123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253 |
- package proxy
- import (
- "context"
- "errors"
- "fmt"
- "log"
- "net"
- "runtime"
- "github.com/gravitl/netmaker/nm-proxy/common"
- "github.com/gravitl/netmaker/nm-proxy/models"
- )
- // Proxy - WireguardProxy proxies
- type Proxy struct {
- Ctx context.Context
- Cancel context.CancelFunc
- Config models.ProxyConfig
- RemoteConn *net.UDPAddr
- LocalConn net.Conn
- }
- func (p *Proxy) Start() error {
- var err error
- p.RemoteConn = p.Config.PeerEndpoint
- log.Printf("----> Established Remote Conn with RPeer: %s, ----> RAddr: %s", p.Config.RemoteKey.String(), p.RemoteConn.String())
- addr, err := GetFreeIp(models.DefaultCIDR, p.Config.WgInterface.Port)
- if err != nil {
- log.Println("Failed to get freeIp: ", err)
- return err
- }
- wgListenAddr, err := GetInterfaceListenAddr(p.Config.WgInterface.Port)
- if err != nil {
- log.Println("failed to get wg listen addr: ", err)
- return err
- }
- if runtime.GOOS == "darwin" {
- wgListenAddr.IP = net.ParseIP(addr)
- }
- p.LocalConn, err = net.DialUDP("udp", &net.UDPAddr{
- IP: net.ParseIP(addr),
- Port: models.NmProxyPort,
- }, wgListenAddr)
- if err != nil {
- log.Printf("failed dialing to local Wireguard port,Err: %v\n", err)
- return err
- }
- log.Printf("Dialing to local Wireguard port %s --> %s\n", p.LocalConn.LocalAddr().String(), p.LocalConn.RemoteAddr().String())
- err = p.updateEndpoint()
- if err != nil {
- log.Printf("error while updating Wireguard peer endpoint [%s] %v\n", p.Config.RemoteKey, err)
- return err
- }
- localAddr, err := net.ResolveUDPAddr("udp", p.LocalConn.LocalAddr().String())
- if err != nil {
- log.Println("failed to resolve local addr: ", err)
- return err
- }
- p.Config.LocalConnAddr = localAddr
- p.Config.RemoteConnAddr = p.RemoteConn
- go p.ProxyPeer()
- return nil
- }
- func (p *Proxy) Close() {
- log.Println("------> Closing Proxy for ", p.Config.RemoteKey.String())
- p.Cancel()
- p.LocalConn.Close()
- if runtime.GOOS == "darwin" {
- host, _, err := net.SplitHostPort(p.LocalConn.LocalAddr().String())
- if err != nil {
- log.Println("Failed to split host: ", p.LocalConn.LocalAddr().String(), err)
- return
- }
- if host != "127.0.0.1" {
- _, err = common.RunCmd(fmt.Sprintf("ifconfig lo0 -alias %s 255.255.255.255", host), true)
- if err != nil {
- log.Println("Failed to add alias: ", err)
- }
- }
- }
- close(p.Config.RecieverChan)
- }
- func GetInterfaceListenAddr(port int) (*net.UDPAddr, error) {
- locallistenAddr := "127.0.0.1"
- udpAddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", locallistenAddr, port))
- if err != nil {
- return udpAddr, err
- }
- return udpAddr, nil
- }
- func getBoardCastAddress() ([]net.Addr, error) {
- localnets, err := net.Interfaces()
- if err != nil {
- return nil, err
- }
- var (
- ief net.Interface
- addrs []net.Addr
- )
- for _, ief = range localnets {
- if ief.Flags&net.FlagBroadcast != 0 && ief.Flags&net.FlagUp != 0 {
- addrs, err = ief.Addrs()
- if err == nil {
- return addrs, nil
- }
- }
- }
- return nil, errors.New("couldn't obtain the broadcast addr")
- }
- // func StartSniffer(ctx context.Context, ifaceName, ingGwAddr, extClientAddr string, port int) {
- // log.Println("Starting Packet Sniffer for iface: ", ifaceName)
- // var (
- // snapshotLen int32 = 1024
- // promiscuous bool = false
- // err error
- // timeout time.Duration = 1 * time.Microsecond
- // handle *pcap.Handle
- // )
- // // Open device
- // handle, err = pcap.OpenLive(ifaceName, snapshotLen, promiscuous, timeout)
- // if err != nil {
- // log.Println("failed to start sniffer for iface: ", ifaceName, err)
- // return
- // }
- // // if err := handle.SetBPFFilter(fmt.Sprintf("src %s and port %d", extClientAddr, port)); err != nil {
- // // log.Println("failed to set bpf filter: ", err)
- // // return
- // // }
- // defer handle.Close()
- // // var tcp layers.TCP
- // // var icmp layers.ICMPv4
- // // var udp layers.UDP
- // // parser := gopacket.NewDecodingLayerParser(layers.LayerTypeIPv4, &udp, &tcp, &icmp)
- // packetSource := gopacket.NewPacketSource(handle, handle.LinkType())
- // for {
- // select {
- // case <-ctx.Done():
- // log.Println("Stopping packet sniffer for iface: ", ifaceName, " port: ", port)
- // return
- // default:
- // packet, err := packetSource.NextPacket()
- // if err == nil {
- // //processPkt(ifaceName, packet)
- // ipLayer := packet.Layer(layers.LayerTypeIPv4)
- // if ipLayer != nil {
- // fmt.Println("IPv4 layer detected.")
- // ip, _ := ipLayer.(*layers.IPv4)
- // // IP layer variables:
- // // Version (Either 4 or 6)
- // // IHL (IP Header Length in 32-bit words)
- // // TOS, Length, Id, Flags, FragOffset, TTL, Protocol (TCP?),
- // // Checksum, SrcIP, DstIP
- // fmt.Println("#########################")
- // fmt.Printf("From %s to %s\n", ip.SrcIP, ip.DstIP)
- // fmt.Println("Protocol: ", ip.Protocol.String())
- // if (ip.SrcIP.String() == extClientAddr && ip.DstIP.String() != ingGwAddr) ||
- // (ip.DstIP.String() == extClientAddr && ip.SrcIP.String() != ingGwAddr) {
- // log.Println("-----> Fowarding PKT From: ", ip.SrcIP, " to: ", ip.DstIP)
- // c, err := net.Dial("ip", ip.DstIP.String())
- // if err == nil {
- // c.Write(ip.Payload)
- // c.Close()
- // } else {
- // log.Println("------> Failed to forward packet from sniffer: ", err)
- // }
- // }
- // fmt.Println("#########################")
- // }
- // }
- // }
- // }
- // }
- // func processPkt(iface string, packet gopacket.Packet) {
- // // Let's see if the packet is an ethernet packet
- // // ethernetLayer := packet.Layer(layers.LayerTypeEthernet)
- // // if ethernetLayer != nil {
- // // fmt.Println("Ethernet layer detected.")
- // // ethernetPacket, _ := ethernetLayer.(*layers.Ethernet)
- // // fmt.Println("Source MAC: ", ethernetPacket.SrcMAC)
- // // fmt.Println("Destination MAC: ", ethernetPacket.DstMAC)
- // // // Ethernet type is typically IPv4 but could be ARP or other
- // // fmt.Println("Ethernet type: ", ethernetPacket.EthernetType)
- // // fmt.Println()
- // // }
- // // Let's see if the packet is IP (even though the ether type told us)
- // ipLayer := packet.Layer(layers.LayerTypeIPv4)
- // if ipLayer != nil {
- // fmt.Println("IPv4 layer detected.")
- // ip, _ := ipLayer.(*layers.IPv4)
- // // IP layer variables:
- // // Version (Either 4 or 6)
- // // IHL (IP Header Length in 32-bit words)
- // // TOS, Length, Id, Flags, FragOffset, TTL, Protocol (TCP?),
- // // Checksum, SrcIP, DstIP
- // fmt.Printf("From %s to %s\n", ip.SrcIP, ip.DstIP)
- // fmt.Println("Protocol: ", ip.Protocol)
- // fmt.Println()
- // }
- // // udpLayer := packet.Layer(layers.LayerTypeUDP)
- // // if udpLayer != nil {
- // // udp, _ := udpLayer.(*layers.UDP)
- // // fmt.Printf("UDP: From port %d to %d\n", udp.SrcPort, udp.DstPort)
- // // fmt.Println()
- // // }
- // // // Iterate over all layers, printing out each layer type
- // // fmt.Println("All packet layers:")
- // // for _, layer := range packet.Layers() {
- // // fmt.Println("- ", layer.LayerType())
- // // }
- // // When iterating through packet.Layers() above,
- // // if it lists Payload layer then that is the same as
- // // this applicationLayer. applicationLayer contains the payload
- // // applicationLayer := packet.ApplicationLayer()
- // // if applicationLayer != nil {
- // // fmt.Println("Application layer/Payload found.")
- // // fmt.Printf("%s\n", applicationLayer.Payload())
- // // // Search for a string inside the payload
- // // if strings.Contains(string(applicationLayer.Payload()), "HTTP") {
- // // fmt.Println("HTTP found!")
- // // }
- // // }
- // // Check for errors
- // if err := packet.ErrorLayer(); err != nil {
- // fmt.Println("Error decoding some part of the packet:", err)
- // }
- // }
|