transdep/zonecut/worker.go

567 lines
24 KiB
Go
Raw Permalink Normal View History

2018-01-23 20:25:00 +00:00
package zonecut
import (
"fmt"
"github.com/miekg/dns"
"net"
"os"
"github.com/ANSSI-FR/transdep/messages/nameresolver"
"github.com/ANSSI-FR/transdep/messages/zonecut"
"github.com/ANSSI-FR/transdep/tools"
"strings"
"github.com/ANSSI-FR/transdep/errors"
)
// WORKER_CHAN_CAPACITY is the maximum number of unhandled requests that may be to the worker, before a call to handle()
// is blocking.
const WORKER_CHAN_CAPACITY = 10
// worker represents a request handler for a specific request target domain name for which delegation information is sought.
type worker struct {
// req is the request associated with this worker
req *zonecut.Request
// reqs is the channel by which subsequent requests for the same topic as for "dn" are received.
reqs chan *zonecut.Request
// closedReqChan helps prevent double-close issue on reqs channel, when the worker is stopping.
closedReqChan bool
// joinChan is used by stop() to wait for the completion of the start() goroutine
joinChan chan bool
// zcHandler is used to submit new zone cut requests. This is most notably used to get the delegation information of
// the parent zone of the requested name, in order to query its name servers for the requested name delegation
// information. By definition, this may loop up to the root zone which is hardcoded in this program.
zcHandler func(*zonecut.Request) *errors.ErrorStack
// nrHandler is used to submit new name resolution requests. This is used, for instance, to get the IP addresses
// associated to nameservers that are out-of-bailiwick and for which we don't have acceptable glues or IP addresses.
nrHandler func(*nameresolver.Request) *errors.ErrorStack
// config is the configuration of the current Transdep run
config *tools.TransdepConfig
}
// initNewWorker builds a new worker instance and returns it.
// It DOES NOT start the new worker, and should not be called directly by the finder.
func initNewWorker(req *zonecut.Request, zcHandler func(*zonecut.Request) *errors.ErrorStack, nrHandler func(*nameresolver.Request) *errors.ErrorStack, config *tools.TransdepConfig) *worker {
w := new(worker)
w.req = req
w.reqs = make(chan *zonecut.Request, WORKER_CHAN_CAPACITY)
w.closedReqChan = false
w.joinChan = make(chan bool, 1)
w.zcHandler = zcHandler
w.nrHandler = nrHandler
w.config = config
return w
}
/* newWorker builds a new worker instance and returns it.
The worker is started and will resolve the request from the network.
dn is the domain name to which this worker is associated. All subsequent requests that this worker will handle will have
the same target domain name.
zcHandler is the function to call to submit new requests for delegation information (most notably for parent domains,
while chasing for a zone apex).
nrHandler is the function to call to submit new requests for name resolution (most notably to resolve a name server name
into an IP address).
*/
func newWorker(req *zonecut.Request, zcHandler func(*zonecut.Request) *errors.ErrorStack, nrHandler func(*nameresolver.Request) *errors.ErrorStack, config *tools.TransdepConfig) *worker {
w := initNewWorker(req, zcHandler, nrHandler, config)
w.start()
return w
}
// newWorkerFromCachedResult is similar to newWorker, except this worker will not chase the answer on the network; it will
// simply load the answer from cache.
func newWorkerFromCachedResult(req *zonecut.Request, zcHandler func(*zonecut.Request) *errors.ErrorStack, nrHandler func(*nameresolver.Request) *errors.ErrorStack, cf *zonecut.CacheFile, config *tools.TransdepConfig) *worker {
w := initNewWorker(req, zcHandler, nrHandler, config)
w.startWithCachedResult(cf)
return w
}
// newRootZoneWorker is similar to newWorker, except it handles the root zone, which is a special case, since it can be
// loaded from a root hints file
func newRootZoneWorker(exceptions tools.Exceptions, config *tools.TransdepConfig) *worker {
req := zonecut.NewRequest(".", exceptions)
w := initNewWorker(req, nil, nil, config)
w.startForRootZone(w.config.RootHintsFile)
return w
}
// handle allows the submission of new requests to this worker.
// This method returns an error if the worker is stopped or if the submitted request does not match the request usually
// handled by this worker.
func (w *worker) handle(req *zonecut.Request) *errors.ErrorStack {
if w.closedReqChan {
return errors.NewErrorStack(fmt.Errorf("handle: worker request channel for zone cut of %s is already closed", w.req.Domain()))
} else if w.req.RequestTopic() != req.RequestTopic() {
return errors.NewErrorStack(fmt.Errorf("handle: invalid request; the submitted request (%s) does not match the requests handled by this worker (%s)", req.Domain(), w.req.Domain()))
}
w.reqs <- req
return nil
}
// getHardcodedRootZone returns an entry for the root zone. This entry is currently hardcoded for simplicity's sake.
func (w *worker) getHardcodedRootZone() (*zonecut.Entry, *errors.ErrorStack) {
// TODO Complete hardcoded root zone
zce := zonecut.NewEntry(w.req.Domain(), true, []*zonecut.NameSrvInfo{
zonecut.NewNameSrv("l.root-servers.net.", []net.IP{net.ParseIP("199.7.83.42")}),
},
)
return zce, nil
}
// getRootZoneFromFile loads the entries from the specified rootHints file. An error is returned, if the root zone file
// cannot be opened
func (w *worker) getRootZoneFromFile(rootHints string) (*zonecut.Entry, *errors.ErrorStack) {
fd, err := os.Open(rootHints)
if err != nil {
return nil, errors.NewErrorStack(err)
}
defer fd.Close()
nsList := make(map[string]bool)
addrList := make(map[string][]net.IP)
zoneIter := dns.ParseZone(fd, ".", "")
for token := range zoneIter {
if token.Error != nil {
return nil, errors.NewErrorStack(token.Error)
}
if token.RR != nil {
switch rr := token.RR.(type) {
case *dns.NS:
// Just a small test to only consider NS entries for the root zone, in case additional records are provided
if rr.Hdr.Name == "." {
nsList[rr.Ns] = true
}
case *dns.A:
addrList[rr.Hdr.Name] = append(addrList[rr.Hdr.Name], rr.A)
case *dns.AAAA:
addrList[rr.Hdr.Name] = append(addrList[rr.Hdr.Name], rr.AAAA)
}
}
}
var nameSrvs []*zonecut.NameSrvInfo
for name, ipAddrs := range addrList {
if _, ok := nsList[name]; ok {
nameSrvs = append(nameSrvs, zonecut.NewNameSrv(name, ipAddrs))
}
}
return zonecut.NewEntry(".", true, nameSrvs), nil
}
// extractDelegationInfo extracts the list of name servers that are authoritative for the domain that is associated to
// this worker.
// The parent domain is used to filter out additional address records whose credibility are insufficient (because they
// are out-of-bailiwick of the parent domain).
func (w *worker) extractDelegationInfo(parentDomain string, m *dns.Msg) []*zonecut.NameSrvInfo {
nsList := make(map[string][]net.IP, 0)
// Going after the delegation info; we look into the Answer and Authority sections, because following implementations,
// the answer to that NS query might be in both sections (e.g. ns2.msft.com answers in answer section for
// glbdns2.microsoft.com. NS?)
for _, rr := range m.Answer {
// From the Authority section, we only observe NS records whose owner name is equal to the domain name associated to this worker.
if dns.CompareDomainName(rr.Header().Name, w.req.Domain()) == dns.CountLabel(rr.Header().Name) &&
dns.CountLabel(rr.Header().Name) == dns.CountLabel(w.req.Domain()) {
if nsrr, ok := rr.(*dns.NS); ok {
// We create a list of potential IP addresses for each name server; we don't know yet if we will have glues for them or not.
nsList[strings.ToLower(nsrr.Ns)] = make([]net.IP, 0)
}
}
}
for _, rr := range m.Ns {
// From the Authority section, we only observe NS records whose owner name is equal to the domain name associated to this worker.
if dns.CompareDomainName(rr.Header().Name, w.req.Domain()) == dns.CountLabel(rr.Header().Name) &&
dns.CountLabel(rr.Header().Name) == dns.CountLabel(w.req.Domain()) {
if nsrr, ok := rr.(*dns.NS); ok {
// We create a list of potential IP addresses for each name server; we don't know yet if we will have glues for them or not.
nsList[strings.ToLower(nsrr.Ns)] = make([]net.IP, 0)
}
}
}
//Going after the glue records
for _, rr := range m.Extra {
rrname := strings.ToLower(rr.Header().Name)
// Is it an in-bailiwick glue? If not, ignore
if dns.CompareDomainName(rrname, parentDomain) != dns.CountLabel(parentDomain) {
continue
}
// Is this glue record within the NS list
if _, ok := nsList[rrname]; !ok {
continue
}
switch addrrr := rr.(type) {
case *dns.A:
nsList[rrname] = append(nsList[rrname], addrrr.A)
case *dns.AAAA:
nsList[rrname] = append(nsList[rrname], addrrr.AAAA)
}
}
nameSrvs := make([]*zonecut.NameSrvInfo, 0)
for name, addrs := range nsList {
// Ignore NS requiring a glue but without the associated glue records
if dns.CompareDomainName(name, w.req.Domain()) != dns.CountLabel(w.req.Domain()) || len(addrs) > 0 {
nameSrvs = append(nameSrvs, zonecut.NewNameSrv(name, addrs))
}
}
return nameSrvs
}
/*getDelegationInfo searches for the delegation info of the name associated to this worker. It initially tries over UDP
and returns the delegation info as an entry, or the error that occurred during the retrieval of the delegation info.
It also returns a boolean in case of an error; if true, the error is definitive and there is no point in trying other IP
addresses. An exemple of such case is if we obtain a NXDomain error: the parent zone does not know about this domain at
all (assuming all parent nameservers are in sync).
parentDomain is the name of the parent zone. This will be used to filter out non-credible glue records.
addr is the IP address of one of the name server authoritative for the parent zone of the domain that is associated with
this worker. For instance, if the worker is about "example.com.", addr will be the IP address of one of the name servers
that are authoritative for "com."
*/
func (w *worker) getDelegationInfo(parentDomain string, addr net.IP) (*zonecut.Entry, *errors.ErrorStack, bool) {
// proto == "" means UDP
nameSrvs, err, definitiveErr := w.getDelegationInfoOverProto(parentDomain, addr, "")
if err != nil {
err.Push(fmt.Errorf("getDelegationInfo: for %s", w.req.Domain()))
return nil, err, definitiveErr
}
if len(nameSrvs) == 0 {
// having no name servers is the indication that the current name is not an apex. Thus, we don't need to check
// whether there is a DS record. There are "none that we want to consider" :)
return nil, errors.NewErrorStack(errors.NewNoNameServerError(w.req.Domain())), true
}
dnssecProtected, err := w.getDNSSECInfoOverProto(addr, "")
if err != nil {
err.Push(fmt.Errorf("getDelegationInfo: for %s: failed to get DNSSEC info", w.req.Domain()))
return nil, err, false
}
return zonecut.NewEntry(w.req.Domain(), dnssecProtected, nameSrvs), nil, false
}
/* getDNSSECInfoOverProto discovers whether there is a DS record for the domain associated with the domain associated to
this worker in its parent zone.
addr is the address to send the DNS query to
proto is the transport protocol to use to query addr
This function returns a boolean indicator of whether there is a DS record of not in the parent domain. This value is
meaningless if an error occurred while searching for the DS record (error != nil).
*/
func (w *worker) getDNSSECInfoOverProto(addr net.IP, proto string) (bool, *errors.ErrorStack) {
// Sends a DNS query to addr about the domain name associated with this worker, using the "proto" protocol.
clnt := new(dns.Client)
clnt.Net = proto // Let's switch the "DNSSECEnabled" flag on if there is a DS record for this delegation
mds := new(dns.Msg)
mds.SetEdns0(4096, false)
mds.SetQuestion(w.req.Domain(), dns.TypeDS)
mds.RecursionDesired = false
ansds, _, err := clnt.Exchange(mds, net.JoinHostPort(addr.String(), "53"))
// Is this server broken? We should get a delegation or an authoritative DS record
if err != nil {
errStack := errors.NewErrorStack(err)
errStack.Push(fmt.Errorf("getDNSSECInfoOverProto: error during exchange with %s for %s %s?", addr.String(), w.req.Domain(), dns.TypeToString[dns.TypeDS]))
return false, errStack
}
if ansds == nil {
return false, errors.NewErrorStack(fmt.Errorf("getDNSSECInfoOverProto: no answer to DS query or got a DNS error code for %s from %s", w.req.Domain(), addr.String()))
}
if ansds.Rcode != dns.RcodeSuccess {
return false, errors.NewErrorStack(fmt.Errorf("getDNSSECInfoOverProto: received error when asking for %s %s? => %s", w.req.Domain(), dns.TypeToString[dns.TypeDS], dns.RcodeToString[ansds.Rcode]))
}
if ansds.Truncated {
// idem as above
if proto == "tcp" {
return false, errors.NewErrorStack(fmt.Errorf("getDNSSECInfoOverProto: got a truncated answer over TCP while querying DS of %s", w.req.Domain()))
}
return w.getDNSSECInfoOverProto(addr, "tcp")
}
return ansds.Authoritative && len(ansds.Answer) > 0, nil // DNSSEC protected zone or not
}
/* getDelegationInfoOverProto retrieves the list of name servers to which the domain associated with this worker is
delegated to.
parentDomain is the name of the parent domain of the domain associated with this worker.
If an error occurred during the retrieval of this information, the error is not nil. In that case, the list of name
servers is meaningless. The returned bool indicates whether the error is likely to occur when querying one of the other
name servers that we could query for this exact same delegation info.
*/
func (w *worker) getDelegationInfoOverProto(parentDomain string, addr net.IP, proto string) ([]*zonecut.NameSrvInfo, *errors.ErrorStack, bool) {
// Sends a DNS query to addr about the domain name associated with this worker, using the "proto" protocol.
clnt := new(dns.Client)
clnt.Net = proto
m := new(dns.Msg)
m.SetEdns0(4096, false)
m.SetQuestion(w.req.Domain(), dns.TypeNS)
m.RecursionDesired = false
ans, _, err := clnt.Exchange(m, net.JoinHostPort(addr.String(), "53"))
// Did the server answered a valid response?
if err != nil {
errStack := errors.NewErrorStack(err)
errStack.Push(fmt.Errorf("getDelegationInfoOverProto: error while exchanging with %s for %s %s?", addr.String(), w.req.Domain(), dns.TypeToString[dns.TypeNS]))
return nil, errStack, false
}
if ans == nil {
// Not getting an answer may just indicate that this server timed out.
// This is probably not a definitive error, so might wanna retry
return nil, errors.NewErrorStack(fmt.Errorf("getDelegationInfoOverProto: no answer for %s %s? from %s", w.req.Domain(), dns.TypeToString[dns.TypeNS], addr.String())), false
}
// Did the server returned a negative answer?
// (most probably meaning that this name server does not know about this child zone)
if ans.Rcode == dns.RcodeNameError {
// Having the server answer us authoritatively that the name does not exist is probably good enough for us to
// stop waste time on this name. It might be a server that is out-of-sync, though... Currently, we consider
// that this error is definitive.
return nil, errors.NewErrorStack(errors.NewNXDomainError(w.req.Domain(), dns.TypeNS, addr, errors.STR_TO_PROTO[proto])), true
}
if ans.Rcode == dns.RcodeServerFailure {
// If we accept servfail as no data, then this is a definitive answer, else it is not
return nil, errors.NewErrorStack(errors.NewServfailError(w.req.Domain(), dns.TypeNS, addr, errors.STR_TO_PROTO[proto])), w.req.Exceptions().AcceptServFailAsNoData
}
if ans.Rcode != dns.RcodeSuccess {
// A non-NXDomain error may be FORMERR or SERVFAIL which indicates a failure to communicate with the server.
// Maybe this particular server is broken; let's try another one! Not a definitive error for the target domain name.
return nil, errors.NewErrorStack(fmt.Errorf("getDelegationInfoOverProto: got a DNS error for %s %s? from %s: %s", w.req.Domain(), dns.TypeToString[dns.TypeNS], addr.String(), dns.RcodeToString[ans.Rcode])), false
}
if ans.Authoritative {
// The server is authoritative for this name... that means that w.dn is a non-terminal node or the Apex
return nil, nil, true
}
if ans.Truncated {
// A truncated answer usually means retry over TCP. However, sometimes TCP answer are truncated too...
// In that case, we return an error. I don't see how this would not be a definitive error; other servers will
// probably return the same overly large answer!
if proto == "tcp" {
return nil, errors.NewErrorStack(fmt.Errorf("getDelegationInfoOverProto: got a truncated answer over TCP while querying NS of %s", w.req.Domain())), true
}
return w.getDelegationInfoOverProto(parentDomain, addr, "tcp")
}
// Extract info from the DNS message
nameSrvs := w.extractDelegationInfo(parentDomain, ans)
return nameSrvs, nil, false
}
// getDelegationInfoFromGluedNameSrvs does what the name implies. It will stop iterating over the server list if one of
// the servers returns a definitive error that is likely to occur on other servers too.
func (w *worker) getDelegationInfoFromGluedNameSrvs(parentDomain string, nameSrvs []*zonecut.NameSrvInfo) (*zonecut.Entry, *errors.ErrorStack) {
var errList []string
for _, ns := range nameSrvs {
for _, addr := range ns.Addrs() {
entry, err, definitiveError := w.getDelegationInfo(parentDomain, addr)
if err == nil {
return entry, nil
}
if definitiveError {
err.Push(fmt.Errorf("getDelegationInfoFromGluedNameSrvs: definitive error for %s from %s(%s)", w.req.Domain(), ns.Name(), addr.String()))
return nil, err
}
errList = append(errList, fmt.Sprintf("getDelegationInfoFromGluedNameSrvs: %s", err.Error()))
}
}
// No server returned a valid answer nor a definitive error
return nil, errors.NewErrorStack(fmt.Errorf("getDelegationInfoFromGluedNameSrvs: cannot get the delegation info of %s from glued delegation: %s", w.req.Domain(), strings.Join(errList, ", ")))
}
// getDelegationInfoFromGluelessNameSrvs retrieves the IP addresses of the name servers then queries them. It will stop
// iterating over the server list if one of the servers returns a definitive error that is likely to occur on other
// servers too.
func (w *worker) getDelegationInfoFromGluelessNameSrvs(parentDomain string, nameSrvs []string) (*zonecut.Entry, *errors.ErrorStack) {
var errList []string
for _, ns := range nameSrvs {
req := nameresolver.NewRequest(ns, w.req.Exceptions())
w.nrHandler(req)
res, err := req.Result()
if err != nil {
err.Push(fmt.Errorf("getDelegationInfoFromGluelessNameSrvs: error while resolving the IP addresses of nameserver %s of %s", ns, w.req.Domain()))
return nil, err
}
if res.CNAMETarget() != "" {
// This name server name points to a CNAME... This is illegal, so we just skip that server :o)
continue
}
for _, addr := range res.Addrs() {
entry, err, definitiveError := w.getDelegationInfo(parentDomain, addr)
if err == nil {
return entry, nil
}
if definitiveError {
err.Push(fmt.Errorf("getDelegationInfoFromGluelessNameSrvs: definitive error for %s from %s(%s)", w.req.Domain(), ns, addr.String()))
return nil, err
}
errList = append(errList, fmt.Sprintf("getDelegationInfoFromGluelessNameSrvs: error for %s from %s(%s): %s", w.req.Domain(), ns, addr.String(), err.Error()))
}
}
// No server returned a valid answer nor a definitive error
return nil, errors.NewErrorStack(fmt.Errorf("getDelegationInfoFromGluelessNameSrvs: cannot get the delegation info of %s from glueless delegation: [%s]", w.req.Domain(), strings.Join(errList, ", ")))
}
func (w *worker) resolve() (*zonecut.Entry, *errors.ErrorStack) {
var parentZCE *zonecut.Entry
queriedName := w.req.Domain()
// Cycling until we get the delegation info for the parent zone. Cycling like this is necessary if the parent domain
// is not a zone apex. For instance, this is necessary for ssi.gouv.fr, since gouv.fr is an ENT.
for parentZCE == nil {
var err *errors.ErrorStack
// First we get the Entry for the parent zone
pos, end := dns.NextLabel(queriedName, 1)
if end {
queriedName = "."
} else {
queriedName = queriedName[pos:]
}
newReq := zonecut.NewRequest(queriedName, w.req.Exceptions())
w.zcHandler(newReq)
parentZCE, err = newReq.Result()
if err != nil {
var returnErr bool
switch typedErr := err.OriginalError().(type) {
case *errors.TimeoutError:
returnErr = true
case *errors.NXDomainError:
returnErr = w.req.Exceptions().RFC8020
case *errors.ServfailError:
returnErr = !w.req.Exceptions().AcceptServFailAsNoData
case *errors.NoNameServerError:
returnErr = false
default:
_ = typedErr
returnErr = true
}
if returnErr {
err.Push(fmt.Errorf("resolve: error while getting the zone cut info of %s for %s", queriedName, w.req.Domain()))
return nil, err
}
parentZCE = nil
err = nil
}
}
// Split delegation info into glued vs glueless, to prioritize glued delegations, which are faster (no additional
// query required).
var gluedNameSrvs []*zonecut.NameSrvInfo
var gluelessNameSrvs []string
for _, nameSrv := range parentZCE.NameServers() {
inbailiwick := dns.CompareDomainName(nameSrv.Name(), parentZCE.Domain()) == dns.CountLabel(parentZCE.Domain())
if inbailiwick || len(nameSrv.Addrs()) > 0 {
gluedNameSrvs = append(gluedNameSrvs, nameSrv)
} else if !inbailiwick {
gluelessNameSrvs = append(gluelessNameSrvs, nameSrv.Name())
}
}
var entry *zonecut.Entry
entry, gluedErr := w.getDelegationInfoFromGluedNameSrvs(parentZCE.Domain(), gluedNameSrvs)
if gluedErr != nil {
switch typedErr := gluedErr.OriginalError().(type) {
case *errors.NXDomainError:
gluedErr.Push(fmt.Errorf("resolve: got NXDomain while resolving from glued NS of %s", w.req.Domain()))
return nil, gluedErr
case *errors.NoNameServerError:
return nil, nil
default:
_ = typedErr
}
var gluelessErr *errors.ErrorStack
entry, gluelessErr = w.getDelegationInfoFromGluelessNameSrvs(parentZCE.Domain(), gluelessNameSrvs)
if gluelessErr != nil {
if _, ok := gluelessErr.OriginalError().(*errors.NoNameServerError) ; ok {
return nil, nil
}
gluelessErr.Push(fmt.Errorf("resolve: unable to resolve %s: glued errors: [%s]", w.req.Domain(), gluedErr.Error()))
return nil, gluelessErr
}
}
return entry, nil
}
// start prepares the worker for handling new requests.
// The current implementation is to launch a goroutine that will read from the reqs channel attribute new requests and
// will try to answer them. When stopped, it will immediately send the join signal.
func (w *worker) start() {
go func() {
result, err := w.resolve()
for req := range w.reqs {
req.SetResult(result, err)
}
w.joinChan <- true
}()
}
// startWithCachedResult performs the same kind of operations that start(), except that the response is not obtained
// from the network, but by loading it from a cache file.
func (w *worker) startWithCachedResult(cf *zonecut.CacheFile) {
go func() {
result, resultErr, err := cf.Result()
if err != nil {
result = nil
cacheErr := fmt.Errorf("startWithCachedResult: error while loading from cache: %s", err)
if resultErr != nil {
resultErr.Push(cacheErr)
} else {
resultErr = errors.NewErrorStack(cacheErr)
}
}
for req := range w.reqs {
req.SetResult(result, resultErr)
}
w.joinChan <- true
}()
}
// startForRootZone is a special starting procedure for the root zone. Root zone can be loaded from a root hints file,
// but we can also use an hardcoded-but-probably-obsolete list for easy startups. If the rootzone file cannot be loaded,
// the hardcoded list is used instead and an error message is printed on stderr.
func (w *worker) startForRootZone(rootHints string) {
go func() {
var result *zonecut.Entry
var err *errors.ErrorStack
if rootHints == "" {
result, err = w.getHardcodedRootZone()
} else {
result, err = w.getRootZoneFromFile(rootHints)
if err != nil {
fmt.Fprintf(os.Stderr, "startForRootZone: error loading from root hints. Using hardcoded value instead: %s", err)
result, err = w.getHardcodedRootZone()
}
}
for req := range w.reqs {
req.SetResult(result, err)
}
w.joinChan <- true
}()
}
// stop is to be called during the cleanup of the worker. It shuts down the goroutine started by start() and waits for
// it to actually end. stop returns true if it is the first time it is called and the start() routine was stopped, or
// else it returns false.
func (w *worker) stop() bool {
if w.closedReqChan {
return false
}
close(w.reqs)
w.closedReqChan = true
<-w.joinChan
close(w.joinChan)
return true
}