/*
Serval DNA MDP overlay network link tracking
Copyright (C) 2016 Flinders University
Copyright (C) 2012-2013 Serval Project Inc.
Copyright (C) 2010-2012 Paul Gardner-Stephen
 
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
 
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.
 
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
*/

#include "serval.h"
#include "conf.h"
#include "str.h"
#include "overlay_address.h"
#include "overlay_buffer.h"
#include "overlay_interface.h"
#include "overlay_packet.h"
#include "keyring.h"
#include "strbuf_helpers.h"
#include "route_link.h"
#include "socket.h"

int set_reachable(struct subscriber *subscriber, 
  struct network_destination *destination, struct subscriber *next_hop,
  int hop_count, struct subscriber *prior_hop){
  
  int reachable = REACHABLE_NONE;
  if (destination)
    reachable = destination->unicast?REACHABLE_UNICAST:REACHABLE_BROADCAST;
  else if(next_hop)
    reachable = REACHABLE_INDIRECT;
  
  subscriber->hop_count = hop_count;
  subscriber->prior_hop = prior_hop;
  
  if (subscriber->reachable==reachable 
    && subscriber->next_hop==next_hop 
    && subscriber->destination == destination)
    return 0;
  
  int old_value = subscriber->reachable;
  subscriber->reachable = reachable;
  set_destination_ref(&subscriber->destination, destination);
  subscriber->next_hop = next_hop;
  
  // These log messages are for use in tests.  Changing them may break test scripts.
  if (IF_DEBUG(overlayrouting) || IF_DEBUG(linkstate)) {
    switch (reachable) {
      case REACHABLE_NONE:
	_DEBUGF("NOT REACHABLE sid=%s", alloca_tohex_sid_t(subscriber->sid));
	break;
      case REACHABLE_INDIRECT:
	_DEBUGF("REACHABLE INDIRECTLY sid=%s, via %s", alloca_tohex_sid_t(subscriber->sid), alloca_tohex_sid_t(next_hop->sid));
	break;
      case REACHABLE_UNICAST:
	_DEBUGF("REACHABLE VIA UNICAST sid=%s, on %s ", alloca_tohex_sid_t(subscriber->sid), destination->interface->name);
	break;
      case REACHABLE_BROADCAST:
	_DEBUGF("REACHABLE VIA BROADCAST sid=%s, on %s ", alloca_tohex_sid_t(subscriber->sid), destination->interface->name);
	break;
    }
  }
  
  /* Pre-emptively send a public signing key request */
  if (!subscriber->id_valid && reachable&REACHABLE)
    keyring_send_identity_request(subscriber);

  CALL_TRIGGER(link_change, subscriber, old_value);
  
  return 1;
}

// load a unicast address from configuration
struct network_destination *load_subscriber_address(struct subscriber *subscriber)
{
  if (!subscriber || subscriber->reachable != REACHABLE_NONE)
    return NULL;
  int i = config_host_list__get(&config.hosts, &subscriber->sid);
  // No unicast configuration? just return.
  if (i == -1)
    return NULL;
  const struct config_host *hostc = &config.hosts.av[i].value;
  overlay_interface *interface = NULL;
  if (*hostc->interface){
    interface = overlay_interface_find_name_addr(hostc->interface, NULL);
    if (!interface){
      WARNF("Can't find configured interface %s", hostc->interface);
      return NULL;
    }
  }
  struct socket_address addr;
  bzero(&addr, sizeof(addr));
  if (hostc->address.s_addr == INADDR_NONE){
    if (socket_resolve_name(AF_INET, hostc->host, NULL, &addr)==-1){
      // Perhaps the right interface isnt up yet
      return NULL;
    }
  }else{
    addr.addrlen = sizeof(addr.inet);
    addr.inet.sin_family = AF_INET;
    addr.inet.sin_addr = hostc->address;
  }
  addr.inet.sin_port = htons(hostc->port);
  DEBUGF(overlayrouting, "Loaded address %s for %s", alloca_socket_address(&addr), alloca_tohex_sid_t(subscriber->sid));
  return create_unicast_destination(&addr, interface);
}


int overlay_send_probe(struct subscriber *peer, struct network_destination *destination, int queue){
  time_ms_t now = gettime_ms();
  // though unicast probes don't typically re-use the same network destination, 
  // we should still try to throttle when we can
  if (destination->last_tx + destination->ifconfig.tick_ms > now)
    return WHY("Throttling probe packet");
  
  // TODO enhance overlay_send_frame to support pre-supplied network destinations
  
  struct overlay_frame *frame=malloc(sizeof(struct overlay_frame));
  bzero(frame,sizeof(struct overlay_frame));
  frame->type=OF_TYPE_DATA;
  frame->source = get_my_subscriber(1);
  frame->destination = peer;
  frame->ttl=1;
  frame->queue=queue;
  frame_add_destination(frame, peer, destination);

  if ((frame->payload = ob_new()) == NULL) {
    op_free(frame);
    return -1;
  }
  frame->source_full = 1;
  
  overlay_mdp_encode_ports(frame->payload, MDP_PORT_ECHO, MDP_PORT_PROBE);
  
  ob_append_byte(frame->payload, destination->interface - overlay_interfaces);
  ob_append_bytes(frame->payload, (uint8_t*)&destination->address.addr, destination->address.addrlen);
  
  if (overlay_payload_enqueue(frame)){
    op_free(frame);
    return -1;
  }
  DEBUGF(overlayrouting, "Queued probe packet on interface %s to %s for %s", 
	 destination->interface->name, 
	 alloca_socket_address(&destination->address), 
	 peer?alloca_tohex_sid_t(peer->sid):"ANY"
	);
  return 0;
}

int overlay_send_stun_request(struct subscriber *server, struct subscriber *request){
  // don't bother with a stun request if the peer is already reachable directly
  if (request->reachable&REACHABLE_DIRECT)
    return -1;
  
  time_ms_t now = gettime_ms();
  if (request->last_stun_request +1000 > now)
    return -1;
  
  request->last_stun_request=now;
  // If two people are behind the same NAT, but can't hear broadcast packets
  // and the NAT doesn't allow internal packets to bounce back based on public addresses
  // we need to tell the remote party all of our private addresses
  // so we can send them an unrequested stun response to provoke a probe packet
  if (request->reachable&REACHABLE || (server && server->reachable & REACHABLE)){
    struct internal_mdp_header header;
    bzero(&header, sizeof header);
    header.source = get_my_subscriber(1);
    header.destination = request;
    header.source_port = MDP_PORT_STUNREQ;
    header.destination_port = MDP_PORT_STUN;
    header.qos = OQ_MESH_MANAGEMENT;
    
    struct overlay_buffer *payload = ob_new();
    ob_limitsize(payload, MDP_MTU);
    
    unsigned i;
    for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
      if (overlay_interfaces[i].state == INTERFACE_STATE_UP 
	&& overlay_interfaces[i].address.addr.sa_family == AF_INET){
	
	overlay_address_append(NULL, payload, get_my_subscriber(1));
	ob_append_ui32(payload, overlay_interfaces[i].address.inet.sin_addr.s_addr);
	ob_append_ui16(payload, overlay_interfaces[i].address.inet.sin_port);
	if (ob_overrun(payload)){
	  ob_rewind(payload);
	  break;
	}
	ob_checkpoint(payload);
      }
    }
    
    ob_flip(payload);
    DEBUGF(overlayrouting, "Sending STUN response to %s for my private addresses", alloca_tohex_sid_t(request->sid));
    overlay_send_frame(&header, payload);
    ob_free(payload);
  }
  
  if (server && server->reachable & REACHABLE){
    struct internal_mdp_header header;
    bzero(&header, sizeof header);
    header.source = get_my_subscriber(1);
    header.destination = server;
    
    header.source_port = MDP_PORT_STUN;
    header.destination_port = MDP_PORT_STUNREQ;
    header.qos = OQ_MESH_MANAGEMENT;
    
    struct overlay_buffer *payload = ob_new();
    ob_limitsize(payload, MDP_MTU);
    
    overlay_address_append(NULL, payload, request);
    if (!ob_overrun(payload)) {
      DEBUGF(overlayrouting, "Sending STUN request to %s", alloca_tohex_sid_t(server->sid));
	
      ob_flip(payload);
      overlay_send_frame(&header, payload);
    }
    ob_free(payload);
  }
  return 0;
}