mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-15 12:13:24 +00:00
84834089d1
use `fmt::join` for lokinet version string in status Co-authored-by: Jason Rhinelander <jason@imaginary.ca>
1806 lines
51 KiB
C++
1806 lines
51 KiB
C++
#include <memory>
|
|
#include "router.hpp"
|
|
|
|
#include <llarp/config/config.hpp>
|
|
#include <llarp/constants/proto.hpp>
|
|
#include <llarp/constants/files.hpp>
|
|
#include <llarp/constants/time.hpp>
|
|
#include <llarp/crypto/crypto_libsodium.hpp>
|
|
#include <llarp/crypto/crypto.hpp>
|
|
#include <llarp/dht/context.hpp>
|
|
#include <llarp/dht/node.hpp>
|
|
#include <llarp/iwp/iwp.hpp>
|
|
#include <llarp/link/server.hpp>
|
|
#include <llarp/messages/link_message.hpp>
|
|
#include <llarp/net/net.hpp>
|
|
#include <stdexcept>
|
|
#include <llarp/util/buffer.hpp>
|
|
#include <llarp/util/logging.hpp>
|
|
#include <llarp/util/meta/memfn.hpp>
|
|
#include <llarp/util/str.hpp>
|
|
#include <llarp/ev/ev.hpp>
|
|
#include <llarp/tooling/peer_stats_event.hpp>
|
|
|
|
#include <llarp/tooling/router_event.hpp>
|
|
#include <llarp/util/status.hpp>
|
|
|
|
#include <fstream>
|
|
#include <cstdlib>
|
|
#include <iterator>
|
|
#include <unordered_map>
|
|
#include <utility>
|
|
#if defined(ANDROID) || defined(IOS)
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#if defined(WITH_SYSTEMD)
|
|
#include <systemd/sd-daemon.h>
|
|
#endif
|
|
|
|
#include <llarp/constants/platform.hpp>
|
|
|
|
#include <oxenmq/oxenmq.h>
|
|
|
|
static constexpr std::chrono::milliseconds ROUTER_TICK_INTERVAL = 250ms;
|
|
|
|
namespace llarp
|
|
{
|
|
static auto logcat = log::Cat("router");
|
|
|
|
Router::Router(EventLoop_ptr loop, std::shared_ptr<vpn::Platform> vpnPlatform)
|
|
: ready{false}
|
|
, m_lmq{std::make_shared<oxenmq::OxenMQ>()}
|
|
, _loop{std::move(loop)}
|
|
, _vpnPlatform{std::move(vpnPlatform)}
|
|
, paths{this}
|
|
, _exitContext{this}
|
|
, _dht{llarp_dht_context_new(this)}
|
|
, m_DiskThread{m_lmq->add_tagged_thread("disk")}
|
|
, inbound_link_msg_parser{this}
|
|
, _hiddenServiceContext{this}
|
|
, m_RoutePoker{std::make_shared<RoutePoker>()}
|
|
, m_RPCServer{nullptr}
|
|
, _randomStartDelay{
|
|
platform::is_simulation ? std::chrono::milliseconds{(llarp::randint() % 1250) + 2000}
|
|
: 0s}
|
|
{
|
|
m_keyManager = std::make_shared<KeyManager>();
|
|
// for lokid, so we don't close the connection when syncing the whitelist
|
|
m_lmq->MAX_MSG_SIZE = -1;
|
|
_stopping.store(false);
|
|
_running.store(false);
|
|
_lastTick = llarp::time_now_ms();
|
|
m_NextExploreAt = Clock_t::now();
|
|
m_Pump = _loop->make_waker([this]() { PumpLL(); });
|
|
}
|
|
|
|
Router::~Router()
|
|
{
|
|
llarp_dht_context_free(_dht);
|
|
}
|
|
|
|
void
|
|
Router::PumpLL()
|
|
{
|
|
llarp::LogTrace("Router::PumpLL() start");
|
|
if (_stopping.load())
|
|
return;
|
|
paths.PumpDownstream();
|
|
paths.PumpUpstream();
|
|
_hiddenServiceContext.Pump();
|
|
_outboundMessageHandler.Pump();
|
|
_linkManager.PumpLinks();
|
|
llarp::LogTrace("Router::PumpLL() end");
|
|
}
|
|
|
|
util::StatusObject
|
|
Router::ExtractStatus() const
|
|
{
|
|
if (not _running)
|
|
util::StatusObject{{"running", false}};
|
|
|
|
return util::StatusObject{
|
|
{"running", true},
|
|
{"numNodesKnown", _nodedb->NumLoaded()},
|
|
{"dht", _dht->impl->ExtractStatus()},
|
|
{"services", _hiddenServiceContext.ExtractStatus()},
|
|
{"exit", _exitContext.ExtractStatus()},
|
|
{"links", _linkManager.ExtractStatus()},
|
|
{"outboundMessages", _outboundMessageHandler.ExtractStatus()}};
|
|
}
|
|
|
|
util::StatusObject
|
|
Router::ExtractSummaryStatus() const
|
|
{
|
|
if (!_running)
|
|
return util::StatusObject{{"running", false}};
|
|
|
|
auto services = _hiddenServiceContext.ExtractStatus();
|
|
|
|
auto link_types = _linkManager.ExtractStatus();
|
|
|
|
uint64_t tx_rate = 0;
|
|
uint64_t rx_rate = 0;
|
|
uint64_t peers = 0;
|
|
for (const auto& links : link_types)
|
|
{
|
|
for (const auto& link : links)
|
|
{
|
|
if (link.empty())
|
|
continue;
|
|
for (const auto& peer : link["sessions"]["established"])
|
|
{
|
|
tx_rate += peer["tx"].get<uint64_t>();
|
|
rx_rate += peer["rx"].get<uint64_t>();
|
|
peers++;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Compute all stats on all path builders on the default endpoint
|
|
// Merge snodeSessions, remoteSessions and default into a single array
|
|
std::vector<nlohmann::json> builders;
|
|
|
|
if (services.is_object())
|
|
{
|
|
const auto& serviceDefault = services.at("default");
|
|
builders.push_back(serviceDefault);
|
|
|
|
auto snode_sessions = serviceDefault.at("snodeSessions");
|
|
for (const auto& session : snode_sessions)
|
|
builders.push_back(session);
|
|
|
|
auto remote_sessions = serviceDefault.at("remoteSessions");
|
|
for (const auto& session : remote_sessions)
|
|
builders.push_back(session);
|
|
}
|
|
|
|
// Iterate over all items on this array to build the global pathStats
|
|
uint64_t pathsCount = 0;
|
|
uint64_t success = 0;
|
|
uint64_t attempts = 0;
|
|
for (const auto& builder : builders)
|
|
{
|
|
if (builder.is_null())
|
|
continue;
|
|
|
|
const auto& paths = builder.at("paths");
|
|
if (paths.is_array())
|
|
{
|
|
for (const auto& [key, value] : paths.items())
|
|
{
|
|
if (value.is_object() && value.at("status").is_string()
|
|
&& value.at("status") == "established")
|
|
pathsCount++;
|
|
}
|
|
}
|
|
|
|
const auto& buildStats = builder.at("buildStats");
|
|
if (buildStats.is_null())
|
|
continue;
|
|
|
|
success += buildStats.at("success").get<uint64_t>();
|
|
attempts += buildStats.at("attempts").get<uint64_t>();
|
|
}
|
|
double ratio = static_cast<double>(success) / (attempts + 1);
|
|
|
|
util::StatusObject stats{
|
|
{"running", true},
|
|
{"version", llarp::VERSION_FULL},
|
|
{"uptime", to_json(Uptime())},
|
|
{"numPathsBuilt", pathsCount},
|
|
{"numPeersConnected", peers},
|
|
{"numRoutersKnown", _nodedb->NumLoaded()},
|
|
{"ratio", ratio},
|
|
{"txRate", tx_rate},
|
|
{"rxRate", rx_rate},
|
|
};
|
|
|
|
if (services.is_object())
|
|
{
|
|
stats["authCodes"] = services["default"]["authCodes"];
|
|
stats["exitMap"] = services["default"]["exitMap"];
|
|
stats["networkReady"] = services["default"]["networkReady"];
|
|
stats["lokiAddress"] = services["default"]["identity"];
|
|
}
|
|
return stats;
|
|
}
|
|
|
|
bool
|
|
Router::HandleRecvLinkMessageBuffer(ILinkSession* session, const llarp_buffer_t& buf)
|
|
{
|
|
if (_stopping)
|
|
return true;
|
|
|
|
if (!session)
|
|
{
|
|
LogWarn("no link session");
|
|
return false;
|
|
}
|
|
return inbound_link_msg_parser.ProcessFrom(session, buf);
|
|
}
|
|
void
|
|
Router::Freeze()
|
|
{
|
|
if (IsServiceNode())
|
|
return;
|
|
linkManager().ForEachPeer([](auto peer) {
|
|
if (peer)
|
|
peer->Close();
|
|
});
|
|
}
|
|
|
|
void
|
|
Router::Thaw()
|
|
{
|
|
if (IsServiceNode())
|
|
return;
|
|
// get pubkeys we are connected to
|
|
std::unordered_set<RouterID> peerPubkeys;
|
|
linkManager().ForEachPeer([&peerPubkeys](auto peer) {
|
|
if (not peer)
|
|
return;
|
|
peerPubkeys.emplace(peer->GetPubKey());
|
|
});
|
|
// close our sessions to them on link layer
|
|
linkManager().ForEachOutboundLink([peerPubkeys](const auto& link) {
|
|
for (const auto& remote : peerPubkeys)
|
|
link->CloseSessionTo(remote);
|
|
});
|
|
// thaw endpoints
|
|
hiddenServiceContext().ForEachService([](const auto& name, const auto& ep) -> bool {
|
|
LogInfo(name, " thawing...");
|
|
ep->Thaw();
|
|
return true;
|
|
});
|
|
LogInfo("We are ready to go bruh... probably");
|
|
}
|
|
|
|
void
|
|
Router::PersistSessionUntil(const RouterID& remote, llarp_time_t until)
|
|
{
|
|
_linkManager.PersistSessionUntil(remote, until);
|
|
}
|
|
|
|
void
|
|
Router::GossipRCIfNeeded(const RouterContact rc)
|
|
{
|
|
if (disableGossipingRC_TestingOnly())
|
|
return;
|
|
|
|
/// if we are not a service node forget about gossip
|
|
if (not IsServiceNode())
|
|
return;
|
|
/// wait for random uptime
|
|
if (std::chrono::milliseconds{Uptime()} < _randomStartDelay)
|
|
return;
|
|
_rcGossiper.GossipRC(rc);
|
|
}
|
|
|
|
bool
|
|
Router::GetRandomGoodRouter(RouterID& router)
|
|
{
|
|
if (whitelistRouters)
|
|
{
|
|
return _rcLookupHandler.GetRandomWhitelistRouter(router);
|
|
}
|
|
|
|
if (const auto maybe = nodedb()->GetRandom([](const auto&) -> bool { return true; }))
|
|
{
|
|
router = maybe->pubkey;
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void
|
|
Router::TriggerPump()
|
|
{
|
|
m_Pump->Trigger();
|
|
}
|
|
|
|
bool
|
|
Router::SendToOrQueue(const RouterID& remote, const ILinkMessage& msg, SendStatusHandler handler)
|
|
{
|
|
return _outboundMessageHandler.QueueMessage(remote, msg, handler);
|
|
}
|
|
|
|
void
|
|
Router::ForEachPeer(std::function<void(const ILinkSession*, bool)> visit, bool randomize) const
|
|
{
|
|
_linkManager.ForEachPeer(visit, randomize);
|
|
}
|
|
|
|
void
|
|
Router::ForEachPeer(std::function<void(ILinkSession*)> visit)
|
|
{
|
|
_linkManager.ForEachPeer(visit);
|
|
}
|
|
|
|
void
|
|
Router::try_connect(fs::path rcfile)
|
|
{
|
|
RouterContact remote;
|
|
if (!remote.Read(rcfile.string().c_str()))
|
|
{
|
|
LogError("failure to decode or verify of remote RC");
|
|
return;
|
|
}
|
|
if (remote.Verify(Now()))
|
|
{
|
|
LogDebug("verified signature");
|
|
_outboundSessionMaker.CreateSessionTo(remote, nullptr);
|
|
}
|
|
else
|
|
LogError(rcfile, " contains invalid RC");
|
|
}
|
|
|
|
bool
|
|
Router::EnsureIdentity()
|
|
{
|
|
_encryption = m_keyManager->encryptionKey;
|
|
|
|
if (whitelistRouters)
|
|
{
|
|
#if defined(ANDROID) || defined(IOS)
|
|
LogError("running a service node on mobile device is not possible.");
|
|
return false;
|
|
#else
|
|
#if defined(_WIN32)
|
|
LogError("running a service node on windows is not possible.");
|
|
return false;
|
|
#endif
|
|
#endif
|
|
constexpr int maxTries = 5;
|
|
int numTries = 0;
|
|
while (numTries < maxTries)
|
|
{
|
|
numTries++;
|
|
try
|
|
{
|
|
_identity = RpcClient()->ObtainIdentityKey();
|
|
const RouterID pk{pubkey()};
|
|
LogWarn("Obtained lokid identity key: ", pk);
|
|
break;
|
|
}
|
|
catch (const std::exception& e)
|
|
{
|
|
LogWarn(
|
|
"Failed attempt ",
|
|
numTries,
|
|
" of ",
|
|
maxTries,
|
|
" to get lokid identity keys because: ",
|
|
e.what());
|
|
|
|
if (numTries == maxTries)
|
|
throw;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
_identity = m_keyManager->identityKey;
|
|
}
|
|
|
|
if (_identity.IsZero())
|
|
return false;
|
|
if (_encryption.IsZero())
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::Configure(std::shared_ptr<Config> c, bool isSNode, std::shared_ptr<NodeDB> nodedb)
|
|
{
|
|
llarp::sys::service_manager->starting();
|
|
|
|
m_Config = std::move(c);
|
|
auto& conf = *m_Config;
|
|
|
|
// Do logging config as early as possible to get the configured log level applied
|
|
|
|
// Backwards compat: before 0.9.10 we used `type=file` with `file=|-|stdout` for print mode
|
|
auto log_type = conf.logging.m_logType;
|
|
if (log_type == log::Type::File
|
|
&& (conf.logging.m_logFile == "stdout" || conf.logging.m_logFile == "-"
|
|
|| conf.logging.m_logFile.empty()))
|
|
log_type = log::Type::Print;
|
|
|
|
if (log::get_level_default() != log::Level::off)
|
|
log::reset_level(conf.logging.m_logLevel);
|
|
log::clear_sinks();
|
|
log::add_sink(log_type, conf.logging.m_logFile);
|
|
|
|
enableRPCServer = conf.api.m_enableRPCServer;
|
|
|
|
// re-add rpc log sink if rpc enabled, else free it
|
|
if (enableRPCServer and llarp::logRingBuffer)
|
|
log::add_sink(llarp::logRingBuffer, llarp::log::DEFAULT_PATTERN_MONO);
|
|
else
|
|
llarp::logRingBuffer = nullptr;
|
|
|
|
log::debug(logcat, "Configuring router");
|
|
|
|
whitelistRouters = conf.lokid.whitelistRouters;
|
|
if (whitelistRouters)
|
|
{
|
|
lokidRPCAddr = oxenmq::address(conf.lokid.lokidRPCAddr);
|
|
m_lokidRpcClient = std::make_shared<rpc::LokidRpcClient>(m_lmq, weak_from_this());
|
|
}
|
|
|
|
if (enableRPCServer)
|
|
rpcBindAddr = oxenmq::address(conf.api.m_rpcBindAddr);
|
|
|
|
log::debug(logcat, "Starting RPC server");
|
|
if (not StartRpcServer())
|
|
throw std::runtime_error("Failed to start rpc server");
|
|
|
|
if (conf.router.m_workerThreads > 0)
|
|
m_lmq->set_general_threads(conf.router.m_workerThreads);
|
|
|
|
log::debug(logcat, "Starting OMQ server");
|
|
m_lmq->start();
|
|
|
|
_nodedb = std::move(nodedb);
|
|
|
|
m_isServiceNode = conf.router.m_isRelay;
|
|
log::debug(
|
|
logcat, m_isServiceNode ? "Running as a relay (service node)" : "Running as a client");
|
|
|
|
if (whitelistRouters)
|
|
{
|
|
m_lokidRpcClient->ConnectAsync(lokidRPCAddr);
|
|
}
|
|
|
|
log::debug(logcat, "Initializing key manager");
|
|
if (not m_keyManager->initialize(conf, true, isSNode))
|
|
throw std::runtime_error("KeyManager failed to initialize");
|
|
|
|
log::debug(logcat, "Initializing from configuration");
|
|
if (!FromConfig(conf))
|
|
throw std::runtime_error("FromConfig() failed");
|
|
|
|
log::debug(logcat, "Initializing identity");
|
|
if (not EnsureIdentity())
|
|
throw std::runtime_error("EnsureIdentity() failed");
|
|
return true;
|
|
}
|
|
|
|
/// called in disk worker thread
|
|
void
|
|
Router::HandleSaveRC() const
|
|
{
|
|
std::string fname = our_rc_file.string();
|
|
_rc.Write(fname.c_str());
|
|
}
|
|
|
|
bool
|
|
Router::SaveRC()
|
|
{
|
|
LogDebug("verify RC signature");
|
|
if (!_rc.Verify(Now()))
|
|
{
|
|
Dump<MAX_RC_SIZE>(rc());
|
|
LogError("RC is invalid, not saving");
|
|
return false;
|
|
}
|
|
if (m_isServiceNode)
|
|
_nodedb->Put(_rc);
|
|
QueueDiskIO([&]() { HandleSaveRC(); });
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::IsServiceNode() const
|
|
{
|
|
return m_isServiceNode;
|
|
}
|
|
|
|
bool
|
|
Router::TooFewPeers() const
|
|
{
|
|
constexpr int KnownPeerWarningThreshold = 5;
|
|
return nodedb()->NumLoaded() < KnownPeerWarningThreshold;
|
|
}
|
|
|
|
std::optional<std::string>
|
|
Router::OxendErrorState() const
|
|
{
|
|
// If we're in the white or gray list then we *should* be establishing connections to other
|
|
// routers, so if we have almost no peers then something is almost certainly wrong.
|
|
if (LooksFunded() and TooFewPeers())
|
|
return "too few peer connections; lokinet is not adequately connected to the network";
|
|
return std::nullopt;
|
|
}
|
|
|
|
void
|
|
Router::Close()
|
|
{
|
|
log::info(logcat, "closing");
|
|
if (_onDown)
|
|
_onDown();
|
|
log::debug(logcat, "stopping mainloop");
|
|
_loop->stop();
|
|
_running.store(false);
|
|
}
|
|
|
|
bool
|
|
Router::ParseRoutingMessageBuffer(
|
|
const llarp_buffer_t& buf, routing::IMessageHandler* h, const PathID_t& rxid)
|
|
{
|
|
return inbound_routing_msg_parser.ParseMessageBuffer(buf, h, rxid, this);
|
|
}
|
|
|
|
bool
|
|
Router::LooksDecommissioned() const
|
|
{
|
|
return IsServiceNode() and whitelistRouters and _rcLookupHandler.HaveReceivedWhitelist()
|
|
and _rcLookupHandler.IsGreylisted(pubkey());
|
|
}
|
|
|
|
bool
|
|
Router::LooksFunded() const
|
|
{
|
|
return IsServiceNode() and whitelistRouters and _rcLookupHandler.HaveReceivedWhitelist()
|
|
and _rcLookupHandler.SessionIsAllowed(pubkey());
|
|
}
|
|
|
|
bool
|
|
Router::LooksRegistered() const
|
|
{
|
|
return IsServiceNode() and whitelistRouters and _rcLookupHandler.HaveReceivedWhitelist()
|
|
and _rcLookupHandler.IsRegistered(pubkey());
|
|
}
|
|
|
|
bool
|
|
Router::ShouldTestOtherRouters() const
|
|
{
|
|
if (not IsServiceNode())
|
|
return false;
|
|
if (not whitelistRouters)
|
|
return true;
|
|
if (not _rcLookupHandler.HaveReceivedWhitelist())
|
|
return false;
|
|
return _rcLookupHandler.SessionIsAllowed(pubkey());
|
|
}
|
|
|
|
bool
|
|
Router::SessionToRouterAllowed(const RouterID& router) const
|
|
{
|
|
return _rcLookupHandler.SessionIsAllowed(router);
|
|
}
|
|
|
|
bool
|
|
Router::PathToRouterAllowed(const RouterID& router) const
|
|
{
|
|
if (LooksDecommissioned())
|
|
{
|
|
// we are decom'd don't allow any paths outbound at all
|
|
return false;
|
|
}
|
|
return _rcLookupHandler.PathIsAllowed(router);
|
|
}
|
|
|
|
size_t
|
|
Router::NumberOfConnectedRouters() const
|
|
{
|
|
return _linkManager.NumberOfConnectedRouters();
|
|
}
|
|
|
|
size_t
|
|
Router::NumberOfConnectedClients() const
|
|
{
|
|
return _linkManager.NumberOfConnectedClients();
|
|
}
|
|
|
|
bool
|
|
Router::UpdateOurRC(bool rotateKeys)
|
|
{
|
|
SecretKey nextOnionKey;
|
|
RouterContact nextRC = _rc;
|
|
if (rotateKeys)
|
|
{
|
|
CryptoManager::instance()->encryption_keygen(nextOnionKey);
|
|
std::string f = encryption_keyfile.string();
|
|
// TODO: use disk worker
|
|
if (nextOnionKey.SaveToFile(f.c_str()))
|
|
{
|
|
nextRC.enckey = seckey_topublic(nextOnionKey);
|
|
_encryption = nextOnionKey;
|
|
}
|
|
}
|
|
if (!nextRC.Sign(identity()))
|
|
return false;
|
|
if (!nextRC.Verify(time_now_ms(), false))
|
|
return false;
|
|
_rc = std::move(nextRC);
|
|
if (rotateKeys)
|
|
{
|
|
// propagate RC by renegotiating sessions
|
|
ForEachPeer([](ILinkSession* s) {
|
|
if (s->RenegotiateSession())
|
|
LogInfo("renegotiated session");
|
|
else
|
|
LogWarn("failed to renegotiate session");
|
|
});
|
|
}
|
|
if (IsServiceNode())
|
|
return SaveRC();
|
|
else
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::FromConfig(const Config& conf)
|
|
{
|
|
// Set netid before anything else
|
|
log::debug(logcat, "Network ID set to {}", conf.router.m_netId);
|
|
if (!conf.router.m_netId.empty() && strcmp(conf.router.m_netId.c_str(), llarp::DEFAULT_NETID))
|
|
{
|
|
const auto& netid = conf.router.m_netId;
|
|
llarp::LogWarn(
|
|
"!!!! you have manually set netid to be '",
|
|
netid,
|
|
"' which does not equal '",
|
|
llarp::DEFAULT_NETID,
|
|
"' you will run as a different network, good luck "
|
|
"and don't forget: something something MUH traffic "
|
|
"shape correlation !!!!");
|
|
NetID::DefaultValue() = NetID(reinterpret_cast<const byte_t*>(netid.c_str()));
|
|
// reset netid in our rc
|
|
_rc.netID = llarp::NetID();
|
|
}
|
|
|
|
// Router config
|
|
_rc.SetNick(conf.router.m_nickname);
|
|
_outboundSessionMaker.maxConnectedRouters = conf.router.m_maxConnectedRouters;
|
|
_outboundSessionMaker.minConnectedRouters = conf.router.m_minConnectedRouters;
|
|
|
|
encryption_keyfile = m_keyManager->m_encKeyPath;
|
|
our_rc_file = m_keyManager->m_rcPath;
|
|
transport_keyfile = m_keyManager->m_transportKeyPath;
|
|
ident_keyfile = m_keyManager->m_idKeyPath;
|
|
|
|
if (auto maybe_ip = conf.links.PublicAddress)
|
|
_ourAddress = var::visit([](auto&& ip) { return SockAddr{ip}; }, *maybe_ip);
|
|
else if (auto maybe_ip = conf.router.PublicIP)
|
|
_ourAddress = var::visit([](auto&& ip) { return SockAddr{ip}; }, *maybe_ip);
|
|
|
|
if (_ourAddress)
|
|
{
|
|
if (auto maybe_port = conf.links.PublicPort)
|
|
_ourAddress->setPort(*maybe_port);
|
|
else if (auto maybe_port = conf.router.PublicPort)
|
|
_ourAddress->setPort(*maybe_port);
|
|
else
|
|
throw std::runtime_error{"public ip provided without public port"};
|
|
log::debug(logcat, "Using {} for our public address", *_ourAddress);
|
|
}
|
|
else
|
|
log::debug(logcat, "No explicit public address given; will auto-detect during link setup");
|
|
|
|
RouterContact::BlockBogons = conf.router.m_blockBogons;
|
|
|
|
auto& networkConfig = conf.network;
|
|
|
|
/// build a set of strictConnectPubkeys (
|
|
std::unordered_set<RouterID> strictConnectPubkeys;
|
|
if (not networkConfig.m_strictConnect.empty())
|
|
{
|
|
const auto& val = networkConfig.m_strictConnect;
|
|
if (IsServiceNode())
|
|
throw std::runtime_error("cannot use strict-connect option as service node");
|
|
if (val.size() < 2)
|
|
throw std::runtime_error(
|
|
"Must specify more than one strict-connect router if using strict-connect");
|
|
strictConnectPubkeys.insert(val.begin(), val.end());
|
|
log::debug(logcat, "{} strict-connect routers configured", val.size());
|
|
}
|
|
|
|
std::vector<fs::path> configRouters = conf.connect.routers;
|
|
configRouters.insert(
|
|
configRouters.end(), conf.bootstrap.files.begin(), conf.bootstrap.files.end());
|
|
|
|
// if our conf had no bootstrap files specified, try the default location of
|
|
// <DATA_DIR>/bootstrap.signed. If this isn't present, leave a useful error message
|
|
// TODO: use constant
|
|
fs::path defaultBootstrapFile = conf.router.m_dataDir / "bootstrap.signed";
|
|
if (configRouters.empty() and conf.bootstrap.routers.empty())
|
|
{
|
|
if (fs::exists(defaultBootstrapFile))
|
|
{
|
|
configRouters.push_back(defaultBootstrapFile);
|
|
}
|
|
}
|
|
|
|
bootstrapRCList.clear();
|
|
for (const auto& router : configRouters)
|
|
{
|
|
log::debug(logcat, "Loading bootstrap router list from {}", defaultBootstrapFile);
|
|
bootstrapRCList.AddFromFile(router);
|
|
}
|
|
|
|
for (const auto& rc : conf.bootstrap.routers)
|
|
{
|
|
bootstrapRCList.emplace(rc);
|
|
}
|
|
|
|
// in case someone has an old bootstrap file and is trying to use a bootstrap
|
|
// that no longer exists
|
|
auto clearBadRCs = [this]() {
|
|
for (auto it = bootstrapRCList.begin(); it != bootstrapRCList.end();)
|
|
{
|
|
if (it->IsObsoleteBootstrap())
|
|
log::warning(logcat, "ignoring obsolete boostrap RC: {}", RouterID{it->pubkey});
|
|
else if (not it->Verify(Now()))
|
|
log::warning(logcat, "ignoring invalid bootstrap RC: {}", RouterID{it->pubkey});
|
|
else
|
|
{
|
|
++it;
|
|
continue;
|
|
}
|
|
// we are in one of the above error cases that we warned about:
|
|
it = bootstrapRCList.erase(it);
|
|
}
|
|
};
|
|
|
|
clearBadRCs();
|
|
|
|
if (bootstrapRCList.empty() and not conf.bootstrap.seednode)
|
|
{
|
|
auto fallbacks = llarp::load_bootstrap_fallbacks();
|
|
if (auto itr = fallbacks.find(_rc.netID.ToString()); itr != fallbacks.end())
|
|
{
|
|
bootstrapRCList = itr->second;
|
|
log::debug(logcat, "loaded {} default fallback bootstrap routers", bootstrapRCList.size());
|
|
clearBadRCs();
|
|
}
|
|
if (bootstrapRCList.empty() and not conf.bootstrap.seednode)
|
|
{
|
|
// empty after trying fallback, if set
|
|
log::error(
|
|
logcat,
|
|
"No bootstrap routers were loaded. The default bootstrap file {} does not exist, and "
|
|
"loading fallback bootstrap RCs failed.",
|
|
defaultBootstrapFile);
|
|
throw std::runtime_error("No bootstrap nodes available.");
|
|
}
|
|
}
|
|
|
|
if (conf.bootstrap.seednode)
|
|
LogInfo("we are a seed node");
|
|
else
|
|
LogInfo("Loaded ", bootstrapRCList.size(), " bootstrap routers");
|
|
|
|
// Init components after relevant config settings loaded
|
|
_outboundMessageHandler.Init(this);
|
|
_outboundSessionMaker.Init(
|
|
this,
|
|
&_linkManager,
|
|
&_rcLookupHandler,
|
|
&_routerProfiling,
|
|
_loop,
|
|
util::memFn(&AbstractRouter::QueueWork, this));
|
|
_linkManager.Init(&_outboundSessionMaker);
|
|
_rcLookupHandler.Init(
|
|
_dht,
|
|
_nodedb,
|
|
_loop,
|
|
util::memFn(&AbstractRouter::QueueWork, this),
|
|
&_linkManager,
|
|
&_hiddenServiceContext,
|
|
strictConnectPubkeys,
|
|
bootstrapRCList,
|
|
whitelistRouters,
|
|
m_isServiceNode);
|
|
|
|
// inbound links
|
|
InitInboundLinks();
|
|
// outbound links
|
|
InitOutboundLinks();
|
|
|
|
// profiling
|
|
_profilesFile = conf.router.m_dataDir / "profiles.dat";
|
|
|
|
// Network config
|
|
if (conf.network.m_enableProfiling.value_or(false))
|
|
{
|
|
LogInfo("router profiling enabled");
|
|
if (not fs::exists(_profilesFile))
|
|
{
|
|
LogInfo("no profiles file at ", _profilesFile, " skipping");
|
|
}
|
|
else
|
|
{
|
|
LogInfo("loading router profiles from ", _profilesFile);
|
|
routerProfiling().Load(_profilesFile);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
routerProfiling().Disable();
|
|
LogInfo("router profiling disabled");
|
|
}
|
|
|
|
// API config
|
|
if (not IsServiceNode())
|
|
{
|
|
hiddenServiceContext().AddEndpoint(conf);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::CheckRenegotiateValid(RouterContact newrc, RouterContact oldrc)
|
|
{
|
|
return _rcLookupHandler.CheckRenegotiateValid(newrc, oldrc);
|
|
}
|
|
|
|
bool
|
|
Router::IsBootstrapNode(const RouterID r) const
|
|
{
|
|
return std::count_if(
|
|
bootstrapRCList.begin(),
|
|
bootstrapRCList.end(),
|
|
[r](const RouterContact& rc) -> bool { return rc.pubkey == r; })
|
|
> 0;
|
|
}
|
|
|
|
bool
|
|
Router::ShouldReportStats(llarp_time_t now) const
|
|
{
|
|
static constexpr auto ReportStatsInterval = 1h;
|
|
return now - m_LastStatsReport > ReportStatsInterval;
|
|
}
|
|
|
|
void
|
|
Router::ReportStats()
|
|
{
|
|
const auto now = Now();
|
|
LogInfo(nodedb()->NumLoaded(), " RCs loaded");
|
|
LogInfo(bootstrapRCList.size(), " bootstrap peers");
|
|
LogInfo(NumberOfConnectedRouters(), " router connections");
|
|
if (IsServiceNode())
|
|
{
|
|
LogInfo(NumberOfConnectedClients(), " client connections");
|
|
LogInfo(ToString(_rc.Age(now)), " since we last updated our RC");
|
|
LogInfo(ToString(_rc.TimeUntilExpires(now)), " until our RC expires");
|
|
}
|
|
if (m_LastStatsReport > 0s)
|
|
LogInfo(ToString(now - m_LastStatsReport), " last reported stats");
|
|
m_LastStatsReport = now;
|
|
}
|
|
|
|
std::string
|
|
Router::status_line()
|
|
{
|
|
std::string status;
|
|
auto out = std::back_inserter(status);
|
|
fmt::format_to(out, "v{}", fmt::join(llarp::VERSION, "."));
|
|
if (IsServiceNode())
|
|
{
|
|
fmt::format_to(
|
|
out,
|
|
" snode | known/svc/clients: {}/{}/{}",
|
|
nodedb()->NumLoaded(),
|
|
NumberOfConnectedRouters(),
|
|
NumberOfConnectedClients());
|
|
fmt::format_to(
|
|
out,
|
|
" | {} active paths | block {} ",
|
|
pathContext().CurrentTransitPaths(),
|
|
(m_lokidRpcClient ? m_lokidRpcClient->BlockHeight() : 0));
|
|
auto maybe_last = _rcGossiper.LastGossipAt();
|
|
fmt::format_to(
|
|
out,
|
|
" | gossip: (next/last) {} / {}",
|
|
short_time_from_now(_rcGossiper.NextGossipAt()),
|
|
maybe_last ? short_time_from_now(*maybe_last) : "never");
|
|
}
|
|
else
|
|
{
|
|
fmt::format_to(
|
|
out,
|
|
" client | known/connected: {}/{}",
|
|
nodedb()->NumLoaded(),
|
|
NumberOfConnectedRouters());
|
|
|
|
if (auto ep = hiddenServiceContext().GetDefault())
|
|
{
|
|
fmt::format_to(
|
|
out,
|
|
" | paths/endpoints {}/{}",
|
|
pathContext().CurrentOwnedPaths(),
|
|
ep->UniqueEndpoints());
|
|
|
|
if (auto success_rate = ep->CurrentBuildStats().SuccessRatio(); success_rate < 0.5)
|
|
{
|
|
fmt::format_to(
|
|
out, " [ !!! Low Build Success Rate ({:.1f}%) !!! ]", (100.0 * success_rate));
|
|
}
|
|
};
|
|
}
|
|
return status;
|
|
}
|
|
|
|
void
|
|
Router::Tick()
|
|
{
|
|
if (_stopping)
|
|
return;
|
|
// LogDebug("tick router");
|
|
const auto now = Now();
|
|
if (const auto delta = now - _lastTick; _lastTick != 0s and delta > TimeskipDetectedDuration)
|
|
{
|
|
// we detected a time skip into the futre, thaw the network
|
|
LogWarn("Timeskip of ", ToString(delta), " detected. Resetting network state");
|
|
Thaw();
|
|
}
|
|
|
|
llarp::sys::service_manager->report_periodic_stats();
|
|
|
|
m_PathBuildLimiter.Decay(now);
|
|
|
|
routerProfiling().Tick();
|
|
|
|
if (ShouldReportStats(now))
|
|
{
|
|
ReportStats();
|
|
}
|
|
|
|
_rcGossiper.Decay(now);
|
|
|
|
_rcLookupHandler.PeriodicUpdate(now);
|
|
|
|
const bool gotWhitelist = _rcLookupHandler.HaveReceivedWhitelist();
|
|
const bool isSvcNode = IsServiceNode();
|
|
const bool decom = LooksDecommissioned();
|
|
bool shouldGossip = isSvcNode and whitelistRouters and gotWhitelist
|
|
and _rcLookupHandler.SessionIsAllowed(pubkey());
|
|
|
|
if (isSvcNode
|
|
and (_rc.ExpiresSoon(now, std::chrono::milliseconds(randint() % 10000)) or (now - _rc.last_updated) > rcRegenInterval))
|
|
{
|
|
LogInfo("regenerating RC");
|
|
if (UpdateOurRC())
|
|
{
|
|
// our rc changed so we should gossip it
|
|
shouldGossip = true;
|
|
// remove our replay entry so it goes out
|
|
_rcGossiper.Forget(pubkey());
|
|
}
|
|
else
|
|
LogError("failed to update our RC");
|
|
}
|
|
if (shouldGossip)
|
|
{
|
|
// if we have the whitelist enabled, we have fetched the list and we are in either
|
|
// the white or grey list, we want to gossip our RC
|
|
GossipRCIfNeeded(_rc);
|
|
}
|
|
// remove RCs for nodes that are no longer allowed by network policy
|
|
nodedb()->RemoveIf([&](const RouterContact& rc) -> bool {
|
|
// don't purge bootstrap nodes from nodedb
|
|
if (IsBootstrapNode(rc.pubkey))
|
|
{
|
|
log::trace(logcat, "Not removing {}: is bootstrap node", rc.pubkey);
|
|
return false;
|
|
}
|
|
// if for some reason we stored an RC that isn't a valid router
|
|
// purge this entry
|
|
if (not rc.IsPublicRouter())
|
|
{
|
|
log::debug(logcat, "Removing {}: not a valid router", rc.pubkey);
|
|
return true;
|
|
}
|
|
/// clear out a fully expired RC
|
|
if (rc.IsExpired(now))
|
|
{
|
|
log::debug(logcat, "Removing {}: RC is expired", rc.pubkey);
|
|
return true;
|
|
}
|
|
// clients have no notion of a whilelist
|
|
// we short circuit logic here so we dont remove
|
|
// routers that are not whitelisted for first hops
|
|
if (not isSvcNode)
|
|
{
|
|
log::trace(logcat, "Not removing {}: we are a client and it looks fine", rc.pubkey);
|
|
return false;
|
|
}
|
|
|
|
// if we have a whitelist enabled and we don't
|
|
// have the whitelist yet don't remove the entry
|
|
if (whitelistRouters and not gotWhitelist)
|
|
{
|
|
log::debug(logcat, "Skipping check on {}: don't have whitelist yet", rc.pubkey);
|
|
return false;
|
|
}
|
|
// if we have no whitelist enabled or we have
|
|
// the whitelist enabled and we got the whitelist
|
|
// check against the whitelist and remove if it's not
|
|
// in the whitelist OR if there is no whitelist don't remove
|
|
if (gotWhitelist and not _rcLookupHandler.SessionIsAllowed(rc.pubkey))
|
|
{
|
|
log::debug(logcat, "Removing {}: not a valid router", rc.pubkey);
|
|
return true;
|
|
}
|
|
return false;
|
|
});
|
|
|
|
// find all deregistered relays
|
|
std::unordered_set<PubKey> closePeers;
|
|
|
|
_linkManager.ForEachPeer([&](auto session) {
|
|
if (whitelistRouters and not gotWhitelist)
|
|
return;
|
|
if (not session)
|
|
return;
|
|
const auto pk = session->GetPubKey();
|
|
if (session->IsRelay() and not _rcLookupHandler.SessionIsAllowed(pk))
|
|
{
|
|
closePeers.emplace(pk);
|
|
}
|
|
});
|
|
|
|
// mark peers as de-registered
|
|
for (auto& peer : closePeers)
|
|
_linkManager.DeregisterPeer(std::move(peer));
|
|
|
|
_linkManager.CheckPersistingSessions(now);
|
|
|
|
size_t connected = NumberOfConnectedRouters();
|
|
if (not isSvcNode)
|
|
{
|
|
connected += _linkManager.NumberOfPendingConnections();
|
|
}
|
|
|
|
const int interval = isSvcNode ? 5 : 2;
|
|
const auto timepoint_now = Clock_t::now();
|
|
if (timepoint_now >= m_NextExploreAt and not decom)
|
|
{
|
|
_rcLookupHandler.ExploreNetwork();
|
|
m_NextExploreAt = timepoint_now + std::chrono::seconds(interval);
|
|
}
|
|
size_t connectToNum = _outboundSessionMaker.minConnectedRouters;
|
|
const auto strictConnect = _rcLookupHandler.NumberOfStrictConnectRouters();
|
|
if (strictConnect > 0 && connectToNum > strictConnect)
|
|
{
|
|
connectToNum = strictConnect;
|
|
}
|
|
|
|
if (isSvcNode and now >= m_NextDecommissionWarn)
|
|
{
|
|
constexpr auto DecommissionWarnInterval = 5min;
|
|
if (auto registered = LooksRegistered(), funded = LooksFunded();
|
|
not(registered and funded and not decom))
|
|
{
|
|
// complain about being deregistered/decommed/unfunded
|
|
log::error(
|
|
logcat,
|
|
"We are running as a service node but we seem to be {}",
|
|
not registered ? "deregistered"
|
|
: decom ? "decommissioned"
|
|
: "not fully staked");
|
|
m_NextDecommissionWarn = now + DecommissionWarnInterval;
|
|
}
|
|
else if (TooFewPeers())
|
|
{
|
|
log::error(
|
|
logcat,
|
|
"We appear to be an active service node, but have only {} known peers.",
|
|
nodedb()->NumLoaded());
|
|
m_NextDecommissionWarn = now + DecommissionWarnInterval;
|
|
}
|
|
}
|
|
|
|
// if we need more sessions to routers and we are not a service node kicked from the network or
|
|
// we are a client we shall connect out to others
|
|
if (connected < connectToNum and (LooksFunded() or not isSvcNode))
|
|
{
|
|
size_t dlt = connectToNum - connected;
|
|
LogDebug("connecting to ", dlt, " random routers to keep alive");
|
|
_outboundSessionMaker.ConnectToRandomRouters(dlt);
|
|
}
|
|
|
|
_hiddenServiceContext.Tick(now);
|
|
_exitContext.Tick(now);
|
|
|
|
// save profiles
|
|
if (routerProfiling().ShouldSave(now) and m_Config->network.m_saveProfiles)
|
|
{
|
|
QueueDiskIO([&]() { routerProfiling().Save(_profilesFile); });
|
|
}
|
|
|
|
_nodedb->Tick(now);
|
|
|
|
if (m_peerDb)
|
|
{
|
|
// TODO: throttle this?
|
|
// TODO: need to capture session stats when session terminates / is removed from link
|
|
// manager
|
|
_linkManager.updatePeerDb(m_peerDb);
|
|
|
|
if (m_peerDb->shouldFlush(now))
|
|
{
|
|
LogDebug("Queing database flush...");
|
|
QueueDiskIO([this]() {
|
|
try
|
|
{
|
|
m_peerDb->flushDatabase();
|
|
}
|
|
catch (std::exception& ex)
|
|
{
|
|
LogError("Could not flush peer stats database: ", ex.what());
|
|
}
|
|
});
|
|
}
|
|
}
|
|
|
|
// get connected peers
|
|
std::set<dht::Key_t> peersWeHave;
|
|
_linkManager.ForEachPeer([&peersWeHave](ILinkSession* s) {
|
|
if (!s->IsEstablished())
|
|
return;
|
|
peersWeHave.emplace(s->GetPubKey());
|
|
});
|
|
// remove any nodes we don't have connections to
|
|
_dht->impl->Nodes()->RemoveIf(
|
|
[&peersWeHave](const dht::Key_t& k) -> bool { return peersWeHave.count(k) == 0; });
|
|
// expire paths
|
|
paths.ExpirePaths(now);
|
|
// update tick timestamp
|
|
_lastTick = llarp::time_now_ms();
|
|
}
|
|
|
|
bool
|
|
Router::Sign(Signature& sig, const llarp_buffer_t& buf) const
|
|
{
|
|
return CryptoManager::instance()->sign(sig, identity(), buf);
|
|
}
|
|
|
|
void
|
|
Router::SessionClosed(RouterID remote)
|
|
{
|
|
dht::Key_t k(remote);
|
|
dht()->impl->Nodes()->DelNode(k);
|
|
|
|
LogInfo("Session to ", remote, " fully closed");
|
|
if (IsServiceNode())
|
|
return;
|
|
if (const auto maybe = nodedb()->Get(remote); maybe.has_value())
|
|
{
|
|
for (const auto& addr : maybe->addrs)
|
|
m_RoutePoker->DelRoute(addr.IPv4());
|
|
}
|
|
}
|
|
|
|
void
|
|
Router::ConnectionTimedOut(ILinkSession* session)
|
|
{
|
|
if (m_peerDb)
|
|
{
|
|
RouterID id{session->GetPubKey()};
|
|
// TODO: make sure this is a public router (on whitelist)?
|
|
m_peerDb->modifyPeerStats(id, [&](PeerStats& stats) { stats.numConnectionTimeouts++; });
|
|
}
|
|
_outboundSessionMaker.OnConnectTimeout(session);
|
|
}
|
|
|
|
void
|
|
Router::ModifyOurRC(std::function<std::optional<RouterContact>(RouterContact)> modify)
|
|
{
|
|
if (auto maybe = modify(rc()))
|
|
{
|
|
_rc = *maybe;
|
|
UpdateOurRC();
|
|
_rcGossiper.GossipRC(rc());
|
|
}
|
|
}
|
|
|
|
bool
|
|
Router::ConnectionEstablished(ILinkSession* session, bool inbound)
|
|
{
|
|
RouterID id{session->GetPubKey()};
|
|
if (m_peerDb)
|
|
{
|
|
// TODO: make sure this is a public router (on whitelist)?
|
|
m_peerDb->modifyPeerStats(id, [&](PeerStats& stats) { stats.numConnectionSuccesses++; });
|
|
}
|
|
NotifyRouterEvent<tooling::LinkSessionEstablishedEvent>(pubkey(), id, inbound);
|
|
return _outboundSessionMaker.OnSessionEstablished(session);
|
|
}
|
|
|
|
bool
|
|
Router::GetRandomConnectedRouter(RouterContact& result) const
|
|
{
|
|
return _linkManager.GetRandomConnectedRouter(result);
|
|
}
|
|
|
|
void
|
|
Router::HandleDHTLookupForExplore(RouterID /*remote*/, const std::vector<RouterContact>& results)
|
|
{
|
|
for (const auto& rc : results)
|
|
{
|
|
_rcLookupHandler.CheckRC(rc);
|
|
}
|
|
}
|
|
|
|
// TODO: refactor callers and remove this function
|
|
void
|
|
Router::LookupRouter(RouterID remote, RouterLookupHandler resultHandler)
|
|
{
|
|
_rcLookupHandler.GetRC(
|
|
remote,
|
|
[=](const RouterID& id, const RouterContact* const rc, const RCRequestResult result) {
|
|
(void)id;
|
|
if (resultHandler)
|
|
{
|
|
std::vector<RouterContact> routers;
|
|
if (result == RCRequestResult::Success && rc != nullptr)
|
|
{
|
|
routers.push_back(*rc);
|
|
}
|
|
resultHandler(routers);
|
|
}
|
|
});
|
|
}
|
|
|
|
void
|
|
Router::SetRouterWhitelist(
|
|
const std::vector<RouterID>& whitelist,
|
|
const std::vector<RouterID>& greylist,
|
|
const std::vector<RouterID>& unfundedlist)
|
|
{
|
|
_rcLookupHandler.SetRouterWhitelist(whitelist, greylist, unfundedlist);
|
|
}
|
|
|
|
bool
|
|
Router::StartRpcServer()
|
|
{
|
|
if (enableRPCServer)
|
|
{
|
|
m_RPCServer.reset(new rpc::RpcServer{m_lmq, this});
|
|
m_RPCServer->AsyncServeRPC(rpcBindAddr);
|
|
LogInfo("Bound RPC server to ", rpcBindAddr.full_address());
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::Run()
|
|
{
|
|
if (_running || _stopping)
|
|
return false;
|
|
|
|
// set public signing key
|
|
_rc.pubkey = seckey_topublic(identity());
|
|
// set router version if service node
|
|
if (IsServiceNode())
|
|
{
|
|
_rc.routerVersion = RouterVersion(llarp::VERSION, llarp::constants::proto_version);
|
|
}
|
|
|
|
_linkManager.ForEachInboundLink([&](LinkLayer_ptr link) {
|
|
AddressInfo ai;
|
|
if (link->GetOurAddressInfo(ai))
|
|
{
|
|
// override ip and port as needed
|
|
if (_ourAddress)
|
|
{
|
|
const auto ai_ip = ai.IP();
|
|
const auto override_ip = _ourAddress->getIP();
|
|
|
|
auto ai_ip_str = var::visit([](auto&& ip) { return ip.ToString(); }, ai_ip);
|
|
auto override_ip_str = var::visit([](auto&& ip) { return ip.ToString(); }, override_ip);
|
|
|
|
if ((not Net().IsBogonIP(ai_ip)) and (not Net().IsBogonIP(override_ip))
|
|
and ai_ip != override_ip)
|
|
throw std::runtime_error{
|
|
"Lokinet is bound to public IP '{}', but public-ip is set to '{}'. Either fix the "
|
|
"[router]:public-ip setting or set a bind address in the [bind] section of the "
|
|
"config."_format(ai_ip_str, override_ip_str)};
|
|
ai.fromSockAddr(*_ourAddress);
|
|
}
|
|
if (RouterContact::BlockBogons && Net().IsBogon(ai.ip))
|
|
throw std::runtime_error{var::visit(
|
|
[](auto&& ip) {
|
|
return "cannot use " + ip.ToString()
|
|
+ " as a public ip as it is in a non routable ip range";
|
|
},
|
|
ai.IP())};
|
|
LogInfo("adding address: ", ai);
|
|
_rc.addrs.push_back(ai);
|
|
}
|
|
});
|
|
|
|
if (IsServiceNode() and not _rc.IsPublicRouter())
|
|
{
|
|
LogError("we are configured as relay but have no reachable addresses");
|
|
return false;
|
|
}
|
|
|
|
// set public encryption key
|
|
_rc.enckey = seckey_topublic(encryption());
|
|
|
|
LogInfo("Signing rc...");
|
|
if (!_rc.Sign(identity()))
|
|
{
|
|
LogError("failed to sign rc");
|
|
return false;
|
|
}
|
|
|
|
if (IsServiceNode())
|
|
{
|
|
if (!SaveRC())
|
|
{
|
|
LogError("failed to save RC");
|
|
return false;
|
|
}
|
|
}
|
|
_outboundSessionMaker.SetOurRouter(pubkey());
|
|
if (!_linkManager.StartLinks())
|
|
{
|
|
LogWarn("One or more links failed to start.");
|
|
return false;
|
|
}
|
|
|
|
if (IsServiceNode())
|
|
{
|
|
// initialize as service node
|
|
if (!InitServiceNode())
|
|
{
|
|
LogError("Failed to initialize service node");
|
|
return false;
|
|
}
|
|
const RouterID us = pubkey();
|
|
LogInfo("initalized service node: ", us);
|
|
// init gossiper here
|
|
_rcGossiper.Init(&_linkManager, us, this);
|
|
// relays do not use profiling
|
|
routerProfiling().Disable();
|
|
}
|
|
else
|
|
{
|
|
// we are a client
|
|
// regenerate keys and resign rc before everything else
|
|
CryptoManager::instance()->identity_keygen(_identity);
|
|
CryptoManager::instance()->encryption_keygen(_encryption);
|
|
_rc.pubkey = seckey_topublic(identity());
|
|
_rc.enckey = seckey_topublic(encryption());
|
|
if (!_rc.Sign(identity()))
|
|
{
|
|
LogError("failed to regenerate keys and sign RC");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
LogInfo("starting hidden service context...");
|
|
if (!hiddenServiceContext().StartAll())
|
|
{
|
|
LogError("Failed to start hidden service context");
|
|
return false;
|
|
}
|
|
|
|
{
|
|
LogInfo("Loading nodedb from disk...");
|
|
_nodedb->LoadFromDisk();
|
|
}
|
|
|
|
llarp_dht_context_start(dht(), pubkey());
|
|
|
|
for (const auto& rc : bootstrapRCList)
|
|
{
|
|
nodedb()->Put(rc);
|
|
_dht->impl->Nodes()->PutNode(rc);
|
|
LogInfo("added bootstrap node ", RouterID{rc.pubkey});
|
|
}
|
|
|
|
LogInfo("have ", _nodedb->NumLoaded(), " routers");
|
|
|
|
_loop->call_every(ROUTER_TICK_INTERVAL, weak_from_this(), [this] { Tick(); });
|
|
m_RoutePoker->Start(this);
|
|
_running.store(true);
|
|
_startedAt = Now();
|
|
if (whitelistRouters)
|
|
{
|
|
// do service node testing if we are in service node whitelist mode
|
|
_loop->call_every(consensus::REACHABILITY_TESTING_TIMER_INTERVAL, weak_from_this(), [this] {
|
|
// dont run tests if we are not running or we are stopping
|
|
if (not _running)
|
|
return;
|
|
// dont run tests if we think we should not test other routers
|
|
// this occurs when we are deregistered or do not have the service node list
|
|
// yet when we expect to have one.
|
|
if (not ShouldTestOtherRouters())
|
|
return;
|
|
auto tests = m_routerTesting.get_failing();
|
|
if (auto maybe = m_routerTesting.next_random(this))
|
|
{
|
|
tests.emplace_back(*maybe, 0);
|
|
}
|
|
for (const auto& [router, fails] : tests)
|
|
{
|
|
if (not SessionToRouterAllowed(router))
|
|
{
|
|
LogDebug(
|
|
router,
|
|
" is no longer a registered service node so we remove it from the testing list");
|
|
m_routerTesting.remove_node_from_failing(router);
|
|
continue;
|
|
}
|
|
LogDebug("Establishing session to ", router, " for SN testing");
|
|
// try to make a session to this random router
|
|
// this will do a dht lookup if needed
|
|
_outboundSessionMaker.CreateSessionTo(
|
|
router, [previous_fails = fails, this](const auto& router, const auto result) {
|
|
auto rpc = RpcClient();
|
|
|
|
if (result != SessionResult::Establish)
|
|
{
|
|
// failed connection mark it as so
|
|
m_routerTesting.add_failing_node(router, previous_fails);
|
|
LogInfo(
|
|
"FAILED SN connection test to ",
|
|
router,
|
|
" (",
|
|
previous_fails + 1,
|
|
" consecutive failures) result=",
|
|
result);
|
|
}
|
|
else
|
|
{
|
|
m_routerTesting.remove_node_from_failing(router);
|
|
if (previous_fails > 0)
|
|
{
|
|
LogInfo(
|
|
"Successful SN connection test to ",
|
|
router,
|
|
" after ",
|
|
previous_fails,
|
|
" failures");
|
|
}
|
|
else
|
|
{
|
|
LogDebug("Successful SN connection test to ", router);
|
|
}
|
|
}
|
|
if (rpc)
|
|
{
|
|
// inform as needed
|
|
rpc->InformConnection(router, result == SessionResult::Establish);
|
|
}
|
|
});
|
|
}
|
|
});
|
|
}
|
|
llarp::sys::service_manager->ready();
|
|
return _running;
|
|
}
|
|
|
|
bool
|
|
Router::IsRunning() const
|
|
{
|
|
return _running;
|
|
}
|
|
|
|
llarp_time_t
|
|
Router::Uptime() const
|
|
{
|
|
const llarp_time_t _now = Now();
|
|
if (_startedAt > 0s && _now > _startedAt)
|
|
return _now - _startedAt;
|
|
return 0s;
|
|
}
|
|
|
|
void
|
|
Router::AfterStopLinks()
|
|
{
|
|
Close();
|
|
log::debug(logcat, "stopping oxenmq");
|
|
m_lmq.reset();
|
|
}
|
|
|
|
void
|
|
Router::AfterStopIssued()
|
|
{
|
|
log::debug(logcat, "stopping links");
|
|
StopLinks();
|
|
log::debug(logcat, "saving nodedb to disk");
|
|
nodedb()->SaveToDisk();
|
|
_loop->call_later(200ms, [this] { AfterStopLinks(); });
|
|
}
|
|
|
|
void
|
|
Router::StopLinks()
|
|
{
|
|
_linkManager.Stop();
|
|
}
|
|
|
|
void
|
|
Router::Die()
|
|
{
|
|
if (!_running)
|
|
return;
|
|
if (_stopping)
|
|
return;
|
|
|
|
_stopping.store(true);
|
|
if (log::get_level_default() != log::Level::off)
|
|
log::reset_level(log::Level::info);
|
|
LogWarn("stopping router hard");
|
|
llarp::sys::service_manager->stopping();
|
|
hiddenServiceContext().StopAll();
|
|
_exitContext.Stop();
|
|
StopLinks();
|
|
Close();
|
|
}
|
|
|
|
void
|
|
Router::Stop()
|
|
{
|
|
if (!_running)
|
|
{
|
|
log::debug(logcat, "Stop called, but not running");
|
|
return;
|
|
}
|
|
if (_stopping)
|
|
{
|
|
log::debug(logcat, "Stop called, but already stopping");
|
|
return;
|
|
}
|
|
|
|
_stopping.store(true);
|
|
if (log::get_level_default() != log::Level::off)
|
|
log::reset_level(log::Level::info);
|
|
log::info(logcat, "stopping");
|
|
llarp::sys::service_manager->stopping();
|
|
log::debug(logcat, "stopping hidden service context");
|
|
hiddenServiceContext().StopAll();
|
|
log::debug(logcat, "stopping exit context");
|
|
_exitContext.Stop();
|
|
log::debug(logcat, "final upstream pump");
|
|
paths.PumpUpstream();
|
|
log::debug(logcat, "final links pump");
|
|
_linkManager.PumpLinks();
|
|
_loop->call_later(200ms, [this] { AfterStopIssued(); });
|
|
}
|
|
|
|
bool
|
|
Router::HasSessionTo(const RouterID& remote) const
|
|
{
|
|
return _linkManager.HasSessionTo(remote);
|
|
}
|
|
|
|
std::string
|
|
Router::ShortName() const
|
|
{
|
|
return RouterID(pubkey()).ToString().substr(0, 8);
|
|
}
|
|
|
|
uint32_t
|
|
Router::NextPathBuildNumber()
|
|
{
|
|
return path_build_count++;
|
|
}
|
|
|
|
void
|
|
Router::ConnectToRandomRouters(int _want)
|
|
{
|
|
const size_t want = _want;
|
|
auto connected = NumberOfConnectedRouters();
|
|
if (not IsServiceNode())
|
|
{
|
|
connected += _linkManager.NumberOfPendingConnections();
|
|
}
|
|
if (connected >= want)
|
|
return;
|
|
_outboundSessionMaker.ConnectToRandomRouters(want);
|
|
}
|
|
|
|
bool
|
|
Router::InitServiceNode()
|
|
{
|
|
LogInfo("accepting transit traffic");
|
|
paths.AllowTransit();
|
|
llarp_dht_allow_transit(dht());
|
|
_exitContext.AddExitEndpoint("default", m_Config->network, m_Config->dns);
|
|
return true;
|
|
}
|
|
|
|
bool
|
|
Router::TryConnectAsync(RouterContact rc, uint16_t tries)
|
|
{
|
|
(void)tries;
|
|
|
|
if (rc.pubkey == pubkey())
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (not _rcLookupHandler.SessionIsAllowed(rc.pubkey))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
_outboundSessionMaker.CreateSessionTo(rc, nullptr);
|
|
|
|
return true;
|
|
}
|
|
|
|
void
|
|
Router::QueueWork(std::function<void(void)> func)
|
|
{
|
|
m_lmq->job(std::move(func));
|
|
}
|
|
|
|
void
|
|
Router::QueueDiskIO(std::function<void(void)> func)
|
|
{
|
|
m_lmq->job(std::move(func), m_DiskThread);
|
|
}
|
|
|
|
bool
|
|
Router::HasClientExit() const
|
|
{
|
|
if (IsServiceNode())
|
|
return false;
|
|
const auto ep = hiddenServiceContext().GetDefault();
|
|
return ep and ep->HasExit();
|
|
}
|
|
|
|
std::optional<std::variant<nuint32_t, nuint128_t>>
|
|
Router::OurPublicIP() const
|
|
{
|
|
if (_ourAddress)
|
|
return _ourAddress->getIP();
|
|
std::optional<std::variant<nuint32_t, nuint128_t>> found;
|
|
_linkManager.ForEachInboundLink([&found](const auto& link) {
|
|
if (found)
|
|
return;
|
|
AddressInfo ai;
|
|
if (link->GetOurAddressInfo(ai))
|
|
found = ai.IP();
|
|
});
|
|
return found;
|
|
}
|
|
|
|
void
|
|
Router::InitInboundLinks()
|
|
{
|
|
auto addrs = m_Config->links.InboundListenAddrs;
|
|
if (m_isServiceNode and addrs.empty())
|
|
{
|
|
LogInfo("Inferring Public Address");
|
|
|
|
auto maybe_port = m_Config->links.PublicPort;
|
|
if (m_Config->router.PublicPort and not maybe_port)
|
|
maybe_port = m_Config->router.PublicPort;
|
|
if (not maybe_port)
|
|
maybe_port = net::port_t::from_host(constants::DefaultInboundIWPPort);
|
|
|
|
if (auto maybe_addr = Net().MaybeInferPublicAddr(*maybe_port))
|
|
{
|
|
LogInfo("Public Address looks to be ", *maybe_addr);
|
|
addrs.emplace_back(std::move(*maybe_addr));
|
|
}
|
|
}
|
|
if (m_isServiceNode and addrs.empty())
|
|
throw std::runtime_error{"we are a service node and we have no inbound links configured"};
|
|
|
|
// create inbound links, if we are a service node
|
|
for (auto bind_addr : addrs)
|
|
{
|
|
if (bind_addr.getPort() == 0)
|
|
throw std::invalid_argument{"inbound link cannot use port 0"};
|
|
|
|
if (Net().IsWildcardAddress(bind_addr.getIP()))
|
|
{
|
|
if (auto maybe_ip = OurPublicIP())
|
|
bind_addr.setIP(*maybe_ip);
|
|
else
|
|
throw std::runtime_error{"no public ip provided for inbound socket"};
|
|
}
|
|
|
|
auto server = iwp::NewInboundLink(
|
|
m_keyManager,
|
|
loop(),
|
|
util::memFn(&AbstractRouter::rc, this),
|
|
util::memFn(&AbstractRouter::HandleRecvLinkMessageBuffer, this),
|
|
util::memFn(&AbstractRouter::Sign, this),
|
|
nullptr,
|
|
util::memFn(&Router::ConnectionEstablished, this),
|
|
util::memFn(&AbstractRouter::CheckRenegotiateValid, this),
|
|
util::memFn(&Router::ConnectionTimedOut, this),
|
|
util::memFn(&AbstractRouter::SessionClosed, this),
|
|
util::memFn(&AbstractRouter::TriggerPump, this),
|
|
util::memFn(&AbstractRouter::QueueWork, this));
|
|
|
|
server->Bind(this, bind_addr);
|
|
_linkManager.AddLink(std::move(server), true);
|
|
}
|
|
}
|
|
|
|
void
|
|
Router::InitOutboundLinks()
|
|
{
|
|
auto addrs = m_Config->links.OutboundLinks;
|
|
if (addrs.empty())
|
|
addrs.emplace_back(Net().Wildcard());
|
|
|
|
for (auto& bind_addr : addrs)
|
|
{
|
|
auto link = iwp::NewOutboundLink(
|
|
m_keyManager,
|
|
loop(),
|
|
util::memFn(&AbstractRouter::rc, this),
|
|
util::memFn(&AbstractRouter::HandleRecvLinkMessageBuffer, this),
|
|
util::memFn(&AbstractRouter::Sign, this),
|
|
[this](llarp::RouterContact rc) {
|
|
if (IsServiceNode())
|
|
return;
|
|
for (const auto& addr : rc.addrs)
|
|
m_RoutePoker->AddRoute(addr.IPv4());
|
|
},
|
|
util::memFn(&Router::ConnectionEstablished, this),
|
|
util::memFn(&AbstractRouter::CheckRenegotiateValid, this),
|
|
util::memFn(&Router::ConnectionTimedOut, this),
|
|
util::memFn(&AbstractRouter::SessionClosed, this),
|
|
util::memFn(&AbstractRouter::TriggerPump, this),
|
|
util::memFn(&AbstractRouter::QueueWork, this));
|
|
|
|
const auto& net = Net();
|
|
|
|
// If outbound is set to wildcard and we have just one inbound, then bind to the inbound IP;
|
|
// if you have more than one inbound you have to be explicit about your outbound.
|
|
if (net.IsWildcardAddress(bind_addr.getIP()))
|
|
{
|
|
bool multiple = false;
|
|
_linkManager.ForEachInboundLink([&bind_addr, &multiple](const auto& link) {
|
|
if (multiple)
|
|
throw std::runtime_error{
|
|
"outbound= IP address must be specified when using multiple inbound= addresses"};
|
|
multiple = true;
|
|
bind_addr.setIP(link->LocalSocketAddr().getIP());
|
|
});
|
|
}
|
|
|
|
link->Bind(this, bind_addr);
|
|
|
|
if constexpr (llarp::platform::is_android)
|
|
m_OutboundUDPSocket = link->GetUDPFD().value_or(-1);
|
|
|
|
_linkManager.AddLink(std::move(link), false);
|
|
}
|
|
}
|
|
|
|
const llarp::net::Platform&
|
|
Router::Net() const
|
|
{
|
|
return *llarp::net::Platform::Default_ptr();
|
|
}
|
|
|
|
void
|
|
Router::MessageSent(const RouterID& remote, SendStatus status)
|
|
{
|
|
if (status == SendStatus::Success)
|
|
{
|
|
LogDebug("Message successfully sent to ", remote);
|
|
}
|
|
else
|
|
{
|
|
LogDebug("Message failed sending to ", remote);
|
|
}
|
|
}
|
|
|
|
void
|
|
Router::HandleRouterEvent(tooling::RouterEventPtr event) const
|
|
{
|
|
LogDebug(event->ToString());
|
|
}
|
|
|
|
} // namespace llarp
|