mirror of
https://github.com/netbirdio/netbird.git
synced 2025-07-13 04:45:36 +02:00
This PR introduces a new inactivity package responsible for monitoring peer activity and notifying when peers become inactive. Introduces a new Signal message type to close the peer connection after the idle timeout is reached. Periodically checks the last activity of registered peers via a Bind interface. Notifies via a channel when peers exceed a configurable inactivity threshold. Default settings DefaultInactivityThreshold is set to 15 minutes, with a minimum allowed threshold of 1 minute. Limitations This inactivity check does not support kernel WireGuard integration. In kernel–user space communication, the user space side will always be responsible for closing the connection.
152 lines
3.6 KiB
Go
152 lines
3.6 KiB
Go
//go:build !ios
|
|
|
|
package device
|
|
|
|
import (
|
|
"fmt"
|
|
"os/exec"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
"golang.zx2c4.com/wireguard/device"
|
|
"golang.zx2c4.com/wireguard/tun"
|
|
"golang.zx2c4.com/wireguard/tun/netstack"
|
|
|
|
"github.com/netbirdio/netbird/client/iface/bind"
|
|
"github.com/netbirdio/netbird/client/iface/configurer"
|
|
"github.com/netbirdio/netbird/client/iface/wgaddr"
|
|
)
|
|
|
|
type TunDevice struct {
|
|
name string
|
|
address wgaddr.Address
|
|
port int
|
|
key string
|
|
mtu int
|
|
iceBind *bind.ICEBind
|
|
|
|
device *device.Device
|
|
filteredDevice *FilteredDevice
|
|
udpMux *bind.UniversalUDPMuxDefault
|
|
configurer WGConfigurer
|
|
}
|
|
|
|
func NewTunDevice(name string, address wgaddr.Address, port int, key string, mtu int, iceBind *bind.ICEBind) *TunDevice {
|
|
return &TunDevice{
|
|
name: name,
|
|
address: address,
|
|
port: port,
|
|
key: key,
|
|
mtu: mtu,
|
|
iceBind: iceBind,
|
|
}
|
|
}
|
|
|
|
func (t *TunDevice) Create() (WGConfigurer, error) {
|
|
tunDevice, err := tun.CreateTUN(t.name, t.mtu)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error creating tun device: %s", err)
|
|
}
|
|
t.filteredDevice = newDeviceFilter(tunDevice)
|
|
|
|
// We need to create a wireguard-go device and listen to configuration requests
|
|
t.device = device.NewDevice(
|
|
t.filteredDevice,
|
|
t.iceBind,
|
|
device.NewLogger(wgLogLevel(), "[netbird] "),
|
|
)
|
|
|
|
err = t.assignAddr()
|
|
if err != nil {
|
|
t.device.Close()
|
|
return nil, fmt.Errorf("error assigning ip: %s", err)
|
|
}
|
|
|
|
t.configurer = configurer.NewUSPConfigurer(t.device, t.name, t.iceBind.ActivityRecorder())
|
|
err = t.configurer.ConfigureInterface(t.key, t.port)
|
|
if err != nil {
|
|
t.device.Close()
|
|
t.configurer.Close()
|
|
return nil, fmt.Errorf("error configuring interface: %s", err)
|
|
}
|
|
return t.configurer, nil
|
|
}
|
|
|
|
func (t *TunDevice) Up() (*bind.UniversalUDPMuxDefault, error) {
|
|
err := t.device.Up()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
udpMux, err := t.iceBind.GetICEMux()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
t.udpMux = udpMux
|
|
log.Debugf("device is ready to use: %s", t.name)
|
|
return udpMux, nil
|
|
}
|
|
|
|
func (t *TunDevice) UpdateAddr(address wgaddr.Address) error {
|
|
t.address = address
|
|
return t.assignAddr()
|
|
}
|
|
|
|
func (t *TunDevice) Close() error {
|
|
if t.configurer != nil {
|
|
t.configurer.Close()
|
|
}
|
|
|
|
if t.device != nil {
|
|
t.device.Close()
|
|
t.device = nil
|
|
}
|
|
|
|
if t.udpMux != nil {
|
|
return t.udpMux.Close()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (t *TunDevice) WgAddress() wgaddr.Address {
|
|
return t.address
|
|
}
|
|
|
|
func (t *TunDevice) DeviceName() string {
|
|
return t.name
|
|
}
|
|
|
|
func (t *TunDevice) FilteredDevice() *FilteredDevice {
|
|
return t.filteredDevice
|
|
}
|
|
|
|
// Device returns the wireguard device
|
|
func (t *TunDevice) Device() *device.Device {
|
|
return t.device
|
|
}
|
|
|
|
// assignAddr Adds IP address to the tunnel interface and network route based on the range provided
|
|
func (t *TunDevice) assignAddr() error {
|
|
cmd := exec.Command("ifconfig", t.name, "inet", t.address.IP.String(), t.address.IP.String())
|
|
if out, err := cmd.CombinedOutput(); err != nil {
|
|
log.Errorf("adding address command '%v' failed with output: %s", cmd.String(), out)
|
|
return err
|
|
}
|
|
|
|
// dummy ipv6 so routing works
|
|
cmd = exec.Command("ifconfig", t.name, "inet6", "fe80::/64")
|
|
if out, err := cmd.CombinedOutput(); err != nil {
|
|
log.Debugf("adding address command '%v' failed with output: %s", cmd.String(), out)
|
|
}
|
|
|
|
routeCmd := exec.Command("route", "add", "-net", t.address.Network.String(), "-interface", t.name)
|
|
if out, err := routeCmd.CombinedOutput(); err != nil {
|
|
log.Errorf("adding route command '%v' failed with output: %s", routeCmd.String(), out)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (t *TunDevice) GetNet() *netstack.Net {
|
|
return nil
|
|
}
|