2019-08-20 16:18:15 +00:00
|
|
|
## Nim-LibP2P
|
2019-09-24 17:48:23 +00:00
|
|
|
## Copyright (c) 2019 Status Research & Development GmbH
|
2019-08-20 16:18:15 +00:00
|
|
|
## Licensed under either of
|
|
|
|
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
|
|
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
|
|
## at your option.
|
|
|
|
## This file may not be copied, modified, or distributed except according to
|
|
|
|
## those terms.
|
|
|
|
|
2020-08-02 10:22:49 +00:00
|
|
|
import oids
|
2020-06-27 17:33:34 +00:00
|
|
|
import chronos, chronicles, sequtils
|
2019-09-24 16:16:39 +00:00
|
|
|
import transport,
|
2020-04-21 01:24:42 +00:00
|
|
|
../errors,
|
2019-09-24 16:16:39 +00:00
|
|
|
../wire,
|
|
|
|
../multiaddress,
|
|
|
|
../multicodec,
|
2020-06-19 17:29:43 +00:00
|
|
|
../stream/connection,
|
2019-09-24 16:16:39 +00:00
|
|
|
../stream/chronosstream
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2019-09-12 00:15:04 +00:00
|
|
|
logScope:
|
2020-06-10 08:48:01 +00:00
|
|
|
topics = "tcptransport"
|
2019-09-12 00:15:04 +00:00
|
|
|
|
2020-04-21 01:24:42 +00:00
|
|
|
const
|
|
|
|
TcpTransportTrackerName* = "libp2p.tcptransport"
|
|
|
|
|
|
|
|
type
|
|
|
|
TcpTransport* = ref object of Transport
|
|
|
|
server*: StreamServer
|
2020-05-18 17:05:34 +00:00
|
|
|
clients: seq[StreamTransport]
|
2020-05-18 19:04:05 +00:00
|
|
|
flags: set[ServerFlags]
|
2020-04-21 01:24:42 +00:00
|
|
|
cleanups*: seq[Future[void]]
|
|
|
|
handlers*: seq[Future[void]]
|
|
|
|
|
|
|
|
TcpTransportTracker* = ref object of TrackerBase
|
|
|
|
opened*: uint64
|
|
|
|
closed*: uint64
|
|
|
|
|
|
|
|
proc setupTcpTransportTracker(): TcpTransportTracker {.gcsafe.}
|
|
|
|
|
|
|
|
proc getTcpTransportTracker(): TcpTransportTracker {.gcsafe.} =
|
|
|
|
result = cast[TcpTransportTracker](getTracker(TcpTransportTrackerName))
|
|
|
|
if isNil(result):
|
|
|
|
result = setupTcpTransportTracker()
|
|
|
|
|
|
|
|
proc dumpTracking(): string {.gcsafe.} =
|
|
|
|
var tracker = getTcpTransportTracker()
|
2020-05-20 00:14:15 +00:00
|
|
|
result = "Opened tcp transports: " & $tracker.opened & "\n" &
|
|
|
|
"Closed tcp transports: " & $tracker.closed
|
2020-04-21 01:24:42 +00:00
|
|
|
|
|
|
|
proc leakTransport(): bool {.gcsafe.} =
|
|
|
|
var tracker = getTcpTransportTracker()
|
|
|
|
result = (tracker.opened != tracker.closed)
|
|
|
|
|
|
|
|
proc setupTcpTransportTracker(): TcpTransportTracker =
|
|
|
|
result = new TcpTransportTracker
|
|
|
|
result.opened = 0
|
|
|
|
result.closed = 0
|
|
|
|
result.dump = dumpTracking
|
|
|
|
result.isLeaked = leakTransport
|
|
|
|
addTracker(TcpTransportTrackerName, result)
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2020-04-21 01:24:42 +00:00
|
|
|
proc connHandler*(t: TcpTransport,
|
2019-09-24 16:16:39 +00:00
|
|
|
client: StreamTransport,
|
2020-04-21 01:24:42 +00:00
|
|
|
initiator: bool): Connection =
|
2020-10-27 17:21:03 +00:00
|
|
|
debug "Handling tcp connection", address = $client.remoteAddress,
|
|
|
|
initiator = initiator,
|
|
|
|
clients = t.clients.len
|
|
|
|
|
|
|
|
let conn = Connection(
|
|
|
|
ChronosStream.init(
|
|
|
|
client,
|
|
|
|
dir = if initiator:
|
|
|
|
Direction.Out
|
|
|
|
else:
|
|
|
|
Direction.In))
|
|
|
|
|
2019-09-05 15:20:05 +00:00
|
|
|
if not initiator:
|
2020-04-05 02:44:44 +00:00
|
|
|
if not isNil(t.handler):
|
2020-04-21 01:24:42 +00:00
|
|
|
t.handlers &= t.handler(conn)
|
2020-04-06 21:33:44 +00:00
|
|
|
|
2020-05-23 17:10:01 +00:00
|
|
|
proc cleanup() {.async.} =
|
|
|
|
try:
|
2020-10-27 17:21:03 +00:00
|
|
|
await client.join() or conn.join()
|
|
|
|
trace "Cleaning up client", addrs = $client.remoteAddress,
|
|
|
|
conn = $conn.oid
|
|
|
|
|
|
|
|
t.clients.keepItIf( it != client )
|
|
|
|
if not(isNil(conn) and not conn.closed()):
|
2020-05-23 17:10:01 +00:00
|
|
|
await conn.close()
|
2020-10-27 17:21:03 +00:00
|
|
|
|
|
|
|
if not(isNil(client) and client.closed()):
|
|
|
|
await client.closeWait()
|
|
|
|
|
|
|
|
trace "Cleaned up client", addrs = $client.remoteAddress,
|
|
|
|
conn = $conn.oid
|
|
|
|
|
2020-05-23 17:10:01 +00:00
|
|
|
except CatchableError as exc:
|
2020-10-27 17:21:03 +00:00
|
|
|
let useExc {.used.} = exc
|
|
|
|
debug "Error cleaning up client", errMsg = exc.msg, s = conn
|
2020-05-23 17:10:01 +00:00
|
|
|
|
2020-05-18 17:05:34 +00:00
|
|
|
t.clients.add(client)
|
2020-09-04 16:30:45 +00:00
|
|
|
# All the errors are handled inside `cleanup()` procedure.
|
|
|
|
asyncSpawn cleanup()
|
2020-10-27 17:21:03 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
conn.observedAddr = MultiAddress.init(client.remoteAddress).tryGet()
|
|
|
|
except CatchableError as exc:
|
|
|
|
trace "Unable to get remote address", exc = exc.msg
|
|
|
|
|
|
|
|
if not isNil(client):
|
|
|
|
client.close()
|
|
|
|
|
|
|
|
raise exc
|
|
|
|
|
|
|
|
return conn
|
2019-08-22 21:35:47 +00:00
|
|
|
|
2019-08-20 16:18:15 +00:00
|
|
|
proc connCb(server: StreamServer,
|
2019-08-30 15:28:07 +00:00
|
|
|
client: StreamTransport) {.async, gcsafe.} =
|
2020-05-15 03:56:56 +00:00
|
|
|
trace "incoming connection", address = $client.remoteAddress
|
|
|
|
try:
|
|
|
|
let t = cast[TcpTransport](server.udata)
|
|
|
|
# we don't need result connection in this case
|
|
|
|
# as it's added inside connHandler
|
|
|
|
discard t.connHandler(client, false)
|
|
|
|
except CancelledError as exc:
|
2020-10-27 17:21:03 +00:00
|
|
|
debug "Connection setup cancelled", exc = exc.msg
|
|
|
|
await client.closeWait()
|
2020-05-15 03:56:56 +00:00
|
|
|
raise exc
|
2020-10-27 17:21:03 +00:00
|
|
|
except CatchableError as exc:
|
|
|
|
debug "Connection setup failed", exc = exc.msg
|
|
|
|
await client.closeWait()
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2020-05-18 19:04:05 +00:00
|
|
|
proc init*(T: type TcpTransport, flags: set[ServerFlags] = {}): T =
|
|
|
|
result = T(flags: flags)
|
|
|
|
result.initTransport()
|
|
|
|
|
|
|
|
method initTransport*(t: TcpTransport) =
|
2019-08-20 16:18:15 +00:00
|
|
|
t.multicodec = multiCodec("tcp")
|
2020-04-21 01:24:42 +00:00
|
|
|
inc getTcpTransportTracker().opened
|
|
|
|
|
|
|
|
method close*(t: TcpTransport) {.async, gcsafe.} =
|
2020-05-27 20:46:25 +00:00
|
|
|
try:
|
|
|
|
## start the transport
|
|
|
|
trace "stopping transport"
|
|
|
|
await procCall Transport(t).close() # call base
|
|
|
|
|
|
|
|
checkFutures(await allFinished(
|
|
|
|
t.clients.mapIt(it.closeWait())))
|
2019-08-21 22:53:16 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
# server can be nil
|
|
|
|
if not isNil(t.server):
|
|
|
|
t.server.stop()
|
|
|
|
await t.server.closeWait()
|
2020-05-18 17:05:34 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
t.server = nil
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
for fut in t.handlers:
|
|
|
|
if not fut.finished:
|
|
|
|
fut.cancel()
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
checkFutures(
|
|
|
|
await allFinished(t.handlers))
|
|
|
|
t.handlers = @[]
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
for fut in t.cleanups:
|
|
|
|
if not fut.finished:
|
|
|
|
fut.cancel()
|
2020-04-11 04:08:25 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
checkFutures(
|
|
|
|
await allFinished(t.cleanups))
|
|
|
|
t.cleanups = @[]
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2020-05-27 20:46:25 +00:00
|
|
|
trace "transport stopped"
|
|
|
|
inc getTcpTransportTracker().closed
|
2020-08-06 01:30:57 +00:00
|
|
|
except CancelledError as exc:
|
|
|
|
raise exc
|
2020-05-27 20:46:25 +00:00
|
|
|
except CatchableError as exc:
|
|
|
|
trace "error shutting down tcp transport", exc = exc.msg
|
2020-04-21 01:24:42 +00:00
|
|
|
|
2019-08-26 15:37:15 +00:00
|
|
|
method listen*(t: TcpTransport,
|
|
|
|
ma: MultiAddress,
|
2020-05-05 15:55:02 +00:00
|
|
|
handler: ConnHandler):
|
2019-09-12 00:15:04 +00:00
|
|
|
Future[Future[void]] {.async, gcsafe.} =
|
|
|
|
discard await procCall Transport(t).listen(ma, handler) # call base
|
2019-08-21 23:13:20 +00:00
|
|
|
|
|
|
|
## listen on the transport
|
2020-05-18 19:04:05 +00:00
|
|
|
t.server = createStreamServer(t.ma, connCb, t.flags, t)
|
2019-09-12 00:15:04 +00:00
|
|
|
t.server.start()
|
2019-09-25 17:36:39 +00:00
|
|
|
|
|
|
|
# always get the resolved address in case we're bound to 0.0.0.0:0
|
2020-05-31 14:22:49 +00:00
|
|
|
t.ma = MultiAddress.init(t.server.sock.getLocalAddress()).tryGet()
|
2019-09-12 00:15:04 +00:00
|
|
|
result = t.server.join()
|
2019-11-06 18:25:33 +00:00
|
|
|
trace "started node on", address = t.ma
|
2019-08-20 16:18:15 +00:00
|
|
|
|
2019-08-26 15:37:15 +00:00
|
|
|
method dial*(t: TcpTransport,
|
2019-09-24 16:16:39 +00:00
|
|
|
address: MultiAddress):
|
2019-08-30 22:16:37 +00:00
|
|
|
Future[Connection] {.async, gcsafe.} =
|
2019-09-23 21:51:28 +00:00
|
|
|
trace "dialing remote peer", address = $address
|
2019-08-20 16:18:15 +00:00
|
|
|
## dial a peer
|
2020-10-27 17:21:03 +00:00
|
|
|
var client: StreamTransport
|
|
|
|
try:
|
|
|
|
client = await connect(address)
|
|
|
|
except CatchableError as exc:
|
|
|
|
trace "Exception dialing peer", exc = exc.msg
|
|
|
|
if not(isNil(client)):
|
|
|
|
await client.closeWait()
|
|
|
|
raise exc
|
|
|
|
|
|
|
|
return t.connHandler(client, true)
|
2019-08-22 00:23:13 +00:00
|
|
|
|
2019-12-10 20:50:35 +00:00
|
|
|
method handles*(t: TcpTransport, address: MultiAddress): bool {.gcsafe.} =
|
2019-12-04 04:44:54 +00:00
|
|
|
if procCall Transport(t).handles(address):
|
2020-05-31 14:22:49 +00:00
|
|
|
result = address.protocols.tryGet().filterIt( it == multiCodec("tcp") ).len > 0
|