tun_ios.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125
  1. //go:build ios && !e2e_testing
  2. // +build ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net"
  9. "os"
  10. "sync"
  11. "syscall"
  12. "github.com/sirupsen/logrus"
  13. "github.com/slackhq/nebula/cidr"
  14. "github.com/slackhq/nebula/iputil"
  15. )
  16. type tun struct {
  17. io.ReadWriteCloser
  18. cidr *net.IPNet
  19. routeTree *cidr.Tree4
  20. }
  21. func newTun(_ *logrus.Logger, _ string, _ *net.IPNet, _ int, _ []Route, _ int, _ bool, _ bool) (*tun, error) {
  22. return nil, fmt.Errorf("newTun not supported in iOS")
  23. }
  24. func newTunFromFd(l *logrus.Logger, deviceFd int, cidr *net.IPNet, _ int, routes []Route, _ int, _ bool) (*tun, error) {
  25. routeTree, err := makeRouteTree(l, routes, false)
  26. if err != nil {
  27. return nil, err
  28. }
  29. file := os.NewFile(uintptr(deviceFd), "/dev/tun")
  30. return &tun{
  31. cidr: cidr,
  32. ReadWriteCloser: &tunReadCloser{f: file},
  33. routeTree: routeTree,
  34. }, nil
  35. }
  36. func (t *tun) Activate() error {
  37. return nil
  38. }
  39. func (t *tun) RouteFor(ip iputil.VpnIp) iputil.VpnIp {
  40. r := t.routeTree.MostSpecificContains(ip)
  41. if r != nil {
  42. return r.(iputil.VpnIp)
  43. }
  44. return 0
  45. }
  46. // The following is hoisted up from water, we do this so we can inject our own fd on iOS
  47. type tunReadCloser struct {
  48. f io.ReadWriteCloser
  49. rMu sync.Mutex
  50. rBuf []byte
  51. wMu sync.Mutex
  52. wBuf []byte
  53. }
  54. func (tr *tunReadCloser) Read(to []byte) (int, error) {
  55. tr.rMu.Lock()
  56. defer tr.rMu.Unlock()
  57. if cap(tr.rBuf) < len(to)+4 {
  58. tr.rBuf = make([]byte, len(to)+4)
  59. }
  60. tr.rBuf = tr.rBuf[:len(to)+4]
  61. n, err := tr.f.Read(tr.rBuf)
  62. copy(to, tr.rBuf[4:])
  63. return n - 4, err
  64. }
  65. func (tr *tunReadCloser) Write(from []byte) (int, error) {
  66. if len(from) == 0 {
  67. return 0, syscall.EIO
  68. }
  69. tr.wMu.Lock()
  70. defer tr.wMu.Unlock()
  71. if cap(tr.wBuf) < len(from)+4 {
  72. tr.wBuf = make([]byte, len(from)+4)
  73. }
  74. tr.wBuf = tr.wBuf[:len(from)+4]
  75. // Determine the IP Family for the NULL L2 Header
  76. ipVer := from[0] >> 4
  77. if ipVer == 4 {
  78. tr.wBuf[3] = syscall.AF_INET
  79. } else if ipVer == 6 {
  80. tr.wBuf[3] = syscall.AF_INET6
  81. } else {
  82. return 0, errors.New("unable to determine IP version from packet")
  83. }
  84. copy(tr.wBuf[4:], from)
  85. n, err := tr.f.Write(tr.wBuf)
  86. return n - 4, err
  87. }
  88. func (tr *tunReadCloser) Close() error {
  89. return tr.f.Close()
  90. }
  91. func (t *tun) Cidr() *net.IPNet {
  92. return t.cidr
  93. }
  94. func (t *tun) Name() string {
  95. return "iOS"
  96. }
  97. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  98. return nil, fmt.Errorf("TODO: multiqueue not implemented for ios")
  99. }