2018-04-23 23:42:16 +02:00
|
|
|
import os
|
2018-04-04 14:14:22 +02:00
|
|
|
import RNS
|
2018-04-17 17:46:48 +02:00
|
|
|
import time
|
|
|
|
import threading
|
|
|
|
from time import sleep
|
2018-04-24 18:01:52 +02:00
|
|
|
import vendor.umsgpack as umsgpack
|
2016-06-03 19:02:02 +02:00
|
|
|
|
|
|
|
class Transport:
|
2018-03-19 16:39:08 +01:00
|
|
|
# Constants
|
|
|
|
BROADCAST = 0x00;
|
|
|
|
TRANSPORT = 0x01;
|
|
|
|
RELAY = 0x02;
|
|
|
|
TUNNEL = 0x03;
|
|
|
|
types = [BROADCAST, TRANSPORT, RELAY, TUNNEL]
|
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
interfaces = [] # All active interfaces
|
|
|
|
destinations = [] # All active destinations
|
|
|
|
pending_links = [] # Links that are being established
|
|
|
|
active_links = [] # Links that are active
|
|
|
|
packet_hashlist = [] # A list of packet hashes for duplicate detection
|
|
|
|
receipts = [] # Receipts of all outgoing packets for proof processing
|
|
|
|
|
|
|
|
jobs_locked = False
|
|
|
|
jobs_running = False
|
|
|
|
job_interval = 0.250
|
|
|
|
receipts_last_checked = 0.0
|
|
|
|
receipts_check_interval = 1.0
|
|
|
|
hashlist_maxsize = 1000000
|
|
|
|
|
2018-04-24 17:50:58 +02:00
|
|
|
identity = None
|
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
@staticmethod
|
2018-04-24 17:50:58 +02:00
|
|
|
def start():
|
|
|
|
if Transport.identity == None:
|
|
|
|
transport_identity_path = RNS.Reticulum.configdir+"/transportidentity"
|
|
|
|
if os.path.isfile(transport_identity_path):
|
|
|
|
Transport.identity = RNS.Identity.from_file(transport_identity_path)
|
|
|
|
|
|
|
|
if Transport.identity == None:
|
|
|
|
RNS.log("No valid Transport Identity on disk, creating...", RNS.LOG_VERBOSE)
|
|
|
|
Transport.identity = RNS.Identity()
|
|
|
|
Transport.identity.save(transport_identity_path)
|
|
|
|
else:
|
|
|
|
RNS.log("Loaded Transport Identity from disk", RNS.LOG_VERBOSE)
|
|
|
|
|
2018-04-24 18:01:52 +02:00
|
|
|
packet_hashlist_path = RNS.Reticulum.configdir+"/packet_hashlist"
|
|
|
|
if os.path.isfile(packet_hashlist_path):
|
|
|
|
try:
|
|
|
|
file = open(packet_hashlist_path, "r")
|
|
|
|
Transport.packet_hashlist = umsgpack.unpackb(file.read())
|
|
|
|
file.close()
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Could not load packet hashlist from disk, the contained exception was: "+str(e), RNS.LOG_ERROR)
|
|
|
|
|
2018-04-24 17:50:58 +02:00
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
thread = threading.Thread(target=Transport.jobloop)
|
|
|
|
thread.setDaemon(True)
|
|
|
|
thread.start()
|
|
|
|
|
2018-04-24 17:50:58 +02:00
|
|
|
RNS.log("Transport instance "+str(Transport.identity)+" started")
|
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
@staticmethod
|
|
|
|
def jobloop():
|
|
|
|
while (True):
|
|
|
|
Transport.jobs()
|
|
|
|
sleep(Transport.job_interval)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def jobs():
|
|
|
|
Transport.jobs_running = True
|
|
|
|
try:
|
|
|
|
if not Transport.jobs_locked:
|
|
|
|
# Process receipts list for timed-out packets
|
|
|
|
if Transport.receipts_last_checked+Transport.receipts_check_interval < time.time():
|
|
|
|
for receipt in Transport.receipts:
|
2018-04-25 22:08:17 +02:00
|
|
|
receipt.check_timeout()
|
2018-04-17 17:46:48 +02:00
|
|
|
if receipt.status != RNS.PacketReceipt.SENT:
|
|
|
|
Transport.receipts.remove(receipt)
|
|
|
|
|
|
|
|
Transport.receipts_last_checked = time.time()
|
|
|
|
|
|
|
|
# Cull the packet hashlist if it has reached max size
|
|
|
|
while (len(Transport.packet_hashlist) > Transport.hashlist_maxsize):
|
|
|
|
Transport.packet_hashlist.pop(0)
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("An exception occurred while running Transport jobs.", RNS.LOG_ERROR)
|
|
|
|
RNS.log("The contained exception was: "+str(e), RNS.LOG_ERROR)
|
|
|
|
|
|
|
|
Transport.jobs_running = False
|
2018-03-19 20:51:26 +01:00
|
|
|
|
2016-06-03 19:02:02 +02:00
|
|
|
@staticmethod
|
2018-04-16 17:13:39 +02:00
|
|
|
def outbound(packet):
|
2018-04-17 17:46:48 +02:00
|
|
|
while (Transport.jobs_running):
|
2018-04-23 23:42:16 +02:00
|
|
|
sleep(0.01)
|
2018-04-17 17:46:48 +02:00
|
|
|
|
|
|
|
Transport.jobs_locked = True
|
|
|
|
packet.updateHash()
|
|
|
|
sent = False
|
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
for interface in Transport.interfaces:
|
|
|
|
if interface.OUT:
|
2018-04-16 17:13:39 +02:00
|
|
|
should_transmit = True
|
|
|
|
if packet.destination.type == RNS.Destination.LINK:
|
2018-04-21 13:54:22 +02:00
|
|
|
if packet.destination.status == RNS.Link.CLOSED:
|
|
|
|
should_transmit = False
|
2018-04-16 17:13:39 +02:00
|
|
|
if interface != packet.destination.attached_interface:
|
|
|
|
should_transmit = False
|
|
|
|
|
|
|
|
if should_transmit:
|
|
|
|
RNS.log("Transmitting "+str(len(packet.raw))+" bytes via: "+str(interface), RNS.LOG_DEBUG)
|
|
|
|
interface.processOutgoing(packet.raw)
|
2018-04-17 17:46:48 +02:00
|
|
|
sent = True
|
|
|
|
|
|
|
|
if sent:
|
|
|
|
packet.sent = True
|
|
|
|
packet.sent_at = time.time()
|
|
|
|
|
|
|
|
if (packet.packet_type == RNS.Packet.DATA):
|
|
|
|
packet.receipt = RNS.PacketReceipt(packet)
|
|
|
|
Transport.receipts.append(packet.receipt)
|
|
|
|
|
|
|
|
Transport.cache(packet)
|
|
|
|
|
|
|
|
Transport.jobs_locked = False
|
|
|
|
return sent
|
2016-06-03 19:02:02 +02:00
|
|
|
|
2018-04-21 16:12:42 +02:00
|
|
|
@staticmethod
|
|
|
|
def packet_filter(packet):
|
2018-04-25 22:08:17 +02:00
|
|
|
# TODO: Think long and hard about this
|
2018-04-21 16:12:42 +02:00
|
|
|
if packet.context == RNS.Packet.KEEPALIVE:
|
|
|
|
return True
|
2018-04-23 23:42:16 +02:00
|
|
|
if packet.context == RNS.Packet.RESOURCE_REQ:
|
|
|
|
return True
|
|
|
|
if packet.context == RNS.Packet.RESOURCE_PRF:
|
|
|
|
return True
|
2018-04-21 16:12:42 +02:00
|
|
|
if not packet.packet_hash in Transport.packet_hashlist:
|
|
|
|
return True
|
|
|
|
|
2018-04-23 23:42:16 +02:00
|
|
|
return False
|
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
@staticmethod
|
2018-04-04 14:14:22 +02:00
|
|
|
def inbound(raw, interface=None):
|
2018-04-17 17:46:48 +02:00
|
|
|
while (Transport.jobs_running):
|
|
|
|
sleep(0.1)
|
|
|
|
|
|
|
|
Transport.jobs_locked = True
|
|
|
|
|
|
|
|
packet = RNS.Packet(None, raw)
|
|
|
|
packet.unpack()
|
|
|
|
packet.updateHash()
|
|
|
|
packet.receiving_interface = interface
|
2018-03-19 20:51:26 +01:00
|
|
|
|
2018-04-23 23:42:16 +02:00
|
|
|
RNS.log(str(interface)+" received packet with hash "+RNS.prettyhexrep(packet.packet_hash), RNS.LOG_EXTREME)
|
2018-03-19 20:51:26 +01:00
|
|
|
|
2018-04-23 23:42:16 +02:00
|
|
|
# TODO: Rewrite these redundant cache calls
|
2018-04-21 16:12:42 +02:00
|
|
|
if Transport.packet_filter(packet):
|
2018-04-17 17:46:48 +02:00
|
|
|
Transport.packet_hashlist.append(packet.packet_hash)
|
|
|
|
|
2018-04-04 14:14:22 +02:00
|
|
|
if packet.packet_type == RNS.Packet.ANNOUNCE:
|
|
|
|
if RNS.Identity.validateAnnounce(packet):
|
2018-03-20 12:32:41 +01:00
|
|
|
Transport.cache(packet)
|
2018-04-18 23:31:17 +02:00
|
|
|
|
|
|
|
elif packet.packet_type == RNS.Packet.LINKREQUEST:
|
2018-03-20 12:32:41 +01:00
|
|
|
for destination in Transport.destinations:
|
2018-03-19 20:51:26 +01:00
|
|
|
if destination.hash == packet.destination_hash and destination.type == packet.destination_type:
|
2018-03-20 12:32:41 +01:00
|
|
|
packet.destination = destination
|
|
|
|
destination.receive(packet)
|
|
|
|
Transport.cache(packet)
|
2018-04-16 17:13:39 +02:00
|
|
|
|
2018-04-18 23:31:17 +02:00
|
|
|
elif packet.packet_type == RNS.Packet.DATA:
|
2018-04-16 17:13:39 +02:00
|
|
|
if packet.destination_type == RNS.Destination.LINK:
|
|
|
|
for link in Transport.active_links:
|
|
|
|
if link.link_id == packet.destination_hash:
|
2018-04-18 23:31:17 +02:00
|
|
|
packet.link = link
|
2018-04-16 17:13:39 +02:00
|
|
|
link.receive(packet)
|
|
|
|
Transport.cache(packet)
|
|
|
|
else:
|
|
|
|
for destination in Transport.destinations:
|
|
|
|
if destination.hash == packet.destination_hash and destination.type == packet.destination_type:
|
|
|
|
packet.destination = destination
|
|
|
|
destination.receive(packet)
|
|
|
|
Transport.cache(packet)
|
2018-03-20 12:32:41 +01:00
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
if destination.proof_strategy == RNS.Destination.PROVE_ALL:
|
|
|
|
packet.prove()
|
|
|
|
|
2018-04-25 22:08:17 +02:00
|
|
|
elif destination.proof_strategy == RNS.Destination.PROVE_APP:
|
2018-04-17 17:46:48 +02:00
|
|
|
if destination.callbacks.proof_requested:
|
2018-04-25 22:08:17 +02:00
|
|
|
if destination.callbacks.proof_requested(packet):
|
|
|
|
packet.prove()
|
2018-04-17 17:46:48 +02:00
|
|
|
|
2018-04-18 23:31:17 +02:00
|
|
|
elif packet.packet_type == RNS.Packet.PROOF:
|
|
|
|
if packet.context == RNS.Packet.LRPROOF:
|
2018-04-16 17:13:39 +02:00
|
|
|
# This is a link request proof, forward
|
|
|
|
# to a waiting link request
|
|
|
|
for link in Transport.pending_links:
|
|
|
|
if link.link_id == packet.destination_hash:
|
|
|
|
link.validateProof(packet)
|
2018-04-18 23:31:17 +02:00
|
|
|
elif packet.context == RNS.Packet.RESOURCE_PRF:
|
|
|
|
for link in Transport.active_links:
|
|
|
|
if link.link_id == packet.destination_hash:
|
|
|
|
link.receive(packet)
|
2018-04-16 17:13:39 +02:00
|
|
|
else:
|
2018-04-25 22:08:17 +02:00
|
|
|
if packet.destination_type == RNS.Destination.LINK:
|
|
|
|
for link in Transport.active_links:
|
|
|
|
if link.link_id == packet.destination_hash:
|
|
|
|
packet.link = link
|
|
|
|
# plaintext = link.decrypt(packet.data)
|
|
|
|
|
|
|
|
|
2018-04-17 17:46:48 +02:00
|
|
|
# TODO: Make sure everything uses new proof handling
|
|
|
|
if len(packet.data) == RNS.PacketReceipt.EXPL_LENGTH:
|
|
|
|
proof_hash = packet.data[:RNS.Identity.HASHLENGTH/8]
|
|
|
|
else:
|
|
|
|
proof_hash = None
|
|
|
|
|
|
|
|
for receipt in Transport.receipts:
|
|
|
|
receipt_validated = False
|
|
|
|
if proof_hash != None:
|
|
|
|
# Only test validation if hash matches
|
|
|
|
if receipt.hash == proof_hash:
|
|
|
|
receipt_validated = receipt.validateProofPacket(packet)
|
|
|
|
else:
|
|
|
|
# In case of an implicit proof, we have
|
|
|
|
# to check every single outstanding receipt
|
|
|
|
receipt_validated = receipt.validateProofPacket(packet)
|
|
|
|
|
|
|
|
if receipt_validated:
|
|
|
|
Transport.receipts.remove(receipt)
|
|
|
|
|
|
|
|
Transport.jobs_locked = False
|
2018-03-19 20:51:26 +01:00
|
|
|
|
2016-06-03 19:02:02 +02:00
|
|
|
@staticmethod
|
|
|
|
def registerDestination(destination):
|
2018-04-04 14:14:22 +02:00
|
|
|
destination.MTU = RNS.Reticulum.MTU
|
|
|
|
if destination.direction == RNS.Destination.IN:
|
2018-03-20 12:32:41 +01:00
|
|
|
Transport.destinations.append(destination)
|
|
|
|
|
2018-04-16 17:13:39 +02:00
|
|
|
@staticmethod
|
|
|
|
def registerLink(link):
|
2018-04-25 22:08:17 +02:00
|
|
|
RNS.log("Registering link "+str(link), RNS.LOG_DEBUG)
|
2018-04-16 17:13:39 +02:00
|
|
|
if link.initiator:
|
|
|
|
Transport.pending_links.append(link)
|
|
|
|
else:
|
|
|
|
Transport.active_links.append(link)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def activateLink(link):
|
2018-04-25 22:08:17 +02:00
|
|
|
RNS.log("Activating link "+str(link), RNS.LOG_DEBUG)
|
2018-04-16 17:13:39 +02:00
|
|
|
if link in Transport.pending_links:
|
|
|
|
Transport.pending_links.remove(link)
|
|
|
|
Transport.active_links.append(link)
|
|
|
|
link.status = RNS.Link.ACTIVE
|
|
|
|
else:
|
|
|
|
RNS.log("Attempted to activate a link that was not in the pending table", RNS.LOG_ERROR)
|
|
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def shouldCache(packet):
|
|
|
|
# TODO: Implement sensible rules for which
|
|
|
|
# packets to cache
|
2018-04-23 23:42:16 +02:00
|
|
|
if packet.context == RNS.Packet.RESOURCE_PRF:
|
|
|
|
return True
|
|
|
|
|
2018-04-16 17:13:39 +02:00
|
|
|
return False
|
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
@staticmethod
|
|
|
|
def cache(packet):
|
2018-04-16 17:13:39 +02:00
|
|
|
if RNS.Transport.shouldCache(packet):
|
2018-04-17 17:46:48 +02:00
|
|
|
try:
|
|
|
|
packet_hash = RNS.hexrep(packet.getHash(), delimit=False)
|
|
|
|
file = open(RNS.Reticulum.cachepath+"/"+packet_hash, "w")
|
|
|
|
file.write(packet.raw)
|
|
|
|
file.close()
|
2018-04-23 23:42:16 +02:00
|
|
|
RNS.log("Wrote packet "+packet_hash+" to cache", RNS.LOG_EXTREME)
|
2018-04-17 17:46:48 +02:00
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Error writing packet to cache", RNS.LOG_ERROR)
|
|
|
|
RNS.log("The contained exception was: "+str(e))
|
2018-03-20 12:32:41 +01:00
|
|
|
|
2018-04-23 23:42:16 +02:00
|
|
|
@staticmethod
|
|
|
|
def cache_request_packet(packet):
|
|
|
|
if len(packet.data) == RNS.Identity.HASHLENGTH/8:
|
|
|
|
packet_hash = RNS.hexrep(packet.data, delimit=False)
|
|
|
|
path = RNS.Reticulum.cachepath+"/"+packet_hash
|
|
|
|
if os.path.isfile(path):
|
|
|
|
file = open(path, "r")
|
|
|
|
raw = file.read()
|
|
|
|
file.close()
|
|
|
|
packet = RNS.Packet(None, raw)
|
|
|
|
# TODO: Implement outbound for this
|
|
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def cache_request(packet_hash):
|
|
|
|
RNS.log("Cache request for "+RNS.prettyhexrep(packet_hash), RNS.LOG_EXTREME)
|
|
|
|
path = RNS.Reticulum.cachepath+"/"+RNS.hexrep(packet_hash, delimit=False)
|
|
|
|
if os.path.isfile(path):
|
|
|
|
file = open(path, "r")
|
|
|
|
raw = file.read()
|
|
|
|
Transport.inbound(raw)
|
|
|
|
file.close()
|
|
|
|
else:
|
|
|
|
cache_request_packet = RNS.Packet(Transport.transport_destination(), packet_hash, context = RNS.Packet.CACHE_REQUEST)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def transport_destination():
|
|
|
|
# TODO: implement this
|
|
|
|
pass
|
2018-04-24 18:01:52 +02:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def exitHandler():
|
|
|
|
try:
|
|
|
|
packet_hashlist_path = RNS.Reticulum.configdir+"/packet_hashlist"
|
|
|
|
file = open(packet_hashlist_path, "w")
|
|
|
|
file.write(umsgpack.packb(Transport.packet_hashlist))
|
|
|
|
file.close()
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Could not save packet hashlist to disk, the contained exception was: "+str(e), RNS.LOG_ERROR)
|