mirror of
https://github.com/bunny-lab-io/Borealis.git
synced 2026-02-04 08:40:32 -07:00
Tunnel Functionality Validated (Initial)
This commit is contained in:
@@ -201,6 +201,13 @@ def register_tunnel(app, adapters: "EngineServiceAdapters") -> None:
|
||||
|
||||
tunnel_service = _get_tunnel_service(adapters)
|
||||
payload = tunnel_service.status(agent_id)
|
||||
agent_socket = False
|
||||
registry = getattr(adapters.context, "agent_socket_registry", None)
|
||||
if registry and hasattr(registry, "is_registered"):
|
||||
try:
|
||||
agent_socket = bool(registry.is_registered(agent_id))
|
||||
except Exception:
|
||||
agent_socket = False
|
||||
bump = _normalize_text(request.args.get("bump") or "")
|
||||
_service_log_event(
|
||||
"vpn_api_status_request agent_id={0} bump={1} remote={2}".format(
|
||||
@@ -213,8 +220,9 @@ def register_tunnel(app, adapters: "EngineServiceAdapters") -> None:
|
||||
_service_log_event(
|
||||
"vpn_api_status_response agent_id={0} status=down".format(agent_id)
|
||||
)
|
||||
return jsonify({"status": "down", "agent_id": agent_id}), 200
|
||||
return jsonify({"status": "down", "agent_id": agent_id, "agent_socket": agent_socket}), 200
|
||||
payload["status"] = "up"
|
||||
payload["agent_socket"] = agent_socket
|
||||
if bump:
|
||||
tunnel_service.bump_activity(agent_id)
|
||||
_service_log_event(
|
||||
|
||||
@@ -85,6 +85,9 @@ class AgentSocketRegistry:
|
||||
self._sid_by_agent.pop(agent_id, None)
|
||||
return agent_id
|
||||
|
||||
def is_registered(self, agent_id: str) -> bool:
|
||||
return bool(self._sid_by_agent.get(agent_id))
|
||||
|
||||
def emit(self, agent_id: str, event: str, payload: Any) -> bool:
|
||||
sid = self._sid_by_agent.get(agent_id)
|
||||
if not sid:
|
||||
@@ -105,6 +108,7 @@ def register_realtime(socket_server: SocketIO, context: EngineContext) -> None:
|
||||
agent_logger = context.logger.getChild("realtime.agents")
|
||||
shell_bridge = VpnShellBridge(socket_server, context, adapters.service_log)
|
||||
agent_registry = AgentSocketRegistry(socket_server, agent_logger)
|
||||
setattr(context, "agent_socket_registry", agent_registry)
|
||||
|
||||
def _emit_agent_event(agent_id: str, event: str, payload: Any) -> bool:
|
||||
return agent_registry.emit(agent_id, event, payload)
|
||||
@@ -370,6 +374,20 @@ def register_realtime(socket_server: SocketIO, context: EngineContext) -> None:
|
||||
level="WARNING",
|
||||
)
|
||||
return {"error": "tunnel_down"}
|
||||
registry = getattr(context, "agent_socket_registry", None)
|
||||
if registry and hasattr(registry, "is_registered"):
|
||||
try:
|
||||
if not registry.is_registered(agent_id):
|
||||
_shell_log(
|
||||
"vpn_shell_open_failed agent_id={0} sid={1} reason=agent_socket_missing".format(
|
||||
agent_id,
|
||||
request.sid,
|
||||
),
|
||||
level="WARNING",
|
||||
)
|
||||
return {"error": "agent_socket_missing"}
|
||||
except Exception:
|
||||
agent_logger.debug("agent_socket_registry lookup failed for agent_id=%s", agent_id, exc_info=True)
|
||||
|
||||
session = shell_bridge.open_session(request.sid, agent_id)
|
||||
if session is None:
|
||||
|
||||
@@ -40,9 +40,13 @@ class ShellSession:
|
||||
_reader: Optional[threading.Thread] = None
|
||||
|
||||
def start_reader(self) -> None:
|
||||
t = threading.Thread(target=self._read_loop, daemon=True)
|
||||
t.start()
|
||||
self._reader = t
|
||||
starter = getattr(self.socketio, "start_background_task", None)
|
||||
if callable(starter):
|
||||
self._reader = starter(self._read_loop)
|
||||
else:
|
||||
t = threading.Thread(target=self._read_loop, daemon=True)
|
||||
t.start()
|
||||
self._reader = t
|
||||
|
||||
def _service_log_event(self, message: str, *, level: str = "INFO") -> None:
|
||||
if not callable(self.service_log):
|
||||
@@ -171,6 +175,16 @@ class VpnShellBridge:
|
||||
service = getattr(self.context, "vpn_tunnel_service", None)
|
||||
if service is None:
|
||||
return None
|
||||
existing = self._sessions.pop(sid, None)
|
||||
if existing:
|
||||
self._service_log_event(
|
||||
"vpn_shell_replace_session agent_id={0} sid={1}".format(
|
||||
existing.agent_id,
|
||||
sid,
|
||||
),
|
||||
level="WARNING",
|
||||
)
|
||||
existing.close()
|
||||
status = service.status(agent_id)
|
||||
if not status:
|
||||
return None
|
||||
@@ -178,7 +192,8 @@ class VpnShellBridge:
|
||||
port = int(self.context.wireguard_shell_port)
|
||||
tcp = None
|
||||
last_error: Optional[Exception] = None
|
||||
for attempt in range(3):
|
||||
connect_timeout = 2.0
|
||||
for attempt in range(2):
|
||||
self._service_log_event(
|
||||
"vpn_shell_connect_attempt agent_id={0} sid={1} host={2} port={3} attempt={4}".format(
|
||||
agent_id,
|
||||
@@ -189,7 +204,7 @@ class VpnShellBridge:
|
||||
)
|
||||
)
|
||||
try:
|
||||
tcp = socket.create_connection((host, port), timeout=5)
|
||||
tcp = socket.create_connection((host, port), timeout=connect_timeout)
|
||||
break
|
||||
except Exception as exc:
|
||||
last_error = exc
|
||||
@@ -205,7 +220,7 @@ class VpnShellBridge:
|
||||
"vpn_shell_agent_start_failed agent_id={0} sid={1}".format(agent_id, sid),
|
||||
level="WARNING",
|
||||
)
|
||||
time.sleep(1)
|
||||
time.sleep(0.5)
|
||||
if tcp is None:
|
||||
self._service_log_event(
|
||||
"vpn_shell_connect_failed agent_id={0} sid={1} host={2} port={3} error={4}".format(
|
||||
|
||||
Reference in New Issue
Block a user