
||||
|
||||
@ -159,7 +157,7 @@ func Config_Iterate(
|
||||
defer rows.Close()
|
||||
for rows.Next() {
|
||||
row := &Config{}
|
||||
err := rows.Scan(&row.ConfigID, &row.HubAddress, &row.VPNNetwork, &row.Password)
|
||||
err := rows.Scan(&row.ConfigID, &row.Password)
|
||||
if !yield(row, err) {
|
||||
return
|
||||
}
|
||||
@ -302,11 +300,156 @@ func Session_List(
|
||||
return l, nil
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
// Table: networks
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type Network struct {
|
||||
NetworkID int64
|
||||
Name string
|
||||
Network []byte
|
||||
}
|
||||
|
||||
const Network_SelectQuery = "SELECT NetworkID,Name,Network FROM networks"
|
||||
|
||||
func Network_Insert(
|
||||
tx TX,
|
||||
row *Network,
|
||||
) (err error) {
|
||||
Network_Sanitize(row)
|
||||
if err = Network_Validate(row); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = tx.Exec("INSERT INTO networks(NetworkID,Name,Network) VALUES(?,?,?)", row.NetworkID, row.Name, row.Network)
|
||||
return err
|
||||
}
|
||||
|
||||
func Network_UpdateFull(
|
||||
tx TX,
|
||||
row *Network,
|
||||
) (err error) {
|
||||
Network_Sanitize(row)
|
||||
if err = Network_Validate(row); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
result, err := tx.Exec("UPDATE networks SET Name=?,Network=? WHERE NetworkID=?", row.Name, row.Network, row.NetworkID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
n, err := result.RowsAffected()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
switch n {
|
||||
case 0:
|
||||
return sql.ErrNoRows
|
||||
case 1:
|
||||
return nil
|
||||
default:
|
||||
panic("multiple rows updated")
|
||||
}
|
||||
}
|
||||
|
||||
func Network_Delete(
|
||||
tx TX,
|
||||
NetworkID int64,
|
||||
) (err error) {
|
||||
result, err := tx.Exec("DELETE FROM networks WHERE NetworkID=?", NetworkID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
n, err := result.RowsAffected()
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
switch n {
|
||||
case 0:
|
||||
return sql.ErrNoRows
|
||||
case 1:
|
||||
return nil
|
||||
default:
|
||||
panic("multiple rows deleted")
|
||||
}
|
||||
}
|
||||
|
||||
func Network_Get(
|
||||
tx TX,
|
||||
NetworkID int64,
|
||||
) (
|
||||
row *Network,
|
||||
err error,
|
||||
) {
|
||||
row = &Network{}
|
||||
r := tx.QueryRow("SELECT NetworkID,Name,Network FROM networks WHERE NetworkID=?", NetworkID)
|
||||
err = r.Scan(&row.NetworkID, &row.Name, &row.Network)
|
||||
return
|
||||
}
|
||||
|
||||
func Network_GetWhere(
|
||||
tx TX,
|
||||
query string,
|
||||
args ...any,
|
||||
) (
|
||||
row *Network,
|
||||
err error,
|
||||
) {
|
||||
row = &Network{}
|
||||
r := tx.QueryRow(query, args...)
|
||||
err = r.Scan(&row.NetworkID, &row.Name, &row.Network)
|
||||
return
|
||||
}
|
||||
|
||||
func Network_Iterate(
|
||||
tx TX,
|
||||
query string,
|
||||
args ...any,
|
||||
) iter.Seq2[*Network, error] {
|
||||
rows, err := tx.Query(query, args...)
|
||||
if err != nil {
|
||||
return func(yield func(*Network, error) bool) {
|
||||
yield(nil, err)
|
||||
}
|
||||
}
|
||||
|
||||
return func(yield func(*Network, error) bool) {
|
||||
defer rows.Close()
|
||||
for rows.Next() {
|
||||
row := &Network{}
|
||||
err := rows.Scan(&row.NetworkID, &row.Name, &row.Network)
|
||||
if !yield(row, err) {
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func Network_List(
|
||||
tx TX,
|
||||
query string,
|
||||
args ...any,
|
||||
) (
|
||||
l []*Network,
|
||||
err error,
|
||||
) {
|
||||
for row, err := range Network_Iterate(tx, query, args...) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
l = append(l, row)
|
||||
}
|
||||
return l, nil
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
// Table: peers
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type Peer struct {
|
||||
NetworkID int64
|
||||
PeerIP byte
|
||||
Version int64
|
||||
APIKey string
|
||||
@ -318,7 +461,7 @@ type Peer struct {
|
||||
PubSignKey []byte
|
||||
}
|
||||
|
||||
const Peer_SelectQuery = "SELECT PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey FROM peers"
|
||||
const Peer_SelectQuery = "SELECT NetworkID,PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey FROM peers"
|
||||
|
||||
func Peer_Insert(
|
||||
tx TX,
|
||||
@ -329,7 +472,7 @@ func Peer_Insert(
|
||||
return err
|
||||
}
|
||||
|
||||
_, err = tx.Exec("INSERT INTO peers(PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey) VALUES(?,?,?,?,?,?,?,?,?)", row.PeerIP, row.Version, row.APIKey, row.Name, row.PublicIP, row.Port, row.Relay, row.PubKey, row.PubSignKey)
|
||||
_, err = tx.Exec("INSERT INTO peers(NetworkID,PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey) VALUES(?,?,?,?,?,?,?,?,?,?)", row.NetworkID, row.PeerIP, row.Version, row.APIKey, row.Name, row.PublicIP, row.Port, row.Relay, row.PubKey, row.PubSignKey)
|
||||
return err
|
||||
}
|
||||
|
||||
@ -342,7 +485,7 @@ func Peer_Update(
|
||||
return err
|
||||
}
|
||||
|
||||
result, err := tx.Exec("UPDATE peers SET Version=?,Name=?,PublicIP=?,Port=?,Relay=? WHERE PeerIP=?", row.Version, row.Name, row.PublicIP, row.Port, row.Relay, row.PeerIP)
|
||||
result, err := tx.Exec("UPDATE peers SET Version=?,Name=?,PublicIP=?,Port=?,Relay=? WHERE NetworkID=? AND PeerIP=?", row.Version, row.Name, row.PublicIP, row.Port, row.Relay, row.NetworkID, row.PeerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -370,7 +513,7 @@ func Peer_UpdateFull(
|
||||
return err
|
||||
}
|
||||
|
||||
result, err := tx.Exec("UPDATE peers SET Version=?,APIKey=?,Name=?,PublicIP=?,Port=?,Relay=?,PubKey=?,PubSignKey=? WHERE PeerIP=?", row.Version, row.APIKey, row.Name, row.PublicIP, row.Port, row.Relay, row.PubKey, row.PubSignKey, row.PeerIP)
|
||||
result, err := tx.Exec("UPDATE peers SET Version=?,APIKey=?,Name=?,PublicIP=?,Port=?,Relay=?,PubKey=?,PubSignKey=? WHERE NetworkID=? AND PeerIP=?", row.Version, row.APIKey, row.Name, row.PublicIP, row.Port, row.Relay, row.PubKey, row.PubSignKey, row.NetworkID, row.PeerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -391,9 +534,10 @@ func Peer_UpdateFull(
|
||||
|
||||
func Peer_Delete(
|
||||
tx TX,
|
||||
NetworkID int64,
|
||||
PeerIP byte,
|
||||
) (err error) {
|
||||
result, err := tx.Exec("DELETE FROM peers WHERE PeerIP=?", PeerIP)
|
||||
result, err := tx.Exec("DELETE FROM peers WHERE NetworkID=? AND PeerIP=?", NetworkID, PeerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@ -414,14 +558,15 @@ func Peer_Delete(
|
||||
|
||||
func Peer_Get(
|
||||
tx TX,
|
||||
NetworkID int64,
|
||||
PeerIP byte,
|
||||
) (
|
||||
row *Peer,
|
||||
err error,
|
||||
) {
|
||||
row = &Peer{}
|
||||
r := tx.QueryRow("SELECT PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey FROM peers WHERE PeerIP=?", PeerIP)
|
||||
err = r.Scan(&row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
r := tx.QueryRow("SELECT NetworkID,PeerIP,Version,APIKey,Name,PublicIP,Port,Relay,PubKey,PubSignKey FROM peers WHERE NetworkID=? AND PeerIP=?", NetworkID, PeerIP)
|
||||
err = r.Scan(&row.NetworkID, &row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
return
|
||||
}
|
||||
|
||||
@ -435,7 +580,7 @@ func Peer_GetWhere(
|
||||
) {
|
||||
row = &Peer{}
|
||||
r := tx.QueryRow(query, args...)
|
||||
err = r.Scan(&row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
err = r.Scan(&row.NetworkID, &row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
return
|
||||
}
|
||||
|
||||
@ -455,7 +600,7 @@ func Peer_Iterate(
|
||||
defer rows.Close()
|
||||
for rows.Next() {
|
||||
row := &Peer{}
|
||||
err := rows.Scan(&row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
err := rows.Scan(&row.NetworkID, &row.PeerIP, &row.Version, &row.APIKey, &row.Name, &row.PublicIP, &row.Port, &row.Relay, &row.PubKey, &row.PubSignKey)
|
||||
if !yield(row, err) {
|
||||
return
|
||||
}
|
||||
|
@ -3,35 +3,21 @@ package db
|
||||
import (
|
||||
"errors"
|
||||
"net/netip"
|
||||
"net/url"
|
||||
"strings"
|
||||
)
|
||||
|
||||
var (
|
||||
ErrInvalidIP = errors.New("invalid IP")
|
||||
ErrInvalidPort = errors.New("invalid port")
|
||||
ErrInvalidIP = errors.New("invalid IP")
|
||||
ErrNonPrivateIP = errors.New("non-private IP")
|
||||
ErrInvalidPort = errors.New("invalid port")
|
||||
ErrInvalidNetName = errors.New("invalid network name")
|
||||
ErrInvalidPeerName = errors.New("invalid peer name")
|
||||
)
|
||||
|
||||
func Config_Sanitize(c *Config) {
|
||||
if u, err := url.Parse(c.HubAddress); err == nil {
|
||||
c.HubAddress = u.String()
|
||||
}
|
||||
|
||||
if addr, ok := netip.AddrFromSlice(c.VPNNetwork); ok {
|
||||
c.VPNNetwork = addr.AsSlice()
|
||||
}
|
||||
}
|
||||
|
||||
func Config_Validate(c *Config) error {
|
||||
if _, err := url.Parse(c.HubAddress); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
addr, ok := netip.AddrFromSlice(c.VPNNetwork)
|
||||
if !ok || !addr.Is4() || addr.As4()[3] != 0 || addr.As4()[0] == 0 {
|
||||
return ErrInvalidIP
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
@ -42,6 +28,42 @@ func Session_Validate(s *Session) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func Network_Sanitize(n *Network) {
|
||||
n.Name = strings.TrimSpace(n.Name)
|
||||
|
||||
if addr, ok := netip.AddrFromSlice(n.Network); ok {
|
||||
n.Network = addr.AsSlice()
|
||||
}
|
||||
}
|
||||
|
||||
func Network_Validate(c *Network) error {
|
||||
// 16 bytes is linux limit for network interface names.
|
||||
if len(c.Name) == 0 || len(c.Name) > 16 {
|
||||
return ErrInvalidNetName
|
||||
}
|
||||
|
||||
for _, c := range c.Name {
|
||||
if c >= 'a' && c <= 'z' {
|
||||
continue
|
||||
}
|
||||
if c >= '0' && c <= '9' {
|
||||
continue
|
||||
}
|
||||
return ErrInvalidNetName
|
||||
}
|
||||
|
||||
addr, ok := netip.AddrFromSlice(c.Network)
|
||||
if !ok || !addr.Is4() || addr.As4()[3] != 0 || addr.As4()[0] == 0 {
|
||||
return ErrInvalidIP
|
||||
}
|
||||
|
||||
if !addr.IsPrivate() {
|
||||
return ErrNonPrivateIP
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func Peer_Sanitize(p *Peer) {
|
||||
p.Name = strings.TrimSpace(p.Name)
|
||||
if len(p.PublicIP) != 0 {
|
||||
@ -65,5 +87,20 @@ func Peer_Validate(p *Peer) error {
|
||||
if p.Port == 0 {
|
||||
return ErrInvalidPort
|
||||
}
|
||||
|
||||
for _, c := range p.Name {
|
||||
if c >= 'a' && c <= 'z' {
|
||||
continue
|
||||
}
|
||||
if c >= '0' && c <= '9' {
|
||||
continue
|
||||
}
|
||||
if c == '.' || c == '-' || c == '_' {
|
||||
continue
|
||||
}
|
||||
|
||||
return ErrInvalidPeerName
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
@ -1,8 +1,6 @@
|
||||
TABLE config OF Config (
|
||||
ConfigID int64 PK,
|
||||
HubAddress string,
|
||||
VPNNetwork []byte,
|
||||
Password []byte NoUpdate
|
||||
Password []byte
|
||||
);
|
||||
|
||||
TABLE sessions OF Session NoUpdate (
|
||||
@ -13,7 +11,14 @@ TABLE sessions OF Session NoUpdate (
|
||||
LastSeenAt int64
|
||||
);
|
||||
|
||||
TABLE networks OF Network (
|
||||
NetworkID int64 PK,
|
||||
Name string NoUpdate,
|
||||
Network []byte NoUpdate
|
||||
);
|
||||
|
||||
TABLE peers OF Peer (
|
||||
NetworkID int64 PK,
|
||||
PeerIP byte PK,
|
||||
Version int64,
|
||||
APIKey string NoUpdate,
|
||||
|
@ -26,16 +26,9 @@ func Session_DeleteBefore(
|
||||
return err
|
||||
}
|
||||
|
||||
func Config_UpdatePassword(
|
||||
tx TX,
|
||||
pwdHash []byte,
|
||||
) (err error) {
|
||||
_, err = tx.Exec("UPDATE config SET Password=? WHERE ConfigID=1", pwdHash)
|
||||
return err
|
||||
}
|
||||
|
||||
func Peer_ListAll(tx TX) ([]*Peer, error) {
|
||||
return Peer_List(tx, Peer_SelectQuery)
|
||||
func Peer_ListAll(tx TX, networkID int64) ([]*Peer, error) {
|
||||
const query = Peer_SelectQuery + ` WHERE NetworkID=? ORDER BY PeerIP ASC`
|
||||
return Peer_List(tx, query, networkID)
|
||||
}
|
||||
|
||||
func Peer_GetByAPIKey(tx TX, apiKey string) (*Peer, error) {
|
||||
@ -45,7 +38,8 @@ func Peer_GetByAPIKey(tx TX, apiKey string) (*Peer, error) {
|
||||
apiKey)
|
||||
}
|
||||
|
||||
func Peer_Exists(tx TX, ip byte) (exists bool, err error) {
|
||||
err = tx.QueryRow(`SELECT EXISTS(SELECT 1 FROM peers WHERE PeerIP=?)`, ip).Scan(&exists)
|
||||
func Peer_Exists(tx TX, networkID int64, ip byte) (exists bool, err error) {
|
||||
const query = `SELECT EXISTS(SELECT 1 FROM peers WHERE NetworkID=? AND PeerIP=?)`
|
||||
err = tx.QueryRow(query, networkID, ip).Scan(&exists)
|
||||
return
|
||||
}
|
||||
|
@ -1,7 +1,5 @@
|
||||
CREATE TABLE config (
|
||||
ConfigID INTEGER NOT NULL PRIMARY KEY, -- Always 1.
|
||||
HubAddress TEXT NOT NULL, -- https://for.example.com
|
||||
VPNNetwork BLOB NOT NULL, -- Network (/24), example 10.51.50.0
|
||||
Password BLOB NOT NULL -- bcrypt password for web interface
|
||||
) WITHOUT ROWID;
|
||||
|
||||
@ -15,13 +13,22 @@ CREATE TABLE sessions (
|
||||
|
||||
CREATE INDEX sessions_last_seen_index ON sessions(LastSeenAt);
|
||||
|
||||
CREATE TABLE networks (
|
||||
NetworkID INTEGER NOT NULL PRIMARY KEY,
|
||||
Name TEXT NOT NULL UNIQUE, -- Network/interface name.
|
||||
Network BLOB NOT NULL UNIQUE -- Network (/24), example 10.51.50.0
|
||||
) WITHOUT ROWID;
|
||||
|
||||
CREATE TABLE peers (
|
||||
PeerIP INTEGER NOT NULL PRIMARY KEY, -- Final byte.
|
||||
Version INTEGER NOT NULL,
|
||||
APIKey TEXT NOT NULL UNIQUE,
|
||||
NetworkID INTEGER NOT NULL,
|
||||
PeerIP INTEGER NOT NULL, -- Final byte of IP.
|
||||
Version INTEGER NOT NULL, -- Changes when updated.
|
||||
APIKey TEXT NOT NULL UNIQUE, -- Peer's secret API key.
|
||||
Name TEXT NOT NULL UNIQUE, -- For humans.
|
||||
PublicIP BLOB NOT NULL,
|
||||
Port INTEGER NOT NULL,
|
||||
Relay INTEGER NOT NULL DEFAULT 0, -- Boolean if peer will forward packets. Must also have public address.
|
||||
PubKey BLOB NOT NULL
|
||||
PubKey BLOB NOT NULL,
|
||||
PubSignKey BLOB NOT NULL,
|
||||
PRIMARY KEY(NetworkID, PeerIP)
|
||||
) WITHOUT ROWID;
|
||||
|
@ -1 +0,0 @@
|
||||
ALTER TABLE peers ADD COLUMN PubSignKey BLOB NOT NULL DEFAULT '';
|
@ -4,4 +4,5 @@ import "vppn/hub/api/db"
|
||||
|
||||
type Config = db.Config
|
||||
type Session = db.Session
|
||||
type Network = db.Network
|
||||
type Peer = db.Peer
|
||||
|
42
hub/form.go
Normal file
42
hub/form.go
Normal file
@ -0,0 +1,42 @@
|
||||
package hub
|
||||
|
||||
import (
|
||||
"net/url"
|
||||
"vppn/hub/api"
|
||||
|
||||
"git.crumpington.com/lib/go/webutil"
|
||||
)
|
||||
|
||||
func (app *App) formGetNetwork(form url.Values) (*api.Network, error) {
|
||||
var id int64
|
||||
if err := webutil.NewFormScanner(form).Scan("NetworkID", &id).Error(); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return app.api.Network_Get(id)
|
||||
}
|
||||
|
||||
func (app *App) formGetNetworkPeers(form url.Values) (*api.Network, []*api.Peer, error) {
|
||||
n, err := app.formGetNetwork(form)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
|
||||
peers, err := app.api.Peer_List(n.NetworkID)
|
||||
return n, peers, err
|
||||
}
|
||||
|
||||
func (app *App) formGetPeer(form url.Values) (*api.Network, *api.Peer, error) {
|
||||
net, err := app.formGetNetwork(form)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
|
||||
var ip byte
|
||||
if err := webutil.NewFormScanner(form).Scan("PeerIP", &ip).Error(); err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
|
||||
peer, err := app.api.Peer_Get(net.NetworkID, ip)
|
||||
return net, peer, err
|
||||
}
|
422
hub/handlers.go
422
hub/handlers.go
@ -16,7 +16,7 @@ import (
|
||||
|
||||
func (a *App) _root(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
if s.SignedIn {
|
||||
return a.redirect(w, r, "/admin/config/")
|
||||
return a.redirect(w, r, "/admin/network/list/")
|
||||
} else {
|
||||
return a.redirect(w, r, "/sign-in/")
|
||||
}
|
||||
@ -54,54 +54,219 @@ func (a *App) _adminSignOutSubmit(s *api.Session, w http.ResponseWriter, r *http
|
||||
return a.redirect(w, r, "/")
|
||||
}
|
||||
|
||||
func (a *App) _adminConfig(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
peers, err := a.api.Peer_List()
|
||||
func (a *App) _adminNetworkList(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
l, err := a.api.Network_List()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/admin-config.html", w, struct {
|
||||
Session *api.Session
|
||||
Peers []*api.Peer
|
||||
Config *api.Config
|
||||
}{
|
||||
s,
|
||||
peers,
|
||||
a.api.Config_Get(),
|
||||
})
|
||||
return a.render("/admin-network-list.html", w, struct {
|
||||
Session *api.Session
|
||||
Networks []*api.Network
|
||||
}{s, l})
|
||||
}
|
||||
|
||||
func (a *App) _adminConfigEdit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
return a.render("/admin-config-edit.html", w, struct {
|
||||
Session *api.Session
|
||||
Config *api.Config
|
||||
}{
|
||||
s,
|
||||
a.api.Config_Get(),
|
||||
})
|
||||
func (a *App) _adminNetworkCreate(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
return a.render("/admin-network-create.html", w, struct{ Session *api.Session }{s})
|
||||
}
|
||||
|
||||
func (a *App) _adminConfigEditSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var (
|
||||
conf = a.api.Config_Get()
|
||||
ipStr string
|
||||
)
|
||||
func (a *App) _adminNetworkCreateSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n := &api.Network{}
|
||||
var netStr string
|
||||
|
||||
err := webutil.NewFormScanner(r.Form).
|
||||
Scan("HubAddress", &conf.HubAddress).
|
||||
Scan("VPNNetwork", &ipStr).
|
||||
Scan("Name", &n.Name).
|
||||
Scan("Network", &netStr).
|
||||
Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if conf.VPNNetwork, err = stringToIP(ipStr); err != nil {
|
||||
n.Network, err = stringToIP(netStr)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if err := a.api.Config_Update(conf); err != nil {
|
||||
|
||||
if err := a.api.Network_Create(n); err != nil {
|
||||
return err
|
||||
}
|
||||
return a.redirect(w, r, "/admin/config/")
|
||||
|
||||
return a.redirect(w, r, "/admin/network/view/?NetworkID=%d", n.NetworkID)
|
||||
}
|
||||
|
||||
func (a *App) _adminNetworkView(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, peers, err := a.formGetNetworkPeers(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/network-view.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
Peers []*api.Peer
|
||||
}{s, n, peers})
|
||||
}
|
||||
|
||||
func (a *App) _adminNetworkDelete(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, peers, err := a.formGetNetworkPeers(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/network-delete.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
Peers []*api.Peer
|
||||
}{s, n, peers})
|
||||
}
|
||||
|
||||
func (a *App) _adminNetworkDeleteSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, err := a.formGetNetwork(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err = a.api.Network_Delete(n); err != nil {
|
||||
return err
|
||||
}
|
||||
return a.redirect(w, r, "/admin/network/list/")
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerCreate(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, err := a.formGetNetwork(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/peer-create.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
}{s, n})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerCreateSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var ipStr string
|
||||
|
||||
p := &api.Peer{}
|
||||
err := webutil.NewFormScanner(r.Form).
|
||||
Scan("NetworkID", &p.NetworkID).
|
||||
Scan("IP", &p.PeerIP).
|
||||
Scan("Name", &p.Name).
|
||||
Scan("PublicIP", &ipStr).
|
||||
Scan("Port", &p.Port).
|
||||
Scan("Relay", &p.Relay).
|
||||
Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if p.PublicIP, err = stringToIP(ipStr); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := a.api.Peer_CreateNew(p); err != nil {
|
||||
return err
|
||||
}
|
||||
return a.redirect(w, r, "/admin/peer/view/?NetworkID=%d&PeerIP=%d", p.NetworkID, p.PeerIP)
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerView(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
net, peer, err := a.formGetPeer(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/peer-view.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
Peer *api.Peer
|
||||
}{s, net, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerEdit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
net, peer, err := a.formGetPeer(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/peer-edit.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
Peer *api.Peer
|
||||
}{s, net, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerEditSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
_, peer, err := a.formGetPeer(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
var ipStr string
|
||||
|
||||
err = webutil.NewFormScanner(r.Form).
|
||||
Scan("Name", &peer.Name).
|
||||
Scan("PublicIP", &ipStr).
|
||||
Scan("Port", &peer.Port).
|
||||
Scan("Relay", &peer.Relay).
|
||||
Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if peer.PublicIP, err = stringToIP(ipStr); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err = a.api.Peer_Update(peer); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.redirect(w, r, "/admin/peer/view/?NetworkID=%d&PeerIP=%d", peer.NetworkID, peer.PeerIP)
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerDelete(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, peer, err := a.formGetPeer(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/network/peer-delete.html", w, struct {
|
||||
Session *api.Session
|
||||
Network *api.Network
|
||||
Peer *api.Peer
|
||||
}{s, n, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerDeleteSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, peer, err := a.formGetPeer(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if err := a.api.Peer_Delete(n.NetworkID, peer.PeerIP); err != nil {
|
||||
return err
|
||||
}
|
||||
return a.redirect(w, r, "/admin/network/view/?NetworkID=%d", n.NetworkID)
|
||||
}
|
||||
|
||||
func (a *App) _adminNetworkHosts(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
n, peers, err := a.formGetNetworkPeers(r.Form)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
b := strings.Builder{}
|
||||
|
||||
for _, peer := range peers {
|
||||
ip := n.Network
|
||||
ip[3] = peer.PeerIP
|
||||
b.WriteString(netip.AddrFrom4([4]byte(ip)).String())
|
||||
b.WriteString(" ")
|
||||
b.WriteString(peer.Name)
|
||||
b.WriteString("\n")
|
||||
}
|
||||
|
||||
w.Write([]byte(b.String()))
|
||||
return nil
|
||||
}
|
||||
|
||||
func (a *App) _adminPasswordEdit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
@ -143,194 +308,61 @@ func (a *App) _adminPasswordSubmit(s *api.Session, w http.ResponseWriter, r *htt
|
||||
return err
|
||||
}
|
||||
|
||||
if err := a.api.Config_UpdatePassword(hash); err != nil {
|
||||
conf.Password = hash
|
||||
|
||||
if err := a.api.Config_Update(conf); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.redirect(w, r, "/admin/config/")
|
||||
}
|
||||
|
||||
func (a *App) _adminHosts(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
conf := a.api.Config_Get()
|
||||
|
||||
peers, err := a.api.Peer_List()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
b := strings.Builder{}
|
||||
|
||||
for _, peer := range peers {
|
||||
ip := conf.VPNNetwork
|
||||
ip[3] = peer.PeerIP
|
||||
b.WriteString(netip.AddrFrom4([4]byte(ip)).String())
|
||||
b.WriteString(" ")
|
||||
b.WriteString(peer.Name)
|
||||
b.WriteString("\n")
|
||||
}
|
||||
|
||||
w.Write([]byte(b.String()))
|
||||
return nil
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerCreate(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
return a.render("/admin-peer-create.html", w, struct{ Session *api.Session }{s})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerCreateSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var ipStr string
|
||||
|
||||
p := &api.Peer{}
|
||||
err := webutil.NewFormScanner(r.Form).
|
||||
Scan("IP", &p.PeerIP).
|
||||
Scan("Name", &p.Name).
|
||||
Scan("PublicIP", &ipStr).
|
||||
Scan("Port", &p.Port).
|
||||
Scan("Relay", &p.Relay).
|
||||
Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if p.PublicIP, err = stringToIP(ipStr); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := a.api.Peer_CreateNew(p); err != nil {
|
||||
return err
|
||||
}
|
||||
return a.redirect(w, r, "/admin/peer/view/?PeerIP=%d", p.PeerIP)
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerView(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var peerIP byte
|
||||
err := webutil.NewFormScanner(r.Form).Scan("PeerIP", &peerIP).Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
peer, err := a.api.Peer_Get(peerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/admin-peer-view.html", w, struct {
|
||||
Session *api.Session
|
||||
Peer *api.Peer
|
||||
}{s, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerEdit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var peerIP byte
|
||||
err := webutil.NewFormScanner(r.Form).Scan("PeerIP", &peerIP).Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
peer, err := a.api.Peer_Get(peerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/admin-peer-edit.html", w, struct {
|
||||
Session *api.Session
|
||||
Peer *api.Peer
|
||||
}{s, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerEditSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var (
|
||||
peerIP byte
|
||||
ipStr string
|
||||
)
|
||||
|
||||
err := webutil.NewFormScanner(r.Form).Scan("PeerIP", &peerIP).Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
peer, err := a.api.Peer_Get(peerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = webutil.NewFormScanner(r.Form).
|
||||
Scan("Name", &peer.Name).
|
||||
Scan("PublicIP", &ipStr).
|
||||
Scan("Port", &peer.Port).
|
||||
Scan("Relay", &peer.Relay).
|
||||
Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if peer.PublicIP, err = stringToIP(ipStr); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err = a.api.Peer_Update(peer); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.redirect(w, r, "/admin/peer/view/?PeerIP=%d", peer.PeerIP)
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerDelete(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var peerIP byte
|
||||
err := webutil.NewFormScanner(r.Form).Scan("PeerIP", &peerIP).Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
peer, err := a.api.Peer_Get(peerIP)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.render("/admin-peer-delete.html", w, struct {
|
||||
Session *api.Session
|
||||
Peer *api.Peer
|
||||
}{s, peer})
|
||||
}
|
||||
|
||||
func (a *App) _adminPeerDeleteSubmit(s *api.Session, w http.ResponseWriter, r *http.Request) error {
|
||||
var peerIP byte
|
||||
err := webutil.NewFormScanner(r.Form).Scan("PeerIP", &peerIP).Error()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := a.api.Peer_Delete(peerIP); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.redirect(w, r, "/admin/peer/list/")
|
||||
}
|
||||
|
||||
func (a *App) _peerInit(peer *api.Peer, w http.ResponseWriter, r *http.Request) error {
|
||||
args := m.PeerInitArgs{}
|
||||
if err := json.NewDecoder(r.Body).Decode(&args); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
conf, err := a.api.Peer_Init(peer, args)
|
||||
net, err := a.api.Network_Get(peer.NetworkID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.sendJSON(w, conf)
|
||||
if err := a.api.Peer_Init(peer, args); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
resp := m.PeerInitResp{
|
||||
PeerIP: peer.PeerIP,
|
||||
Network: net.Network,
|
||||
}
|
||||
|
||||
resp.NetworkState.Peers, err = a.peersArray(net.NetworkID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return a.sendJSON(w, resp)
|
||||
}
|
||||
|
||||
func (a *App) _peerFetchState(peer *api.Peer, w http.ResponseWriter, r *http.Request) error {
|
||||
peers, err := a.api.Peer_List()
|
||||
|
||||
peers, err := a.peersArray(peer.NetworkID)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return a.sendJSON(w, m.NetworkState{Peers: peers})
|
||||
}
|
||||
|
||||
state := m.NetworkState{}
|
||||
func (a *App) peersArray(networkID int64) (peers [256]*m.Peer, err error) {
|
||||
l, err := a.api.Peer_List(networkID)
|
||||
if err != nil {
|
||||
return peers, err
|
||||
}
|
||||
|
||||
for _, p := range peers {
|
||||
for _, p := range l {
|
||||
if len(p.PubKey) != 0 {
|
||||
state.Peers[p.PeerIP] = &m.Peer{
|
||||
peers[p.PeerIP] = &m.Peer{
|
||||
PeerIP: p.PeerIP,
|
||||
Version: p.Version,
|
||||
Name: p.Name,
|
||||
@ -343,5 +375,5 @@ func (a *App) _peerFetchState(peer *api.Peer, w http.ResponseWriter, r *http.Req
|
||||
}
|
||||
}
|
||||
|
||||
return a.sendJSON(w, state)
|
||||
return
|
||||
}
|
||||
|
@ -9,14 +9,17 @@ func (a *App) registerRoutes() {
|
||||
a.handleNotSignedIn("GET /sign-in/", a._signin)
|
||||
a.handleNotSignedIn("POST /sign-in/", a._signinSubmit)
|
||||
|
||||
a.handleSignedIn("GET /admin/config/", a._adminConfig)
|
||||
a.handleSignedIn("GET /admin/config/edit/", a._adminConfigEdit)
|
||||
a.handleSignedIn("POST /admin/config/edit/", a._adminConfigEditSubmit)
|
||||
a.handleSignedIn("GET /admin/sign-out/", a._adminSignOut)
|
||||
a.handleSignedIn("POST /admin/sign-out/", a._adminSignOutSubmit)
|
||||
a.handleSignedIn("GET /admin/password/edit/", a._adminPasswordEdit)
|
||||
a.handleSignedIn("POST /admin/password/edit/", a._adminPasswordSubmit)
|
||||
a.handleSignedIn("GET /admin/peer/hosts/", a._adminHosts)
|
||||
|
||||
a.handleSignedIn("GET /admin/network/list/", a._adminNetworkList)
|
||||
a.handleSignedIn("GET /admin/network/create/", a._adminNetworkCreate)
|
||||
a.handleSignedIn("POST /admin/network/create/", a._adminNetworkCreateSubmit)
|
||||
a.handleSignedIn("GET /admin/network/delete/", a._adminNetworkDelete)
|
||||
a.handleSignedIn("POST /admin/network/delete/", a._adminNetworkDeleteSubmit)
|
||||
|
||||
a.handleSignedIn("GET /admin/network/view/", a._adminNetworkView)
|
||||
a.handleSignedIn("GET /admin/network/hosts/", a._adminNetworkHosts)
|
||||
a.handleSignedIn("GET /admin/peer/create/", a._adminPeerCreate)
|
||||
a.handleSignedIn("POST /admin/peer/create/", a._adminPeerCreateSubmit)
|
||||
a.handleSignedIn("GET /admin/peer/view/", a._adminPeerView)
|
||||
@ -25,6 +28,9 @@ func (a *App) registerRoutes() {
|
||||
a.handleSignedIn("GET /admin/peer/delete/", a._adminPeerDelete)
|
||||
a.handleSignedIn("POST /admin/peer/delete/", a._adminPeerDeleteSubmit)
|
||||
|
||||
a.handleSignedIn("GET /admin/password/edit/", a._adminPasswordEdit)
|
||||
a.handleSignedIn("POST /admin/password/edit/", a._adminPasswordSubmit)
|
||||
|
||||
a.handlePeer("POST /peer/init/", a._peerInit)
|
||||
a.handlePeer("GET /peer/fetch-state/", a._peerFetchState)
|
||||
}
|
||||
|
@ -1,20 +0,0 @@
|
||||
{{define "body" -}}
|
||||
<h2>Config</h2>
|
||||
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{.Session.CSRF}}">
|
||||
<p>
|
||||
<label>Hub Address</label><br>
|
||||
<input type="url" name="HubAddress" value="{{.Config.HubAddress}}">
|
||||
</p>
|
||||
<p>
|
||||
<label>VPN Network</label><br>
|
||||
<input type="text" name="VPNNetwork" value="{{ipToString .Config.VPNNetwork}}">
|
||||
</p>
|
||||
<p>
|
||||
<button type="submit">Save</button>
|
||||
<a href="/admin/config/">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
|
||||
{{- end}}
|
19
hub/templates/admin-network-create.html
Normal file
19
hub/templates/admin-network-create.html
Normal file
@ -0,0 +1,19 @@
|
||||
{{define "body" -}}
|
||||
<h2>Create Network</h2>
|
||||
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{.Session.CSRF}}">
|
||||
<p>
|
||||
<label>Name</label><br>
|
||||
<input type="text" name="Name">
|
||||
</p>
|
||||
<p>
|
||||
<label>Network /24</label><br>
|
||||
<input type="text" name="Network">
|
||||
</p>
|
||||
<p>
|
||||
<button type="submit">Save</button>
|
||||
<a href="/admin/network/list/">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
38
hub/templates/admin-network-list.html
Normal file
38
hub/templates/admin-network-list.html
Normal file
@ -0,0 +1,38 @@
|
||||
{{define "body" -}}
|
||||
<h2>Networks</h2>
|
||||
|
||||
<p>
|
||||
<a href="/admin/network/create/">Create</a>
|
||||
</p>
|
||||
|
||||
{{if .Networks -}}
|
||||
<table>
|
||||
<thead>
|
||||
<tr>
|
||||
<th>Name</th>
|
||||
<th>Network</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
{{range .Networks -}}
|
||||
<tr>
|
||||
<td>
|
||||
<a href="/admin/network/view/?NetworkID={{.NetworkID}}">
|
||||
{{.Name}}
|
||||
</a>
|
||||
</td>
|
||||
<td>{{ipToString .Network}}</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
{{- end}}
|
||||
</table>
|
||||
{{- else}}
|
||||
<p>No networks.</p>
|
||||
{{- end}}
|
||||
|
||||
<h3>Settings</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="/admin/password/edit/">Password</a></li>
|
||||
</ul>
|
||||
{{- end}}
|
@ -1,36 +0,0 @@
|
||||
{{define "body" -}}
|
||||
<h2>Delete Peer</h2>
|
||||
|
||||
{{with .Peer -}}
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{$.Session.CSRF}}">
|
||||
<p>
|
||||
<label>Peer IP</label><br>
|
||||
<input type="number" name="PeerIP" value="{{.PeerIP}}" disabled>
|
||||
</p>
|
||||
<p>
|
||||
<label>Name</label><br>
|
||||
<input type="text" value="{{.Name}}" disabled>
|
||||
</p>
|
||||
<p>
|
||||
<label>Public IP</label><br>
|
||||
<input type="text" value="{{ipToString .PublicIP}}" disabled>
|
||||
</p>
|
||||
<p>
|
||||
<label>Port</label><br>
|
||||
<input type="number" value="{{.Port}}" disabled>
|
||||
</p>
|
||||
<p>
|
||||
<label>
|
||||
<input type="checkbox" {{if .Relay}}checked{{end}} disabled>
|
||||
Relay
|
||||
</label>
|
||||
</p>
|
||||
<p>
|
||||
<button type="submit">Delete</button>
|
||||
<a href="/admin/peer/view/?PeerIP={{.PeerIP}}">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
||||
|
||||
{{- end}}
|
@ -1,13 +0,0 @@
|
||||
{{define "body" -}}
|
||||
<h2>Initialize Peer</h2>
|
||||
|
||||
<p>
|
||||
Configure the peer with the following URL:
|
||||
</p>
|
||||
<pre>
|
||||
{{.HubAddress}}/peer/init/?Code={{.Code}}
|
||||
</pre>
|
||||
<p>
|
||||
<a href="/admin/config/">Done</a>
|
||||
</p>
|
||||
{{- end}}
|
@ -1,13 +0,0 @@
|
||||
{{define "body" -}}
|
||||
<h2>Create Peer</h2>
|
||||
|
||||
<p>
|
||||
Configure the peer with the following URL:
|
||||
</p>
|
||||
<pre>
|
||||
{{.HubAddress}}/peer/create/?Code={{.Code}}
|
||||
</pre>
|
||||
<p>
|
||||
<a href="/admin/config/">Done</a>
|
||||
</p>
|
||||
{{- end}}
|
@ -5,7 +5,7 @@
|
||||
<input type="hidden" name="CSRF" value="{{.Session.CSRF}}">
|
||||
<p>
|
||||
<button type="submit">Sign Out</button>
|
||||
<a href="/admin/config/">Cancel</a>
|
||||
<a href="/">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
||||
|
@ -10,7 +10,7 @@
|
||||
<h1>VPPN</h1>
|
||||
<nav>
|
||||
{{if .Session.SignedIn -}}
|
||||
<a href="/admin/config/">Home</a> /
|
||||
<a href="/admin/networks/list/">Home</a> /
|
||||
<a href="/admin/sign-out/">Sign out</a>
|
||||
{{- end}}
|
||||
</nav>
|
||||
|
25
hub/templates/network/base.html
Normal file
25
hub/templates/network/base.html
Normal file
@ -0,0 +1,25 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<title>VPPN Hub</title>
|
||||
<link rel="stylesheet" href="/static/new.min.css">
|
||||
<link rel="stylesheet" href="/static/custom.css">
|
||||
</head>
|
||||
<body>
|
||||
<header>
|
||||
<h1>VPPN</h1>
|
||||
<nav>
|
||||
{{if .Session.SignedIn -}}
|
||||
<a href="/admin/networks/list/">Home</a> /
|
||||
<a href="/admin/sign-out/">Sign out</a>
|
||||
{{- end}}
|
||||
</nav>
|
||||
</header>
|
||||
<h2>
|
||||
Network:
|
||||
<a href="/admin/network/view/?NetworkID={{.Network.NetworkID}}">{{.Network.Name}}</a>
|
||||
</h2>
|
||||
|
||||
{{block "body" .}}There's nothing here.{{end}}
|
||||
</body>
|
||||
</html>
|
16
hub/templates/network/network-delete.html
Normal file
16
hub/templates/network/network-delete.html
Normal file
@ -0,0 +1,16 @@
|
||||
{{define "body" -}}
|
||||
<h3>Delete</h3>
|
||||
|
||||
{{if .Peers -}}
|
||||
<p>You must first delete all peers.</p>
|
||||
{{- else -}}
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{.Session.CSRF}}">
|
||||
<input type="hidden" name="NetworkID" value="{{.Network.NetworkID}}">
|
||||
<p>
|
||||
<button type="submit">Delete</button>
|
||||
<a href="/admin/network/view/?NetworkID={{.Network.NetworkID}}">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
||||
{{- end}}
|
@ -1,27 +1,20 @@
|
||||
{{define "body" -}}
|
||||
<h2>Config</h2>
|
||||
|
||||
<p>
|
||||
<a href="/admin/config/edit/">Edit</a> /
|
||||
<a href="/admin/password/edit/">Change Password</a>
|
||||
<a href="/admin/network/delete/?NetworkID={{.Network.NetworkID}}">Delete</a> /
|
||||
<a href="/admin/network/hosts/?NetworkID={{.Network.NetworkID}}">Hosts</a>
|
||||
</p>
|
||||
|
||||
<table class="def-list">
|
||||
<tr>
|
||||
<td>Hub Address</td>
|
||||
<td>{{.Config.HubAddress}}</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>VPN Network</td>
|
||||
<td>{{ipToString .Config.VPNNetwork}}</td>
|
||||
<td>Network</td>
|
||||
<td>{{ipToString .Network.Network}}/24</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<h2>Peers</h2>
|
||||
<h3>Peers</h3>
|
||||
|
||||
<p>
|
||||
<a href="/admin/peer/create/">Add Peer</a> /
|
||||
<a href="/admin/peer/hosts/">Hosts</a>
|
||||
<a href="/admin/peer/create/?NetworkID={{.Network.NetworkID}}">Create</a>
|
||||
</p>
|
||||
|
||||
{{if .Peers -}}
|
||||
@ -39,7 +32,7 @@
|
||||
{{range .Peers -}}
|
||||
<tr>
|
||||
<td>
|
||||
<a href="/admin/peer/view/?PeerIP={{.PeerIP}}">
|
||||
<a href="/admin/peer/view/?NetworkID={{$.Network.NetworkID}}&PeerIP={{.PeerIP}}">
|
||||
{{.PeerIP}}
|
||||
</a>
|
||||
</td>
|
@ -1,8 +1,9 @@
|
||||
{{define "body" -}}
|
||||
<h2>New Peer</h2>
|
||||
<h3>New Peer</h3>
|
||||
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{.Session.CSRF}}">
|
||||
<input type="hidden" name="NetworkID" value="{{.Network.NetworkID}}">
|
||||
<p>
|
||||
<label>IP</label><br>
|
||||
<input type="number" name="IP" min="1" max="255" value="0">
|
||||
@ -27,7 +28,7 @@
|
||||
</p>
|
||||
<p>
|
||||
<button type="submit">Save</button>
|
||||
<a href="/admin/config/">Cancel</a>
|
||||
<a href="/admin/network/view/?NetworkID={{.Network.NetworkID}}">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
|
15
hub/templates/network/peer-delete.html
Normal file
15
hub/templates/network/peer-delete.html
Normal file
@ -0,0 +1,15 @@
|
||||
{{define "body" -}}
|
||||
<h3>Delete {{.Peer.Name}}</h3>
|
||||
|
||||
{{with .Peer -}}
|
||||
<form method="POST">
|
||||
<input type="hidden" name="CSRF" value="{{$.Session.CSRF}}">
|
||||
<input type="hidden" name="NetworkID" value="{{.NetworkID}}">
|
||||
<input type="hidden" name="NetworkID" value="{{.PeerIP}}">
|
||||
<p>
|
||||
<button type="submit">Delete</button>
|
||||
<a href="/admin/peer/view/?PeerIP={{.PeerIP}}&NetworkID={{.NetworkID}}">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
||||
{{- end}}
|
@ -6,7 +6,7 @@
|
||||
<input type="hidden" name="CSRF" value="{{$.Session.CSRF}}">
|
||||
<p>
|
||||
<label>Peer IP</label><br>
|
||||
<input type="number" name="PeerIP" value="{{.PeerIP}}" disabled>
|
||||
<input type="text" value="{{.PeerIP}}" disabled>
|
||||
</p>
|
||||
<p>
|
||||
<label>Name</label><br>
|
||||
@ -28,9 +28,8 @@
|
||||
</p>
|
||||
<p>
|
||||
<button type="submit">Save</button>
|
||||
<a href="/admin/peer/view/?PeerIP={{.PeerIP}}">Cancel</a>
|
||||
<a href="/admin/peer/view/?NetworkID={{$.Network.NetworkID}}&PeerIP={{.PeerIP}}">Cancel</a>
|
||||
</p>
|
||||
</form>
|
||||
{{- end}}
|
||||
|
||||
{{- end}}
|
@ -1,20 +1,25 @@
|
||||
{{define "body" -}}
|
||||
<h2>Peer</h2>
|
||||
|
||||
<h3>{{.Peer.Name}}</h3>
|
||||
<p>
|
||||
<a href="/admin/peer/edit/?PeerIP={{.Peer.PeerIP}}">Edit</a> /
|
||||
<a href="/admin/peer/delete/?PeerIP={{.Peer.PeerIP}}">Delete</a>
|
||||
<a href="/admin/peer/edit/?NetworkID={{.Network.NetworkID}}&PeerIP={{.Peer.PeerIP}}">Edit</a> /
|
||||
<a href="/admin/peer/delete/?NetworkID={{.Network.NetworkID}}&PeerIP={{.Peer.PeerIP}}">Delete</a>
|
||||
</p>
|
||||
|
||||
{{with .Peer -}}
|
||||
<table class="def-list">
|
||||
<tr><td>Peer IP</td><td>{{.PeerIP}}</td></tr>
|
||||
<tr><td>Name</td><td>{{.Name}}</td></tr>
|
||||
<tr><td>Public IP</td><td>{{ipToString .PublicIP}}</td></tr>
|
||||
<tr><td>Port</td><td>{{.Port}}</td></tr>
|
||||
<tr><td>Relay</td><td>{{if .Relay}}T{{else}}F{{end}}</td></tr>
|
||||
<tr><td>API Key</td><td>{{.APIKey}}</td></tr>
|
||||
</td></tr>
|
||||
</table>
|
||||
|
||||
<details>
|
||||
<summary>API Key</summary>
|
||||
<p>{{.APIKey}}</p>
|
||||
</details>
|
||||
|
||||
|
||||
{{- end}}
|
||||
|
||||
{{- end}}
|
10
m/models.go
10
m/models.go
@ -6,12 +6,10 @@ type PeerInitArgs struct {
|
||||
PubSignKey []byte
|
||||
}
|
||||
|
||||
type PeerConfig struct {
|
||||
PeerIP byte
|
||||
Network []byte
|
||||
PublicIP []byte
|
||||
Port uint16
|
||||
Relay bool
|
||||
type PeerInitResp struct {
|
||||
PeerIP byte
|
||||
Network []byte
|
||||
NetworkState NetworkState
|
||||
}
|
||||
|
||||
type Peer struct {
|
||||
|
@ -12,7 +12,7 @@ func newControlCipher(privKey, pubKey []byte) *controlCipher {
|
||||
return &controlCipher{shared}
|
||||
}
|
||||
|
||||
func (cc *controlCipher) Encrypt(h header, data, out []byte) []byte {
|
||||
func (cc *controlCipher) Encrypt(h Header, data, out []byte) []byte {
|
||||
const s = controlHeaderSize
|
||||
out = out[:s+controlCipherOverhead+len(data)]
|
||||
h.Marshal(out[:s])
|
||||
|
@ -40,7 +40,7 @@ func TestControlCipher(t *testing.T) {
|
||||
}
|
||||
|
||||
for _, plaintext := range testCases {
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
StreamID: controlStreamID,
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
@ -51,7 +51,7 @@ func TestControlCipher(t *testing.T) {
|
||||
|
||||
encrypted = c1.Encrypt(h1, plaintext, encrypted)
|
||||
|
||||
h2 := header{}
|
||||
h2 := Header{}
|
||||
h2.Parse(encrypted)
|
||||
if !reflect.DeepEqual(h1, h2) {
|
||||
t.Fatal(h1, h2)
|
||||
@ -80,7 +80,7 @@ func TestControlCipher_ShortCiphertext(t *testing.T) {
|
||||
|
||||
func BenchmarkControlCipher_Encrypt(b *testing.B) {
|
||||
c1, _ := newControlCipherForTesting()
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
DestIP: 88,
|
||||
@ -100,7 +100,7 @@ func BenchmarkControlCipher_Encrypt(b *testing.B) {
|
||||
func BenchmarkControlCipher_Decrypt(b *testing.B) {
|
||||
c1, c2 := newControlCipherForTesting()
|
||||
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
DestIP: 88,
|
||||
|
@ -1,6 +1,7 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/aes"
|
||||
"crypto/cipher"
|
||||
"crypto/rand"
|
||||
@ -38,7 +39,11 @@ func (sc *dataCipher) Key() [32]byte {
|
||||
return sc.key
|
||||
}
|
||||
|
||||
func (sc *dataCipher) Encrypt(h header, data, out []byte) []byte {
|
||||
func (sc *dataCipher) HasKey(k [32]byte) bool {
|
||||
return bytes.Equal(k[:], sc.key[:])
|
||||
}
|
||||
|
||||
func (sc *dataCipher) Encrypt(h Header, data, out []byte) []byte {
|
||||
const s = dataHeaderSize
|
||||
out = out[:s+dataCipherOverhead+len(data)]
|
||||
h.Marshal(out[:s])
|
||||
|
@ -22,7 +22,7 @@ func TestDataCipher(t *testing.T) {
|
||||
}
|
||||
|
||||
for _, plaintext := range testCases {
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
StreamID: dataStreamID,
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
@ -33,7 +33,7 @@ func TestDataCipher(t *testing.T) {
|
||||
|
||||
dc1 := newDataCipher()
|
||||
encrypted = dc1.Encrypt(h1, plaintext, encrypted)
|
||||
h2 := header{}
|
||||
h2 := Header{}
|
||||
h2.Parse(encrypted)
|
||||
|
||||
dc2 := newDataCipherFromKey(dc1.Key())
|
||||
@ -67,7 +67,7 @@ func TestDataCipher_ModifyCiphertext(t *testing.T) {
|
||||
}
|
||||
|
||||
for _, plaintext := range testCases {
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
DestIP: 88,
|
||||
@ -99,7 +99,7 @@ func TestDataCipher_ShortCiphertext(t *testing.T) {
|
||||
}
|
||||
|
||||
func BenchmarkDataCipher_Encrypt(b *testing.B) {
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
DestIP: 88,
|
||||
@ -118,7 +118,7 @@ func BenchmarkDataCipher_Encrypt(b *testing.B) {
|
||||
}
|
||||
|
||||
func BenchmarkDataCipher_Decrypt(b *testing.B) {
|
||||
h1 := header{
|
||||
h1 := Header{
|
||||
Counter: 235153,
|
||||
SourceIP: 4,
|
||||
DestIP: 88,
|
||||
|
@ -1,13 +0,0 @@
|
||||
package peer
|
||||
|
||||
/*
|
||||
func signData(privKey *[64]byte, h header, data, out []byte) []byte {
|
||||
out = out[:headerSize]
|
||||
h.Marshal(out)
|
||||
return sign.Sign(out, data, privKey)
|
||||
}
|
||||
|
||||
func openData(pubKey *[32]byte, signed, out []byte) (data []byte, ok bool) {
|
||||
return sign.Open(out[:0], signed[headerSize:], pubKey)
|
||||
}
|
||||
*/
|
@ -1,56 +1,34 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"io"
|
||||
"log"
|
||||
"net"
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
)
|
||||
|
||||
type connReader struct {
|
||||
// Input
|
||||
readFromUDPAddrPort func([]byte) (int, netip.AddrPort, error)
|
||||
|
||||
// Output
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error)
|
||||
iface io.Writer
|
||||
handleControlMsg func(fromIP byte, pkt any)
|
||||
|
||||
localIP byte
|
||||
rt *atomic.Pointer[routingTable]
|
||||
|
||||
buf []byte
|
||||
decBuf []byte
|
||||
type ConnReader struct {
|
||||
Globals
|
||||
conn *net.UDPConn
|
||||
buf []byte
|
||||
}
|
||||
|
||||
func newConnReader(
|
||||
readFromUDPAddrPort func([]byte) (int, netip.AddrPort, error),
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error),
|
||||
iface io.Writer,
|
||||
handleControlMsg func(fromIP byte, pkt any),
|
||||
rt *atomic.Pointer[routingTable],
|
||||
) *connReader {
|
||||
return &connReader{
|
||||
readFromUDPAddrPort: readFromUDPAddrPort,
|
||||
writeToUDPAddrPort: writeToUDPAddrPort,
|
||||
iface: iface,
|
||||
handleControlMsg: handleControlMsg,
|
||||
localIP: rt.Load().LocalIP,
|
||||
rt: rt,
|
||||
buf: newBuf(),
|
||||
decBuf: newBuf(),
|
||||
func NewConnReader(g Globals, conn *net.UDPConn) *ConnReader {
|
||||
return &ConnReader{
|
||||
Globals: g,
|
||||
conn: conn,
|
||||
buf: make([]byte, bufferSize),
|
||||
}
|
||||
}
|
||||
|
||||
func (r *connReader) Run() {
|
||||
func (r *ConnReader) Run() {
|
||||
for {
|
||||
r.handleNextPacket()
|
||||
}
|
||||
}
|
||||
|
||||
func (r *connReader) handleNextPacket() {
|
||||
func (r *ConnReader) handleNextPacket() {
|
||||
buf := r.buf[:bufferSize]
|
||||
n, remoteAddr, err := r.readFromUDPAddrPort(buf)
|
||||
n, remoteAddr, err := r.conn.ReadFromUDPAddrPort(buf)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to read from UDP port: %v", err)
|
||||
}
|
||||
@ -64,77 +42,5 @@ func (r *connReader) handleNextPacket() {
|
||||
buf = buf[:n]
|
||||
h := parseHeader(buf)
|
||||
|
||||
rt := r.rt.Load()
|
||||
peer := rt.Peers[h.SourceIP]
|
||||
|
||||
switch h.StreamID {
|
||||
case controlStreamID:
|
||||
r.handleControlPacket(remoteAddr, peer, h, buf)
|
||||
case dataStreamID:
|
||||
r.handleDataPacket(rt, peer, h, buf)
|
||||
default:
|
||||
r.logf("Unknown stream ID: %d", h.StreamID)
|
||||
}
|
||||
}
|
||||
|
||||
func (r *connReader) handleControlPacket(
|
||||
remoteAddr netip.AddrPort,
|
||||
peer remotePeer,
|
||||
h header,
|
||||
enc []byte,
|
||||
) {
|
||||
if peer.ControlCipher == nil {
|
||||
r.logf("No control cipher for peer: %d", h.SourceIP)
|
||||
return
|
||||
}
|
||||
|
||||
if h.DestIP != r.localIP {
|
||||
r.logf("Incorrect destination IP on control packet: %d", h.DestIP)
|
||||
return
|
||||
}
|
||||
|
||||
msg, err := peer.DecryptControlPacket(remoteAddr, h, enc, r.decBuf)
|
||||
if err != nil {
|
||||
r.logf("Failed to decrypt control packet: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
r.handleControlMsg(h.SourceIP, msg)
|
||||
}
|
||||
|
||||
func (r *connReader) handleDataPacket(
|
||||
rt *routingTable,
|
||||
peer remotePeer,
|
||||
h header,
|
||||
enc []byte,
|
||||
) {
|
||||
if !peer.Up {
|
||||
r.logf("Not connected (recv).")
|
||||
return
|
||||
}
|
||||
|
||||
data, err := peer.DecryptDataPacket(h, enc, r.decBuf)
|
||||
if err != nil {
|
||||
r.logf("Failed to decrypt data packet: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
if h.DestIP == r.localIP {
|
||||
if _, err := r.iface.Write(data); err != nil {
|
||||
log.Fatalf("Failed to write to interface: %v", err)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
remote := rt.Peers[h.DestIP]
|
||||
if !remote.Direct {
|
||||
r.logf("Unable to relay data to %d.", h.DestIP)
|
||||
return
|
||||
}
|
||||
|
||||
r.writeToUDPAddrPort(data, remote.DirectAddr)
|
||||
}
|
||||
|
||||
func (r *connReader) logf(format string, args ...any) {
|
||||
log.Printf("[ConnReader] "+format, args...)
|
||||
r.RemotePeers[h.SourceIP].Load().HandlePacket(h, remoteAddr, buf)
|
||||
}
|
||||
|
@ -1,191 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"reflect"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func newRoutePairForTesting() (*remotePeer, *remotePeer) {
|
||||
keys1 := generateKeys()
|
||||
keys2 := generateKeys()
|
||||
|
||||
r1 := newRemotePeer(1)
|
||||
r1.PubSignKey = keys1.PubSignKey
|
||||
r1.ControlCipher = newControlCipher(keys1.PrivKey, keys2.PubKey)
|
||||
r1.DataCipher = newDataCipher()
|
||||
|
||||
r2 := newRemotePeer(2)
|
||||
r2.PubSignKey = keys2.PubSignKey
|
||||
r2.ControlCipher = newControlCipher(keys2.PrivKey, keys1.PubKey)
|
||||
r2.DataCipher = r1.DataCipher
|
||||
|
||||
return r1, r2
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := r1.EncryptControlPacket(in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
iMsg, err := r2.DecryptControlPacket(netip.AddrPort{}, h, enc, tmp)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
msg, ok := iMsg.(controlMsg[packetSyn])
|
||||
if !ok {
|
||||
t.Fatal(ok)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(msg.Packet, in) {
|
||||
t.Fatal(msg)
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
func TestDecryptControlPacket_decryptionFailed(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
for i := range enc {
|
||||
x := bytes.Clone(enc)
|
||||
x[i]++
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, x, tmp)
|
||||
if !errors.Is(err, errDecryptionFailed) {
|
||||
t.Fatal(i, err)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket_duplicate(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: r1.DataCipher.Key(),
|
||||
Direct: true,
|
||||
}
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
if _, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp)
|
||||
if !errors.Is(err, errDuplicateSeqNum) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptControlPacket_invalidPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
tmp = make([]byte, bufferSize)
|
||||
out = make([]byte, bufferSize)
|
||||
)
|
||||
|
||||
in := testPacket("hello!")
|
||||
|
||||
enc := encryptControlPacket(r1.IP, r2, in, tmp, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
_, err := decryptControlPacket(r2, netip.AddrPort{}, h, enc, tmp)
|
||||
if !errors.Is(err, errUnknownPacketType) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, out)
|
||||
h := parseHeader(enc)
|
||||
|
||||
out, err := decryptDataPacket(r1, h, bytes.Clone(enc), out)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if !bytes.Equal(data, out) {
|
||||
t.Fatal(data, out)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket_incorrectCipher(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, bytes.Clone(out))
|
||||
h := parseHeader(enc)
|
||||
|
||||
r1.DataCipher = newDataCipher()
|
||||
_, err := decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if !errors.Is(err, errDecryptionFailed) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestDecryptDataPacket_duplicate(t *testing.T) {
|
||||
var (
|
||||
r1, r2 = newRoutePairForTesting()
|
||||
out = make([]byte, bufferSize)
|
||||
data = make([]byte, 1024)
|
||||
)
|
||||
|
||||
rand.Read(data)
|
||||
|
||||
enc := encryptDataPacket(r1.IP, r2.IP, r2, data, bytes.Clone(out))
|
||||
h := parseHeader(enc)
|
||||
|
||||
_, err := decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
_, err = decryptDataPacket(r1, h, enc, bytes.Clone(out))
|
||||
if !errors.Is(err, errDuplicateSeqNum) {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
*/
|
@ -1,12 +1,11 @@
|
||||
digraph d {
|
||||
ifReader -> connWriter;
|
||||
connReader -> ifWriter;
|
||||
connReader -> connWriter;
|
||||
connReader -> supervisor;
|
||||
mcReader -> supervisor;
|
||||
supervisor -> connWriter;
|
||||
supervisor -> mcWriter;
|
||||
hubPoller -> supervisor;
|
||||
ifReader -> remote;
|
||||
|
||||
connReader -> remote;
|
||||
mcReader -> remote;
|
||||
remote -> connWriter;
|
||||
remote -> ifWriter;
|
||||
hubPoller -> remote;
|
||||
|
||||
connWriter [shape="box"];
|
||||
mcWriter [shape="box"];
|
||||
|
@ -51,7 +51,7 @@ func (dc *dupCheck) IsDup(counter uint64) bool {
|
||||
}
|
||||
|
||||
// Clear if necessary.
|
||||
for i := 0; i < int(delta); i++ {
|
||||
for range delta {
|
||||
dc.put(false)
|
||||
}
|
||||
|
||||
|
@ -3,8 +3,6 @@ package peer
|
||||
import "errors"
|
||||
|
||||
var (
|
||||
errDecryptionFailed = errors.New("decryption failed")
|
||||
errDuplicateSeqNum = errors.New("duplicate sequence number")
|
||||
errMalformedPacket = errors.New("malformed packet")
|
||||
errUnknownPacketType = errors.New("unknown packet type")
|
||||
)
|
||||
|
@ -8,14 +8,19 @@ import (
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
type localConfig struct {
|
||||
m.PeerConfig
|
||||
type LocalConfig struct {
|
||||
LocalPeerIP byte
|
||||
Network []byte
|
||||
PubKey []byte
|
||||
PrivKey []byte
|
||||
PubSignKey []byte
|
||||
PrivSignKey []byte
|
||||
}
|
||||
|
||||
type startupCount struct {
|
||||
Count uint16
|
||||
}
|
||||
|
||||
func configDir(netName string) string {
|
||||
d, err := os.UserHomeDir()
|
||||
if err != nil {
|
||||
@ -25,11 +30,15 @@ func configDir(netName string) string {
|
||||
}
|
||||
|
||||
func peerConfigPath(netName string) string {
|
||||
return filepath.Join(configDir(netName), "peer-config.json")
|
||||
return filepath.Join(configDir(netName), "config.json")
|
||||
}
|
||||
|
||||
func peerStatePath(netName string) string {
|
||||
return filepath.Join(configDir(netName), "peer-state.json")
|
||||
return filepath.Join(configDir(netName), "state.json")
|
||||
}
|
||||
|
||||
func startupCountPath(netName string) string {
|
||||
return filepath.Join(configDir(netName), "startup_count.json")
|
||||
}
|
||||
|
||||
func storeJson(x any, outPath string) error {
|
||||
@ -64,7 +73,7 @@ func storeJson(x any, outPath string) error {
|
||||
return os.Rename(tmpPath, outPath)
|
||||
}
|
||||
|
||||
func storePeerConfig(netName string, pc localConfig) error {
|
||||
func storePeerConfig(netName string, pc LocalConfig) error {
|
||||
return storeJson(pc, peerConfigPath(netName))
|
||||
}
|
||||
|
||||
@ -81,10 +90,18 @@ func loadJson(dataPath string, ptr any) error {
|
||||
return json.Unmarshal(data, ptr)
|
||||
}
|
||||
|
||||
func loadPeerConfig(netName string) (pc localConfig, err error) {
|
||||
func loadPeerConfig(netName string) (pc LocalConfig, err error) {
|
||||
return pc, loadJson(peerConfigPath(netName), &pc)
|
||||
}
|
||||
|
||||
func loadNetworkState(netName string) (ps m.NetworkState, err error) {
|
||||
return ps, loadJson(peerStatePath(netName), &ps)
|
||||
}
|
||||
|
||||
func loadStartupCount(netName string) (c startupCount, err error) {
|
||||
return c, loadJson(startupCountPath(netName), &c)
|
||||
}
|
||||
|
||||
func storeStartupCount(netName string, c startupCount) error {
|
||||
return storeJson(c, startupCountPath(netName))
|
||||
}
|
||||
|
@ -16,12 +16,12 @@ func TestFilePaths(t *testing.T) {
|
||||
}
|
||||
|
||||
path := peerConfigPath("netName")
|
||||
if path != filepath.Join(confDir, "peer-config.json") {
|
||||
if path != filepath.Join(confDir, "config.json") {
|
||||
t.Fatal(path)
|
||||
}
|
||||
|
||||
path = peerStatePath("netName")
|
||||
if path != filepath.Join(confDir, "peer-state.json") {
|
||||
if path != filepath.Join(confDir, "state.json") {
|
||||
t.Fatal(path)
|
||||
}
|
||||
}
|
||||
|
@ -1,15 +1,18 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"io"
|
||||
"net"
|
||||
"net/netip"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
)
|
||||
|
||||
const (
|
||||
version = 1
|
||||
|
||||
bufferSize = 1536
|
||||
bufferSize = 8192 // Enough for data packets and encryption buffers.
|
||||
|
||||
if_mtu = 1200
|
||||
if_queue_len = 2048
|
||||
@ -28,10 +31,79 @@ var multicastAddr = net.UDPAddrFromAddrPort(netip.AddrPortFrom(
|
||||
netip.AddrFrom4([4]byte{224, 0, 0, 157}),
|
||||
4560))
|
||||
|
||||
func newBuf() []byte {
|
||||
return make([]byte, bufferSize)
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type Globals struct {
|
||||
LocalConfig // Embed, immutable.
|
||||
|
||||
// The number of startups
|
||||
StartupCount uint16
|
||||
|
||||
// Local public address (if available). Immutable.
|
||||
LocalAddr netip.AddrPort
|
||||
|
||||
// True if local public address is valid. Immutable.
|
||||
LocalAddrValid bool
|
||||
|
||||
// All remote peers by VPN IP.
|
||||
RemotePeers [256]*atomic.Pointer[Remote]
|
||||
|
||||
// Discovered public addresses.
|
||||
PubAddrs *pubAddrStore
|
||||
|
||||
// Attempts to ensure that we have a relay available.
|
||||
RelayHandler *relayHandler
|
||||
|
||||
// Send UDP - Global function to write UDP packets.
|
||||
SendUDP func(b []byte, addr netip.AddrPort) (n int, err error)
|
||||
|
||||
// Global TUN interface.
|
||||
IFace io.ReadWriteCloser
|
||||
|
||||
// For trace ID.
|
||||
NewTraceID func() uint64
|
||||
}
|
||||
|
||||
type marshaller interface {
|
||||
Marshal([]byte) []byte
|
||||
func NewGlobals(
|
||||
localConfig LocalConfig,
|
||||
startupCount startupCount,
|
||||
localAddr netip.AddrPort,
|
||||
conn *net.UDPConn,
|
||||
iface io.ReadWriteCloser,
|
||||
) (g Globals) {
|
||||
g.LocalConfig = localConfig
|
||||
g.StartupCount = startupCount.Count
|
||||
|
||||
g.LocalAddr = localAddr
|
||||
g.LocalAddrValid = localAddr.IsValid()
|
||||
|
||||
g.PubAddrs = newPubAddrStore(localAddr)
|
||||
|
||||
g.RelayHandler = newRelayHandler()
|
||||
|
||||
// Use a lock here avoids starvation, at least on my Linux machine.
|
||||
sendLock := sync.Mutex{}
|
||||
g.SendUDP = func(b []byte, addr netip.AddrPort) (int, error) {
|
||||
sendLock.Lock()
|
||||
n, err := conn.WriteToUDPAddrPort(b, addr)
|
||||
sendLock.Unlock()
|
||||
return n, err
|
||||
}
|
||||
|
||||
g.IFace = iface
|
||||
|
||||
traceID := (uint64(g.StartupCount) << 48) + 1
|
||||
g.NewTraceID = func() uint64 {
|
||||
return atomic.AddUint64(&traceID, 1)
|
||||
}
|
||||
|
||||
for i := range g.RemotePeers {
|
||||
g.RemotePeers[i] = &atomic.Pointer[Remote]{}
|
||||
}
|
||||
|
||||
for i := range g.RemotePeers {
|
||||
g.RemotePeers[i].Store(newRemote(g, byte(i)))
|
||||
}
|
||||
|
||||
return g
|
||||
}
|
||||
|
@ -6,13 +6,14 @@ import "unsafe"
|
||||
|
||||
const (
|
||||
headerSize = 12
|
||||
controlStreamID = 2
|
||||
controlHeaderSize = 24
|
||||
dataStreamID = 1
|
||||
dataHeaderSize = 12
|
||||
|
||||
dataStreamID = 1
|
||||
controlStreamID = 2
|
||||
)
|
||||
|
||||
type header struct {
|
||||
type Header struct {
|
||||
Version byte
|
||||
StreamID byte
|
||||
SourceIP byte
|
||||
@ -20,7 +21,7 @@ type header struct {
|
||||
Counter uint64 // Init with time.Now().Unix << 30 to ensure monotonic.
|
||||
}
|
||||
|
||||
func parseHeader(b []byte) (h header) {
|
||||
func parseHeader(b []byte) (h Header) {
|
||||
h.Version = b[0]
|
||||
h.StreamID = b[1]
|
||||
h.SourceIP = b[2]
|
||||
@ -29,7 +30,7 @@ func parseHeader(b []byte) (h header) {
|
||||
return h
|
||||
}
|
||||
|
||||
func (h *header) Parse(b []byte) {
|
||||
func (h *Header) Parse(b []byte) {
|
||||
h.Version = b[0]
|
||||
h.StreamID = b[1]
|
||||
h.SourceIP = b[2]
|
||||
@ -37,7 +38,7 @@ func (h *header) Parse(b []byte) {
|
||||
h.Counter = *(*uint64)(unsafe.Pointer(&b[4]))
|
||||
}
|
||||
|
||||
func (h *header) Marshal(buf []byte) {
|
||||
func (h *Header) Marshal(buf []byte) {
|
||||
buf[0] = h.Version
|
||||
buf[1] = h.StreamID
|
||||
buf[2] = h.SourceIP
|
||||
|
@ -3,7 +3,7 @@ package peer
|
||||
import "testing"
|
||||
|
||||
func TestHeaderMarshalParse(t *testing.T) {
|
||||
nIn := header{
|
||||
nIn := Header{
|
||||
StreamID: 23,
|
||||
Counter: 3212,
|
||||
SourceIP: 34,
|
||||
@ -13,7 +13,7 @@ func TestHeaderMarshalParse(t *testing.T) {
|
||||
buf := make([]byte, headerSize)
|
||||
nIn.Marshal(buf)
|
||||
|
||||
nOut := header{}
|
||||
nOut := Header{}
|
||||
nOut.Parse(buf)
|
||||
if nIn != nOut {
|
||||
t.Fatal(nIn, nOut)
|
||||
|
@ -10,22 +10,20 @@ import (
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
type hubPoller struct {
|
||||
client *http.Client
|
||||
req *http.Request
|
||||
versions [256]int64
|
||||
localIP byte
|
||||
netName string
|
||||
handleControlMsg func(fromIP byte, msg any)
|
||||
type HubPoller struct {
|
||||
Globals
|
||||
client *http.Client
|
||||
req *http.Request
|
||||
versions [256]int64
|
||||
netName string
|
||||
}
|
||||
|
||||
func newHubPoller(
|
||||
localIP byte,
|
||||
func NewHubPoller(
|
||||
g Globals,
|
||||
netName,
|
||||
hubURL,
|
||||
apiKey string,
|
||||
handleControlMsg func(byte, any),
|
||||
) (*hubPoller, error) {
|
||||
) (*HubPoller, error) {
|
||||
u, err := url.Parse(hubURL)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
@ -41,20 +39,19 @@ func newHubPoller(
|
||||
}
|
||||
req.SetBasicAuth("", apiKey)
|
||||
|
||||
return &hubPoller{
|
||||
client: client,
|
||||
req: req,
|
||||
localIP: localIP,
|
||||
netName: netName,
|
||||
handleControlMsg: handleControlMsg,
|
||||
return &HubPoller{
|
||||
Globals: g,
|
||||
client: client,
|
||||
req: req,
|
||||
netName: netName,
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (hp *hubPoller) logf(s string, args ...any) {
|
||||
func (hp *HubPoller) logf(s string, args ...any) {
|
||||
log.Printf("[HubPoller] "+s, args...)
|
||||
}
|
||||
|
||||
func (hp *hubPoller) Run() {
|
||||
func (hp *HubPoller) Run() {
|
||||
state, err := loadNetworkState(hp.netName)
|
||||
if err != nil {
|
||||
hp.logf("Failed to load network state: %v", err)
|
||||
@ -69,7 +66,7 @@ func (hp *hubPoller) Run() {
|
||||
}
|
||||
}
|
||||
|
||||
func (hp *hubPoller) pollHub() {
|
||||
func (hp *HubPoller) pollHub() {
|
||||
var state m.NetworkState
|
||||
|
||||
resp, err := hp.client.Do(hp.req)
|
||||
@ -89,22 +86,26 @@ func (hp *hubPoller) pollHub() {
|
||||
return
|
||||
}
|
||||
|
||||
hp.applyNetworkState(state)
|
||||
|
||||
if err := storeNetworkState(hp.netName, state); err != nil {
|
||||
hp.logf("Failed to store network state: %v", err)
|
||||
}
|
||||
|
||||
hp.applyNetworkState(state)
|
||||
}
|
||||
|
||||
func (hp *hubPoller) applyNetworkState(state m.NetworkState) {
|
||||
func (hp *HubPoller) applyNetworkState(state m.NetworkState) {
|
||||
for i, peer := range state.Peers {
|
||||
if i != int(hp.localIP) {
|
||||
if peer == nil || peer.Version != hp.versions[i] {
|
||||
hp.handleControlMsg(byte(i), peerUpdateMsg{Peer: state.Peers[i]})
|
||||
if peer != nil {
|
||||
hp.versions[i] = peer.Version
|
||||
}
|
||||
}
|
||||
if i == int(hp.LocalPeerIP) {
|
||||
continue
|
||||
}
|
||||
|
||||
if peer != nil && peer.Version == hp.versions[i] {
|
||||
continue
|
||||
}
|
||||
|
||||
hp.RemotePeers[i].Load().HandlePeerUpdate(peerUpdateMsg{Peer: state.Peers[i]})
|
||||
if peer != nil {
|
||||
hp.versions[i] = peer.Version
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,67 +1,35 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"io"
|
||||
"log"
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
)
|
||||
|
||||
type ifReader struct {
|
||||
iface io.Reader
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error)
|
||||
rt *atomic.Pointer[routingTable]
|
||||
buf1 []byte
|
||||
buf2 []byte
|
||||
type IFReader struct {
|
||||
Globals
|
||||
}
|
||||
|
||||
func newIFReader(
|
||||
iface io.Reader,
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error),
|
||||
rt *atomic.Pointer[routingTable],
|
||||
) *ifReader {
|
||||
return &ifReader{iface, writeToUDPAddrPort, rt, newBuf(), newBuf()}
|
||||
func NewIFReader(g Globals) *IFReader {
|
||||
return &IFReader{Globals: g}
|
||||
}
|
||||
|
||||
func (r *ifReader) Run() {
|
||||
packet := newBuf()
|
||||
func (r *IFReader) Run() {
|
||||
packet := make([]byte, bufferSize)
|
||||
for {
|
||||
r.handleNextPacket(packet)
|
||||
}
|
||||
}
|
||||
|
||||
func (r *ifReader) handleNextPacket(packet []byte) {
|
||||
func (r *IFReader) handleNextPacket(packet []byte) {
|
||||
packet = r.readNextPacket(packet)
|
||||
remoteIP, ok := r.parsePacket(packet)
|
||||
if !ok {
|
||||
return
|
||||
}
|
||||
|
||||
rt := r.rt.Load()
|
||||
peer := rt.Peers[remoteIP]
|
||||
if !peer.Up {
|
||||
r.logf("Peer %d not up.", peer.IP)
|
||||
return
|
||||
}
|
||||
|
||||
enc := peer.EncryptDataPacket(peer.IP, packet, r.buf1)
|
||||
if peer.Direct {
|
||||
r.writeToUDPAddrPort(enc, peer.DirectAddr)
|
||||
return
|
||||
}
|
||||
|
||||
relay, ok := rt.GetRelay()
|
||||
if !ok {
|
||||
r.logf("Relay not available for peer %d.", peer.IP)
|
||||
return
|
||||
}
|
||||
|
||||
enc = relay.EncryptDataPacket(peer.IP, enc, r.buf2)
|
||||
r.writeToUDPAddrPort(enc, relay.DirectAddr)
|
||||
r.RemotePeers[remoteIP].Load().SendDataTo(packet)
|
||||
}
|
||||
|
||||
func (r *ifReader) readNextPacket(buf []byte) []byte {
|
||||
n, err := r.iface.Read(buf[:cap(buf)])
|
||||
func (r *IFReader) readNextPacket(buf []byte) []byte {
|
||||
n, err := r.IFace.Read(buf[:cap(buf)])
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to read from interface: %v", err)
|
||||
}
|
||||
@ -69,7 +37,9 @@ func (r *ifReader) readNextPacket(buf []byte) []byte {
|
||||
return buf[:n]
|
||||
}
|
||||
|
||||
func (r *ifReader) parsePacket(buf []byte) (byte, bool) {
|
||||
// parsePacket returns the VPN ip for the packet, and a boolean indicating
|
||||
// success.
|
||||
func (r *IFReader) parsePacket(buf []byte) (byte, bool) {
|
||||
n := len(buf)
|
||||
if n == 0 {
|
||||
return 0, false
|
||||
@ -98,6 +68,6 @@ func (r *ifReader) parsePacket(buf []byte) (byte, bool) {
|
||||
}
|
||||
}
|
||||
|
||||
func (*ifReader) logf(s string, args ...any) {
|
||||
func (*IFReader) logf(s string, args ...any) {
|
||||
log.Printf("[IFReader] "+s, args...)
|
||||
}
|
||||
|
12
peer/main.go
12
peer/main.go
@ -6,18 +6,18 @@ import (
|
||||
)
|
||||
|
||||
func Main() {
|
||||
conf := peerConfig{}
|
||||
args := mainArgs{}
|
||||
|
||||
flag.StringVar(&conf.NetName, "name", "", "[REQUIRED] The network name.")
|
||||
flag.StringVar(&conf.HubAddress, "hub-address", "", "[REQUIRED] The hub address.")
|
||||
flag.StringVar(&conf.APIKey, "api-key", "", "[REQUIRED] The node's API key.")
|
||||
flag.StringVar(&args.NetName, "name", "", "[REQUIRED] The network name.")
|
||||
flag.StringVar(&args.HubAddress, "hub-address", "", "[REQUIRED] The hub address.")
|
||||
flag.StringVar(&args.APIKey, "api-key", "", "[REQUIRED] The node's API key.")
|
||||
flag.Parse()
|
||||
|
||||
if conf.NetName == "" || conf.HubAddress == "" || conf.APIKey == "" {
|
||||
if args.NetName == "" || args.HubAddress == "" || args.APIKey == "" {
|
||||
flag.Usage()
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
peer := newPeerMain(conf)
|
||||
peer := newPeerMain(args)
|
||||
peer.Run()
|
||||
}
|
||||
|
5
peer/main_test.go
Normal file
5
peer/main_test.go
Normal file
@ -0,0 +1,5 @@
|
||||
package peer
|
||||
|
||||
func newBuf() []byte {
|
||||
return make([]byte, bufferSize)
|
||||
}
|
@ -3,27 +3,19 @@ package peer
|
||||
import (
|
||||
"log"
|
||||
"net"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
)
|
||||
|
||||
func runMCReader(
|
||||
rt *atomic.Pointer[routingTable],
|
||||
handleControlMsg func(destIP byte, msg any),
|
||||
) {
|
||||
func RunMCReader(g Globals) {
|
||||
for {
|
||||
runMCReaderInner(rt, handleControlMsg)
|
||||
runMCReaderInner(g)
|
||||
time.Sleep(broadcastErrorTimeoutInterval)
|
||||
}
|
||||
}
|
||||
|
||||
func runMCReaderInner(
|
||||
rt *atomic.Pointer[routingTable],
|
||||
handleControlMsg func(destIP byte, msg any),
|
||||
) {
|
||||
func runMCReaderInner(g Globals) {
|
||||
var (
|
||||
raw = newBuf()
|
||||
buf = newBuf()
|
||||
buf = make([]byte, bufferSize)
|
||||
logf = func(s string, args ...any) {
|
||||
log.Printf("[MCReader] "+s, args...)
|
||||
}
|
||||
@ -37,34 +29,19 @@ func runMCReaderInner(
|
||||
|
||||
for {
|
||||
conn.SetReadDeadline(time.Now().Add(32 * time.Second))
|
||||
n, remoteAddr, err := conn.ReadFromUDPAddrPort(raw[:bufferSize])
|
||||
n, remoteAddr, err := conn.ReadFromUDPAddrPort(buf[:bufferSize])
|
||||
if err != nil {
|
||||
logf("Failed to read from UDP port): %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
raw = raw[:n]
|
||||
h, ok := headerFromLocalDiscoveryPacket(raw)
|
||||
buf = buf[:n]
|
||||
h, ok := headerFromLocalDiscoveryPacket(buf)
|
||||
if !ok {
|
||||
logf("Failed to open discovery packet?")
|
||||
continue
|
||||
}
|
||||
|
||||
peer := rt.Load().Peers[h.SourceIP]
|
||||
if peer.PubSignKey == nil {
|
||||
logf("No signing key for peer %d.", h.SourceIP)
|
||||
continue
|
||||
}
|
||||
|
||||
if !verifyLocalDiscoveryPacket(raw, buf, peer.PubSignKey) {
|
||||
logf("Invalid signature from peer: %d", h.SourceIP)
|
||||
continue
|
||||
}
|
||||
|
||||
msg := controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: h.SourceIP,
|
||||
SrcAddr: remoteAddr,
|
||||
}
|
||||
handleControlMsg(h.SourceIP, msg)
|
||||
g.RemotePeers[h.SourceIP].Load().HandleLocalDiscoveryPacket(h, remoteAddr, buf)
|
||||
}
|
||||
}
|
||||
|
@ -9,7 +9,7 @@ import (
|
||||
)
|
||||
|
||||
func createLocalDiscoveryPacket(localIP byte, signingKey []byte) []byte {
|
||||
h := header{
|
||||
h := Header{
|
||||
SourceIP: localIP,
|
||||
DestIP: 255,
|
||||
}
|
||||
@ -19,7 +19,7 @@ func createLocalDiscoveryPacket(localIP byte, signingKey []byte) []byte {
|
||||
return sign.Sign(out[:0], buf, (*[64]byte)(signingKey))
|
||||
}
|
||||
|
||||
func headerFromLocalDiscoveryPacket(pkt []byte) (h header, ok bool) {
|
||||
func headerFromLocalDiscoveryPacket(pkt []byte) (h Header, ok bool) {
|
||||
if len(pkt) != headerSize+signOverhead {
|
||||
return
|
||||
}
|
||||
@ -36,7 +36,7 @@ func verifyLocalDiscoveryPacket(pkt, buf []byte, pubSignKey []byte) bool {
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func runMCWriter(localIP byte, signingKey []byte) {
|
||||
func RunMCWriter(localIP byte, signingKey []byte) {
|
||||
discoveryPacket := createLocalDiscoveryPacket(localIP, signingKey)
|
||||
|
||||
conn, err := net.ListenMulticastUDP("udp", nil, multicastAddr)
|
||||
@ -45,6 +45,7 @@ func runMCWriter(localIP byte, signingKey []byte) {
|
||||
}
|
||||
|
||||
for range time.Tick(broadcastInterval) {
|
||||
log.Printf("[MCWriter] Broadcasting on %v...", multicastAddr)
|
||||
_, err := conn.WriteToUDP(discoveryPacket, multicastAddr)
|
||||
if err != nil {
|
||||
log.Printf("[MCWriter] Failed to write multicast: %v", err)
|
||||
|
@ -2,17 +2,9 @@ package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
"unsafe"
|
||||
)
|
||||
|
||||
var traceIDCounter uint64 = uint64(time.Now().Unix()<<30) + 1
|
||||
|
||||
func newTraceID() uint64 {
|
||||
return atomic.AddUint64(&traceIDCounter, 1)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type binWriter struct {
|
||||
|
@ -9,10 +9,8 @@ import (
|
||||
|
||||
func TestSynPacket(t *testing.T) {
|
||||
p := packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: true,
|
||||
TraceID: 2342342345,
|
||||
Direct: true,
|
||||
}
|
||||
rand.Read(p.SharedKey[:])
|
||||
|
||||
@ -32,7 +30,7 @@ func TestSynPacket(t *testing.T) {
|
||||
|
||||
func TestAckPacket(t *testing.T) {
|
||||
p := packetAck{
|
||||
TraceID: newTraceID(),
|
||||
TraceID: 123213,
|
||||
ToAddr: netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 2, 3, 4}), 234),
|
||||
}
|
||||
|
||||
@ -52,7 +50,7 @@ func TestAckPacket(t *testing.T) {
|
||||
|
||||
func TestProbePacket(t *testing.T) {
|
||||
p := packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
TraceID: 12345,
|
||||
}
|
||||
|
||||
buf := p.Marshal(newBuf())
|
||||
|
129
peer/peer.go
129
peer/peer.go
@ -6,54 +6,74 @@ import (
|
||||
"fmt"
|
||||
"io"
|
||||
"log"
|
||||
"math"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/netip"
|
||||
"net/url"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
"os"
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
type peerMain struct {
|
||||
conf localConfig
|
||||
rt *atomic.Pointer[routingTable]
|
||||
ifReader *ifReader
|
||||
connReader *connReader
|
||||
iface io.Writer
|
||||
hubPoller *hubPoller
|
||||
super *supervisor
|
||||
Globals
|
||||
ifReader *IFReader
|
||||
connReader *ConnReader
|
||||
hubPoller *HubPoller
|
||||
}
|
||||
|
||||
type peerConfig struct {
|
||||
type mainArgs struct {
|
||||
NetName string
|
||||
HubAddress string
|
||||
APIKey string
|
||||
}
|
||||
|
||||
func newPeerMain(conf peerConfig) *peerMain {
|
||||
func newPeerMain(args mainArgs) *peerMain {
|
||||
logf := func(s string, args ...any) {
|
||||
log.Printf("[Main] "+s, args...)
|
||||
}
|
||||
|
||||
config, err := loadPeerConfig(conf.NetName)
|
||||
config, err := loadPeerConfig(args.NetName)
|
||||
if err != nil {
|
||||
logf("Failed to load configuration: %v", err)
|
||||
logf("Initializing...")
|
||||
initPeerWithHub(conf)
|
||||
initPeerWithHub(args)
|
||||
|
||||
config, err = loadPeerConfig(conf.NetName)
|
||||
config, err = loadPeerConfig(args.NetName)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to load configuration: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
iface, err := openInterface(config.Network, config.PeerIP, conf.NetName)
|
||||
state, err := loadNetworkState(args.NetName)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to load network state: %v", err)
|
||||
}
|
||||
|
||||
startupCount, err := loadStartupCount(args.NetName)
|
||||
if err != nil {
|
||||
if !os.IsNotExist(err) {
|
||||
log.Fatalf("Failed to load startup count: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
if startupCount.Count == math.MaxUint16 {
|
||||
log.Fatalf("Startup counter overflow.")
|
||||
}
|
||||
startupCount.Count += 1
|
||||
|
||||
if err := storeStartupCount(args.NetName, startupCount); err != nil {
|
||||
log.Fatalf("Failed to write startup count: %v", err)
|
||||
}
|
||||
|
||||
iface, err := openInterface(config.Network, config.LocalPeerIP, args.NetName)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to open interface: %v", err)
|
||||
}
|
||||
|
||||
myAddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf(":%d", config.Port))
|
||||
localPeer := state.Peers[config.LocalPeerIP]
|
||||
|
||||
myAddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf(":%d", localPeer.Port))
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to resolve UDP address: %v", err)
|
||||
}
|
||||
@ -67,78 +87,62 @@ func newPeerMain(conf peerConfig) *peerMain {
|
||||
conn.SetReadBuffer(1024 * 1024 * 8)
|
||||
conn.SetWriteBuffer(1024 * 1024 * 8)
|
||||
|
||||
// Wrap write function - this is necessary to avoid starvation.
|
||||
writeLock := sync.Mutex{}
|
||||
writeToUDPAddrPort := func(b []byte, addr netip.AddrPort) (n int, err error) {
|
||||
writeLock.Lock()
|
||||
n, err = conn.WriteToUDPAddrPort(b, addr)
|
||||
if err != nil {
|
||||
logf("Failed to write packet: %v", err)
|
||||
}
|
||||
writeLock.Unlock()
|
||||
return n, err
|
||||
}
|
||||
|
||||
var localAddr netip.AddrPort
|
||||
ip, localAddrValid := netip.AddrFromSlice(config.PublicIP)
|
||||
ip, localAddrValid := netip.AddrFromSlice(localPeer.PublicIP)
|
||||
if localAddrValid {
|
||||
localAddr = netip.AddrPortFrom(ip, config.Port)
|
||||
localAddr = netip.AddrPortFrom(ip, localPeer.Port)
|
||||
}
|
||||
|
||||
rt := newRoutingTable(config.PeerIP, localAddr)
|
||||
rtPtr := &atomic.Pointer[routingTable]{}
|
||||
rtPtr.Store(&rt)
|
||||
g := NewGlobals(config, startupCount, localAddr, conn, iface)
|
||||
|
||||
ifReader := newIFReader(iface, writeToUDPAddrPort, rtPtr)
|
||||
super := newSupervisor(writeToUDPAddrPort, rtPtr, config.PrivKey)
|
||||
connReader := newConnReader(conn.ReadFromUDPAddrPort, writeToUDPAddrPort, iface, super.HandleControlMsg, rtPtr)
|
||||
hubPoller, err := newHubPoller(config.PeerIP, conf.NetName, conf.HubAddress, conf.APIKey, super.HandleControlMsg)
|
||||
hubPoller, err := NewHubPoller(g, args.NetName, args.HubAddress, args.APIKey)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to create hub poller: %v", err)
|
||||
}
|
||||
|
||||
return &peerMain{
|
||||
conf: config,
|
||||
rt: rtPtr,
|
||||
iface: iface,
|
||||
ifReader: ifReader,
|
||||
connReader: connReader,
|
||||
Globals: g,
|
||||
ifReader: NewIFReader(g),
|
||||
connReader: NewConnReader(g, conn),
|
||||
hubPoller: hubPoller,
|
||||
super: super,
|
||||
}
|
||||
}
|
||||
|
||||
func (p *peerMain) Run() {
|
||||
for i := range p.RemotePeers {
|
||||
remote := p.RemotePeers[i].Load()
|
||||
go newRemoteFSM(remote).Run()
|
||||
}
|
||||
|
||||
go p.ifReader.Run()
|
||||
go p.connReader.Run()
|
||||
p.super.Start()
|
||||
|
||||
if !p.rt.Load().LocalAddr.IsValid() {
|
||||
go runMCWriter(p.conf.PeerIP, p.conf.PrivSignKey)
|
||||
go runMCReader(p.rt, p.super.HandleControlMsg)
|
||||
if !p.LocalAddrValid {
|
||||
go RunMCWriter(p.LocalPeerIP, p.PrivSignKey)
|
||||
go RunMCReader(p.Globals)
|
||||
}
|
||||
|
||||
go p.hubPoller.Run()
|
||||
|
||||
select {}
|
||||
}
|
||||
|
||||
func initPeerWithHub(conf peerConfig) {
|
||||
func initPeerWithHub(args mainArgs) {
|
||||
keys := generateKeys()
|
||||
|
||||
initURL, err := url.Parse(conf.HubAddress)
|
||||
initURL, err := url.Parse(args.HubAddress)
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to parse hub URL: %v", err)
|
||||
}
|
||||
initURL.Path = "/peer/init/"
|
||||
|
||||
args := m.PeerInitArgs{
|
||||
initArgs := m.PeerInitArgs{
|
||||
EncPubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
buf := &bytes.Buffer{}
|
||||
if err := json.NewEncoder(buf).Encode(args); err != nil {
|
||||
if err := json.NewEncoder(buf).Encode(initArgs); err != nil {
|
||||
log.Fatalf("Failed to encode init args: %v", err)
|
||||
}
|
||||
|
||||
@ -146,7 +150,7 @@ func initPeerWithHub(conf peerConfig) {
|
||||
if err != nil {
|
||||
log.Fatalf("Failed to construct request: %v", err)
|
||||
}
|
||||
req.SetBasicAuth("", conf.APIKey)
|
||||
req.SetBasicAuth("", args.APIKey)
|
||||
|
||||
resp, err := http.DefaultClient.Do(req)
|
||||
if err != nil {
|
||||
@ -159,17 +163,24 @@ func initPeerWithHub(conf peerConfig) {
|
||||
log.Fatalf("Failed to read response body: %v", err)
|
||||
}
|
||||
|
||||
peerConfig := localConfig{}
|
||||
if err := json.Unmarshal(data, &peerConfig.PeerConfig); err != nil {
|
||||
initResp := m.PeerInitResp{}
|
||||
if err := json.Unmarshal(data, &initResp); err != nil {
|
||||
log.Fatalf("Failed to parse configuration: %v\n%s", err, data)
|
||||
}
|
||||
|
||||
peerConfig.PubKey = keys.PubKey
|
||||
peerConfig.PrivKey = keys.PrivKey
|
||||
peerConfig.PubSignKey = keys.PubSignKey
|
||||
peerConfig.PrivSignKey = keys.PrivSignKey
|
||||
config := LocalConfig{}
|
||||
config.LocalPeerIP = initResp.PeerIP
|
||||
config.Network = initResp.Network
|
||||
config.PubKey = keys.PubKey
|
||||
config.PrivKey = keys.PrivKey
|
||||
config.PubSignKey = keys.PubSignKey
|
||||
config.PrivSignKey = keys.PrivSignKey
|
||||
|
||||
if err := storePeerConfig(conf.NetName, peerConfig); err != nil {
|
||||
if err := storeNetworkState(args.NetName, initResp.NetworkState); err != nil {
|
||||
log.Fatalf("Failed to store network state: %v", err)
|
||||
}
|
||||
|
||||
if err := storePeerConfig(args.NetName, config); err != nil {
|
||||
log.Fatalf("Failed to store configuration: %v", err)
|
||||
}
|
||||
|
||||
|
@ -1,114 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/rand"
|
||||
mrand "math/rand"
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
)
|
||||
|
||||
// A test peer.
|
||||
type P struct {
|
||||
cryptoKeys
|
||||
RT *atomic.Pointer[routingTable]
|
||||
Conn *TestUDPConn
|
||||
IFace *TestIFace
|
||||
ConnReader *connReader
|
||||
IFReader *ifReader
|
||||
}
|
||||
|
||||
func NewPeerForTesting(n *TestNetwork, ip byte, addr netip.AddrPort) P {
|
||||
p := P{
|
||||
cryptoKeys: generateKeys(),
|
||||
RT: &atomic.Pointer[routingTable]{},
|
||||
IFace: NewTestIFace(),
|
||||
}
|
||||
|
||||
rt := newRoutingTable(ip, addr)
|
||||
p.RT.Store(&rt)
|
||||
p.Conn = n.NewUDPConn(addr)
|
||||
//p.ConnWriter = NewConnWriter(p.Conn.WriteToUDPAddrPort, p.RT)
|
||||
|
||||
return p
|
||||
}
|
||||
|
||||
func ConnectPeers(p1, p2 *P) {
|
||||
rt1 := p1.RT.Load()
|
||||
rt2 := p2.RT.Load()
|
||||
|
||||
ip1 := rt1.LocalIP
|
||||
ip2 := rt2.LocalIP
|
||||
|
||||
rt1.Peers[ip2].Up = true
|
||||
rt1.Peers[ip2].Direct = true
|
||||
rt1.Peers[ip2].Relay = true
|
||||
rt1.Peers[ip2].DirectAddr = rt2.LocalAddr
|
||||
rt1.Peers[ip2].PubSignKey = p2.PubSignKey
|
||||
rt1.Peers[ip2].ControlCipher = newControlCipher(p1.PrivKey, p2.PubKey)
|
||||
rt1.Peers[ip2].DataCipher = newDataCipher()
|
||||
|
||||
rt2.Peers[ip1].Up = true
|
||||
rt2.Peers[ip1].Direct = true
|
||||
rt2.Peers[ip1].Relay = true
|
||||
rt2.Peers[ip1].DirectAddr = rt1.LocalAddr
|
||||
rt2.Peers[ip1].PubSignKey = p1.PubSignKey
|
||||
rt2.Peers[ip1].ControlCipher = newControlCipher(p2.PrivKey, p1.PubKey)
|
||||
rt2.Peers[ip1].DataCipher = rt1.Peers[ip2].DataCipher
|
||||
}
|
||||
|
||||
func NewPeersForTesting() (p1, p2, p3 P) {
|
||||
n := NewTestNetwork()
|
||||
|
||||
p1 = NewPeerForTesting(
|
||||
n,
|
||||
1,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 1}), 100))
|
||||
|
||||
p2 = NewPeerForTesting(
|
||||
n,
|
||||
2,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 2}), 200))
|
||||
|
||||
p3 = NewPeerForTesting(
|
||||
n,
|
||||
3,
|
||||
netip.AddrPortFrom(netip.AddrFrom4([4]byte{1, 1, 1, 3}), 300))
|
||||
|
||||
ConnectPeers(&p1, &p2)
|
||||
ConnectPeers(&p1, &p3)
|
||||
ConnectPeers(&p2, &p3)
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
func RandPacket() []byte {
|
||||
n := mrand.Intn(1200)
|
||||
b := make([]byte, n)
|
||||
rand.Read(b)
|
||||
return b
|
||||
}
|
||||
|
||||
func ModifyPacket(in []byte) []byte {
|
||||
x := make([]byte, 1)
|
||||
|
||||
for {
|
||||
rand.Read(x)
|
||||
out := bytes.Clone(in)
|
||||
idx := mrand.Intn(len(out))
|
||||
if out[idx] != x[0] {
|
||||
out[idx] = x[0]
|
||||
return out
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type UnknownControlPacket struct {
|
||||
TraceID uint64
|
||||
}
|
||||
|
||||
func (p UnknownControlPacket) Marshal(buf []byte) []byte {
|
||||
return newBinWriter(buf).Byte(255).Uint64(p.TraceID).Build()
|
||||
}
|
28
peer/peerfsm.dot
Normal file
28
peer/peerfsm.dot
Normal file
@ -0,0 +1,28 @@
|
||||
digraph d {
|
||||
disconnected -> peerUpdating;
|
||||
peerUpdating -> disconnected;
|
||||
peerUpdating -> server;
|
||||
peerUpdating -> clientInit;
|
||||
server -> peerUpdating;
|
||||
clientInit -> peerUpdating;
|
||||
clientInit -> clientInit;
|
||||
clientInit -> client;
|
||||
client -> clientInit;
|
||||
client -> peerUpdating;
|
||||
|
||||
clientInitializing -> clientSyncing;
|
||||
clientSyncing -> clientInitializing;
|
||||
clientSyncing -> clientUpIndirect;
|
||||
clientSyncing -> clientUpDirect;
|
||||
clientUpIndirect -> clientUpDirect;
|
||||
clientUpIndirect -> clientInitializing;
|
||||
clientUpDirect -> clientInitializing;
|
||||
|
||||
serverInitializing -> serverSyncing;
|
||||
serverSyncing -> serverInitializing;
|
||||
serverSyncing -> serverUpIndirect;
|
||||
serverSyncing -> serverUpDirect;
|
||||
serverUpIndirect -> serverUpDirect;
|
||||
serverUpIndirect -> serverInitializing;
|
||||
serverUpDirect -> serverInitializing;
|
||||
}
|
@ -1,371 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func TestPeerState_OnPeerUpdate_nilPeer(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_OnPeerUpdate_publicLocalIsServer(t *testing.T) {
|
||||
keys := generateKeys()
|
||||
h := NewPeerStateTestHarness()
|
||||
|
||||
state := h.State.(*stateDisconnected)
|
||||
state.localAddr = addrPort4(1, 1, 1, 2, 200)
|
||||
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
/*
|
||||
|
||||
func TestPeerState_OnPeerUpdate_clientDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
}
|
||||
|
||||
/*
|
||||
func TestPeerState_OnPeerUpdate_clientRelayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
}
|
||||
|
||||
/*
|
||||
func TestStateServer_directSyn(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
ack := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, ack.TraceID, synMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.IP, 3)
|
||||
assertEqual(t, ack.PossibleAddrs[0].IsValid(), false)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateServer_relayedSyn(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
state := h.ConfigServer_Relayed(t)
|
||||
|
||||
state.pubAddrs.Store(addrPort4(4, 5, 6, 7, 1234))
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: false,
|
||||
},
|
||||
}
|
||||
synMsg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 3, 300)
|
||||
synMsg.Packet.PossibleAddrs[1] = addrPort4(2, 2, 2, 3, 300)
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
|
||||
ack := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, ack.TraceID, synMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.IP, 3)
|
||||
assertEqual(t, ack.PossibleAddrs[0], addrPort4(4, 5, 6, 7, 1234))
|
||||
assertEqual(t, ack.PossibleAddrs[1].IsValid(), false)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
assertType[packetProbe](t, h.Sent[1].Packet)
|
||||
assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
assertEqual(t, h.Sent[1].Peer.DirectAddr, addrPort4(1, 1, 1, 3, 300))
|
||||
assertEqual(t, h.Sent[2].Peer.DirectAddr, addrPort4(2, 2, 2, 3, 300))
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
probeMsg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetProbe{TraceID: newTraceID()},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(probeMsg)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
probe := assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, probe.TraceID, probeMsg.Packet.TraceID)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, addrPort4(1, 1, 1, 3, 300))
|
||||
}
|
||||
|
||||
func TestStateServer_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
synMsg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 1, 1, 3, 300),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
//SentAt: time.Now().UnixMilli(),
|
||||
//SharedKeyType: 1,
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
h.State = h.State.OnMsg(synMsg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
// Ping shouldn't timeout.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
// Advance the time, then ping.
|
||||
state := assertType[*stateServer](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-timeoutInterval - time.Second)
|
||||
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnAck_incorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID + 1},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnPingTimer(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, another syn should be sent. Additionally, we should remain
|
||||
// in the same state.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientDirect_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
state := assertType[*stateClientDirect](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-(timeoutInterval + time.Second))
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, we should timeout, causing the client to reset. Another SYN
|
||||
// will be sent when re-entering the state, but the connection should be down.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_noAddrs(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
// If we haven't had an ack yet, we won't have addresses to probe. Therefore
|
||||
// we'll have just one more syn packet sent.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_withAddrs(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{Packet: packetAck{TraceID: syn.TraceID}}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 300)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 300)
|
||||
|
||||
h.State = h.State.OnMsg(ack)
|
||||
|
||||
// Add a local discovery address. Note that the port will be configured port
|
||||
// and no the one provided here.
|
||||
h.State = h.State.OnMsg(controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(2, 2, 2, 3, 300),
|
||||
})
|
||||
|
||||
// We should see one SYN and three probe packets.
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 5)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
assertType[packetProbe](t, h.Sent[3].Packet)
|
||||
assertType[packetProbe](t, h.Sent[4].Packet)
|
||||
|
||||
assertEqual(t, h.Sent[2].Peer.DirectAddr, addrPort4(1, 1, 1, 1, 300))
|
||||
assertEqual(t, h.Sent[3].Peer.DirectAddr, addrPort4(1, 1, 1, 2, 300))
|
||||
assertEqual(t, h.Sent[4].Peer.DirectAddr, addrPort4(2, 2, 2, 3, 456))
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnPingTimer_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
// On entering the state, a SYN should have been sent.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
h.State = h.State.OnMsg(ack)
|
||||
assertEqual(t, h.Published.Up, true)
|
||||
|
||||
state := assertType[*stateClientRelayed](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-(timeoutInterval + time.Second))
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// On ping timer, we should timeout, causing the client to reset. Another SYN
|
||||
// will be sent when re-entering the state, but the connection should be down.
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
assertType[*stateClientRelayed](t, h.State)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnProbe_unknownAddr(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.OnProbe(controlMsg[packetProbe]{
|
||||
Packet: packetProbe{TraceID: newTraceID()},
|
||||
})
|
||||
|
||||
assertType[*stateClientRelayed](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateClientRelayed_OnProbe_upgradeDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
syn := assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
|
||||
ack := controlMsg[packetAck]{Packet: packetAck{TraceID: syn.TraceID}}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 300)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 300)
|
||||
|
||||
h.State = h.State.OnMsg(ack)
|
||||
h.OnPingTimer()
|
||||
|
||||
probe := assertType[packetProbe](t, h.Sent[2].Packet)
|
||||
h.OnProbe(controlMsg[packetProbe]{Packet: probe})
|
||||
|
||||
assertType[*stateClientDirect](t, h.State)
|
||||
}
|
||||
*/
|
@ -1,148 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
type supervisor struct {
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error)
|
||||
staged routingTable
|
||||
shared *atomic.Pointer[routingTable]
|
||||
peers [256]*peerSuper
|
||||
lock sync.Mutex
|
||||
|
||||
buf1 []byte
|
||||
buf2 []byte
|
||||
}
|
||||
|
||||
func newSupervisor(
|
||||
writeToUDPAddrPort func([]byte, netip.AddrPort) (int, error),
|
||||
rt *atomic.Pointer[routingTable],
|
||||
privKey []byte,
|
||||
) *supervisor {
|
||||
|
||||
routes := rt.Load()
|
||||
|
||||
s := &supervisor{
|
||||
writeToUDPAddrPort: writeToUDPAddrPort,
|
||||
staged: *routes,
|
||||
shared: rt,
|
||||
buf1: newBuf(),
|
||||
buf2: newBuf(),
|
||||
}
|
||||
|
||||
pubAddrs := newPubAddrStore(routes.LocalAddr)
|
||||
|
||||
for i := range s.peers {
|
||||
state := &peerData{
|
||||
publish: s.publish,
|
||||
sendControlPacket: s.send,
|
||||
pingTimer: time.NewTicker(timeoutInterval),
|
||||
localIP: routes.LocalIP,
|
||||
remoteIP: byte(i),
|
||||
privKey: privKey,
|
||||
localAddr: routes.LocalAddr,
|
||||
pubAddrs: pubAddrs,
|
||||
staged: routes.Peers[i],
|
||||
limiter: ratelimiter.New(ratelimiter.Config{
|
||||
FillPeriod: 20 * time.Millisecond,
|
||||
MaxWaitCount: 1,
|
||||
}),
|
||||
}
|
||||
s.peers[i] = newPeerSuper(state, state.pingTimer)
|
||||
}
|
||||
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *supervisor) Start() {
|
||||
for i := range s.peers {
|
||||
go s.peers[i].Run()
|
||||
}
|
||||
}
|
||||
|
||||
func (s *supervisor) HandleControlMsg(destIP byte, msg any) {
|
||||
s.peers[destIP].HandleControlMsg(msg)
|
||||
}
|
||||
|
||||
func (s *supervisor) send(peer remotePeer, pkt marshaller) {
|
||||
s.lock.Lock()
|
||||
defer s.lock.Unlock()
|
||||
|
||||
enc := peer.EncryptControlPacket(pkt, s.buf1, s.buf2)
|
||||
if peer.Direct {
|
||||
s.writeToUDPAddrPort(enc, peer.DirectAddr)
|
||||
return
|
||||
}
|
||||
|
||||
relay, ok := s.staged.GetRelay()
|
||||
if !ok {
|
||||
return
|
||||
}
|
||||
|
||||
enc = relay.EncryptDataPacket(peer.IP, enc, s.buf1)
|
||||
s.writeToUDPAddrPort(enc, relay.DirectAddr)
|
||||
}
|
||||
|
||||
func (s *supervisor) publish(rp remotePeer) {
|
||||
s.lock.Lock()
|
||||
defer s.lock.Unlock()
|
||||
|
||||
s.staged.Peers[rp.IP] = rp
|
||||
s.ensureRelay()
|
||||
copy := s.staged
|
||||
s.shared.Store(©)
|
||||
}
|
||||
|
||||
func (s *supervisor) ensureRelay() {
|
||||
if _, ok := s.staged.GetRelay(); ok {
|
||||
return
|
||||
}
|
||||
|
||||
// TODO: Random selection? Something else?
|
||||
for _, peer := range s.staged.Peers {
|
||||
if peer.Up && peer.Direct && peer.Relay {
|
||||
s.staged.RelayIP = peer.IP
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type peerSuper struct {
|
||||
messages chan any
|
||||
state peerState
|
||||
pingTimer *time.Ticker
|
||||
}
|
||||
|
||||
func newPeerSuper(state *peerData, pingTimer *time.Ticker) *peerSuper {
|
||||
return &peerSuper{
|
||||
messages: make(chan any, 8),
|
||||
state: initPeerState(state, nil),
|
||||
pingTimer: pingTimer,
|
||||
}
|
||||
}
|
||||
|
||||
func (s *peerSuper) HandleControlMsg(msg any) {
|
||||
select {
|
||||
case s.messages <- msg:
|
||||
default:
|
||||
}
|
||||
}
|
||||
|
||||
func (s *peerSuper) Run() {
|
||||
for {
|
||||
select {
|
||||
case <-s.pingTimer.C:
|
||||
s.state = s.state.OnMsg(pingTimerMsg{})
|
||||
case raw := <-s.messages:
|
||||
s.state = s.state.OnMsg(raw)
|
||||
}
|
||||
}
|
||||
}
|
54
peer/relayhandler.go
Normal file
54
peer/relayhandler.go
Normal file
@ -0,0 +1,54 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"log"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
)
|
||||
|
||||
type relayHandler struct {
|
||||
lock sync.Mutex
|
||||
relays map[byte]*Remote
|
||||
relay atomic.Pointer[Remote]
|
||||
}
|
||||
|
||||
func newRelayHandler() *relayHandler {
|
||||
return &relayHandler{
|
||||
relays: make(map[byte]*Remote, 256),
|
||||
}
|
||||
}
|
||||
|
||||
func (h *relayHandler) Add(r *Remote) {
|
||||
h.lock.Lock()
|
||||
defer h.lock.Unlock()
|
||||
|
||||
h.relays[r.RemotePeerIP] = r
|
||||
|
||||
if h.relay.Load() == nil {
|
||||
log.Printf("Setting Relay: %v", r.conf().Peer.Name)
|
||||
h.relay.Store(r)
|
||||
}
|
||||
}
|
||||
|
||||
func (h *relayHandler) Remove(r *Remote) {
|
||||
h.lock.Lock()
|
||||
defer h.lock.Unlock()
|
||||
|
||||
log.Printf("Removing relay %d...", r.RemotePeerIP)
|
||||
delete(h.relays, r.RemotePeerIP)
|
||||
|
||||
if h.relay.Load() == r {
|
||||
// Remove current relay.
|
||||
h.relay.Store(nil)
|
||||
|
||||
// Find new relay.
|
||||
for _, r := range h.relays {
|
||||
h.relay.Store(r)
|
||||
break
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (h *relayHandler) Load() *Remote {
|
||||
return h.relay.Load()
|
||||
}
|
327
peer/remote.go
Normal file
327
peer/remote.go
Normal file
@ -0,0 +1,327 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
"net/netip"
|
||||
"strings"
|
||||
"sync/atomic"
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
// The remoteConfig is the shared, immutable configuration for a remote
|
||||
// peer. It's read and written atomically. See remote.config.
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type remoteConfig struct {
|
||||
Up bool // True if peer is up and we can send data.
|
||||
Server bool // True if role is server.
|
||||
Direct bool // True if this is a direct connection.
|
||||
DirectAddr netip.AddrPort // Remote address if directly connected.
|
||||
ControlCipher *controlCipher
|
||||
DataCipher *dataCipher
|
||||
Peer *m.Peer
|
||||
}
|
||||
|
||||
// CanRelay returns true if the remote configuration is able to relay packets.
|
||||
// to other hosts.
|
||||
func (rc remoteConfig) CanRelay() bool {
|
||||
return rc.Up && rc.Direct && rc.Peer.Relay
|
||||
}
|
||||
|
||||
// A Remote represents a remote peer and contains functions for handling
|
||||
// incoming control, data, and multicast packets, peer udpates, as well as
|
||||
// sending, forwarding, and relaying packets.
|
||||
type Remote struct {
|
||||
Globals
|
||||
RemotePeerIP byte // Immutable.
|
||||
|
||||
dupCheck *dupCheck
|
||||
sendCounter uint64 // init to startupCount << 48. Atomic access only.
|
||||
|
||||
// config should be accessed via conf() and updateConf(...) methods.
|
||||
config atomic.Pointer[remoteConfig]
|
||||
messages chan any
|
||||
}
|
||||
|
||||
func newRemote(g Globals, remotePeerIP byte) *Remote {
|
||||
r := &Remote{
|
||||
Globals: g,
|
||||
RemotePeerIP: remotePeerIP,
|
||||
dupCheck: newDupCheck(0),
|
||||
sendCounter: (uint64(g.StartupCount) << 48) + 1,
|
||||
messages: make(chan any, 8),
|
||||
}
|
||||
r.config.Store(&remoteConfig{})
|
||||
return r
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *Remote) conf() remoteConfig {
|
||||
return *(r.config.Load())
|
||||
}
|
||||
|
||||
func (r *Remote) updateConf(conf remoteConfig) {
|
||||
old := r.config.Load()
|
||||
r.config.Store(&conf)
|
||||
|
||||
if !old.CanRelay() && conf.CanRelay() {
|
||||
r.RelayHandler.Add(r)
|
||||
}
|
||||
|
||||
if old.CanRelay() && !conf.CanRelay() {
|
||||
r.RelayHandler.Remove(r)
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *Remote) sendUDP(b []byte, addr netip.AddrPort) {
|
||||
if _, err := r.SendUDP(b, addr); err != nil {
|
||||
r.logf("Failed to send UDP packet: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *Remote) encryptData(conf remoteConfig, destIP byte, packet []byte) []byte {
|
||||
h := Header{
|
||||
StreamID: dataStreamID,
|
||||
Counter: atomic.AddUint64(&r.sendCounter, 1),
|
||||
SourceIP: r.Globals.LocalPeerIP,
|
||||
DestIP: destIP,
|
||||
}
|
||||
return conf.DataCipher.Encrypt(h, packet, packet[len(packet):cap(packet)])
|
||||
}
|
||||
|
||||
func (r *Remote) encryptControl(conf remoteConfig, packet []byte) []byte {
|
||||
h := Header{
|
||||
StreamID: controlStreamID,
|
||||
Counter: atomic.AddUint64(&r.sendCounter, 1),
|
||||
SourceIP: r.LocalPeerIP,
|
||||
DestIP: r.RemotePeerIP,
|
||||
}
|
||||
return conf.ControlCipher.Encrypt(h, packet, packet[len(packet):cap(packet)])
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
// SendDataTo sends a data packet to the remote, called by the IFReader.
|
||||
func (r *Remote) SendDataTo(data []byte) {
|
||||
conf := r.conf()
|
||||
if !conf.Up {
|
||||
r.logf("Cannot send: link down")
|
||||
return
|
||||
}
|
||||
|
||||
// Direct:
|
||||
|
||||
if conf.Direct {
|
||||
r.sendUDP(r.encryptData(conf, conf.Peer.PeerIP, data), conf.DirectAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed:
|
||||
relay := r.RelayHandler.Load()
|
||||
|
||||
if relay == nil {
|
||||
r.logf("Connot send: no relay")
|
||||
return
|
||||
}
|
||||
|
||||
relay.relayData(conf.Peer.PeerIP, r.encryptData(conf, conf.Peer.PeerIP, data))
|
||||
}
|
||||
|
||||
func (r *Remote) relayData(toIP byte, enc []byte) {
|
||||
conf := r.conf()
|
||||
if !conf.Up || !conf.Direct {
|
||||
r.logf("Cannot relay: not up or not a direct connection")
|
||||
return
|
||||
}
|
||||
r.sendUDP(r.encryptData(conf, toIP, enc), conf.DirectAddr)
|
||||
}
|
||||
|
||||
func (r *Remote) sendControl(conf remoteConfig, data []byte) {
|
||||
// Direct:
|
||||
|
||||
if conf.Direct {
|
||||
enc := r.encryptControl(conf, data)
|
||||
r.sendUDP(enc, conf.DirectAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed:
|
||||
|
||||
relay := r.RelayHandler.Load()
|
||||
|
||||
if relay == nil {
|
||||
r.logf("Connot send: no relay")
|
||||
return
|
||||
}
|
||||
|
||||
relay.relayData(conf.Peer.PeerIP, r.encryptControl(conf, data))
|
||||
}
|
||||
|
||||
func (r *Remote) sendControlToAddr(buf []byte, addr netip.AddrPort) {
|
||||
enc := r.encryptControl(r.conf(), buf)
|
||||
r.sendUDP(enc, addr)
|
||||
}
|
||||
|
||||
func (r *Remote) forwardPacket(data []byte) {
|
||||
conf := r.conf()
|
||||
if !conf.Up || !conf.Direct {
|
||||
r.logf("Cannot forward to %d: not a direct connection", conf.Peer.PeerIP)
|
||||
return
|
||||
}
|
||||
r.sendUDP(data, conf.DirectAddr)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
// HandlePacket is called by the ConnReader to handle an incoming packet.
|
||||
func (r *Remote) HandlePacket(h Header, srcAddr netip.AddrPort, data []byte) {
|
||||
switch h.StreamID {
|
||||
case controlStreamID:
|
||||
r.handleControlPacket(h, srcAddr, data)
|
||||
case dataStreamID:
|
||||
r.handleDataPacket(h, data)
|
||||
default:
|
||||
r.logf("Unknown stream ID: %d", h.StreamID)
|
||||
}
|
||||
}
|
||||
|
||||
// Handle a control packet. Decrypt, verify, etc.
|
||||
func (r *Remote) handleControlPacket(h Header, srcAddr netip.AddrPort, data []byte) {
|
||||
conf := r.conf()
|
||||
if conf.ControlCipher == nil {
|
||||
r.logf("No control cipher")
|
||||
return
|
||||
}
|
||||
|
||||
dec, ok := conf.ControlCipher.Decrypt(data, data[len(data):cap(data)])
|
||||
if !ok {
|
||||
r.logf("Failed to decrypt control packet")
|
||||
return
|
||||
}
|
||||
|
||||
if r.dupCheck.IsDup(h.Counter) {
|
||||
r.logf("Dropping control packet as duplicate: %d", h.Counter)
|
||||
return
|
||||
}
|
||||
|
||||
msg, err := parseControlMsg(h.SourceIP, srcAddr, dec)
|
||||
if err != nil {
|
||||
r.logf("Failed to parse control packet: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
select {
|
||||
case r.messages <- msg:
|
||||
default:
|
||||
r.logf("Dropping control message")
|
||||
}
|
||||
}
|
||||
|
||||
func (r *Remote) handleDataPacket(h Header, data []byte) {
|
||||
conf := r.conf()
|
||||
if conf.DataCipher == nil {
|
||||
return
|
||||
}
|
||||
|
||||
dec, ok := conf.DataCipher.Decrypt(data, data[len(data):cap(data)])
|
||||
if !ok {
|
||||
r.logf("Failed to decrypt data packet")
|
||||
return
|
||||
}
|
||||
|
||||
if r.dupCheck.IsDup(h.Counter) {
|
||||
r.logf("Dropping data packet as duplicate: %d", h.Counter)
|
||||
return
|
||||
}
|
||||
|
||||
// For local.
|
||||
if h.DestIP == r.LocalPeerIP {
|
||||
if _, err := r.IFace.Write(dec); err != nil {
|
||||
// This could be a malformed packet from a peer, so we don't crash if it
|
||||
// happens.
|
||||
r.logf("Failed to write to interface: %v", err)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// Forward.
|
||||
dest := r.RemotePeers[h.DestIP].Load()
|
||||
dest.forwardPacket(dec)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
// HandleLocalDiscoveryPacket is called by the MCReader.
|
||||
func (r *Remote) HandleLocalDiscoveryPacket(h Header, srcAddr netip.AddrPort, data []byte) {
|
||||
conf := r.conf()
|
||||
if conf.Peer.PubSignKey == nil {
|
||||
r.logf("No signing key for discovery packet.")
|
||||
return
|
||||
}
|
||||
|
||||
if !verifyLocalDiscoveryPacket(data, data[len(data):cap(data)], conf.Peer.PubSignKey) {
|
||||
r.logf("Invalid signature on discovery packet.")
|
||||
return
|
||||
}
|
||||
|
||||
msg := controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: h.SourceIP,
|
||||
SrcAddr: srcAddr,
|
||||
}
|
||||
|
||||
select {
|
||||
case r.messages <- msg:
|
||||
default:
|
||||
r.logf("Dropping discovery message.")
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
// HandlePeerUpdate is called by the HubPoller when it gets a new version of
|
||||
// the associated peer configuration.
|
||||
func (r *Remote) HandlePeerUpdate(msg peerUpdateMsg) {
|
||||
r.messages <- msg
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (s *Remote) logf(format string, args ...any) {
|
||||
conf := s.conf()
|
||||
|
||||
b := strings.Builder{}
|
||||
name := ""
|
||||
if conf.Peer != nil {
|
||||
name = conf.Peer.Name
|
||||
}
|
||||
b.WriteString(fmt.Sprintf("%03d", s.RemotePeerIP))
|
||||
|
||||
b.WriteString(fmt.Sprintf("%30s: ", name))
|
||||
|
||||
if conf.Server {
|
||||
b.WriteString("SERVER | ")
|
||||
} else {
|
||||
b.WriteString("CLIENT | ")
|
||||
}
|
||||
|
||||
if conf.Direct {
|
||||
b.WriteString("DIRECT | ")
|
||||
} else {
|
||||
b.WriteString("RELAYED | ")
|
||||
}
|
||||
|
||||
if conf.Up {
|
||||
b.WriteString("UP | ")
|
||||
} else {
|
||||
b.WriteString("DOWN | ")
|
||||
}
|
||||
|
||||
log.Printf(b.String()+format, args...)
|
||||
}
|
447
peer/remotefsm.go
Normal file
447
peer/remotefsm.go
Normal file
@ -0,0 +1,447 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
"vppn/m"
|
||||
)
|
||||
|
||||
type stateFunc func(msg any) stateFunc
|
||||
|
||||
type sentProbe struct {
|
||||
SentAt time.Time
|
||||
Addr netip.AddrPort
|
||||
}
|
||||
|
||||
type remoteFSM struct {
|
||||
*Remote
|
||||
|
||||
pingTimer *time.Ticker
|
||||
lastSeen time.Time
|
||||
traceID uint64
|
||||
probes map[uint64]sentProbe
|
||||
|
||||
buf []byte
|
||||
}
|
||||
|
||||
func newRemoteFSM(r *Remote) *remoteFSM {
|
||||
fsm := &remoteFSM{
|
||||
Remote: r,
|
||||
pingTimer: time.NewTicker(timeoutInterval),
|
||||
probes: map[uint64]sentProbe{},
|
||||
buf: make([]byte, bufferSize),
|
||||
}
|
||||
fsm.pingTimer.Stop()
|
||||
return fsm
|
||||
}
|
||||
|
||||
func (r *remoteFSM) Run() {
|
||||
go func() {
|
||||
for range r.pingTimer.C {
|
||||
r.messages <- pingTimerMsg{}
|
||||
}
|
||||
}()
|
||||
state := r.enterDisconnected()
|
||||
for msg := range r.messages {
|
||||
state = state(msg)
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *remoteFSM) enterDisconnected() stateFunc {
|
||||
r.updateConf(remoteConfig{})
|
||||
return r.stateDisconnected
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateDisconnected(iMsg any) stateFunc {
|
||||
switch msg := iMsg.(type) {
|
||||
case peerUpdateMsg:
|
||||
return r.enterPeerUpdating(msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
r.logf("Unexpected INIT")
|
||||
case controlMsg[packetSyn]:
|
||||
r.logf("Unexpected SYN")
|
||||
case controlMsg[packetAck]:
|
||||
r.logf("Unexpected ACK")
|
||||
case controlMsg[packetProbe]:
|
||||
r.logf("Unexpected probe")
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
// Ignore
|
||||
case pingTimerMsg:
|
||||
r.logf("Unexpected ping")
|
||||
default:
|
||||
r.logf("Ignoring message: %#v", iMsg)
|
||||
}
|
||||
|
||||
return r.stateDisconnected
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *remoteFSM) enterPeerUpdating(peer *m.Peer) stateFunc {
|
||||
if peer == nil {
|
||||
return r.enterDisconnected()
|
||||
}
|
||||
|
||||
conf := remoteConfig{
|
||||
Peer: peer,
|
||||
ControlCipher: newControlCipher(r.PrivKey, peer.PubKey),
|
||||
}
|
||||
r.updateConf(conf)
|
||||
|
||||
if _, isValid := netip.AddrFromSlice(peer.PublicIP); isValid {
|
||||
if r.LocalAddrValid && r.LocalPeerIP < peer.PeerIP {
|
||||
return r.enterServer()
|
||||
}
|
||||
return r.enterClientInit()
|
||||
}
|
||||
|
||||
if r.LocalAddrValid || r.LocalPeerIP < peer.PeerIP {
|
||||
return r.enterServer()
|
||||
}
|
||||
|
||||
return r.enterClientInit()
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *remoteFSM) enterServer() stateFunc {
|
||||
|
||||
conf := r.conf()
|
||||
conf.Server = true
|
||||
r.updateConf(conf)
|
||||
r.logf("==> Server")
|
||||
|
||||
r.pingTimer.Reset(pingInterval)
|
||||
r.lastSeen = time.Now()
|
||||
return r.stateServer
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateServer(iMsg any) stateFunc {
|
||||
switch msg := iMsg.(type) {
|
||||
case peerUpdateMsg:
|
||||
return r.enterPeerUpdating(msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
r.stateServer_onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
r.stateServer_onSyn(msg)
|
||||
case controlMsg[packetAck]:
|
||||
r.logf("Unexpected ACK")
|
||||
case controlMsg[packetProbe]:
|
||||
r.stateServer_onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
// Ignore
|
||||
case pingTimerMsg:
|
||||
r.stateServer_onPingTimer()
|
||||
default:
|
||||
r.logf("Unexpected message: %#v", iMsg)
|
||||
}
|
||||
|
||||
return r.stateServer
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateServer_onInit(msg controlMsg[packetInit]) {
|
||||
conf := r.conf()
|
||||
conf.Up = false
|
||||
conf.Direct = msg.Packet.Direct
|
||||
conf.DirectAddr = msg.SrcAddr
|
||||
r.updateConf(conf)
|
||||
|
||||
init := packetInit{
|
||||
TraceID: msg.Packet.TraceID,
|
||||
Direct: conf.Direct,
|
||||
Version: version,
|
||||
}
|
||||
|
||||
r.sendControl(conf, init.Marshal(r.buf))
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateServer_onSyn(msg controlMsg[packetSyn]) {
|
||||
r.lastSeen = time.Now()
|
||||
p := msg.Packet
|
||||
|
||||
// Before we can respond to this packet, we need to make sure the
|
||||
// route is setup properly.
|
||||
conf := r.conf()
|
||||
logSyn := !conf.Up || conf.Direct != p.Direct
|
||||
|
||||
conf.Up = true
|
||||
conf.Direct = p.Direct
|
||||
conf.DirectAddr = msg.SrcAddr
|
||||
|
||||
// Update data cipher if the key has changed.
|
||||
if !conf.DataCipher.HasKey(p.SharedKey) {
|
||||
conf.DataCipher = newDataCipherFromKey(p.SharedKey)
|
||||
}
|
||||
|
||||
r.updateConf(conf)
|
||||
|
||||
if logSyn {
|
||||
r.logf("Got SYN.")
|
||||
}
|
||||
|
||||
r.sendControl(conf, packetAck{
|
||||
TraceID: p.TraceID,
|
||||
ToAddr: conf.DirectAddr,
|
||||
PossibleAddrs: r.PubAddrs.Get(),
|
||||
}.Marshal(r.buf))
|
||||
|
||||
if p.Direct {
|
||||
return
|
||||
}
|
||||
|
||||
// Send probes if not a direct connection.
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
r.logf("Probing %v...", addr)
|
||||
r.sendControlToAddr(packetProbe{TraceID: r.NewTraceID()}.Marshal(r.buf), addr)
|
||||
}
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateServer_onProbe(msg controlMsg[packetProbe]) {
|
||||
if !msg.SrcAddr.IsValid() {
|
||||
return
|
||||
}
|
||||
|
||||
data := packetProbe{TraceID: msg.Packet.TraceID}.Marshal(r.buf)
|
||||
r.sendControlToAddr(data, msg.SrcAddr)
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateServer_onPingTimer() {
|
||||
conf := r.conf()
|
||||
if time.Since(r.lastSeen) > timeoutInterval && conf.Up {
|
||||
conf.Up = false
|
||||
r.updateConf(conf)
|
||||
r.logf("Timeout.")
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *remoteFSM) enterClientInit() stateFunc {
|
||||
conf := r.conf()
|
||||
ip, ipValid := netip.AddrFromSlice(conf.Peer.PublicIP)
|
||||
|
||||
conf.Up = false
|
||||
conf.Server = false
|
||||
conf.Direct = ipValid
|
||||
conf.DirectAddr = netip.AddrPortFrom(ip, conf.Peer.Port)
|
||||
conf.DataCipher = newDataCipher()
|
||||
|
||||
r.updateConf(conf)
|
||||
r.logf("==> ClientInit")
|
||||
|
||||
r.lastSeen = time.Now()
|
||||
r.pingTimer.Reset(pingInterval)
|
||||
r.stateClientInit_sendInit()
|
||||
return r.stateClientInit
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClientInit(iMsg any) stateFunc {
|
||||
switch msg := iMsg.(type) {
|
||||
case peerUpdateMsg:
|
||||
return r.enterPeerUpdating(msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
return r.stateClientInit_onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
r.logf("Unexpected SYN")
|
||||
case controlMsg[packetAck]:
|
||||
r.logf("Unexpected ACK")
|
||||
case controlMsg[packetProbe]:
|
||||
// Ignore
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
// Ignore
|
||||
case pingTimerMsg:
|
||||
return r.stateClientInit_onPing()
|
||||
default:
|
||||
r.logf("Unexpected message: %#v", iMsg)
|
||||
}
|
||||
|
||||
return r.stateClientInit
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClientInit_sendInit() {
|
||||
conf := r.conf()
|
||||
r.traceID = r.NewTraceID()
|
||||
init := packetInit{
|
||||
TraceID: r.traceID,
|
||||
Direct: conf.Direct,
|
||||
Version: version,
|
||||
}
|
||||
r.sendControl(conf, init.Marshal(r.buf))
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClientInit_onInit(msg controlMsg[packetInit]) stateFunc {
|
||||
if msg.Packet.TraceID != r.traceID {
|
||||
r.logf("Invalid trace ID on INIT.")
|
||||
return r.stateClientInit
|
||||
}
|
||||
r.logf("Got INIT version %d.", msg.Packet.Version)
|
||||
return r.enterClient()
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClientInit_onPing() stateFunc {
|
||||
if time.Since(r.lastSeen) < timeoutInterval {
|
||||
r.stateClientInit_sendInit()
|
||||
return r.stateClientInit
|
||||
}
|
||||
|
||||
// Direct connect failed. Try indirect.
|
||||
conf := r.conf()
|
||||
|
||||
if conf.Direct {
|
||||
conf.Direct = false
|
||||
r.updateConf(conf)
|
||||
r.lastSeen = time.Now()
|
||||
r.stateClientInit_sendInit()
|
||||
r.logf("Direct connection failed. Attempting indirect connection.")
|
||||
return r.stateClientInit
|
||||
}
|
||||
|
||||
// Indirect failed. Re-enter init state.
|
||||
r.logf("Timeout.")
|
||||
return r.enterClientInit()
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (r *remoteFSM) enterClient() stateFunc {
|
||||
conf := r.conf()
|
||||
r.probes = make(map[uint64]sentProbe, 8)
|
||||
|
||||
r.traceID = r.NewTraceID()
|
||||
r.stateClient_sendSyn(conf)
|
||||
|
||||
r.pingTimer.Reset(pingInterval)
|
||||
r.logf("==> Client")
|
||||
return r.stateClient
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient(iMsg any) stateFunc {
|
||||
switch msg := iMsg.(type) {
|
||||
case peerUpdateMsg:
|
||||
return r.enterPeerUpdating(msg.Peer)
|
||||
case controlMsg[packetAck]:
|
||||
r.stateClient_onAck(msg)
|
||||
case controlMsg[packetProbe]:
|
||||
r.stateClient_onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
r.stateClient_onLocalDiscovery(msg)
|
||||
case pingTimerMsg:
|
||||
return r.stateClient_onPingTimer()
|
||||
default:
|
||||
r.logf("Ignoring message: %v", iMsg)
|
||||
}
|
||||
return r.stateClient
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_onAck(msg controlMsg[packetAck]) {
|
||||
if msg.Packet.TraceID != r.traceID {
|
||||
return
|
||||
}
|
||||
|
||||
r.lastSeen = time.Now()
|
||||
|
||||
conf := r.conf()
|
||||
if !conf.Up {
|
||||
conf.Up = true
|
||||
r.updateConf(conf)
|
||||
r.logf("Got ACK.")
|
||||
}
|
||||
|
||||
if conf.Direct {
|
||||
r.PubAddrs.Store(msg.Packet.ToAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed.
|
||||
|
||||
r.stateClient_cleanProbes()
|
||||
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
r.stateClient_sendProbeTo(addr)
|
||||
}
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_cleanProbes() {
|
||||
for key, sent := range r.probes {
|
||||
if time.Since(sent.SentAt) > pingInterval {
|
||||
delete(r.probes, key)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_sendProbeTo(addr netip.AddrPort) {
|
||||
probe := packetProbe{TraceID: r.NewTraceID()}
|
||||
r.probes[probe.TraceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addr,
|
||||
}
|
||||
r.logf("Probing %v...", addr)
|
||||
r.sendControlToAddr(probe.Marshal(r.buf), addr)
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_onProbe(msg controlMsg[packetProbe]) {
|
||||
conf := r.conf()
|
||||
if conf.Direct {
|
||||
return
|
||||
}
|
||||
|
||||
r.stateClient_cleanProbes()
|
||||
|
||||
sent, ok := r.probes[msg.Packet.TraceID]
|
||||
if !ok {
|
||||
return
|
||||
}
|
||||
|
||||
conf.Direct = true
|
||||
conf.DirectAddr = sent.Addr
|
||||
r.updateConf(conf)
|
||||
|
||||
r.traceID = r.NewTraceID()
|
||||
r.stateClient_sendSyn(conf)
|
||||
r.logf("Successful probe to %v.", sent.Addr)
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_onLocalDiscovery(msg controlMsg[packetLocalDiscovery]) {
|
||||
conf := r.conf()
|
||||
if conf.Direct {
|
||||
return
|
||||
}
|
||||
|
||||
// The source port will be the multicast port, so we'll have to
|
||||
// construct the correct address using the peer's listed port.
|
||||
addr := netip.AddrPortFrom(msg.SrcAddr.Addr(), conf.Peer.Port)
|
||||
r.stateClient_sendProbeTo(addr)
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_onPingTimer() stateFunc {
|
||||
conf := r.conf()
|
||||
|
||||
if time.Since(r.lastSeen) > timeoutInterval {
|
||||
if conf.Up {
|
||||
r.logf("Timeout.")
|
||||
}
|
||||
return r.enterClientInit()
|
||||
}
|
||||
|
||||
r.stateClient_sendSyn(conf)
|
||||
return r.stateClient
|
||||
}
|
||||
|
||||
func (r *remoteFSM) stateClient_sendSyn(conf remoteConfig) {
|
||||
syn := packetSyn{
|
||||
TraceID: r.traceID,
|
||||
SharedKey: conf.DataCipher.Key(),
|
||||
Direct: conf.Direct,
|
||||
PossibleAddrs: r.PubAddrs.Get(),
|
||||
}
|
||||
|
||||
r.sendControl(conf, syn.Marshal(r.buf))
|
||||
}
|
@ -1,138 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
)
|
||||
|
||||
// TODO: Remove
|
||||
func newRemotePeer(ip byte) *remotePeer {
|
||||
counter := uint64(time.Now().Unix()<<30 + 1)
|
||||
return &remotePeer{
|
||||
IP: ip,
|
||||
counter: &counter,
|
||||
dupCheck: newDupCheck(0),
|
||||
}
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type remotePeer struct {
|
||||
localIP byte
|
||||
IP byte // VPN IP of peer (last byte).
|
||||
Up bool // True if data can be sent on the peer.
|
||||
Relay bool // True if the peer is a relay.
|
||||
Direct bool // True if this is a direct connection.
|
||||
DirectAddr netip.AddrPort // Remote address if directly connected.
|
||||
PubSignKey []byte
|
||||
ControlCipher *controlCipher
|
||||
DataCipher *dataCipher
|
||||
|
||||
counter *uint64 // For sending to. Atomic access only.
|
||||
dupCheck *dupCheck // For receiving from. Not safe for concurrent use.
|
||||
}
|
||||
|
||||
func (p remotePeer) EncryptDataPacket(destIP byte, data, out []byte) []byte {
|
||||
h := header{
|
||||
StreamID: dataStreamID,
|
||||
Counter: atomic.AddUint64(p.counter, 1),
|
||||
SourceIP: p.localIP,
|
||||
DestIP: destIP,
|
||||
}
|
||||
return p.DataCipher.Encrypt(h, data, out)
|
||||
}
|
||||
|
||||
// Decrypts and de-dups incoming data packets.
|
||||
func (p remotePeer) DecryptDataPacket(h header, enc, out []byte) ([]byte, error) {
|
||||
dec, ok := p.DataCipher.Decrypt(enc, out)
|
||||
if !ok {
|
||||
return nil, errDecryptionFailed
|
||||
}
|
||||
|
||||
if p.dupCheck.IsDup(h.Counter) {
|
||||
return nil, errDuplicateSeqNum
|
||||
}
|
||||
|
||||
return dec, nil
|
||||
}
|
||||
|
||||
// Peer must have a ControlCipher.
|
||||
func (p remotePeer) EncryptControlPacket(pkt marshaller, tmp, out []byte) []byte {
|
||||
tmp = pkt.Marshal(tmp)
|
||||
h := header{
|
||||
StreamID: controlStreamID,
|
||||
Counter: atomic.AddUint64(p.counter, 1),
|
||||
SourceIP: p.localIP,
|
||||
DestIP: p.IP,
|
||||
}
|
||||
|
||||
return p.ControlCipher.Encrypt(h, tmp, out)
|
||||
}
|
||||
|
||||
// Returns a controlMsg[PacketType]. Peer must have a non-nil ControlCipher.
|
||||
//
|
||||
// This function also drops packets with duplicate sequence numbers.
|
||||
func (p remotePeer) DecryptControlPacket(fromAddr netip.AddrPort, h header, enc, tmp []byte) (any, error) {
|
||||
out, ok := p.ControlCipher.Decrypt(enc, tmp)
|
||||
if !ok {
|
||||
return nil, errDecryptionFailed
|
||||
}
|
||||
|
||||
if p.dupCheck.IsDup(h.Counter) {
|
||||
return nil, errDuplicateSeqNum
|
||||
}
|
||||
|
||||
msg, err := parseControlMsg(h.SourceIP, fromAddr, out)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return msg, nil
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type routingTable struct {
|
||||
// The LocalIP is the configured IP address of the local peer on the VPN.
|
||||
//
|
||||
// This value is constant.
|
||||
LocalIP byte
|
||||
|
||||
// The LocalAddr is the configured local public address of the peer on the
|
||||
// internet. If LocalAddr.IsValid(), then the local peer has a public
|
||||
// address.
|
||||
//
|
||||
// This value is constant.
|
||||
LocalAddr netip.AddrPort
|
||||
|
||||
// The remote peer configurations. These are updated by
|
||||
Peers [256]remotePeer
|
||||
|
||||
// The current relay's VPN IP address, or zero if no relay is available.
|
||||
RelayIP byte
|
||||
}
|
||||
|
||||
func newRoutingTable(localIP byte, localAddr netip.AddrPort) routingTable {
|
||||
rt := routingTable{
|
||||
LocalIP: localIP,
|
||||
LocalAddr: localAddr,
|
||||
}
|
||||
|
||||
for i := range rt.Peers {
|
||||
counter := uint64(time.Now().Unix()<<30 + 1)
|
||||
rt.Peers[i] = remotePeer{
|
||||
localIP: localIP,
|
||||
IP: byte(i),
|
||||
counter: &counter,
|
||||
dupCheck: newDupCheck(0),
|
||||
}
|
||||
}
|
||||
|
||||
return rt
|
||||
}
|
||||
|
||||
func (rt *routingTable) GetRelay() (remotePeer, bool) {
|
||||
relay := rt.Peers[rt.RelayIP]
|
||||
return relay, relay.Up && relay.Direct
|
||||
}
|
@ -1,169 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"reflect"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
dec, err := peer1.DecryptDataPacket(h, enc, newBuf())
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if !bytes.Equal(orig, dec) {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket_packetAltered(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
|
||||
for range 2048 {
|
||||
_, err := peer1.DecryptDataPacket(h, ModifyPacket(enc), newBuf())
|
||||
if err == nil {
|
||||
t.Fatal(enc)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptDataPacket_duplicateSequenceNumber(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
orig := RandPacket()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
enc := peer2.EncryptDataPacket(2, orig, newBuf())
|
||||
h := parseHeader(enc)
|
||||
|
||||
if _, err := peer1.DecryptDataPacket(h, enc, newBuf()); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptDataPacket(h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
ctrlMsg, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf())
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
dec, ok := ctrlMsg.(controlMsg[packetProbe])
|
||||
if !ok {
|
||||
t.Fatal(ctrlMsg)
|
||||
}
|
||||
|
||||
if dec.SrcIP != 1 || dec.SrcAddr != p1.RT.Load().LocalAddr {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(dec.Packet, orig) {
|
||||
t.Fatal(dec)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_packetAltered(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
for range 2048 {
|
||||
ctrlMsg, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, ModifyPacket(enc), newBuf())
|
||||
if err == nil {
|
||||
t.Fatal(ctrlMsg)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_duplicateSequenceNumber(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := packetProbe{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRemotePeer_DecryptControlPacket_unknownPacketType(t *testing.T) {
|
||||
p1, p2, _ := NewPeersForTesting()
|
||||
|
||||
peer2 := p1.RT.Load().Peers[2]
|
||||
peer1 := p2.RT.Load().Peers[1]
|
||||
|
||||
orig := UnknownControlPacket{TraceID: newTraceID()}
|
||||
|
||||
enc := peer2.EncryptControlPacket(orig, newBuf(), newBuf())
|
||||
|
||||
h := parseHeader(enc)
|
||||
if h.DestIP != 2 || h.SourceIP != 1 {
|
||||
t.Fatal(h)
|
||||
}
|
||||
|
||||
if _, err := peer1.DecryptControlPacket(p1.RT.Load().LocalAddr, h, enc, newBuf()); err == nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
@ -1,162 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type sentProbe struct {
|
||||
SentAt time.Time
|
||||
Addr netip.AddrPort
|
||||
}
|
||||
|
||||
type stateClient struct {
|
||||
*peerData
|
||||
lastSeen time.Time
|
||||
syn packetSyn
|
||||
probes map[uint64]sentProbe
|
||||
}
|
||||
|
||||
func enterStateClient(data *peerData) peerState {
|
||||
ip, ipValid := netip.AddrFromSlice(data.peer.PublicIP)
|
||||
|
||||
data.staged.Relay = data.peer.Relay && ipValid
|
||||
data.staged.Direct = ipValid
|
||||
data.staged.DirectAddr = netip.AddrPortFrom(ip, data.peer.Port)
|
||||
data.publish(data.staged)
|
||||
|
||||
state := &stateClient{
|
||||
peerData: data,
|
||||
lastSeen: time.Now(),
|
||||
syn: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
SharedKey: data.staged.DataCipher.Key(),
|
||||
Direct: data.staged.Direct,
|
||||
PossibleAddrs: data.pubAddrs.Get(),
|
||||
},
|
||||
probes: map[uint64]sentProbe{},
|
||||
}
|
||||
|
||||
state.Send(state.staged, state.syn)
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state.logf("==> Client")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateClient) logf(str string, args ...any) {
|
||||
s.peerData.logf("CLNT | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateClient) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetAck]:
|
||||
s.onAck(msg)
|
||||
case controlMsg[packetProbe]:
|
||||
return s.onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
s.onLocalDiscovery(msg)
|
||||
case pingTimerMsg:
|
||||
return s.onPingTimer()
|
||||
default:
|
||||
s.logf("Ignoring message: %v", raw)
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onAck(msg controlMsg[packetAck]) {
|
||||
if msg.Packet.TraceID != s.syn.TraceID {
|
||||
return
|
||||
}
|
||||
|
||||
s.lastSeen = time.Now()
|
||||
|
||||
if !s.staged.Up {
|
||||
s.staged.Up = true
|
||||
s.publish(s.staged)
|
||||
s.logf("Got ACK.")
|
||||
}
|
||||
|
||||
if s.staged.Direct {
|
||||
s.pubAddrs.Store(msg.Packet.ToAddr)
|
||||
return
|
||||
}
|
||||
|
||||
// Relayed below.
|
||||
|
||||
s.cleanProbes()
|
||||
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
s.sendProbeTo(addr)
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClient) onPingTimer() peerState {
|
||||
if time.Since(s.lastSeen) > timeoutInterval {
|
||||
if s.staged.Up {
|
||||
s.logf("Timeout.")
|
||||
}
|
||||
return initPeerState(s.peerData, s.peer)
|
||||
}
|
||||
|
||||
s.Send(s.staged, s.syn)
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onProbe(msg controlMsg[packetProbe]) peerState {
|
||||
if s.staged.Direct {
|
||||
return s
|
||||
}
|
||||
|
||||
s.cleanProbes()
|
||||
|
||||
sent, ok := s.probes[msg.Packet.TraceID]
|
||||
if !ok {
|
||||
return s
|
||||
}
|
||||
|
||||
s.staged.Direct = true
|
||||
s.staged.DirectAddr = sent.Addr
|
||||
s.publish(s.staged)
|
||||
|
||||
s.syn.TraceID = newTraceID()
|
||||
s.syn.Direct = true
|
||||
s.Send(s.staged, s.syn)
|
||||
s.logf("Successful probe to %v.", sent.Addr)
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateClient) onLocalDiscovery(msg controlMsg[packetLocalDiscovery]) {
|
||||
if s.staged.Direct {
|
||||
return
|
||||
}
|
||||
|
||||
// The source port will be the multicast port, so we'll have to
|
||||
// construct the correct address using the peer's listed port.
|
||||
addr := netip.AddrPortFrom(msg.SrcAddr.Addr(), s.peer.Port)
|
||||
s.sendProbeTo(addr)
|
||||
}
|
||||
|
||||
func (s *stateClient) cleanProbes() {
|
||||
for key, sent := range s.probes {
|
||||
if time.Since(sent.SentAt) > pingInterval {
|
||||
delete(s.probes, key)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClient) sendProbeTo(addr netip.AddrPort) {
|
||||
probe := packetProbe{TraceID: newTraceID()}
|
||||
s.probes[probe.TraceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addr,
|
||||
}
|
||||
s.logf("Probing %v...", addr)
|
||||
s.SendTo(probe, addr)
|
||||
}
|
@ -1,193 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestStateClient_peerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateClient_initialPackets(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetInit](t, h.Sent[0].Packet)
|
||||
assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_incorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: newTraceID()},
|
||||
}
|
||||
h.OnAck(ack)
|
||||
|
||||
// Nothing should have happened.
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_direct_downToUp(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
syn := assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
|
||||
h.OnAck(ack)
|
||||
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onAck_relayed_sendsProbes(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
syn := assertType[packetSyn](t, h.Sent[1].Packet)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
|
||||
ack := controlMsg[packetAck]{
|
||||
Packet: packetAck{TraceID: syn.TraceID},
|
||||
}
|
||||
ack.Packet.PossibleAddrs[0] = addrPort4(1, 2, 3, 4, 100)
|
||||
ack.Packet.PossibleAddrs[1] = addrPort4(2, 3, 4, 5, 200)
|
||||
|
||||
h.OnAck(ack)
|
||||
|
||||
assertEqual(t, len(h.Sent), 2)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, ack.Packet.PossibleAddrs[0])
|
||||
assertType[packetProbe](t, h.Sent[1].Packet)
|
||||
assertEqual(t, h.Sent[1].Peer.DirectAddr, ack.Packet.PossibleAddrs[1])
|
||||
}
|
||||
|
||||
func TestStateClient_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onPing_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
state := assertType[*stateClient](t, h.State)
|
||||
state.lastSeen = time.Now().Add(-2 * timeoutInterval)
|
||||
state.staged.Up = true
|
||||
h.OnPingTimer()
|
||||
|
||||
newState := assertType[*stateClientInit](t, h.State)
|
||||
assertEqual(t, newState.staged.Up, false)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetInit](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_direct(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
h.OnProbe(probe)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_noMatch(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
h.OnProbe(probe)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onProbe_directUpgrade(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
state := assertType[*stateClient](t, h.State)
|
||||
traceID := newTraceID()
|
||||
state.probes[traceID] = sentProbe{
|
||||
SentAt: time.Now(),
|
||||
Addr: addrPort4(1, 2, 3, 4, 500),
|
||||
}
|
||||
|
||||
probe := controlMsg[packetProbe]{
|
||||
Packet: packetProbe{TraceID: traceID},
|
||||
}
|
||||
|
||||
assertEqual(t, h.Published.Direct, false)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnProbe(probe)
|
||||
assertEqual(t, h.Published.Direct, true)
|
||||
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetSyn](t, h.Sent[0].Packet)
|
||||
}
|
||||
|
||||
func TestStateClient_onLocalDiscovery_direct(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientDirect(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
pkt := controlMsg[packetLocalDiscovery]{
|
||||
Packet: packetLocalDiscovery{},
|
||||
}
|
||||
|
||||
h.OnLocalDiscovery(pkt)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateClient_onLocalDiscovery_relayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientRelayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
pkt := controlMsg[packetLocalDiscovery]{
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 500),
|
||||
Packet: packetLocalDiscovery{},
|
||||
}
|
||||
|
||||
h.OnLocalDiscovery(pkt)
|
||||
assertType[*stateClient](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, addrPort4(1, 2, 3, 4, 456))
|
||||
}
|
@ -1,104 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type stateClientInit struct {
|
||||
*peerData
|
||||
startedAt time.Time
|
||||
traceID uint64
|
||||
}
|
||||
|
||||
func enterStateClientInit(data *peerData) peerState {
|
||||
ip, ipValid := netip.AddrFromSlice(data.peer.PublicIP)
|
||||
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = ipValid
|
||||
data.staged.DirectAddr = netip.AddrPortFrom(ip, data.peer.Port)
|
||||
data.staged.PubSignKey = data.peer.PubSignKey
|
||||
data.staged.ControlCipher = newControlCipher(data.privKey, data.peer.PubKey)
|
||||
data.staged.DataCipher = newDataCipher()
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
state := &stateClientInit{
|
||||
peerData: data,
|
||||
startedAt: time.Now(),
|
||||
traceID: newTraceID(),
|
||||
}
|
||||
state.sendInit()
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state.logf("==> ClientInit")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateClientInit) logf(str string, args ...any) {
|
||||
s.peerData.logf("INIT | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
return s.onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
s.logf("Unexpected SYN")
|
||||
return s
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
return s
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
return s.onPing()
|
||||
default:
|
||||
s.logf("Ignoring message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateClientInit) onInit(msg controlMsg[packetInit]) peerState {
|
||||
if msg.Packet.TraceID != s.traceID {
|
||||
s.logf("Invalid trace ID on INIT.")
|
||||
return s
|
||||
}
|
||||
s.logf("Got INIT version %d.", msg.Packet.Version)
|
||||
return enterStateClient(s.peerData)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) onPing() peerState {
|
||||
if time.Since(s.startedAt) < timeoutInterval {
|
||||
s.sendInit()
|
||||
return s
|
||||
}
|
||||
|
||||
if s.staged.Direct {
|
||||
s.staged.Direct = false
|
||||
s.publish(s.staged)
|
||||
s.startedAt = time.Now()
|
||||
s.sendInit()
|
||||
s.logf("Direct connection failed. Attempting indirect connection.")
|
||||
return s
|
||||
}
|
||||
|
||||
s.logf("Timeout.")
|
||||
return initPeerState(s.peerData, s.peer)
|
||||
}
|
||||
|
||||
func (s *stateClientInit) sendInit() {
|
||||
s.traceID = newTraceID()
|
||||
init := packetInit{
|
||||
TraceID: s.traceID,
|
||||
Direct: s.staged.Direct,
|
||||
Version: version,
|
||||
}
|
||||
s.Send(s.staged, init)
|
||||
}
|
@ -1,92 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestPeerState_ClientInit_initWithIncorrectTraceID(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
|
||||
init.TraceID = newTraceID()
|
||||
h.OnInit(controlMsg[packetInit]{Packet: init})
|
||||
|
||||
assertType[*stateClientInit](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_init(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{Packet: init})
|
||||
|
||||
assertType[*stateClient](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
// Should have sent the first init packet.
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
for range 3 {
|
||||
h.OnPingTimer()
|
||||
}
|
||||
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
|
||||
for i := range h.Sent {
|
||||
assertType[packetInit](t, h.Sent[i].Packet)
|
||||
}
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPingTimeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
state := assertType[*stateClientInit](t, h.State)
|
||||
state.startedAt = time.Now().Add(-2 * timeoutInterval)
|
||||
assertEqual(t, state.staged.Direct, true)
|
||||
|
||||
h.OnPingTimer()
|
||||
|
||||
// Should now try indirect connection.
|
||||
state = assertType[*stateClientInit](t, h.State)
|
||||
assertEqual(t, state.staged.Direct, false)
|
||||
|
||||
// Should re-initialize the peer after another timeout, so should be direct
|
||||
// again.
|
||||
state.startedAt = time.Now().Add(-2 * timeoutInterval)
|
||||
h.OnPingTimer()
|
||||
|
||||
assertEqual(t, state.staged.Direct, true)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_onPeerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
|
||||
h.PeerUpdate(nil)
|
||||
|
||||
// Should have moved into the client state due to timeout.
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestPeerState_ClientInit_ignoreMessage(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigClientInit(t)
|
||||
h.OnProbe(controlMsg[packetProbe]{})
|
||||
|
||||
// Shouldn't do anything.
|
||||
assertType[*stateClientInit](t, h.State)
|
||||
}
|
@ -1,50 +0,0 @@
|
||||
package peer
|
||||
|
||||
import "net/netip"
|
||||
|
||||
type stateDisconnected struct {
|
||||
*peerData
|
||||
}
|
||||
|
||||
func enterStateDisconnected(data *peerData) peerState {
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = false
|
||||
data.staged.DirectAddr = netip.AddrPort{}
|
||||
data.staged.PubSignKey = nil
|
||||
data.staged.ControlCipher = nil
|
||||
data.staged.DataCipher = nil
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
data.pingTimer.Stop()
|
||||
|
||||
return &stateDisconnected{data}
|
||||
}
|
||||
|
||||
func (s *stateDisconnected) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
s.logf("Unexpected INIT")
|
||||
return s
|
||||
case controlMsg[packetSyn]:
|
||||
s.logf("Unexpected SYN")
|
||||
return s
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
s.logf("Unexpected probe")
|
||||
return s
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
s.logf("Unexpected ping")
|
||||
return s
|
||||
default:
|
||||
s.logf("Ignoring message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
@ -1,136 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"time"
|
||||
)
|
||||
|
||||
type stateServer struct {
|
||||
*peerData
|
||||
lastSeen time.Time
|
||||
synTraceID uint64 // Last syn trace ID.
|
||||
}
|
||||
|
||||
func enterStateServer(data *peerData) peerState {
|
||||
data.staged.Up = false
|
||||
data.staged.Relay = false
|
||||
data.staged.Direct = false
|
||||
data.staged.DirectAddr = netip.AddrPort{}
|
||||
data.staged.PubSignKey = data.peer.PubSignKey
|
||||
data.staged.ControlCipher = newControlCipher(data.privKey, data.peer.PubKey)
|
||||
data.staged.DataCipher = nil
|
||||
|
||||
data.publish(data.staged)
|
||||
|
||||
data.pingTimer.Reset(pingInterval)
|
||||
|
||||
state := &stateServer{
|
||||
peerData: data,
|
||||
lastSeen: time.Now(),
|
||||
}
|
||||
state.logf("==> Server")
|
||||
return state
|
||||
}
|
||||
|
||||
func (s *stateServer) logf(str string, args ...any) {
|
||||
s.peerData.logf("SRVR | "+str, args...)
|
||||
}
|
||||
|
||||
func (s *stateServer) OnMsg(raw any) peerState {
|
||||
switch msg := raw.(type) {
|
||||
case peerUpdateMsg:
|
||||
return initPeerState(s.peerData, msg.Peer)
|
||||
case controlMsg[packetInit]:
|
||||
return s.onInit(msg)
|
||||
case controlMsg[packetSyn]:
|
||||
return s.onSyn(msg)
|
||||
case controlMsg[packetAck]:
|
||||
s.logf("Unexpected ACK")
|
||||
return s
|
||||
case controlMsg[packetProbe]:
|
||||
return s.onProbe(msg)
|
||||
case controlMsg[packetLocalDiscovery]:
|
||||
return s
|
||||
case pingTimerMsg:
|
||||
return s.onPingTimer()
|
||||
default:
|
||||
s.logf("Unexpected message: %#v", raw)
|
||||
return s
|
||||
}
|
||||
}
|
||||
|
||||
func (s *stateServer) onInit(msg controlMsg[packetInit]) peerState {
|
||||
s.staged.Up = false
|
||||
s.staged.Direct = msg.Packet.Direct
|
||||
s.staged.DirectAddr = msg.SrcAddr
|
||||
s.publish(s.staged)
|
||||
|
||||
init := packetInit{
|
||||
TraceID: msg.Packet.TraceID,
|
||||
Direct: s.staged.Direct,
|
||||
Version: version,
|
||||
}
|
||||
|
||||
s.Send(s.staged, init)
|
||||
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onSyn(msg controlMsg[packetSyn]) peerState {
|
||||
s.lastSeen = time.Now()
|
||||
p := msg.Packet
|
||||
|
||||
// Before we can respond to this packet, we need to make sure the
|
||||
// route is setup properly.
|
||||
//
|
||||
// The client will update the syn's TraceID whenever there's a change.
|
||||
// The server will follow the client's request.
|
||||
if p.TraceID != s.synTraceID || !s.staged.Up {
|
||||
s.synTraceID = p.TraceID
|
||||
s.staged.Up = true
|
||||
s.staged.Direct = p.Direct
|
||||
s.staged.DataCipher = newDataCipherFromKey(p.SharedKey)
|
||||
s.staged.DirectAddr = msg.SrcAddr
|
||||
s.publish(s.staged)
|
||||
s.logf("Got SYN.")
|
||||
}
|
||||
|
||||
// Always respond.
|
||||
s.Send(s.staged, packetAck{
|
||||
TraceID: p.TraceID,
|
||||
ToAddr: s.staged.DirectAddr,
|
||||
PossibleAddrs: s.pubAddrs.Get(),
|
||||
})
|
||||
|
||||
if p.Direct {
|
||||
return s
|
||||
}
|
||||
|
||||
// Send probes if not a direct connection.
|
||||
for _, addr := range msg.Packet.PossibleAddrs {
|
||||
if !addr.IsValid() {
|
||||
break
|
||||
}
|
||||
s.logf("Probing %v...", addr)
|
||||
s.SendTo(packetProbe{TraceID: newTraceID()}, addr)
|
||||
}
|
||||
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onProbe(msg controlMsg[packetProbe]) peerState {
|
||||
if msg.SrcAddr.IsValid() {
|
||||
s.logf("Probe response %v...", msg.SrcAddr)
|
||||
s.SendTo(packetProbe{TraceID: msg.Packet.TraceID}, msg.SrcAddr)
|
||||
}
|
||||
return s
|
||||
}
|
||||
|
||||
func (s *stateServer) onPingTimer() peerState {
|
||||
if time.Since(s.lastSeen) > timeoutInterval && s.staged.Up {
|
||||
s.staged.Up = false
|
||||
s.publish(s.staged)
|
||||
s.logf("Timeout.")
|
||||
}
|
||||
return s
|
||||
}
|
@ -1,164 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func TestStateServer_peerUpdate(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
h.PeerUpdate(nil)
|
||||
assertType[*stateDisconnected](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onInit(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
|
||||
msg := controlMsg[packetInit]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetInit{
|
||||
TraceID: newTraceID(),
|
||||
Direct: true,
|
||||
Version: 4,
|
||||
},
|
||||
}
|
||||
|
||||
h.OnInit(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
assertEqual(t, resp.Version, version)
|
||||
}
|
||||
|
||||
func TestStateServer_onSynDirect(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Public(t)
|
||||
|
||||
msg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
Direct: true,
|
||||
},
|
||||
}
|
||||
|
||||
msg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 1000)
|
||||
msg.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 2000)
|
||||
|
||||
h.OnSyn(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
}
|
||||
|
||||
func TestStateServer_onSynRelayed(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetSyn]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 1000),
|
||||
Packet: packetSyn{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
|
||||
msg.Packet.PossibleAddrs[0] = addrPort4(1, 1, 1, 1, 1000)
|
||||
msg.Packet.PossibleAddrs[1] = addrPort4(1, 1, 1, 2, 2000)
|
||||
|
||||
h.OnSyn(msg)
|
||||
assertEqual(t, len(h.Sent), 3)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
resp := assertType[packetAck](t, h.Sent[0].Packet)
|
||||
assertEqual(t, msg.Packet.TraceID, resp.TraceID)
|
||||
|
||||
for i, pkt := range h.Sent[1:] {
|
||||
assertEqual(t, pkt.Peer.DirectAddr, msg.Packet.PossibleAddrs[i])
|
||||
assertType[packetProbe](t, pkt.Packet)
|
||||
}
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
h.OnProbe(msg)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
}
|
||||
|
||||
func TestStateServer_onProbe_valid(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetProbe]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 100),
|
||||
Packet: packetProbe{
|
||||
TraceID: newTraceID(),
|
||||
},
|
||||
}
|
||||
h.Sent = h.Sent[:0]
|
||||
|
||||
h.OnProbe(msg)
|
||||
assertEqual(t, len(h.Sent), 1)
|
||||
assertType[packetProbe](t, h.Sent[0].Packet)
|
||||
assertEqual(t, h.Sent[0].Peer.DirectAddr, msg.SrcAddr)
|
||||
}
|
||||
|
||||
func TestStateServer_onPing(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
h.Sent = h.Sent[:0]
|
||||
h.OnPingTimer()
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onPing_timeout(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
h.Sent = h.Sent[:0]
|
||||
state := assertType[*stateServer](t, h.State)
|
||||
state.staged.Up = true
|
||||
state.lastSeen = time.Now().Add(-2 * timeoutInterval)
|
||||
|
||||
h.OnPingTimer()
|
||||
state = assertType[*stateServer](t, h.State)
|
||||
assertEqual(t, len(h.Sent), 0)
|
||||
assertEqual(t, state.staged.Up, false)
|
||||
}
|
||||
|
||||
func TestStateServer_onLocalDiscovery(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
|
||||
msg := controlMsg[packetLocalDiscovery]{
|
||||
SrcIP: 3,
|
||||
SrcAddr: addrPort4(1, 2, 3, 4, 100),
|
||||
}
|
||||
h.OnLocalDiscovery(msg)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func TestStateServer_onAck(t *testing.T) {
|
||||
h := NewPeerStateTestHarness()
|
||||
h.ConfigServer_Relayed(t)
|
||||
msg := controlMsg[packetAck]{}
|
||||
h.OnAck(msg)
|
||||
assertType[*stateServer](t, h.State)
|
||||
}
|
@ -1,151 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"testing"
|
||||
"time"
|
||||
"vppn/m"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
type PeerStateControlMsg struct {
|
||||
Peer remotePeer
|
||||
Packet any
|
||||
}
|
||||
|
||||
type PeerStateTestHarness struct {
|
||||
data *peerData
|
||||
State peerState
|
||||
Published remotePeer
|
||||
Sent []PeerStateControlMsg
|
||||
}
|
||||
|
||||
func NewPeerStateTestHarness() *PeerStateTestHarness {
|
||||
h := &PeerStateTestHarness{}
|
||||
|
||||
keys := generateKeys()
|
||||
|
||||
state := &peerData{
|
||||
publish: func(rp remotePeer) {
|
||||
h.Published = rp
|
||||
},
|
||||
sendControlPacket: func(rp remotePeer, pkt marshaller) {
|
||||
h.Sent = append(h.Sent, PeerStateControlMsg{rp, pkt})
|
||||
},
|
||||
pingTimer: time.NewTicker(pingInterval),
|
||||
localIP: 2,
|
||||
remoteIP: 3,
|
||||
privKey: keys.PrivKey,
|
||||
pubAddrs: newPubAddrStore(netip.AddrPort{}),
|
||||
limiter: ratelimiter.New(ratelimiter.Config{
|
||||
FillPeriod: 20 * time.Millisecond,
|
||||
MaxWaitCount: 1,
|
||||
}),
|
||||
}
|
||||
h.data = state
|
||||
|
||||
h.State = enterStateDisconnected(state)
|
||||
return h
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) PeerUpdate(p *m.Peer) {
|
||||
h.State = h.State.OnMsg(peerUpdateMsg{p})
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnInit(msg controlMsg[packetInit]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnSyn(msg controlMsg[packetSyn]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnAck(msg controlMsg[packetAck]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnProbe(msg controlMsg[packetProbe]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnLocalDiscovery(msg controlMsg[packetLocalDiscovery]) {
|
||||
h.State = h.State.OnMsg(msg)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) OnPingTimer() {
|
||||
h.State = h.State.OnMsg(pingTimerMsg{})
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigServer_Public(t *testing.T) *stateServer {
|
||||
keys := generateKeys()
|
||||
|
||||
state := h.State.(*stateDisconnected)
|
||||
state.localAddr = addrPort4(1, 1, 1, 2, 200)
|
||||
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
PublicIP: []byte{1, 1, 1, 3},
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigServer_Relayed(t *testing.T) *stateServer {
|
||||
keys := generateKeys()
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateServer](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientInit(t *testing.T) *stateClientInit {
|
||||
// Remote IP should be less than local IP.
|
||||
h.data.localIP = 4
|
||||
keys := generateKeys()
|
||||
peer := &m.Peer{
|
||||
PeerIP: 3,
|
||||
PublicIP: []byte{1, 2, 3, 4},
|
||||
Port: 456,
|
||||
PubKey: keys.PubKey,
|
||||
PubSignKey: keys.PubSignKey,
|
||||
}
|
||||
|
||||
h.PeerUpdate(peer)
|
||||
assertEqual(t, h.Published.Up, false)
|
||||
return assertType[*stateClientInit](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientDirect(t *testing.T) *stateClient {
|
||||
h.ConfigClientInit(t)
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{
|
||||
Packet: init,
|
||||
})
|
||||
|
||||
return assertType[*stateClient](t, h.State)
|
||||
}
|
||||
|
||||
func (h *PeerStateTestHarness) ConfigClientRelayed(t *testing.T) *stateClient {
|
||||
h.ConfigClientInit(t)
|
||||
state := assertType[*stateClientInit](t, h.State)
|
||||
state.peer.PublicIP = nil // Force relay.
|
||||
|
||||
init := assertType[packetInit](t, h.Sent[0].Packet)
|
||||
h.OnInit(controlMsg[packetInit]{
|
||||
Packet: init,
|
||||
})
|
||||
|
||||
return assertType[*stateClient](t, h.State)
|
||||
}
|
@ -1,109 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
"net/netip"
|
||||
"strings"
|
||||
"time"
|
||||
"vppn/m"
|
||||
|
||||
"git.crumpington.com/lib/go/ratelimiter"
|
||||
)
|
||||
|
||||
type peerState interface {
|
||||
OnMsg(raw any) peerState
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
type peerData struct {
|
||||
// Output.
|
||||
publish func(remotePeer)
|
||||
sendControlPacket func(remotePeer, marshaller)
|
||||
pingTimer *time.Ticker
|
||||
|
||||
// Immutable data.
|
||||
localIP byte
|
||||
remoteIP byte
|
||||
privKey []byte
|
||||
localAddr netip.AddrPort // If valid, then local peer is publicly accessible.
|
||||
|
||||
pubAddrs *pubAddrStore
|
||||
|
||||
// The purpose of this state machine is to manage the RemotePeer object,
|
||||
// publishing it as necessary.
|
||||
staged remotePeer // Local copy of shared data. See publish().
|
||||
|
||||
// Mutable peer data.
|
||||
peer *m.Peer
|
||||
|
||||
// We rate limit per remote endpoint because if we don't we tend to lose
|
||||
// packets.
|
||||
limiter *ratelimiter.Limiter
|
||||
}
|
||||
|
||||
func (s *peerData) logf(format string, args ...any) {
|
||||
b := strings.Builder{}
|
||||
name := ""
|
||||
if s.peer != nil {
|
||||
name = s.peer.Name
|
||||
}
|
||||
b.WriteString(fmt.Sprintf("%03d", s.remoteIP))
|
||||
|
||||
b.WriteString(fmt.Sprintf("%30s: ", name))
|
||||
|
||||
if s.staged.Direct {
|
||||
b.WriteString("DIRECT | ")
|
||||
} else {
|
||||
b.WriteString("RELAYED | ")
|
||||
}
|
||||
|
||||
if s.staged.Up {
|
||||
b.WriteString("UP | ")
|
||||
} else {
|
||||
b.WriteString("DOWN | ")
|
||||
}
|
||||
|
||||
log.Printf(b.String()+format, args...)
|
||||
}
|
||||
|
||||
// ----------------------------------------------------------------------------
|
||||
|
||||
func (s *peerData) SendTo(pkt marshaller, addr netip.AddrPort) {
|
||||
if !addr.IsValid() {
|
||||
return
|
||||
}
|
||||
route := s.staged
|
||||
route.Direct = true
|
||||
route.DirectAddr = addr
|
||||
s.Send(route, pkt)
|
||||
}
|
||||
|
||||
func (s *peerData) Send(peer remotePeer, pkt marshaller) {
|
||||
if err := s.limiter.Limit(); err != nil {
|
||||
s.logf("Rate limited.")
|
||||
return
|
||||
}
|
||||
s.sendControlPacket(peer, pkt)
|
||||
}
|
||||
|
||||
func initPeerState(data *peerData, peer *m.Peer) peerState {
|
||||
data.peer = peer
|
||||
|
||||
if peer == nil {
|
||||
return enterStateDisconnected(data)
|
||||
}
|
||||
|
||||
if _, isValid := netip.AddrFromSlice(peer.PublicIP); isValid {
|
||||
if data.localAddr.IsValid() && data.localIP < data.remoteIP {
|
||||
return enterStateServer(data)
|
||||
}
|
||||
return enterStateClientInit(data)
|
||||
}
|
||||
|
||||
if data.localAddr.IsValid() || data.localIP < data.remoteIP {
|
||||
return enterStateServer(data)
|
||||
}
|
||||
return enterStateClientInit(data)
|
||||
}
|
@ -1,26 +0,0 @@
|
||||
package peer
|
||||
|
||||
import (
|
||||
"net/netip"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func addrPort4(a, b, c, d byte, port uint16) netip.AddrPort {
|
||||
return netip.AddrPortFrom(netip.AddrFrom4([4]byte{a, b, c, d}), port)
|
||||
}
|
||||
|
||||
func assertType[T any](t *testing.T, obj any) T {
|
||||
t.Helper()
|
||||
x, ok := obj.(T)
|
||||
if !ok {
|
||||
t.Fatalf("invalid type: %#v", obj)
|
||||
}
|
||||
return x
|
||||
}
|
||||
|
||||
func assertEqual[T comparable](t *testing.T, a, b T) {
|
||||
t.Helper()
|
||||
if a != b {
|
||||
t.Fatal(a, " != ", b)
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user