Integrate BACKBEAT SDK and resolve KACHING license validation
Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
325
vendor/github.com/libp2p/go-nat/upnp.go
generated
vendored
Normal file
325
vendor/github.com/libp2p/go-nat/upnp.go
generated
vendored
Normal file
@@ -0,0 +1,325 @@
|
||||
package nat
|
||||
|
||||
import (
|
||||
"context"
|
||||
"net"
|
||||
"net/url"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/huin/goupnp"
|
||||
"github.com/huin/goupnp/dcps/internetgateway1"
|
||||
"github.com/huin/goupnp/dcps/internetgateway2"
|
||||
|
||||
"github.com/koron/go-ssdp"
|
||||
)
|
||||
|
||||
var _ NAT = (*upnp_NAT)(nil)
|
||||
|
||||
func discoverUPNP_IG1(ctx context.Context) <-chan NAT {
|
||||
res := make(chan NAT)
|
||||
go func() {
|
||||
defer close(res)
|
||||
|
||||
// find devices
|
||||
devs, err := goupnp.DiscoverDevicesCtx(ctx, internetgateway1.URN_WANConnectionDevice_1)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
for _, dev := range devs {
|
||||
if dev.Root == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
dev.Root.Device.VisitServices(func(srv *goupnp.Service) {
|
||||
if ctx.Err() != nil {
|
||||
return
|
||||
}
|
||||
switch srv.ServiceType {
|
||||
case internetgateway1.URN_WANIPConnection_1:
|
||||
client := &internetgateway1.WANIPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: dev.Root,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG1-IP1)", dev.Root}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
case internetgateway1.URN_WANPPPConnection_1:
|
||||
client := &internetgateway1.WANPPPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: dev.Root,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG1-PPP1)", dev.Root}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
}()
|
||||
return res
|
||||
}
|
||||
|
||||
func discoverUPNP_IG2(ctx context.Context) <-chan NAT {
|
||||
res := make(chan NAT)
|
||||
go func() {
|
||||
defer close(res)
|
||||
|
||||
// find devices
|
||||
devs, err := goupnp.DiscoverDevicesCtx(ctx, internetgateway2.URN_WANConnectionDevice_2)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
for _, dev := range devs {
|
||||
if dev.Root == nil {
|
||||
continue
|
||||
}
|
||||
|
||||
dev.Root.Device.VisitServices(func(srv *goupnp.Service) {
|
||||
if ctx.Err() != nil {
|
||||
return
|
||||
}
|
||||
switch srv.ServiceType {
|
||||
case internetgateway2.URN_WANIPConnection_1:
|
||||
client := &internetgateway2.WANIPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: dev.Root,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG2-IP1)", dev.Root}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
case internetgateway2.URN_WANIPConnection_2:
|
||||
client := &internetgateway2.WANIPConnection2{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: dev.Root,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG2-IP2)", dev.Root}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
case internetgateway2.URN_WANPPPConnection_1:
|
||||
client := &internetgateway2.WANPPPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: dev.Root,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG2-PPP1)", dev.Root}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
}()
|
||||
return res
|
||||
}
|
||||
|
||||
func discoverUPNP_GenIGDev(ctx context.Context) <-chan NAT {
|
||||
res := make(chan NAT, 1)
|
||||
go func() {
|
||||
defer close(res)
|
||||
|
||||
DeviceList, err := ssdp.Search(ssdp.All, 5, "")
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
var gw ssdp.Service
|
||||
for _, Service := range DeviceList {
|
||||
if strings.Contains(Service.Type, "InternetGatewayDevice") {
|
||||
gw = Service
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
DeviceURL, err := url.Parse(gw.Location)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
RootDevice, err := goupnp.DeviceByURLCtx(ctx, DeviceURL)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
|
||||
RootDevice.Device.VisitServices(func(srv *goupnp.Service) {
|
||||
if ctx.Err() != nil {
|
||||
return
|
||||
}
|
||||
switch srv.ServiceType {
|
||||
case internetgateway1.URN_WANIPConnection_1:
|
||||
client := &internetgateway1.WANIPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: RootDevice,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG1-IP1)", RootDevice}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
case internetgateway1.URN_WANPPPConnection_1:
|
||||
client := &internetgateway1.WANPPPConnection1{ServiceClient: goupnp.ServiceClient{
|
||||
SOAPClient: srv.NewSOAPClient(),
|
||||
RootDevice: RootDevice,
|
||||
Service: srv,
|
||||
}}
|
||||
_, isNat, err := client.GetNATRSIPStatusCtx(ctx)
|
||||
if err == nil && isNat {
|
||||
select {
|
||||
case res <- &upnp_NAT{client, make(map[int]int), "UPNP (IG1-PPP1)", RootDevice}:
|
||||
case <-ctx.Done():
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
})
|
||||
}()
|
||||
return res
|
||||
}
|
||||
|
||||
type upnp_NAT_Client interface {
|
||||
GetExternalIPAddress() (string, error)
|
||||
AddPortMappingCtx(context.Context, string, uint16, string, uint16, string, bool, string, uint32) error
|
||||
DeletePortMappingCtx(context.Context, string, uint16, string) error
|
||||
}
|
||||
|
||||
type upnp_NAT struct {
|
||||
c upnp_NAT_Client
|
||||
ports map[int]int
|
||||
typ string
|
||||
rootDevice *goupnp.RootDevice
|
||||
}
|
||||
|
||||
func (u *upnp_NAT) GetExternalAddress() (addr net.IP, err error) {
|
||||
ipString, err := u.c.GetExternalIPAddress()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
ip := net.ParseIP(ipString)
|
||||
if ip == nil {
|
||||
return nil, ErrNoExternalAddress
|
||||
}
|
||||
|
||||
return ip, nil
|
||||
}
|
||||
|
||||
func mapProtocol(s string) string {
|
||||
switch s {
|
||||
case "udp":
|
||||
return "UDP"
|
||||
case "tcp":
|
||||
return "TCP"
|
||||
default:
|
||||
panic("invalid protocol: " + s)
|
||||
}
|
||||
}
|
||||
|
||||
func (u *upnp_NAT) AddPortMapping(ctx context.Context, protocol string, internalPort int, description string, timeout time.Duration) (int, error) {
|
||||
ip, err := u.GetInternalAddress()
|
||||
if err != nil {
|
||||
return 0, nil
|
||||
}
|
||||
|
||||
timeoutInSeconds := uint32(timeout / time.Second)
|
||||
|
||||
if externalPort := u.ports[internalPort]; externalPort > 0 {
|
||||
err = u.c.AddPortMappingCtx(ctx, "", uint16(externalPort), mapProtocol(protocol), uint16(internalPort), ip.String(), true, description, timeoutInSeconds)
|
||||
if err == nil {
|
||||
return externalPort, nil
|
||||
}
|
||||
}
|
||||
|
||||
for i := 0; i < 3; i++ {
|
||||
externalPort := randomPort()
|
||||
err = u.c.AddPortMappingCtx(ctx, "", uint16(externalPort), mapProtocol(protocol), uint16(internalPort), ip.String(), true, description, timeoutInSeconds)
|
||||
if err == nil {
|
||||
u.ports[internalPort] = externalPort
|
||||
return externalPort, nil
|
||||
}
|
||||
}
|
||||
|
||||
return 0, err
|
||||
}
|
||||
|
||||
func (u *upnp_NAT) DeletePortMapping(ctx context.Context, protocol string, internalPort int) error {
|
||||
if externalPort := u.ports[internalPort]; externalPort > 0 {
|
||||
delete(u.ports, internalPort)
|
||||
return u.c.DeletePortMappingCtx(ctx, "", uint16(externalPort), mapProtocol(protocol))
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (u *upnp_NAT) GetDeviceAddress() (net.IP, error) {
|
||||
addr, err := net.ResolveUDPAddr("udp4", u.rootDevice.URLBase.Host)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return addr.IP, nil
|
||||
}
|
||||
|
||||
func (u *upnp_NAT) GetInternalAddress() (net.IP, error) {
|
||||
devAddr, err := u.GetDeviceAddress()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
ifaces, err := net.Interfaces()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, iface := range ifaces {
|
||||
addrs, err := iface.Addrs()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for _, addr := range addrs {
|
||||
switch x := addr.(type) {
|
||||
case *net.IPNet:
|
||||
if x.Contains(devAddr) {
|
||||
return x.IP, nil
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return nil, ErrNoInternalAddress
|
||||
}
|
||||
|
||||
func (n *upnp_NAT) Type() string { return n.typ }
|
||||
Reference in New Issue
Block a user