mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-03-22 00:59:08 +01:00
Merge branch 'transport_failsafe' into restricted_routes
This commit is contained in:
commit
004a93a841
15 changed files with 174 additions and 103 deletions
|
@ -124,6 +124,8 @@ namespace config {
|
||||||
("notransit", value<bool>()->zero_tokens()->default_value(false), "Router will not accept transit tunnels at startup")
|
("notransit", value<bool>()->zero_tokens()->default_value(false), "Router will not accept transit tunnels at startup")
|
||||||
("floodfill", value<bool>()->zero_tokens()->default_value(false), "Router will be floodfill")
|
("floodfill", value<bool>()->zero_tokens()->default_value(false), "Router will be floodfill")
|
||||||
("bandwidth", value<std::string>()->default_value(""), "Bandwidth limit: integer in kbps or letters: L (32), O (256), P (2048), X (>9000)")
|
("bandwidth", value<std::string>()->default_value(""), "Bandwidth limit: integer in kbps or letters: L (32), O (256), P (2048), X (>9000)")
|
||||||
|
("ntcp", value<bool>()->zero_tokens()->default_value(true), "enable ntcp transport")
|
||||||
|
("ssu", value<bool>()->zero_tokens()->default_value(true), "enable ssu transport")
|
||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
("svcctl", value<std::string>()->default_value(""), "Windows service management ('install' or 'remove')")
|
("svcctl", value<std::string>()->default_value(""), "Windows service management ('install' or 'remove')")
|
||||||
("insomnia", value<bool>()->zero_tokens()->default_value(false), "Prevent system from sleeping")
|
("insomnia", value<bool>()->zero_tokens()->default_value(false), "Prevent system from sleeping")
|
||||||
|
|
30
Daemon.cpp
30
Daemon.cpp
|
@ -210,6 +210,26 @@ namespace i2p
|
||||||
|
|
||||||
bool Daemon_Singleton::start()
|
bool Daemon_Singleton::start()
|
||||||
{
|
{
|
||||||
|
LogPrint(eLogInfo, "Daemon: starting NetDB");
|
||||||
|
i2p::data::netdb.Start();
|
||||||
|
|
||||||
|
#ifdef USE_UPNP
|
||||||
|
LogPrint(eLogInfo, "Daemon: starting UPnP");
|
||||||
|
d.m_UPnP.Start ();
|
||||||
|
#endif
|
||||||
|
bool ntcp; i2p::config::GetOption("ntcp", ntcp);
|
||||||
|
bool ssu; i2p::config::GetOption("ssu", ssu);
|
||||||
|
LogPrint(eLogInfo, "Daemon: starting Transports");
|
||||||
|
i2p::transport::transports.Start(ntcp, ssu);
|
||||||
|
if (i2p::transport::transports.IsBoundNTCP() || i2p::transport::transports.IsBoundSSU()) {
|
||||||
|
LogPrint(eLogInfo, "Daemon: Transports started");
|
||||||
|
} else {
|
||||||
|
LogPrint(eLogError, "Daemon: failed to start Transports");
|
||||||
|
/** shut down netdb right away */
|
||||||
|
i2p::data::netdb.Stop();
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
bool http; i2p::config::GetOption("http.enabled", http);
|
bool http; i2p::config::GetOption("http.enabled", http);
|
||||||
if (http) {
|
if (http) {
|
||||||
std::string httpAddr; i2p::config::GetOption("http.address", httpAddr);
|
std::string httpAddr; i2p::config::GetOption("http.address", httpAddr);
|
||||||
|
@ -219,15 +239,6 @@ namespace i2p
|
||||||
d.httpServer->Start();
|
d.httpServer->Start();
|
||||||
}
|
}
|
||||||
|
|
||||||
LogPrint(eLogInfo, "Daemon: starting NetDB");
|
|
||||||
i2p::data::netdb.Start();
|
|
||||||
|
|
||||||
#ifdef USE_UPNP
|
|
||||||
LogPrint(eLogInfo, "Daemon: starting UPnP");
|
|
||||||
d.m_UPnP.Start ();
|
|
||||||
#endif
|
|
||||||
LogPrint(eLogInfo, "Daemon: starting Transports");
|
|
||||||
i2p::transport::transports.Start();
|
|
||||||
|
|
||||||
LogPrint(eLogInfo, "Daemon: starting Tunnels");
|
LogPrint(eLogInfo, "Daemon: starting Tunnels");
|
||||||
i2p::tunnel::tunnels.Start();
|
i2p::tunnel::tunnels.Start();
|
||||||
|
@ -244,6 +255,7 @@ namespace i2p
|
||||||
d.m_I2PControlService = std::unique_ptr<i2p::client::I2PControlService>(new i2p::client::I2PControlService (i2pcpAddr, i2pcpPort));
|
d.m_I2PControlService = std::unique_ptr<i2p::client::I2PControlService>(new i2p::client::I2PControlService (i2pcpAddr, i2pcpPort));
|
||||||
d.m_I2PControlService->Start ();
|
d.m_I2PControlService->Start ();
|
||||||
}
|
}
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
6
HTTP.cpp
6
HTTP.cpp
|
@ -72,7 +72,11 @@ namespace http {
|
||||||
bool URL::parse(const std::string& url) {
|
bool URL::parse(const std::string& url) {
|
||||||
std::size_t pos_p = 0; /* < current parse position */
|
std::size_t pos_p = 0; /* < current parse position */
|
||||||
std::size_t pos_c = 0; /* < work position */
|
std::size_t pos_c = 0; /* < work position */
|
||||||
if (url.at(0) != '/') {
|
if (url.at(0) == '/' && url.find("/http://") == 0) {
|
||||||
|
/* special case for i2p.rocks inproxy */
|
||||||
|
pos_p ++;
|
||||||
|
}
|
||||||
|
if(url.at(0) != '/' || pos_p > 0) {
|
||||||
/* schema */
|
/* schema */
|
||||||
pos_c = url.find("://");
|
pos_c = url.find("://");
|
||||||
if (pos_c != std::string::npos) {
|
if (pos_c != std::string::npos) {
|
||||||
|
|
13
I2CP.cpp
13
I2CP.cpp
|
@ -424,14 +424,25 @@ namespace client
|
||||||
if (m_Destination)
|
if (m_Destination)
|
||||||
{
|
{
|
||||||
i2p::data::IdentityEx identity;
|
i2p::data::IdentityEx identity;
|
||||||
offset += identity.FromBuffer (buf + offset, len - offset);
|
size_t identsize = identity.FromBuffer (buf + offset, len - offset);
|
||||||
|
if (identsize)
|
||||||
|
{
|
||||||
|
offset += identsize;
|
||||||
uint32_t payloadLen = bufbe32toh (buf + offset);
|
uint32_t payloadLen = bufbe32toh (buf + offset);
|
||||||
|
if (payloadLen + offset <= len)
|
||||||
|
{
|
||||||
offset += 4;
|
offset += 4;
|
||||||
uint32_t nonce = bufbe32toh (buf + offset + payloadLen);
|
uint32_t nonce = bufbe32toh (buf + offset + payloadLen);
|
||||||
if (m_IsSendAccepted)
|
if (m_IsSendAccepted)
|
||||||
SendMessageStatusMessage (nonce, eI2CPMessageStatusAccepted); // accepted
|
SendMessageStatusMessage (nonce, eI2CPMessageStatusAccepted); // accepted
|
||||||
m_Destination->SendMsgTo (buf + offset, payloadLen, identity.GetIdentHash (), nonce);
|
m_Destination->SendMsgTo (buf + offset, payloadLen, identity.GetIdentHash (), nonce);
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
LogPrint(eLogError, "I2CP: cannot send message, too big");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint(eLogError, "I2CP: invalid identity");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
LogPrint (eLogError, "I2CP: unexpected sessionID ", sessionID);
|
LogPrint (eLogError, "I2CP: unexpected sessionID ", sessionID);
|
||||||
|
|
|
@ -28,15 +28,15 @@ endif
|
||||||
NEEDED_CXXFLAGS += -fPIC
|
NEEDED_CXXFLAGS += -fPIC
|
||||||
|
|
||||||
ifeq ($(USE_STATIC),yes)
|
ifeq ($(USE_STATIC),yes)
|
||||||
LIBDIR := /usr/lib
|
#LIBDIR = /usr/lib
|
||||||
LDLIBS = $(LIBDIR)/libboost_system.a
|
LDLIBS = $(LIBDIR)/libboost_system.a
|
||||||
LDLIBS += $(LIBDIR)/libboost_date_time.a
|
LDLIBS += $(LIBDIR)/libboost_date_time.a
|
||||||
LDLIBS += $(LIBDIR)/libboost_filesystem.a
|
LDLIBS += $(LIBDIR)/libboost_filesystem.a
|
||||||
LDLIBS += $(LIBDIR)/libboost_program_options.a
|
LDLIBS += $(LIBDIR)/libboost_program_options.a
|
||||||
LDLIBS += $(LIBDIR)/libcrypto.a
|
|
||||||
LDLIBS += $(LIBDIR)/libssl.a
|
LDLIBS += $(LIBDIR)/libssl.a
|
||||||
|
LDLIBS += $(LIBDIR)/libcrypto.a
|
||||||
LDLIBS += $(LIBDIR)/libz.a
|
LDLIBS += $(LIBDIR)/libz.a
|
||||||
LDLIBS += -lpthread -static-libstdc++ -static-libgcc
|
LDLIBS += -lpthread -static-libstdc++ -static-libgcc -lrt
|
||||||
USE_AESNI := no
|
USE_AESNI := no
|
||||||
else
|
else
|
||||||
LDLIBS = -lcrypto -lssl -lz -lboost_system -lboost_date_time -lboost_filesystem -lboost_program_options -lpthread
|
LDLIBS = -lcrypto -lssl -lz -lboost_system -lboost_date_time -lboost_filesystem -lboost_program_options -lpthread
|
||||||
|
|
|
@ -760,21 +760,33 @@ namespace transport
|
||||||
auto& addresses = context.GetRouterInfo ().GetAddresses ();
|
auto& addresses = context.GetRouterInfo ().GetAddresses ();
|
||||||
for (auto address: addresses)
|
for (auto address: addresses)
|
||||||
{
|
{
|
||||||
if (address->transportStyle == i2p::data::RouterInfo::eTransportNTCP && address->host.is_v4 ())
|
if (address->transportStyle == i2p::data::RouterInfo::eTransportNTCP)
|
||||||
|
{
|
||||||
|
if (address->host.is_v4())
|
||||||
|
{
|
||||||
|
try
|
||||||
{
|
{
|
||||||
m_NTCPAcceptor = new boost::asio::ip::tcp::acceptor (m_Service,
|
m_NTCPAcceptor = new boost::asio::ip::tcp::acceptor (m_Service,
|
||||||
boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v4(), address->port));
|
boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v4(), address->port));
|
||||||
|
} catch ( std::exception & ex ) {
|
||||||
|
/** fail to bind ip4 */
|
||||||
|
LogPrint(eLogError, "NTCP: Failed to bind to ip4 port ",address->port, ex.what());
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
LogPrint (eLogInfo, "NTCP: Start listening TCP port ", address->port);
|
LogPrint (eLogInfo, "NTCP: Start listening TCP port ", address->port);
|
||||||
auto conn = std::make_shared<NTCPSession>(*this);
|
auto conn = std::make_shared<NTCPSession>(*this);
|
||||||
m_NTCPAcceptor->async_accept(conn->GetSocket (), std::bind (&NTCPServer::HandleAccept, this,
|
m_NTCPAcceptor->async_accept(conn->GetSocket (), std::bind (&NTCPServer::HandleAccept, this,
|
||||||
conn, std::placeholders::_1));
|
conn, std::placeholders::_1));
|
||||||
|
}
|
||||||
if (context.SupportsV6 ())
|
else if (address->host.is_v6() && context.SupportsV6 ())
|
||||||
{
|
{
|
||||||
m_NTCPV6Acceptor = new boost::asio::ip::tcp::acceptor (m_Service);
|
m_NTCPV6Acceptor = new boost::asio::ip::tcp::acceptor (m_Service);
|
||||||
|
try
|
||||||
|
{
|
||||||
m_NTCPV6Acceptor->open (boost::asio::ip::tcp::v6());
|
m_NTCPV6Acceptor->open (boost::asio::ip::tcp::v6());
|
||||||
m_NTCPV6Acceptor->set_option (boost::asio::ip::v6_only (true));
|
m_NTCPV6Acceptor->set_option (boost::asio::ip::v6_only (true));
|
||||||
|
|
||||||
m_NTCPV6Acceptor->bind (boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v6(), address->port));
|
m_NTCPV6Acceptor->bind (boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v6(), address->port));
|
||||||
m_NTCPV6Acceptor->listen ();
|
m_NTCPV6Acceptor->listen ();
|
||||||
|
|
||||||
|
@ -782,6 +794,10 @@ namespace transport
|
||||||
auto conn = std::make_shared<NTCPSession> (*this);
|
auto conn = std::make_shared<NTCPSession> (*this);
|
||||||
m_NTCPV6Acceptor->async_accept(conn->GetSocket (), std::bind (&NTCPServer::HandleAcceptV6,
|
m_NTCPV6Acceptor->async_accept(conn->GetSocket (), std::bind (&NTCPServer::HandleAcceptV6,
|
||||||
this, conn, std::placeholders::_1));
|
this, conn, std::placeholders::_1));
|
||||||
|
} catch ( std::exception & ex ) {
|
||||||
|
LogPrint(eLogError, "NTCP: failed to bind to ip6 port ", address->port);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -795,8 +811,10 @@ namespace transport
|
||||||
if (m_IsRunning)
|
if (m_IsRunning)
|
||||||
{
|
{
|
||||||
m_IsRunning = false;
|
m_IsRunning = false;
|
||||||
|
if (m_NTCPAcceptor)
|
||||||
delete m_NTCPAcceptor;
|
delete m_NTCPAcceptor;
|
||||||
m_NTCPAcceptor = nullptr;
|
m_NTCPAcceptor = nullptr;
|
||||||
|
if (m_NTCPV6Acceptor)
|
||||||
delete m_NTCPV6Acceptor;
|
delete m_NTCPV6Acceptor;
|
||||||
m_NTCPV6Acceptor = nullptr;
|
m_NTCPV6Acceptor = nullptr;
|
||||||
|
|
||||||
|
|
|
@ -145,6 +145,9 @@ namespace transport
|
||||||
std::shared_ptr<NTCPSession> FindNTCPSession (const i2p::data::IdentHash& ident);
|
std::shared_ptr<NTCPSession> FindNTCPSession (const i2p::data::IdentHash& ident);
|
||||||
void Connect (const boost::asio::ip::address& address, int port, std::shared_ptr<NTCPSession> conn);
|
void Connect (const boost::asio::ip::address& address, int port, std::shared_ptr<NTCPSession> conn);
|
||||||
|
|
||||||
|
bool IsBoundV4() const { return m_NTCPAcceptor != nullptr; };
|
||||||
|
bool IsBoundV6() const { return m_NTCPV6Acceptor != nullptr; };
|
||||||
|
|
||||||
boost::asio::io_service& GetService () { return m_Service; };
|
boost::asio::io_service& GetService () { return m_Service; };
|
||||||
void Ban (const boost::asio::ip::address& addr);
|
void Ban (const boost::asio::ip::address& addr);
|
||||||
|
|
||||||
|
|
1
SAM.cpp
1
SAM.cpp
|
@ -56,6 +56,7 @@ namespace client
|
||||||
if (m_Session)
|
if (m_Session)
|
||||||
{
|
{
|
||||||
m_Session->DelSocket (shared_from_this ());
|
m_Session->DelSocket (shared_from_this ());
|
||||||
|
if (m_Session->localDestination)
|
||||||
m_Session->localDestination->StopAcceptingStreams ();
|
m_Session->localDestination->StopAcceptingStreams ();
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -105,7 +105,7 @@ namespace transport
|
||||||
Stop ();
|
Stop ();
|
||||||
}
|
}
|
||||||
|
|
||||||
void Transports::Start ()
|
void Transports::Start (bool enableNTCP, bool enableSSU)
|
||||||
{
|
{
|
||||||
m_DHKeysPairSupplier.Start ();
|
m_DHKeysPairSupplier.Start ();
|
||||||
m_IsRunning = true;
|
m_IsRunning = true;
|
||||||
|
@ -114,19 +114,33 @@ namespace transport
|
||||||
auto& addresses = context.GetRouterInfo ().GetAddresses ();
|
auto& addresses = context.GetRouterInfo ().GetAddresses ();
|
||||||
for (auto address : addresses)
|
for (auto address : addresses)
|
||||||
{
|
{
|
||||||
if (!m_NTCPServer)
|
if (!m_NTCPServer && enableNTCP)
|
||||||
{
|
{
|
||||||
m_NTCPServer = new NTCPServer ();
|
m_NTCPServer = new NTCPServer ();
|
||||||
m_NTCPServer->Start ();
|
m_NTCPServer->Start ();
|
||||||
|
if (!(m_NTCPServer->IsBoundV6() || m_NTCPServer->IsBoundV4())) {
|
||||||
|
/** failed to bind to NTCP */
|
||||||
|
LogPrint(eLogError, "Transports: failed to bind to TCP");
|
||||||
|
m_NTCPServer->Stop();
|
||||||
|
delete m_NTCPServer;
|
||||||
|
m_NTCPServer = nullptr;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (address->transportStyle == RouterInfo::eTransportSSU && address->host.is_v4 ())
|
if (address->transportStyle == RouterInfo::eTransportSSU && address->host.is_v4 ())
|
||||||
{
|
{
|
||||||
if (!m_SSUServer)
|
if (!m_SSUServer && enableSSU)
|
||||||
{
|
{
|
||||||
m_SSUServer = new SSUServer (address->port);
|
m_SSUServer = new SSUServer (address->port);
|
||||||
LogPrint (eLogInfo, "Transports: Start listening UDP port ", address->port);
|
LogPrint (eLogInfo, "Transports: Start listening UDP port ", address->port);
|
||||||
|
try {
|
||||||
m_SSUServer->Start ();
|
m_SSUServer->Start ();
|
||||||
|
} catch ( std::exception & ex ) {
|
||||||
|
LogPrint(eLogError, "Transports: Failed to bind to UDP port", address->port);
|
||||||
|
delete m_SSUServer;
|
||||||
|
m_SSUServer = nullptr;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
DetectExternalIP ();
|
DetectExternalIP ();
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
@ -288,7 +302,7 @@ namespace transport
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
LogPrint (eLogWarning, "Transports: NTCP address is not present for ", i2p::data::GetIdentHashAbbreviation (ident), ", trying SSU");
|
LogPrint (eLogDebug, "Transports: NTCP address is not present for ", i2p::data::GetIdentHashAbbreviation (ident), ", trying SSU");
|
||||||
}
|
}
|
||||||
if (peer.numAttempts == 1)// SSU
|
if (peer.numAttempts == 1)// SSU
|
||||||
{
|
{
|
||||||
|
@ -458,6 +472,12 @@ namespace transport
|
||||||
LogPrint (eLogDebug, "Transports: SSU session closed");
|
LogPrint (eLogDebug, "Transports: SSU session closed");
|
||||||
}
|
}
|
||||||
// TODO: delete NTCP
|
// TODO: delete NTCP
|
||||||
|
auto ntcpSession = m_NTCPServer ? m_NTCPServer->FindNTCPSession(router->GetIdentHash()) : nullptr;
|
||||||
|
if (ntcpSession)
|
||||||
|
{
|
||||||
|
m_NTCPServer->RemoveNTCPSession(ntcpSession);
|
||||||
|
LogPrint(eLogDebug, "Transports: NTCP session closed");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void Transports::DetectExternalIP ()
|
void Transports::DetectExternalIP ()
|
||||||
|
|
|
@ -73,9 +73,12 @@ namespace transport
|
||||||
Transports ();
|
Transports ();
|
||||||
~Transports ();
|
~Transports ();
|
||||||
|
|
||||||
void Start ();
|
void Start (bool enableNTCP=true, bool enableSSU=true);
|
||||||
void Stop ();
|
void Stop ();
|
||||||
|
|
||||||
|
bool IsBoundNTCP() const { return m_NTCPServer != nullptr; }
|
||||||
|
bool IsBoundSSU() const { return m_SSUServer != nullptr; }
|
||||||
|
|
||||||
boost::asio::io_service& GetService () { return m_Service; };
|
boost::asio::io_service& GetService () { return m_Service; };
|
||||||
std::shared_ptr<i2p::crypto::DHKeys> GetNextDHKeysPair ();
|
std::shared_ptr<i2p::crypto::DHKeys> GetNextDHKeysPair ();
|
||||||
void ReuseDHKeysPair (std::shared_ptr<i2p::crypto::DHKeys> pair);
|
void ReuseDHKeysPair (std::shared_ptr<i2p::crypto::DHKeys> pair);
|
||||||
|
|
12
Tunnel.cpp
12
Tunnel.cpp
|
@ -642,7 +642,11 @@ namespace tunnel
|
||||||
{
|
{
|
||||||
// trying to create one more oubound tunnel
|
// trying to create one more oubound tunnel
|
||||||
auto inboundTunnel = GetNextInboundTunnel ();
|
auto inboundTunnel = GetNextInboundTunnel ();
|
||||||
auto router = i2p::data::netdb.GetRandomRouter ();
|
std::shared_ptr<const i2p::data::RouterInfo> router(nullptr);
|
||||||
|
if (i2p::transport::transports.RoutesRestricted())
|
||||||
|
router = i2p::transport::transports.GetRestrictedPeer();
|
||||||
|
else
|
||||||
|
router = i2p::data::netdb.GetRandomRouter ();
|
||||||
if (!inboundTunnel || !router) return;
|
if (!inboundTunnel || !router) return;
|
||||||
LogPrint (eLogDebug, "Tunnel: creating one hop outbound tunnel");
|
LogPrint (eLogDebug, "Tunnel: creating one hop outbound tunnel");
|
||||||
CreateTunnel<OutboundTunnel> (
|
CreateTunnel<OutboundTunnel> (
|
||||||
|
@ -704,7 +708,11 @@ namespace tunnel
|
||||||
if (m_OutboundTunnels.empty () || m_InboundTunnels.size () < 5)
|
if (m_OutboundTunnels.empty () || m_InboundTunnels.size () < 5)
|
||||||
{
|
{
|
||||||
// trying to create one more inbound tunnel
|
// trying to create one more inbound tunnel
|
||||||
auto router = i2p::data::netdb.GetRandomRouter ();
|
std::shared_ptr<const i2p::data::RouterInfo> router(nullptr);
|
||||||
|
if (i2p::transport::transports.RoutesRestricted())
|
||||||
|
router = i2p::transport::transports.GetRestrictedPeer();
|
||||||
|
else
|
||||||
|
router = i2p::data::netdb.GetRandomRouter ();
|
||||||
if (!router) {
|
if (!router) {
|
||||||
LogPrint (eLogWarning, "Tunnel: can't find any router, skip creating tunnel");
|
LogPrint (eLogWarning, "Tunnel: can't find any router, skip creating tunnel");
|
||||||
return;
|
return;
|
||||||
|
|
|
@ -331,16 +331,12 @@ namespace tunnel
|
||||||
if (m_ExplicitPeers) return SelectExplicitPeers (peers, isInbound);
|
if (m_ExplicitPeers) return SelectExplicitPeers (peers, isInbound);
|
||||||
auto prevHop = i2p::context.GetSharedRouterInfo ();
|
auto prevHop = i2p::context.GetSharedRouterInfo ();
|
||||||
int numHops = isInbound ? m_NumInboundHops : m_NumOutboundHops;
|
int numHops = isInbound ? m_NumInboundHops : m_NumOutboundHops;
|
||||||
int firstHop = numHops - 1;
|
if(i2p::transport::transports.RoutesRestricted())
|
||||||
if (i2p::transport::transports.GetNumPeers () > 25)
|
|
||||||
{
|
{
|
||||||
auto r = i2p::transport::transports.GetRandomPeer ();
|
auto hop = i2p::transport::transports.GetRestrictedPeer();
|
||||||
if (r && !r->GetProfile ()->IsBad ())
|
if(!hop) return false;
|
||||||
{
|
peers.push_back(hop->GetRouterIdentity());
|
||||||
prevHop = r;
|
prevHop = hop;
|
||||||
peers.push_back (r->GetRouterIdentity ());
|
|
||||||
numHops--;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for (int i = 0; i < numHops; i++)
|
for (int i = 0; i < numHops; i++)
|
||||||
|
@ -354,13 +350,6 @@ namespace tunnel
|
||||||
prevHop = hop;
|
prevHop = hop;
|
||||||
peers.push_back (hop->GetRouterIdentity ());
|
peers.push_back (hop->GetRouterIdentity ());
|
||||||
}
|
}
|
||||||
if(i2p::transport::transports.RoutesRestricted())
|
|
||||||
{
|
|
||||||
auto r = i2p::transport::transports.GetRestrictedPeer();
|
|
||||||
/* replace first hop with restricted router */
|
|
||||||
if(!r) return false;
|
|
||||||
peers[firstHop] = r->GetRouterIdentity();
|
|
||||||
}
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue