mirror of
https://github.com/openp2p-cn/openp2p.git
synced 2026-05-11 00:48:22 +08:00
Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
67e3a8915a | ||
|
|
791d910314 | ||
|
|
c3a43be3cc | ||
|
|
c8b8bf05a5 |
@@ -110,12 +110,12 @@ make
|
|||||||
4. ~~建立网站,用户可以在网站管理所有P2PApp和设备。查看设备在线状态,升级,增删查改重启P2PApp等~~(100%)
|
4. ~~建立网站,用户可以在网站管理所有P2PApp和设备。查看设备在线状态,升级,增删查改重启P2PApp等~~(100%)
|
||||||
5. 建立公众号,用户可在微信公众号管理所有P2PApp和设备
|
5. 建立公众号,用户可在微信公众号管理所有P2PApp和设备
|
||||||
6. 客户端提供WebUI
|
6. 客户端提供WebUI
|
||||||
7. 支持自有服务器,开源服务器程序
|
7. ~~支持自有服务器,开源服务器程序~~(100%)
|
||||||
8. 共享节点调度模型优化,对不同的运营商优化
|
8. 共享节点调度模型优化,对不同的运营商优化
|
||||||
9. 方便二次开发,提供API和lib
|
9. 方便二次开发,提供API和lib
|
||||||
10. 应用层支持UDP协议,实现很简单,但UDP应用较少暂不急(100%)
|
10. ~~应用层支持UDP协议,实现很简单,但UDP应用较少暂不急~~(100%)
|
||||||
11. 底层通信支持KCP协议,目前仅支持Quic;KCP专门对延时优化,被游戏加速器广泛使用,可以牺牲一定的带宽降低延时
|
11. 底层通信支持KCP协议,目前仅支持Quic;KCP专门对延时优化,被游戏加速器广泛使用,可以牺牲一定的带宽降低延时
|
||||||
12. 支持Android系统,让旧手机焕发青春变成移动网关
|
12. ~~支持Android系统,让旧手机焕发青春变成移动网关~~(100%)
|
||||||
13. 支持Windows网上邻居共享文件
|
13. 支持Windows网上邻居共享文件
|
||||||
14. 内网直连优化,用处不大,估计就用户测试时用到
|
14. 内网直连优化,用处不大,估计就用户测试时用到
|
||||||
15. ~~支持UPNP~~(100%)
|
15. ~~支持UPNP~~(100%)
|
||||||
|
|||||||
@@ -117,12 +117,12 @@ Short-Term:
|
|||||||
4. ~~Build website, users can manage all P2PApp and devices via it. View devices' online status, upgrade, restart or CURD P2PApp .~~(100%)
|
4. ~~Build website, users can manage all P2PApp and devices via it. View devices' online status, upgrade, restart or CURD P2PApp .~~(100%)
|
||||||
5. Provide wechat official account, user can manage P2PApp nodes and deivce as same as website.
|
5. Provide wechat official account, user can manage P2PApp nodes and deivce as same as website.
|
||||||
6. Provide WebUI on client side.
|
6. Provide WebUI on client side.
|
||||||
7. Support private server, open source server program.
|
7. ~~Support private server, open source server program.~~(100%)
|
||||||
8. Optimize our share scheduling model for different network operators.
|
8. Optimize our share scheduling model for different network operators.
|
||||||
9. Provide REST APIs and libary for secondary development.
|
9. Provide REST APIs and libary for secondary development.
|
||||||
10. ~~Support UDP at application layer, it is easy to implement but not urgent due to only a few applicaitons using UDP protocol.~~(100%)
|
10. ~~Support UDP at application layer, it is easy to implement but not urgent due to only a few applicaitons using UDP protocol.~~(100%)
|
||||||
11. Support KCP protocol underlay, currently support Quic only. KCP focus on delay optimization,which has been widely used as game accelerator,it can sacrifice part of bandwidth to reduce timelag.
|
11. Support KCP protocol underlay, currently support Quic only. KCP focus on delay optimization,which has been widely used as game accelerator,it can sacrifice part of bandwidth to reduce timelag.
|
||||||
12. Support Android platform, let the phones to be mobile gateway.
|
12. ~~Support Android platform, let the phones to be mobile gateway.~~(100%)
|
||||||
13. Support SMB Windows neighborhood.
|
13. Support SMB Windows neighborhood.
|
||||||
14. Direct connection on intranet, for testing.
|
14. Direct connection on intranet, for testing.
|
||||||
15. ~~Support UPNP.~~(100%)
|
15. ~~Support UPNP.~~(100%)
|
||||||
|
|||||||
17
app/README.md
Normal file
17
app/README.md
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
## Build
|
||||||
|
```
|
||||||
|
cd core
|
||||||
|
go get -v golang.org/x/mobile/bind
|
||||||
|
gomobile bind -target android -v
|
||||||
|
if [[ $? -ne 0 ]]; then
|
||||||
|
echo "build error"
|
||||||
|
exit 9
|
||||||
|
fi
|
||||||
|
echo "build ok"
|
||||||
|
cp openp2p.aar openp2p-sources.jar ../app/app/libs
|
||||||
|
echo "copy to APP libs"
|
||||||
|
|
||||||
|
cd ../app
|
||||||
|
./gradlew build
|
||||||
|
|
||||||
|
```
|
||||||
@@ -20,7 +20,6 @@ import (
|
|||||||
const MinNodeNameLen = 8
|
const MinNodeNameLen = 8
|
||||||
|
|
||||||
func getmac(ip string) string {
|
func getmac(ip string) string {
|
||||||
//get mac relative to the ip address which connected to the mq.
|
|
||||||
ifaces, err := net.Interfaces()
|
ifaces, err := net.Interfaces()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return ""
|
return ""
|
||||||
|
|||||||
@@ -62,6 +62,16 @@ func (c *Config) switchApp(app AppConfig, enabled int) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
func (c *Config) retryApp(peerNode string) {
|
||||||
|
c.mtx.Lock()
|
||||||
|
defer c.mtx.Unlock()
|
||||||
|
for i := 0; i < len(c.Apps); i++ {
|
||||||
|
if c.Apps[i].PeerNode == peerNode {
|
||||||
|
c.Apps[i].retryNum = 0
|
||||||
|
c.Apps[i].nextRetryTime = time.Now()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *Config) add(app AppConfig, override bool) {
|
func (c *Config) add(app AppConfig, override bool) {
|
||||||
c.mtx.Lock()
|
c.mtx.Lock()
|
||||||
@@ -128,10 +138,13 @@ func (c *Config) load() error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: deal with multi-thread r/w
|
||||||
func (c *Config) setToken(token uint64) {
|
func (c *Config) setToken(token uint64) {
|
||||||
c.mtx.Lock()
|
c.mtx.Lock()
|
||||||
defer c.mtx.Unlock()
|
defer c.mtx.Unlock()
|
||||||
c.Network.Token = token
|
if token != 0 {
|
||||||
|
c.Network.Token = token
|
||||||
|
}
|
||||||
}
|
}
|
||||||
func (c *Config) setUser(user string) {
|
func (c *Config) setUser(user string) {
|
||||||
c.mtx.Lock()
|
c.mtx.Lock()
|
||||||
@@ -229,7 +242,7 @@ func parseParams(subCommand string) {
|
|||||||
gConf.Network.TCPPort = *tcpPort
|
gConf.Network.TCPPort = *tcpPort
|
||||||
}
|
}
|
||||||
if f.Name == "token" {
|
if f.Name == "token" {
|
||||||
gConf.Network.Token = *token
|
gConf.setToken(*token)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ import (
|
|||||||
"path/filepath"
|
"path/filepath"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/kardianos/service"
|
"github.com/openp2p-cn/service"
|
||||||
)
|
)
|
||||||
|
|
||||||
type daemon struct {
|
type daemon struct {
|
||||||
@@ -44,9 +44,9 @@ func (d *daemon) run() {
|
|||||||
}
|
}
|
||||||
gLog.Println(LvINFO, mydir)
|
gLog.Println(LvINFO, mydir)
|
||||||
conf := &service.Config{
|
conf := &service.Config{
|
||||||
Name: ProducnName,
|
Name: ProductName,
|
||||||
DisplayName: ProducnName,
|
DisplayName: ProductName,
|
||||||
Description: ProducnName,
|
Description: ProductName,
|
||||||
Executable: binPath,
|
Executable: binPath,
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -95,9 +95,9 @@ func (d *daemon) run() {
|
|||||||
|
|
||||||
func (d *daemon) Control(ctrlComm string, exeAbsPath string, args []string) error {
|
func (d *daemon) Control(ctrlComm string, exeAbsPath string, args []string) error {
|
||||||
svcConfig := &service.Config{
|
svcConfig := &service.Config{
|
||||||
Name: ProducnName,
|
Name: ProductName,
|
||||||
DisplayName: ProducnName,
|
DisplayName: ProductName,
|
||||||
Description: ProducnName,
|
Description: ProductName,
|
||||||
Executable: exeAbsPath,
|
Executable: exeAbsPath,
|
||||||
Arguments: args,
|
Arguments: args,
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,12 +8,13 @@ import (
|
|||||||
var (
|
var (
|
||||||
// ErrorS2S string = "s2s is not supported"
|
// ErrorS2S string = "s2s is not supported"
|
||||||
// ErrorHandshake string = "handshake error"
|
// ErrorHandshake string = "handshake error"
|
||||||
ErrorS2S = errors.New("s2s is not supported")
|
ErrorS2S = errors.New("s2s is not supported")
|
||||||
ErrorHandshake = errors.New("handshake error")
|
ErrorHandshake = errors.New("handshake error")
|
||||||
ErrorNewUser = errors.New("new user")
|
ErrorNewUser = errors.New("new user")
|
||||||
ErrorLogin = errors.New("user or password not correct")
|
ErrorLogin = errors.New("user or password not correct")
|
||||||
ErrNodeTooShort = errors.New("node name too short, it must >=8 charaters")
|
ErrNodeTooShort = errors.New("node name too short, it must >=8 charaters")
|
||||||
ErrPeerOffline = errors.New("peer offline")
|
ErrPeerOffline = errors.New("peer offline")
|
||||||
ErrMsgFormat = errors.New("message format wrong")
|
ErrMsgFormat = errors.New("message format wrong")
|
||||||
ErrVersionNotCompatible = errors.New("version not compatible")
|
ErrVersionNotCompatible = errors.New("version not compatible")
|
||||||
|
ErrOverlayConnDisconnect = errors.New("overlay connection is disconnected")
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -9,6 +9,8 @@ import (
|
|||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/openp2p-cn/totp"
|
||||||
)
|
)
|
||||||
|
|
||||||
func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
||||||
@@ -26,7 +28,7 @@ func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
|||||||
gLog.Printf(LvERROR, "wrong MsgPushConnectReq:%s", err)
|
gLog.Printf(LvERROR, "wrong MsgPushConnectReq:%s", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
gLog.Printf(LvINFO, "%s is connecting...", req.From)
|
gLog.Printf(LvDEBUG, "%s is connecting...", req.From)
|
||||||
gLog.Println(LvDEBUG, "push connect response to ", req.From)
|
gLog.Println(LvDEBUG, "push connect response to ", req.From)
|
||||||
if compareVersion(req.Version, LeastSupportVersion) == LESS {
|
if compareVersion(req.Version, LeastSupportVersion) == LESS {
|
||||||
gLog.Println(LvERROR, ErrVersionNotCompatible.Error(), ":", req.From)
|
gLog.Println(LvERROR, ErrVersionNotCompatible.Error(), ":", req.From)
|
||||||
@@ -40,8 +42,9 @@ func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
|||||||
return ErrVersionNotCompatible
|
return ErrVersionNotCompatible
|
||||||
}
|
}
|
||||||
// verify totp token or token
|
// verify totp token or token
|
||||||
if VerifyTOTP(req.Token, pn.config.Token, time.Now().Unix()+(pn.serverTs-pn.localTs)) || // localTs may behind, auto adjust ts
|
t := totp.TOTP{Step: totp.RelayTOTPStep}
|
||||||
VerifyTOTP(req.Token, pn.config.Token, time.Now().Unix()) {
|
if t.Verify(req.Token, pn.config.Token, time.Now().Unix()+(pn.serverTs-pn.localTs)) || // localTs may behind, auto adjust ts
|
||||||
|
t.Verify(req.Token, pn.config.Token, time.Now().Unix()) {
|
||||||
gLog.Printf(LvINFO, "Access Granted\n")
|
gLog.Printf(LvINFO, "Access Granted\n")
|
||||||
config := AppConfig{}
|
config := AppConfig{}
|
||||||
config.peerNatType = req.NatType
|
config.peerNatType = req.NatType
|
||||||
@@ -101,7 +104,6 @@ func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
|||||||
msg := TunnelMsg{ID: t.id}
|
msg := TunnelMsg{ID: t.id}
|
||||||
pn.push(r.From, MsgPushAddRelayTunnelRsp, msg)
|
pn.push(r.From, MsgPushAddRelayTunnelRsp, msg)
|
||||||
}
|
}
|
||||||
|
|
||||||
}(req)
|
}(req)
|
||||||
case MsgPushAPPKey:
|
case MsgPushAPPKey:
|
||||||
req := APPKeySync{}
|
req := APPKeySync{}
|
||||||
@@ -272,6 +274,16 @@ func handlePush(pn *P2PNetwork, subType uint16, msg []byte) error {
|
|||||||
// disable APP
|
// disable APP
|
||||||
pn.DeleteApp(config)
|
pn.DeleteApp(config)
|
||||||
}
|
}
|
||||||
|
case MsgPushDstNodeOnline:
|
||||||
|
gLog.Println(LvINFO, "MsgPushDstNodeOnline")
|
||||||
|
app := PushDstNodeOnline{}
|
||||||
|
err := json.Unmarshal(msg[openP2PHeaderSize:], &app)
|
||||||
|
if err != nil {
|
||||||
|
gLog.Printf(LvERROR, "wrong MsgPushDstNodeOnline:%s %s", err, string(msg[openP2PHeaderSize:]))
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
gLog.Println(LvINFO, "retry peerNode ", app.Node)
|
||||||
|
gConf.retryApp(app.Node)
|
||||||
default:
|
default:
|
||||||
pn.msgMapMtx.Lock()
|
pn.msgMapMtx.Lock()
|
||||||
ch := pn.msgMap[pushHead.From]
|
ch := pn.msgMap[pushHead.From]
|
||||||
|
|||||||
@@ -67,11 +67,11 @@ func NewLogger(path string, filePrefix string, level LogLevel, maxLogSize int64,
|
|||||||
os.MkdirAll(logdir, 0777)
|
os.MkdirAll(logdir, 0777)
|
||||||
for lv := range logFileNames {
|
for lv := range logFileNames {
|
||||||
logFilePath := logdir + filePrefix + logFileNames[lv]
|
logFilePath := logdir + filePrefix + logFileNames[lv]
|
||||||
f, err := os.OpenFile(logFilePath, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666)
|
f, err := os.OpenFile(logFilePath, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0644)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
}
|
}
|
||||||
os.Chmod(logFilePath, 0666)
|
os.Chmod(logFilePath, 0644)
|
||||||
logfiles[lv] = f
|
logfiles[lv] = f
|
||||||
loggers[lv] = log.New(f, "", log.LstdFlags)
|
loggers[lv] = log.New(f, "", log.LstdFlags)
|
||||||
}
|
}
|
||||||
@@ -119,7 +119,7 @@ func (l *logger) checkFile() {
|
|||||||
backupPath := l.logDir + fname + ".0"
|
backupPath := l.logDir + fname + ".0"
|
||||||
os.Remove(backupPath)
|
os.Remove(backupPath)
|
||||||
os.Rename(l.logDir+fname, backupPath)
|
os.Rename(l.logDir+fname, backupPath)
|
||||||
newFile, e := os.OpenFile(l.logDir+fname, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666)
|
newFile, e := os.OpenFile(l.logDir+fname, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0644)
|
||||||
if e == nil {
|
if e == nil {
|
||||||
l.loggers[lv].SetOutput(newFile)
|
l.loggers[lv].SetOutput(newFile)
|
||||||
l.files[lv] = newFile
|
l.files[lv] = newFile
|
||||||
|
|||||||
@@ -91,7 +91,7 @@ func natTest(serverHost string, serverPort int, localPort int) (publicIP string,
|
|||||||
func getNATType(host string, udp1 int, udp2 int) (publicIP string, NATType int, hasIPvr int, hasUPNPorNATPMP int, err error) {
|
func getNATType(host string, udp1 int, udp2 int) (publicIP string, NATType int, hasIPvr int, hasUPNPorNATPMP int, err error) {
|
||||||
// the random local port may be used by other.
|
// the random local port may be used by other.
|
||||||
localPort := int(rand.Uint32()%15000 + 50000)
|
localPort := int(rand.Uint32()%15000 + 50000)
|
||||||
echoPort := P2PNetworkInstance(nil).config.TCPPort
|
echoPort := gConf.Network.TCPPort
|
||||||
ip1, port1, err := natTest(host, udp1, localPort)
|
ip1, port1, err := natTest(host, udp1, localPort)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", 0, 0, 0, err
|
return "", 0, 0, 0, err
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ func Run() {
|
|||||||
rand.Seed(time.Now().UnixNano())
|
rand.Seed(time.Now().UnixNano())
|
||||||
baseDir := filepath.Dir(os.Args[0])
|
baseDir := filepath.Dir(os.Args[0])
|
||||||
os.Chdir(baseDir) // for system service
|
os.Chdir(baseDir) // for system service
|
||||||
gLog = NewLogger(baseDir, ProducnName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
gLog = NewLogger(baseDir, ProductName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
||||||
// TODO: install sub command, deamon process
|
// TODO: install sub command, deamon process
|
||||||
if len(os.Args) > 1 {
|
if len(os.Args) > 1 {
|
||||||
switch os.Args[1] {
|
switch os.Args[1] {
|
||||||
@@ -21,7 +21,7 @@ func Run() {
|
|||||||
fmt.Println(OpenP2PVersion)
|
fmt.Println(OpenP2PVersion)
|
||||||
return
|
return
|
||||||
case "update":
|
case "update":
|
||||||
gLog = NewLogger(baseDir, ProducnName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
gLog = NewLogger(baseDir, ProductName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
||||||
targetPath := filepath.Join(defaultInstallPath, defaultBinName)
|
targetPath := filepath.Join(defaultInstallPath, defaultBinName)
|
||||||
d := daemon{}
|
d := daemon{}
|
||||||
err := d.Control("restart", targetPath, nil)
|
err := d.Control("restart", targetPath, nil)
|
||||||
@@ -53,6 +53,10 @@ func Run() {
|
|||||||
|
|
||||||
gLog.Println(LvINFO, &gConf)
|
gLog.Println(LvINFO, &gConf)
|
||||||
setFirewall()
|
setFirewall()
|
||||||
|
err := setRLimit()
|
||||||
|
if err != nil {
|
||||||
|
gLog.Println(LvINFO, "setRLimit error:", err)
|
||||||
|
}
|
||||||
network := P2PNetworkInstance(&gConf.Network)
|
network := P2PNetworkInstance(&gConf.Network)
|
||||||
if ok := network.Connect(30000); !ok {
|
if ok := network.Connect(30000); !ok {
|
||||||
gLog.Println(LvERROR, "P2PNetwork login error")
|
gLog.Println(LvERROR, "P2PNetwork login error")
|
||||||
@@ -70,7 +74,7 @@ var network *P2PNetwork
|
|||||||
func RunAsModule(baseDir string, token string, bw int, logLevel int) *P2PNetwork {
|
func RunAsModule(baseDir string, token string, bw int, logLevel int) *P2PNetwork {
|
||||||
rand.Seed(time.Now().UnixNano())
|
rand.Seed(time.Now().UnixNano())
|
||||||
os.Chdir(baseDir) // for system service
|
os.Chdir(baseDir) // for system service
|
||||||
gLog = NewLogger(baseDir, ProducnName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
gLog = NewLogger(baseDir, ProductName, LvDEBUG, 1024*1024, LogFileAndConsole)
|
||||||
|
|
||||||
parseParams("")
|
parseParams("")
|
||||||
|
|
||||||
|
|||||||
@@ -35,7 +35,7 @@ type overlayConn struct {
|
|||||||
// for udp
|
// for udp
|
||||||
connUDP *net.UDPConn
|
connUDP *net.UDPConn
|
||||||
remoteAddr net.Addr
|
remoteAddr net.Addr
|
||||||
udpRelayData chan []byte
|
udpData chan []byte
|
||||||
lastReadUDPTs time.Time
|
lastReadUDPTs time.Time
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -44,15 +44,15 @@ func (oConn *overlayConn) run() {
|
|||||||
defer gLog.Printf(LvDEBUG, "%d overlayConn run end", oConn.id)
|
defer gLog.Printf(LvDEBUG, "%d overlayConn run end", oConn.id)
|
||||||
oConn.running = true
|
oConn.running = true
|
||||||
oConn.lastReadUDPTs = time.Now()
|
oConn.lastReadUDPTs = time.Now()
|
||||||
buffer := make([]byte, ReadBuffLen+PaddingSize)
|
buffer := make([]byte, ReadBuffLen+PaddingSize) // 16 bytes for padding
|
||||||
readBuf := buffer[:ReadBuffLen]
|
reuseBuff := buffer[:ReadBuffLen]
|
||||||
encryptData := make([]byte, ReadBuffLen+PaddingSize) // 16 bytes for padding
|
encryptData := make([]byte, ReadBuffLen+PaddingSize) // 16 bytes for padding
|
||||||
tunnelHead := new(bytes.Buffer)
|
tunnelHead := new(bytes.Buffer)
|
||||||
relayHead := new(bytes.Buffer)
|
relayHead := new(bytes.Buffer)
|
||||||
binary.Write(relayHead, binary.LittleEndian, oConn.rtid)
|
binary.Write(relayHead, binary.LittleEndian, oConn.rtid)
|
||||||
binary.Write(tunnelHead, binary.LittleEndian, oConn.id)
|
binary.Write(tunnelHead, binary.LittleEndian, oConn.id)
|
||||||
for oConn.running && oConn.tunnel.isRuning() {
|
for oConn.running && oConn.tunnel.isRuning() {
|
||||||
buff, dataLen, err := oConn.Read(readBuf)
|
readBuff, dataLen, err := oConn.Read(reuseBuff)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if ne, ok := err.(net.Error); ok && ne.Timeout() {
|
if ne, ok := err.(net.Error); ok && ne.Timeout() {
|
||||||
continue
|
continue
|
||||||
@@ -61,9 +61,9 @@ func (oConn *overlayConn) run() {
|
|||||||
gLog.Printf(LvDEBUG, "overlayConn %d read error:%s,close it", oConn.id, err)
|
gLog.Printf(LvDEBUG, "overlayConn %d read error:%s,close it", oConn.id, err)
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
payload := buff[:dataLen]
|
payload := readBuff[:dataLen]
|
||||||
if oConn.appKey != 0 {
|
if oConn.appKey != 0 {
|
||||||
payload, _ = encryptBytes(oConn.appKeyBytes, encryptData, buffer[:dataLen], dataLen)
|
payload, _ = encryptBytes(oConn.appKeyBytes, encryptData, readBuff[:dataLen], dataLen)
|
||||||
}
|
}
|
||||||
writeBytes := append(tunnelHead.Bytes(), payload...)
|
writeBytes := append(tunnelHead.Bytes(), payload...)
|
||||||
if oConn.rtid == 0 {
|
if oConn.rtid == 0 {
|
||||||
@@ -98,7 +98,11 @@ func (oConn *overlayConn) run() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (oConn *overlayConn) Read(reuseBuff []byte) (buff []byte, n int, err error) {
|
func (oConn *overlayConn) Read(reuseBuff []byte) (buff []byte, dataLen int, err error) {
|
||||||
|
if !oConn.running {
|
||||||
|
err = ErrOverlayConnDisconnect
|
||||||
|
return
|
||||||
|
}
|
||||||
if oConn.connUDP != nil {
|
if oConn.connUDP != nil {
|
||||||
if time.Now().After(oConn.lastReadUDPTs.Add(time.Minute * 5)) {
|
if time.Now().After(oConn.lastReadUDPTs.Add(time.Minute * 5)) {
|
||||||
err = errors.New("udp close")
|
err = errors.New("udp close")
|
||||||
@@ -106,15 +110,15 @@ func (oConn *overlayConn) Read(reuseBuff []byte) (buff []byte, n int, err error)
|
|||||||
}
|
}
|
||||||
if oConn.remoteAddr != nil { // as server
|
if oConn.remoteAddr != nil { // as server
|
||||||
select {
|
select {
|
||||||
case buff = <-oConn.udpRelayData:
|
case buff = <-oConn.udpData:
|
||||||
n = len(buff)
|
dataLen = len(buff) - PaddingSize
|
||||||
oConn.lastReadUDPTs = time.Now()
|
oConn.lastReadUDPTs = time.Now()
|
||||||
case <-time.After(time.Second * 10):
|
case <-time.After(time.Second * 10):
|
||||||
err = ErrDeadlineExceeded
|
err = ErrDeadlineExceeded
|
||||||
}
|
}
|
||||||
} else { // as client
|
} else { // as client
|
||||||
oConn.connUDP.SetReadDeadline(time.Now().Add(5 * time.Second))
|
oConn.connUDP.SetReadDeadline(time.Now().Add(5 * time.Second))
|
||||||
n, _, err = oConn.connUDP.ReadFrom(reuseBuff)
|
dataLen, _, err = oConn.connUDP.ReadFrom(reuseBuff)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
oConn.lastReadUDPTs = time.Now()
|
oConn.lastReadUDPTs = time.Now()
|
||||||
}
|
}
|
||||||
@@ -122,15 +126,21 @@ func (oConn *overlayConn) Read(reuseBuff []byte) (buff []byte, n int, err error)
|
|||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
oConn.connTCP.SetReadDeadline(time.Now().Add(time.Second * 5))
|
if oConn.connTCP != nil {
|
||||||
n, err = oConn.connTCP.Read(reuseBuff)
|
oConn.connTCP.SetReadDeadline(time.Now().Add(time.Second * 5))
|
||||||
buff = reuseBuff
|
dataLen, err = oConn.connTCP.Read(reuseBuff)
|
||||||
|
buff = reuseBuff
|
||||||
|
}
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// calling by p2pTunnel
|
// calling by p2pTunnel
|
||||||
func (oConn *overlayConn) Write(buff []byte) (n int, err error) {
|
func (oConn *overlayConn) Write(buff []byte) (n int, err error) {
|
||||||
// add mutex when multi-thread calling
|
// add mutex when multi-thread calling
|
||||||
|
if !oConn.running {
|
||||||
|
return 0, ErrOverlayConnDisconnect
|
||||||
|
}
|
||||||
if oConn.connUDP != nil {
|
if oConn.connUDP != nil {
|
||||||
if oConn.remoteAddr == nil {
|
if oConn.remoteAddr == nil {
|
||||||
n, err = oConn.connUDP.Write(buff)
|
n, err = oConn.connUDP.Write(buff)
|
||||||
@@ -142,9 +152,25 @@ func (oConn *overlayConn) Write(buff []byte) (n int, err error) {
|
|||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
n, err = oConn.connTCP.Write(buff)
|
if oConn.connTCP != nil {
|
||||||
|
n, err = oConn.connTCP.Write(buff)
|
||||||
|
}
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
oConn.running = false
|
oConn.running = false
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (oConn *overlayConn) Close() (err error) {
|
||||||
|
oConn.running = false
|
||||||
|
if oConn.connTCP != nil {
|
||||||
|
oConn.connTCP.Close()
|
||||||
|
oConn.connTCP = nil
|
||||||
|
}
|
||||||
|
if oConn.connUDP != nil {
|
||||||
|
oConn.connUDP.Close()
|
||||||
|
oConn.connUDP = nil
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ func (app *p2pApp) listenTCP() error {
|
|||||||
gLog.Printf(LvDEBUG, "tcp accept on port %d start", app.config.SrcPort)
|
gLog.Printf(LvDEBUG, "tcp accept on port %d start", app.config.SrcPort)
|
||||||
defer gLog.Printf(LvDEBUG, "tcp accept on port %d end", app.config.SrcPort)
|
defer gLog.Printf(LvDEBUG, "tcp accept on port %d end", app.config.SrcPort)
|
||||||
var err error
|
var err error
|
||||||
app.listener, err = net.Listen("tcp4", fmt.Sprintf("0.0.0.0:%d", app.config.SrcPort))
|
app.listener, err = net.Listen("tcp", fmt.Sprintf("0.0.0.0:%d", app.config.SrcPort)) // support tcp4 and tcp6
|
||||||
if err != nil {
|
if err != nil {
|
||||||
gLog.Printf(LvERROR, "listen error:%s", err)
|
gLog.Printf(LvERROR, "listen error:%s", err)
|
||||||
return err
|
return err
|
||||||
@@ -114,7 +114,7 @@ func (app *p2pApp) listenUDP() error {
|
|||||||
gLog.Printf(LvERROR, "listen error:%s", err)
|
gLog.Printf(LvERROR, "listen error:%s", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
buffer := make([]byte, 64*1024)
|
buffer := make([]byte, 64*1024+PaddingSize)
|
||||||
udpID := make([]byte, 8)
|
udpID := make([]byte, 8)
|
||||||
for {
|
for {
|
||||||
app.listenerUDP.SetReadDeadline(time.Now().Add(time.Second * 10))
|
app.listenerUDP.SetReadDeadline(time.Now().Add(time.Second * 10))
|
||||||
@@ -127,8 +127,8 @@ func (app *p2pApp) listenUDP() error {
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
b := bytes.Buffer{}
|
dupData := bytes.Buffer{} // should uses memory pool
|
||||||
b.Write(buffer[:len])
|
dupData.Write(buffer[:len+PaddingSize])
|
||||||
// load from app.tunnel.overlayConns by remoteAddr error, new udp connection
|
// load from app.tunnel.overlayConns by remoteAddr error, new udp connection
|
||||||
remoteIP := strings.Split(remoteAddr.String(), ":")[0]
|
remoteIP := strings.Split(remoteAddr.String(), ":")[0]
|
||||||
port, _ := strconv.Atoi(strings.Split(remoteAddr.String(), ":")[1])
|
port, _ := strconv.Atoi(strings.Split(remoteAddr.String(), ":")[1])
|
||||||
@@ -139,19 +139,19 @@ func (app *p2pApp) listenUDP() error {
|
|||||||
udpID[3] = a[3]
|
udpID[3] = a[3]
|
||||||
udpID[4] = byte(port)
|
udpID[4] = byte(port)
|
||||||
udpID[5] = byte(port >> 8)
|
udpID[5] = byte(port >> 8)
|
||||||
id := binary.LittleEndian.Uint64(udpID)
|
id := binary.LittleEndian.Uint64(udpID) // convert remoteIP:port to uint64
|
||||||
s, ok := app.tunnel.overlayConns.Load(id)
|
s, ok := app.tunnel.overlayConns.Load(id)
|
||||||
if !ok {
|
if !ok {
|
||||||
oConn := overlayConn{
|
oConn := overlayConn{
|
||||||
tunnel: app.tunnel,
|
tunnel: app.tunnel,
|
||||||
connUDP: app.listenerUDP,
|
connUDP: app.listenerUDP,
|
||||||
remoteAddr: remoteAddr,
|
remoteAddr: remoteAddr,
|
||||||
udpRelayData: make(chan []byte, 1000),
|
udpData: make(chan []byte, 1000),
|
||||||
id: id,
|
id: id,
|
||||||
isClient: true,
|
isClient: true,
|
||||||
rtid: app.rtid,
|
rtid: app.rtid,
|
||||||
appID: app.id,
|
appID: app.id,
|
||||||
appKey: app.key,
|
appKey: app.key,
|
||||||
}
|
}
|
||||||
// calc key bytes for encrypt
|
// calc key bytes for encrypt
|
||||||
if oConn.appKey != 0 {
|
if oConn.appKey != 0 {
|
||||||
@@ -181,7 +181,7 @@ func (app *p2pApp) listenUDP() error {
|
|||||||
app.tunnel.conn.WriteBytes(MsgP2P, MsgRelayData, msgWithHead)
|
app.tunnel.conn.WriteBytes(MsgP2P, MsgRelayData, msgWithHead)
|
||||||
}
|
}
|
||||||
go oConn.run()
|
go oConn.run()
|
||||||
oConn.udpRelayData <- b.Bytes()
|
oConn.udpData <- dupData.Bytes()
|
||||||
}
|
}
|
||||||
|
|
||||||
// load from app.tunnel.overlayConns by remoteAddr ok, write relay data
|
// load from app.tunnel.overlayConns by remoteAddr ok, write relay data
|
||||||
@@ -189,7 +189,7 @@ func (app *p2pApp) listenUDP() error {
|
|||||||
if !ok {
|
if !ok {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
overlayConn.udpRelayData <- b.Bytes()
|
overlayConn.udpData <- dupData.Bytes()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
@@ -204,12 +204,15 @@ func (app *p2pApp) listen() error {
|
|||||||
if app.rtid != 0 {
|
if app.rtid != 0 {
|
||||||
go app.relayHeartbeatLoop()
|
go app.relayHeartbeatLoop()
|
||||||
}
|
}
|
||||||
for app.tunnel.isRuning() && app.running {
|
for app.tunnel.isRuning() {
|
||||||
if app.config.Protocol == "udp" {
|
if app.config.Protocol == "udp" {
|
||||||
app.listenUDP()
|
app.listenUDP()
|
||||||
} else {
|
} else {
|
||||||
app.listenTCP()
|
app.listenTCP()
|
||||||
}
|
}
|
||||||
|
if !app.running {
|
||||||
|
break
|
||||||
|
}
|
||||||
time.Sleep(time.Second * 10)
|
time.Sleep(time.Second * 10)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -7,7 +7,6 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"math"
|
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
@@ -23,16 +22,21 @@ var (
|
|||||||
once sync.Once
|
once sync.Once
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
retryLimit = 20
|
||||||
|
retryInterval = 10 * time.Second
|
||||||
|
)
|
||||||
|
|
||||||
type P2PNetwork struct {
|
type P2PNetwork struct {
|
||||||
conn *websocket.Conn
|
conn *websocket.Conn
|
||||||
online bool
|
online bool
|
||||||
running bool
|
running bool
|
||||||
restartCh chan bool
|
restartCh chan bool
|
||||||
wg sync.WaitGroup
|
wgReconnect sync.WaitGroup
|
||||||
writeMtx sync.Mutex
|
writeMtx sync.Mutex
|
||||||
serverTs int64
|
serverTs int64
|
||||||
localTs int64
|
localTs int64
|
||||||
hbTime time.Time
|
hbTime time.Time
|
||||||
// msgMap sync.Map
|
// msgMap sync.Map
|
||||||
msgMap map[uint64]chan []byte //key: nodeID
|
msgMap map[uint64]chan []byte //key: nodeID
|
||||||
msgMapMtx sync.Mutex
|
msgMapMtx sync.Mutex
|
||||||
@@ -64,7 +68,6 @@ func P2PNetworkInstance(config *NetworkConfig) *P2PNetwork {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (pn *P2PNetwork) run() {
|
func (pn *P2PNetwork) run() {
|
||||||
go pn.autorunApp()
|
|
||||||
heartbeatTimer := time.NewTicker(NetworkHeartbeatTime)
|
heartbeatTimer := time.NewTicker(NetworkHeartbeatTime)
|
||||||
for pn.running {
|
for pn.running {
|
||||||
select {
|
select {
|
||||||
@@ -73,8 +76,8 @@ func (pn *P2PNetwork) run() {
|
|||||||
|
|
||||||
case <-pn.restartCh:
|
case <-pn.restartCh:
|
||||||
pn.online = false
|
pn.online = false
|
||||||
pn.wg.Wait() // wait read/write goroutine exited
|
pn.wgReconnect.Wait() // wait read/autorunapp goroutine end
|
||||||
time.Sleep(NetworkHeartbeatTime)
|
time.Sleep(NatTestTimeout)
|
||||||
err := pn.init()
|
err := pn.init()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
gLog.Println(LvERROR, "P2PNetwork init error:", err)
|
gLog.Println(LvERROR, "P2PNetwork init error:", err)
|
||||||
@@ -121,41 +124,39 @@ func (pn *P2PNetwork) runAll() {
|
|||||||
if appExist {
|
if appExist {
|
||||||
pn.DeleteApp(*config)
|
pn.DeleteApp(*config)
|
||||||
}
|
}
|
||||||
if config.retryNum > 0 {
|
if config.retryNum >= retryLimit {
|
||||||
gLog.Printf(LvINFO, "detect app %s disconnect, reconnecting the %d times...", config.AppName, config.retryNum)
|
|
||||||
if time.Now().Add(-time.Minute * 15).After(config.retryTime) { // normal lasts 15min
|
|
||||||
config.retryNum = 0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
config.retryNum++
|
|
||||||
config.retryTime = time.Now()
|
|
||||||
increase := math.Pow(1.5, float64(config.retryNum)) // exponential increase retry time. 1.5^x
|
|
||||||
if increase > 900 {
|
|
||||||
increase = 900
|
|
||||||
config.Enabled = 0
|
|
||||||
gLog.Printf(LvWARN, "app %s has stopped retry, manually enable it on Web console", config.AppName)
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
config.nextRetryTime = time.Now().Add(time.Second * time.Duration(increase))
|
|
||||||
|
if time.Now().Add(-time.Minute * 15).After(config.retryTime) { // run normally 15min, reset retrynum
|
||||||
|
config.retryNum = 0
|
||||||
|
}
|
||||||
|
|
||||||
|
config.retryNum++
|
||||||
|
gLog.Printf(LvINFO, "detect app %s disconnect, reconnecting the %d times...", config.AppName, config.retryNum)
|
||||||
|
config.retryTime = time.Now()
|
||||||
|
config.nextRetryTime = time.Now().Add(retryInterval)
|
||||||
config.connectTime = time.Now()
|
config.connectTime = time.Now()
|
||||||
config.peerToken = pn.config.Token
|
config.peerToken = pn.config.Token
|
||||||
gConf.mtx.Unlock() // AddApp will take a period of time
|
gConf.mtx.Unlock() // AddApp will take a period of time, let outside modify gConf
|
||||||
err := pn.AddApp(*config)
|
err := pn.AddApp(*config)
|
||||||
gConf.mtx.Lock()
|
gConf.mtx.Lock()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
config.errMsg = err.Error()
|
config.errMsg = err.Error()
|
||||||
|
if err == ErrPeerOffline { // stop retry, waiting for online
|
||||||
|
config.retryNum = retryLimit
|
||||||
|
gLog.Printf(LvINFO, " %s offline, it will auto reconnect when peer node online", config.PeerNode)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
func (pn *P2PNetwork) autorunApp() {
|
func (pn *P2PNetwork) autorunApp() {
|
||||||
gLog.Println(LvINFO, "autorunApp start")
|
gLog.Println(LvINFO, "autorunApp start")
|
||||||
for pn.running {
|
pn.wgReconnect.Add(1)
|
||||||
|
defer pn.wgReconnect.Done()
|
||||||
|
for pn.running && pn.online {
|
||||||
time.Sleep(time.Second)
|
time.Sleep(time.Second)
|
||||||
if !pn.online {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
pn.runAll()
|
pn.runAll()
|
||||||
time.Sleep(time.Second * 10)
|
|
||||||
}
|
}
|
||||||
gLog.Println(LvINFO, "autorunApp end")
|
gLog.Println(LvINFO, "autorunApp end")
|
||||||
}
|
}
|
||||||
@@ -369,9 +370,10 @@ func (pn *P2PNetwork) addDirectTunnel(config AppConfig, tid uint64) (*P2PTunnel,
|
|||||||
initErr := t.requestPeerInfo()
|
initErr := t.requestPeerInfo()
|
||||||
if initErr != nil {
|
if initErr != nil {
|
||||||
gLog.Println(LvERROR, "init error:", initErr)
|
gLog.Println(LvERROR, "init error:", initErr)
|
||||||
|
|
||||||
return nil, initErr
|
return nil, initErr
|
||||||
}
|
}
|
||||||
err := ErrorHandshake
|
var err error
|
||||||
// try TCP6
|
// try TCP6
|
||||||
if IsIPv6(t.config.peerIPv6) && IsIPv6(t.pn.config.publicIPv6) {
|
if IsIPv6(t.config.peerIPv6) && IsIPv6(t.pn.config.publicIPv6) {
|
||||||
gLog.Println(LvINFO, "try TCP6")
|
gLog.Println(LvINFO, "try TCP6")
|
||||||
@@ -417,7 +419,7 @@ func (pn *P2PNetwork) addDirectTunnel(config AppConfig, tid uint64) (*P2PTunnel,
|
|||||||
return t, nil
|
return t, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nil, err
|
return nil, ErrorHandshake // only ErrorHandshake will try relay
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pn *P2PNetwork) newTunnel(t *P2PTunnel, tid uint64, isClient bool) error {
|
func (pn *P2PNetwork) newTunnel(t *P2PTunnel, tid uint64, isClient bool) error {
|
||||||
@@ -440,6 +442,8 @@ func (pn *P2PNetwork) newTunnel(t *P2PTunnel, tid uint64, isClient bool) error {
|
|||||||
}
|
}
|
||||||
func (pn *P2PNetwork) init() error {
|
func (pn *P2PNetwork) init() error {
|
||||||
gLog.Println(LvINFO, "init start")
|
gLog.Println(LvINFO, "init start")
|
||||||
|
pn.wgReconnect.Add(1)
|
||||||
|
defer pn.wgReconnect.Done()
|
||||||
var err error
|
var err error
|
||||||
for {
|
for {
|
||||||
// detect nat type
|
// detect nat type
|
||||||
@@ -449,12 +453,14 @@ func (pn *P2PNetwork) init() error {
|
|||||||
pn.config.natType = NATSymmetric
|
pn.config.natType = NATSymmetric
|
||||||
pn.config.hasIPv4 = 0
|
pn.config.hasIPv4 = 0
|
||||||
pn.config.hasUPNPorNATPMP = 0
|
pn.config.hasUPNPorNATPMP = 0
|
||||||
|
gLog.Println(LvINFO, "openp2pS2STest debug")
|
||||||
|
|
||||||
}
|
}
|
||||||
if strings.Contains(pn.config.Node, "openp2pC2CTest") {
|
if strings.Contains(pn.config.Node, "openp2pC2CTest") {
|
||||||
pn.config.natType = NATCone
|
pn.config.natType = NATCone
|
||||||
pn.config.hasIPv4 = 0
|
pn.config.hasIPv4 = 0
|
||||||
pn.config.hasUPNPorNATPMP = 0
|
pn.config.hasUPNPorNATPMP = 0
|
||||||
|
gLog.Println(LvINFO, "openp2pC2CTest debug")
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
gLog.Println(LvDEBUG, "detect NAT type error:", err)
|
gLog.Println(LvDEBUG, "detect NAT type error:", err)
|
||||||
@@ -490,27 +496,29 @@ func (pn *P2PNetwork) init() error {
|
|||||||
go pn.readLoop()
|
go pn.readLoop()
|
||||||
pn.config.mac = getmac(pn.config.localIP)
|
pn.config.mac = getmac(pn.config.localIP)
|
||||||
pn.config.os = getOsName()
|
pn.config.os = getOsName()
|
||||||
|
go func() {
|
||||||
req := ReportBasic{
|
req := ReportBasic{
|
||||||
Mac: pn.config.mac,
|
Mac: pn.config.mac,
|
||||||
LanIP: pn.config.localIP,
|
LanIP: pn.config.localIP,
|
||||||
OS: pn.config.os,
|
OS: pn.config.os,
|
||||||
HasIPv4: pn.config.hasIPv4,
|
HasIPv4: pn.config.hasIPv4,
|
||||||
HasUPNPorNATPMP: pn.config.hasUPNPorNATPMP,
|
HasUPNPorNATPMP: pn.config.hasUPNPorNATPMP,
|
||||||
Version: OpenP2PVersion,
|
Version: OpenP2PVersion,
|
||||||
}
|
|
||||||
rsp := netInfo()
|
|
||||||
gLog.Println(LvDEBUG, "netinfo:", rsp)
|
|
||||||
if rsp != nil && rsp.Country != "" {
|
|
||||||
if IsIPv6(rsp.IP.String()) {
|
|
||||||
pn.config.publicIPv6 = rsp.IP.String()
|
|
||||||
}
|
}
|
||||||
req.NetInfo = *rsp
|
rsp := netInfo()
|
||||||
} else {
|
gLog.Println(LvDEBUG, "netinfo:", rsp)
|
||||||
pn.refreshIPv6(true)
|
if rsp != nil && rsp.Country != "" {
|
||||||
}
|
if IsIPv6(rsp.IP.String()) {
|
||||||
req.IPv6 = pn.config.publicIPv6
|
pn.config.publicIPv6 = rsp.IP.String()
|
||||||
pn.write(MsgReport, MsgReportBasic, &req)
|
}
|
||||||
|
req.NetInfo = *rsp
|
||||||
|
} else {
|
||||||
|
pn.refreshIPv6(true)
|
||||||
|
}
|
||||||
|
req.IPv6 = pn.config.publicIPv6
|
||||||
|
pn.write(MsgReport, MsgReportBasic, &req)
|
||||||
|
}()
|
||||||
|
go pn.autorunApp()
|
||||||
gLog.Println(LvDEBUG, "P2PNetwork init ok")
|
gLog.Println(LvDEBUG, "P2PNetwork init ok")
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
@@ -550,6 +558,7 @@ func (pn *P2PNetwork) handleMessage(t int, msg []byte) {
|
|||||||
gConf.setUser(rsp.User)
|
gConf.setUser(rsp.User)
|
||||||
if len(rsp.Node) >= MinNodeNameLen {
|
if len(rsp.Node) >= MinNodeNameLen {
|
||||||
gConf.setNode(rsp.Node)
|
gConf.setNode(rsp.Node)
|
||||||
|
pn.config.Node = rsp.Node
|
||||||
}
|
}
|
||||||
gConf.save()
|
gConf.save()
|
||||||
pn.localTs = time.Now().Unix()
|
pn.localTs = time.Now().Unix()
|
||||||
@@ -571,8 +580,8 @@ func (pn *P2PNetwork) handleMessage(t int, msg []byte) {
|
|||||||
|
|
||||||
func (pn *P2PNetwork) readLoop() {
|
func (pn *P2PNetwork) readLoop() {
|
||||||
gLog.Printf(LvDEBUG, "P2PNetwork readLoop start")
|
gLog.Printf(LvDEBUG, "P2PNetwork readLoop start")
|
||||||
pn.wg.Add(1)
|
pn.wgReconnect.Add(1)
|
||||||
defer pn.wg.Done()
|
defer pn.wgReconnect.Done()
|
||||||
for pn.running {
|
for pn.running {
|
||||||
pn.conn.SetReadDeadline(time.Now().Add(NetworkHeartbeatTime + 10*time.Second))
|
pn.conn.SetReadDeadline(time.Now().Add(NetworkHeartbeatTime + 10*time.Second))
|
||||||
t, msg, err := pn.conn.ReadMessage()
|
t, msg, err := pn.conn.ReadMessage()
|
||||||
@@ -599,7 +608,6 @@ func (pn *P2PNetwork) write(mainType uint16, subType uint16, packet interface{})
|
|||||||
defer pn.writeMtx.Unlock()
|
defer pn.writeMtx.Unlock()
|
||||||
if err = pn.conn.WriteMessage(websocket.BinaryMessage, msg); err != nil {
|
if err = pn.conn.WriteMessage(websocket.BinaryMessage, msg); err != nil {
|
||||||
gLog.Printf(LvERROR, "write msgType %d,%d error:%s", mainType, subType, err)
|
gLog.Printf(LvERROR, "write msgType %d,%d error:%s", mainType, subType, err)
|
||||||
pn.conn.Close()
|
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@@ -642,7 +650,6 @@ func (pn *P2PNetwork) push(to string, subType uint16, packet interface{}) error
|
|||||||
defer pn.writeMtx.Unlock()
|
defer pn.writeMtx.Unlock()
|
||||||
if err = pn.conn.WriteMessage(websocket.BinaryMessage, pushMsg); err != nil {
|
if err = pn.conn.WriteMessage(websocket.BinaryMessage, pushMsg); err != nil {
|
||||||
gLog.Printf(LvERROR, "push to %s error:%s", to, err)
|
gLog.Printf(LvERROR, "push to %s error:%s", to, err)
|
||||||
pn.conn.Close()
|
|
||||||
}
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -106,7 +106,7 @@ func (t *P2PTunnel) connect() error {
|
|||||||
AppKey: appKey,
|
AppKey: appKey,
|
||||||
Version: OpenP2PVersion,
|
Version: OpenP2PVersion,
|
||||||
LinkMode: t.config.linkMode,
|
LinkMode: t.config.linkMode,
|
||||||
IsUnderlayServer: t.config.isUnderlayServer ^ 1,
|
IsUnderlayServer: t.config.isUnderlayServer ^ 1, // peer
|
||||||
}
|
}
|
||||||
if req.Token == 0 { // no relay token
|
if req.Token == 0 { // no relay token
|
||||||
req.Token = t.pn.config.Token
|
req.Token = t.pn.config.Token
|
||||||
@@ -154,6 +154,9 @@ func (t *P2PTunnel) setRun(running bool) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (t *P2PTunnel) isActive() bool {
|
func (t *P2PTunnel) isActive() bool {
|
||||||
|
if !t.isRuning() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
t.hbMtx.Lock()
|
t.hbMtx.Lock()
|
||||||
defer t.hbMtx.Unlock()
|
defer t.hbMtx.Unlock()
|
||||||
return time.Now().Before(t.hbTime.Add(TunnelIdleTimeout))
|
return time.Now().Before(t.hbTime.Add(TunnelIdleTimeout))
|
||||||
@@ -525,7 +528,7 @@ func (t *P2PTunnel) readLoop() {
|
|||||||
|
|
||||||
// calc key bytes for encrypt
|
// calc key bytes for encrypt
|
||||||
if oConn.appKey != 0 {
|
if oConn.appKey != 0 {
|
||||||
encryptKey := make([]byte, 16)
|
encryptKey := make([]byte, AESKeySize)
|
||||||
binary.LittleEndian.PutUint64(encryptKey, oConn.appKey)
|
binary.LittleEndian.PutUint64(encryptKey, oConn.appKey)
|
||||||
binary.LittleEndian.PutUint64(encryptKey[8:], oConn.appKey)
|
binary.LittleEndian.PutUint64(encryptKey[8:], oConn.appKey)
|
||||||
oConn.appKeyBytes = encryptKey
|
oConn.appKeyBytes = encryptKey
|
||||||
@@ -545,7 +548,7 @@ func (t *P2PTunnel) readLoop() {
|
|||||||
i, ok := t.overlayConns.Load(overlayID)
|
i, ok := t.overlayConns.Load(overlayID)
|
||||||
if ok {
|
if ok {
|
||||||
oConn := i.(*overlayConn)
|
oConn := i.(*overlayConn)
|
||||||
oConn.running = false
|
oConn.Close()
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
}
|
}
|
||||||
@@ -607,14 +610,7 @@ func (t *P2PTunnel) closeOverlayConns(appID uint64) {
|
|||||||
t.overlayConns.Range(func(_, i interface{}) bool {
|
t.overlayConns.Range(func(_, i interface{}) bool {
|
||||||
oConn := i.(*overlayConn)
|
oConn := i.(*overlayConn)
|
||||||
if oConn.appID == appID {
|
if oConn.appID == appID {
|
||||||
if oConn.connTCP != nil {
|
oConn.Close()
|
||||||
oConn.connTCP.Close()
|
|
||||||
oConn.connTCP = nil
|
|
||||||
}
|
|
||||||
if oConn.connUDP != nil {
|
|
||||||
oConn.connUDP.Close()
|
|
||||||
oConn.connUDP = nil
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return true
|
return true
|
||||||
})
|
})
|
||||||
|
|||||||
@@ -10,8 +10,8 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
const OpenP2PVersion = "3.5.2"
|
const OpenP2PVersion = "3.6.8"
|
||||||
const ProducnName string = "openp2p"
|
const ProductName string = "openp2p"
|
||||||
const LeastSupportVersion = "3.0.0"
|
const LeastSupportVersion = "3.0.0"
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -96,6 +96,7 @@ const (
|
|||||||
MsgPushEditNode = 12
|
MsgPushEditNode = 12
|
||||||
MsgPushAPPKey = 13
|
MsgPushAPPKey = 13
|
||||||
MsgPushReportLog = 14
|
MsgPushReportLog = 14
|
||||||
|
MsgPushDstNodeOnline = 15
|
||||||
)
|
)
|
||||||
|
|
||||||
// MsgP2P sub type message
|
// MsgP2P sub type message
|
||||||
@@ -146,7 +147,7 @@ const (
|
|||||||
MaxRetry = 10
|
MaxRetry = 10
|
||||||
RetryInterval = time.Second * 30
|
RetryInterval = time.Second * 30
|
||||||
PublicIPEchoTimeout = time.Second * 1
|
PublicIPEchoTimeout = time.Second * 1
|
||||||
NatTestTimeout = time.Second * 10
|
NatTestTimeout = time.Second * 5
|
||||||
ClientAPITimeout = time.Second * 10
|
ClientAPITimeout = time.Second * 10
|
||||||
MaxDirectTry = 3
|
MaxDirectTry = 3
|
||||||
)
|
)
|
||||||
@@ -223,6 +224,9 @@ type PushConnectReq struct {
|
|||||||
LinkMode string `json:"linkMode,omitempty"`
|
LinkMode string `json:"linkMode,omitempty"`
|
||||||
IsUnderlayServer int `json:"isServer,omitempty"` // Requset spec peer is server
|
IsUnderlayServer int `json:"isServer,omitempty"` // Requset spec peer is server
|
||||||
}
|
}
|
||||||
|
type PushDstNodeOnline struct {
|
||||||
|
Node string `json:"node,omitempty"`
|
||||||
|
}
|
||||||
type PushConnectRsp struct {
|
type PushConnectRsp struct {
|
||||||
Error int `json:"error,omitempty"`
|
Error int `json:"error,omitempty"`
|
||||||
From string `json:"from,omitempty"`
|
From string `json:"from,omitempty"`
|
||||||
|
|||||||
35
core/totp.go
35
core/totp.go
@@ -1,35 +0,0 @@
|
|||||||
// Time-based One-time Password
|
|
||||||
package openp2p
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/hmac"
|
|
||||||
"crypto/sha256"
|
|
||||||
"encoding/binary"
|
|
||||||
)
|
|
||||||
|
|
||||||
const TOTPStep = 30 // 30s
|
|
||||||
func GenTOTP(token uint64, ts int64) uint64 {
|
|
||||||
step := ts / TOTPStep
|
|
||||||
tbuff := make([]byte, 8)
|
|
||||||
binary.LittleEndian.PutUint64(tbuff, token)
|
|
||||||
mac := hmac.New(sha256.New, tbuff)
|
|
||||||
b := make([]byte, 8)
|
|
||||||
binary.LittleEndian.PutUint64(b, uint64(step))
|
|
||||||
mac.Write(b)
|
|
||||||
num := binary.LittleEndian.Uint64(mac.Sum(nil)[:8])
|
|
||||||
// fmt.Printf("%x\n", mac.Sum(nil))
|
|
||||||
return num
|
|
||||||
}
|
|
||||||
|
|
||||||
func VerifyTOTP(code uint64, token uint64, ts int64) bool {
|
|
||||||
if code == 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
if code == token {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
if code == GenTOTP(token, ts) || code == GenTOTP(token, ts-TOTPStep) || code == GenTOTP(token, ts+TOTPStep) {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
@@ -1,36 +0,0 @@
|
|||||||
// Time-based One-time Password
|
|
||||||
package openp2p
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestTOTP(t *testing.T) {
|
|
||||||
for i := 0; i < 20; i++ {
|
|
||||||
ts := time.Now().Unix()
|
|
||||||
code := GenTOTP(13666999958022769123, ts)
|
|
||||||
t.Log(code)
|
|
||||||
if !VerifyTOTP(code, 13666999958022769123, ts) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
if !VerifyTOTP(code, 13666999958022769123, ts-10) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
if !VerifyTOTP(code, 13666999958022769123, ts+10) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
if VerifyTOTP(code, 13666999958022769123, ts+60) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
if VerifyTOTP(code, 13666999958022769124, ts+1) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
if VerifyTOTP(code, 13666999958022769125, ts+1) {
|
|
||||||
t.Error("TOTP error")
|
|
||||||
}
|
|
||||||
time.Sleep(time.Second)
|
|
||||||
t.Log("round", i, " ", ts, " test ok")
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -21,7 +21,7 @@ func setRLimit() error {
|
|||||||
if err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
if err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
limit.Cur = 10240
|
limit.Cur = 65536
|
||||||
if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ func setRLimit() error {
|
|||||||
if err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
if err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
limit.Max = 1024 * 1024
|
limit.Max = 65536
|
||||||
limit.Cur = limit.Max
|
limit.Cur = limit.Max
|
||||||
if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, &limit); err != nil {
|
||||||
return err
|
return err
|
||||||
|
|||||||
@@ -45,9 +45,9 @@ func setFirewall() {
|
|||||||
}
|
}
|
||||||
if isXP {
|
if isXP {
|
||||||
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh firewall del allowedprogram "%s"`, fullPath)).Run()
|
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh firewall del allowedprogram "%s"`, fullPath)).Run()
|
||||||
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh firewall add allowedprogram "%s" "%s" ENABLE`, ProducnName, fullPath)).Run()
|
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh firewall add allowedprogram "%s" "%s" ENABLE`, ProductName, fullPath)).Run()
|
||||||
} else { // win7 or later
|
} else { // win7 or later
|
||||||
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh advfirewall firewall del rule name="%s"`, ProducnName)).Run()
|
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh advfirewall firewall del rule name="%s"`, ProductName)).Run()
|
||||||
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh advfirewall firewall add rule name="%s" dir=in action=allow program="%s" enable=yes`, ProducnName, fullPath)).Run()
|
exec.Command("cmd.exe", `/c`, fmt.Sprintf(`netsh advfirewall firewall add rule name="%s" dir=in action=allow program="%s" enable=yes`, ProductName, fullPath)).Run()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
5
go.mod
5
go.mod
@@ -4,9 +4,10 @@ go 1.18
|
|||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/gorilla/websocket v1.4.2
|
github.com/gorilla/websocket v1.4.2
|
||||||
github.com/kardianos/service v1.2.0
|
|
||||||
github.com/lucas-clemente/quic-go v0.27.0
|
github.com/lucas-clemente/quic-go v0.27.0
|
||||||
github.com/openp2p-cn/go-reuseport v0.3.2
|
github.com/openp2p-cn/go-reuseport v0.3.2
|
||||||
|
github.com/openp2p-cn/service v1.0.0
|
||||||
|
github.com/openp2p-cn/totp v0.0.0-20230102121327-8e02f6b392ed
|
||||||
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f
|
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -14,6 +15,7 @@ require (
|
|||||||
github.com/cheekybits/genny v1.0.0 // indirect
|
github.com/cheekybits/genny v1.0.0 // indirect
|
||||||
github.com/fsnotify/fsnotify v1.4.9 // indirect
|
github.com/fsnotify/fsnotify v1.4.9 // indirect
|
||||||
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 // indirect
|
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 // indirect
|
||||||
|
github.com/kardianos/service v1.2.2 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.5 // indirect
|
github.com/marten-seemann/qtls-go1-16 v0.1.5 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.1 // indirect
|
github.com/marten-seemann/qtls-go1-17 v0.1.1 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-18 v0.1.1 // indirect
|
github.com/marten-seemann/qtls-go1-18 v0.1.1 // indirect
|
||||||
@@ -23,5 +25,6 @@ require (
|
|||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 // indirect
|
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 // indirect
|
||||||
golang.org/x/net v0.0.0-20220722155237-a158d28d115b // indirect
|
golang.org/x/net v0.0.0-20220722155237-a158d28d115b // indirect
|
||||||
golang.org/x/tools v0.1.12 // indirect
|
golang.org/x/tools v0.1.12 // indirect
|
||||||
|
google.golang.org/protobuf v1.28.1 // indirect
|
||||||
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect
|
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect
|
||||||
)
|
)
|
||||||
|
|||||||
Reference in New Issue
Block a user