mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-21 23:53:14 +01:00
[client] Destory WG interface on down timeout (#2435)
wait on engine down to not only wait for the interface to be down but completely removed. If the waiting loop reaches the timeout we will trigger an interface destroy. On the up command, it now waits until the engine is fully running before sending the response to the CLI. Includes a small refactor of probes to comply with sonar rules about parameter count in the function call
This commit is contained in:
parent
95174d4619
commit
13e7198046
@ -42,6 +42,8 @@ var downCmd = &cobra.Command{
|
|||||||
log.Errorf("call service down method: %v", err)
|
log.Errorf("call service down method: %v", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
cmd.Println("Disconnected")
|
||||||
return nil
|
return nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -55,17 +55,15 @@ func NewConnectClient(
|
|||||||
|
|
||||||
// Run with main logic.
|
// Run with main logic.
|
||||||
func (c *ConnectClient) Run() error {
|
func (c *ConnectClient) Run() error {
|
||||||
return c.run(MobileDependency{}, nil, nil, nil, nil)
|
return c.run(MobileDependency{}, nil, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RunWithProbes runs the client's main logic with probes attached
|
// RunWithProbes runs the client's main logic with probes attached
|
||||||
func (c *ConnectClient) RunWithProbes(
|
func (c *ConnectClient) RunWithProbes(
|
||||||
mgmProbe *Probe,
|
probes *ProbeHolder,
|
||||||
signalProbe *Probe,
|
runningWg *sync.WaitGroup,
|
||||||
relayProbe *Probe,
|
|
||||||
wgProbe *Probe,
|
|
||||||
) error {
|
) error {
|
||||||
return c.run(MobileDependency{}, mgmProbe, signalProbe, relayProbe, wgProbe)
|
return c.run(MobileDependency{}, probes, runningWg)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RunOnAndroid with main logic on mobile system
|
// RunOnAndroid with main logic on mobile system
|
||||||
@ -84,7 +82,7 @@ func (c *ConnectClient) RunOnAndroid(
|
|||||||
HostDNSAddresses: dnsAddresses,
|
HostDNSAddresses: dnsAddresses,
|
||||||
DnsReadyListener: dnsReadyListener,
|
DnsReadyListener: dnsReadyListener,
|
||||||
}
|
}
|
||||||
return c.run(mobileDependency, nil, nil, nil, nil)
|
return c.run(mobileDependency, nil, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ConnectClient) RunOniOS(
|
func (c *ConnectClient) RunOniOS(
|
||||||
@ -100,15 +98,13 @@ func (c *ConnectClient) RunOniOS(
|
|||||||
NetworkChangeListener: networkChangeListener,
|
NetworkChangeListener: networkChangeListener,
|
||||||
DnsManager: dnsManager,
|
DnsManager: dnsManager,
|
||||||
}
|
}
|
||||||
return c.run(mobileDependency, nil, nil, nil, nil)
|
return c.run(mobileDependency, nil, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ConnectClient) run(
|
func (c *ConnectClient) run(
|
||||||
mobileDependency MobileDependency,
|
mobileDependency MobileDependency,
|
||||||
mgmProbe *Probe,
|
probes *ProbeHolder,
|
||||||
signalProbe *Probe,
|
runningWg *sync.WaitGroup,
|
||||||
relayProbe *Probe,
|
|
||||||
wgProbe *Probe,
|
|
||||||
) error {
|
) error {
|
||||||
defer func() {
|
defer func() {
|
||||||
if r := recover(); r != nil {
|
if r := recover(); r != nil {
|
||||||
@ -255,7 +251,7 @@ func (c *ConnectClient) run(
|
|||||||
checks := loginResp.GetChecks()
|
checks := loginResp.GetChecks()
|
||||||
|
|
||||||
c.engineMutex.Lock()
|
c.engineMutex.Lock()
|
||||||
c.engine = NewEngineWithProbes(engineCtx, cancel, signalClient, mgmClient, engineConfig, mobileDependency, c.statusRecorder, mgmProbe, signalProbe, relayProbe, wgProbe, checks)
|
c.engine = NewEngineWithProbes(engineCtx, cancel, signalClient, mgmClient, engineConfig, mobileDependency, c.statusRecorder, probes, checks)
|
||||||
c.engineMutex.Unlock()
|
c.engineMutex.Unlock()
|
||||||
|
|
||||||
err = c.engine.Start()
|
err = c.engine.Start()
|
||||||
@ -267,17 +263,15 @@ func (c *ConnectClient) run(
|
|||||||
log.Infof("Netbird engine started, the IP is: %s", peerConfig.GetAddress())
|
log.Infof("Netbird engine started, the IP is: %s", peerConfig.GetAddress())
|
||||||
state.Set(StatusConnected)
|
state.Set(StatusConnected)
|
||||||
|
|
||||||
|
if runningWg != nil {
|
||||||
|
runningWg.Done()
|
||||||
|
}
|
||||||
|
|
||||||
<-engineCtx.Done()
|
<-engineCtx.Done()
|
||||||
c.statusRecorder.ClientTeardown()
|
c.statusRecorder.ClientTeardown()
|
||||||
|
|
||||||
backOff.Reset()
|
backOff.Reset()
|
||||||
|
|
||||||
err = c.engine.Stop()
|
|
||||||
if err != nil {
|
|
||||||
log.Errorf("failed stopping engine %v", err)
|
|
||||||
return wrapErr(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Info("stopped NetBird client")
|
log.Info("stopped NetBird client")
|
||||||
|
|
||||||
if _, err := state.Status(); errors.Is(err, ErrResetConnection) {
|
if _, err := state.Status(); errors.Is(err, ErrResetConnection) {
|
||||||
@ -307,6 +301,12 @@ func (c *ConnectClient) Engine() *Engine {
|
|||||||
return e
|
return e
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *ConnectClient) Stop() error {
|
||||||
|
c.engineMutex.Lock()
|
||||||
|
defer c.engineMutex.Unlock()
|
||||||
|
return c.engine.Stop()
|
||||||
|
}
|
||||||
|
|
||||||
// createEngineConfig converts configuration received from Management Service to EngineConfig
|
// createEngineConfig converts configuration received from Management Service to EngineConfig
|
||||||
func createEngineConfig(key wgtypes.Key, config *Config, peerConfig *mgmProto.PeerConfig) (*EngineConfig, error) {
|
func createEngineConfig(key wgtypes.Key, config *Config, peerConfig *mgmProto.PeerConfig) (*EngineConfig, error) {
|
||||||
nm := false
|
nm := false
|
||||||
|
@ -155,10 +155,7 @@ type Engine struct {
|
|||||||
|
|
||||||
dnsServer dns.Server
|
dnsServer dns.Server
|
||||||
|
|
||||||
mgmProbe *Probe
|
probes *ProbeHolder
|
||||||
signalProbe *Probe
|
|
||||||
relayProbe *Probe
|
|
||||||
wgProbe *Probe
|
|
||||||
|
|
||||||
wgConnWorker sync.WaitGroup
|
wgConnWorker sync.WaitGroup
|
||||||
|
|
||||||
@ -192,9 +189,6 @@ func NewEngine(
|
|||||||
mobileDep,
|
mobileDep,
|
||||||
statusRecorder,
|
statusRecorder,
|
||||||
nil,
|
nil,
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
checks,
|
checks,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
@ -208,10 +202,7 @@ func NewEngineWithProbes(
|
|||||||
config *EngineConfig,
|
config *EngineConfig,
|
||||||
mobileDep MobileDependency,
|
mobileDep MobileDependency,
|
||||||
statusRecorder *peer.Status,
|
statusRecorder *peer.Status,
|
||||||
mgmProbe *Probe,
|
probes *ProbeHolder,
|
||||||
signalProbe *Probe,
|
|
||||||
relayProbe *Probe,
|
|
||||||
wgProbe *Probe,
|
|
||||||
checks []*mgmProto.Checks,
|
checks []*mgmProto.Checks,
|
||||||
) *Engine {
|
) *Engine {
|
||||||
|
|
||||||
@ -229,22 +220,20 @@ func NewEngineWithProbes(
|
|||||||
networkSerial: 0,
|
networkSerial: 0,
|
||||||
sshServerFunc: nbssh.DefaultSSHServer,
|
sshServerFunc: nbssh.DefaultSSHServer,
|
||||||
statusRecorder: statusRecorder,
|
statusRecorder: statusRecorder,
|
||||||
mgmProbe: mgmProbe,
|
probes: probes,
|
||||||
signalProbe: signalProbe,
|
|
||||||
relayProbe: relayProbe,
|
|
||||||
wgProbe: wgProbe,
|
|
||||||
checks: checks,
|
checks: checks,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *Engine) Stop() error {
|
func (e *Engine) Stop() error {
|
||||||
|
if e == nil {
|
||||||
|
// this seems to be a very odd case but there was the possibility if the netbird down command comes before the engine is fully started
|
||||||
|
log.Debugf("tried stopping engine that is nil")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
e.syncMsgMux.Lock()
|
e.syncMsgMux.Lock()
|
||||||
defer e.syncMsgMux.Unlock()
|
defer e.syncMsgMux.Unlock()
|
||||||
|
|
||||||
if e.cancel != nil {
|
|
||||||
e.cancel()
|
|
||||||
}
|
|
||||||
|
|
||||||
// stopping network monitor first to avoid starting the engine again
|
// stopping network monitor first to avoid starting the engine again
|
||||||
if e.networkMonitor != nil {
|
if e.networkMonitor != nil {
|
||||||
e.networkMonitor.Stop()
|
e.networkMonitor.Stop()
|
||||||
@ -260,31 +249,23 @@ func (e *Engine) Stop() error {
|
|||||||
e.clientRoutes = nil
|
e.clientRoutes = nil
|
||||||
e.clientRoutesMu.Unlock()
|
e.clientRoutesMu.Unlock()
|
||||||
|
|
||||||
|
if e.cancel != nil {
|
||||||
|
e.cancel()
|
||||||
|
}
|
||||||
|
|
||||||
// very ugly but we want to remove peers from the WireGuard interface first before removing interface.
|
// very ugly but we want to remove peers from the WireGuard interface first before removing interface.
|
||||||
// Removing peers happens in the conn.Close() asynchronously
|
// Removing peers happens in the conn.Close() asynchronously
|
||||||
time.Sleep(500 * time.Millisecond)
|
time.Sleep(500 * time.Millisecond)
|
||||||
|
|
||||||
e.close()
|
e.close()
|
||||||
|
|
||||||
e.wgConnWorker.Wait()
|
e.wgConnWorker.Wait()
|
||||||
|
|
||||||
maxWaitTime := 5 * time.Second
|
log.Infof("Engine stopped")
|
||||||
timeout := time.After(maxWaitTime)
|
|
||||||
|
|
||||||
for {
|
|
||||||
if !e.IsWGIfaceUp() {
|
|
||||||
log.Infof("stopped Netbird Engine")
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
select {
|
|
||||||
case <-timeout:
|
|
||||||
return fmt.Errorf("timeout when waiting for interface shutdown")
|
|
||||||
default:
|
|
||||||
time.Sleep(100 * time.Millisecond)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Start creates a new WireGuard tunnel interface and listens to events from Signal and Management services
|
// Start creates a new WireGuard tunnel interface and listens to events from Signal and Management services
|
||||||
// Connections to remote peers are not established here.
|
// Connections to remote peers are not established here.
|
||||||
// However, they will be established once an event with a list of peers to connect to will be received from Management Service
|
// However, they will be established once an event with a list of peers to connect to will be received from Management Service
|
||||||
@ -1415,24 +1396,27 @@ func (e *Engine) getRosenpassAddr() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (e *Engine) receiveProbeEvents() {
|
func (e *Engine) receiveProbeEvents() {
|
||||||
if e.signalProbe != nil {
|
if e.probes == nil {
|
||||||
go e.signalProbe.Receive(e.ctx, func() bool {
|
return
|
||||||
|
}
|
||||||
|
if e.probes.SignalProbe != nil {
|
||||||
|
go e.probes.SignalProbe.Receive(e.ctx, func() bool {
|
||||||
healthy := e.signal.IsHealthy()
|
healthy := e.signal.IsHealthy()
|
||||||
log.Debugf("received signal probe request, healthy: %t", healthy)
|
log.Debugf("received signal probe request, healthy: %t", healthy)
|
||||||
return healthy
|
return healthy
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
if e.mgmProbe != nil {
|
if e.probes.MgmProbe != nil {
|
||||||
go e.mgmProbe.Receive(e.ctx, func() bool {
|
go e.probes.MgmProbe.Receive(e.ctx, func() bool {
|
||||||
healthy := e.mgmClient.IsHealthy()
|
healthy := e.mgmClient.IsHealthy()
|
||||||
log.Debugf("received management probe request, healthy: %t", healthy)
|
log.Debugf("received management probe request, healthy: %t", healthy)
|
||||||
return healthy
|
return healthy
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
if e.relayProbe != nil {
|
if e.probes.RelayProbe != nil {
|
||||||
go e.relayProbe.Receive(e.ctx, func() bool {
|
go e.probes.RelayProbe.Receive(e.ctx, func() bool {
|
||||||
healthy := true
|
healthy := true
|
||||||
|
|
||||||
results := append(e.probeSTUNs(), e.probeTURNs()...)
|
results := append(e.probeSTUNs(), e.probeTURNs()...)
|
||||||
@ -1451,8 +1435,8 @@ func (e *Engine) receiveProbeEvents() {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
if e.wgProbe != nil {
|
if e.probes.WgProbe != nil {
|
||||||
go e.wgProbe.Receive(e.ctx, func() bool {
|
go e.probes.WgProbe.Receive(e.ctx, func() bool {
|
||||||
log.Debug("received wg probe request")
|
log.Debug("received wg probe request")
|
||||||
|
|
||||||
for _, peer := range e.peerConns {
|
for _, peer := range e.peerConns {
|
||||||
@ -1548,20 +1532,3 @@ func isChecksEqual(checks []*mgmProto.Checks, oChecks []*mgmProto.Checks) bool {
|
|||||||
return slices.Equal(checks.Files, oChecks.Files)
|
return slices.Equal(checks.Files, oChecks.Files)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *Engine) IsWGIfaceUp() bool {
|
|
||||||
if e == nil || e.wgInterface == nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
iface, err := net.InterfaceByName(e.wgInterface.Name())
|
|
||||||
if err != nil {
|
|
||||||
log.Debugf("failed to get interface by name %s: %v", e.wgInterface.Name(), err)
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
if iface.Flags&net.FlagUp != 0 {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
@ -2,6 +2,13 @@ package internal
|
|||||||
|
|
||||||
import "context"
|
import "context"
|
||||||
|
|
||||||
|
type ProbeHolder struct {
|
||||||
|
MgmProbe *Probe
|
||||||
|
SignalProbe *Probe
|
||||||
|
RelayProbe *Probe
|
||||||
|
WgProbe *Probe
|
||||||
|
}
|
||||||
|
|
||||||
// Probe allows to run on-demand callbacks from different code locations.
|
// Probe allows to run on-demand callbacks from different code locations.
|
||||||
// Pass the probe to a receiving and a sending end. The receiving end starts listening
|
// Pass the probe to a receiving and a sending end. The receiving end starts listening
|
||||||
// to requests with Receive and executes a callback when the sending end requests it
|
// to requests with Receive and executes a callback when the sending end requests it
|
||||||
|
@ -12,7 +12,6 @@ import (
|
|||||||
|
|
||||||
"github.com/cenkalti/backoff/v4"
|
"github.com/cenkalti/backoff/v4"
|
||||||
"golang.org/x/exp/maps"
|
"golang.org/x/exp/maps"
|
||||||
|
|
||||||
"google.golang.org/protobuf/types/known/durationpb"
|
"google.golang.org/protobuf/types/known/durationpb"
|
||||||
|
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
@ -143,10 +142,14 @@ func (s *Server) Start() error {
|
|||||||
s.sessionWatcher.SetOnExpireListener(s.onSessionExpire)
|
s.sessionWatcher.SetOnExpireListener(s.onSessionExpire)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
runningWg := sync.WaitGroup{}
|
||||||
|
runningWg.Add(1)
|
||||||
if !config.DisableAutoConnect {
|
if !config.DisableAutoConnect {
|
||||||
go s.connectWithRetryRuns(ctx, config, s.statusRecorder, s.mgmProbe, s.signalProbe, s.relayProbe, s.wgProbe)
|
go s.connectWithRetryRuns(ctx, config, s.statusRecorder, &runningWg)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
runningWg.Wait()
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -154,7 +157,7 @@ func (s *Server) Start() error {
|
|||||||
// mechanism to keep the client connected even when the connection is lost.
|
// mechanism to keep the client connected even when the connection is lost.
|
||||||
// we cancel retry if the client receive a stop or down command, or if disable auto connect is configured.
|
// we cancel retry if the client receive a stop or down command, or if disable auto connect is configured.
|
||||||
func (s *Server) connectWithRetryRuns(ctx context.Context, config *internal.Config, statusRecorder *peer.Status,
|
func (s *Server) connectWithRetryRuns(ctx context.Context, config *internal.Config, statusRecorder *peer.Status,
|
||||||
mgmProbe *internal.Probe, signalProbe *internal.Probe, relayProbe *internal.Probe, wgProbe *internal.Probe,
|
runningWg *sync.WaitGroup,
|
||||||
) {
|
) {
|
||||||
backOff := getConnectWithBackoff(ctx)
|
backOff := getConnectWithBackoff(ctx)
|
||||||
retryStarted := false
|
retryStarted := false
|
||||||
@ -185,7 +188,15 @@ func (s *Server) connectWithRetryRuns(ctx context.Context, config *internal.Conf
|
|||||||
runOperation := func() error {
|
runOperation := func() error {
|
||||||
log.Tracef("running client connection")
|
log.Tracef("running client connection")
|
||||||
s.connectClient = internal.NewConnectClient(ctx, config, statusRecorder)
|
s.connectClient = internal.NewConnectClient(ctx, config, statusRecorder)
|
||||||
err := s.connectClient.RunWithProbes(mgmProbe, signalProbe, relayProbe, wgProbe)
|
|
||||||
|
probes := internal.ProbeHolder{
|
||||||
|
MgmProbe: s.mgmProbe,
|
||||||
|
SignalProbe: s.signalProbe,
|
||||||
|
RelayProbe: s.relayProbe,
|
||||||
|
WgProbe: s.wgProbe,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := s.connectClient.RunWithProbes(&probes, runningWg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debugf("run client connection exited with error: %v. Will retry in the background", err)
|
log.Debugf("run client connection exited with error: %v. Will retry in the background", err)
|
||||||
}
|
}
|
||||||
@ -576,7 +587,11 @@ func (s *Server) Up(callerCtx context.Context, _ *proto.UpRequest) (*proto.UpRes
|
|||||||
s.statusRecorder.UpdateManagementAddress(s.config.ManagementURL.String())
|
s.statusRecorder.UpdateManagementAddress(s.config.ManagementURL.String())
|
||||||
s.statusRecorder.UpdateRosenpass(s.config.RosenpassEnabled, s.config.RosenpassPermissive)
|
s.statusRecorder.UpdateRosenpass(s.config.RosenpassEnabled, s.config.RosenpassPermissive)
|
||||||
|
|
||||||
go s.connectWithRetryRuns(ctx, s.config, s.statusRecorder, s.mgmProbe, s.signalProbe, s.relayProbe, s.wgProbe)
|
runningWg := sync.WaitGroup{}
|
||||||
|
runningWg.Add(1)
|
||||||
|
go s.connectWithRetryRuns(ctx, s.config, s.statusRecorder, &runningWg)
|
||||||
|
|
||||||
|
runningWg.Wait()
|
||||||
|
|
||||||
return &proto.UpResponse{}, nil
|
return &proto.UpResponse{}, nil
|
||||||
}
|
}
|
||||||
@ -590,30 +605,21 @@ func (s *Server) Down(ctx context.Context, _ *proto.DownRequest) (*proto.DownRes
|
|||||||
return nil, fmt.Errorf("service is not up")
|
return nil, fmt.Errorf("service is not up")
|
||||||
}
|
}
|
||||||
s.actCancel()
|
s.actCancel()
|
||||||
|
|
||||||
|
err := s.connectClient.Stop()
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to shut down properly: %v", err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
state := internal.CtxGetState(s.rootCtx)
|
state := internal.CtxGetState(s.rootCtx)
|
||||||
state.Set(internal.StatusIdle)
|
state.Set(internal.StatusIdle)
|
||||||
|
|
||||||
maxWaitTime := 5 * time.Second
|
log.Infof("service is down")
|
||||||
timeout := time.After(maxWaitTime)
|
|
||||||
|
|
||||||
engine := s.connectClient.Engine()
|
|
||||||
|
|
||||||
for {
|
|
||||||
if !engine.IsWGIfaceUp() {
|
|
||||||
return &proto.DownResponse{}, nil
|
return &proto.DownResponse{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
select {
|
|
||||||
case <-ctx.Done():
|
|
||||||
return &proto.DownResponse{}, nil
|
|
||||||
case <-timeout:
|
|
||||||
return nil, fmt.Errorf("failed to shut down properly")
|
|
||||||
default:
|
|
||||||
time.Sleep(100 * time.Millisecond)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Status returns the daemon status
|
// Status returns the daemon status
|
||||||
func (s *Server) Status(
|
func (s *Server) Status(
|
||||||
_ context.Context,
|
_ context.Context,
|
||||||
|
@ -73,7 +73,7 @@ func TestConnectWithRetryRuns(t *testing.T) {
|
|||||||
t.Setenv(maxRetryTimeVar, "5s")
|
t.Setenv(maxRetryTimeVar, "5s")
|
||||||
t.Setenv(retryMultiplierVar, "1")
|
t.Setenv(retryMultiplierVar, "1")
|
||||||
|
|
||||||
s.connectWithRetryRuns(ctx, config, s.statusRecorder, s.mgmProbe, s.signalProbe, s.relayProbe, s.wgProbe)
|
s.connectWithRetryRuns(ctx, config, s.statusRecorder, nil)
|
||||||
if counter < 3 {
|
if counter < 3 {
|
||||||
t.Fatalf("expected counter > 2, got %d", counter)
|
t.Fatalf("expected counter > 2, got %d", counter)
|
||||||
}
|
}
|
||||||
|
@ -124,7 +124,23 @@ func (w *WGIface) RemoveAllowedIP(peerKey string, allowedIP string) error {
|
|||||||
func (w *WGIface) Close() error {
|
func (w *WGIface) Close() error {
|
||||||
w.mu.Lock()
|
w.mu.Lock()
|
||||||
defer w.mu.Unlock()
|
defer w.mu.Unlock()
|
||||||
return w.tun.Close()
|
|
||||||
|
err := w.tun.Close()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to close wireguard interface %s: %w", w.Name(), err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = w.waitUntilRemoved()
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("failed to remove WireGuard interface %s: %v", w.Name(), err)
|
||||||
|
err = w.Destroy()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to remove WireGuard interface %s: %w", w.Name(), err)
|
||||||
|
}
|
||||||
|
log.Infof("interface %s successfully removed", w.Name())
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetFilter sets packet filters for the userspace implementation
|
// SetFilter sets packet filters for the userspace implementation
|
||||||
@ -163,3 +179,30 @@ func (w *WGIface) GetDevice() *DeviceWrapper {
|
|||||||
func (w *WGIface) GetStats(peerKey string) (WGStats, error) {
|
func (w *WGIface) GetStats(peerKey string) (WGStats, error) {
|
||||||
return w.configurer.getStats(peerKey)
|
return w.configurer.getStats(peerKey)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (w *WGIface) waitUntilRemoved() error {
|
||||||
|
maxWaitTime := 5 * time.Second
|
||||||
|
timeout := time.NewTimer(maxWaitTime)
|
||||||
|
defer timeout.Stop()
|
||||||
|
|
||||||
|
for {
|
||||||
|
iface, err := net.InterfaceByName(w.Name())
|
||||||
|
if err != nil {
|
||||||
|
if _, ok := err.(*net.OpError); ok {
|
||||||
|
log.Infof("interface %s has been removed", w.Name())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
log.Debugf("failed to get interface by name %s: %v", w.Name(), err)
|
||||||
|
} else if iface == nil {
|
||||||
|
log.Infof("interface %s has been removed", w.Name())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
select {
|
||||||
|
case <-timeout.C:
|
||||||
|
return fmt.Errorf("timeout when waiting for interface %s to be removed", w.Name())
|
||||||
|
default:
|
||||||
|
time.Sleep(100 * time.Millisecond)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
17
iface/iface_destroy_bsd.go
Normal file
17
iface/iface_destroy_bsd.go
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
//go:build darwin || dragonfly || freebsd || netbsd || openbsd
|
||||||
|
|
||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os/exec"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (w *WGIface) Destroy() error {
|
||||||
|
out, err := exec.Command("ifconfig", w.Name(), "destroy").CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to remove interface %s: %w - %s", w.Name(), err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
22
iface/iface_destroy_linux.go
Normal file
22
iface/iface_destroy_linux.go
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
//go:build linux && !android
|
||||||
|
|
||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/vishvananda/netlink"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (w *WGIface) Destroy() error {
|
||||||
|
link, err := netlink.LinkByName(w.Name())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to get link by name %s: %w", w.Name(), err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := netlink.LinkDel(link); err != nil {
|
||||||
|
return fmt.Errorf("failed to delete link %s: %w", w.Name(), err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
9
iface/iface_destroy_mobile.go
Normal file
9
iface/iface_destroy_mobile.go
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
//go:build android || (ios && !darwin)
|
||||||
|
|
||||||
|
package iface
|
||||||
|
|
||||||
|
import "errors"
|
||||||
|
|
||||||
|
func (w *WGIface) Destroy() error {
|
||||||
|
return errors.New("not supported on mobile")
|
||||||
|
}
|
32
iface/iface_destroy_windows.go
Normal file
32
iface/iface_destroy_windows.go
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
//go:build windows
|
||||||
|
|
||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os/exec"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (w *WGIface) Destroy() error {
|
||||||
|
netshCmd := GetSystem32Command("netsh")
|
||||||
|
out, err := exec.Command(netshCmd, "interface", "set", "interface", w.Name(), "admin=disable").CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to remove interface %s: %w - %s", w.Name(), err, out)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetSystem32Command checks if a command can be found in the system path and returns it. In case it can't find it
|
||||||
|
// in the path it will return the full path of a command assuming C:\windows\system32 as the base path.
|
||||||
|
func GetSystem32Command(command string) string {
|
||||||
|
_, err := exec.LookPath(command)
|
||||||
|
if err == nil {
|
||||||
|
return command
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Tracef("Command %s not found in PATH, using C:\\windows\\system32\\%s.exe path", command, command)
|
||||||
|
|
||||||
|
return "C:\\windows\\system32\\" + command + ".exe"
|
||||||
|
}
|
@ -3,6 +3,7 @@
|
|||||||
package iface
|
package iface
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
|
||||||
"github.com/pion/transport/v3"
|
"github.com/pion/transport/v3"
|
||||||
@ -41,7 +42,7 @@ func newTunDevice(name string, address WGAddress, port int, key string, mtu int,
|
|||||||
func (t *tunDevice) Create() (wgConfigurer, error) {
|
func (t *tunDevice) Create() (wgConfigurer, error) {
|
||||||
tunDevice, err := tun.CreateTUN(t.name, t.mtu)
|
tunDevice, err := tun.CreateTUN(t.name, t.mtu)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("error creating tun device: %s", err)
|
||||||
}
|
}
|
||||||
t.wrapper = newDeviceWrapper(tunDevice)
|
t.wrapper = newDeviceWrapper(tunDevice)
|
||||||
|
|
||||||
@ -55,7 +56,7 @@ func (t *tunDevice) Create() (wgConfigurer, error) {
|
|||||||
err = t.assignAddr()
|
err = t.assignAddr()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error assigning ip: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
||||||
@ -63,7 +64,7 @@ func (t *tunDevice) Create() (wgConfigurer, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
t.configurer.close()
|
t.configurer.close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
||||||
}
|
}
|
||||||
return t.configurer, nil
|
return t.configurer, nil
|
||||||
}
|
}
|
||||||
|
@ -70,7 +70,7 @@ func (t *tunKernelDevice) Create() (wgConfigurer, error) {
|
|||||||
configurer := newWGConfigurer(t.name)
|
configurer := newWGConfigurer(t.name)
|
||||||
|
|
||||||
if err := configurer.configureInterface(t.key, t.wgPort); err != nil {
|
if err := configurer.configureInterface(t.key, t.wgPort); err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return configurer, nil
|
return configurer, nil
|
||||||
|
@ -47,7 +47,7 @@ func (t *tunNetstackDevice) Create() (wgConfigurer, error) {
|
|||||||
t.nsTun = netstack.NewNetStackTun(t.listenAddress, t.address.IP.String(), t.mtu)
|
t.nsTun = netstack.NewNetStackTun(t.listenAddress, t.address.IP.String(), t.mtu)
|
||||||
tunIface, err := t.nsTun.Create()
|
tunIface, err := t.nsTun.Create()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("error creating tun device: %s", err)
|
||||||
}
|
}
|
||||||
t.wrapper = newDeviceWrapper(tunIface)
|
t.wrapper = newDeviceWrapper(tunIface)
|
||||||
|
|
||||||
@ -61,7 +61,7 @@ func (t *tunNetstackDevice) Create() (wgConfigurer, error) {
|
|||||||
err = t.configurer.configureInterface(t.key, t.port)
|
err = t.configurer.configureInterface(t.key, t.port)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
_ = tunIface.Close()
|
_ = tunIface.Close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Debugf("device has been created: %s", t.name)
|
log.Debugf("device has been created: %s", t.name)
|
||||||
|
@ -48,8 +48,8 @@ func (t *tunUSPDevice) Create() (wgConfigurer, error) {
|
|||||||
log.Info("create tun interface")
|
log.Info("create tun interface")
|
||||||
tunIface, err := tun.CreateTUN(t.name, t.mtu)
|
tunIface, err := tun.CreateTUN(t.name, t.mtu)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debugf("failed to create tun unterface (%s, %d): %s", t.name, t.mtu, err)
|
log.Debugf("failed to create tun interface (%s, %d): %s", t.name, t.mtu, err)
|
||||||
return nil, err
|
return nil, fmt.Errorf("error creating tun device: %s", err)
|
||||||
}
|
}
|
||||||
t.wrapper = newDeviceWrapper(tunIface)
|
t.wrapper = newDeviceWrapper(tunIface)
|
||||||
|
|
||||||
@ -63,7 +63,7 @@ func (t *tunUSPDevice) Create() (wgConfigurer, error) {
|
|||||||
err = t.assignAddr()
|
err = t.assignAddr()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error assigning ip: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
||||||
@ -71,7 +71,7 @@ func (t *tunUSPDevice) Create() (wgConfigurer, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
t.configurer.close()
|
t.configurer.close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
||||||
}
|
}
|
||||||
return t.configurer, nil
|
return t.configurer, nil
|
||||||
}
|
}
|
||||||
|
@ -59,7 +59,7 @@ func (t *tunDevice) Create() (wgConfigurer, error) {
|
|||||||
log.Info("create tun interface")
|
log.Info("create tun interface")
|
||||||
tunDevice, err := tun.CreateTUNWithRequestedGUID(t.name, &guid, t.mtu)
|
tunDevice, err := tun.CreateTUNWithRequestedGUID(t.name, &guid, t.mtu)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("error creating tun device: %s", err)
|
||||||
}
|
}
|
||||||
t.nativeTunDevice = tunDevice.(*tun.NativeTun)
|
t.nativeTunDevice = tunDevice.(*tun.NativeTun)
|
||||||
t.wrapper = newDeviceWrapper(tunDevice)
|
t.wrapper = newDeviceWrapper(tunDevice)
|
||||||
@ -89,7 +89,7 @@ func (t *tunDevice) Create() (wgConfigurer, error) {
|
|||||||
err = t.assignAddr()
|
err = t.assignAddr()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error assigning ip: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
t.configurer = newWGUSPConfigurer(t.device, t.name)
|
||||||
@ -97,7 +97,7 @@ func (t *tunDevice) Create() (wgConfigurer, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.device.Close()
|
t.device.Close()
|
||||||
t.configurer.close()
|
t.configurer.close()
|
||||||
return nil, err
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
||||||
}
|
}
|
||||||
return t.configurer, nil
|
return t.configurer, nil
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user