2021-06-27 17:56:28 +00:00
|
|
|
#include "FloodingRouter.h"
|
2022-03-03 02:55:11 +00:00
|
|
|
#include "configuration.h"
|
2020-04-17 18:52:20 +00:00
|
|
|
#include "mesh-pb-constants.h"
|
|
|
|
|
2020-05-19 17:27:28 +00:00
|
|
|
FloodingRouter::FloodingRouter() {}
|
2020-04-17 18:52:20 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Send a packet on a suitable interface. This routine will
|
|
|
|
* later free() the packet to pool. This routine is not allowed to stall.
|
|
|
|
* If the txmit queue is full it might return an error
|
|
|
|
*/
|
|
|
|
ErrorCode FloodingRouter::send(MeshPacket *p)
|
|
|
|
{
|
2020-05-21 19:47:41 +00:00
|
|
|
// Add any messages _we_ send to the seen message list (so we will ignore all retransmissions we see)
|
2020-05-19 17:27:28 +00:00
|
|
|
wasSeenRecently(p); // FIXME, move this to a sniffSent method
|
2020-04-17 18:52:20 +00:00
|
|
|
|
|
|
|
return Router::send(p);
|
|
|
|
}
|
|
|
|
|
2021-11-23 02:31:12 +00:00
|
|
|
bool FloodingRouter::shouldFilterReceived(MeshPacket *p)
|
2020-04-17 18:52:20 +00:00
|
|
|
{
|
2020-05-25 18:55:42 +00:00
|
|
|
if (wasSeenRecently(p)) { // Note: this will also add a recent packet record
|
2020-12-17 02:53:29 +00:00
|
|
|
printPacket("Ignoring incoming msg, because we've already seen it", p);
|
2020-05-23 16:24:22 +00:00
|
|
|
return true;
|
|
|
|
}
|
2020-05-19 00:35:23 +00:00
|
|
|
|
2020-05-23 16:24:22 +00:00
|
|
|
return Router::shouldFilterReceived(p);
|
|
|
|
}
|
|
|
|
|
2021-02-21 04:59:47 +00:00
|
|
|
void FloodingRouter::sniffReceived(const MeshPacket *p, const Routing *c)
|
2020-05-23 16:24:22 +00:00
|
|
|
{
|
2022-11-04 18:56:44 +00:00
|
|
|
bool isAck = ((c && c->error_reason == Routing_Error_NONE)); // consider only ROUTING_APP message without error as ACK
|
|
|
|
if (isAck && p->to != getNodeNum()) {
|
2022-08-01 21:59:50 +00:00
|
|
|
// do not flood direct message that is ACKed
|
|
|
|
DEBUG_MSG("Receiving an ACK not for me, but don't need to rebroadcast this direct message anymore.\n");
|
|
|
|
Router::cancelSending(p->to, p->decoded.request_id); // cancel rebroadcast for this DM
|
|
|
|
} else if ((p->to != getNodeNum()) && (p->hop_limit > 0) && (getFrom(p) != getNodeNum())) {
|
2020-05-23 16:24:22 +00:00
|
|
|
if (p->id != 0) {
|
2022-09-09 10:51:41 +00:00
|
|
|
if (config.device.role != Config_DeviceConfig_Role_CLIENT_MUTE) {
|
2022-03-30 05:02:21 +00:00
|
|
|
MeshPacket *tosend = packetPool.allocCopy(*p); // keep a copy because we will be sending it
|
2020-05-23 16:24:22 +00:00
|
|
|
|
2022-03-30 05:02:21 +00:00
|
|
|
tosend->hop_limit--; // bump down the hop count
|
2020-05-23 16:24:22 +00:00
|
|
|
|
2022-03-30 05:02:21 +00:00
|
|
|
printPacket("Rebroadcasting received floodmsg to neighbors", p);
|
|
|
|
// Note: we are careful to resend using the original senders node id
|
|
|
|
// We are careful not to call our hooked version of send() - because we don't want to check this again
|
|
|
|
Router::send(tosend);
|
|
|
|
|
|
|
|
} else {
|
|
|
|
DEBUG_MSG("Not rebroadcasting. Role = Role_ClientMute\n");
|
|
|
|
}
|
2020-05-23 16:24:22 +00:00
|
|
|
|
|
|
|
} else {
|
|
|
|
DEBUG_MSG("Ignoring a simple (0 id) broadcast\n");
|
|
|
|
}
|
2020-05-19 00:35:23 +00:00
|
|
|
}
|
2020-05-23 16:24:22 +00:00
|
|
|
|
|
|
|
// handle the packet as normal
|
2021-02-17 05:06:23 +00:00
|
|
|
Router::sniffReceived(p, c);
|
2020-04-17 18:52:20 +00:00
|
|
|
}
|