1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283 |
- package nebula
- func (f *Interface) newHook(w func([]byte) error) InsideHandler {
- fn := func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- f.decryptTo(w, hostInfo, header.MessageCounter, out, packet, fwPacket, nb)
- }
- return f.encrypted(fn)
- }
- func (f *Interface) encrypted(h InsideHandler) InsideHandler {
- return func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- if !f.handleEncrypted(ci, addr, header) {
- return
- }
- h(hostInfo, ci, addr, header, out, packet, fwPacket, nb)
- f.handleHostRoaming(hostInfo, addr)
- f.connectionManager.In(hostInfo.hostId)
- }
- }
- func (f *Interface) rxMetrics(h InsideHandler) InsideHandler {
- return func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- f.messageMetrics.Rx(header.Type, header.Subtype, 1)
- h(hostInfo, ci, addr, header, out, packet, fwPacket, nb)
- }
- }
- func (f *Interface) handleMessagePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- f.decryptTo(f.inside.WriteRaw, hostInfo, header.MessageCounter, out, packet, fwPacket, nb)
- }
- func (f *Interface) handleLighthousePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- d, err := f.decrypt(hostInfo, header.MessageCounter, out, packet, header, nb)
- if err != nil {
- hostInfo.logger().WithError(err).WithField("udpAddr", addr).
- WithField("packet", packet).
- Error("Failed to decrypt lighthouse packet")
- //TODO: maybe after build 64 is out? 06/14/2018 - NB
- //f.sendRecvError(net.Addr(addr), header.RemoteIndex)
- return
- }
- f.lightHouse.HandleRequest(addr, hostInfo.hostId, d, hostInfo.GetCert(), f)
- }
- func (f *Interface) handleTestPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- d, err := f.decrypt(hostInfo, header.MessageCounter, out, packet, header, nb)
- if err != nil {
- hostInfo.logger().WithError(err).WithField("udpAddr", addr).
- WithField("packet", packet).
- Error("Failed to decrypt test packet")
- //TODO: maybe after build 64 is out? 06/14/2018 - NB
- //f.sendRecvError(net.Addr(addr), header.RemoteIndex)
- return
- }
- if header.Subtype == testRequest {
- // This testRequest might be from TryPromoteBest, so we should roam
- // to the new IP address before responding
- f.handleHostRoaming(hostInfo, addr)
- f.send(test, testReply, ci, hostInfo, hostInfo.remote, d, nb, out)
- }
- }
- func (f *Interface) handleHandshakePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- HandleIncomingHandshake(f, addr, packet, header, hostInfo)
- }
- func (f *Interface) handleRecvErrorPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- // TODO: Remove this with recv_error deprecation
- f.handleRecvError(addr, header)
- }
- func (f *Interface) handleCloseTunnelPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
- hostInfo.logger().WithField("udpAddr", addr).
- Info("Close tunnel received, tearing down.")
- f.closeTunnel(hostInfo)
- }
|