mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-24 22:15:45 +03:00
Pull request: 3225 bsd dhcp
Merge in DNS/adguard-home from 3225-bsd-dhcp to master Closes #3225. Closes #3417. Squashed commit of the following: commit e7ea691824c7ebc8cafd8c9e206679346cbc8592 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Aug 12 17:02:02 2021 +0300 all: imp code, docs commit 5b598fc18a9b69a0256569f4c691bb6a2193dfbd Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Aug 12 16:28:12 2021 +0300 all: mv logic, imp code, docs, log changes commit e3e1577a668fe3e5c61d075c390e4bd7268181ba Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Aug 12 14:15:10 2021 +0300 dhcpd: imp checkother commit 3cc8b058195c30a7ef0b7741ee8463270d9e47ff Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Aug 11 13:20:18 2021 +0300 all: imp bsd support
This commit is contained in:
parent
00f2927663
commit
506b459842
21 changed files with 522 additions and 272 deletions
|
@ -27,7 +27,7 @@ and this project adheres to
|
||||||
- Settable timeouts for querying the upstream servers ([#2280]).
|
- Settable timeouts for querying the upstream servers ([#2280]).
|
||||||
- Configuration file parameters to change group and user ID on startup on Unix
|
- Configuration file parameters to change group and user ID on startup on Unix
|
||||||
([#2763]).
|
([#2763]).
|
||||||
- Experimental OpenBSD support for AMD64 and 64-bit ARM CPUs ([#2439]).
|
- Experimental OpenBSD support for AMD64 and 64-bit ARM CPUs ([#2439], [#3225]).
|
||||||
- Support for custom port in DNS-over-HTTPS profiles for Apple's devices
|
- Support for custom port in DNS-over-HTTPS profiles for Apple's devices
|
||||||
([#3172]).
|
([#3172]).
|
||||||
- `darwin/arm64` support ([#2443]).
|
- `darwin/arm64` support ([#2443]).
|
||||||
|
@ -64,6 +64,7 @@ and this project adheres to
|
||||||
|
|
||||||
### Fixed
|
### Fixed
|
||||||
|
|
||||||
|
- Discovering other DHCP servers on `darwin` and `freebsd` ([#3417]).
|
||||||
- Switching listening address to unspecified one when bound to a single
|
- Switching listening address to unspecified one when bound to a single
|
||||||
specified IPv4 address on Darwin (macOS) ([#2807]).
|
specified IPv4 address on Darwin (macOS) ([#2807]).
|
||||||
- Incomplete HTTP response for static IP address.
|
- Incomplete HTTP response for static IP address.
|
||||||
|
@ -112,6 +113,7 @@ and this project adheres to
|
||||||
[#3194]: https://github.com/AdguardTeam/AdGuardHome/issues/3194
|
[#3194]: https://github.com/AdguardTeam/AdGuardHome/issues/3194
|
||||||
[#3198]: https://github.com/AdguardTeam/AdGuardHome/issues/3198
|
[#3198]: https://github.com/AdguardTeam/AdGuardHome/issues/3198
|
||||||
[#3217]: https://github.com/AdguardTeam/AdGuardHome/issues/3217
|
[#3217]: https://github.com/AdguardTeam/AdGuardHome/issues/3217
|
||||||
|
[#3225]: https://github.com/AdguardTeam/AdGuardHome/issues/3225
|
||||||
[#3256]: https://github.com/AdguardTeam/AdGuardHome/issues/3256
|
[#3256]: https://github.com/AdguardTeam/AdGuardHome/issues/3256
|
||||||
[#3257]: https://github.com/AdguardTeam/AdGuardHome/issues/3257
|
[#3257]: https://github.com/AdguardTeam/AdGuardHome/issues/3257
|
||||||
[#3289]: https://github.com/AdguardTeam/AdGuardHome/issues/3289
|
[#3289]: https://github.com/AdguardTeam/AdGuardHome/issues/3289
|
||||||
|
@ -119,6 +121,7 @@ and this project adheres to
|
||||||
[#3343]: https://github.com/AdguardTeam/AdGuardHome/issues/3343
|
[#3343]: https://github.com/AdguardTeam/AdGuardHome/issues/3343
|
||||||
[#3351]: https://github.com/AdguardTeam/AdGuardHome/issues/3351
|
[#3351]: https://github.com/AdguardTeam/AdGuardHome/issues/3351
|
||||||
[#3372]: https://github.com/AdguardTeam/AdGuardHome/issues/3372
|
[#3372]: https://github.com/AdguardTeam/AdGuardHome/issues/3372
|
||||||
|
[#3417]: https://github.com/AdguardTeam/AdGuardHome/issues/3417
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
6
internal/aghnet/dhcp.go
Normal file
6
internal/aghnet/dhcp.go
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
package aghnet
|
||||||
|
|
||||||
|
// CheckOtherDHCP tries to discover another DHCP server in the network.
|
||||||
|
func CheckOtherDHCP(ifaceName string) (ok4, ok6 bool, err4, err6 error) {
|
||||||
|
return checkOtherDHCP(ifaceName)
|
||||||
|
}
|
|
@ -1,95 +1,132 @@
|
||||||
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
||||||
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
||||||
|
|
||||||
package dhcpd
|
package aghnet
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"runtime"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
|
||||||
"github.com/AdguardTeam/golibs/errors"
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
"github.com/AdguardTeam/golibs/log"
|
"github.com/AdguardTeam/golibs/log"
|
||||||
"github.com/AdguardTeam/golibs/netutil"
|
"github.com/AdguardTeam/golibs/netutil"
|
||||||
"github.com/insomniacslk/dhcp/dhcpv4"
|
"github.com/insomniacslk/dhcp/dhcpv4"
|
||||||
"github.com/insomniacslk/dhcp/dhcpv4/nclient4"
|
|
||||||
"github.com/insomniacslk/dhcp/dhcpv6"
|
"github.com/insomniacslk/dhcp/dhcpv6"
|
||||||
"github.com/insomniacslk/dhcp/dhcpv6/nclient6"
|
"github.com/insomniacslk/dhcp/dhcpv6/nclient6"
|
||||||
"github.com/insomniacslk/dhcp/iana"
|
"github.com/insomniacslk/dhcp/iana"
|
||||||
)
|
)
|
||||||
|
|
||||||
// CheckIfOtherDHCPServersPresentV4 sends a DHCP request to the specified network interface,
|
// defaultDiscoverTime is the
|
||||||
// and waits for a response for a period defined by defaultDiscoverTime
|
const defaultDiscoverTime = 3 * time.Second
|
||||||
func CheckIfOtherDHCPServersPresentV4(ifaceName string) (ok bool, err error) {
|
|
||||||
|
func checkOtherDHCP(ifaceName string) (ok4, ok6 bool, err4, err6 error) {
|
||||||
iface, err := net.InterfaceByName(ifaceName)
|
iface, err := net.InterfaceByName(ifaceName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("couldn't find interface by name %s: %w", ifaceName, err)
|
err = fmt.Errorf("couldn't find interface by name %s: %w", ifaceName, err)
|
||||||
|
err4, err6 = err, err
|
||||||
|
|
||||||
|
return false, false, err4, err6
|
||||||
}
|
}
|
||||||
|
|
||||||
ifaceIPNet, err := ifaceIPAddrs(iface, ipVersion4)
|
ok4, err4 = checkOtherDHCPv4(iface)
|
||||||
if err != nil {
|
ok6, err6 = checkOtherDHCPv6(iface)
|
||||||
return false, fmt.Errorf("getting ipv4 addrs for iface %s: %w", ifaceName, err)
|
|
||||||
}
|
return ok4, ok6, err4, err6
|
||||||
if len(ifaceIPNet) == 0 {
|
}
|
||||||
return false, fmt.Errorf("interface %s has no ipv4 addresses", ifaceName)
|
|
||||||
|
// ifaceIPv4Subnet returns the first suitable IPv4 subnetwork iface has.
|
||||||
|
func ifaceIPv4Subnet(iface *net.Interface) (subnet *net.IPNet, err error) {
|
||||||
|
var addrs []net.Addr
|
||||||
|
if addrs, err = iface.Addrs(); err != nil {
|
||||||
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(a.garipov): Find out what this is about. Perhaps this
|
for _, a := range addrs {
|
||||||
// information is outdated or at least incomplete.
|
switch a := a.(type) {
|
||||||
if runtime.GOOS == "darwin" {
|
case *net.IPAddr:
|
||||||
return false, aghos.Unsupported("CheckIfOtherDHCPServersPresentV4")
|
subnet = &net.IPNet{
|
||||||
|
IP: a.IP,
|
||||||
|
Mask: a.IP.DefaultMask(),
|
||||||
|
}
|
||||||
|
case *net.IPNet:
|
||||||
|
subnet = a
|
||||||
|
default:
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if ip4 := subnet.IP.To4(); ip4 != nil {
|
||||||
|
subnet.IP = ip4
|
||||||
|
|
||||||
|
return subnet, nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
srcIP := ifaceIPNet[0]
|
return nil, fmt.Errorf("interface %s has no ipv4 addresses", iface.Name)
|
||||||
src := netutil.JoinHostPort(srcIP.String(), 68)
|
}
|
||||||
dst := "255.255.255.255:67"
|
|
||||||
|
|
||||||
hostname, _ := os.Hostname()
|
// checkOtherDHCPv4 sends a DHCP request to the specified network interface, and
|
||||||
|
// waits for a response for a period defined by defaultDiscoverTime.
|
||||||
req, err := dhcpv4.NewDiscovery(iface.HardwareAddr)
|
func checkOtherDHCPv4(iface *net.Interface) (ok bool, err error) {
|
||||||
if err != nil {
|
var subnet *net.IPNet
|
||||||
return false, fmt.Errorf("dhcpv4.NewDiscovery: %w", err)
|
if subnet, err = ifaceIPv4Subnet(iface); err != nil {
|
||||||
}
|
return false, err
|
||||||
req.Options.Update(dhcpv4.OptClientIdentifier(iface.HardwareAddr))
|
|
||||||
req.Options.Update(dhcpv4.OptHostName(hostname))
|
|
||||||
|
|
||||||
// resolve 0.0.0.0:68
|
|
||||||
udpAddr, err := net.ResolveUDPAddr("udp4", src)
|
|
||||||
if err != nil {
|
|
||||||
return false, fmt.Errorf("couldn't resolve UDP address %s: %w", src, err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if !udpAddr.IP.To4().Equal(srcIP) {
|
// Resolve broadcast addr.
|
||||||
return false, fmt.Errorf("resolved UDP address is not %s: %w", src, err)
|
dst := netutil.IPPort{
|
||||||
}
|
IP: BroadcastFromIPNet(subnet),
|
||||||
|
Port: 67,
|
||||||
// resolve 255.255.255.255:67
|
}.String()
|
||||||
dstAddr, err := net.ResolveUDPAddr("udp4", dst)
|
var dstAddr *net.UDPAddr
|
||||||
if err != nil {
|
if dstAddr, err = net.ResolveUDPAddr("udp4", dst); err != nil {
|
||||||
return false, fmt.Errorf("couldn't resolve UDP address %s: %w", dst, err)
|
return false, fmt.Errorf("couldn't resolve UDP address %s: %w", dst, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// bind to 0.0.0.0:68
|
var hostname string
|
||||||
log.Tracef("Listening to udp4 %+v", udpAddr)
|
if hostname, err = os.Hostname(); err != nil {
|
||||||
c, err := nclient4.NewRawUDPConn(ifaceName, 68)
|
return false, fmt.Errorf("couldn't get hostname: %w", err)
|
||||||
if err != nil {
|
|
||||||
return false, fmt.Errorf("couldn't listen on :68: %w", err)
|
|
||||||
}
|
|
||||||
if c != nil {
|
|
||||||
defer func() { err = errors.WithDeferred(err, c.Close()) }()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// send to 255.255.255.255:67
|
return discover4(iface, dstAddr, hostname)
|
||||||
_, err = c.WriteTo(req.ToBytes(), dstAddr)
|
}
|
||||||
if err != nil {
|
|
||||||
return false, fmt.Errorf("couldn't send a packet to %s: %w", dst, err)
|
func discover4(iface *net.Interface, dstAddr *net.UDPAddr, hostname string) (ok bool, err error) {
|
||||||
|
var req *dhcpv4.DHCPv4
|
||||||
|
if req, err = dhcpv4.NewDiscovery(iface.HardwareAddr); err != nil {
|
||||||
|
return false, fmt.Errorf("dhcpv4.NewDiscovery: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Options.Update(dhcpv4.OptClientIdentifier(iface.HardwareAddr))
|
||||||
|
req.Options.Update(dhcpv4.OptHostName(hostname))
|
||||||
|
req.SetBroadcast()
|
||||||
|
|
||||||
|
// Bind to 0.0.0.0:68.
|
||||||
|
//
|
||||||
|
// On OpenBSD binding to the port 68 competes with dhclient's binding,
|
||||||
|
// so that all incoming packets are ignored and the discovering process
|
||||||
|
// is spoiled.
|
||||||
|
//
|
||||||
|
// It's also known that listening on the specified interface's address
|
||||||
|
// ignores broadcasted packets when reading.
|
||||||
|
var c net.PacketConn
|
||||||
|
if c, err = net.ListenPacket("udp4", ":68"); err != nil {
|
||||||
|
return false, fmt.Errorf("couldn't listen on :68: %w", err)
|
||||||
|
}
|
||||||
|
defer func() { err = errors.WithDeferred(err, c.Close()) }()
|
||||||
|
|
||||||
|
// Send to resolved broadcast.
|
||||||
|
if _, err = c.WriteTo(req.ToBytes(), dstAddr); err != nil {
|
||||||
|
return false, fmt.Errorf("couldn't send a packet to %s: %w", dstAddr, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
if err = c.SetDeadline(time.Now().Add(defaultDiscoverTime)); err != nil {
|
||||||
|
return false, fmt.Errorf("setting deadline: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
var next bool
|
var next bool
|
||||||
ok, next, err = tryConn4(req, c, iface)
|
ok, next, err = tryConn4(req, c, iface)
|
||||||
if next {
|
if next {
|
||||||
|
@ -116,12 +153,10 @@ func tryConn4(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, n
|
||||||
log.Tracef("dhcpv4: waiting %v for an answer", defaultDiscoverTime)
|
log.Tracef("dhcpv4: waiting %v for an answer", defaultDiscoverTime)
|
||||||
|
|
||||||
b := make([]byte, 1500)
|
b := make([]byte, 1500)
|
||||||
err = c.SetDeadline(time.Now().Add(defaultDiscoverTime))
|
|
||||||
if err != nil {
|
|
||||||
return false, false, fmt.Errorf("setting deadline: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
n, _, err := c.ReadFrom(b)
|
n, _, err := c.ReadFrom(b)
|
||||||
|
if n > 0 {
|
||||||
|
log.Debug("received %d bytes: %v", n, b)
|
||||||
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if isTimeout(err) {
|
if isTimeout(err) {
|
||||||
log.Debug("dhcpv4: didn't receive dhcp response")
|
log.Debug("dhcpv4: didn't receive dhcp response")
|
||||||
|
@ -159,31 +194,21 @@ func tryConn4(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, n
|
||||||
return true, false, nil
|
return true, false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// CheckIfOtherDHCPServersPresentV6 sends a DHCP request to the specified network interface,
|
// checkOtherDHCPv6 sends a DHCP request to the specified network interface, and
|
||||||
// and waits for a response for a period defined by defaultDiscoverTime
|
// waits for a response for a period defined by defaultDiscoverTime.
|
||||||
func CheckIfOtherDHCPServersPresentV6(ifaceName string) (ok bool, err error) {
|
func checkOtherDHCPv6(iface *net.Interface) (ok bool, err error) {
|
||||||
iface, err := net.InterfaceByName(ifaceName)
|
ifaceIPNet, err := IfaceIPAddrs(iface, IPVersion6)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("dhcpv6: net.InterfaceByName: %s: %w", ifaceName, err)
|
return false, fmt.Errorf("getting ipv6 addrs for iface %s: %w", iface.Name, err)
|
||||||
}
|
|
||||||
|
|
||||||
ifaceIPNet, err := ifaceIPAddrs(iface, ipVersion6)
|
|
||||||
if err != nil {
|
|
||||||
return false, fmt.Errorf("getting ipv6 addrs for iface %s: %w", ifaceName, err)
|
|
||||||
}
|
}
|
||||||
if len(ifaceIPNet) == 0 {
|
if len(ifaceIPNet) == 0 {
|
||||||
return false, fmt.Errorf("interface %s has no ipv6 addresses", ifaceName)
|
return false, fmt.Errorf("interface %s has no ipv6 addresses", iface.Name)
|
||||||
}
|
}
|
||||||
|
|
||||||
srcIP := ifaceIPNet[0]
|
srcIP := ifaceIPNet[0]
|
||||||
src := netutil.JoinHostPort(srcIP.String(), 546)
|
src := netutil.JoinHostPort(srcIP.String(), 546)
|
||||||
dst := "[ff02::1:2]:547"
|
dst := "[ff02::1:2]:547"
|
||||||
|
|
||||||
req, err := dhcpv6.NewSolicit(iface.HardwareAddr)
|
|
||||||
if err != nil {
|
|
||||||
return false, fmt.Errorf("dhcpv6: dhcpv6.NewSolicit: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
udpAddr, err := net.ResolveUDPAddr("udp6", src)
|
udpAddr, err := net.ResolveUDPAddr("udp6", src)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("dhcpv6: Couldn't resolve UDP address %s: %w", src, err)
|
return false, fmt.Errorf("dhcpv6: Couldn't resolve UDP address %s: %w", src, err)
|
||||||
|
@ -198,18 +223,25 @@ func CheckIfOtherDHCPServersPresentV6(ifaceName string) (ok bool, err error) {
|
||||||
return false, fmt.Errorf("dhcpv6: Couldn't resolve UDP address %s: %w", dst, err)
|
return false, fmt.Errorf("dhcpv6: Couldn't resolve UDP address %s: %w", dst, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return discover6(iface, udpAddr, dstAddr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func discover6(iface *net.Interface, udpAddr, dstAddr *net.UDPAddr) (ok bool, err error) {
|
||||||
|
req, err := dhcpv6.NewSolicit(iface.HardwareAddr)
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("dhcpv6: dhcpv6.NewSolicit: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
log.Debug("DHCPv6: Listening to udp6 %+v", udpAddr)
|
log.Debug("DHCPv6: Listening to udp6 %+v", udpAddr)
|
||||||
c, err := nclient6.NewIPv6UDPConn(ifaceName, dhcpv6.DefaultClientPort)
|
c, err := nclient6.NewIPv6UDPConn(iface.Name, dhcpv6.DefaultClientPort)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("dhcpv6: Couldn't listen on :546: %w", err)
|
return false, fmt.Errorf("dhcpv6: Couldn't listen on :546: %w", err)
|
||||||
}
|
}
|
||||||
if c != nil {
|
defer func() { err = errors.WithDeferred(err, c.Close()) }()
|
||||||
defer func() { err = errors.WithDeferred(err, c.Close()) }()
|
|
||||||
}
|
|
||||||
|
|
||||||
_, err = c.WriteTo(req.ToBytes(), dstAddr)
|
_, err = c.WriteTo(req.ToBytes(), dstAddr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("dhcpv6: Couldn't send a packet to %s: %w", dst, err)
|
return false, fmt.Errorf("dhcpv6: Couldn't send a packet to %s: %w", dstAddr, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
@ -288,3 +320,15 @@ func tryConn6(req *dhcpv6.Message, c net.PacketConn) (ok, next bool, err error)
|
||||||
|
|
||||||
return true, false, nil
|
return true, false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// isTimeout returns true if err is an operation timeout error from net package.
|
||||||
|
//
|
||||||
|
// TODO(e.burkov): Consider moving into netutil.
|
||||||
|
func isTimeout(err error) (ok bool) {
|
||||||
|
var operr *net.OpError
|
||||||
|
if errors.As(err, &operr) {
|
||||||
|
return operr.Timeout()
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
13
internal/aghnet/dhcp_windows.go
Normal file
13
internal/aghnet/dhcp_windows.go
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
//go:build windows
|
||||||
|
// +build windows
|
||||||
|
|
||||||
|
package aghnet
|
||||||
|
|
||||||
|
import "github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
||||||
|
|
||||||
|
func checkOtherDHCP(ifaceName string) (ok4, ok6 bool, err4, err6 error) {
|
||||||
|
return false,
|
||||||
|
false,
|
||||||
|
aghos.Unsupported("CheckIfOtherDHCPServersPresentV4"),
|
||||||
|
aghos.Unsupported("CheckIfOtherDHCPServersPresentV6")
|
||||||
|
}
|
118
internal/aghnet/interfaces.go
Normal file
118
internal/aghnet/interfaces.go
Normal file
|
@ -0,0 +1,118 @@
|
||||||
|
package aghnet
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/golibs/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
// IPVersion is a documentational alias for int. Use it when the integer means
|
||||||
|
// IP version.
|
||||||
|
type IPVersion = int
|
||||||
|
|
||||||
|
// IP version constants.
|
||||||
|
const (
|
||||||
|
IPVersion4 IPVersion = 4
|
||||||
|
IPVersion6 IPVersion = 6
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetIface is the interface for network interface methods.
|
||||||
|
type NetIface interface {
|
||||||
|
Addrs() ([]net.Addr, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// IfaceIPAddrs returns the interface's IP addresses.
|
||||||
|
func IfaceIPAddrs(iface NetIface, ipv IPVersion) (ips []net.IP, err error) {
|
||||||
|
addrs, err := iface.Addrs()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, a := range addrs {
|
||||||
|
var ip net.IP
|
||||||
|
switch a := a.(type) {
|
||||||
|
case *net.IPAddr:
|
||||||
|
ip = a.IP
|
||||||
|
case *net.IPNet:
|
||||||
|
ip = a.IP
|
||||||
|
default:
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Assume that net.(*Interface).Addrs can only return valid IPv4
|
||||||
|
// and IPv6 addresses. Thus, if it isn't an IPv4 address, it
|
||||||
|
// must be an IPv6 one.
|
||||||
|
switch ipv {
|
||||||
|
case IPVersion4:
|
||||||
|
if ip4 := ip.To4(); ip4 != nil {
|
||||||
|
ips = append(ips, ip4)
|
||||||
|
}
|
||||||
|
case IPVersion6:
|
||||||
|
if ip6 := ip.To4(); ip6 == nil {
|
||||||
|
ips = append(ips, ip)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("invalid ip version %d", ipv)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ips, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// IfaceDNSIPAddrs returns IP addresses of the interface suitable to send to
|
||||||
|
// clients as DNS addresses. If err is nil, addrs contains either no addresses
|
||||||
|
// or at least two.
|
||||||
|
//
|
||||||
|
// It makes up to maxAttempts attempts to get the addresses if there are none,
|
||||||
|
// each time using the provided backoff. Sometimes an interface needs a few
|
||||||
|
// seconds to really ititialize.
|
||||||
|
//
|
||||||
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/2304.
|
||||||
|
func IfaceDNSIPAddrs(
|
||||||
|
iface NetIface,
|
||||||
|
ipv IPVersion,
|
||||||
|
maxAttempts int,
|
||||||
|
backoff time.Duration,
|
||||||
|
) (addrs []net.IP, err error) {
|
||||||
|
var n int
|
||||||
|
for n = 1; n <= maxAttempts; n++ {
|
||||||
|
addrs, err = IfaceIPAddrs(iface, ipv)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("getting ip addrs: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(addrs) > 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug("dhcpv%d: attempt %d: no ip addresses", ipv, n)
|
||||||
|
|
||||||
|
time.Sleep(backoff)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch len(addrs) {
|
||||||
|
case 0:
|
||||||
|
// Don't return errors in case the users want to try and enable
|
||||||
|
// the DHCP server later.
|
||||||
|
t := time.Duration(n) * backoff
|
||||||
|
log.Error("dhcpv%d: no ip for iface after %d attempts and %s", ipv, n, t)
|
||||||
|
|
||||||
|
return nil, nil
|
||||||
|
case 1:
|
||||||
|
// Some Android devices use 8.8.8.8 if there is not a secondary
|
||||||
|
// DNS server. Fix that by setting the secondary DNS address to
|
||||||
|
// the same address.
|
||||||
|
//
|
||||||
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/1708.
|
||||||
|
log.Debug("dhcpv%d: setting secondary dns ip to itself", ipv)
|
||||||
|
addrs = append(addrs, addrs[0])
|
||||||
|
default:
|
||||||
|
// Go on.
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug("dhcpv%d: got addresses %s after %d attempts", ipv, addrs, n)
|
||||||
|
|
||||||
|
return addrs, nil
|
||||||
|
}
|
|
@ -1,4 +1,4 @@
|
||||||
package dhcpd
|
package aghnet
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"net"
|
"net"
|
||||||
|
@ -14,7 +14,7 @@ type fakeIface struct {
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
// Addrs implements the netIface interface for *fakeIface.
|
// Addrs implements the NetIface interface for *fakeIface.
|
||||||
func (iface *fakeIface) Addrs() (addrs []net.Addr, err error) {
|
func (iface *fakeIface) Addrs() (addrs []net.Addr, err error) {
|
||||||
if iface.err != nil {
|
if iface.err != nil {
|
||||||
return nil, iface.err
|
return nil, iface.err
|
||||||
|
@ -34,51 +34,51 @@ func TestIfaceIPAddrs(t *testing.T) {
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
iface netIface
|
iface NetIface
|
||||||
ipv ipVersion
|
ipv IPVersion
|
||||||
want []net.IP
|
want []net.IP
|
||||||
wantErr error
|
wantErr error
|
||||||
}{{
|
}{{
|
||||||
name: "ipv4_success",
|
name: "ipv4_success",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr4}, err: nil},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: []net.IP{ip4},
|
want: []net.IP{ip4},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv4_success_with_ipv6",
|
name: "ipv4_success_with_ipv6",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: []net.IP{ip4},
|
want: []net.IP{ip4},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv4_error",
|
name: "ipv4_error",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr4}, err: errTest},
|
iface: &fakeIface{addrs: []net.Addr{addr4}, err: errTest},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: nil,
|
want: nil,
|
||||||
wantErr: errTest,
|
wantErr: errTest,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_success",
|
name: "ipv6_success",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6}, err: nil},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: []net.IP{ip6},
|
want: []net.IP{ip6},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_success_with_ipv4",
|
name: "ipv6_success_with_ipv4",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: []net.IP{ip6},
|
want: []net.IP{ip6},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_error",
|
name: "ipv6_error",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6}, err: errTest},
|
iface: &fakeIface{addrs: []net.Addr{addr6}, err: errTest},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: nil,
|
want: nil,
|
||||||
wantErr: errTest,
|
wantErr: errTest,
|
||||||
}}
|
}}
|
||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.name, func(t *testing.T) {
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
got, gotErr := ifaceIPAddrs(tc.iface, tc.ipv)
|
got, gotErr := IfaceIPAddrs(tc.iface, tc.ipv)
|
||||||
require.True(t, errors.Is(gotErr, tc.wantErr))
|
require.True(t, errors.Is(gotErr, tc.wantErr))
|
||||||
assert.Equal(t, tc.want, got)
|
assert.Equal(t, tc.want, got)
|
||||||
})
|
})
|
||||||
|
@ -91,7 +91,7 @@ type waitingFakeIface struct {
|
||||||
n int
|
n int
|
||||||
}
|
}
|
||||||
|
|
||||||
// Addrs implements the netIface interface for *waitingFakeIface.
|
// Addrs implements the NetIface interface for *waitingFakeIface.
|
||||||
func (iface *waitingFakeIface) Addrs() (addrs []net.Addr, err error) {
|
func (iface *waitingFakeIface) Addrs() (addrs []net.Addr, err error) {
|
||||||
if iface.err != nil {
|
if iface.err != nil {
|
||||||
return nil, iface.err
|
return nil, iface.err
|
||||||
|
@ -117,63 +117,63 @@ func TestIfaceDNSIPAddrs(t *testing.T) {
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
name string
|
name string
|
||||||
iface netIface
|
iface NetIface
|
||||||
ipv ipVersion
|
ipv IPVersion
|
||||||
want []net.IP
|
want []net.IP
|
||||||
wantErr error
|
wantErr error
|
||||||
}{{
|
}{{
|
||||||
name: "ipv4_success",
|
name: "ipv4_success",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr4}, err: nil},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: []net.IP{ip4, ip4},
|
want: []net.IP{ip4, ip4},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv4_success_with_ipv6",
|
name: "ipv4_success_with_ipv6",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: []net.IP{ip4, ip4},
|
want: []net.IP{ip4, ip4},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv4_error",
|
name: "ipv4_error",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr4}, err: errTest},
|
iface: &fakeIface{addrs: []net.Addr{addr4}, err: errTest},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: nil,
|
want: nil,
|
||||||
wantErr: errTest,
|
wantErr: errTest,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv4_wait",
|
name: "ipv4_wait",
|
||||||
iface: &waitingFakeIface{addrs: []net.Addr{addr4}, err: nil, n: 1},
|
iface: &waitingFakeIface{addrs: []net.Addr{addr4}, err: nil, n: 1},
|
||||||
ipv: ipVersion4,
|
ipv: IPVersion4,
|
||||||
want: []net.IP{ip4, ip4},
|
want: []net.IP{ip4, ip4},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_success",
|
name: "ipv6_success",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6}, err: nil},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: []net.IP{ip6, ip6},
|
want: []net.IP{ip6, ip6},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_success_with_ipv4",
|
name: "ipv6_success_with_ipv4",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
iface: &fakeIface{addrs: []net.Addr{addr6, addr4}, err: nil},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: []net.IP{ip6, ip6},
|
want: []net.IP{ip6, ip6},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_error",
|
name: "ipv6_error",
|
||||||
iface: &fakeIface{addrs: []net.Addr{addr6}, err: errTest},
|
iface: &fakeIface{addrs: []net.Addr{addr6}, err: errTest},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: nil,
|
want: nil,
|
||||||
wantErr: errTest,
|
wantErr: errTest,
|
||||||
}, {
|
}, {
|
||||||
name: "ipv6_wait",
|
name: "ipv6_wait",
|
||||||
iface: &waitingFakeIface{addrs: []net.Addr{addr6}, err: nil, n: 1},
|
iface: &waitingFakeIface{addrs: []net.Addr{addr6}, err: nil, n: 1},
|
||||||
ipv: ipVersion6,
|
ipv: IPVersion6,
|
||||||
want: []net.IP{ip6, ip6},
|
want: []net.IP{ip6, ip6},
|
||||||
wantErr: nil,
|
wantErr: nil,
|
||||||
}}
|
}}
|
||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.name, func(t *testing.T) {
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
got, gotErr := ifaceDNSIPAddrs(tc.iface, tc.ipv, 2, 0)
|
got, gotErr := IfaceDNSIPAddrs(tc.iface, tc.ipv, 2, 0)
|
||||||
require.True(t, errors.Is(gotErr, tc.wantErr))
|
require.True(t, errors.Is(gotErr, tc.wantErr))
|
||||||
assert.Equal(t, tc.want, got)
|
assert.Equal(t, tc.want, got)
|
||||||
})
|
})
|
|
@ -294,3 +294,19 @@ func CollectAllIfacesAddrs() (addrs []string, err error) {
|
||||||
|
|
||||||
return addrs, nil
|
return addrs, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// BroadcastFromIPNet calculates the broadcast IP address for n.
|
||||||
|
func BroadcastFromIPNet(n *net.IPNet) (dc net.IP) {
|
||||||
|
dc = netutil.CloneIP(n.IP)
|
||||||
|
|
||||||
|
mask := n.Mask
|
||||||
|
if mask == nil {
|
||||||
|
mask = dc.DefaultMask()
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, b := range mask {
|
||||||
|
dc[i] |= ^b
|
||||||
|
}
|
||||||
|
|
||||||
|
return dc
|
||||||
|
}
|
||||||
|
|
|
@ -48,9 +48,14 @@ func getCurrentHardwarePortInfo(ifaceName string) (hardwarePortInfo, error) {
|
||||||
return getHardwarePortInfo(hardwarePort)
|
return getHardwarePortInfo(hardwarePort)
|
||||||
}
|
}
|
||||||
|
|
||||||
// getNetworkSetupHardwareReports parses the output of the `networksetup -listallhardwareports` command
|
// getNetworkSetupHardwareReports parses the output of the `networksetup
|
||||||
// it returns a map where the key is the interface name, and the value is the "hardware port"
|
// -listallhardwareports` command it returns a map where the key is the
|
||||||
// returns nil if it fails to parse the output
|
// interface name, and the value is the "hardware port" returns nil if it fails
|
||||||
|
// to parse the output
|
||||||
|
//
|
||||||
|
// TODO(e.burkov): There should be more proper approach than parsing the
|
||||||
|
// command output. For example, see
|
||||||
|
// https://developer.apple.com/documentation/systemconfiguration.
|
||||||
func getNetworkSetupHardwareReports() map[string]string {
|
func getNetworkSetupHardwareReports() map[string]string {
|
||||||
_, out, err := aghos.RunCommand("networksetup", "-listallhardwareports")
|
_, out, err := aghos.RunCommand("networksetup", "-listallhardwareports")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -48,7 +48,6 @@ func (rc *recurrentChecker) checkFile(sourcePath, desired string) (
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, err
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
defer func() { err = errors.WithDeferred(err, f.Close()) }()
|
defer func() { err = errors.WithDeferred(err, f.Close()) }()
|
||||||
|
|
||||||
var r io.Reader
|
var r io.Reader
|
||||||
|
|
70
internal/aghnet/net_openbsd.go
Normal file
70
internal/aghnet/net_openbsd.go
Normal file
|
@ -0,0 +1,70 @@
|
||||||
|
//go:build openbsd
|
||||||
|
// +build openbsd
|
||||||
|
|
||||||
|
package aghnet
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/AdGuardHome/internal/aghio"
|
||||||
|
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
||||||
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
func canBindPrivilegedPorts() (can bool, err error) {
|
||||||
|
return aghos.HaveAdminRights()
|
||||||
|
}
|
||||||
|
|
||||||
|
// maxCheckedFileSize is the maximum acceptable length of the /etc/hostname.*
|
||||||
|
// files.
|
||||||
|
const maxCheckedFileSize = 1024 * 1024
|
||||||
|
|
||||||
|
func ifaceHasStaticIP(ifaceName string) (ok bool, err error) {
|
||||||
|
const filenameFmt = "/etc/hostname.%s"
|
||||||
|
|
||||||
|
filename := fmt.Sprintf(filenameFmt, ifaceName)
|
||||||
|
var f *os.File
|
||||||
|
if f, err = os.Open(filename); err != nil {
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
err = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
defer func() { err = errors.WithDeferred(err, f.Close()) }()
|
||||||
|
|
||||||
|
var r io.Reader
|
||||||
|
r, err = aghio.LimitReader(f, maxCheckedFileSize)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return hostnameIfStaticConfig(r)
|
||||||
|
}
|
||||||
|
|
||||||
|
// hostnameIfStaticConfig checks if the interface is configured by
|
||||||
|
// /etc/hostname.* to have a static IP.
|
||||||
|
//
|
||||||
|
// TODO(e.burkov): The platform-dependent functions to check the static IP
|
||||||
|
// address configured are rather similar. Think about unifying common parts.
|
||||||
|
func hostnameIfStaticConfig(r io.Reader) (has bool, err error) {
|
||||||
|
s := bufio.NewScanner(r)
|
||||||
|
for s.Scan() {
|
||||||
|
line := strings.TrimSpace(s.Text())
|
||||||
|
fields := strings.Fields(line)
|
||||||
|
if len(fields) >= 2 && fields[0] == "inet" && net.ParseIP(fields[1]) != nil {
|
||||||
|
return true, s.Err()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false, s.Err()
|
||||||
|
}
|
||||||
|
|
||||||
|
func ifaceSetStaticIP(string) (err error) {
|
||||||
|
return aghos.Unsupported("setting static ip")
|
||||||
|
}
|
52
internal/aghnet/net_openbsd_test.go
Normal file
52
internal/aghnet/net_openbsd_test.go
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
//go:build openbsd
|
||||||
|
// +build openbsd
|
||||||
|
|
||||||
|
package aghnet
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestHostnameIfStaticConfig(t *testing.T) {
|
||||||
|
const nl = "\n"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
rcconfData string
|
||||||
|
wantHas bool
|
||||||
|
}{{
|
||||||
|
name: "simple",
|
||||||
|
rcconfData: `inet 127.0.0.253` + nl,
|
||||||
|
wantHas: true,
|
||||||
|
}, {
|
||||||
|
name: "case_sensitiveness",
|
||||||
|
rcconfData: `InEt 127.0.0.253` + nl,
|
||||||
|
wantHas: false,
|
||||||
|
}, {
|
||||||
|
name: "comments_and_trash",
|
||||||
|
rcconfData: `# comment 1` + nl +
|
||||||
|
`` + nl +
|
||||||
|
`# inet 127.0.0.253` + nl +
|
||||||
|
`inet` + nl,
|
||||||
|
wantHas: false,
|
||||||
|
}, {
|
||||||
|
name: "incorrect_config",
|
||||||
|
rcconfData: `inet6 127.0.0.253` + nl +
|
||||||
|
`inet 256.256.256.256` + nl,
|
||||||
|
wantHas: false,
|
||||||
|
}}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
r := strings.NewReader(tc.rcconfData)
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
has, err := hostnameIfStaticConfig(r)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, tc.wantHas, has)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,5 +1,5 @@
|
||||||
//go:build !(linux || darwin || freebsd)
|
//go:build !(linux || darwin || freebsd || openbsd)
|
||||||
// +build !linux,!darwin,!freebsd
|
// +build !linux,!darwin,!freebsd,!openbsd
|
||||||
|
|
||||||
package aghnet
|
package aghnet
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,10 @@
|
||||||
package aghnet
|
package aghnet
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -14,3 +16,51 @@ func TestGetValidNetInterfacesForWeb(t *testing.T) {
|
||||||
require.NotEmptyf(t, iface.Addresses, "no addresses found for %s", iface.Name)
|
require.NotEmptyf(t, iface.Addresses, "no addresses found for %s", iface.Name)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestBroadcastFromIPNet(t *testing.T) {
|
||||||
|
known6 := net.IP{
|
||||||
|
1, 2, 3, 4,
|
||||||
|
5, 6, 7, 8,
|
||||||
|
9, 10, 11, 12,
|
||||||
|
13, 14, 15, 16,
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
subnet *net.IPNet
|
||||||
|
want net.IP
|
||||||
|
}{{
|
||||||
|
name: "full",
|
||||||
|
subnet: &net.IPNet{
|
||||||
|
IP: net.IP{192, 168, 0, 1},
|
||||||
|
Mask: net.IPMask{255, 255, 15, 0},
|
||||||
|
},
|
||||||
|
want: net.IP{192, 168, 240, 255},
|
||||||
|
}, {
|
||||||
|
name: "ipv6_no_mask",
|
||||||
|
subnet: &net.IPNet{
|
||||||
|
IP: known6,
|
||||||
|
},
|
||||||
|
want: known6,
|
||||||
|
}, {
|
||||||
|
name: "ipv4_no_mask",
|
||||||
|
subnet: &net.IPNet{
|
||||||
|
IP: net.IP{192, 168, 1, 2},
|
||||||
|
},
|
||||||
|
want: net.IP{192, 168, 1, 255},
|
||||||
|
}, {
|
||||||
|
name: "unspecified",
|
||||||
|
subnet: &net.IPNet{
|
||||||
|
IP: net.IP{0, 0, 0, 0},
|
||||||
|
Mask: net.IPMask{0, 0, 0, 0},
|
||||||
|
},
|
||||||
|
want: net.IPv4bcast,
|
||||||
|
}}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
bc := BroadcastFromIPNet(tc.subnet)
|
||||||
|
assert.True(t, bc.Equal(tc.want), bc)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -1,14 +0,0 @@
|
||||||
//go:build windows
|
|
||||||
// +build windows
|
|
||||||
|
|
||||||
package dhcpd
|
|
||||||
|
|
||||||
import "github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
|
||||||
|
|
||||||
func CheckIfOtherDHCPServersPresentV4(ifaceName string) (bool, error) {
|
|
||||||
return false, aghos.Unsupported("CheckIfOtherDHCPServersPresentV4")
|
|
||||||
}
|
|
||||||
|
|
||||||
func CheckIfOtherDHCPServersPresentV6(ifaceName string) (bool, error) {
|
|
||||||
return false, aghos.Unsupported("CheckIfOtherDHCPServersPresentV6")
|
|
||||||
}
|
|
|
@ -15,7 +15,6 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
defaultDiscoverTime = time.Second * 3
|
|
||||||
// leaseExpireStatic is used to define the Expiry field for static
|
// leaseExpireStatic is used to define the Expiry field for static
|
||||||
// leases.
|
// leases.
|
||||||
//
|
//
|
||||||
|
|
|
@ -6,14 +6,6 @@ import (
|
||||||
"net"
|
"net"
|
||||||
)
|
)
|
||||||
|
|
||||||
func isTimeout(err error) bool {
|
|
||||||
operr, ok := err.(*net.OpError)
|
|
||||||
if !ok {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
return operr.Timeout()
|
|
||||||
}
|
|
||||||
|
|
||||||
func tryTo4(ip net.IP) (ip4 net.IP, err error) {
|
func tryTo4(ip net.IP) (ip4 net.IP, err error) {
|
||||||
if ip == nil {
|
if ip == nil {
|
||||||
return nil, fmt.Errorf("%v is not an IP address", ip)
|
return nil, fmt.Errorf("%v is not an IP address", ip)
|
||||||
|
|
|
@ -398,60 +398,63 @@ func (s *Server) handleDHCPFindActiveServer(w http.ResponseWriter, r *http.Reque
|
||||||
msg := fmt.Sprintf("failed to read request body: %s", err)
|
msg := fmt.Sprintf("failed to read request body: %s", err)
|
||||||
log.Error(msg)
|
log.Error(msg)
|
||||||
http.Error(w, msg, http.StatusBadRequest)
|
http.Error(w, msg, http.StatusBadRequest)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
interfaceName := strings.TrimSpace(string(body))
|
ifaceName := strings.TrimSpace(string(body))
|
||||||
if interfaceName == "" {
|
if ifaceName == "" {
|
||||||
msg := "empty interface name specified"
|
msg := "empty interface name specified"
|
||||||
log.Error(msg)
|
log.Error(msg)
|
||||||
http.Error(w, msg, http.StatusBadRequest)
|
http.Error(w, msg, http.StatusBadRequest)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
result := dhcpSearchResult{
|
result := dhcpSearchResult{
|
||||||
V4: dhcpSearchV4Result{
|
V4: dhcpSearchV4Result{
|
||||||
OtherServer: dhcpSearchOtherResult{},
|
OtherServer: dhcpSearchOtherResult{
|
||||||
|
Found: "no",
|
||||||
|
},
|
||||||
StaticIP: dhcpStaticIPStatus{
|
StaticIP: dhcpStaticIPStatus{
|
||||||
Static: "yes",
|
Static: "yes",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
V6: dhcpSearchV6Result{
|
V6: dhcpSearchV6Result{
|
||||||
OtherServer: dhcpSearchOtherResult{},
|
OtherServer: dhcpSearchOtherResult{
|
||||||
|
Found: "no",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
found4, err4 := CheckIfOtherDHCPServersPresentV4(interfaceName)
|
if isStaticIP, serr := aghnet.IfaceHasStaticIP(ifaceName); serr != nil {
|
||||||
|
|
||||||
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName)
|
|
||||||
if err != nil {
|
|
||||||
result.V4.StaticIP.Static = "error"
|
result.V4.StaticIP.Static = "error"
|
||||||
result.V4.StaticIP.Error = err.Error()
|
result.V4.StaticIP.Error = serr.Error()
|
||||||
} else if !isStaticIP {
|
} else if !isStaticIP {
|
||||||
result.V4.StaticIP.Static = "no"
|
result.V4.StaticIP.Static = "no"
|
||||||
result.V4.StaticIP.IP = aghnet.GetSubnet(interfaceName).String()
|
// TODO(e.burkov): The returned IP should only be of version 4.
|
||||||
|
result.V4.StaticIP.IP = aghnet.GetSubnet(ifaceName).String()
|
||||||
}
|
}
|
||||||
|
|
||||||
if found4 {
|
found4, found6, err4, err6 := aghnet.CheckOtherDHCP(ifaceName)
|
||||||
result.V4.OtherServer.Found = "yes"
|
if err4 != nil {
|
||||||
} else if err4 != nil {
|
|
||||||
result.V4.OtherServer.Found = "error"
|
result.V4.OtherServer.Found = "error"
|
||||||
result.V4.OtherServer.Error = err4.Error()
|
result.V4.OtherServer.Error = err4.Error()
|
||||||
|
} else if found4 {
|
||||||
|
result.V4.OtherServer.Found = "yes"
|
||||||
}
|
}
|
||||||
|
if err6 != nil {
|
||||||
found6, err6 := CheckIfOtherDHCPServersPresentV6(interfaceName)
|
|
||||||
|
|
||||||
if found6 {
|
|
||||||
result.V6.OtherServer.Found = "yes"
|
|
||||||
} else if err6 != nil {
|
|
||||||
result.V6.OtherServer.Found = "error"
|
result.V6.OtherServer.Found = "error"
|
||||||
result.V6.OtherServer.Error = err6.Error()
|
result.V6.OtherServer.Error = err6.Error()
|
||||||
|
} else if found6 {
|
||||||
|
result.V6.OtherServer.Found = "yes"
|
||||||
}
|
}
|
||||||
|
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
err = json.NewEncoder(w).Encode(result)
|
err = json.NewEncoder(w).Encode(result)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
httpError(r, w, http.StatusInternalServerError, "Failed to marshal DHCP found json: %s", err)
|
httpError(r, w, http.StatusInternalServerError, "Failed to marshal DHCP found json: %s", err)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -971,7 +971,12 @@ func (s *v4Server) Start() (err error) {
|
||||||
|
|
||||||
log.Debug("dhcpv4: starting...")
|
log.Debug("dhcpv4: starting...")
|
||||||
|
|
||||||
dnsIPAddrs, err := ifaceDNSIPAddrs(iface, ipVersion4, defaultMaxAttempts, defaultBackoff)
|
dnsIPAddrs, err := aghnet.IfaceDNSIPAddrs(
|
||||||
|
iface,
|
||||||
|
aghnet.IPVersion4,
|
||||||
|
defaultMaxAttempts,
|
||||||
|
defaultBackoff,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("interface %s: %w", ifaceName, err)
|
return fmt.Errorf("interface %s: %w", ifaceName, err)
|
||||||
}
|
}
|
||||||
|
@ -1061,12 +1066,7 @@ func v4Create(conf V4ServerConf) (srv DHCPServer, err error) {
|
||||||
IP: routerIP,
|
IP: routerIP,
|
||||||
Mask: subnetMask,
|
Mask: subnetMask,
|
||||||
}
|
}
|
||||||
|
s.conf.broadcastIP = aghnet.BroadcastFromIPNet(s.conf.subnet)
|
||||||
bcastIP := netutil.CloneIP(routerIP)
|
|
||||||
for i, b := range subnetMask {
|
|
||||||
bcastIP[i] |= ^b
|
|
||||||
}
|
|
||||||
s.conf.broadcastIP = bcastIP
|
|
||||||
|
|
||||||
s.conf.ipRange, err = newIPRange(conf.RangeStart, conf.RangeEnd)
|
s.conf.ipRange, err = newIPRange(conf.RangeStart, conf.RangeEnd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -1,125 +1,12 @@
|
||||||
package dhcpd
|
package dhcpd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/AdguardTeam/golibs/log"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// ipVersion is a documentational alias for int. Use it when the integer means
|
|
||||||
// IP version.
|
|
||||||
type ipVersion = int
|
|
||||||
|
|
||||||
// IP version constants.
|
|
||||||
const (
|
|
||||||
ipVersion4 ipVersion = 4
|
|
||||||
ipVersion6 ipVersion = 6
|
|
||||||
)
|
|
||||||
|
|
||||||
// netIface is the interface for network interface methods.
|
|
||||||
type netIface interface {
|
|
||||||
Addrs() ([]net.Addr, error)
|
|
||||||
}
|
|
||||||
|
|
||||||
// ifaceIPAddrs returns the interface's IP addresses.
|
|
||||||
func ifaceIPAddrs(iface netIface, ipv ipVersion) (ips []net.IP, err error) {
|
|
||||||
addrs, err := iface.Addrs()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, a := range addrs {
|
|
||||||
var ip net.IP
|
|
||||||
switch a := a.(type) {
|
|
||||||
case *net.IPAddr:
|
|
||||||
ip = a.IP
|
|
||||||
case *net.IPNet:
|
|
||||||
ip = a.IP
|
|
||||||
default:
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// Assume that net.(*Interface).Addrs can only return valid IPv4
|
|
||||||
// and IPv6 addresses. Thus, if it isn't an IPv4 address, it
|
|
||||||
// must be an IPv6 one.
|
|
||||||
switch ipv {
|
|
||||||
case ipVersion4:
|
|
||||||
if ip4 := ip.To4(); ip4 != nil {
|
|
||||||
ips = append(ips, ip4)
|
|
||||||
}
|
|
||||||
case ipVersion6:
|
|
||||||
if ip6 := ip.To4(); ip6 == nil {
|
|
||||||
ips = append(ips, ip)
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
return nil, fmt.Errorf("invalid ip version %d", ipv)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return ips, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Currently used defaults for ifaceDNSAddrs.
|
// Currently used defaults for ifaceDNSAddrs.
|
||||||
const (
|
const (
|
||||||
defaultMaxAttempts int = 10
|
defaultMaxAttempts int = 10
|
||||||
|
|
||||||
defaultBackoff time.Duration = 500 * time.Millisecond
|
defaultBackoff time.Duration = 500 * time.Millisecond
|
||||||
)
|
)
|
||||||
|
|
||||||
// ifaceDNSIPAddrs returns IP addresses of the interface suitable to send to
|
|
||||||
// clients as DNS addresses. If err is nil, addrs contains either no addresses
|
|
||||||
// or at least two.
|
|
||||||
//
|
|
||||||
// It makes up to maxAttempts attempts to get the addresses if there are none,
|
|
||||||
// each time using the provided backoff. Sometimes an interface needs a few
|
|
||||||
// seconds to really ititialize.
|
|
||||||
//
|
|
||||||
// See https://github.com/AdguardTeam/AdGuardHome/issues/2304.
|
|
||||||
func ifaceDNSIPAddrs(
|
|
||||||
iface netIface,
|
|
||||||
ipv ipVersion,
|
|
||||||
maxAttempts int,
|
|
||||||
backoff time.Duration,
|
|
||||||
) (addrs []net.IP, err error) {
|
|
||||||
var n int
|
|
||||||
for n = 1; n <= maxAttempts; n++ {
|
|
||||||
addrs, err = ifaceIPAddrs(iface, ipv)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("getting ip addrs: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(addrs) > 0 {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug("dhcpv%d: attempt %d: no ip addresses", ipv, n)
|
|
||||||
|
|
||||||
time.Sleep(backoff)
|
|
||||||
}
|
|
||||||
|
|
||||||
switch len(addrs) {
|
|
||||||
case 0:
|
|
||||||
// Don't return errors in case the users want to try and enable
|
|
||||||
// the DHCP server later.
|
|
||||||
t := time.Duration(n) * backoff
|
|
||||||
log.Error("dhcpv%d: no ip for iface after %d attempts and %s", ipv, n, t)
|
|
||||||
|
|
||||||
return nil, nil
|
|
||||||
case 1:
|
|
||||||
// Some Android devices use 8.8.8.8 if there is not a secondary
|
|
||||||
// DNS server. Fix that by setting the secondary DNS address to
|
|
||||||
// the same address.
|
|
||||||
//
|
|
||||||
// See https://github.com/AdguardTeam/AdGuardHome/issues/1708.
|
|
||||||
log.Debug("dhcpv%d: setting secondary dns ip to itself", ipv)
|
|
||||||
addrs = append(addrs, addrs[0])
|
|
||||||
default:
|
|
||||||
// Go on.
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Debug("dhcpv%d: got addresses %s after %d attempts", ipv, addrs, n)
|
|
||||||
|
|
||||||
return addrs, nil
|
|
||||||
}
|
|
||||||
|
|
|
@ -10,6 +10,7 @@ import (
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
||||||
"github.com/AdguardTeam/golibs/errors"
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
"github.com/AdguardTeam/golibs/log"
|
"github.com/AdguardTeam/golibs/log"
|
||||||
"github.com/AdguardTeam/golibs/netutil"
|
"github.com/AdguardTeam/golibs/netutil"
|
||||||
|
@ -607,7 +608,12 @@ func (s *v6Server) Start() (err error) {
|
||||||
|
|
||||||
log.Debug("dhcpv6: starting...")
|
log.Debug("dhcpv6: starting...")
|
||||||
|
|
||||||
dnsIPAddrs, err := ifaceDNSIPAddrs(iface, ipVersion6, defaultMaxAttempts, defaultBackoff)
|
dnsIPAddrs, err := aghnet.IfaceDNSIPAddrs(
|
||||||
|
iface,
|
||||||
|
aghnet.IPVersion6,
|
||||||
|
defaultMaxAttempts,
|
||||||
|
defaultBackoff,
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("interface %s: %w", ifaceName, err)
|
return fmt.Errorf("interface %s: %w", ifaceName, err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -114,6 +114,7 @@ underscores() {
|
||||||
-e '_bsd.go'\
|
-e '_bsd.go'\
|
||||||
-e '_darwin.go'\
|
-e '_darwin.go'\
|
||||||
-e '_freebsd.go'\
|
-e '_freebsd.go'\
|
||||||
|
-e '_openbsd.go'\
|
||||||
-e '_linux.go'\
|
-e '_linux.go'\
|
||||||
-e '_little.go'\
|
-e '_little.go'\
|
||||||
-e '_others.go'\
|
-e '_others.go'\
|
||||||
|
|
Loading…
Reference in a new issue