mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-13 02:10:56 +01:00
c9b2ce08eb
In case the 53 UDP port is not an option to bind then we hijack the DNS traffic with eBPF, and we forward the traffic to the listener on a custom port. With this implementation, we should be able to listen to DNS queries on any address and still set the local host system to send queries to the custom address on port 53. Because we tried to attach multiple XDP programs to the same interface, I did a refactor in the WG traffic forward code also.
130 lines
3.1 KiB
Go
130 lines
3.1 KiB
Go
// Code generated by bpf2go; DO NOT EDIT.
|
|
//go:build arm64be || armbe || mips || mips64 || mips64p32 || ppc64 || s390 || s390x || sparc || sparc64
|
|
// +build arm64be armbe mips mips64 mips64p32 ppc64 s390 s390x sparc sparc64
|
|
|
|
package ebpf
|
|
|
|
import (
|
|
"bytes"
|
|
_ "embed"
|
|
"fmt"
|
|
"io"
|
|
|
|
"github.com/cilium/ebpf"
|
|
)
|
|
|
|
// loadBpf returns the embedded CollectionSpec for bpf.
|
|
func loadBpf() (*ebpf.CollectionSpec, error) {
|
|
reader := bytes.NewReader(_BpfBytes)
|
|
spec, err := ebpf.LoadCollectionSpecFromReader(reader)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("can't load bpf: %w", err)
|
|
}
|
|
|
|
return spec, err
|
|
}
|
|
|
|
// loadBpfObjects loads bpf and converts it into a struct.
|
|
//
|
|
// The following types are suitable as obj argument:
|
|
//
|
|
// *bpfObjects
|
|
// *bpfPrograms
|
|
// *bpfMaps
|
|
//
|
|
// See ebpf.CollectionSpec.LoadAndAssign documentation for details.
|
|
func loadBpfObjects(obj interface{}, opts *ebpf.CollectionOptions) error {
|
|
spec, err := loadBpf()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return spec.LoadAndAssign(obj, opts)
|
|
}
|
|
|
|
// bpfSpecs contains maps and programs before they are loaded into the kernel.
|
|
//
|
|
// It can be passed ebpf.CollectionSpec.Assign.
|
|
type bpfSpecs struct {
|
|
bpfProgramSpecs
|
|
bpfMapSpecs
|
|
}
|
|
|
|
// bpfSpecs contains programs before they are loaded into the kernel.
|
|
//
|
|
// It can be passed ebpf.CollectionSpec.Assign.
|
|
type bpfProgramSpecs struct {
|
|
NbXdpProg *ebpf.ProgramSpec `ebpf:"nb_xdp_prog"`
|
|
}
|
|
|
|
// bpfMapSpecs contains maps before they are loaded into the kernel.
|
|
//
|
|
// It can be passed ebpf.CollectionSpec.Assign.
|
|
type bpfMapSpecs struct {
|
|
NbFeatures *ebpf.MapSpec `ebpf:"nb_features"`
|
|
NbMapDnsIp *ebpf.MapSpec `ebpf:"nb_map_dns_ip"`
|
|
NbMapDnsPort *ebpf.MapSpec `ebpf:"nb_map_dns_port"`
|
|
NbWgProxySettingsMap *ebpf.MapSpec `ebpf:"nb_wg_proxy_settings_map"`
|
|
}
|
|
|
|
// bpfObjects contains all objects after they have been loaded into the kernel.
|
|
//
|
|
// It can be passed to loadBpfObjects or ebpf.CollectionSpec.LoadAndAssign.
|
|
type bpfObjects struct {
|
|
bpfPrograms
|
|
bpfMaps
|
|
}
|
|
|
|
func (o *bpfObjects) Close() error {
|
|
return _BpfClose(
|
|
&o.bpfPrograms,
|
|
&o.bpfMaps,
|
|
)
|
|
}
|
|
|
|
// bpfMaps contains all maps after they have been loaded into the kernel.
|
|
//
|
|
// It can be passed to loadBpfObjects or ebpf.CollectionSpec.LoadAndAssign.
|
|
type bpfMaps struct {
|
|
NbFeatures *ebpf.Map `ebpf:"nb_features"`
|
|
NbMapDnsIp *ebpf.Map `ebpf:"nb_map_dns_ip"`
|
|
NbMapDnsPort *ebpf.Map `ebpf:"nb_map_dns_port"`
|
|
NbWgProxySettingsMap *ebpf.Map `ebpf:"nb_wg_proxy_settings_map"`
|
|
}
|
|
|
|
func (m *bpfMaps) Close() error {
|
|
return _BpfClose(
|
|
m.NbFeatures,
|
|
m.NbMapDnsIp,
|
|
m.NbMapDnsPort,
|
|
m.NbWgProxySettingsMap,
|
|
)
|
|
}
|
|
|
|
// bpfPrograms contains all programs after they have been loaded into the kernel.
|
|
//
|
|
// It can be passed to loadBpfObjects or ebpf.CollectionSpec.LoadAndAssign.
|
|
type bpfPrograms struct {
|
|
NbXdpProg *ebpf.Program `ebpf:"nb_xdp_prog"`
|
|
}
|
|
|
|
func (p *bpfPrograms) Close() error {
|
|
return _BpfClose(
|
|
p.NbXdpProg,
|
|
)
|
|
}
|
|
|
|
func _BpfClose(closers ...io.Closer) error {
|
|
for _, closer := range closers {
|
|
if err := closer.Close(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Do not access this directly.
|
|
//
|
|
//go:embed bpf_bpfeb.o
|
|
var _BpfBytes []byte
|