mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-03 05:24:56 +01:00
4fec709bb1
* compile client under freebsd (#1620) Compile netbird client under freebsd and now support netstack and userspace modes. Refactoring linux specific code to share same code with FreeBSD, move to *_unix.go files. Not implemented yet: Kernel mode not supported DNS probably does not work yet Routing also probably does not work yet SSH support did not tested yet Lack of test environment for freebsd (dedicated VM for github runners under FreeBSD required) Lack of tests for freebsd specific code info reporting need to review and also implement, for example OS reported as GENERIC instead of FreeBSD (lack of FreeBSD icon in management interface) Lack of proper client setup under FreeBSD Lack of FreeBSD port/package * Add DNS routes (#1943) Given domains are resolved periodically and resolved IPs are replaced with the new ones. Unless the flag keep_route is set to true, then only new ones are added. This option is helpful if there are long-running connections that might still point to old IP addresses from changed DNS records. * Add process posture check (#1693) Introduces a process posture check to validate the existence and active status of specific binaries on peer systems. The check ensures that files are present at specified paths, and that corresponding processes are running. This check supports Linux, Windows, and macOS systems. Co-authored-by: Evgenii <mail@skillcoder.com> Co-authored-by: Pascal Fischer <pascal@netbird.io> Co-authored-by: Zoltan Papp <zoltan.pmail@gmail.com> Co-authored-by: Viktor Liu <17948409+lixmal@users.noreply.github.com> Co-authored-by: Bethuel Mmbaga <bethuelmbaga12@gmail.com>
214 lines
4.8 KiB
Go
214 lines
4.8 KiB
Go
package networkmonitor
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"time"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/netbirdio/netbird/client/internal/routemanager/systemops"
|
|
)
|
|
|
|
const (
|
|
unreachable = 0
|
|
incomplete = 1
|
|
probe = 2
|
|
delay = 3
|
|
stale = 4
|
|
reachable = 5
|
|
permanent = 6
|
|
tbd = 7
|
|
)
|
|
|
|
const interval = 10 * time.Second
|
|
|
|
func checkChange(ctx context.Context, nexthopv4, nexthopv6 systemops.Nexthop, callback func()) error {
|
|
var neighborv4, neighborv6 *systemops.Neighbor
|
|
{
|
|
initialNeighbors, err := getNeighbors()
|
|
if err != nil {
|
|
return fmt.Errorf("get neighbors: %w", err)
|
|
}
|
|
|
|
if n, ok := initialNeighbors[nexthopv4.IP]; ok {
|
|
neighborv4 = &n
|
|
}
|
|
if n, ok := initialNeighbors[nexthopv6.IP]; ok {
|
|
neighborv6 = &n
|
|
}
|
|
}
|
|
log.Debugf("Network monitor: initial IPv4 neighbor: %v, IPv6 neighbor: %v", neighborv4, neighborv6)
|
|
|
|
ticker := time.NewTicker(interval)
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
return ErrStopped
|
|
case <-ticker.C:
|
|
if changed(nexthopv4, neighborv4, nexthopv6, neighborv6) {
|
|
go callback()
|
|
return nil
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func changed(
|
|
nexthopv4 systemops.Nexthop,
|
|
neighborv4 *systemops.Neighbor,
|
|
nexthopv6 systemops.Nexthop,
|
|
neighborv6 *systemops.Neighbor,
|
|
) bool {
|
|
neighbors, err := getNeighbors()
|
|
if err != nil {
|
|
log.Errorf("network monitor: error fetching current neighbors: %v", err)
|
|
return false
|
|
}
|
|
if neighborChanged(nexthopv4, neighborv4, neighbors) || neighborChanged(nexthopv6, neighborv6, neighbors) {
|
|
return true
|
|
}
|
|
|
|
routes, err := getRoutes()
|
|
if err != nil {
|
|
log.Errorf("network monitor: error fetching current routes: %v", err)
|
|
return false
|
|
}
|
|
|
|
if routeChanged(nexthopv4, nexthopv4.Intf, routes) || routeChanged(nexthopv6, nexthopv6.Intf, routes) {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// routeChanged checks if the default routes still point to our nexthop/interface
|
|
func routeChanged(nexthop systemops.Nexthop, intf *net.Interface, routes map[netip.Prefix]systemops.Route) bool {
|
|
if !nexthop.IP.IsValid() {
|
|
return false
|
|
}
|
|
|
|
var unspec netip.Prefix
|
|
if nexthop.IP.Is6() {
|
|
unspec = netip.PrefixFrom(netip.IPv6Unspecified(), 0)
|
|
} else {
|
|
unspec = netip.PrefixFrom(netip.IPv4Unspecified(), 0)
|
|
}
|
|
|
|
if r, ok := routes[unspec]; ok {
|
|
if r.Nexthop != nexthop.IP || compareIntf(r.Interface, intf) != 0 {
|
|
intf := "<nil>"
|
|
if r.Interface != nil {
|
|
intf = r.Interface.Name
|
|
}
|
|
log.Infof("network monitor: default route changed: %s via %s (%s)", r.Destination, r.Nexthop, intf)
|
|
return true
|
|
}
|
|
} else {
|
|
log.Infof("network monitor: default route is gone")
|
|
return true
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
func neighborChanged(nexthop systemops.Nexthop, neighbor *systemops.Neighbor, neighbors map[netip.Addr]systemops.Neighbor) bool {
|
|
if neighbor == nil {
|
|
return false
|
|
}
|
|
|
|
// TODO: consider non-local nexthops, e.g. on point-to-point interfaces
|
|
if n, ok := neighbors[nexthop.IP]; ok {
|
|
if n.State != reachable && n.State != permanent {
|
|
log.Infof("network monitor: neighbor %s (%s) is not reachable: %s", neighbor.IPAddress, neighbor.LinkLayerAddress, stateFromInt(n.State))
|
|
return true
|
|
} else if n.InterfaceIndex != neighbor.InterfaceIndex {
|
|
log.Infof(
|
|
"network monitor: neighbor %s (%s) changed interface from '%s' (%d) to '%s' (%d): %s",
|
|
neighbor.IPAddress,
|
|
neighbor.LinkLayerAddress,
|
|
neighbor.InterfaceAlias,
|
|
neighbor.InterfaceIndex,
|
|
n.InterfaceAlias,
|
|
n.InterfaceIndex,
|
|
stateFromInt(n.State),
|
|
)
|
|
return true
|
|
}
|
|
} else {
|
|
log.Infof("network monitor: neighbor %s (%s) is gone", neighbor.IPAddress, neighbor.LinkLayerAddress)
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func getNeighbors() (map[netip.Addr]systemops.Neighbor, error) {
|
|
entries, err := systemops.GetNeighbors()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get neighbors: %w", err)
|
|
}
|
|
|
|
neighbours := make(map[netip.Addr]systemops.Neighbor, len(entries))
|
|
for _, entry := range entries {
|
|
neighbours[entry.IPAddress] = entry
|
|
}
|
|
|
|
return neighbours, nil
|
|
}
|
|
|
|
func getRoutes() (map[netip.Prefix]systemops.Route, error) {
|
|
entries, err := systemops.GetRoutes()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get routes: %w", err)
|
|
}
|
|
|
|
routes := make(map[netip.Prefix]systemops.Route, len(entries))
|
|
for _, entry := range entries {
|
|
routes[entry.Destination] = entry
|
|
}
|
|
|
|
return routes, nil
|
|
}
|
|
|
|
func stateFromInt(state uint8) string {
|
|
switch state {
|
|
case unreachable:
|
|
return "unreachable"
|
|
case incomplete:
|
|
return "incomplete"
|
|
case probe:
|
|
return "probe"
|
|
case delay:
|
|
return "delay"
|
|
case stale:
|
|
return "stale"
|
|
case reachable:
|
|
return "reachable"
|
|
case permanent:
|
|
return "permanent"
|
|
case tbd:
|
|
return "tbd"
|
|
default:
|
|
return "unknown"
|
|
}
|
|
}
|
|
|
|
func compareIntf(a, b *net.Interface) int {
|
|
if a == nil && b == nil {
|
|
return 0
|
|
}
|
|
if a == nil {
|
|
return -1
|
|
}
|
|
if b == nil {
|
|
return 1
|
|
}
|
|
return a.Index - b.Index
|
|
}
|