1mod acl;
8mod bloom;
9mod decrypt_worker;
10mod discovery_rate_limit;
11mod encrypt_worker;
12mod handlers;
13mod lifecycle;
14mod rate_limit;
15mod retry;
16mod routing;
17mod routing_error_rate_limit;
18pub(crate) mod session;
19pub(crate) mod session_wire;
20pub(crate) mod stats;
21pub(crate) mod stats_history;
22#[cfg(test)]
23mod tests;
24mod tree;
25pub(crate) mod wire;
26
27use self::discovery_rate_limit::{DiscoveryBackoff, DiscoveryForwardRateLimiter};
28use self::rate_limit::HandshakeRateLimiter;
29use self::routing::{LearnedRouteTable, LearnedRouteTableSnapshot};
30use self::routing_error_rate_limit::RoutingErrorRateLimiter;
31use self::wire::{
32 ESTABLISHED_HEADER_SIZE, FLAG_CE, FLAG_KEY_EPOCH, FLAG_SP, build_encrypted,
33 build_established_header, prepend_inner_header,
34};
35use crate::bloom::BloomState;
36use crate::cache::CoordCache;
37use crate::config::RoutingMode;
38use crate::node::session::SessionEntry;
39use crate::peer::{ActivePeer, PeerConnection};
40#[cfg(any(target_os = "linux", target_os = "macos"))]
41use crate::transport::ethernet::EthernetTransport;
42use crate::transport::tcp::TcpTransport;
43use crate::transport::tor::TorTransport;
44use crate::transport::udp::UdpTransport;
45use crate::transport::{
46 Link, LinkId, PacketRx, PacketTx, TransportAddr, TransportError, TransportHandle, TransportId,
47};
48use crate::tree::TreeState;
49use crate::upper::hosts::HostMap;
50use crate::upper::icmp_rate_limit::IcmpRateLimiter;
51use crate::upper::tun::{TunError, TunOutboundRx, TunState, TunTx};
52use crate::utils::index::IndexAllocator;
53use crate::{
54 Config, ConfigError, FipsAddress, Identity, IdentityError, NodeAddr, PeerIdentity,
55 SessionMessageType, encode_npub,
56};
57use rand::Rng;
58use std::collections::{HashMap, HashSet, VecDeque};
59use std::fmt;
60use std::sync::Arc;
61use std::thread::JoinHandle;
62use thiserror::Error;
63use tracing::{debug, warn};
64
65pub(crate) const REKEY_JITTER_SECS: i64 = 15;
72
73#[derive(Debug, Error)]
75pub enum NodeError {
76 #[error("node not started")]
77 NotStarted,
78
79 #[error("node already started")]
80 AlreadyStarted,
81
82 #[error("node already stopped")]
83 AlreadyStopped,
84
85 #[error("transport not found: {0}")]
86 TransportNotFound(TransportId),
87
88 #[error("no transport available for type: {0}")]
89 NoTransportForType(String),
90
91 #[error("link not found: {0}")]
92 LinkNotFound(LinkId),
93
94 #[error("connection not found: {0}")]
95 ConnectionNotFound(LinkId),
96
97 #[error("peer not found: {0:?}")]
98 PeerNotFound(NodeAddr),
99
100 #[error("peer already exists: {0:?}")]
101 PeerAlreadyExists(NodeAddr),
102
103 #[error("connection already exists for link: {0}")]
104 ConnectionAlreadyExists(LinkId),
105
106 #[error("invalid peer npub '{npub}': {reason}")]
107 InvalidPeerNpub { npub: String, reason: String },
108
109 #[error("access denied: {0}")]
110 AccessDenied(String),
111
112 #[error("max connections exceeded: {max}")]
113 MaxConnectionsExceeded { max: usize },
114
115 #[error("max peers exceeded: {max}")]
116 MaxPeersExceeded { max: usize },
117
118 #[error("max links exceeded: {max}")]
119 MaxLinksExceeded { max: usize },
120
121 #[error("handshake incomplete for link {0}")]
122 HandshakeIncomplete(LinkId),
123
124 #[error("no session available for link {0}")]
125 NoSession(LinkId),
126
127 #[error("promotion failed for link {link_id}: {reason}")]
128 PromotionFailed { link_id: LinkId, reason: String },
129
130 #[error("send failed to {node_addr}: {reason}")]
131 SendFailed { node_addr: NodeAddr, reason: String },
132
133 #[error("mtu exceeded forwarding to {node_addr}: packet {packet_size} > mtu {mtu}")]
134 MtuExceeded {
135 node_addr: NodeAddr,
136 packet_size: usize,
137 mtu: u16,
138 },
139
140 #[error("config error: {0}")]
141 Config(#[from] ConfigError),
142
143 #[error("identity error: {0}")]
144 Identity(#[from] IdentityError),
145
146 #[error("TUN error: {0}")]
147 Tun(#[from] TunError),
148
149 #[error("index allocation failed: {0}")]
150 IndexAllocationFailed(String),
151
152 #[error("handshake failed: {0}")]
153 HandshakeFailed(String),
154
155 #[error("transport error: {0}")]
156 TransportError(String),
157
158 #[error("bootstrap handoff failed: {0}")]
159 BootstrapHandoff(String),
160}
161
162#[derive(Debug, Clone, PartialEq, Eq)]
164pub struct NodeDeliveredPacket {
165 pub source_node_addr: NodeAddr,
167 pub source_npub: Option<String>,
169 pub destination: FipsAddress,
171 pub packet: Vec<u8>,
173}
174
175#[derive(Debug, Clone)]
176struct IdentityCacheEntry {
177 node_addr: NodeAddr,
178 pubkey: secp256k1::PublicKey,
179 npub: String,
180 last_seen_ms: u64,
181}
182
183impl IdentityCacheEntry {
184 fn new(
185 node_addr: NodeAddr,
186 pubkey: secp256k1::PublicKey,
187 npub: String,
188 last_seen_ms: u64,
189 ) -> Self {
190 Self {
191 node_addr,
192 pubkey,
193 npub,
194 last_seen_ms,
195 }
196 }
197}
198
199#[derive(Debug)]
201pub struct ExternalPacketIo {
202 pub outbound_tx: crate::upper::tun::TunOutboundTx,
204 pub inbound_rx: tokio::sync::mpsc::Receiver<NodeDeliveredPacket>,
206}
207
208#[derive(Debug)]
210pub(crate) struct EndpointDataIo {
211 pub(crate) command_tx: tokio::sync::mpsc::Sender<NodeEndpointCommand>,
220 pub(crate) event_rx: tokio::sync::mpsc::UnboundedReceiver<NodeEndpointEvent>,
230 pub(crate) event_tx: tokio::sync::mpsc::UnboundedSender<NodeEndpointEvent>,
236}
237
238fn endpoint_data_command_capacity(requested: usize) -> usize {
239 if let Ok(raw) = std::env::var("FIPS_ENDPOINT_DATA_QUEUE_CAP")
240 && let Ok(value) = raw.trim().parse::<usize>()
241 && value > 0
242 {
243 return value;
244 }
245
246 requested.max(1).max(32_768)
247}
248
249#[derive(Debug)]
251pub(crate) enum NodeEndpointCommand {
252 Send {
256 remote: PeerIdentity,
257 payload: Vec<u8>,
258 queued_at: Option<std::time::Instant>,
259 response_tx: tokio::sync::oneshot::Sender<Result<(), NodeError>>,
260 },
261 SendOneway {
267 remote: PeerIdentity,
268 payload: Vec<u8>,
269 queued_at: Option<std::time::Instant>,
270 },
271 PeerSnapshot {
272 response_tx: tokio::sync::oneshot::Sender<Vec<NodeEndpointPeer>>,
273 },
274 UpdatePeers {
280 peers: Vec<crate::config::PeerConfig>,
281 response_tx: tokio::sync::oneshot::Sender<Result<UpdatePeersOutcome, NodeError>>,
282 },
283}
284
285#[derive(Debug, Clone, Default, PartialEq, Eq)]
287pub(crate) struct UpdatePeersOutcome {
288 pub(crate) added: usize,
289 pub(crate) removed: usize,
290 pub(crate) updated: usize,
291 pub(crate) unchanged: usize,
292}
293
294#[derive(Debug)]
296pub(crate) enum NodeEndpointEvent {
297 Data {
298 source_node_addr: NodeAddr,
299 source_npub: Option<String>,
300 payload: Vec<u8>,
301 queued_at: Option<std::time::Instant>,
302 },
303}
304
305#[derive(Debug, Clone, PartialEq, Eq)]
307pub(crate) struct NodeEndpointPeer {
308 pub(crate) npub: String,
309 pub(crate) transport_addr: Option<String>,
310 pub(crate) transport_type: Option<String>,
311 pub(crate) link_id: u64,
312 pub(crate) srtt_ms: Option<u64>,
313 pub(crate) packets_sent: u64,
314 pub(crate) packets_recv: u64,
315 pub(crate) bytes_sent: u64,
316 pub(crate) bytes_recv: u64,
317}
318
319#[derive(Clone, Copy, Debug, PartialEq, Eq)]
321pub enum NodeState {
322 Created,
324 Starting,
326 Running,
328 Stopping,
330 Stopped,
332}
333
334impl NodeState {
335 pub fn is_operational(&self) -> bool {
337 matches!(self, NodeState::Running)
338 }
339
340 pub fn can_start(&self) -> bool {
342 matches!(self, NodeState::Created | NodeState::Stopped)
343 }
344
345 pub fn can_stop(&self) -> bool {
347 matches!(self, NodeState::Running)
348 }
349}
350
351impl fmt::Display for NodeState {
352 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
353 let s = match self {
354 NodeState::Created => "created",
355 NodeState::Starting => "starting",
356 NodeState::Running => "running",
357 NodeState::Stopping => "stopping",
358 NodeState::Stopped => "stopped",
359 };
360 write!(f, "{}", s)
361 }
362}
363
364#[derive(Clone, Debug)]
371pub(crate) struct RecentRequest {
372 pub(crate) from_peer: NodeAddr,
374 pub(crate) timestamp_ms: u64,
376 pub(crate) response_forwarded: bool,
380}
381
382impl RecentRequest {
383 pub(crate) fn new(from_peer: NodeAddr, timestamp_ms: u64) -> Self {
384 Self {
385 from_peer,
386 timestamp_ms,
387 response_forwarded: false,
388 }
389 }
390
391 pub(crate) fn is_expired(&self, current_time_ms: u64, expiry_ms: u64) -> bool {
393 current_time_ms.saturating_sub(self.timestamp_ms) > expiry_ms
394 }
395}
396
397type AddrKey = (TransportId, TransportAddr);
399
400#[derive(Debug, Default)]
405struct TransportDropState {
406 prev_drops: u64,
408 dropping: bool,
410}
411
412struct PendingConnect {
418 link_id: LinkId,
420 transport_id: TransportId,
422 remote_addr: TransportAddr,
424 peer_identity: PeerIdentity,
426}
427
428pub struct Node {
442 identity: Identity,
445
446 startup_epoch: [u8; 8],
449
450 started_at: std::time::Instant,
452
453 config: Config,
456
457 state: NodeState,
460
461 is_leaf_only: bool,
463
464 tree_state: TreeState,
467
468 bloom_state: BloomState,
471
472 coord_cache: CoordCache,
475 learned_routes: LearnedRouteTable,
477 recent_requests: HashMap<u64, RecentRequest>,
480 path_mtu_lookup: Arc<std::sync::RwLock<HashMap<crate::FipsAddress, u16>>>,
486
487 transports: HashMap<TransportId, TransportHandle>,
490 transport_drops: HashMap<TransportId, TransportDropState>,
492 links: HashMap<LinkId, Link>,
494 addr_to_link: HashMap<AddrKey, LinkId>,
496
497 packet_tx: Option<PacketTx>,
500 packet_rx: Option<PacketRx>,
502
503 connections: HashMap<LinkId, PeerConnection>,
507
508 peers: HashMap<NodeAddr, ActivePeer>,
512
513 sessions: HashMap<NodeAddr, SessionEntry>,
517
518 identity_cache: HashMap<[u8; 15], IdentityCacheEntry>,
522
523 pending_tun_packets: HashMap<NodeAddr, VecDeque<Vec<u8>>>,
527 pending_endpoint_data: HashMap<NodeAddr, VecDeque<Vec<u8>>>,
529 pending_lookups: HashMap<NodeAddr, handlers::discovery::PendingLookup>,
533
534 max_connections: usize,
537 max_peers: usize,
539 max_links: usize,
541
542 next_link_id: u64,
545 next_transport_id: u32,
547
548 stats: stats::NodeStats,
551
552 stats_history: stats_history::StatsHistory,
554
555 tun_state: TunState,
558 tun_name: Option<String>,
560 tun_tx: Option<TunTx>,
562 tun_outbound_rx: Option<TunOutboundRx>,
564 external_packet_tx: Option<tokio::sync::mpsc::Sender<NodeDeliveredPacket>>,
566 endpoint_command_rx: Option<tokio::sync::mpsc::Receiver<NodeEndpointCommand>>,
568 endpoint_event_tx: Option<tokio::sync::mpsc::UnboundedSender<NodeEndpointEvent>>,
570 encrypt_workers: Option<encrypt_worker::EncryptWorkerPool>,
576 decrypt_workers: Option<decrypt_worker::DecryptWorkerPool>,
579 decrypt_registered_sessions: std::collections::HashSet<(TransportId, u32)>,
588 decrypt_fallback_rx:
592 Option<tokio::sync::mpsc::UnboundedReceiver<decrypt_worker::DecryptWorkerEvent>>,
593 decrypt_fallback_tx: tokio::sync::mpsc::UnboundedSender<decrypt_worker::DecryptWorkerEvent>,
594 tun_reader_handle: Option<JoinHandle<()>>,
596 tun_writer_handle: Option<JoinHandle<()>>,
598 #[cfg(target_os = "macos")]
601 tun_shutdown_fd: Option<std::os::unix::io::RawFd>,
602
603 dns_identity_rx: Option<crate::upper::dns::DnsIdentityRx>,
606 dns_task: Option<tokio::task::JoinHandle<()>>,
608
609 index_allocator: IndexAllocator,
612 peers_by_index: HashMap<(TransportId, u32), NodeAddr>,
615 pending_outbound: HashMap<(TransportId, u32), LinkId>,
618
619 msg1_rate_limiter: HandshakeRateLimiter,
622 icmp_rate_limiter: IcmpRateLimiter,
624 routing_error_rate_limiter: RoutingErrorRateLimiter,
626 coords_response_rate_limiter: RoutingErrorRateLimiter,
628 discovery_backoff: DiscoveryBackoff,
630 discovery_forward_limiter: DiscoveryForwardRateLimiter,
632
633 pending_connects: Vec<PendingConnect>,
639
640 retry_pending: HashMap<NodeAddr, retry::RetryState>,
646
647 nostr_discovery: Option<Arc<crate::discovery::nostr::NostrDiscovery>>,
649 lan_discovery: Option<Arc<crate::discovery::lan::LanDiscovery>>,
654 nostr_discovery_started_at_ms: Option<u64>,
659 startup_open_discovery_sweep_done: bool,
663 bootstrap_transports: HashSet<TransportId>,
665 bootstrap_transport_npubs: HashMap<TransportId, String>,
672
673 last_parent_reeval: Option<crate::time::Instant>,
676
677 last_congestion_log: Option<std::time::Instant>,
680
681 estimated_mesh_size: Option<u64>,
684 last_mesh_size_log: Option<std::time::Instant>,
686
687 last_self_warn: Option<std::time::Instant>,
693
694 last_local_send_failure_at: Option<std::time::Instant>,
702
703 peer_aliases: HashMap<NodeAddr, String>,
707
708 peer_acl: acl::PeerAclReloader,
710
711 host_map: Arc<HostMap>,
715}
716
717impl Node {
718 pub fn new(config: Config) -> Result<Self, NodeError> {
720 config.validate()?;
721 let identity = config.create_identity()?;
722 let node_addr = *identity.node_addr();
723 let is_leaf_only = config.is_leaf_only();
724
725 let (decrypt_fallback_tx, decrypt_fallback_rx) = tokio::sync::mpsc::unbounded_channel();
726 let decrypt_fallback_rx = Some(decrypt_fallback_rx);
727
728 let mut startup_epoch = [0u8; 8];
729 rand::rng().fill_bytes(&mut startup_epoch);
730
731 let mut bloom_state = if is_leaf_only {
732 BloomState::leaf_only(node_addr)
733 } else {
734 BloomState::new(node_addr)
735 };
736 bloom_state.set_update_debounce_ms(config.node.bloom.update_debounce_ms);
737
738 let tun_state = if config.tun.enabled {
739 TunState::Configured
740 } else {
741 TunState::Disabled
742 };
743
744 let mut tree_state = TreeState::new(node_addr);
746 tree_state.set_parent_hysteresis(config.node.tree.parent_hysteresis);
747 tree_state.set_hold_down(config.node.tree.hold_down_secs);
748 tree_state.set_flap_dampening(
749 config.node.tree.flap_threshold,
750 config.node.tree.flap_window_secs,
751 config.node.tree.flap_dampening_secs,
752 );
753 tree_state
754 .sign_declaration(&identity)
755 .expect("signing own declaration should never fail");
756
757 let coord_cache = CoordCache::new(
758 config.node.cache.coord_size,
759 config.node.cache.coord_ttl_secs * 1000,
760 );
761 let rl = &config.node.rate_limit;
762 let msg1_rate_limiter = HandshakeRateLimiter::with_params(
763 rate_limit::TokenBucket::with_params(rl.handshake_burst, rl.handshake_rate),
764 config.node.limits.max_pending_inbound,
765 );
766
767 let max_connections = config.node.limits.max_connections;
768 let max_peers = config.node.limits.max_peers;
769 let max_links = config.node.limits.max_links;
770 let coords_response_interval_ms = config.node.session.coords_response_interval_ms;
771 let backoff_base_secs = config.node.discovery.backoff_base_secs;
772 let backoff_max_secs = config.node.discovery.backoff_max_secs;
773 let forward_min_interval_secs = config.node.discovery.forward_min_interval_secs;
774
775 let (host_map, peer_acl) = Self::host_map_and_peer_acl(&config);
776
777 Ok(Self {
778 identity,
779 startup_epoch,
780 started_at: std::time::Instant::now(),
781 config,
782 state: NodeState::Created,
783 is_leaf_only,
784 tree_state,
785 bloom_state,
786 coord_cache,
787 learned_routes: LearnedRouteTable::default(),
788 recent_requests: HashMap::new(),
789 transports: HashMap::new(),
790 transport_drops: HashMap::new(),
791 links: HashMap::new(),
792 addr_to_link: HashMap::new(),
793 packet_tx: None,
794 packet_rx: None,
795 connections: HashMap::new(),
796 peers: HashMap::new(),
797 sessions: HashMap::new(),
798 identity_cache: HashMap::new(),
799 pending_tun_packets: HashMap::new(),
800 pending_endpoint_data: HashMap::new(),
801 pending_lookups: HashMap::new(),
802 max_connections,
803 max_peers,
804 max_links,
805 next_link_id: 1,
806 next_transport_id: 1,
807 stats: stats::NodeStats::new(),
808 stats_history: stats_history::StatsHistory::new(),
809 tun_state,
810 tun_name: None,
811 tun_tx: None,
812 tun_outbound_rx: None,
813 external_packet_tx: None,
814 endpoint_command_rx: None,
815 endpoint_event_tx: None,
816 encrypt_workers: None,
817 decrypt_workers: None,
818 decrypt_registered_sessions: std::collections::HashSet::new(),
819 decrypt_fallback_tx,
820 decrypt_fallback_rx,
821 tun_reader_handle: None,
822 tun_writer_handle: None,
823 #[cfg(target_os = "macos")]
824 tun_shutdown_fd: None,
825 dns_identity_rx: None,
826 dns_task: None,
827 index_allocator: IndexAllocator::new(),
828 peers_by_index: HashMap::new(),
829 pending_outbound: HashMap::new(),
830 msg1_rate_limiter,
831 icmp_rate_limiter: IcmpRateLimiter::new(),
832 routing_error_rate_limiter: RoutingErrorRateLimiter::new(),
833 coords_response_rate_limiter: RoutingErrorRateLimiter::with_interval(
834 std::time::Duration::from_millis(coords_response_interval_ms),
835 ),
836 discovery_backoff: DiscoveryBackoff::with_params(backoff_base_secs, backoff_max_secs),
837 discovery_forward_limiter: DiscoveryForwardRateLimiter::with_interval(
838 std::time::Duration::from_secs(forward_min_interval_secs),
839 ),
840 pending_connects: Vec::new(),
841 retry_pending: HashMap::new(),
842 nostr_discovery: None,
843 nostr_discovery_started_at_ms: None,
844 lan_discovery: None,
845 startup_open_discovery_sweep_done: false,
846 bootstrap_transports: HashSet::new(),
847 bootstrap_transport_npubs: HashMap::new(),
848 last_parent_reeval: None,
849 last_congestion_log: None,
850 estimated_mesh_size: None,
851 last_mesh_size_log: None,
852 last_self_warn: None,
853 last_local_send_failure_at: None,
854 peer_aliases: HashMap::new(),
855 peer_acl,
856 host_map,
857 path_mtu_lookup: Arc::new(std::sync::RwLock::new(HashMap::new())),
858 })
859 }
860
861 pub fn with_identity(identity: Identity, config: Config) -> Result<Self, NodeError> {
866 config.validate()?;
867 let node_addr = *identity.node_addr();
868
869 let (decrypt_fallback_tx, decrypt_fallback_rx) = tokio::sync::mpsc::unbounded_channel();
870 let decrypt_fallback_rx = Some(decrypt_fallback_rx);
871
872 let mut startup_epoch = [0u8; 8];
873 rand::rng().fill_bytes(&mut startup_epoch);
874
875 let tun_state = if config.tun.enabled {
876 TunState::Configured
877 } else {
878 TunState::Disabled
879 };
880
881 let mut tree_state = TreeState::new(node_addr);
883 tree_state.set_parent_hysteresis(config.node.tree.parent_hysteresis);
884 tree_state.set_hold_down(config.node.tree.hold_down_secs);
885 tree_state.set_flap_dampening(
886 config.node.tree.flap_threshold,
887 config.node.tree.flap_window_secs,
888 config.node.tree.flap_dampening_secs,
889 );
890 tree_state
891 .sign_declaration(&identity)
892 .expect("signing own declaration should never fail");
893
894 let mut bloom_state = BloomState::new(node_addr);
895 bloom_state.set_update_debounce_ms(config.node.bloom.update_debounce_ms);
896
897 let coord_cache = CoordCache::new(
898 config.node.cache.coord_size,
899 config.node.cache.coord_ttl_secs * 1000,
900 );
901 let rl = &config.node.rate_limit;
902 let msg1_rate_limiter = HandshakeRateLimiter::with_params(
903 rate_limit::TokenBucket::with_params(rl.handshake_burst, rl.handshake_rate),
904 config.node.limits.max_pending_inbound,
905 );
906
907 let max_connections = config.node.limits.max_connections;
908 let max_peers = config.node.limits.max_peers;
909 let max_links = config.node.limits.max_links;
910 let coords_response_interval_ms = config.node.session.coords_response_interval_ms;
911
912 let (host_map, peer_acl) = Self::host_map_and_peer_acl(&config);
913
914 Ok(Self {
915 identity,
916 startup_epoch,
917 started_at: std::time::Instant::now(),
918 config,
919 state: NodeState::Created,
920 is_leaf_only: false,
921 tree_state,
922 bloom_state,
923 coord_cache,
924 learned_routes: LearnedRouteTable::default(),
925 recent_requests: HashMap::new(),
926 transports: HashMap::new(),
927 transport_drops: HashMap::new(),
928 links: HashMap::new(),
929 addr_to_link: HashMap::new(),
930 packet_tx: None,
931 packet_rx: None,
932 connections: HashMap::new(),
933 peers: HashMap::new(),
934 sessions: HashMap::new(),
935 identity_cache: HashMap::new(),
936 pending_tun_packets: HashMap::new(),
937 pending_endpoint_data: HashMap::new(),
938 pending_lookups: HashMap::new(),
939 max_connections,
940 max_peers,
941 max_links,
942 next_link_id: 1,
943 next_transport_id: 1,
944 stats: stats::NodeStats::new(),
945 stats_history: stats_history::StatsHistory::new(),
946 tun_state,
947 tun_name: None,
948 tun_tx: None,
949 tun_outbound_rx: None,
950 external_packet_tx: None,
951 endpoint_command_rx: None,
952 endpoint_event_tx: None,
953 encrypt_workers: None,
954 decrypt_workers: None,
955 decrypt_registered_sessions: std::collections::HashSet::new(),
956 decrypt_fallback_tx,
957 decrypt_fallback_rx,
958 tun_reader_handle: None,
959 tun_writer_handle: None,
960 #[cfg(target_os = "macos")]
961 tun_shutdown_fd: None,
962 dns_identity_rx: None,
963 dns_task: None,
964 index_allocator: IndexAllocator::new(),
965 peers_by_index: HashMap::new(),
966 pending_outbound: HashMap::new(),
967 msg1_rate_limiter,
968 icmp_rate_limiter: IcmpRateLimiter::new(),
969 routing_error_rate_limiter: RoutingErrorRateLimiter::new(),
970 coords_response_rate_limiter: RoutingErrorRateLimiter::with_interval(
971 std::time::Duration::from_millis(coords_response_interval_ms),
972 ),
973 discovery_backoff: DiscoveryBackoff::new(),
974 discovery_forward_limiter: DiscoveryForwardRateLimiter::new(),
975 pending_connects: Vec::new(),
976 retry_pending: HashMap::new(),
977 nostr_discovery: None,
978 nostr_discovery_started_at_ms: None,
979 lan_discovery: None,
980 startup_open_discovery_sweep_done: false,
981 bootstrap_transports: HashSet::new(),
982 bootstrap_transport_npubs: HashMap::new(),
983 last_parent_reeval: None,
984 last_congestion_log: None,
985 estimated_mesh_size: None,
986 last_mesh_size_log: None,
987 last_self_warn: None,
988 last_local_send_failure_at: None,
989 peer_aliases: HashMap::new(),
990 peer_acl,
991 host_map,
992 path_mtu_lookup: Arc::new(std::sync::RwLock::new(HashMap::new())),
993 })
994 }
995
996 pub fn leaf_only(config: Config) -> Result<Self, NodeError> {
998 let mut node = Self::new(config)?;
999 node.is_leaf_only = true;
1000 node.bloom_state = BloomState::leaf_only(*node.identity.node_addr());
1001 Ok(node)
1002 }
1003
1004 fn host_map_and_peer_acl(config: &Config) -> (Arc<HostMap>, acl::PeerAclReloader) {
1005 let base_host_map = HostMap::from_peer_configs(config.peers());
1006 if !config.node.system_files_enabled {
1007 return (
1008 Arc::new(base_host_map.clone()),
1009 acl::PeerAclReloader::memory_only(base_host_map),
1010 );
1011 }
1012
1013 let mut host_map = base_host_map.clone();
1014 let hosts_path = std::path::PathBuf::from(crate::upper::hosts::DEFAULT_HOSTS_PATH);
1015 let hosts_file = HostMap::load_hosts_file(std::path::Path::new(
1016 crate::upper::hosts::DEFAULT_HOSTS_PATH,
1017 ));
1018 host_map.merge(hosts_file);
1019 let peer_acl = acl::PeerAclReloader::with_alias_sources(
1020 std::path::PathBuf::from(acl::DEFAULT_PEERS_ALLOW_PATH),
1021 std::path::PathBuf::from(acl::DEFAULT_PEERS_DENY_PATH),
1022 base_host_map,
1023 hosts_path,
1024 );
1025 (Arc::new(host_map), peer_acl)
1026 }
1027
1028 async fn create_transports(&mut self, packet_tx: &PacketTx) -> Vec<TransportHandle> {
1032 let mut transports = Vec::new();
1033
1034 let udp_instances: Vec<_> = self
1036 .config
1037 .transports
1038 .udp
1039 .iter()
1040 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1041 .collect();
1042
1043 for (name, udp_config) in udp_instances {
1045 let transport_id = self.allocate_transport_id();
1046 let udp = UdpTransport::new(transport_id, name, udp_config, packet_tx.clone());
1047 transports.push(TransportHandle::Udp(udp));
1048 }
1049
1050 #[cfg(feature = "sim-transport")]
1051 {
1052 let sim_instances: Vec<_> = self
1053 .config
1054 .transports
1055 .sim
1056 .iter()
1057 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1058 .collect();
1059
1060 for (name, sim_config) in sim_instances {
1061 let transport_id = self.allocate_transport_id();
1062 let sim = crate::transport::sim::SimTransport::new(
1063 transport_id,
1064 name,
1065 sim_config,
1066 packet_tx.clone(),
1067 );
1068 transports.push(TransportHandle::Sim(sim));
1069 }
1070 }
1071
1072 #[cfg(any(target_os = "linux", target_os = "macos"))]
1074 {
1075 let eth_instances: Vec<_> = self
1076 .config
1077 .transports
1078 .ethernet
1079 .iter()
1080 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1081 .collect();
1082 let xonly = self.identity.pubkey();
1083 for (name, eth_config) in eth_instances {
1084 let transport_id = self.allocate_transport_id();
1085 let mut eth =
1086 EthernetTransport::new(transport_id, name, eth_config, packet_tx.clone());
1087 eth.set_local_pubkey(xonly);
1088 transports.push(TransportHandle::Ethernet(eth));
1089 }
1090 }
1091
1092 let tcp_instances: Vec<_> = self
1094 .config
1095 .transports
1096 .tcp
1097 .iter()
1098 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1099 .collect();
1100
1101 for (name, tcp_config) in tcp_instances {
1102 let transport_id = self.allocate_transport_id();
1103 let tcp = TcpTransport::new(transport_id, name, tcp_config, packet_tx.clone());
1104 transports.push(TransportHandle::Tcp(tcp));
1105 }
1106
1107 let tor_instances: Vec<_> = self
1109 .config
1110 .transports
1111 .tor
1112 .iter()
1113 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1114 .collect();
1115
1116 for (name, tor_config) in tor_instances {
1117 let transport_id = self.allocate_transport_id();
1118 let tor = TorTransport::new(transport_id, name, tor_config, packet_tx.clone());
1119 transports.push(TransportHandle::Tor(tor));
1120 }
1121
1122 #[cfg(bluer_available)]
1124 {
1125 let ble_instances: Vec<_> = self
1126 .config
1127 .transports
1128 .ble
1129 .iter()
1130 .map(|(name, config)| (name.map(|s| s.to_string()), config.clone()))
1131 .collect();
1132
1133 #[cfg(all(bluer_available, not(test)))]
1134 for (name, ble_config) in ble_instances {
1135 let transport_id = self.allocate_transport_id();
1136 let adapter = ble_config.adapter().to_string();
1137 let mtu = ble_config.mtu();
1138 match crate::transport::ble::io::BluerIo::new(&adapter, mtu).await {
1139 Ok(io) => {
1140 let mut ble = crate::transport::ble::BleTransport::new(
1141 transport_id,
1142 name,
1143 ble_config,
1144 io,
1145 packet_tx.clone(),
1146 );
1147 ble.set_local_pubkey(self.identity.pubkey().serialize());
1148 transports.push(TransportHandle::Ble(ble));
1149 }
1150 Err(e) => {
1151 tracing::warn!(adapter = %adapter, error = %e, "failed to initialize BLE adapter");
1152 }
1153 }
1154 }
1155
1156 #[cfg(any(not(bluer_available), test))]
1157 if !ble_instances.is_empty() {
1158 #[cfg(not(test))]
1159 tracing::warn!("BLE transport configured but this build lacks BlueZ support");
1160 }
1161 }
1162
1163 transports
1164 }
1165
1166 fn find_transport_for_type(&self, transport_type: &str) -> Option<TransportId> {
1176 self.transports
1177 .iter()
1178 .filter(|(id, handle)| {
1179 handle.transport_type().name == transport_type
1180 && handle.is_operational()
1181 && !self.bootstrap_transports.contains(id)
1182 })
1183 .min_by_key(|(id, _)| id.as_u32())
1184 .map(|(id, _)| *id)
1185 }
1186
1187 #[allow(unused_variables)]
1193 fn resolve_ethernet_addr(
1194 &self,
1195 addr_str: &str,
1196 ) -> Result<(TransportId, TransportAddr), NodeError> {
1197 #[cfg(any(target_os = "linux", target_os = "macos"))]
1198 {
1199 let (iface, mac_str) = addr_str.split_once('/').ok_or_else(|| {
1200 NodeError::NoTransportForType(format!(
1201 "invalid Ethernet address format '{}': expected 'interface/mac'",
1202 addr_str
1203 ))
1204 })?;
1205
1206 let transport_id = self
1208 .transports
1209 .iter()
1210 .find(|(_, handle)| {
1211 handle.transport_type().name == "ethernet"
1212 && handle.is_operational()
1213 && handle.interface_name() == Some(iface)
1214 })
1215 .map(|(id, _)| *id)
1216 .ok_or_else(|| {
1217 NodeError::NoTransportForType(format!(
1218 "no operational Ethernet transport for interface '{}'",
1219 iface
1220 ))
1221 })?;
1222
1223 let mac = crate::transport::ethernet::parse_mac_string(mac_str).map_err(|e| {
1224 NodeError::NoTransportForType(format!("invalid MAC in '{}': {}", addr_str, e))
1225 })?;
1226
1227 Ok((transport_id, TransportAddr::from_bytes(&mac)))
1228 }
1229 #[cfg(not(any(target_os = "linux", target_os = "macos")))]
1230 {
1231 Err(NodeError::NoTransportForType(
1232 "Ethernet transport is not supported on this platform".to_string(),
1233 ))
1234 }
1235 }
1236
1237 #[cfg(bluer_available)]
1241 fn resolve_ble_addr(&self, addr_str: &str) -> Result<(TransportId, TransportAddr), NodeError> {
1242 let ta = TransportAddr::from_string(addr_str);
1243 let adapter = crate::transport::ble::addr::adapter_from_addr(&ta).ok_or_else(|| {
1244 NodeError::NoTransportForType(format!(
1245 "invalid BLE address format '{}': expected 'adapter/mac'",
1246 addr_str
1247 ))
1248 })?;
1249
1250 let transport_id = self
1252 .transports
1253 .iter()
1254 .find(|(_, handle)| handle.transport_type().name == "ble" && handle.is_operational())
1255 .map(|(id, _)| *id)
1256 .ok_or_else(|| {
1257 NodeError::NoTransportForType(format!(
1258 "no operational BLE transport for adapter '{}'",
1259 adapter
1260 ))
1261 })?;
1262
1263 crate::transport::ble::addr::BleAddr::parse(addr_str).map_err(|e| {
1265 NodeError::NoTransportForType(format!("invalid BLE address '{}': {}", addr_str, e))
1266 })?;
1267
1268 Ok((transport_id, TransportAddr::from_string(addr_str)))
1269 }
1270
1271 pub fn identity(&self) -> &Identity {
1275 &self.identity
1276 }
1277
1278 pub fn node_addr(&self) -> &NodeAddr {
1280 self.identity.node_addr()
1281 }
1282
1283 pub fn npub(&self) -> String {
1285 self.identity.npub()
1286 }
1287
1288 pub(crate) fn peer_display_name(&self, addr: &NodeAddr) -> String {
1297 if let Some(hostname) = self.host_map.lookup_hostname(addr) {
1298 return hostname.to_string();
1299 }
1300 if let Some(name) = self.peer_aliases.get(addr) {
1301 return name.clone();
1302 }
1303 if let Some(peer) = self.peers.get(addr) {
1304 return peer.identity().short_npub();
1305 }
1306 if let Some(entry) = self.sessions.get(addr) {
1307 let (xonly, _) = entry.remote_pubkey().x_only_public_key();
1308 return PeerIdentity::from_pubkey(xonly).short_npub();
1309 }
1310 addr.short_hex()
1311 }
1312
1313 pub(in crate::node) fn deregister_session_index(&mut self, cache_key: (TransportId, u32)) {
1325 let owning_peer = self.peers_by_index.get(&cache_key).copied();
1329 self.peers_by_index.remove(&cache_key);
1330 if self.decrypt_registered_sessions.remove(&cache_key)
1331 && let Some(workers) = self.decrypt_workers.as_ref()
1332 {
1333 workers.unregister_session(cache_key);
1334 }
1335 if let Some(peer_addr) = owning_peer {
1346 let peer_has_other_index = self
1347 .peers_by_index
1348 .values()
1349 .any(|other| *other == peer_addr);
1350 if !peer_has_other_index {
1351 self.clear_connected_udp_for_peer(&peer_addr);
1352 }
1353 }
1354 }
1355
1356 pub(in crate::node) fn ensure_current_session_index_registered(
1365 &mut self,
1366 node_addr: &NodeAddr,
1367 context: &'static str,
1368 ) -> bool {
1369 let Some(peer) = self.peers.get(node_addr) else {
1370 return false;
1371 };
1372 let Some(transport_id) = peer.transport_id() else {
1373 warn!(
1374 peer = %self.peer_display_name(node_addr),
1375 context,
1376 "Cannot register current session index without transport id"
1377 );
1378 return false;
1379 };
1380 let Some(our_index) = peer.our_index() else {
1381 warn!(
1382 peer = %self.peer_display_name(node_addr),
1383 context,
1384 "Cannot register current session index without local index"
1385 );
1386 return false;
1387 };
1388
1389 let cache_key = (transport_id, our_index.as_u32());
1390 match self.peers_by_index.get(&cache_key).copied() {
1391 Some(existing) if existing == *node_addr => true,
1392 Some(existing) => {
1393 warn!(
1394 peer = %self.peer_display_name(node_addr),
1395 previous_owner = %self.peer_display_name(&existing),
1396 transport_id = %transport_id,
1397 our_index = %our_index,
1398 context,
1399 "Repairing current session index with stale owner"
1400 );
1401 self.peers_by_index.insert(cache_key, *node_addr);
1402 true
1403 }
1404 None => {
1405 warn!(
1406 peer = %self.peer_display_name(node_addr),
1407 transport_id = %transport_id,
1408 our_index = %our_index,
1409 context,
1410 "Repairing missing current session index"
1411 );
1412 self.peers_by_index.insert(cache_key, *node_addr);
1413 true
1414 }
1415 }
1416 }
1417
1418 pub fn config(&self) -> &Config {
1422 &self.config
1423 }
1424
1425 pub fn effective_ipv6_mtu(&self) -> u16 {
1431 crate::upper::icmp::effective_ipv6_mtu(self.transport_mtu())
1432 }
1433
1434 pub fn transport_mtu(&self) -> u16 {
1451 let min_operational = self
1452 .transports
1453 .values()
1454 .filter(|h| h.is_operational())
1455 .map(|h| h.mtu())
1456 .min();
1457 if let Some(mtu) = min_operational {
1458 return mtu;
1459 }
1460 if let Some((_, cfg)) = self.config.transports.udp.iter().next() {
1462 return cfg.mtu();
1463 }
1464 1280
1465 }
1466
1467 pub fn state(&self) -> NodeState {
1471 self.state
1472 }
1473
1474 pub fn uptime(&self) -> std::time::Duration {
1476 self.started_at.elapsed()
1477 }
1478
1479 pub fn is_running(&self) -> bool {
1481 self.state.is_operational()
1482 }
1483
1484 pub fn is_leaf_only(&self) -> bool {
1486 self.is_leaf_only
1487 }
1488
1489 pub fn tree_state(&self) -> &TreeState {
1493 &self.tree_state
1494 }
1495
1496 pub fn tree_state_mut(&mut self) -> &mut TreeState {
1498 &mut self.tree_state
1499 }
1500
1501 pub fn bloom_state(&self) -> &BloomState {
1505 &self.bloom_state
1506 }
1507
1508 pub fn bloom_state_mut(&mut self) -> &mut BloomState {
1510 &mut self.bloom_state
1511 }
1512
1513 pub fn estimated_mesh_size(&self) -> Option<u64> {
1517 self.estimated_mesh_size
1518 }
1519
1520 pub(crate) fn compute_mesh_size(&mut self) {
1526 let my_addr = *self.tree_state.my_node_addr();
1527 let parent_id = *self.tree_state.my_declaration().parent_id();
1528 let is_root = self.tree_state.is_root();
1529
1530 let max_fpr = self.config.node.bloom.max_inbound_fpr;
1531 let mut total: f64 = 1.0; let mut child_count: u32 = 0;
1533 let mut has_data = false;
1534
1535 if !is_root
1541 && let Some(parent) = self.peers.get(&parent_id)
1542 && let Some(filter) = parent.inbound_filter()
1543 {
1544 match filter.estimated_count(max_fpr) {
1545 Some(n) => {
1546 total += n;
1547 has_data = true;
1548 }
1549 None => {
1550 self.estimated_mesh_size = None;
1551 return;
1552 }
1553 }
1554 }
1555
1556 for (peer_addr, peer) in &self.peers {
1558 if let Some(decl) = self.tree_state.peer_declaration(peer_addr)
1559 && *decl.parent_id() == my_addr
1560 {
1561 child_count += 1;
1562 if let Some(filter) = peer.inbound_filter() {
1563 match filter.estimated_count(max_fpr) {
1564 Some(n) => {
1565 total += n;
1566 has_data = true;
1567 }
1568 None => {
1569 self.estimated_mesh_size = None;
1570 return;
1571 }
1572 }
1573 }
1574 }
1575 }
1576
1577 if !has_data {
1578 self.estimated_mesh_size = None;
1579 return;
1580 }
1581
1582 let size = total.round() as u64;
1583 self.estimated_mesh_size = Some(size);
1584
1585 let now = std::time::Instant::now();
1587 let should_log = match self.last_mesh_size_log {
1588 None => true,
1589 Some(last) => {
1590 now.duration_since(last)
1591 >= std::time::Duration::from_secs(self.config.node.mmp.log_interval_secs)
1592 }
1593 };
1594 if should_log {
1595 tracing::debug!(
1596 estimated_mesh_size = size,
1597 peers = self.peers.len(),
1598 children = child_count,
1599 "Mesh size estimate"
1600 );
1601 self.last_mesh_size_log = Some(now);
1602 }
1603 }
1604
1605 pub fn coord_cache(&self) -> &CoordCache {
1609 &self.coord_cache
1610 }
1611
1612 pub fn coord_cache_mut(&mut self) -> &mut CoordCache {
1614 &mut self.coord_cache
1615 }
1616
1617 pub fn stats(&self) -> &stats::NodeStats {
1621 &self.stats
1622 }
1623
1624 pub(crate) fn stats_mut(&mut self) -> &mut stats::NodeStats {
1626 &mut self.stats
1627 }
1628
1629 pub fn stats_history(&self) -> &stats_history::StatsHistory {
1631 &self.stats_history
1632 }
1633
1634 pub(crate) fn record_stats_history(&mut self) {
1637 let fwd = &self.stats.forwarding;
1638 let peers_with_mmp: Vec<f64> = self
1639 .peers
1640 .values()
1641 .filter_map(|p| p.mmp().map(|m| m.metrics.loss_rate()))
1642 .collect();
1643 let loss_rate = if peers_with_mmp.is_empty() {
1644 0.0
1645 } else {
1646 peers_with_mmp.iter().sum::<f64>() / peers_with_mmp.len() as f64
1647 };
1648
1649 let snap = stats_history::Snapshot {
1650 mesh_size: self.estimated_mesh_size,
1651 tree_depth: self.tree_state.my_coords().depth() as u32,
1652 peer_count: self.peers.len() as u64,
1653 parent_switches_total: self.stats.tree.parent_switches,
1654 bytes_in_total: fwd.received_bytes,
1655 bytes_out_total: fwd.forwarded_bytes + fwd.originated_bytes,
1656 packets_in_total: fwd.received_packets,
1657 packets_out_total: fwd.forwarded_packets + fwd.originated_packets,
1658 loss_rate,
1659 active_sessions: self.sessions.len() as u64,
1660 };
1661
1662 let now = std::time::Instant::now();
1663 let peer_snaps: Vec<stats_history::PeerSnapshot> = self
1664 .peers
1665 .values()
1666 .map(|p| {
1667 let stats = p.link_stats();
1668 let (srtt_ms, loss_rate, ecn_ce) = match p.mmp() {
1669 Some(m) => (
1670 m.metrics.srtt_ms(),
1671 Some(m.metrics.loss_rate()),
1672 m.receiver.ecn_ce_count() as u64,
1673 ),
1674 None => (None, None, 0),
1675 };
1676 stats_history::PeerSnapshot {
1677 node_addr: *p.node_addr(),
1678 last_seen: now,
1679 srtt_ms,
1680 loss_rate,
1681 bytes_in_total: stats.bytes_recv,
1682 bytes_out_total: stats.bytes_sent,
1683 packets_in_total: stats.packets_recv,
1684 packets_out_total: stats.packets_sent,
1685 ecn_ce_total: ecn_ce,
1686 }
1687 })
1688 .collect();
1689
1690 self.stats_history.tick(now, &snap, &peer_snaps);
1691 }
1692
1693 pub fn tun_state(&self) -> TunState {
1697 self.tun_state
1698 }
1699
1700 pub fn tun_name(&self) -> Option<&str> {
1702 self.tun_name.as_deref()
1703 }
1704
1705 pub fn set_max_connections(&mut self, max: usize) {
1709 self.max_connections = max;
1710 }
1711
1712 pub fn set_max_peers(&mut self, max: usize) {
1714 self.max_peers = max;
1715 }
1716
1717 pub fn set_max_links(&mut self, max: usize) {
1719 self.max_links = max;
1720 }
1721
1722 pub fn connection_count(&self) -> usize {
1726 self.connections.len()
1727 }
1728
1729 pub fn peer_count(&self) -> usize {
1731 self.peers.len()
1732 }
1733
1734 pub fn link_count(&self) -> usize {
1736 self.links.len()
1737 }
1738
1739 pub fn transport_count(&self) -> usize {
1741 self.transports.len()
1742 }
1743
1744 pub fn allocate_transport_id(&mut self) -> TransportId {
1748 let id = TransportId::new(self.next_transport_id);
1749 self.next_transport_id += 1;
1750 id
1751 }
1752
1753 pub fn get_transport(&self, id: &TransportId) -> Option<&TransportHandle> {
1755 self.transports.get(id)
1756 }
1757
1758 pub fn get_transport_mut(&mut self, id: &TransportId) -> Option<&mut TransportHandle> {
1760 self.transports.get_mut(id)
1761 }
1762
1763 pub fn transport_ids(&self) -> impl Iterator<Item = &TransportId> {
1765 self.transports.keys()
1766 }
1767
1768 pub fn packet_rx(&mut self) -> Option<&mut PacketRx> {
1770 self.packet_rx.as_mut()
1771 }
1772
1773 pub fn allocate_link_id(&mut self) -> LinkId {
1777 let id = LinkId::new(self.next_link_id);
1778 self.next_link_id += 1;
1779 id
1780 }
1781
1782 pub fn add_link(&mut self, link: Link) -> Result<(), NodeError> {
1784 if self.max_links > 0 && self.links.len() >= self.max_links {
1785 return Err(NodeError::MaxLinksExceeded {
1786 max: self.max_links,
1787 });
1788 }
1789 let link_id = link.link_id();
1790 let transport_id = link.transport_id();
1791 let remote_addr = link.remote_addr().clone();
1792
1793 self.links.insert(link_id, link);
1794 self.addr_to_link
1795 .insert((transport_id, remote_addr), link_id);
1796 Ok(())
1797 }
1798
1799 pub fn get_link(&self, link_id: &LinkId) -> Option<&Link> {
1801 self.links.get(link_id)
1802 }
1803
1804 pub fn get_link_mut(&mut self, link_id: &LinkId) -> Option<&mut Link> {
1806 self.links.get_mut(link_id)
1807 }
1808
1809 pub fn find_link_by_addr(
1811 &self,
1812 transport_id: TransportId,
1813 addr: &TransportAddr,
1814 ) -> Option<LinkId> {
1815 self.addr_to_link
1816 .get(&(transport_id, addr.clone()))
1817 .copied()
1818 }
1819
1820 pub fn remove_link(&mut self, link_id: &LinkId) -> Option<Link> {
1826 if let Some(link) = self.links.remove(link_id) {
1827 let key = (link.transport_id(), link.remote_addr().clone());
1829 if self.addr_to_link.get(&key) == Some(link_id) {
1830 self.addr_to_link.remove(&key);
1831 }
1832 Some(link)
1833 } else {
1834 None
1835 }
1836 }
1837
1838 pub(crate) fn cleanup_bootstrap_transport_if_unused(&mut self, transport_id: TransportId) {
1839 if !self.bootstrap_transports.contains(&transport_id) {
1840 return;
1841 }
1842
1843 let transport_in_use = self
1844 .links
1845 .values()
1846 .any(|link| link.transport_id() == transport_id)
1847 || self
1848 .connections
1849 .values()
1850 .any(|conn| conn.transport_id() == Some(transport_id))
1851 || self
1852 .peers
1853 .values()
1854 .any(|peer| peer.transport_id() == Some(transport_id))
1855 || self
1856 .pending_connects
1857 .iter()
1858 .any(|pending| pending.transport_id == transport_id);
1859
1860 if transport_in_use {
1861 return;
1862 }
1863
1864 tracing::debug!(
1865 transport_id = %transport_id,
1866 "bootstrap transport has no remaining references; dropping"
1867 );
1868
1869 self.bootstrap_transports.remove(&transport_id);
1870 self.bootstrap_transport_npubs.remove(&transport_id);
1871 self.transport_drops.remove(&transport_id);
1872 self.transports.remove(&transport_id);
1873 }
1874
1875 pub fn links(&self) -> impl Iterator<Item = &Link> {
1877 self.links.values()
1878 }
1879
1880 pub fn add_connection(&mut self, connection: PeerConnection) -> Result<(), NodeError> {
1884 let link_id = connection.link_id();
1885
1886 if self.connections.contains_key(&link_id) {
1887 return Err(NodeError::ConnectionAlreadyExists(link_id));
1888 }
1889
1890 if self.max_connections > 0 && self.connections.len() >= self.max_connections {
1891 return Err(NodeError::MaxConnectionsExceeded {
1892 max: self.max_connections,
1893 });
1894 }
1895
1896 self.connections.insert(link_id, connection);
1897 Ok(())
1898 }
1899
1900 pub fn get_connection(&self, link_id: &LinkId) -> Option<&PeerConnection> {
1902 self.connections.get(link_id)
1903 }
1904
1905 pub fn get_connection_mut(&mut self, link_id: &LinkId) -> Option<&mut PeerConnection> {
1907 self.connections.get_mut(link_id)
1908 }
1909
1910 pub fn remove_connection(&mut self, link_id: &LinkId) -> Option<PeerConnection> {
1912 self.connections.remove(link_id)
1913 }
1914
1915 pub fn connections(&self) -> impl Iterator<Item = &PeerConnection> {
1917 self.connections.values()
1918 }
1919
1920 pub fn get_peer(&self, node_addr: &NodeAddr) -> Option<&ActivePeer> {
1924 self.peers.get(node_addr)
1925 }
1926
1927 pub fn get_peer_mut(&mut self, node_addr: &NodeAddr) -> Option<&mut ActivePeer> {
1929 self.peers.get_mut(node_addr)
1930 }
1931
1932 pub fn remove_peer(&mut self, node_addr: &NodeAddr) -> Option<ActivePeer> {
1934 self.peers.remove(node_addr)
1935 }
1936
1937 pub fn peers(&self) -> impl Iterator<Item = &ActivePeer> {
1939 self.peers.values()
1940 }
1941
1942 pub fn nostr_discovery_handle(&self) -> Option<&crate::discovery::nostr::NostrDiscovery> {
1946 self.nostr_discovery.as_deref()
1947 }
1948
1949 pub fn peer_ids(&self) -> impl Iterator<Item = &NodeAddr> {
1951 self.peers.keys()
1952 }
1953
1954 pub fn sendable_peers(&self) -> impl Iterator<Item = &ActivePeer> {
1956 self.peers.values().filter(|p| p.can_send())
1957 }
1958
1959 pub fn sendable_peer_count(&self) -> usize {
1961 self.peers.values().filter(|p| p.can_send()).count()
1962 }
1963
1964 #[cfg(test)]
1969 pub(crate) fn disable_discovery_forward_rate_limit(&mut self) {
1970 self.discovery_forward_limiter
1971 .set_interval(std::time::Duration::ZERO);
1972 }
1973
1974 #[cfg(test)]
1975 pub(crate) fn get_session(&self, remote: &NodeAddr) -> Option<&SessionEntry> {
1976 self.sessions.get(remote)
1977 }
1978
1979 #[cfg(test)]
1981 pub(crate) fn get_session_mut(&mut self, remote: &NodeAddr) -> Option<&mut SessionEntry> {
1982 self.sessions.get_mut(remote)
1983 }
1984
1985 #[cfg(test)]
1987 pub(crate) fn remove_session(&mut self, remote: &NodeAddr) -> Option<SessionEntry> {
1988 self.sessions.remove(remote)
1989 }
1990
1991 #[cfg(test)]
1993 pub(crate) fn path_mtu_lookup_get(&self, fips_addr: &crate::FipsAddress) -> Option<u16> {
1994 self.path_mtu_lookup
1995 .read()
1996 .ok()
1997 .and_then(|map| map.get(fips_addr).copied())
1998 }
1999
2000 #[cfg(test)]
2002 pub(crate) fn path_mtu_lookup_insert(&self, fips_addr: crate::FipsAddress, mtu: u16) {
2003 if let Ok(mut map) = self.path_mtu_lookup.write() {
2004 map.insert(fips_addr, mtu);
2005 }
2006 }
2007
2008 pub fn session_count(&self) -> usize {
2010 self.sessions.len()
2011 }
2012
2013 pub(crate) fn session_entries(&self) -> impl Iterator<Item = (&NodeAddr, &SessionEntry)> {
2015 self.sessions.iter()
2016 }
2017
2018 pub(crate) fn register_identity(
2022 &mut self,
2023 node_addr: NodeAddr,
2024 pubkey: secp256k1::PublicKey,
2025 ) -> bool {
2026 let mut prefix = [0u8; 15];
2027 prefix.copy_from_slice(&node_addr.as_bytes()[0..15]);
2028 if let Some(entry) = self.identity_cache.get(&prefix)
2029 && entry.node_addr == node_addr
2030 && entry.pubkey == pubkey
2031 {
2032 return true;
2036 }
2037
2038 let (xonly, _) = pubkey.x_only_public_key();
2039 let derived_node_addr = NodeAddr::from_pubkey(&xonly);
2040 if derived_node_addr != node_addr {
2041 debug!(
2042 claimed_node_addr = %node_addr,
2043 derived_node_addr = %derived_node_addr,
2044 "Rejected identity cache entry with mismatched public key"
2045 );
2046 return false;
2047 }
2048
2049 let now_ms = Self::now_ms();
2050 if let Some(entry) = self.identity_cache.get_mut(&prefix)
2051 && entry.node_addr == node_addr
2052 {
2053 entry.pubkey = pubkey;
2054 entry.last_seen_ms = now_ms;
2055 return true;
2056 }
2057
2058 let npub = encode_npub(&xonly);
2059 self.identity_cache.insert(
2060 prefix,
2061 IdentityCacheEntry::new(node_addr, pubkey, npub, now_ms),
2062 );
2063 let max = self.config.node.cache.identity_size;
2065 if self.identity_cache.len() > max
2066 && let Some(oldest_key) = self
2067 .identity_cache
2068 .iter()
2069 .min_by_key(|(_, entry)| entry.last_seen_ms)
2070 .map(|(k, _)| *k)
2071 {
2072 self.identity_cache.remove(&oldest_key);
2073 }
2074 true
2075 }
2076
2077 pub(crate) fn lookup_by_fips_prefix(
2079 &mut self,
2080 prefix: &[u8; 15],
2081 ) -> Option<(NodeAddr, secp256k1::PublicKey)> {
2082 if let Some(entry) = self.identity_cache.get_mut(prefix) {
2083 entry.last_seen_ms = Self::now_ms(); Some((entry.node_addr, entry.pubkey))
2085 } else {
2086 None
2087 }
2088 }
2089
2090 pub(crate) fn has_cached_identity(&self, addr: &NodeAddr) -> bool {
2092 let mut prefix = [0u8; 15];
2093 prefix.copy_from_slice(&addr.as_bytes()[0..15]);
2094 self.identity_cache.contains_key(&prefix)
2095 }
2096
2097 pub fn identity_cache_len(&self) -> usize {
2099 self.identity_cache.len()
2100 }
2101
2102 pub fn identity_cache_iter(
2107 &self,
2108 ) -> impl Iterator<Item = (&NodeAddr, &secp256k1::PublicKey, u64)> {
2109 self.identity_cache
2110 .values()
2111 .map(|entry| (&entry.node_addr, &entry.pubkey, entry.last_seen_ms))
2112 }
2113
2114 pub fn identity_cache_max(&self) -> usize {
2116 self.config.node.cache.identity_size
2117 }
2118
2119 pub fn pending_lookup_count(&self) -> usize {
2121 self.pending_lookups.len()
2122 }
2123
2124 pub fn pending_lookups_iter(
2126 &self,
2127 ) -> impl Iterator<Item = (&NodeAddr, &handlers::discovery::PendingLookup)> {
2128 self.pending_lookups.iter()
2129 }
2130
2131 pub fn recent_request_count(&self) -> usize {
2133 self.recent_requests.len()
2134 }
2135
2136 pub fn pending_tun_destinations(&self) -> usize {
2138 self.pending_tun_packets.len()
2139 }
2140
2141 pub fn pending_tun_total_packets(&self) -> usize {
2143 self.pending_tun_packets.values().map(|q| q.len()).sum()
2144 }
2145
2146 pub fn retry_state_iter(&self) -> impl Iterator<Item = (&NodeAddr, &retry::RetryState)> {
2148 self.retry_pending.iter()
2149 }
2150
2151 pub(crate) fn is_tree_peer(&self, peer_addr: &NodeAddr) -> bool {
2158 if !self.tree_state.is_root() && self.tree_state.my_declaration().parent_id() == peer_addr {
2160 return true;
2161 }
2162 if let Some(decl) = self.tree_state.peer_declaration(peer_addr)
2164 && decl.parent_id() == self.node_addr()
2165 {
2166 return true;
2167 }
2168 false
2169 }
2170
2171 pub fn find_next_hop(&mut self, dest_node_addr: &NodeAddr) -> Option<&ActivePeer> {
2194 if dest_node_addr == self.node_addr() {
2196 return None;
2197 }
2198
2199 if let Some(peer) = self.peers.get(dest_node_addr)
2201 && peer.can_send()
2202 {
2203 return Some(peer);
2204 }
2205
2206 let now_ms = Self::now_ms();
2207
2208 let sendable_learned_peers = if self.config.node.routing.mode == RoutingMode::ReplyLearned {
2209 Some(
2210 self.peers
2211 .iter()
2212 .filter(|(_, peer)| peer.can_send())
2213 .map(|(addr, _)| *addr)
2214 .collect::<HashSet<_>>(),
2215 )
2216 } else {
2217 None
2218 };
2219
2220 let explore_fallback = sendable_learned_peers.as_ref().is_some_and(|sendable| {
2227 self.learned_routes.should_explore_fallback(
2228 dest_node_addr,
2229 now_ms,
2230 self.config.node.routing.learned_fallback_explore_interval,
2231 |addr| sendable.contains(addr),
2232 )
2233 });
2234 if let Some(sendable) = &sendable_learned_peers
2235 && !explore_fallback
2236 && let Some(next_hop_addr) =
2237 self.learned_routes
2238 .select_next_hop(dest_node_addr, now_ms, |addr| sendable.contains(addr))
2239 {
2240 return self.peers.get(&next_hop_addr);
2241 }
2242
2243 let Some(dest_coords) = self
2245 .coord_cache
2246 .get_and_touch(dest_node_addr, now_ms)
2247 .cloned()
2248 else {
2249 if let Some(sendable) = &sendable_learned_peers
2250 && let Some(next_hop_addr) =
2251 self.learned_routes
2252 .select_next_hop(dest_node_addr, now_ms, |addr| sendable.contains(addr))
2253 {
2254 return self.peers.get(&next_hop_addr);
2255 }
2256 return None;
2257 };
2258
2259 let coordinate_route_addr = {
2262 let candidates: Vec<&ActivePeer> = self.destination_in_filters(dest_node_addr);
2263 if !candidates.is_empty() {
2264 self.select_best_candidate(&candidates, &dest_coords)
2265 .map(|peer| *peer.node_addr())
2266 } else {
2267 None
2268 }
2269 };
2270 if let Some(next_hop_addr) = coordinate_route_addr {
2271 return self.peers.get(&next_hop_addr);
2272 }
2273
2274 let tree_route_addr = self
2276 .tree_state
2277 .find_next_hop(&dest_coords)
2278 .filter(|next_hop_id| {
2279 self.peers
2280 .get(next_hop_id)
2281 .is_some_and(|peer| peer.can_send())
2282 });
2283 if let Some(next_hop_addr) = tree_route_addr {
2284 return self.peers.get(&next_hop_addr);
2285 }
2286 if explore_fallback {
2287 return sendable_learned_peers.as_ref().and_then(|sendable| {
2288 self.learned_routes
2289 .select_next_hop(dest_node_addr, now_ms, |addr| sendable.contains(addr))
2290 .and_then(|next_hop_addr| self.peers.get(&next_hop_addr))
2291 });
2292 }
2293
2294 if let Some(sendable) = &sendable_learned_peers
2295 && let Some(next_hop_addr) =
2296 self.learned_routes
2297 .select_next_hop(dest_node_addr, now_ms, |addr| sendable.contains(addr))
2298 {
2299 return self.peers.get(&next_hop_addr);
2300 }
2301
2302 None
2303 }
2304
2305 pub(in crate::node) fn learn_reverse_route(
2306 &mut self,
2307 destination: NodeAddr,
2308 next_hop: NodeAddr,
2309 ) {
2310 if self.config.node.routing.mode != RoutingMode::ReplyLearned
2311 || destination == *self.node_addr()
2312 {
2313 return;
2314 }
2315 let now_ms = Self::now_ms();
2316 self.learned_routes.learn(
2317 destination,
2318 next_hop,
2319 now_ms,
2320 self.config.node.routing.learned_ttl_secs,
2321 self.config.node.routing.max_learned_routes_per_dest,
2322 );
2323 }
2324
2325 pub(in crate::node) fn record_route_failure(
2326 &mut self,
2327 destination: NodeAddr,
2328 next_hop: NodeAddr,
2329 ) {
2330 if self.config.node.routing.mode != RoutingMode::ReplyLearned {
2331 return;
2332 }
2333 self.learned_routes.record_failure(&destination, &next_hop);
2334 }
2335
2336 pub(crate) fn learned_route_table_snapshot(&self, now_ms: u64) -> LearnedRouteTableSnapshot {
2337 self.learned_routes.snapshot(now_ms)
2338 }
2339
2340 pub(in crate::node) fn purge_learned_routes(&mut self, now_ms: u64) {
2341 self.learned_routes.purge_expired(now_ms);
2342 }
2343
2344 fn select_best_candidate<'a>(
2353 &'a self,
2354 candidates: &[&'a ActivePeer],
2355 dest_coords: &crate::tree::TreeCoordinate,
2356 ) -> Option<&'a ActivePeer> {
2357 let my_distance = self.tree_state.my_coords().distance_to(dest_coords);
2358
2359 let mut best: Option<(&ActivePeer, f64, usize)> = None;
2360
2361 for &candidate in candidates {
2362 if !candidate.can_send() {
2363 continue;
2364 }
2365
2366 let cost = candidate.link_cost();
2367
2368 let dist = self
2369 .tree_state
2370 .peer_coords(candidate.node_addr())
2371 .map(|pc| pc.distance_to(dest_coords))
2372 .unwrap_or(usize::MAX);
2373
2374 if dist >= my_distance {
2377 continue;
2378 }
2379
2380 let dominated = match &best {
2381 None => true,
2382 Some((_, best_cost, best_dist)) => {
2383 cost < *best_cost
2384 || (cost == *best_cost && dist < *best_dist)
2385 || (cost == *best_cost
2386 && dist == *best_dist
2387 && candidate.node_addr() < best.as_ref().unwrap().0.node_addr())
2388 }
2389 };
2390
2391 if dominated {
2392 best = Some((candidate, cost, dist));
2393 }
2394 }
2395
2396 best.map(|(peer, _, _)| peer)
2397 }
2398
2399 pub fn destination_in_filters(&self, dest: &NodeAddr) -> Vec<&ActivePeer> {
2401 self.peers.values().filter(|p| p.may_reach(dest)).collect()
2402 }
2403
2404 pub fn tun_tx(&self) -> Option<&TunTx> {
2408 self.tun_tx.as_ref()
2409 }
2410
2411 pub fn attach_external_packet_io(
2418 &mut self,
2419 capacity: usize,
2420 ) -> Result<ExternalPacketIo, NodeError> {
2421 if self.state != NodeState::Created {
2422 return Err(NodeError::Config(ConfigError::Validation(
2423 "external packet I/O must be attached before node start".to_string(),
2424 )));
2425 }
2426 if self.config.tun.enabled {
2427 return Err(NodeError::Config(ConfigError::Validation(
2428 "external packet I/O requires tun.enabled=false".to_string(),
2429 )));
2430 }
2431
2432 let capacity = capacity.max(1);
2433 let (outbound_tx, outbound_rx) = tokio::sync::mpsc::channel(capacity);
2434 let (inbound_tx, inbound_rx) = tokio::sync::mpsc::channel(capacity);
2435 self.tun_outbound_rx = Some(outbound_rx);
2436 self.external_packet_tx = Some(inbound_tx);
2437
2438 Ok(ExternalPacketIo {
2439 outbound_tx,
2440 inbound_rx,
2441 })
2442 }
2443
2444 pub(crate) fn attach_endpoint_data_io(
2449 &mut self,
2450 capacity: usize,
2451 ) -> Result<EndpointDataIo, NodeError> {
2452 if self.state != NodeState::Created {
2453 return Err(NodeError::Config(ConfigError::Validation(
2454 "endpoint data I/O must be attached before node start".to_string(),
2455 )));
2456 }
2457
2458 let command_capacity = endpoint_data_command_capacity(capacity);
2459 let (command_tx, command_rx) = tokio::sync::mpsc::channel(command_capacity);
2460 let (event_tx, event_rx) = tokio::sync::mpsc::unbounded_channel();
2465 self.endpoint_command_rx = Some(command_rx);
2466 self.endpoint_event_tx = Some(event_tx.clone());
2467
2468 Ok(EndpointDataIo {
2469 command_tx,
2470 event_rx,
2471 event_tx,
2472 })
2473 }
2474
2475 pub(crate) fn pubkey_for_node_addr(&self, addr: &NodeAddr) -> Option<secp256k1::PublicKey> {
2476 let mut prefix = [0u8; 15];
2477 prefix.copy_from_slice(&addr.as_bytes()[0..15]);
2478 self.identity_cache
2479 .get(&prefix)
2480 .filter(|entry| &entry.node_addr == addr)
2481 .map(|entry| entry.pubkey)
2482 }
2483
2484 pub(crate) fn npub_for_node_addr(&self, addr: &NodeAddr) -> Option<String> {
2485 let mut prefix = [0u8; 15];
2486 prefix.copy_from_slice(&addr.as_bytes()[0..15]);
2487 self.identity_cache
2488 .get(&prefix)
2489 .filter(|entry| &entry.node_addr == addr)
2490 .map(|entry| entry.npub.clone())
2491 }
2492
2493 pub(in crate::node) fn deliver_external_ipv6_packet(
2494 &self,
2495 src_addr: &NodeAddr,
2496 packet: Vec<u8>,
2497 ) {
2498 let Some(external_packet_tx) = &self.external_packet_tx else {
2499 return;
2500 };
2501 if packet.len() < 40 {
2502 return;
2503 }
2504 let Ok(destination) = FipsAddress::from_slice(&packet[24..40]) else {
2505 return;
2506 };
2507 let delivered = NodeDeliveredPacket {
2508 source_node_addr: *src_addr,
2509 source_npub: self.npub_for_node_addr(src_addr),
2510 destination,
2511 packet,
2512 };
2513 if let Err(error) = external_packet_tx.try_send(delivered) {
2514 debug!(error = %error, "Failed to deliver packet to external app sink");
2515 }
2516 }
2517
2518 pub(super) async fn send_encrypted_link_message(
2532 &mut self,
2533 node_addr: &NodeAddr,
2534 plaintext: &[u8],
2535 ) -> Result<(), NodeError> {
2536 self.send_encrypted_link_message_with_ce(node_addr, plaintext, false)
2537 .await
2538 }
2539
2540 pub(in crate::node) fn note_local_send_outcome(
2546 &mut self,
2547 result: &Result<usize, TransportError>,
2548 ) {
2549 match result {
2550 Ok(_) => {
2551 if self.last_local_send_failure_at.is_some() {
2552 self.last_local_send_failure_at = None;
2553 }
2554 }
2555 Err(TransportError::Io(e))
2556 if matches!(
2557 e.kind(),
2558 std::io::ErrorKind::NetworkUnreachable
2559 | std::io::ErrorKind::HostUnreachable
2560 | std::io::ErrorKind::AddrNotAvailable
2561 ) =>
2562 {
2563 self.last_local_send_failure_at = Some(std::time::Instant::now());
2564 }
2565 Err(_) => {}
2566 }
2567 }
2568
2569 pub(in crate::node) fn last_local_send_failure_at(&self) -> Option<std::time::Instant> {
2572 self.last_local_send_failure_at
2573 }
2574
2575 pub(super) async fn send_encrypted_link_message_with_ce(
2579 &mut self,
2580 node_addr: &NodeAddr,
2581 plaintext: &[u8],
2582 ce_flag: bool,
2583 ) -> Result<(), NodeError> {
2584 let peer = self
2585 .peers
2586 .get_mut(node_addr)
2587 .ok_or(NodeError::PeerNotFound(*node_addr))?;
2588
2589 let their_index = peer.their_index().ok_or_else(|| NodeError::SendFailed {
2590 node_addr: *node_addr,
2591 reason: "no their_index".into(),
2592 })?;
2593 let transport_id = peer.transport_id().ok_or_else(|| NodeError::SendFailed {
2594 node_addr: *node_addr,
2595 reason: "no transport_id".into(),
2596 })?;
2597 let remote_addr = peer
2598 .current_addr()
2599 .cloned()
2600 .ok_or_else(|| NodeError::SendFailed {
2601 node_addr: *node_addr,
2602 reason: "no current_addr".into(),
2603 })?;
2604 #[cfg(any(target_os = "linux", target_os = "macos"))]
2605 let connected_socket = peer.connected_udp();
2606
2607 let timestamp_ms = peer.session_elapsed_ms();
2609
2610 let sp_flag = peer.mmp().map(|mmp| mmp.spin_bit.tx_bit()).unwrap_or(false);
2612 let mut flags = if sp_flag { FLAG_SP } else { 0 };
2613 if ce_flag {
2614 flags |= FLAG_CE;
2615 }
2616 if peer.current_k_bit() {
2617 flags |= FLAG_KEY_EPOCH;
2618 }
2619
2620 let session = peer
2621 .noise_session_mut()
2622 .ok_or_else(|| NodeError::SendFailed {
2623 node_addr: *node_addr,
2624 reason: "no noise session".into(),
2625 })?;
2626
2627 const INNER_TS_LEN: usize = 4;
2635 let counter = session.current_send_counter();
2636 let inner_len = INNER_TS_LEN + plaintext.len();
2637 let payload_len = inner_len as u16;
2638 let header = build_established_header(their_index, counter, flags, payload_len);
2639
2640 let transport_for_send = self
2659 .transports
2660 .get(&transport_id)
2661 .ok_or(NodeError::TransportNotFound(transport_id))?;
2662 let is_udp = matches!(transport_for_send, TransportHandle::Udp(_));
2663 if let Some(workers) = self.encrypt_workers.as_ref().cloned()
2664 && is_udp
2665 && let Some(cipher_clone) = session.send_cipher_clone()
2666 {
2667 {
2668 let reserved_counter =
2672 session
2673 .take_send_counter()
2674 .map_err(|e| NodeError::SendFailed {
2675 node_addr: *node_addr,
2676 reason: format!("counter reservation failed: {}", e),
2677 })?;
2678 debug_assert_eq!(reserved_counter, counter);
2679 let header =
2683 build_established_header(their_index, reserved_counter, flags, payload_len);
2684 let transport = transport_for_send;
2685 let send_target = {
2692 if let TransportHandle::Udp(udp) = transport {
2693 let socket_addr = {
2694 #[cfg(any(target_os = "linux", target_os = "macos"))]
2695 {
2696 match connected_socket.as_ref() {
2697 Some(socket) => Some(socket.peer_addr()),
2698 None => udp.resolve_for_off_task(&remote_addr).await.ok(),
2699 }
2700 }
2701 #[cfg(not(any(target_os = "linux", target_os = "macos")))]
2702 {
2703 udp.resolve_for_off_task(&remote_addr).await.ok()
2704 }
2705 };
2706 match (udp.async_socket(), socket_addr) {
2707 (Some(socket), Some(socket_addr)) => Some((socket, socket_addr)),
2708 _ => None,
2709 }
2710 } else {
2711 None
2712 }
2713 };
2714 if let Some((socket, socket_addr)) = send_target {
2715 let wire_capacity = ESTABLISHED_HEADER_SIZE + inner_len + 16;
2731 let mut wire_buf = Vec::with_capacity(wire_capacity);
2732 wire_buf.extend_from_slice(&header);
2733 wire_buf.extend_from_slice(×tamp_ms.to_le_bytes());
2734 wire_buf.extend_from_slice(plaintext);
2735 let predicted_bytes = wire_capacity;
2736 if let Some(peer) = self.peers.get_mut(node_addr) {
2743 peer.link_stats_mut().record_sent(predicted_bytes);
2744 if let Some(mmp) = peer.mmp_mut() {
2745 mmp.sender
2746 .record_sent(reserved_counter, timestamp_ms, predicted_bytes);
2747 }
2748 }
2749 workers.dispatch(self::encrypt_worker::FmpSendJob {
2750 cipher: cipher_clone,
2751 counter: reserved_counter,
2752 wire_buf,
2753 fsp_seal: None,
2754 socket,
2755 dest_addr: socket_addr,
2756 #[cfg(any(target_os = "linux", target_os = "macos"))]
2757 connected_socket,
2758 drop_on_backpressure: plaintext
2759 .first()
2760 .is_some_and(|ty| *ty == SessionMessageType::EndpointData.to_byte()),
2761 queued_at: crate::perf_profile::stamp(),
2762 });
2763 return Ok(());
2764 }
2765 }
2766 }
2767
2768 let inner_plaintext = prepend_inner_header(timestamp_ms, plaintext);
2773 let ciphertext = {
2775 let _t = crate::perf_profile::Timer::start(crate::perf_profile::Stage::FmpEncrypt);
2776 session
2777 .encrypt_with_aad(&inner_plaintext, &header)
2778 .map_err(|e| NodeError::SendFailed {
2779 node_addr: *node_addr,
2780 reason: format!("encryption failed: {}", e),
2781 })?
2782 };
2783
2784 let wire_packet = build_encrypted(&header, &ciphertext);
2785
2786 let send_result = {
2788 let _t = crate::perf_profile::Timer::start(crate::perf_profile::Stage::UdpSend);
2789 let transport = self
2790 .transports
2791 .get(&transport_id)
2792 .ok_or(NodeError::TransportNotFound(transport_id))?;
2793 transport.send(&remote_addr, &wire_packet).await
2794 };
2795 self.note_local_send_outcome(&send_result);
2796 let bytes_sent = send_result.map_err(|e| match e {
2797 TransportError::MtuExceeded { packet_size, mtu } => NodeError::MtuExceeded {
2798 node_addr: *node_addr,
2799 packet_size,
2800 mtu,
2801 },
2802 other => NodeError::SendFailed {
2803 node_addr: *node_addr,
2804 reason: format!("transport send: {}", other),
2805 },
2806 })?;
2807
2808 if let Some(peer) = self.peers.get_mut(node_addr) {
2810 peer.link_stats_mut().record_sent(bytes_sent);
2811 if let Some(mmp) = peer.mmp_mut() {
2813 mmp.sender.record_sent(counter, timestamp_ms, bytes_sent);
2814 }
2815 }
2816
2817 Ok(())
2818 }
2819}
2820
2821impl fmt::Debug for Node {
2822 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
2823 f.debug_struct("Node")
2824 .field("node_addr", self.node_addr())
2825 .field("state", &self.state)
2826 .field("is_leaf_only", &self.is_leaf_only)
2827 .field("connections", &self.connection_count())
2828 .field("peers", &self.peer_count())
2829 .field("links", &self.link_count())
2830 .field("transports", &self.transport_count())
2831 .finish()
2832 }
2833}