1
1
Fork 0
mirror of https://github.com/oxen-io/lokinet synced 2023-12-14 06:53:00 +01:00
lokinet/llarp/link/server.hpp

237 lines
5.5 KiB
C++
Raw Normal View History

#ifndef LLARP_LINK_SERVER_HPP
#define LLARP_LINK_SERVER_HPP
#include <crypto/types.hpp>
2019-01-11 02:19:36 +01:00
#include <ev/ev.h>
2018-12-12 02:32:10 +01:00
#include <link/session.hpp>
#include <net/net.hpp>
2018-12-12 02:55:30 +01:00
#include <router_contact.hpp>
2019-01-11 02:19:36 +01:00
#include <util/logic.hpp>
#include <util/threading.hpp>
2018-12-12 02:32:10 +01:00
2018-09-07 22:36:06 +02:00
#include <list>
2018-12-12 02:32:10 +01:00
#include <unordered_map>
2018-09-03 14:08:02 +02:00
namespace llarp
{
/// handle a link layer message
using LinkMessageHandler =
std::function< bool(ILinkSession*, llarp_buffer_t) >;
/// sign a buffer with identity key
using SignBufferFunc = std::function< bool(Signature&, llarp_buffer_t) >;
/// handle connection timeout
using TimeoutHandler = std::function< void(ILinkSession*) >;
/// get our RC
using GetRCFunc = std::function< const llarp::RouterContact&(void) >;
/// handler of session established
2018-12-17 23:43:16 +01:00
using SessionEstablishedHandler = std::function< void(llarp::RouterContact) >;
/// f(new, old)
/// handler of session renegotiation
/// returns true if the new rc is valid
/// returns false otherwise and the session is terminated
using SessionRenegotiateHandler =
std::function< bool(llarp::RouterContact, llarp::RouterContact) >;
/// handles close of all sessions with pubkey
using SessionClosedHandler = std::function< void(llarp::RouterID) >;
struct ILinkLayer
{
ILinkLayer(const SecretKey& routerEncSecret, GetRCFunc getrc,
LinkMessageHandler handler, SignBufferFunc signFunc,
SessionEstablishedHandler sessionEstablish,
SessionRenegotiateHandler renegotiate, TimeoutHandler timeout,
SessionClosedHandler closed);
virtual ~ILinkLayer();
2018-10-29 17:48:36 +01:00
/// get current time via event loop
llarp_time_t
Now() const
2018-10-29 17:48:36 +01:00
{
return llarp_ev_loop_time_now_ms(m_Loop);
}
bool
HasSessionTo(const RouterID& pk);
bool
HasSessionVia(const Addr& addr);
void
ForEachSession(std::function< void(const ILinkSession*) > visit) const;
void
ForEachSession(std::function< void(ILinkSession*) > visit);
static void
udp_tick(llarp_udp_io* udp)
{
static_cast< ILinkLayer* >(udp->user)->Pump();
}
static void
2018-11-23 15:37:26 +01:00
udp_recv_from(llarp_udp_io* udp, const sockaddr* from, llarp_buffer_t buf)
{
2018-11-03 14:19:18 +01:00
if(!udp)
{
llarp::LogWarn("no udp set");
return;
}
// maybe check from too?
2018-11-23 15:37:26 +01:00
// no it's never null
static_cast< ILinkLayer* >(udp->user)->RecvFrom(*from, buf.base, buf.sz);
}
2019-01-03 22:10:40 +01:00
void
SendTo_LL(const llarp::Addr& to, llarp_buffer_t pkt)
{
llarp_ev_udp_sendto(&m_udp, to, pkt);
}
bool
Configure(llarp_ev_loop* loop, const std::string& ifname, int af,
uint16_t port);
2018-09-06 15:16:24 +02:00
virtual ILinkSession*
NewOutboundSession(const RouterContact& rc, const AddressInfo& ai) = 0;
virtual void
Pump();
virtual void
RecvFrom(const Addr& from, const void* buf, size_t sz) = 0;
bool
PickAddress(const RouterContact& rc, AddressInfo& picked) const;
bool
2018-12-19 18:48:29 +01:00
TryEstablishTo(RouterContact rc);
2019-01-03 22:10:40 +01:00
virtual bool
2018-12-10 15:14:55 +01:00
Start(llarp::Logic* l);
void
Stop();
virtual const char*
Name() const = 0;
void
CloseSessionTo(const RouterID& remote);
void
KeepAliveSessionTo(const RouterID& remote);
bool
SendTo(const RouterID& remote, llarp_buffer_t buf);
bool
GetOurAddressInfo(AddressInfo& addr) const;
bool
VisitSessionByPubkey(const RouterID& pk,
std::function< bool(ILinkSession*) > visit);
virtual uint16_t
Rank() const = 0;
virtual bool
KeyGen(SecretKey&) = 0;
const byte_t*
TransportPubKey() const;
const SecretKey&
RouterEncryptionSecret() const
{
return m_RouterEncSecret;
}
const SecretKey&
TransportSecretKey() const;
2019-01-05 14:45:05 +01:00
bool
IsCompatable(const llarp::RouterContact& other) const
{
const std::string us = Name();
for(const auto& ai : other.addrs)
if(ai.dialect == us)
return true;
return false;
}
bool
EnsureKeys(const char* fpath);
bool
GenEphemeralKeys();
2019-01-07 13:47:57 +01:00
bool
MapAddr(const RouterID& pk, ILinkSession* s);
2018-09-04 21:15:06 +02:00
virtual void Tick(llarp_time_t)
2018-09-06 22:31:58 +02:00
{
}
LinkMessageHandler HandleMessage;
TimeoutHandler HandleTimeout;
SignBufferFunc Sign;
GetRCFunc GetOurRC;
SessionEstablishedHandler SessionEstablished;
SessionClosedHandler SessionClosed;
SessionRenegotiateHandler SessionRenegotiate;
2019-01-07 17:35:25 +01:00
/// called by link session to remove a pending session who is timed out
void
2019-01-11 02:19:36 +01:00
RemovePending(ILinkSession* s);
2019-01-07 17:35:25 +01:00
private:
static void
on_timer_tick(void* user, uint64_t orig, uint64_t left)
{
// timer cancelled
if(left)
return;
2018-10-29 17:48:36 +01:00
static_cast< ILinkLayer* >(user)->OnTick(orig);
}
void
2018-10-29 17:48:36 +01:00
OnTick(uint64_t interval);
void
ScheduleTick(uint64_t interval);
uint32_t tick_id;
const SecretKey& m_RouterEncSecret;
protected:
using Lock = util::NullLock;
using Mutex = util::NullMutex;
2018-09-10 15:43:36 +02:00
2019-01-07 13:47:57 +01:00
bool
2018-09-10 15:43:36 +02:00
PutSession(ILinkSession* s);
2018-12-10 15:14:55 +01:00
llarp::Logic* m_Logic = nullptr;
2018-10-29 17:48:36 +01:00
llarp_ev_loop* m_Loop = nullptr;
Addr m_ourAddr;
llarp_udp_io m_udp;
SecretKey m_SecretKey;
2018-09-07 22:36:06 +02:00
2018-09-10 15:43:36 +02:00
Mutex m_AuthedLinksMutex;
std::unordered_multimap< RouterID, std::unique_ptr< ILinkSession >,
RouterID::Hash >
2018-09-07 22:36:06 +02:00
m_AuthedLinks;
2018-09-10 15:43:36 +02:00
Mutex m_PendingMutex;
2019-01-04 13:43:53 +01:00
std::unordered_map< llarp::Addr, std::unique_ptr< ILinkSession >,
llarp::Addr::Hash >
m_Pending;
};
} // namespace llarp
#endif