rendezvous_server.rs 48 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288
  1. use crate::common::*;
  2. use crate::peer::*;
  3. use hbb_common::{
  4. allow_err,
  5. bytes::{Bytes, BytesMut},
  6. bytes_codec::BytesCodec,
  7. config,
  8. futures::future::join_all,
  9. futures_util::{
  10. sink::SinkExt,
  11. stream::{SplitSink, StreamExt},
  12. },
  13. log,
  14. protobuf::{Message as _, MessageField},
  15. rendezvous_proto::{
  16. register_pk_response::Result::{TOO_FREQUENT, UUID_MISMATCH},
  17. *,
  18. },
  19. tcp::{listen_any, FramedStream},
  20. timeout,
  21. tokio::{
  22. self,
  23. io::{AsyncReadExt, AsyncWriteExt},
  24. net::{TcpListener, TcpStream},
  25. sync::{mpsc, Mutex},
  26. time::{interval, Duration},
  27. },
  28. tokio_util::codec::Framed,
  29. try_into_v4,
  30. udp::FramedSocket,
  31. AddrMangle, ResultType,
  32. };
  33. use ipnetwork::Ipv4Network;
  34. use sodiumoxide::crypto::sign;
  35. use std::{
  36. collections::HashMap,
  37. net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
  38. sync::Arc,
  39. time::Instant,
  40. };
  41. #[derive(Clone, Debug)]
  42. enum Data {
  43. Msg(Box<RendezvousMessage>, SocketAddr),
  44. RelayServers0(String),
  45. RelayServers(RelayServers),
  46. }
  47. const REG_TIMEOUT: i32 = 30_000;
  48. type TcpStreamSink = SplitSink<Framed<TcpStream, BytesCodec>, Bytes>;
  49. type WsSink = SplitSink<tokio_tungstenite::WebSocketStream<TcpStream>, tungstenite::Message>;
  50. enum Sink {
  51. TcpStream(TcpStreamSink),
  52. Ws(WsSink),
  53. }
  54. type Sender = mpsc::UnboundedSender<Data>;
  55. type Receiver = mpsc::UnboundedReceiver<Data>;
  56. static mut ROTATION_RELAY_SERVER: usize = 0;
  57. type RelayServers = Vec<String>;
  58. static CHECK_RELAY_TIMEOUT: u64 = 3_000;
  59. static mut ALWAYS_USE_RELAY: bool = false;
  60. #[derive(Clone)]
  61. struct Inner {
  62. serial: i32,
  63. version: String,
  64. software_url: String,
  65. mask: Option<Ipv4Network>,
  66. local_ip: String,
  67. sk: Option<sign::SecretKey>,
  68. }
  69. #[derive(Clone)]
  70. pub struct RendezvousServer {
  71. tcp_punch: Arc<Mutex<HashMap<SocketAddr, Sink>>>,
  72. pm: PeerMap,
  73. tx: Sender,
  74. relay_servers: Arc<RelayServers>,
  75. relay_servers0: Arc<RelayServers>,
  76. rendezvous_servers: Arc<Vec<String>>,
  77. inner: Arc<Inner>,
  78. }
  79. enum LoopFailure {
  80. UdpSocket,
  81. Listener3,
  82. Listener2,
  83. Listener,
  84. }
  85. impl RendezvousServer {
  86. #[tokio::main(flavor = "multi_thread")]
  87. pub async fn start(port: i32, serial: i32, key: &str, rmem: usize) -> ResultType<()> {
  88. let (key, sk) = Self::get_server_sk(key);
  89. let nat_port = port - 1;
  90. let ws_port = port + 2;
  91. let pm = PeerMap::new().await?;
  92. log::info!("serial={}", serial);
  93. let rendezvous_servers = get_servers(&get_arg("rendezvous-servers"), "rendezvous-servers");
  94. log::info!("Listening on tcp/udp :{}", port);
  95. log::info!("Listening on tcp :{}, extra port for NAT test", nat_port);
  96. log::info!("Listening on websocket :{}", ws_port);
  97. let mut socket = create_udp_listener(port, rmem).await?;
  98. let (tx, mut rx) = mpsc::unbounded_channel::<Data>();
  99. let software_url = get_arg("software-url");
  100. let version = hbb_common::get_version_from_url(&software_url);
  101. if !version.is_empty() {
  102. log::info!("software_url: {}, version: {}", software_url, version);
  103. }
  104. let mask = get_arg("mask").parse().ok();
  105. let local_ip = if mask.is_none() {
  106. "".to_owned()
  107. } else {
  108. get_arg_or(
  109. "local-ip",
  110. local_ip_address::local_ip()
  111. .map(|x| x.to_string())
  112. .unwrap_or_default(),
  113. )
  114. };
  115. let mut rs = Self {
  116. tcp_punch: Arc::new(Mutex::new(HashMap::new())),
  117. pm,
  118. tx: tx.clone(),
  119. relay_servers: Default::default(),
  120. relay_servers0: Default::default(),
  121. rendezvous_servers: Arc::new(rendezvous_servers),
  122. inner: Arc::new(Inner {
  123. serial,
  124. version,
  125. software_url,
  126. sk,
  127. mask,
  128. local_ip,
  129. }),
  130. };
  131. log::info!("mask: {:?}", rs.inner.mask);
  132. log::info!("local-ip: {:?}", rs.inner.local_ip);
  133. std::env::set_var("PORT_FOR_API", port.to_string());
  134. rs.parse_relay_servers(&get_arg("relay-servers"));
  135. let mut listener = create_tcp_listener(port).await?;
  136. let mut listener2 = create_tcp_listener(nat_port).await?;
  137. let mut listener3 = create_tcp_listener(ws_port).await?;
  138. let test_addr = std::env::var("TEST_HBBS").unwrap_or_default();
  139. if std::env::var("ALWAYS_USE_RELAY")
  140. .unwrap_or_default()
  141. .to_uppercase()
  142. == "Y"
  143. {
  144. unsafe {
  145. ALWAYS_USE_RELAY = true;
  146. }
  147. }
  148. log::info!(
  149. "ALWAYS_USE_RELAY={}",
  150. if unsafe { ALWAYS_USE_RELAY } {
  151. "Y"
  152. } else {
  153. "N"
  154. }
  155. );
  156. if test_addr.to_lowercase() != "no" {
  157. let test_addr = if test_addr.is_empty() {
  158. listener.local_addr()?
  159. } else {
  160. test_addr.parse()?
  161. };
  162. tokio::spawn(async move {
  163. allow_err!(test_hbbs(test_addr).await);
  164. });
  165. };
  166. let main_task = async move {
  167. loop {
  168. log::info!("Start");
  169. match rs
  170. .io_loop(
  171. &mut rx,
  172. &mut listener,
  173. &mut listener2,
  174. &mut listener3,
  175. &mut socket,
  176. &key,
  177. )
  178. .await
  179. {
  180. LoopFailure::UdpSocket => {
  181. drop(socket);
  182. socket = create_udp_listener(port, rmem).await?;
  183. }
  184. LoopFailure::Listener => {
  185. drop(listener);
  186. listener = create_tcp_listener(port).await?;
  187. }
  188. LoopFailure::Listener2 => {
  189. drop(listener2);
  190. listener2 = create_tcp_listener(nat_port).await?;
  191. }
  192. LoopFailure::Listener3 => {
  193. drop(listener3);
  194. listener3 = create_tcp_listener(ws_port).await?;
  195. }
  196. }
  197. }
  198. };
  199. let listen_signal = listen_signal();
  200. tokio::select!(
  201. res = main_task => res,
  202. res = listen_signal => res,
  203. )
  204. }
  205. async fn io_loop(
  206. &mut self,
  207. rx: &mut Receiver,
  208. listener: &mut TcpListener,
  209. listener2: &mut TcpListener,
  210. listener3: &mut TcpListener,
  211. socket: &mut FramedSocket,
  212. key: &str,
  213. ) -> LoopFailure {
  214. let mut timer_check_relay = interval(Duration::from_millis(CHECK_RELAY_TIMEOUT));
  215. loop {
  216. tokio::select! {
  217. _ = timer_check_relay.tick() => {
  218. if self.relay_servers0.len() > 1 {
  219. let rs = self.relay_servers0.clone();
  220. let tx = self.tx.clone();
  221. tokio::spawn(async move {
  222. check_relay_servers(rs, tx).await;
  223. });
  224. }
  225. }
  226. Some(data) = rx.recv() => {
  227. match data {
  228. Data::Msg(msg, addr) => { allow_err!(socket.send(msg.as_ref(), addr).await); }
  229. Data::RelayServers0(rs) => { self.parse_relay_servers(&rs); }
  230. Data::RelayServers(rs) => { self.relay_servers = Arc::new(rs); }
  231. }
  232. }
  233. res = socket.next() => {
  234. match res {
  235. Some(Ok((bytes, addr))) => {
  236. if let Err(err) = self.handle_udp(&bytes, addr.into(), socket, key).await {
  237. log::error!("udp failure: {}", err);
  238. return LoopFailure::UdpSocket;
  239. }
  240. }
  241. Some(Err(err)) => {
  242. log::error!("udp failure: {}", err);
  243. return LoopFailure::UdpSocket;
  244. }
  245. None => {
  246. // unreachable!() ?
  247. }
  248. }
  249. }
  250. res = listener2.accept() => {
  251. match res {
  252. Ok((stream, addr)) => {
  253. stream.set_nodelay(true).ok();
  254. self.handle_listener2(stream, addr).await;
  255. }
  256. Err(err) => {
  257. log::error!("listener2.accept failed: {}", err);
  258. return LoopFailure::Listener2;
  259. }
  260. }
  261. }
  262. res = listener3.accept() => {
  263. match res {
  264. Ok((stream, addr)) => {
  265. stream.set_nodelay(true).ok();
  266. self.handle_listener(stream, addr, key, true).await;
  267. }
  268. Err(err) => {
  269. log::error!("listener3.accept failed: {}", err);
  270. return LoopFailure::Listener3;
  271. }
  272. }
  273. }
  274. res = listener.accept() => {
  275. match res {
  276. Ok((stream, addr)) => {
  277. stream.set_nodelay(true).ok();
  278. self.handle_listener(stream, addr, key, false).await;
  279. }
  280. Err(err) => {
  281. log::error!("listener.accept failed: {}", err);
  282. return LoopFailure::Listener;
  283. }
  284. }
  285. }
  286. }
  287. }
  288. }
  289. #[inline]
  290. async fn handle_udp(
  291. &mut self,
  292. bytes: &BytesMut,
  293. addr: SocketAddr,
  294. socket: &mut FramedSocket,
  295. key: &str,
  296. ) -> ResultType<()> {
  297. if let Ok(msg_in) = RendezvousMessage::parse_from_bytes(bytes) {
  298. match msg_in.union {
  299. Some(rendezvous_message::Union::RegisterPeer(rp)) => {
  300. // B registered
  301. if !rp.id.is_empty() {
  302. log::trace!("New peer registered: {:?} {:?}", &rp.id, &addr);
  303. self.update_addr(rp.id, addr, socket).await?;
  304. if self.inner.serial > rp.serial {
  305. let mut msg_out = RendezvousMessage::new();
  306. msg_out.set_configure_update(ConfigUpdate {
  307. serial: self.inner.serial,
  308. rendezvous_servers: (*self.rendezvous_servers).clone(),
  309. ..Default::default()
  310. });
  311. socket.send(&msg_out, addr).await?;
  312. }
  313. }
  314. }
  315. Some(rendezvous_message::Union::RegisterPk(rk)) => {
  316. if rk.uuid.is_empty() || rk.pk.is_empty() {
  317. return Ok(());
  318. }
  319. let id = rk.id;
  320. let ip = addr.ip().to_string();
  321. if id.len() < 6 {
  322. return send_rk_res(socket, addr, UUID_MISMATCH).await;
  323. } else if !self.check_ip_blocker(&ip, &id).await {
  324. return send_rk_res(socket, addr, TOO_FREQUENT).await;
  325. }
  326. let peer = self.pm.get_or(&id).await;
  327. let (changed, ip_changed) = {
  328. let peer = peer.read().await;
  329. if peer.uuid.is_empty() {
  330. (true, false)
  331. } else {
  332. if peer.uuid == rk.uuid {
  333. if peer.info.ip != ip && peer.pk != rk.pk {
  334. log::warn!(
  335. "Peer {} ip/pk mismatch: {}/{:?} vs {}/{:?}",
  336. id,
  337. ip,
  338. rk.pk,
  339. peer.info.ip,
  340. peer.pk,
  341. );
  342. drop(peer);
  343. return send_rk_res(socket, addr, UUID_MISMATCH).await;
  344. }
  345. } else {
  346. log::warn!(
  347. "Peer {} uuid mismatch: {:?} vs {:?}",
  348. id,
  349. rk.uuid,
  350. peer.uuid
  351. );
  352. drop(peer);
  353. return send_rk_res(socket, addr, UUID_MISMATCH).await;
  354. }
  355. let ip_changed = peer.info.ip != ip;
  356. (
  357. peer.uuid != rk.uuid || peer.pk != rk.pk || ip_changed,
  358. ip_changed,
  359. )
  360. }
  361. };
  362. let mut req_pk = peer.read().await.reg_pk;
  363. if req_pk.1.elapsed().as_secs() > 6 {
  364. req_pk.0 = 0;
  365. } else if req_pk.0 > 2 {
  366. return send_rk_res(socket, addr, TOO_FREQUENT).await;
  367. }
  368. req_pk.0 += 1;
  369. req_pk.1 = Instant::now();
  370. peer.write().await.reg_pk = req_pk;
  371. if ip_changed {
  372. let mut lock = IP_CHANGES.lock().await;
  373. if let Some((tm, ips)) = lock.get_mut(&id) {
  374. if tm.elapsed().as_secs() > IP_CHANGE_DUR {
  375. *tm = Instant::now();
  376. ips.clear();
  377. ips.insert(ip.clone(), 1);
  378. } else if let Some(v) = ips.get_mut(&ip) {
  379. *v += 1;
  380. } else {
  381. ips.insert(ip.clone(), 1);
  382. }
  383. } else {
  384. lock.insert(
  385. id.clone(),
  386. (Instant::now(), HashMap::from([(ip.clone(), 1)])),
  387. );
  388. }
  389. }
  390. if changed {
  391. self.pm.update_pk(id, peer, addr, rk.uuid, rk.pk, ip).await;
  392. }
  393. let mut msg_out = RendezvousMessage::new();
  394. msg_out.set_register_pk_response(RegisterPkResponse {
  395. result: register_pk_response::Result::OK.into(),
  396. ..Default::default()
  397. });
  398. socket.send(&msg_out, addr).await?
  399. }
  400. Some(rendezvous_message::Union::PunchHoleRequest(ph)) => {
  401. if self.pm.is_in_memory(&ph.id).await {
  402. self.handle_udp_punch_hole_request(addr, ph, key).await?;
  403. } else {
  404. // not in memory, fetch from db with spawn in case blocking me
  405. let mut me = self.clone();
  406. let key = key.to_owned();
  407. tokio::spawn(async move {
  408. allow_err!(me.handle_udp_punch_hole_request(addr, ph, &key).await);
  409. });
  410. }
  411. }
  412. Some(rendezvous_message::Union::PunchHoleSent(phs)) => {
  413. self.handle_hole_sent(phs, addr, Some(socket)).await?;
  414. }
  415. Some(rendezvous_message::Union::LocalAddr(la)) => {
  416. self.handle_local_addr(la, addr, Some(socket)).await?;
  417. }
  418. Some(rendezvous_message::Union::ConfigureUpdate(mut cu)) => {
  419. if addr.ip().is_loopback() && cu.serial > self.inner.serial {
  420. let mut inner: Inner = (*self.inner).clone();
  421. inner.serial = cu.serial;
  422. self.inner = Arc::new(inner);
  423. self.rendezvous_servers = Arc::new(
  424. cu.rendezvous_servers
  425. .drain(..)
  426. .filter(|x| {
  427. !x.is_empty()
  428. && test_if_valid_server(x, "rendezvous-server").is_ok()
  429. })
  430. .collect(),
  431. );
  432. log::info!(
  433. "configure updated: serial={} rendezvous-servers={:?}",
  434. self.inner.serial,
  435. self.rendezvous_servers
  436. );
  437. }
  438. }
  439. Some(rendezvous_message::Union::SoftwareUpdate(su)) => {
  440. if !self.inner.version.is_empty() && su.url != self.inner.version {
  441. let mut msg_out = RendezvousMessage::new();
  442. msg_out.set_software_update(SoftwareUpdate {
  443. url: self.inner.software_url.clone(),
  444. ..Default::default()
  445. });
  446. socket.send(&msg_out, addr).await?;
  447. }
  448. }
  449. _ => {}
  450. }
  451. }
  452. Ok(())
  453. }
  454. #[inline]
  455. async fn handle_tcp(
  456. &mut self,
  457. bytes: &[u8],
  458. sink: &mut Option<Sink>,
  459. addr: SocketAddr,
  460. key: &str,
  461. ws: bool,
  462. ) -> bool {
  463. if let Ok(msg_in) = RendezvousMessage::parse_from_bytes(bytes) {
  464. match msg_in.union {
  465. Some(rendezvous_message::Union::PunchHoleRequest(ph)) => {
  466. // there maybe several attempt, so sink can be none
  467. if let Some(sink) = sink.take() {
  468. self.tcp_punch.lock().await.insert(try_into_v4(addr), sink);
  469. }
  470. allow_err!(self.handle_tcp_punch_hole_request(addr, ph, key, ws).await);
  471. return true;
  472. }
  473. Some(rendezvous_message::Union::RequestRelay(mut rf)) => {
  474. // there maybe several attempt, so sink can be none
  475. if let Some(sink) = sink.take() {
  476. self.tcp_punch.lock().await.insert(try_into_v4(addr), sink);
  477. }
  478. if let Some(peer) = self.pm.get_in_memory(&rf.id).await {
  479. let mut msg_out = RendezvousMessage::new();
  480. rf.socket_addr = AddrMangle::encode(addr).into();
  481. msg_out.set_request_relay(rf);
  482. let peer_addr = peer.read().await.socket_addr;
  483. self.tx.send(Data::Msg(msg_out.into(), peer_addr)).ok();
  484. }
  485. return true;
  486. }
  487. Some(rendezvous_message::Union::RelayResponse(mut rr)) => {
  488. let addr_b = AddrMangle::decode(&rr.socket_addr);
  489. rr.socket_addr = Default::default();
  490. let id = rr.id();
  491. if !id.is_empty() {
  492. let pk = self.get_pk(&rr.version, id.to_owned()).await;
  493. rr.set_pk(pk);
  494. }
  495. let mut msg_out = RendezvousMessage::new();
  496. if !rr.relay_server.is_empty() {
  497. if self.is_lan(addr_b) {
  498. // https://github.com/rustdesk/rustdesk-server/issues/24
  499. rr.relay_server = self.inner.local_ip.clone();
  500. } else if rr.relay_server == self.inner.local_ip {
  501. rr.relay_server = self.get_relay_server(addr.ip(), addr_b.ip());
  502. }
  503. }
  504. msg_out.set_relay_response(rr);
  505. allow_err!(self.send_to_tcp_sync(msg_out, addr_b).await);
  506. }
  507. Some(rendezvous_message::Union::PunchHoleSent(phs)) => {
  508. allow_err!(self.handle_hole_sent(phs, addr, None).await);
  509. }
  510. Some(rendezvous_message::Union::LocalAddr(la)) => {
  511. allow_err!(self.handle_local_addr(la, addr, None).await);
  512. }
  513. Some(rendezvous_message::Union::TestNatRequest(tar)) => {
  514. let mut msg_out = RendezvousMessage::new();
  515. let mut res = TestNatResponse {
  516. port: addr.port() as _,
  517. ..Default::default()
  518. };
  519. if self.inner.serial > tar.serial {
  520. let mut cu = ConfigUpdate::new();
  521. cu.serial = self.inner.serial;
  522. cu.rendezvous_servers = (*self.rendezvous_servers).clone();
  523. res.cu = MessageField::from_option(Some(cu));
  524. }
  525. msg_out.set_test_nat_response(res);
  526. Self::send_to_sink(sink, msg_out).await;
  527. }
  528. Some(rendezvous_message::Union::RegisterPk(_)) => {
  529. let res = register_pk_response::Result::NOT_SUPPORT;
  530. let mut msg_out = RendezvousMessage::new();
  531. msg_out.set_register_pk_response(RegisterPkResponse {
  532. result: res.into(),
  533. ..Default::default()
  534. });
  535. Self::send_to_sink(sink, msg_out).await;
  536. }
  537. _ => {}
  538. }
  539. }
  540. false
  541. }
  542. #[inline]
  543. async fn update_addr(
  544. &mut self,
  545. id: String,
  546. socket_addr: SocketAddr,
  547. socket: &mut FramedSocket,
  548. ) -> ResultType<()> {
  549. let (request_pk, ip_change) = if let Some(old) = self.pm.get_in_memory(&id).await {
  550. let mut old = old.write().await;
  551. let ip = socket_addr.ip();
  552. let ip_change = if old.socket_addr.port() != 0 {
  553. ip != old.socket_addr.ip()
  554. } else {
  555. ip.to_string() != old.info.ip
  556. } && !ip.is_loopback();
  557. let request_pk = old.pk.is_empty() || ip_change;
  558. if !request_pk {
  559. old.socket_addr = socket_addr;
  560. old.last_reg_time = Instant::now();
  561. }
  562. let ip_change = if ip_change && old.reg_pk.0 <= 2 {
  563. Some(if old.socket_addr.port() == 0 {
  564. old.info.ip.clone()
  565. } else {
  566. old.socket_addr.to_string()
  567. })
  568. } else {
  569. None
  570. };
  571. (request_pk, ip_change)
  572. } else {
  573. (true, None)
  574. };
  575. if let Some(old) = ip_change {
  576. log::info!("IP change of {} from {} to {}", id, old, socket_addr);
  577. }
  578. let mut msg_out = RendezvousMessage::new();
  579. msg_out.set_register_peer_response(RegisterPeerResponse {
  580. request_pk,
  581. ..Default::default()
  582. });
  583. socket.send(&msg_out, socket_addr).await
  584. }
  585. #[inline]
  586. async fn handle_hole_sent<'a>(
  587. &mut self,
  588. phs: PunchHoleSent,
  589. addr: SocketAddr,
  590. socket: Option<&'a mut FramedSocket>,
  591. ) -> ResultType<()> {
  592. // punch hole sent from B, tell A that B is ready to be connected
  593. let addr_a = AddrMangle::decode(&phs.socket_addr);
  594. log::debug!(
  595. "{} punch hole response to {:?} from {:?}",
  596. if socket.is_none() { "TCP" } else { "UDP" },
  597. &addr_a,
  598. &addr
  599. );
  600. let mut msg_out = RendezvousMessage::new();
  601. let mut p = PunchHoleResponse {
  602. socket_addr: AddrMangle::encode(addr).into(),
  603. pk: self.get_pk(&phs.version, phs.id).await,
  604. relay_server: phs.relay_server.clone(),
  605. ..Default::default()
  606. };
  607. if let Ok(t) = phs.nat_type.enum_value() {
  608. p.set_nat_type(t);
  609. }
  610. msg_out.set_punch_hole_response(p);
  611. if let Some(socket) = socket {
  612. socket.send(&msg_out, addr_a).await?;
  613. } else {
  614. self.send_to_tcp(msg_out, addr_a).await;
  615. }
  616. Ok(())
  617. }
  618. #[inline]
  619. async fn handle_local_addr<'a>(
  620. &mut self,
  621. la: LocalAddr,
  622. addr: SocketAddr,
  623. socket: Option<&'a mut FramedSocket>,
  624. ) -> ResultType<()> {
  625. // relay local addrs of B to A
  626. let addr_a = AddrMangle::decode(&la.socket_addr);
  627. log::debug!(
  628. "{} local addrs response to {:?} from {:?}",
  629. if socket.is_none() { "TCP" } else { "UDP" },
  630. &addr_a,
  631. &addr
  632. );
  633. let mut msg_out = RendezvousMessage::new();
  634. let mut p = PunchHoleResponse {
  635. socket_addr: la.local_addr.clone(),
  636. pk: self.get_pk(&la.version, la.id).await,
  637. relay_server: la.relay_server,
  638. ..Default::default()
  639. };
  640. p.set_is_local(true);
  641. msg_out.set_punch_hole_response(p);
  642. if let Some(socket) = socket {
  643. socket.send(&msg_out, addr_a).await?;
  644. } else {
  645. self.send_to_tcp(msg_out, addr_a).await;
  646. }
  647. Ok(())
  648. }
  649. #[inline]
  650. async fn handle_punch_hole_request(
  651. &mut self,
  652. addr: SocketAddr,
  653. ph: PunchHoleRequest,
  654. key: &str,
  655. ws: bool,
  656. ) -> ResultType<(RendezvousMessage, Option<SocketAddr>)> {
  657. let mut ph = ph;
  658. if !key.is_empty() && ph.licence_key != key {
  659. let mut msg_out = RendezvousMessage::new();
  660. msg_out.set_punch_hole_response(PunchHoleResponse {
  661. failure: punch_hole_response::Failure::LICENSE_MISMATCH.into(),
  662. ..Default::default()
  663. });
  664. return Ok((msg_out, None));
  665. }
  666. let id = ph.id;
  667. // punch hole request from A, relay to B,
  668. // check if in same intranet first,
  669. // fetch local addrs if in same intranet.
  670. // because punch hole won't work if in the same intranet,
  671. // all routers will drop such self-connections.
  672. if let Some(peer) = self.pm.get(&id).await {
  673. let (elapsed, peer_addr) = {
  674. let r = peer.read().await;
  675. (r.last_reg_time.elapsed().as_millis() as i32, r.socket_addr)
  676. };
  677. if elapsed >= REG_TIMEOUT {
  678. let mut msg_out = RendezvousMessage::new();
  679. msg_out.set_punch_hole_response(PunchHoleResponse {
  680. failure: punch_hole_response::Failure::OFFLINE.into(),
  681. ..Default::default()
  682. });
  683. return Ok((msg_out, None));
  684. }
  685. let mut msg_out = RendezvousMessage::new();
  686. let peer_is_lan = self.is_lan(peer_addr);
  687. let is_lan = self.is_lan(addr);
  688. let mut relay_server = self.get_relay_server(addr.ip(), peer_addr.ip());
  689. if unsafe { ALWAYS_USE_RELAY } || (peer_is_lan ^ is_lan) {
  690. if peer_is_lan {
  691. // https://github.com/rustdesk/rustdesk-server/issues/24
  692. relay_server = self.inner.local_ip.clone()
  693. }
  694. ph.nat_type = NatType::SYMMETRIC.into(); // will force relay
  695. }
  696. let same_intranet = !ws
  697. && match peer_addr {
  698. SocketAddr::V4(a) => match addr {
  699. SocketAddr::V4(b) => a.ip() == b.ip(),
  700. _ => false,
  701. },
  702. SocketAddr::V6(a) => match addr {
  703. SocketAddr::V6(b) => a.ip() == b.ip(),
  704. _ => false,
  705. },
  706. };
  707. let socket_addr = AddrMangle::encode(addr).into();
  708. if same_intranet {
  709. log::debug!(
  710. "Fetch local addr {:?} {:?} request from {:?}",
  711. id,
  712. peer_addr,
  713. addr
  714. );
  715. msg_out.set_fetch_local_addr(FetchLocalAddr {
  716. socket_addr,
  717. relay_server,
  718. ..Default::default()
  719. });
  720. } else {
  721. log::debug!(
  722. "Punch hole {:?} {:?} request from {:?}",
  723. id,
  724. peer_addr,
  725. addr
  726. );
  727. msg_out.set_punch_hole(PunchHole {
  728. socket_addr,
  729. nat_type: ph.nat_type,
  730. relay_server,
  731. ..Default::default()
  732. });
  733. }
  734. Ok((msg_out, Some(peer_addr)))
  735. } else {
  736. let mut msg_out = RendezvousMessage::new();
  737. msg_out.set_punch_hole_response(PunchHoleResponse {
  738. failure: punch_hole_response::Failure::ID_NOT_EXIST.into(),
  739. ..Default::default()
  740. });
  741. Ok((msg_out, None))
  742. }
  743. }
  744. #[inline]
  745. async fn handle_online_request(
  746. &mut self,
  747. stream: &mut FramedStream,
  748. peers: Vec<String>,
  749. ) -> ResultType<()> {
  750. let mut states = BytesMut::zeroed((peers.len() + 7) / 8);
  751. for (i, peer_id) in peers.iter().enumerate() {
  752. if let Some(peer) = self.pm.get_in_memory(peer_id).await {
  753. let elapsed = peer.read().await.last_reg_time.elapsed().as_millis() as i32;
  754. // bytes index from left to right
  755. let states_idx = i / 8;
  756. let bit_idx = 7 - i % 8;
  757. if elapsed < REG_TIMEOUT {
  758. states[states_idx] |= 0x01 << bit_idx;
  759. }
  760. }
  761. }
  762. let mut msg_out = RendezvousMessage::new();
  763. msg_out.set_online_response(OnlineResponse {
  764. states: states.into(),
  765. ..Default::default()
  766. });
  767. stream.send(&msg_out).await?;
  768. Ok(())
  769. }
  770. #[inline]
  771. async fn send_to_tcp(&mut self, msg: RendezvousMessage, addr: SocketAddr) {
  772. let mut tcp = self.tcp_punch.lock().await.remove(&try_into_v4(addr));
  773. tokio::spawn(async move {
  774. Self::send_to_sink(&mut tcp, msg).await;
  775. });
  776. }
  777. #[inline]
  778. async fn send_to_sink(sink: &mut Option<Sink>, msg: RendezvousMessage) {
  779. if let Some(sink) = sink.as_mut() {
  780. if let Ok(bytes) = msg.write_to_bytes() {
  781. match sink {
  782. Sink::TcpStream(s) => {
  783. allow_err!(s.send(Bytes::from(bytes)).await);
  784. }
  785. Sink::Ws(ws) => {
  786. allow_err!(ws.send(tungstenite::Message::Binary(bytes)).await);
  787. }
  788. }
  789. }
  790. }
  791. }
  792. #[inline]
  793. async fn send_to_tcp_sync(
  794. &mut self,
  795. msg: RendezvousMessage,
  796. addr: SocketAddr,
  797. ) -> ResultType<()> {
  798. let mut sink = self.tcp_punch.lock().await.remove(&try_into_v4(addr));
  799. Self::send_to_sink(&mut sink, msg).await;
  800. Ok(())
  801. }
  802. #[inline]
  803. async fn handle_tcp_punch_hole_request(
  804. &mut self,
  805. addr: SocketAddr,
  806. ph: PunchHoleRequest,
  807. key: &str,
  808. ws: bool,
  809. ) -> ResultType<()> {
  810. let (msg, to_addr) = self.handle_punch_hole_request(addr, ph, key, ws).await?;
  811. if let Some(addr) = to_addr {
  812. self.tx.send(Data::Msg(msg.into(), addr))?;
  813. } else {
  814. self.send_to_tcp_sync(msg, addr).await?;
  815. }
  816. Ok(())
  817. }
  818. #[inline]
  819. async fn handle_udp_punch_hole_request(
  820. &mut self,
  821. addr: SocketAddr,
  822. ph: PunchHoleRequest,
  823. key: &str,
  824. ) -> ResultType<()> {
  825. let (msg, to_addr) = self.handle_punch_hole_request(addr, ph, key, false).await?;
  826. self.tx.send(Data::Msg(
  827. msg.into(),
  828. match to_addr {
  829. Some(addr) => addr,
  830. None => addr,
  831. },
  832. ))?;
  833. Ok(())
  834. }
  835. async fn check_ip_blocker(&self, ip: &str, id: &str) -> bool {
  836. let mut lock = IP_BLOCKER.lock().await;
  837. let now = Instant::now();
  838. if let Some(old) = lock.get_mut(ip) {
  839. let counter = &mut old.0;
  840. if counter.1.elapsed().as_secs() > IP_BLOCK_DUR {
  841. counter.0 = 0;
  842. } else if counter.0 > 30 {
  843. return false;
  844. }
  845. counter.0 += 1;
  846. counter.1 = now;
  847. let counter = &mut old.1;
  848. let is_new = counter.0.get(id).is_none();
  849. if counter.1.elapsed().as_secs() > DAY_SECONDS {
  850. counter.0.clear();
  851. } else if counter.0.len() > 300 {
  852. return !is_new;
  853. }
  854. if is_new {
  855. counter.0.insert(id.to_owned());
  856. }
  857. counter.1 = now;
  858. } else {
  859. lock.insert(ip.to_owned(), ((0, now), (Default::default(), now)));
  860. }
  861. true
  862. }
  863. fn parse_relay_servers(&mut self, relay_servers: &str) {
  864. let rs = get_servers(relay_servers, "relay-servers");
  865. self.relay_servers0 = Arc::new(rs);
  866. self.relay_servers = self.relay_servers0.clone();
  867. }
  868. fn get_relay_server(&self, _pa: IpAddr, _pb: IpAddr) -> String {
  869. if self.relay_servers.is_empty() {
  870. return "".to_owned();
  871. } else if self.relay_servers.len() == 1 {
  872. return self.relay_servers[0].clone();
  873. }
  874. let i = unsafe {
  875. ROTATION_RELAY_SERVER += 1;
  876. ROTATION_RELAY_SERVER % self.relay_servers.len()
  877. };
  878. self.relay_servers[i].clone()
  879. }
  880. async fn check_cmd(&self, cmd: &str) -> String {
  881. use std::fmt::Write as _;
  882. let mut res = "".to_owned();
  883. let mut fds = cmd.trim().split(' ');
  884. match fds.next() {
  885. Some("h") => {
  886. res = format!(
  887. "{}\n{}\n{}\n{}\n{}\n{}\n",
  888. "relay-servers(rs) <separated by ,>",
  889. "reload-geo(rg)",
  890. "ip-blocker(ib) [<ip>|<number>] [-]",
  891. "ip-changes(ic) [<id>|<number>] [-]",
  892. "always-use-relay(aur)",
  893. "test-geo(tg) <ip1> <ip2>"
  894. )
  895. }
  896. Some("relay-servers" | "rs") => {
  897. if let Some(rs) = fds.next() {
  898. self.tx.send(Data::RelayServers0(rs.to_owned())).ok();
  899. } else {
  900. for ip in self.relay_servers.iter() {
  901. let _ = writeln!(res, "{ip}");
  902. }
  903. }
  904. }
  905. Some("ip-blocker" | "ib") => {
  906. let mut lock = IP_BLOCKER.lock().await;
  907. lock.retain(|&_, (a, b)| {
  908. a.1.elapsed().as_secs() <= IP_BLOCK_DUR
  909. || b.1.elapsed().as_secs() <= DAY_SECONDS
  910. });
  911. res = format!("{}\n", lock.len());
  912. let ip = fds.next();
  913. let mut start = ip.map(|x| x.parse::<i32>().unwrap_or(-1)).unwrap_or(-1);
  914. if start < 0 {
  915. if let Some(ip) = ip {
  916. if let Some((a, b)) = lock.get(ip) {
  917. let _ = writeln!(
  918. res,
  919. "{}/{}s {}/{}s",
  920. a.0,
  921. a.1.elapsed().as_secs(),
  922. b.0.len(),
  923. b.1.elapsed().as_secs()
  924. );
  925. }
  926. if fds.next() == Some("-") {
  927. lock.remove(ip);
  928. }
  929. } else {
  930. start = 0;
  931. }
  932. }
  933. if start >= 0 {
  934. let mut it = lock.iter();
  935. for i in 0..(start + 10) {
  936. let x = it.next();
  937. if x.is_none() {
  938. break;
  939. }
  940. if i < start {
  941. continue;
  942. }
  943. if let Some((ip, (a, b))) = x {
  944. let _ = writeln!(
  945. res,
  946. "{}: {}/{}s {}/{}s",
  947. ip,
  948. a.0,
  949. a.1.elapsed().as_secs(),
  950. b.0.len(),
  951. b.1.elapsed().as_secs()
  952. );
  953. }
  954. }
  955. }
  956. }
  957. Some("ip-changes" | "ic") => {
  958. let mut lock = IP_CHANGES.lock().await;
  959. lock.retain(|&_, v| v.0.elapsed().as_secs() < IP_CHANGE_DUR_X2 && v.1.len() > 1);
  960. res = format!("{}\n", lock.len());
  961. let id = fds.next();
  962. let mut start = id.map(|x| x.parse::<i32>().unwrap_or(-1)).unwrap_or(-1);
  963. if !(0..=10_000_000).contains(&start) {
  964. if let Some(id) = id {
  965. if let Some((tm, ips)) = lock.get(id) {
  966. let _ = writeln!(res, "{}s {:?}", tm.elapsed().as_secs(), ips);
  967. }
  968. if fds.next() == Some("-") {
  969. lock.remove(id);
  970. }
  971. } else {
  972. start = 0;
  973. }
  974. }
  975. if start >= 0 {
  976. let mut it = lock.iter();
  977. for i in 0..(start + 10) {
  978. let x = it.next();
  979. if x.is_none() {
  980. break;
  981. }
  982. if i < start {
  983. continue;
  984. }
  985. if let Some((id, (tm, ips))) = x {
  986. let _ = writeln!(res, "{}: {}s {:?}", id, tm.elapsed().as_secs(), ips,);
  987. }
  988. }
  989. }
  990. }
  991. Some("always-use-relay" | "aur") => {
  992. if let Some(rs) = fds.next() {
  993. if rs.to_uppercase() == "Y" {
  994. unsafe { ALWAYS_USE_RELAY = true };
  995. } else {
  996. unsafe { ALWAYS_USE_RELAY = false };
  997. }
  998. self.tx.send(Data::RelayServers0(rs.to_owned())).ok();
  999. } else {
  1000. let _ = writeln!(res, "ALWAYS_USE_RELAY: {:?}", unsafe { ALWAYS_USE_RELAY });
  1001. }
  1002. }
  1003. Some("test-geo" | "tg") => {
  1004. if let Some(rs) = fds.next() {
  1005. if let Ok(a) = rs.parse::<IpAddr>() {
  1006. if let Some(rs) = fds.next() {
  1007. if let Ok(b) = rs.parse::<IpAddr>() {
  1008. res = format!("{:?}", self.get_relay_server(a, b));
  1009. }
  1010. } else {
  1011. res = format!("{:?}", self.get_relay_server(a, a));
  1012. }
  1013. }
  1014. }
  1015. }
  1016. _ => {}
  1017. }
  1018. res
  1019. }
  1020. async fn handle_listener2(&self, stream: TcpStream, addr: SocketAddr) {
  1021. let mut rs = self.clone();
  1022. if addr.ip().is_loopback() {
  1023. tokio::spawn(async move {
  1024. let mut stream = stream;
  1025. let mut buffer = [0; 1024];
  1026. if let Ok(Ok(n)) = timeout(1000, stream.read(&mut buffer[..])).await {
  1027. if let Ok(data) = std::str::from_utf8(&buffer[..n]) {
  1028. let res = rs.check_cmd(data).await;
  1029. stream.write(res.as_bytes()).await.ok();
  1030. }
  1031. }
  1032. });
  1033. return;
  1034. }
  1035. let stream = FramedStream::from(stream, addr);
  1036. tokio::spawn(async move {
  1037. let mut stream = stream;
  1038. if let Some(Ok(bytes)) = stream.next_timeout(30_000).await {
  1039. if let Ok(msg_in) = RendezvousMessage::parse_from_bytes(&bytes) {
  1040. match msg_in.union {
  1041. Some(rendezvous_message::Union::TestNatRequest(_)) => {
  1042. let mut msg_out = RendezvousMessage::new();
  1043. msg_out.set_test_nat_response(TestNatResponse {
  1044. port: addr.port() as _,
  1045. ..Default::default()
  1046. });
  1047. stream.send(&msg_out).await.ok();
  1048. }
  1049. Some(rendezvous_message::Union::OnlineRequest(or)) => {
  1050. allow_err!(rs.handle_online_request(&mut stream, or.peers).await);
  1051. }
  1052. _ => {}
  1053. }
  1054. }
  1055. }
  1056. });
  1057. }
  1058. async fn handle_listener(&self, stream: TcpStream, addr: SocketAddr, key: &str, ws: bool) {
  1059. log::debug!("Tcp connection from {:?}, ws: {}", addr, ws);
  1060. let mut rs = self.clone();
  1061. let key = key.to_owned();
  1062. tokio::spawn(async move {
  1063. allow_err!(rs.handle_listener_inner(stream, addr, &key, ws).await);
  1064. });
  1065. }
  1066. #[inline]
  1067. async fn handle_listener_inner(
  1068. &mut self,
  1069. stream: TcpStream,
  1070. addr: SocketAddr,
  1071. key: &str,
  1072. ws: bool,
  1073. ) -> ResultType<()> {
  1074. let mut sink;
  1075. if ws {
  1076. let ws_stream = tokio_tungstenite::accept_async(stream).await?;
  1077. let (a, mut b) = ws_stream.split();
  1078. sink = Some(Sink::Ws(a));
  1079. while let Ok(Some(Ok(msg))) = timeout(30_000, b.next()).await {
  1080. if let tungstenite::Message::Binary(bytes) = msg {
  1081. if !self.handle_tcp(&bytes, &mut sink, addr, key, ws).await {
  1082. break;
  1083. }
  1084. }
  1085. }
  1086. } else {
  1087. let (a, mut b) = Framed::new(stream, BytesCodec::new()).split();
  1088. sink = Some(Sink::TcpStream(a));
  1089. while let Ok(Some(Ok(bytes))) = timeout(30_000, b.next()).await {
  1090. if !self.handle_tcp(&bytes, &mut sink, addr, key, ws).await {
  1091. break;
  1092. }
  1093. }
  1094. }
  1095. if sink.is_none() {
  1096. self.tcp_punch.lock().await.remove(&try_into_v4(addr));
  1097. }
  1098. log::debug!("Tcp connection from {:?} closed", addr);
  1099. Ok(())
  1100. }
  1101. #[inline]
  1102. async fn get_pk(&mut self, version: &str, id: String) -> Bytes {
  1103. if version.is_empty() || self.inner.sk.is_none() {
  1104. Bytes::new()
  1105. } else {
  1106. match self.pm.get(&id).await {
  1107. Some(peer) => {
  1108. let pk = peer.read().await.pk.clone();
  1109. sign::sign(
  1110. &hbb_common::message_proto::IdPk {
  1111. id,
  1112. pk,
  1113. ..Default::default()
  1114. }
  1115. .write_to_bytes()
  1116. .unwrap_or_default(),
  1117. self.inner.sk.as_ref().unwrap(),
  1118. )
  1119. .into()
  1120. }
  1121. _ => Bytes::new(),
  1122. }
  1123. }
  1124. }
  1125. #[inline]
  1126. fn get_server_sk(key: &str) -> (String, Option<sign::SecretKey>) {
  1127. let mut out_sk = None;
  1128. let mut key = key.to_owned();
  1129. if let Ok(sk) = base64::decode(&key) {
  1130. if sk.len() == sign::SECRETKEYBYTES {
  1131. log::info!("The key is a crypto private key");
  1132. key = base64::encode(&sk[(sign::SECRETKEYBYTES / 2)..]);
  1133. let mut tmp = [0u8; sign::SECRETKEYBYTES];
  1134. tmp[..].copy_from_slice(&sk);
  1135. out_sk = Some(sign::SecretKey(tmp));
  1136. }
  1137. }
  1138. if key.is_empty() || key == "-" || key == "_" {
  1139. let (pk, sk) = crate::common::gen_sk(0);
  1140. out_sk = sk;
  1141. if !key.is_empty() {
  1142. key = pk;
  1143. } else {
  1144. std::env::set_var("KEY_FOR_API", pk);
  1145. }
  1146. }
  1147. if !key.is_empty() {
  1148. log::info!("Key: {}", key);
  1149. std::env::set_var("KEY_FOR_API", key.clone());
  1150. }
  1151. (key, out_sk)
  1152. }
  1153. #[inline]
  1154. fn is_lan(&self, addr: SocketAddr) -> bool {
  1155. if let Some(network) = &self.inner.mask {
  1156. if let SocketAddr::V4(addr) = addr {
  1157. return network.contains(*addr.ip());
  1158. }
  1159. }
  1160. false
  1161. }
  1162. }
  1163. async fn check_relay_servers(rs0: Arc<RelayServers>, tx: Sender) {
  1164. let mut futs = Vec::new();
  1165. let rs = Arc::new(Mutex::new(Vec::new()));
  1166. for x in rs0.iter() {
  1167. let mut host = x.to_owned();
  1168. if !host.contains(':') {
  1169. host = format!("{}:{}", host, config::RELAY_PORT);
  1170. }
  1171. let rs = rs.clone();
  1172. let x = x.clone();
  1173. futs.push(tokio::spawn(async move {
  1174. if FramedStream::new(&host, None, CHECK_RELAY_TIMEOUT)
  1175. .await
  1176. .is_ok()
  1177. {
  1178. rs.lock().await.push(x);
  1179. }
  1180. }));
  1181. }
  1182. join_all(futs).await;
  1183. log::debug!("check_relay_servers");
  1184. let rs = std::mem::take(&mut *rs.lock().await);
  1185. if !rs.is_empty() {
  1186. tx.send(Data::RelayServers(rs)).ok();
  1187. }
  1188. }
  1189. // temp solution to solve udp socket failure
  1190. async fn test_hbbs(addr: SocketAddr) -> ResultType<()> {
  1191. let mut socket = FramedSocket::new(config::Config::get_any_listen_addr(addr.is_ipv4())).await?;
  1192. let mut msg_out = RendezvousMessage::new();
  1193. msg_out.set_register_peer(RegisterPeer {
  1194. id: "(:test_hbbs:)".to_owned(),
  1195. ..Default::default()
  1196. });
  1197. let mut last_time_recv = Instant::now();
  1198. let mut timer = interval(Duration::from_secs(1));
  1199. loop {
  1200. tokio::select! {
  1201. _ = timer.tick() => {
  1202. if last_time_recv.elapsed().as_secs() > 12 {
  1203. log::error!("Timeout of test_hbbs");
  1204. std::process::exit(1);
  1205. }
  1206. socket.send(&msg_out, addr).await?;
  1207. }
  1208. Some(Ok((bytes, _))) = socket.next() => {
  1209. if let Ok(msg_in) = RendezvousMessage::parse_from_bytes(&bytes) {
  1210. log::trace!("Recv {:?} of test_hbbs", msg_in);
  1211. last_time_recv = Instant::now();
  1212. }
  1213. }
  1214. }
  1215. }
  1216. }
  1217. #[inline]
  1218. async fn send_rk_res(
  1219. socket: &mut FramedSocket,
  1220. addr: SocketAddr,
  1221. res: register_pk_response::Result,
  1222. ) -> ResultType<()> {
  1223. let mut msg_out = RendezvousMessage::new();
  1224. msg_out.set_register_pk_response(RegisterPkResponse {
  1225. result: res.into(),
  1226. ..Default::default()
  1227. });
  1228. socket.send(&msg_out, addr).await
  1229. }
  1230. async fn create_udp_listener(port: i32, rmem: usize) -> ResultType<FramedSocket> {
  1231. let addr = SocketAddr::new(IpAddr::V6(Ipv6Addr::UNSPECIFIED), port as _);
  1232. if let Ok(s) = FramedSocket::new_reuse(&addr, false, rmem).await {
  1233. log::debug!("listen on udp {:?}", s.local_addr());
  1234. return Ok(s);
  1235. }
  1236. let addr = SocketAddr::new(IpAddr::V4(Ipv4Addr::UNSPECIFIED), port as _);
  1237. let s = FramedSocket::new_reuse(&addr, false, rmem).await?;
  1238. log::debug!("listen on udp {:?}", s.local_addr());
  1239. Ok(s)
  1240. }
  1241. #[inline]
  1242. async fn create_tcp_listener(port: i32) -> ResultType<TcpListener> {
  1243. let s = listen_any(port as _).await?;
  1244. log::debug!("listen on tcp {:?}", s.local_addr());
  1245. Ok(s)
  1246. }