i2pd/libi2pd/NetDbRequests.cpp

338 lines
10 KiB
C++
Raw Normal View History

/*
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2015-04-09 16:45:00 +00:00
#include "Log.h"
#include "I2NPProtocol.h"
#include "Transports.h"
#include "NetDb.hpp"
2015-04-09 16:45:00 +00:00
#include "NetDbRequests.h"
#include "ECIESX25519AEADRatchetSession.h"
#include "RouterContext.h"
2015-04-09 16:45:00 +00:00
namespace i2p
{
namespace data
{
RequestedDestination::RequestedDestination (const IdentHash& destination, bool isExploratory, bool direct):
m_Destination (destination), m_IsExploratory (isExploratory), m_IsDirect (direct), m_IsActive (true),
m_CreationTime (i2p::util::GetSecondsSinceEpoch ()), m_LastRequestTime (0), m_NumAttempts (0)
{
if (i2p::context.IsFloodfill ())
m_ExcludedPeers.insert (i2p::context.GetIdentHash ()); // exclude self if floodfill
}
RequestedDestination::~RequestedDestination ()
{
if (m_RequestComplete) m_RequestComplete (nullptr);
}
2015-06-22 19:47:45 +00:00
std::shared_ptr<I2NPMessage> RequestedDestination::CreateRequestMessage (std::shared_ptr<const RouterInfo> router,
2015-04-09 16:45:00 +00:00
std::shared_ptr<const i2p::tunnel::InboundTunnel> replyTunnel)
{
2024-04-26 22:11:05 +00:00
std::lock_guard<std::mutex> l (m_ExcludedPeersMutex);
2016-11-14 17:05:44 +00:00
std::shared_ptr<I2NPMessage> msg;
if(replyTunnel)
2018-01-06 03:48:51 +00:00
msg = i2p::CreateRouterInfoDatabaseLookupMsg (m_Destination,
replyTunnel->GetNextIdentHash (), replyTunnel->GetNextTunnelID (), m_IsExploratory,
&m_ExcludedPeers);
2016-11-14 17:05:44 +00:00
else
msg = i2p::CreateRouterInfoDatabaseLookupMsg(m_Destination, i2p::context.GetIdentHash(), 0, m_IsExploratory, &m_ExcludedPeers);
if(router)
m_ExcludedPeers.insert (router->GetIdentHash ());
m_LastRequestTime = i2p::util::GetSecondsSinceEpoch ();
m_NumAttempts++;
2015-11-03 14:15:49 +00:00
return msg;
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
std::shared_ptr<I2NPMessage> RequestedDestination::CreateRequestMessage (const IdentHash& floodfill)
2015-04-09 16:45:00 +00:00
{
2024-04-26 22:11:05 +00:00
std::lock_guard<std::mutex> l (m_ExcludedPeersMutex);
2018-01-06 03:48:51 +00:00
auto msg = i2p::CreateRouterInfoDatabaseLookupMsg (m_Destination,
2015-04-09 16:45:00 +00:00
i2p::context.GetRouterInfo ().GetIdentHash () , 0, false, &m_ExcludedPeers);
m_ExcludedPeers.insert (floodfill);
m_NumAttempts++;
m_LastRequestTime = i2p::util::GetSecondsSinceEpoch ();
2015-11-03 14:15:49 +00:00
return msg;
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
2024-04-26 19:35:32 +00:00
bool RequestedDestination::IsExcluded (const IdentHash& ident) const
{
2024-04-26 22:11:05 +00:00
std::lock_guard<std::mutex> l (m_ExcludedPeersMutex);
2024-04-26 19:35:32 +00:00
return m_ExcludedPeers.count (ident);
}
2015-04-09 16:45:00 +00:00
void RequestedDestination::ClearExcludedPeers ()
{
2024-04-26 22:11:05 +00:00
std::lock_guard<std::mutex> l (m_ExcludedPeersMutex);
2015-04-09 16:45:00 +00:00
m_ExcludedPeers.clear ();
2018-01-06 03:48:51 +00:00
}
std::unordered_set<IdentHash> RequestedDestination::GetExcludedPeers () const
2024-04-27 12:38:43 +00:00
{
std::lock_guard<std::mutex> l (m_ExcludedPeersMutex);
return m_ExcludedPeers;
}
2015-04-09 16:45:00 +00:00
void RequestedDestination::Success (std::shared_ptr<RouterInfo> r)
{
if (m_IsActive)
{
m_IsActive = false;
if (m_RequestComplete)
{
m_RequestComplete (r);
m_RequestComplete = nullptr;
}
}
2015-04-09 16:45:00 +00:00
}
void RequestedDestination::Fail ()
{
if (m_IsActive)
{
m_IsActive = false;
if (m_RequestComplete)
{
m_RequestComplete (nullptr);
m_RequestComplete = nullptr;
}
}
2015-04-09 16:45:00 +00:00
}
NetDbRequests::NetDbRequests ():
RunnableServiceWithWork ("NetDbReq"),
m_ManageRequestsTimer (GetIOService ())
{
}
NetDbRequests::~NetDbRequests ()
{
Stop ();
}
2015-04-09 16:45:00 +00:00
void NetDbRequests::Start ()
{
m_LastPoolCleanUpTime = i2p::util::GetSecondsSinceEpoch ();
if (!IsRunning ())
{
StartIOService ();
ScheduleManageRequests ();
}
2015-04-09 16:45:00 +00:00
}
void NetDbRequests::Stop ()
{
if (IsRunning ())
{
m_ManageRequestsTimer.cancel ();
StopIOService ();
m_RequestedDestinations.clear ();
m_RequestedDestinationsPool.CleanUpMt ();
}
2015-04-09 16:45:00 +00:00
}
std::shared_ptr<RequestedDestination> NetDbRequests::CreateRequest (const IdentHash& destination,
bool isExploratory, bool direct, RequestedDestination::RequestComplete requestComplete)
2015-04-09 16:45:00 +00:00
{
// request RouterInfo directly
auto dest = m_RequestedDestinationsPool.AcquireSharedMt (destination, isExploratory, direct);
2015-04-09 16:45:00 +00:00
dest->SetRequestComplete (requestComplete);
{
std::unique_lock<std::mutex> l(m_RequestedDestinationsMutex);
auto ret = m_RequestedDestinations.emplace (destination, dest);
if (!ret.second) // not inserted
{
dest->SetRequestComplete (nullptr); // don't call requestComplete in destructor
dest = ret.first->second; // existing one
if (requestComplete && dest->IsActive ())
{
auto prev = dest->GetRequestComplete ();
if (prev) // if already set
dest->SetRequestComplete (
[requestComplete, prev](std::shared_ptr<RouterInfo> r)
{
prev (r); // call previous
requestComplete (r); // then new
});
else
dest->SetRequestComplete (requestComplete);
}
2018-01-06 03:48:51 +00:00
return nullptr;
}
2015-04-09 16:45:00 +00:00
}
return dest;
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
void NetDbRequests::RequestComplete (const IdentHash& ident, std::shared_ptr<RouterInfo> r)
{
2016-08-16 02:36:58 +00:00
std::shared_ptr<RequestedDestination> request;
{
std::unique_lock<std::mutex> l(m_RequestedDestinationsMutex);
auto it = m_RequestedDestinations.find (ident);
if (it != m_RequestedDestinations.end ())
2018-01-06 03:48:51 +00:00
{
2016-08-16 02:36:58 +00:00
request = it->second;
if (request->IsExploratory ())
m_RequestedDestinations.erase (it);
// otherwise cache for a while
2018-01-06 03:48:51 +00:00
}
}
2016-08-16 02:36:58 +00:00
if (request)
{
2015-04-09 16:45:00 +00:00
if (r)
2016-08-16 02:36:58 +00:00
request->Success (r);
2015-04-09 16:45:00 +00:00
else
2016-08-16 02:36:58 +00:00
request->Fail ();
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
}
std::shared_ptr<RequestedDestination> NetDbRequests::FindRequest (const IdentHash& ident) const
{
2016-08-16 02:36:58 +00:00
std::unique_lock<std::mutex> l(m_RequestedDestinationsMutex);
2015-04-09 16:45:00 +00:00
auto it = m_RequestedDestinations.find (ident);
if (it != m_RequestedDestinations.end ())
return it->second;
return nullptr;
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
void NetDbRequests::ManageRequests ()
{
2018-01-06 03:48:51 +00:00
uint64_t ts = i2p::util::GetSecondsSinceEpoch ();
if (ts > m_LastPoolCleanUpTime + REQUESTED_DESTINATIONS_POOL_CLEANUP_INTERVAL)
{
m_RequestedDestinationsPool.CleanUpMt ();
m_LastPoolCleanUpTime = ts;
}
2018-01-06 03:48:51 +00:00
std::unique_lock<std::mutex> l(m_RequestedDestinationsMutex);
2015-04-09 16:45:00 +00:00
for (auto it = m_RequestedDestinations.begin (); it != m_RequestedDestinations.end ();)
{
auto& dest = it->second;
if (dest->IsActive () || ts < dest->GetCreationTime () + REQUEST_CACHE_TIME)
{
if (!dest->IsExploratory ())
{
// regular request
bool done = false;
if (ts < dest->GetCreationTime () + MAX_REQUEST_TIME)
{
if (ts > dest->GetLastRequestTime () + MIN_REQUEST_TIME) // try next floodfill if no response after min interval
done = !SendNextRequest (dest);
}
else // request is expired
done = true;
if (done)
dest->Fail ();
it++;
}
else
{
// exploratory
if (ts >= dest->GetCreationTime () + MAX_EXPLORATORY_REQUEST_TIME)
{
dest->Fail ();
it = m_RequestedDestinations.erase (it); // delete expired exploratory request right a way
}
else
it++;
}
}
2015-04-09 16:45:00 +00:00
else
it = m_RequestedDestinations.erase (it);
2018-01-06 03:48:51 +00:00
}
2015-04-09 16:45:00 +00:00
}
bool NetDbRequests::SendNextRequest (std::shared_ptr<RequestedDestination> dest)
{
if (!dest || !dest->IsActive ()) return false;
bool ret = true;
auto count = dest->GetNumAttempts ();
if (!dest->IsExploratory () && count < MAX_NUM_REQUEST_ATTEMPTS)
{
auto nextFloodfill = netdb.GetClosestFloodfill (dest->GetDestination (), dest->GetExcludedPeers ());
if (nextFloodfill)
{
bool direct = dest->IsDirect ();
if (direct && !nextFloodfill->IsReachableFrom (i2p::context.GetRouterInfo ()) &&
!i2p::transport::transports.IsConnected (nextFloodfill->GetIdentHash ()))
direct = false; // floodfill can't be reached directly
if (direct)
2024-01-30 00:54:43 +00:00
{
2024-05-02 17:17:15 +00:00
if (CheckLogLevel (eLogDebug))
LogPrint (eLogDebug, "NetDbReq: Try ", dest->GetDestination ().ToBase64 (), " at ", count, " floodfill ", nextFloodfill->GetIdentHash ().ToBase64 (), " directly");
2024-01-30 00:54:43 +00:00
auto msg = dest->CreateRequestMessage (nextFloodfill->GetIdentHash ());
2024-05-06 22:23:20 +00:00
auto s = shared_from_this ();
msg->onDrop = [s, dest]() { if (dest->IsActive ()) s->SendNextRequest (dest); };
2024-01-30 00:54:43 +00:00
i2p::transport::transports.SendMessage (nextFloodfill->GetIdentHash (), msg);
}
else
{
auto pool = i2p::tunnel::tunnels.GetExploratoryPool ();
if (pool)
{
auto outbound = pool->GetNextOutboundTunnel ();
auto inbound = pool->GetNextInboundTunnel ();
if (nextFloodfill && outbound && inbound)
{
2024-05-02 17:17:15 +00:00
if (CheckLogLevel (eLogDebug))
LogPrint (eLogDebug, "NetDbReq: Try ", dest->GetDestination ().ToBase64 (), " at ", count, " floodfill ", nextFloodfill->GetIdentHash ().ToBase64 (), " through tunnels");
auto msg = dest->CreateRequestMessage (nextFloodfill, inbound);
2024-05-06 22:23:20 +00:00
auto s = shared_from_this ();
msg->onDrop = [s, dest]() { if (dest->IsActive ()) s->SendNextRequest (dest); };
outbound->SendTunnelDataMsgTo (nextFloodfill->GetIdentHash (), 0,
i2p::garlic::WrapECIESX25519MessageForRouter (msg, nextFloodfill->GetIdentity ()->GetEncryptionPublicKey ()));
}
else
{
ret = false;
if (!inbound) LogPrint (eLogWarning, "NetDbReq: No inbound tunnels");
if (!outbound) LogPrint (eLogWarning, "NetDbReq: No outbound tunnels");
}
}
else
{
ret = false;
LogPrint (eLogWarning, "NetDbReq: Exploratory pool is not ready");
}
}
}
else
{
ret = false;
2024-05-13 18:45:41 +00:00
LogPrint (eLogWarning, "NetDbReq: No more floodfills for ", dest->GetDestination ().ToBase64 (), " after ", count, "attempts");
}
}
else
{
if (!dest->IsExploratory ())
2024-05-13 18:45:41 +00:00
LogPrint (eLogWarning, "NetDbReq: ", dest->GetDestination ().ToBase64 (), " not found after ", MAX_NUM_REQUEST_ATTEMPTS," attempts");
ret = false;
}
return ret;
}
void NetDbRequests::ScheduleManageRequests ()
{
m_ManageRequestsTimer.expires_from_now (boost::posix_time::seconds(MANAGE_REQUESTS_INTERVAL));
m_ManageRequestsTimer.async_wait (std::bind (&NetDbRequests::HandleManageRequestsTimer,
this, std::placeholders::_1));
}
void NetDbRequests::HandleManageRequestsTimer (const boost::system::error_code& ecode)
{
if (ecode != boost::asio::error::operation_aborted)
{
if (i2p::tunnel::tunnels.GetExploratoryPool ()) // expolratory pool is ready?
ManageRequests ();
ScheduleManageRequests ();
}
}
2015-04-09 16:45:00 +00:00
}
}