mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-07-01 10:14:36 +02:00
973 lines
52 KiB
C++
973 lines
52 KiB
C++
/*
|
|
* Copyright (c) 2013-2022, The PurpleI2P Project
|
|
*
|
|
* This file is part of Purple i2pd project and licensed under BSD3
|
|
*
|
|
* See full license text in LICENSE file at top of project tree
|
|
*/
|
|
|
|
#include <fstream>
|
|
#include <iostream>
|
|
#include <boost/property_tree/ptree.hpp>
|
|
#include <boost/property_tree/ini_parser.hpp>
|
|
#include "Config.h"
|
|
#include "FS.h"
|
|
#include "Log.h"
|
|
#include "Identity.h"
|
|
#include "util.h"
|
|
#include "ClientContext.h"
|
|
#include "SOCKS.h"
|
|
#include "MatchedDestination.h"
|
|
|
|
namespace i2p {
|
|
namespace client {
|
|
ClientContext context;
|
|
|
|
ClientContext::ClientContext() : m_SharedLocalDestination(nullptr),
|
|
m_HttpProxy(nullptr), m_SocksProxy(nullptr), m_SamBridge(nullptr),
|
|
m_BOBCommandChannel(nullptr), m_I2CPServer(nullptr) {
|
|
}
|
|
|
|
ClientContext::~ClientContext() {
|
|
delete m_HttpProxy;
|
|
delete m_SocksProxy;
|
|
delete m_SamBridge;
|
|
delete m_BOBCommandChannel;
|
|
delete m_I2CPServer;
|
|
}
|
|
|
|
void ClientContext::Start() {
|
|
// shared local destination
|
|
if (!m_SharedLocalDestination)
|
|
CreateNewSharedLocalDestination();
|
|
|
|
// addressbook
|
|
m_AddressBook.Start();
|
|
|
|
// HTTP proxy
|
|
ReadHttpProxy();
|
|
|
|
// SOCKS proxy
|
|
ReadSocksProxy();
|
|
|
|
// I2P tunnels
|
|
ReadTunnels();
|
|
|
|
// SAM
|
|
bool sam;
|
|
i2p::config::GetOption("sam.enabled", sam);
|
|
if (sam) {
|
|
std::string samAddr;
|
|
i2p::config::GetOption("sam.address", samAddr);
|
|
uint16_t samPort;
|
|
i2p::config::GetOption("sam.port", samPort);
|
|
bool singleThread;
|
|
i2p::config::GetOption("sam.singlethread", singleThread);
|
|
LogPrint(eLogInfo, "Clients: Starting SAM bridge at ", samAddr, ":", samPort);
|
|
try {
|
|
m_SamBridge = new SAMBridge(samAddr, samPort, singleThread);
|
|
m_SamBridge->Start();
|
|
}
|
|
catch (std::exception &e) {
|
|
LogPrint(eLogError, "Clients: Exception in SAM bridge: ", e.what());
|
|
ThrowFatal("Unable to start SAM bridge at ", samAddr, ":", samPort, ": ", e.what());
|
|
}
|
|
}
|
|
|
|
// BOB
|
|
bool bob;
|
|
i2p::config::GetOption("bob.enabled", bob);
|
|
if (bob) {
|
|
std::string bobAddr;
|
|
i2p::config::GetOption("bob.address", bobAddr);
|
|
uint16_t bobPort;
|
|
i2p::config::GetOption("bob.port", bobPort);
|
|
LogPrint(eLogInfo, "Clients: Starting BOB command channel at ", bobAddr, ":", bobPort);
|
|
try {
|
|
m_BOBCommandChannel = new BOBCommandChannel(bobAddr, bobPort);
|
|
m_BOBCommandChannel->Start();
|
|
}
|
|
catch (std::exception &e) {
|
|
LogPrint(eLogError, "Clients: Exception in BOB bridge: ", e.what());
|
|
ThrowFatal("Unable to start BOB bridge at ", bobAddr, ":", bobPort, ": ", e.what());
|
|
}
|
|
}
|
|
|
|
// I2CP
|
|
bool i2cp;
|
|
i2p::config::GetOption("i2cp.enabled", i2cp);
|
|
if (i2cp) {
|
|
std::string i2cpAddr;
|
|
i2p::config::GetOption("i2cp.address", i2cpAddr);
|
|
uint16_t i2cpPort;
|
|
i2p::config::GetOption("i2cp.port", i2cpPort);
|
|
bool singleThread;
|
|
i2p::config::GetOption("i2cp.singlethread", singleThread);
|
|
LogPrint(eLogInfo, "Clients: Starting I2CP at ", i2cpAddr, ":", i2cpPort);
|
|
try {
|
|
m_I2CPServer = new I2CPServer(i2cpAddr, i2cpPort, singleThread);
|
|
m_I2CPServer->Start();
|
|
}
|
|
catch (std::exception &e) {
|
|
LogPrint(eLogError, "Clients: Exception in I2CP: ", e.what());
|
|
ThrowFatal("Unable to start I2CP at ", i2cpAddr, ":", i2cpPort, ": ", e.what());
|
|
}
|
|
}
|
|
|
|
m_AddressBook.StartResolvers();
|
|
|
|
// start UDP cleanup
|
|
if (!m_ServerForwards.empty()) {
|
|
m_CleanupUDPTimer.reset(new boost::asio::deadline_timer(m_SharedLocalDestination->GetService()));
|
|
ScheduleCleanupUDP();
|
|
}
|
|
}
|
|
|
|
void ClientContext::Stop() {
|
|
if (m_HttpProxy) {
|
|
LogPrint(eLogInfo, "Clients: Stopping HTTP Proxy");
|
|
m_HttpProxy->Stop();
|
|
delete m_HttpProxy;
|
|
m_HttpProxy = nullptr;
|
|
}
|
|
|
|
if (m_SocksProxy) {
|
|
LogPrint(eLogInfo, "Clients: Stopping SOCKS Proxy");
|
|
m_SocksProxy->Stop();
|
|
delete m_SocksProxy;
|
|
m_SocksProxy = nullptr;
|
|
}
|
|
|
|
for (auto &it: m_ClientTunnels) {
|
|
LogPrint(eLogInfo, "Clients: Stopping I2P client tunnel on port ", it.first);
|
|
it.second->Stop();
|
|
}
|
|
m_ClientTunnels.clear();
|
|
|
|
for (auto &it: m_ServerTunnels) {
|
|
LogPrint(eLogInfo, "Clients: Stopping I2P server tunnel");
|
|
it.second->Stop();
|
|
}
|
|
m_ServerTunnels.clear();
|
|
|
|
if (m_SamBridge) {
|
|
LogPrint(eLogInfo, "Clients: Stopping SAM bridge");
|
|
m_SamBridge->Stop();
|
|
delete m_SamBridge;
|
|
m_SamBridge = nullptr;
|
|
}
|
|
|
|
if (m_BOBCommandChannel) {
|
|
LogPrint(eLogInfo, "Clients: Stopping BOB command channel");
|
|
m_BOBCommandChannel->Stop();
|
|
delete m_BOBCommandChannel;
|
|
m_BOBCommandChannel = nullptr;
|
|
}
|
|
|
|
if (m_I2CPServer) {
|
|
LogPrint(eLogInfo, "Clients: Stopping I2CP");
|
|
m_I2CPServer->Stop();
|
|
delete m_I2CPServer;
|
|
m_I2CPServer = nullptr;
|
|
}
|
|
|
|
LogPrint(eLogInfo, "Clients: Stopping AddressBook");
|
|
m_AddressBook.Stop();
|
|
|
|
{
|
|
std::lock_guard <std::mutex> lock(m_ForwardsMutex);
|
|
m_ServerForwards.clear();
|
|
m_ClientForwards.clear();
|
|
}
|
|
|
|
if (m_CleanupUDPTimer) {
|
|
m_CleanupUDPTimer->cancel();
|
|
m_CleanupUDPTimer = nullptr;
|
|
}
|
|
|
|
for (auto &it: m_Destinations)
|
|
it.second->Stop();
|
|
m_Destinations.clear();
|
|
|
|
m_SharedLocalDestination->Release();
|
|
m_SharedLocalDestination = nullptr;
|
|
}
|
|
|
|
void ClientContext::ReloadConfig() {
|
|
// TODO: handle config changes
|
|
/*std::string config; i2p::config::GetOption("conf", config);
|
|
i2p::config::ParseConfig(config);*/
|
|
|
|
// change shared local destination
|
|
m_SharedLocalDestination->Release();
|
|
CreateNewSharedLocalDestination();
|
|
|
|
// recreate HTTP proxy
|
|
if (m_HttpProxy) {
|
|
m_HttpProxy->Stop();
|
|
delete m_HttpProxy;
|
|
m_HttpProxy = nullptr;
|
|
}
|
|
ReadHttpProxy();
|
|
|
|
// recreate SOCKS proxy
|
|
if (m_SocksProxy) {
|
|
m_SocksProxy->Stop();
|
|
delete m_SocksProxy;
|
|
m_SocksProxy = nullptr;
|
|
}
|
|
ReadSocksProxy();
|
|
|
|
// handle tunnels
|
|
// reset isUpdated for each tunnel
|
|
VisitTunnels(false);
|
|
// reload tunnels
|
|
ReadTunnels();
|
|
// delete not updated tunnels (not in config anymore)
|
|
VisitTunnels(true);
|
|
|
|
// delete unused destinations
|
|
std::unique_lock <std::mutex> l(m_DestinationsMutex);
|
|
for (auto it = m_Destinations.begin(); it != m_Destinations.end();) {
|
|
auto dest = it->second;
|
|
if (dest->GetRefCounter() > 0) ++it; // skip
|
|
else {
|
|
dest->Stop();
|
|
it = m_Destinations.erase(it);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool ClientContext::LoadPrivateKeys(i2p::data::PrivateKeys &keys, const std::string &filename,
|
|
i2p::data::SigningKeyType sigType, i2p::data::CryptoKeyType cryptoType) {
|
|
static const std::string transient("transient");
|
|
if (!filename.compare(0, transient.length(), transient)) // starts with transient
|
|
{
|
|
keys = i2p::data::PrivateKeys::CreateRandomKeys(sigType, cryptoType);
|
|
LogPrint(eLogInfo, "Clients: New transient keys address ",
|
|
m_AddressBook.ToAddress(keys.GetPublic()->GetIdentHash()), " created");
|
|
return true;
|
|
}
|
|
|
|
bool success = true;
|
|
std::string fullPath = i2p::fs::DataDirPath(filename);
|
|
std::ifstream s(fullPath, std::ifstream::binary);
|
|
if (s.is_open()) {
|
|
s.seekg(0, std::ios::end);
|
|
size_t len = s.tellg();
|
|
s.seekg(0, std::ios::beg);
|
|
uint8_t *buf = new uint8_t[len];
|
|
s.read((char *) buf, len);
|
|
if (!keys.FromBuffer(buf, len)) {
|
|
LogPrint(eLogError, "Clients: Failed to load keyfile ", filename);
|
|
success = false;
|
|
} else
|
|
LogPrint(eLogInfo, "Clients: Local address ",
|
|
m_AddressBook.ToAddress(keys.GetPublic()->GetIdentHash()), " loaded");
|
|
delete[] buf;
|
|
} else {
|
|
LogPrint(eLogError, "Clients: Can't open file ", fullPath, " Creating new one with signature type ",
|
|
sigType, " crypto type ", cryptoType);
|
|
keys = i2p::data::PrivateKeys::CreateRandomKeys(sigType, cryptoType);
|
|
std::ofstream f(fullPath, std::ofstream::binary | std::ofstream::out);
|
|
size_t len = keys.GetFullLen();
|
|
uint8_t *buf = new uint8_t[len];
|
|
len = keys.ToBuffer(buf, len);
|
|
f.write((char *) buf, len);
|
|
delete[] buf;
|
|
|
|
LogPrint(eLogInfo, "Clients: New private keys file ", fullPath, " for ",
|
|
m_AddressBook.ToAddress(keys.GetPublic()->GetIdentHash()), " created");
|
|
}
|
|
return success;
|
|
}
|
|
|
|
std::vector <std::shared_ptr<DatagramSessionInfo>>
|
|
ClientContext::GetForwardInfosFor(const i2p::data::IdentHash &destination) {
|
|
std::vector <std::shared_ptr<DatagramSessionInfo>> infos;
|
|
std::lock_guard <std::mutex> lock(m_ForwardsMutex);
|
|
for (const auto &c: m_ClientForwards) {
|
|
if (c.second->IsLocalDestination(destination)) {
|
|
for (auto &i: c.second->GetSessions()) infos.push_back(i);
|
|
break;
|
|
}
|
|
}
|
|
for (const auto &s: m_ServerForwards) {
|
|
if (std::get<0>(s.first) == destination) {
|
|
for (auto &i: s.second->GetSessions()) infos.push_back(i);
|
|
break;
|
|
}
|
|
}
|
|
return infos;
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination> ClientContext::CreateNewLocalDestination(bool isPublic,
|
|
i2p::data::SigningKeyType sigType,
|
|
i2p::data::CryptoKeyType cryptoType,
|
|
const std::map <std::string, std::string> *params) {
|
|
i2p::data::PrivateKeys keys = i2p::data::PrivateKeys::CreateRandomKeys(sigType, cryptoType);
|
|
auto localDestination = std::make_shared<RunnableClientDestination>(keys, isPublic, params);
|
|
AddLocalDestination(localDestination);
|
|
return localDestination;
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination> ClientContext::CreateNewLocalDestination(
|
|
boost::asio::io_service &service, bool isPublic,
|
|
i2p::data::SigningKeyType sigType, i2p::data::CryptoKeyType cryptoType,
|
|
const std::map <std::string, std::string> *params) {
|
|
i2p::data::PrivateKeys keys = i2p::data::PrivateKeys::CreateRandomKeys(sigType, cryptoType);
|
|
auto localDestination = std::make_shared<ClientDestination>(service, keys, isPublic, params);
|
|
AddLocalDestination(localDestination);
|
|
return localDestination;
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination>
|
|
ClientContext::CreateNewMatchedTunnelDestination(const i2p::data::PrivateKeys &keys, const std::string &name,
|
|
const std::map <std::string, std::string> *params) {
|
|
auto localDestination = std::make_shared<MatchedTunnelDestination>(keys, name, params);
|
|
AddLocalDestination(localDestination);
|
|
return localDestination;
|
|
}
|
|
|
|
void ClientContext::AddLocalDestination(std::shared_ptr <ClientDestination> localDestination) {
|
|
std::unique_lock <std::mutex> l(m_DestinationsMutex);
|
|
m_Destinations[localDestination->GetIdentHash()] = localDestination;
|
|
localDestination->Start();
|
|
}
|
|
|
|
void ClientContext::DeleteLocalDestination(std::shared_ptr <ClientDestination> destination) {
|
|
if (!destination) return;
|
|
auto it = m_Destinations.find(destination->GetIdentHash());
|
|
if (it != m_Destinations.end()) {
|
|
auto d = it->second;
|
|
{
|
|
std::unique_lock <std::mutex> l(m_DestinationsMutex);
|
|
m_Destinations.erase(it);
|
|
}
|
|
d->Stop();
|
|
}
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination>
|
|
ClientContext::CreateNewLocalDestination(const i2p::data::PrivateKeys &keys, bool isPublic,
|
|
const std::map <std::string, std::string> *params) {
|
|
auto it = m_Destinations.find(keys.GetPublic()->GetIdentHash());
|
|
if (it != m_Destinations.end()) {
|
|
LogPrint(eLogWarning, "Clients: Local destination ",
|
|
m_AddressBook.ToAddress(keys.GetPublic()->GetIdentHash()), " exists");
|
|
it->second->Start(); // make sure to start
|
|
return it->second;
|
|
}
|
|
auto localDestination = std::make_shared<RunnableClientDestination>(keys, isPublic, params);
|
|
AddLocalDestination(localDestination);
|
|
return localDestination;
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination> ClientContext::CreateNewLocalDestination(boost::asio::io_service &service,
|
|
const i2p::data::PrivateKeys &keys,
|
|
bool isPublic,
|
|
const std::map <std::string, std::string> *params) {
|
|
auto it = m_Destinations.find(keys.GetPublic()->GetIdentHash());
|
|
if (it != m_Destinations.end()) {
|
|
LogPrint(eLogWarning, "Clients: Local destination ",
|
|
m_AddressBook.ToAddress(keys.GetPublic()->GetIdentHash()), " exists");
|
|
it->second->Start(); // make sure to start
|
|
return it->second;
|
|
}
|
|
auto localDestination = std::make_shared<ClientDestination>(service, keys, isPublic, params);
|
|
AddLocalDestination(localDestination);
|
|
return localDestination;
|
|
}
|
|
|
|
void ClientContext::CreateNewSharedLocalDestination() {
|
|
std::map <std::string, std::string> params
|
|
{
|
|
{I2CP_PARAM_INBOUND_TUNNELS_QUANTITY, "3"},
|
|
{I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY, "3"},
|
|
{I2CP_PARAM_LEASESET_TYPE, "3"},
|
|
{I2CP_PARAM_LEASESET_ENCRYPTION_TYPE, "0,4"}
|
|
};
|
|
m_SharedLocalDestination = CreateNewLocalDestination(false,
|
|
i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519,
|
|
i2p::data::CRYPTO_KEY_TYPE_ELGAMAL,
|
|
¶ms); // non-public, EDDSA
|
|
m_SharedLocalDestination->Acquire();
|
|
}
|
|
|
|
std::shared_ptr <ClientDestination>
|
|
ClientContext::FindLocalDestination(const i2p::data::IdentHash &destination) const {
|
|
auto it = m_Destinations.find(destination);
|
|
if (it != m_Destinations.end())
|
|
return it->second;
|
|
return nullptr;
|
|
}
|
|
|
|
template<typename Section, typename Type>
|
|
std::string
|
|
ClientContext::GetI2CPOption(const Section §ion, const std::string &name, const Type &value) const {
|
|
return section.second.get(boost::property_tree::ptree::path_type(name, '/'), std::to_string(value));
|
|
}
|
|
|
|
template<typename Section>
|
|
std::string ClientContext::GetI2CPStringOption(const Section §ion, const std::string &name,
|
|
const std::string &value) const {
|
|
return section.second.get(boost::property_tree::ptree::path_type(name, '/'), value);
|
|
}
|
|
|
|
template<typename Section>
|
|
void ClientContext::ReadI2CPOptionsGroup(const Section §ion, const std::string &group,
|
|
std::map <std::string, std::string> &options) const {
|
|
for (auto it: section.second) {
|
|
if (it.first.length() >= group.length() && !it.first.compare(0, group.length(), group))
|
|
options[it.first] = it.second.get_value("");
|
|
}
|
|
}
|
|
|
|
template<typename Section>
|
|
void ClientContext::ReadI2CPOptions(const Section §ion, bool isServer,
|
|
std::map <std::string, std::string> &options) const {
|
|
options[I2CP_PARAM_INBOUND_TUNNEL_LENGTH] = GetI2CPOption(section, I2CP_PARAM_INBOUND_TUNNEL_LENGTH,
|
|
DEFAULT_INBOUND_TUNNEL_LENGTH);
|
|
options[I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH] = GetI2CPOption(section, I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH,
|
|
DEFAULT_OUTBOUND_TUNNEL_LENGTH);
|
|
options[I2CP_PARAM_INBOUND_TUNNELS_QUANTITY] = GetI2CPOption(section, I2CP_PARAM_INBOUND_TUNNELS_QUANTITY,
|
|
DEFAULT_INBOUND_TUNNELS_QUANTITY);
|
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY] = GetI2CPOption(section, I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY,
|
|
DEFAULT_OUTBOUND_TUNNELS_QUANTITY);
|
|
options[I2CP_PARAM_INBOUND_TUNNELS_LENGTH_VARIANCE] = GetI2CPOption(section,
|
|
I2CP_PARAM_INBOUND_TUNNELS_LENGTH_VARIANCE,
|
|
DEFAULT_INBOUND_TUNNELS_LENGTH_VARIANCE);
|
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_LENGTH_VARIANCE] = GetI2CPOption(section,
|
|
I2CP_PARAM_OUTBOUND_TUNNELS_LENGTH_VARIANCE,
|
|
DEFAULT_OUTBOUND_TUNNELS_LENGTH_VARIANCE);
|
|
options[I2CP_PARAM_TAGS_TO_SEND] = GetI2CPOption(section, I2CP_PARAM_TAGS_TO_SEND, DEFAULT_TAGS_TO_SEND);
|
|
options[I2CP_PARAM_MIN_TUNNEL_LATENCY] = GetI2CPOption(section, I2CP_PARAM_MIN_TUNNEL_LATENCY,
|
|
DEFAULT_MIN_TUNNEL_LATENCY);
|
|
options[I2CP_PARAM_MAX_TUNNEL_LATENCY] = GetI2CPOption(section, I2CP_PARAM_MAX_TUNNEL_LATENCY,
|
|
DEFAULT_MAX_TUNNEL_LATENCY);
|
|
options[I2CP_PARAM_STREAMING_INITIAL_ACK_DELAY] = GetI2CPOption(section,
|
|
I2CP_PARAM_STREAMING_INITIAL_ACK_DELAY,
|
|
DEFAULT_INITIAL_ACK_DELAY);
|
|
options[I2CP_PARAM_STREAMING_ANSWER_PINGS] = GetI2CPOption(section, I2CP_PARAM_STREAMING_ANSWER_PINGS,
|
|
isServer ? DEFAULT_ANSWER_PINGS : false);
|
|
options[I2CP_PARAM_LEASESET_TYPE] = GetI2CPOption(section, I2CP_PARAM_LEASESET_TYPE, DEFAULT_LEASESET_TYPE);
|
|
std::string encType = GetI2CPStringOption(section, I2CP_PARAM_LEASESET_ENCRYPTION_TYPE, "0,4");
|
|
if (encType.length() > 0) options[I2CP_PARAM_LEASESET_ENCRYPTION_TYPE] = encType;
|
|
std::string privKey = GetI2CPStringOption(section, I2CP_PARAM_LEASESET_PRIV_KEY, "");
|
|
if (privKey.length() > 0) options[I2CP_PARAM_LEASESET_PRIV_KEY] = privKey;
|
|
auto authType = GetI2CPOption(section, I2CP_PARAM_LEASESET_AUTH_TYPE, 0);
|
|
if (authType != "0") // auth is set
|
|
{
|
|
options[I2CP_PARAM_LEASESET_AUTH_TYPE] = authType;
|
|
if (authType == "1") // DH
|
|
ReadI2CPOptionsGroup(section, I2CP_PARAM_LEASESET_CLIENT_DH, options);
|
|
else if (authType == "2") // PSK
|
|
ReadI2CPOptionsGroup(section, I2CP_PARAM_LEASESET_CLIENT_PSK, options);
|
|
}
|
|
std::string explicitPeers = GetI2CPStringOption(section, I2CP_PARAM_EXPLICIT_PEERS, "");
|
|
if (explicitPeers.length() > 0) options[I2CP_PARAM_EXPLICIT_PEERS] = explicitPeers;
|
|
std::string ratchetInboundTags = GetI2CPStringOption(section, I2CP_PARAM_RATCHET_INBOUND_TAGS, "");
|
|
if (ratchetInboundTags.length() > 0) options[I2CP_PARAM_RATCHET_INBOUND_TAGS] = ratchetInboundTags;
|
|
}
|
|
|
|
void ClientContext::ReadI2CPOptionsFromConfig(const std::string &prefix,
|
|
std::map <std::string, std::string> &options) const {
|
|
std::string value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_INBOUND_TUNNEL_LENGTH, value))
|
|
options[I2CP_PARAM_INBOUND_TUNNEL_LENGTH] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_INBOUND_TUNNELS_QUANTITY, value))
|
|
options[I2CP_PARAM_INBOUND_TUNNELS_QUANTITY] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_INBOUND_TUNNELS_LENGTH_VARIANCE, value))
|
|
options[I2CP_PARAM_INBOUND_TUNNELS_LENGTH_VARIANCE] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH, value))
|
|
options[I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY, value))
|
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_OUTBOUND_TUNNELS_LENGTH_VARIANCE, value))
|
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_LENGTH_VARIANCE] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_MIN_TUNNEL_LATENCY, value))
|
|
options[I2CP_PARAM_MIN_TUNNEL_LATENCY] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_MAX_TUNNEL_LATENCY, value))
|
|
options[I2CP_PARAM_MAX_TUNNEL_LATENCY] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_LEASESET_TYPE, value))
|
|
options[I2CP_PARAM_LEASESET_TYPE] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_LEASESET_ENCRYPTION_TYPE, value))
|
|
options[I2CP_PARAM_LEASESET_ENCRYPTION_TYPE] = value;
|
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_LEASESET_PRIV_KEY, value) && !value.empty())
|
|
options[I2CP_PARAM_LEASESET_PRIV_KEY] = value;
|
|
}
|
|
|
|
void ClientContext::ReadTunnels() {
|
|
int numClientTunnels = 0, numServerTunnels = 0;
|
|
std::string tunConf;
|
|
i2p::config::GetOption("tunconf", tunConf);
|
|
if (tunConf.empty())
|
|
tunConf = i2p::fs::DataDirPath("tunnels.conf");
|
|
|
|
LogPrint(eLogDebug, "Clients: Tunnels config file: ", tunConf);
|
|
ReadTunnels(tunConf, numClientTunnels, numServerTunnels);
|
|
|
|
std::string tunDir;
|
|
i2p::config::GetOption("tunnelsdir", tunDir);
|
|
if (tunDir.empty())
|
|
tunDir = i2p::fs::DataDirPath("tunnels.d");
|
|
|
|
if (i2p::fs::Exists(tunDir)) {
|
|
std::vector <std::string> files;
|
|
if (i2p::fs::ReadDir(tunDir, files)) {
|
|
for (auto &it: files) {
|
|
if (it.substr(it.size() - 5) != ".conf") continue; // skip files which not ends with ".conf"
|
|
LogPrint(eLogDebug, "Clients: Tunnels extra config file: ", it);
|
|
ReadTunnels(it, numClientTunnels, numServerTunnels);
|
|
}
|
|
}
|
|
}
|
|
|
|
LogPrint(eLogInfo, "Clients: ", numClientTunnels, " I2P client tunnels created");
|
|
LogPrint(eLogInfo, "Clients: ", numServerTunnels, " I2P server tunnels created");
|
|
}
|
|
|
|
void ClientContext::ReadTunnels(const std::string &tunConf, int &numClientTunnels, int &numServerTunnels) {
|
|
boost::property_tree::ptree pt;
|
|
try {
|
|
boost::property_tree::read_ini(tunConf, pt);
|
|
} catch (std::exception &ex) {
|
|
LogPrint(eLogWarning, "Clients: Can't read ", tunConf, ": ", ex.what());
|
|
return;
|
|
}
|
|
|
|
std::map <std::string, std::shared_ptr<ClientDestination>> destinations; // keys -> destination
|
|
for (auto §ion: pt) {
|
|
std::string name = section.first;
|
|
try {
|
|
std::string type = section.second.get<std::string>(I2P_TUNNELS_SECTION_TYPE);
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_CLIENT
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_SOCKS
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_WEBSOCKS
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_HTTPPROXY
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT) {
|
|
// mandatory params
|
|
std::string dest;
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_CLIENT || type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT)
|
|
dest = section.second.get<std::string>(I2P_CLIENT_TUNNEL_DESTINATION);
|
|
int port = section.second.get<int>(I2P_CLIENT_TUNNEL_PORT);
|
|
// optional params
|
|
bool matchTunnels = section.second.get(I2P_CLIENT_TUNNEL_MATCH_TUNNELS, false);
|
|
std::string keys = section.second.get(I2P_CLIENT_TUNNEL_KEYS, "transient");
|
|
std::string address = section.second.get(I2P_CLIENT_TUNNEL_ADDRESS, "127.0.0.1");
|
|
int destinationPort = section.second.get(I2P_CLIENT_TUNNEL_DESTINATION_PORT, 0);
|
|
i2p::data::SigningKeyType sigType = section.second.get(I2P_CLIENT_TUNNEL_SIGNATURE_TYPE,
|
|
i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519);
|
|
i2p::data::CryptoKeyType cryptoType = section.second.get(I2P_CLIENT_TUNNEL_CRYPTO_TYPE,
|
|
i2p::data::CRYPTO_KEY_TYPE_ELGAMAL);
|
|
// I2CP
|
|
std::map <std::string, std::string> options;
|
|
ReadI2CPOptions(section, false, options);
|
|
|
|
std::shared_ptr <ClientDestination> localDestination = nullptr;
|
|
if (keys.length() > 0) {
|
|
auto it = destinations.find(keys);
|
|
if (it != destinations.end())
|
|
localDestination = it->second;
|
|
else {
|
|
i2p::data::PrivateKeys k;
|
|
if (LoadPrivateKeys(k, keys, sigType, cryptoType)) {
|
|
localDestination = FindLocalDestination(k.GetPublic()->GetIdentHash());
|
|
if (!localDestination) {
|
|
if (matchTunnels)
|
|
localDestination = CreateNewMatchedTunnelDestination(k, dest, &options);
|
|
else
|
|
localDestination = CreateNewLocalDestination(k, type ==
|
|
I2P_TUNNELS_SECTION_TYPE_UDPCLIENT,
|
|
&options);
|
|
if (keys != "transient")
|
|
destinations[keys] = localDestination;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT) {
|
|
// udp client
|
|
// TODO: hostnames
|
|
boost::asio::ip::udp::endpoint end(boost::asio::ip::address::from_string(address), port);
|
|
if (!localDestination)
|
|
localDestination = m_SharedLocalDestination;
|
|
|
|
bool gzip = section.second.get(I2P_CLIENT_TUNNEL_GZIP, true);
|
|
auto clientTunnel = std::make_shared<I2PUDPClientTunnel>(name, dest, end, localDestination,
|
|
destinationPort, gzip);
|
|
|
|
auto ins = m_ClientForwards.insert(std::make_pair(end, clientTunnel));
|
|
if (ins.second) {
|
|
clientTunnel->Start();
|
|
numClientTunnels++;
|
|
} else {
|
|
// TODO: update
|
|
if (ins.first->second->GetLocalDestination() != clientTunnel->GetLocalDestination()) {
|
|
LogPrint(eLogInfo, "Clients: I2P UDP client tunnel destination updated");
|
|
ins.first->second->Stop();
|
|
ins.first->second->SetLocalDestination(clientTunnel->GetLocalDestination());
|
|
ins.first->second->Start();
|
|
}
|
|
ins.first->second->isUpdated = true;
|
|
LogPrint(eLogError, "Clients: I2P Client forward for endpoint ", end,
|
|
" already exists");
|
|
}
|
|
|
|
} else {
|
|
boost::asio::ip::tcp::endpoint clientEndpoint;
|
|
std::shared_ptr <I2PService> clientTunnel;
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_SOCKS) {
|
|
// socks proxy
|
|
std::string outproxy = section.second.get("outproxy", "");
|
|
auto tun = std::make_shared<i2p::proxy::SOCKSProxy>(name, address, port,
|
|
!outproxy.empty(), outproxy,
|
|
destinationPort, localDestination);
|
|
clientTunnel = tun;
|
|
clientEndpoint = tun->GetLocalEndpoint();
|
|
} else if (type == I2P_TUNNELS_SECTION_TYPE_HTTPPROXY) {
|
|
// http proxy
|
|
std::string outproxy = section.second.get("outproxy", "");
|
|
bool addresshelper = section.second.get("addresshelper", true);
|
|
auto tun = std::make_shared<i2p::proxy::HTTPProxy>(name, address, port, outproxy,
|
|
addresshelper, localDestination);
|
|
clientTunnel = tun;
|
|
clientEndpoint = tun->GetLocalEndpoint();
|
|
} else if (type == I2P_TUNNELS_SECTION_TYPE_WEBSOCKS) {
|
|
LogPrint(eLogWarning,
|
|
"Clients: I2P Client tunnel websocks is deprecated, not starting ", name,
|
|
" tunnel");
|
|
continue;
|
|
} else {
|
|
// tcp client
|
|
auto tun = std::make_shared<I2PClientTunnel>(name, dest, address, port,
|
|
localDestination, destinationPort);
|
|
clientTunnel = tun;
|
|
clientEndpoint = tun->GetLocalEndpoint();
|
|
|
|
uint32_t keepAlive = section.second.get<uint32_t>(I2P_CLIENT_TUNNEL_KEEP_ALIVE_INTERVAL,
|
|
0);
|
|
if (keepAlive) {
|
|
tun->SetKeepAliveInterval(keepAlive);
|
|
LogPrint(eLogInfo, "Clients: I2P Client tunnel keep alive interval set to ",
|
|
keepAlive);
|
|
}
|
|
}
|
|
|
|
uint32_t timeout = section.second.get<uint32_t>(I2P_CLIENT_TUNNEL_CONNECT_TIMEOUT, 0);
|
|
if (timeout) {
|
|
clientTunnel->SetConnectTimeout(timeout);
|
|
LogPrint(eLogInfo, "Clients: I2P Client tunnel connect timeout set to ", timeout);
|
|
}
|
|
|
|
auto ins = m_ClientTunnels.insert(std::make_pair(clientEndpoint, clientTunnel));
|
|
if (ins.second) {
|
|
clientTunnel->Start();
|
|
numClientTunnels++;
|
|
} else {
|
|
// TODO: update
|
|
if (ins.first->second->GetLocalDestination() != clientTunnel->GetLocalDestination()) {
|
|
LogPrint(eLogInfo, "Clients: I2P client tunnel destination updated");
|
|
ins.first->second->Stop();
|
|
ins.first->second->SetLocalDestination(clientTunnel->GetLocalDestination());
|
|
ins.first->second->Start();
|
|
}
|
|
ins.first->second->isUpdated = true;
|
|
LogPrint(eLogInfo, "Clients: I2P client tunnel for endpoint ", clientEndpoint,
|
|
" already exists");
|
|
}
|
|
}
|
|
} else if (type == I2P_TUNNELS_SECTION_TYPE_SERVER
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_HTTP
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_IRC
|
|
|| type == I2P_TUNNELS_SECTION_TYPE_UDPSERVER) {
|
|
// mandatory params
|
|
std::string host = section.second.get<std::string>(I2P_SERVER_TUNNEL_HOST);
|
|
int port = section.second.get<int>(I2P_SERVER_TUNNEL_PORT);
|
|
std::string keys = section.second.get<std::string>(I2P_SERVER_TUNNEL_KEYS);
|
|
// optional params
|
|
int inPort = section.second.get(I2P_SERVER_TUNNEL_INPORT, 0);
|
|
std::string accessList = section.second.get(I2P_SERVER_TUNNEL_ACCESS_LIST, "");
|
|
if (accessList == "")
|
|
accessList = section.second.get(I2P_SERVER_TUNNEL_WHITE_LIST, "");
|
|
std::string hostOverride = section.second.get(I2P_SERVER_TUNNEL_HOST_OVERRIDE, "");
|
|
std::string webircpass = section.second.get<std::string>(I2P_SERVER_TUNNEL_WEBIRC_PASSWORD, "");
|
|
bool gzip = section.second.get(I2P_SERVER_TUNNEL_GZIP, false);
|
|
i2p::data::SigningKeyType sigType = section.second.get(I2P_SERVER_TUNNEL_SIGNATURE_TYPE,
|
|
i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519);
|
|
i2p::data::CryptoKeyType cryptoType = section.second.get(I2P_CLIENT_TUNNEL_CRYPTO_TYPE,
|
|
i2p::data::CRYPTO_KEY_TYPE_ELGAMAL);
|
|
|
|
std::string address = section.second.get<std::string>(I2P_SERVER_TUNNEL_ADDRESS, "");
|
|
bool isUniqueLocal = section.second.get(I2P_SERVER_TUNNEL_ENABLE_UNIQUE_LOCAL, true);
|
|
|
|
// I2CP
|
|
std::map <std::string, std::string> options;
|
|
ReadI2CPOptions(section, true, options);
|
|
|
|
std::shared_ptr <ClientDestination> localDestination = nullptr;
|
|
auto it = destinations.find(keys);
|
|
if (it != destinations.end()) {
|
|
localDestination = it->second;
|
|
localDestination->SetPublic(true);
|
|
} else {
|
|
i2p::data::PrivateKeys k;
|
|
if (!LoadPrivateKeys(k, keys, sigType, cryptoType))
|
|
continue;
|
|
localDestination = FindLocalDestination(k.GetPublic()->GetIdentHash());
|
|
if (!localDestination) {
|
|
localDestination = CreateNewLocalDestination(k, true, &options);
|
|
destinations[keys] = localDestination;
|
|
} else
|
|
localDestination->SetPublic(true);
|
|
}
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_UDPSERVER) {
|
|
// udp server tunnel
|
|
// TODO: hostnames
|
|
boost::asio::ip::udp::endpoint endpoint(boost::asio::ip::address::from_string(host), port);
|
|
if (address.empty()) {
|
|
if (!endpoint.address().is_unspecified() && endpoint.address().is_v6())
|
|
address = "::1";
|
|
else
|
|
address = "127.0.0.1";
|
|
}
|
|
auto localAddress = boost::asio::ip::address::from_string(address);
|
|
auto serverTunnel = std::make_shared<I2PUDPServerTunnel>(name, localDestination,
|
|
localAddress, endpoint, port,
|
|
gzip);
|
|
if (!isUniqueLocal) {
|
|
LogPrint(eLogInfo, "Clients: Disabling loopback address mapping");
|
|
serverTunnel->SetUniqueLocal(isUniqueLocal);
|
|
}
|
|
std::lock_guard <std::mutex> lock(m_ForwardsMutex);
|
|
auto ins = m_ServerForwards.insert(std::make_pair(
|
|
std::make_pair(localDestination->GetIdentHash(), port),
|
|
serverTunnel));
|
|
if (ins.second) {
|
|
serverTunnel->Start();
|
|
LogPrint(eLogInfo, "Clients: I2P Server Forward created for UDP Endpoint ", host, ":",
|
|
port, " bound on ", address, " for ",
|
|
localDestination->GetIdentHash().ToBase32());
|
|
} else {
|
|
ins.first->second->isUpdated = true;
|
|
LogPrint(eLogError, "Clients: I2P Server Forward for destination/port ",
|
|
m_AddressBook.ToAddress(localDestination->GetIdentHash()), "/", port,
|
|
" already exists");
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
std::shared_ptr <I2PServerTunnel> serverTunnel;
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_HTTP)
|
|
serverTunnel = std::make_shared<I2PServerTunnelHTTP>(name, host, port, localDestination,
|
|
hostOverride, inPort, gzip);
|
|
else if (type == I2P_TUNNELS_SECTION_TYPE_IRC)
|
|
serverTunnel = std::make_shared<I2PServerTunnelIRC>(name, host, port, localDestination,
|
|
webircpass, inPort, gzip);
|
|
else // regular server tunnel by default
|
|
serverTunnel = std::make_shared<I2PServerTunnel>(name, host, port, localDestination, inPort,
|
|
gzip);
|
|
|
|
if (!address.empty())
|
|
serverTunnel->SetLocalAddress(address);
|
|
if (!isUniqueLocal) {
|
|
LogPrint(eLogInfo, "Clients: Disabling loopback address mapping");
|
|
serverTunnel->SetUniqueLocal(isUniqueLocal);
|
|
}
|
|
if (accessList.length() > 0) {
|
|
std::set <i2p::data::IdentHash> idents;
|
|
size_t pos = 0, comma;
|
|
do {
|
|
comma = accessList.find(',', pos);
|
|
i2p::data::IdentHash ident;
|
|
ident.FromBase32(accessList.substr(pos, comma != std::string::npos ? comma - pos
|
|
: std::string::npos));
|
|
idents.insert(ident);
|
|
pos = comma + 1;
|
|
} while (comma != std::string::npos);
|
|
serverTunnel->SetAccessList(idents);
|
|
}
|
|
auto ins = m_ServerTunnels.insert(std::make_pair(
|
|
std::make_pair(localDestination->GetIdentHash(), inPort),
|
|
serverTunnel));
|
|
if (ins.second) {
|
|
serverTunnel->Start();
|
|
numServerTunnels++;
|
|
} else {
|
|
// TODO: update
|
|
if (ins.first->second->GetLocalDestination() != serverTunnel->GetLocalDestination()) {
|
|
LogPrint(eLogInfo, "Clients: I2P server tunnel destination updated");
|
|
ins.first->second->Stop();
|
|
ins.first->second->SetLocalDestination(serverTunnel->GetLocalDestination());
|
|
ins.first->second->Start();
|
|
}
|
|
ins.first->second->isUpdated = true;
|
|
LogPrint(eLogInfo, "Clients: I2P server tunnel for destination/port ",
|
|
m_AddressBook.ToAddress(localDestination->GetIdentHash()), "/", inPort,
|
|
" already exists");
|
|
}
|
|
|
|
} else
|
|
LogPrint(eLogWarning, "Clients: Unknown section type = ", type, " of ", name, " in ", tunConf);
|
|
}
|
|
catch (std::exception &ex) {
|
|
LogPrint(eLogError, "Clients: Can't read tunnel ", name, " params: ", ex.what());
|
|
ThrowFatal("Unable to start tunnel ", name, ": ", ex.what());
|
|
}
|
|
}
|
|
}
|
|
|
|
void ClientContext::ReadHttpProxy() {
|
|
std::shared_ptr <ClientDestination> localDestination;
|
|
bool httproxy;
|
|
i2p::config::GetOption("httpproxy.enabled", httproxy);
|
|
if (httproxy) {
|
|
std::string httpProxyKeys;
|
|
i2p::config::GetOption("httpproxy.keys", httpProxyKeys);
|
|
std::string httpProxyAddr;
|
|
i2p::config::GetOption("httpproxy.address", httpProxyAddr);
|
|
uint16_t httpProxyPort;
|
|
i2p::config::GetOption("httpproxy.port", httpProxyPort);
|
|
std::string httpOutProxyURL;
|
|
i2p::config::GetOption("httpproxy.outproxy", httpOutProxyURL);
|
|
bool httpAddresshelper;
|
|
i2p::config::GetOption("httpproxy.addresshelper", httpAddresshelper);
|
|
if (httpAddresshelper)
|
|
i2p::config::GetOption("addressbook.enabled",
|
|
httpAddresshelper); // addresshelper is not supported without address book
|
|
i2p::data::SigningKeyType sigType;
|
|
i2p::config::GetOption("httpproxy.signaturetype", sigType);
|
|
LogPrint(eLogInfo, "Clients: Starting HTTP Proxy at ", httpProxyAddr, ":", httpProxyPort);
|
|
if (httpProxyKeys.length() > 0) {
|
|
i2p::data::PrivateKeys keys;
|
|
if (LoadPrivateKeys(keys, httpProxyKeys, sigType)) {
|
|
std::map <std::string, std::string> params;
|
|
ReadI2CPOptionsFromConfig("httpproxy.", params);
|
|
localDestination = CreateNewLocalDestination(keys, false, ¶ms);
|
|
if (localDestination) localDestination->Acquire();
|
|
} else
|
|
LogPrint(eLogError, "Clients: Failed to load HTTP Proxy key");
|
|
}
|
|
try {
|
|
m_HttpProxy = new i2p::proxy::HTTPProxy("HTTP Proxy", httpProxyAddr, httpProxyPort, httpOutProxyURL,
|
|
httpAddresshelper, localDestination);
|
|
m_HttpProxy->Start();
|
|
}
|
|
catch (std::exception &e) {
|
|
LogPrint(eLogError, "Clients: Exception in HTTP Proxy: ", e.what());
|
|
ThrowFatal("Unable to start HTTP Proxy at ", httpProxyAddr, ":", httpProxyPort, ": ", e.what());
|
|
}
|
|
}
|
|
}
|
|
|
|
void ClientContext::ReadSocksProxy() {
|
|
std::shared_ptr <ClientDestination> localDestination;
|
|
bool socksproxy;
|
|
i2p::config::GetOption("socksproxy.enabled", socksproxy);
|
|
if (socksproxy) {
|
|
std::string httpProxyKeys;
|
|
i2p::config::GetOption("httpproxy.keys", httpProxyKeys);
|
|
// we still need httpProxyKeys to compare with sockProxyKeys
|
|
std::string socksProxyKeys;
|
|
i2p::config::GetOption("socksproxy.keys", socksProxyKeys);
|
|
std::string socksProxyAddr;
|
|
i2p::config::GetOption("socksproxy.address", socksProxyAddr);
|
|
uint16_t socksProxyPort;
|
|
i2p::config::GetOption("socksproxy.port", socksProxyPort);
|
|
bool socksOutProxy;
|
|
i2p::config::GetOption("socksproxy.outproxy.enabled", socksOutProxy);
|
|
std::string socksOutProxyAddr;
|
|
i2p::config::GetOption("socksproxy.outproxy", socksOutProxyAddr);
|
|
uint16_t socksOutProxyPort;
|
|
i2p::config::GetOption("socksproxy.outproxyport", socksOutProxyPort);
|
|
i2p::data::SigningKeyType sigType;
|
|
i2p::config::GetOption("socksproxy.signaturetype", sigType);
|
|
LogPrint(eLogInfo, "Clients: Starting SOCKS Proxy at ", socksProxyAddr, ":", socksProxyPort);
|
|
if (httpProxyKeys == socksProxyKeys && m_HttpProxy) {
|
|
localDestination = m_HttpProxy->GetLocalDestination();
|
|
localDestination->Acquire();
|
|
} else if (socksProxyKeys.length() > 0) {
|
|
i2p::data::PrivateKeys keys;
|
|
if (LoadPrivateKeys(keys, socksProxyKeys, sigType)) {
|
|
std::map <std::string, std::string> params;
|
|
ReadI2CPOptionsFromConfig("socksproxy.", params);
|
|
localDestination = CreateNewLocalDestination(keys, false, ¶ms);
|
|
if (localDestination) localDestination->Acquire();
|
|
} else
|
|
LogPrint(eLogError, "Clients: Failed to load SOCKS Proxy key");
|
|
}
|
|
try {
|
|
m_SocksProxy = new i2p::proxy::SOCKSProxy("SOCKS", socksProxyAddr, socksProxyPort,
|
|
socksOutProxy, socksOutProxyAddr, socksOutProxyPort,
|
|
localDestination);
|
|
m_SocksProxy->Start();
|
|
}
|
|
catch (std::exception &e) {
|
|
LogPrint(eLogError, "Clients: Exception in SOCKS Proxy: ", e.what());
|
|
ThrowFatal("Unable to start SOCKS Proxy at ", socksProxyAddr, ":", socksProxyPort, ": ", e.what());
|
|
}
|
|
}
|
|
}
|
|
|
|
void ClientContext::ScheduleCleanupUDP() {
|
|
if (m_CleanupUDPTimer) {
|
|
// schedule cleanup in 17 seconds
|
|
m_CleanupUDPTimer->expires_from_now(boost::posix_time::seconds(17));
|
|
m_CleanupUDPTimer->async_wait(std::bind(&ClientContext::CleanupUDP, this, std::placeholders::_1));
|
|
}
|
|
}
|
|
|
|
void ClientContext::CleanupUDP(const boost::system::error_code &ecode) {
|
|
if (!ecode) {
|
|
std::lock_guard <std::mutex> lock(m_ForwardsMutex);
|
|
for (auto &s: m_ServerForwards) s.second->ExpireStale();
|
|
ScheduleCleanupUDP();
|
|
}
|
|
}
|
|
|
|
void ClientContext::VisitTunnels(bool clean) {
|
|
for (auto it = m_ClientTunnels.begin(); it != m_ClientTunnels.end();) {
|
|
if (clean && !it->second->isUpdated) {
|
|
it->second->Stop();
|
|
it = m_ClientTunnels.erase(it);
|
|
} else {
|
|
it->second->isUpdated = false;
|
|
it++;
|
|
}
|
|
}
|
|
|
|
for (auto it = m_ServerTunnels.begin(); it != m_ServerTunnels.end();) {
|
|
if (clean && !it->second->isUpdated) {
|
|
it->second->Stop();
|
|
it = m_ServerTunnels.erase(it);
|
|
} else {
|
|
it->second->isUpdated = false;
|
|
it++;
|
|
}
|
|
}
|
|
|
|
// TODO: Write correct UDP tunnels stop
|
|
for (auto it = m_ClientForwards.begin(); it != m_ClientForwards.end();) {
|
|
if (clean && !it->second->isUpdated) {
|
|
it->second->Stop();
|
|
it = m_ClientForwards.erase(it);
|
|
} else {
|
|
it->second->isUpdated = false;
|
|
it++;
|
|
}
|
|
}
|
|
|
|
for (auto it = m_ServerForwards.begin(); it != m_ServerForwards.end();) {
|
|
if (clean && !it->second->isUpdated) {
|
|
it->second->Stop();
|
|
it = m_ServerForwards.erase(it);
|
|
} else {
|
|
it->second->isUpdated = false;
|
|
it++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|