mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-22 16:13:31 +01:00
[relay] Replace the iface to interface (#2473)
Replace the iface to interface
This commit is contained in:
parent
880b81154f
commit
5ac6f56594
@ -134,7 +134,7 @@ type Engine struct {
|
|||||||
ctx context.Context
|
ctx context.Context
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
|
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
wgProxyFactory *wgproxy.Factory
|
wgProxyFactory *wgproxy.Factory
|
||||||
|
|
||||||
udpMux *bind.UniversalUDPMuxDefault
|
udpMux *bind.UniversalUDPMuxDefault
|
||||||
|
@ -215,14 +215,13 @@ func TestEngine_UpdateNetworkMap(t *testing.T) {
|
|||||||
WgPrivateKey: key,
|
WgPrivateKey: key,
|
||||||
WgPort: 33100,
|
WgPort: 33100,
|
||||||
}, MobileDependency{}, peer.NewRecorder("https://mgm"), nil)
|
}, MobileDependency{}, peer.NewRecorder("https://mgm"), nil)
|
||||||
newNet, err := stdnet.NewNet()
|
|
||||||
if err != nil {
|
wgIface := &iface.MockWGIface{
|
||||||
t.Fatal(err)
|
RemovePeerFunc: func(peerKey string) error {
|
||||||
}
|
return nil
|
||||||
engine.wgInterface, err = iface.NewWGIFace("utun102", "100.64.0.1/24", engine.config.WgPort, key.String(), iface.DefaultMTU, newNet, nil, nil)
|
},
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
}
|
||||||
|
engine.wgInterface = wgIface
|
||||||
engine.routeManager = routemanager.NewManager(ctx, key.PublicKey().String(), time.Minute, engine.wgInterface, engine.statusRecorder, nil)
|
engine.routeManager = routemanager.NewManager(ctx, key.PublicKey().String(), time.Minute, engine.wgInterface, engine.statusRecorder, nil)
|
||||||
engine.dnsServer = &dns.MockServer{
|
engine.dnsServer = &dns.MockServer{
|
||||||
UpdateDNSServerFunc: func(serial uint64, update nbdns.Config) error { return nil },
|
UpdateDNSServerFunc: func(serial uint64, update nbdns.Config) error { return nil },
|
||||||
|
@ -36,7 +36,7 @@ const (
|
|||||||
type WgConfig struct {
|
type WgConfig struct {
|
||||||
WgListenPort int
|
WgListenPort int
|
||||||
RemoteKey string
|
RemoteKey string
|
||||||
WgInterface *iface.WGIface
|
WgInterface iface.IWGIface
|
||||||
AllowedIps string
|
AllowedIps string
|
||||||
PreSharedKey *wgtypes.Key
|
PreSharedKey *wgtypes.Key
|
||||||
}
|
}
|
||||||
|
@ -44,7 +44,7 @@ type clientNetwork struct {
|
|||||||
ctx context.Context
|
ctx context.Context
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
statusRecorder *peer.Status
|
statusRecorder *peer.Status
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
routes map[route.ID]*route.Route
|
routes map[route.ID]*route.Route
|
||||||
routeUpdate chan routesUpdate
|
routeUpdate chan routesUpdate
|
||||||
peerStateUpdate chan struct{}
|
peerStateUpdate chan struct{}
|
||||||
@ -54,7 +54,7 @@ type clientNetwork struct {
|
|||||||
updateSerial uint64
|
updateSerial uint64
|
||||||
}
|
}
|
||||||
|
|
||||||
func newClientNetworkWatcher(ctx context.Context, dnsRouteInterval time.Duration, wgInterface *iface.WGIface, statusRecorder *peer.Status, rt *route.Route, routeRefCounter *refcounter.RouteRefCounter, allowedIPsRefCounter *refcounter.AllowedIPsRefCounter) *clientNetwork {
|
func newClientNetworkWatcher(ctx context.Context, dnsRouteInterval time.Duration, wgInterface iface.IWGIface, statusRecorder *peer.Status, rt *route.Route, routeRefCounter *refcounter.RouteRefCounter, allowedIPsRefCounter *refcounter.AllowedIPsRefCounter) *clientNetwork {
|
||||||
ctx, cancel := context.WithCancel(ctx)
|
ctx, cancel := context.WithCancel(ctx)
|
||||||
|
|
||||||
client := &clientNetwork{
|
client := &clientNetwork{
|
||||||
@ -384,7 +384,7 @@ func (c *clientNetwork) peersStateAndUpdateWatcher() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func handlerFromRoute(rt *route.Route, routeRefCounter *refcounter.RouteRefCounter, allowedIPsRefCounter *refcounter.AllowedIPsRefCounter, dnsRouterInteval time.Duration, statusRecorder *peer.Status, wgInterface *iface.WGIface) RouteHandler {
|
func handlerFromRoute(rt *route.Route, routeRefCounter *refcounter.RouteRefCounter, allowedIPsRefCounter *refcounter.AllowedIPsRefCounter, dnsRouterInteval time.Duration, statusRecorder *peer.Status, wgInterface iface.IWGIface) RouteHandler {
|
||||||
if rt.IsDynamic() {
|
if rt.IsDynamic() {
|
||||||
dns := nbdns.NewServiceViaMemory(wgInterface)
|
dns := nbdns.NewServiceViaMemory(wgInterface)
|
||||||
return dynamic.NewRoute(rt, routeRefCounter, allowedIPsRefCounter, dnsRouterInteval, statusRecorder, wgInterface, fmt.Sprintf("%s:%d", dns.RuntimeIP(), dns.RuntimePort()))
|
return dynamic.NewRoute(rt, routeRefCounter, allowedIPsRefCounter, dnsRouterInteval, statusRecorder, wgInterface, fmt.Sprintf("%s:%d", dns.RuntimeIP(), dns.RuntimePort()))
|
||||||
|
@ -48,7 +48,7 @@ type Route struct {
|
|||||||
currentPeerKey string
|
currentPeerKey string
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
statusRecorder *peer.Status
|
statusRecorder *peer.Status
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
resolverAddr string
|
resolverAddr string
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -58,7 +58,7 @@ func NewRoute(
|
|||||||
allowedIPsRefCounter *refcounter.AllowedIPsRefCounter,
|
allowedIPsRefCounter *refcounter.AllowedIPsRefCounter,
|
||||||
interval time.Duration,
|
interval time.Duration,
|
||||||
statusRecorder *peer.Status,
|
statusRecorder *peer.Status,
|
||||||
wgInterface *iface.WGIface,
|
wgInterface iface.IWGIface,
|
||||||
resolverAddr string,
|
resolverAddr string,
|
||||||
) *Route {
|
) *Route {
|
||||||
return &Route{
|
return &Route{
|
||||||
|
@ -49,7 +49,7 @@ type DefaultManager struct {
|
|||||||
serverRouter serverRouter
|
serverRouter serverRouter
|
||||||
sysOps *systemops.SysOps
|
sysOps *systemops.SysOps
|
||||||
statusRecorder *peer.Status
|
statusRecorder *peer.Status
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
pubKey string
|
pubKey string
|
||||||
notifier *notifier.Notifier
|
notifier *notifier.Notifier
|
||||||
routeRefCounter *refcounter.RouteRefCounter
|
routeRefCounter *refcounter.RouteRefCounter
|
||||||
@ -61,7 +61,7 @@ func NewManager(
|
|||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
pubKey string,
|
pubKey string,
|
||||||
dnsRouteInterval time.Duration,
|
dnsRouteInterval time.Duration,
|
||||||
wgInterface *iface.WGIface,
|
wgInterface iface.IWGIface,
|
||||||
statusRecorder *peer.Status,
|
statusRecorder *peer.Status,
|
||||||
initialRoutes []*route.Route,
|
initialRoutes []*route.Route,
|
||||||
) *DefaultManager {
|
) *DefaultManager {
|
||||||
|
@ -11,6 +11,6 @@ import (
|
|||||||
"github.com/netbirdio/netbird/iface"
|
"github.com/netbirdio/netbird/iface"
|
||||||
)
|
)
|
||||||
|
|
||||||
func newServerRouter(context.Context, *iface.WGIface, firewall.Manager, *peer.Status) (serverRouter, error) {
|
func newServerRouter(context.Context, iface.IWGIface, firewall.Manager, *peer.Status) (serverRouter, error) {
|
||||||
return nil, fmt.Errorf("server route not supported on this os")
|
return nil, fmt.Errorf("server route not supported on this os")
|
||||||
}
|
}
|
||||||
|
@ -22,11 +22,11 @@ type defaultServerRouter struct {
|
|||||||
ctx context.Context
|
ctx context.Context
|
||||||
routes map[route.ID]*route.Route
|
routes map[route.ID]*route.Route
|
||||||
firewall firewall.Manager
|
firewall firewall.Manager
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
statusRecorder *peer.Status
|
statusRecorder *peer.Status
|
||||||
}
|
}
|
||||||
|
|
||||||
func newServerRouter(ctx context.Context, wgInterface *iface.WGIface, firewall firewall.Manager, statusRecorder *peer.Status) (serverRouter, error) {
|
func newServerRouter(ctx context.Context, wgInterface iface.IWGIface, firewall firewall.Manager, statusRecorder *peer.Status) (serverRouter, error) {
|
||||||
return &defaultServerRouter{
|
return &defaultServerRouter{
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
routes: make(map[route.ID]*route.Route),
|
routes: make(map[route.ID]*route.Route),
|
||||||
|
@ -23,7 +23,7 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Setup configures sysctl settings for RP filtering and source validation.
|
// Setup configures sysctl settings for RP filtering and source validation.
|
||||||
func Setup(wgIface *iface.WGIface) (map[string]int, error) {
|
func Setup(wgIface iface.IWGIface) (map[string]int, error) {
|
||||||
keys := map[string]int{}
|
keys := map[string]int{}
|
||||||
var result *multierror.Error
|
var result *multierror.Error
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ type ExclusionCounter = refcounter.Counter[any, Nexthop]
|
|||||||
|
|
||||||
type SysOps struct {
|
type SysOps struct {
|
||||||
refCounter *ExclusionCounter
|
refCounter *ExclusionCounter
|
||||||
wgInterface *iface.WGIface
|
wgInterface iface.IWGIface
|
||||||
// prefixes is tracking all the current added prefixes im memory
|
// prefixes is tracking all the current added prefixes im memory
|
||||||
// (this is used in iOS as all route updates require a full table update)
|
// (this is used in iOS as all route updates require a full table update)
|
||||||
//nolint
|
//nolint
|
||||||
@ -30,7 +30,7 @@ type SysOps struct {
|
|||||||
notifier *notifier.Notifier
|
notifier *notifier.Notifier
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewSysOps(wgInterface *iface.WGIface, notifier *notifier.Notifier) *SysOps {
|
func NewSysOps(wgInterface iface.IWGIface, notifier *notifier.Notifier) *SysOps {
|
||||||
return &SysOps{
|
return &SysOps{
|
||||||
wgInterface: wgInterface,
|
wgInterface: wgInterface,
|
||||||
notifier: notifier,
|
notifier: notifier,
|
||||||
|
@ -122,7 +122,7 @@ func (r *SysOps) addRouteForCurrentDefaultGateway(prefix netip.Prefix) error {
|
|||||||
|
|
||||||
// addRouteToNonVPNIntf adds a new route to the routing table for the given prefix and returns the next hop and interface.
|
// addRouteToNonVPNIntf adds a new route to the routing table for the given prefix and returns the next hop and interface.
|
||||||
// If the next hop or interface is pointing to the VPN interface, it will return the initial values.
|
// If the next hop or interface is pointing to the VPN interface, it will return the initial values.
|
||||||
func (r *SysOps) addRouteToNonVPNIntf(prefix netip.Prefix, vpnIntf *iface.WGIface, initialNextHop Nexthop) (Nexthop, error) {
|
func (r *SysOps) addRouteToNonVPNIntf(prefix netip.Prefix, vpnIntf iface.IWGIface, initialNextHop Nexthop) (Nexthop, error) {
|
||||||
addr := prefix.Addr()
|
addr := prefix.Addr()
|
||||||
switch {
|
switch {
|
||||||
case addr.IsLoopback(),
|
case addr.IsLoopback(),
|
||||||
|
103
iface/iface_moc.go
Normal file
103
iface/iface_moc.go
Normal file
@ -0,0 +1,103 @@
|
|||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/iface/bind"
|
||||||
|
)
|
||||||
|
|
||||||
|
type MockWGIface struct {
|
||||||
|
CreateFunc func() error
|
||||||
|
CreateOnAndroidFunc func(routeRange []string, ip string, domains []string) error
|
||||||
|
IsUserspaceBindFunc func() bool
|
||||||
|
NameFunc func() string
|
||||||
|
AddressFunc func() WGAddress
|
||||||
|
ToInterfaceFunc func() *net.Interface
|
||||||
|
UpFunc func() (*bind.UniversalUDPMuxDefault, error)
|
||||||
|
UpdateAddrFunc func(newAddr string) error
|
||||||
|
UpdatePeerFunc func(peerKey string, allowedIps string, keepAlive time.Duration, endpoint *net.UDPAddr, preSharedKey *wgtypes.Key) error
|
||||||
|
RemovePeerFunc func(peerKey string) error
|
||||||
|
AddAllowedIPFunc func(peerKey string, allowedIP string) error
|
||||||
|
RemoveAllowedIPFunc func(peerKey string, allowedIP string) error
|
||||||
|
CloseFunc func() error
|
||||||
|
SetFilterFunc func(filter PacketFilter) error
|
||||||
|
GetFilterFunc func() PacketFilter
|
||||||
|
GetDeviceFunc func() *DeviceWrapper
|
||||||
|
GetStatsFunc func(peerKey string) (WGStats, error)
|
||||||
|
GetInterfaceGUIDStringFunc func() (string, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) GetInterfaceGUIDString() (string, error) {
|
||||||
|
return m.GetInterfaceGUIDStringFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) Create() error {
|
||||||
|
return m.CreateFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) CreateOnAndroid(routeRange []string, ip string, domains []string) error {
|
||||||
|
return m.CreateOnAndroidFunc(routeRange, ip, domains)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) IsUserspaceBind() bool {
|
||||||
|
return m.IsUserspaceBindFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) Name() string {
|
||||||
|
return m.NameFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) Address() WGAddress {
|
||||||
|
return m.AddressFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) ToInterface() *net.Interface {
|
||||||
|
return m.ToInterfaceFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) Up() (*bind.UniversalUDPMuxDefault, error) {
|
||||||
|
return m.UpFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) UpdateAddr(newAddr string) error {
|
||||||
|
return m.UpdateAddrFunc(newAddr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) UpdatePeer(peerKey string, allowedIps string, keepAlive time.Duration, endpoint *net.UDPAddr, preSharedKey *wgtypes.Key) error {
|
||||||
|
return m.UpdatePeerFunc(peerKey, allowedIps, keepAlive, endpoint, preSharedKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) RemovePeer(peerKey string) error {
|
||||||
|
return m.RemovePeerFunc(peerKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) AddAllowedIP(peerKey string, allowedIP string) error {
|
||||||
|
return m.AddAllowedIPFunc(peerKey, allowedIP)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) RemoveAllowedIP(peerKey string, allowedIP string) error {
|
||||||
|
return m.RemoveAllowedIPFunc(peerKey, allowedIP)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) Close() error {
|
||||||
|
return m.CloseFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) SetFilter(filter PacketFilter) error {
|
||||||
|
return m.SetFilterFunc(filter)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) GetFilter() PacketFilter {
|
||||||
|
return m.GetFilterFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) GetDevice() *DeviceWrapper {
|
||||||
|
return m.GetDeviceFunc()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *MockWGIface) GetStats(peerKey string) (WGStats, error) {
|
||||||
|
return m.GetStatsFunc(peerKey)
|
||||||
|
}
|
32
iface/iwginterface.go
Normal file
32
iface/iwginterface.go
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
//go:build !windows
|
||||||
|
|
||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/iface/bind"
|
||||||
|
)
|
||||||
|
|
||||||
|
type IWGIface interface {
|
||||||
|
Create() error
|
||||||
|
CreateOnAndroid(routeRange []string, ip string, domains []string) error
|
||||||
|
IsUserspaceBind() bool
|
||||||
|
Name() string
|
||||||
|
Address() WGAddress
|
||||||
|
ToInterface() *net.Interface
|
||||||
|
Up() (*bind.UniversalUDPMuxDefault, error)
|
||||||
|
UpdateAddr(newAddr string) error
|
||||||
|
UpdatePeer(peerKey string, allowedIps string, keepAlive time.Duration, endpoint *net.UDPAddr, preSharedKey *wgtypes.Key) error
|
||||||
|
RemovePeer(peerKey string) error
|
||||||
|
AddAllowedIP(peerKey string, allowedIP string) error
|
||||||
|
RemoveAllowedIP(peerKey string, allowedIP string) error
|
||||||
|
Close() error
|
||||||
|
SetFilter(filter PacketFilter) error
|
||||||
|
GetFilter() PacketFilter
|
||||||
|
GetDevice() *DeviceWrapper
|
||||||
|
GetStats(peerKey string) (WGStats, error)
|
||||||
|
}
|
31
iface/iwginterface_windows.go
Normal file
31
iface/iwginterface_windows.go
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
package iface
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/iface/bind"
|
||||||
|
)
|
||||||
|
|
||||||
|
type IWGIface interface {
|
||||||
|
Create() error
|
||||||
|
CreateOnAndroid(routeRange []string, ip string, domains []string) error
|
||||||
|
IsUserspaceBind() bool
|
||||||
|
Name() string
|
||||||
|
Address() WGAddress
|
||||||
|
ToInterface() *net.Interface
|
||||||
|
Up() (*bind.UniversalUDPMuxDefault, error)
|
||||||
|
UpdateAddr(newAddr string) error
|
||||||
|
UpdatePeer(peerKey string, allowedIps string, keepAlive time.Duration, endpoint *net.UDPAddr, preSharedKey *wgtypes.Key) error
|
||||||
|
RemovePeer(peerKey string) error
|
||||||
|
AddAllowedIP(peerKey string, allowedIP string) error
|
||||||
|
RemoveAllowedIP(peerKey string, allowedIP string) error
|
||||||
|
Close() error
|
||||||
|
SetFilter(filter PacketFilter) error
|
||||||
|
GetFilter() PacketFilter
|
||||||
|
GetDevice() *DeviceWrapper
|
||||||
|
GetStats(peerKey string) (WGStats, error)
|
||||||
|
GetInterfaceGUIDString() (string, error)
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user