mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-01 20:43:43 +01:00
4fec709bb1
* compile client under freebsd (#1620) Compile netbird client under freebsd and now support netstack and userspace modes. Refactoring linux specific code to share same code with FreeBSD, move to *_unix.go files. Not implemented yet: Kernel mode not supported DNS probably does not work yet Routing also probably does not work yet SSH support did not tested yet Lack of test environment for freebsd (dedicated VM for github runners under FreeBSD required) Lack of tests for freebsd specific code info reporting need to review and also implement, for example OS reported as GENERIC instead of FreeBSD (lack of FreeBSD icon in management interface) Lack of proper client setup under FreeBSD Lack of FreeBSD port/package * Add DNS routes (#1943) Given domains are resolved periodically and resolved IPs are replaced with the new ones. Unless the flag keep_route is set to true, then only new ones are added. This option is helpful if there are long-running connections that might still point to old IP addresses from changed DNS records. * Add process posture check (#1693) Introduces a process posture check to validate the existence and active status of specific binaries on peer systems. The check ensures that files are present at specified paths, and that corresponding processes are running. This check supports Linux, Windows, and macOS systems. Co-authored-by: Evgenii <mail@skillcoder.com> Co-authored-by: Pascal Fischer <pascal@netbird.io> Co-authored-by: Zoltan Papp <zoltan.pmail@gmail.com> Co-authored-by: Viktor Liu <17948409+lixmal@users.noreply.github.com> Co-authored-by: Bethuel Mmbaga <bethuelmbaga12@gmail.com>
219 lines
5.2 KiB
Go
219 lines
5.2 KiB
Go
//go:build windows
|
|
|
|
package systemops
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"os"
|
|
"os/exec"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/yusufpapurcu/wmi"
|
|
|
|
"github.com/netbirdio/netbird/client/firewall/uspfilter"
|
|
"github.com/netbirdio/netbird/client/internal/peer"
|
|
)
|
|
|
|
type MSFT_NetRoute struct {
|
|
DestinationPrefix string
|
|
NextHop string
|
|
InterfaceIndex int32
|
|
InterfaceAlias string
|
|
AddressFamily uint16
|
|
}
|
|
|
|
type Route struct {
|
|
Destination netip.Prefix
|
|
Nexthop netip.Addr
|
|
Interface *net.Interface
|
|
}
|
|
|
|
type MSFT_NetNeighbor struct {
|
|
IPAddress string
|
|
LinkLayerAddress string
|
|
State uint8
|
|
AddressFamily uint16
|
|
InterfaceIndex uint32
|
|
InterfaceAlias string
|
|
}
|
|
|
|
type Neighbor struct {
|
|
IPAddress netip.Addr
|
|
LinkLayerAddress string
|
|
State uint8
|
|
AddressFamily uint16
|
|
InterfaceIndex uint32
|
|
InterfaceAlias string
|
|
}
|
|
|
|
var prefixList []netip.Prefix
|
|
var lastUpdate time.Time
|
|
var mux = sync.Mutex{}
|
|
|
|
func (r *SysOps) SetupRouting(initAddresses []net.IP) (peer.BeforeAddPeerHookFunc, peer.AfterRemovePeerHookFunc, error) {
|
|
return r.setupRefCounter(initAddresses)
|
|
}
|
|
|
|
func (r *SysOps) CleanupRouting() error {
|
|
return r.cleanupRefCounter()
|
|
}
|
|
|
|
func (r *SysOps) addToRouteTable(prefix netip.Prefix, nexthop Nexthop) error {
|
|
if nexthop.IP.Zone() != "" && nexthop.Intf == nil {
|
|
zone, err := strconv.Atoi(nexthop.IP.Zone())
|
|
if err != nil {
|
|
return fmt.Errorf("invalid zone: %w", err)
|
|
}
|
|
nexthop.Intf = &net.Interface{Index: zone}
|
|
nexthop.IP.WithZone("")
|
|
}
|
|
|
|
return addRouteCmd(prefix, nexthop)
|
|
}
|
|
|
|
func (r *SysOps) removeFromRouteTable(prefix netip.Prefix, nexthop Nexthop) error {
|
|
args := []string{"delete", prefix.String()}
|
|
if nexthop.IP.IsValid() {
|
|
nexthop.IP.WithZone("")
|
|
args = append(args, nexthop.IP.Unmap().String())
|
|
}
|
|
|
|
routeCmd := uspfilter.GetSystem32Command("route")
|
|
|
|
out, err := exec.Command(routeCmd, args...).CombinedOutput()
|
|
log.Tracef("route %s: %s", strings.Join(args, " "), out)
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("remove route: %w", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getRoutesFromTable() ([]netip.Prefix, error) {
|
|
mux.Lock()
|
|
defer mux.Unlock()
|
|
|
|
// If many routes are added at the same time this might block for a long time (seconds to minutes), so we cache the result
|
|
if !isCacheDisabled() && time.Since(lastUpdate) < 2*time.Second {
|
|
return prefixList, nil
|
|
}
|
|
|
|
routes, err := GetRoutes()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get routes: %w", err)
|
|
}
|
|
|
|
prefixList = nil
|
|
for _, route := range routes {
|
|
prefixList = append(prefixList, route.Destination)
|
|
}
|
|
|
|
lastUpdate = time.Now()
|
|
return prefixList, nil
|
|
}
|
|
|
|
func GetRoutes() ([]Route, error) {
|
|
var entries []MSFT_NetRoute
|
|
|
|
query := `SELECT DestinationPrefix, Nexthop, InterfaceIndex, InterfaceAlias, AddressFamily FROM MSFT_NetRoute`
|
|
if err := wmi.QueryNamespace(query, &entries, `ROOT\StandardCimv2`); err != nil {
|
|
return nil, fmt.Errorf("get routes: %w", err)
|
|
}
|
|
|
|
var routes []Route
|
|
for _, entry := range entries {
|
|
dest, err := netip.ParsePrefix(entry.DestinationPrefix)
|
|
if err != nil {
|
|
log.Warnf("Unable to parse route destination %s: %v", entry.DestinationPrefix, err)
|
|
continue
|
|
}
|
|
|
|
nexthop, err := netip.ParseAddr(entry.NextHop)
|
|
if err != nil {
|
|
log.Warnf("Unable to parse route next hop %s: %v", entry.NextHop, err)
|
|
continue
|
|
}
|
|
|
|
var intf *net.Interface
|
|
if entry.InterfaceIndex != 0 {
|
|
intf = &net.Interface{
|
|
Index: int(entry.InterfaceIndex),
|
|
Name: entry.InterfaceAlias,
|
|
}
|
|
}
|
|
|
|
routes = append(routes, Route{
|
|
Destination: dest,
|
|
Nexthop: nexthop,
|
|
Interface: intf,
|
|
})
|
|
}
|
|
|
|
return routes, nil
|
|
}
|
|
|
|
func GetNeighbors() ([]Neighbor, error) {
|
|
var entries []MSFT_NetNeighbor
|
|
query := `SELECT IPAddress, LinkLayerAddress, State, AddressFamily, InterfaceIndex, InterfaceAlias FROM MSFT_NetNeighbor`
|
|
if err := wmi.QueryNamespace(query, &entries, `ROOT\StandardCimv2`); err != nil {
|
|
return nil, fmt.Errorf("failed to query MSFT_NetNeighbor: %w", err)
|
|
}
|
|
|
|
var neighbors []Neighbor
|
|
for _, entry := range entries {
|
|
addr, err := netip.ParseAddr(entry.IPAddress)
|
|
if err != nil {
|
|
log.Warnf("Unable to parse neighbor IP address %s: %v", entry.IPAddress, err)
|
|
continue
|
|
}
|
|
neighbors = append(neighbors, Neighbor{
|
|
IPAddress: addr,
|
|
LinkLayerAddress: entry.LinkLayerAddress,
|
|
State: entry.State,
|
|
AddressFamily: entry.AddressFamily,
|
|
InterfaceIndex: entry.InterfaceIndex,
|
|
InterfaceAlias: entry.InterfaceAlias,
|
|
})
|
|
}
|
|
|
|
return neighbors, nil
|
|
}
|
|
|
|
func addRouteCmd(prefix netip.Prefix, nexthop Nexthop) error {
|
|
args := []string{"add", prefix.String()}
|
|
|
|
if nexthop.IP.IsValid() {
|
|
args = append(args, nexthop.IP.Unmap().String())
|
|
} else {
|
|
addr := "0.0.0.0"
|
|
if prefix.Addr().Is6() {
|
|
addr = "::"
|
|
}
|
|
args = append(args, addr)
|
|
}
|
|
|
|
if nexthop.Intf != nil {
|
|
args = append(args, "if", strconv.Itoa(nexthop.Intf.Index))
|
|
}
|
|
|
|
routeCmd := uspfilter.GetSystem32Command("route")
|
|
|
|
out, err := exec.Command(routeCmd, args...).CombinedOutput()
|
|
log.Tracef("route %s: %s", strings.Join(args, " "), out)
|
|
if err != nil {
|
|
return fmt.Errorf("route add: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func isCacheDisabled() bool {
|
|
return os.Getenv("NB_DISABLE_ROUTE_CACHE") == "true"
|
|
}
|