tun_ios.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. //go:build ios && !e2e_testing
  2. // +build ios,!e2e_testing
  3. package overlay
  4. import (
  5. "errors"
  6. "fmt"
  7. "io"
  8. "net/netip"
  9. "os"
  10. "sync"
  11. "sync/atomic"
  12. "syscall"
  13. "github.com/gaissmai/bart"
  14. "github.com/sirupsen/logrus"
  15. "github.com/slackhq/nebula/config"
  16. "github.com/slackhq/nebula/util"
  17. )
  18. type tun struct {
  19. io.ReadWriteCloser
  20. vpnNetworks []netip.Prefix
  21. Routes atomic.Pointer[[]Route]
  22. routeTree atomic.Pointer[bart.Table[netip.Addr]]
  23. l *logrus.Logger
  24. }
  25. func newTun(_ *config.C, _ *logrus.Logger, _ []netip.Prefix, _ bool) (*tun, error) {
  26. return nil, fmt.Errorf("newTun not supported in iOS")
  27. }
  28. func newTunFromFd(c *config.C, l *logrus.Logger, deviceFd int, vpnNetworks []netip.Prefix) (*tun, error) {
  29. file := os.NewFile(uintptr(deviceFd), "/dev/tun")
  30. t := &tun{
  31. vpnNetworks: vpnNetworks,
  32. ReadWriteCloser: &tunReadCloser{f: file},
  33. l: l,
  34. }
  35. err := t.reload(c, true)
  36. if err != nil {
  37. return nil, err
  38. }
  39. c.RegisterReloadCallback(func(c *config.C) {
  40. err := t.reload(c, false)
  41. if err != nil {
  42. util.LogWithContextIfNeeded("failed to reload tun device", err, t.l)
  43. }
  44. })
  45. return t, nil
  46. }
  47. func (t *tun) Activate() error {
  48. return nil
  49. }
  50. func (t *tun) reload(c *config.C, initial bool) error {
  51. change, routes, err := getAllRoutesFromConfig(c, t.vpnNetworks, initial)
  52. if err != nil {
  53. return err
  54. }
  55. if !initial && !change {
  56. return nil
  57. }
  58. routeTree, err := makeRouteTree(t.l, routes, false)
  59. if err != nil {
  60. return err
  61. }
  62. // Teach nebula how to handle the routes
  63. t.Routes.Store(&routes)
  64. t.routeTree.Store(routeTree)
  65. return nil
  66. }
  67. func (t *tun) RouteFor(ip netip.Addr) netip.Addr {
  68. r, _ := t.routeTree.Load().Lookup(ip)
  69. return r
  70. }
  71. // The following is hoisted up from water, we do this so we can inject our own fd on iOS
  72. type tunReadCloser struct {
  73. f io.ReadWriteCloser
  74. rMu sync.Mutex
  75. rBuf []byte
  76. wMu sync.Mutex
  77. wBuf []byte
  78. }
  79. func (tr *tunReadCloser) Read(to []byte) (int, error) {
  80. tr.rMu.Lock()
  81. defer tr.rMu.Unlock()
  82. if cap(tr.rBuf) < len(to)+4 {
  83. tr.rBuf = make([]byte, len(to)+4)
  84. }
  85. tr.rBuf = tr.rBuf[:len(to)+4]
  86. n, err := tr.f.Read(tr.rBuf)
  87. copy(to, tr.rBuf[4:])
  88. return n - 4, err
  89. }
  90. func (tr *tunReadCloser) Write(from []byte) (int, error) {
  91. if len(from) == 0 {
  92. return 0, syscall.EIO
  93. }
  94. tr.wMu.Lock()
  95. defer tr.wMu.Unlock()
  96. if cap(tr.wBuf) < len(from)+4 {
  97. tr.wBuf = make([]byte, len(from)+4)
  98. }
  99. tr.wBuf = tr.wBuf[:len(from)+4]
  100. // Determine the IP Family for the NULL L2 Header
  101. ipVer := from[0] >> 4
  102. if ipVer == 4 {
  103. tr.wBuf[3] = syscall.AF_INET
  104. } else if ipVer == 6 {
  105. tr.wBuf[3] = syscall.AF_INET6
  106. } else {
  107. return 0, errors.New("unable to determine IP version from packet")
  108. }
  109. copy(tr.wBuf[4:], from)
  110. n, err := tr.f.Write(tr.wBuf)
  111. return n - 4, err
  112. }
  113. func (tr *tunReadCloser) Close() error {
  114. return tr.f.Close()
  115. }
  116. func (t *tun) Networks() []netip.Prefix {
  117. return t.vpnNetworks
  118. }
  119. func (t *tun) Name() string {
  120. return "iOS"
  121. }
  122. func (t *tun) NewMultiQueueReader() (io.ReadWriteCloser, error) {
  123. return nil, fmt.Errorf("TODO: multiqueue not implemented for ios")
  124. }