6a696e03e7
* migrate to golang.zx2c4.com/wireguard/wgctrl This commit introduces the usage of wgctrl. It avoids the usage of exec calls of the wg command and parsing the output of `wg show`. Signed-off-by: leonnicolas <leonloechner@gmx.de> * vendor wgctrl Signed-off-by: leonnicolas <leonloechner@gmx.de> * apply suggestions from code review Remove wireguard.Enpoint struct and use net.UDPAddr for the resolved endpoint and addr string (dnsanme:port) if a DN was supplied. Signed-off-by: leonnicolas <leonloechner@gmx.de> * pkg/*: use wireguard.Enpoint This commit introduces the wireguard.Enpoint struct. It encapsulates a DN name with port and a net.UPDAddr. The fields are private and only accessible over exported Methods to avoid accidental modification. Also iptables.GetProtocol is improved to avoid ipv4 rules being applied by `ip6tables`. Signed-off-by: leonnicolas <leonloechner@gmx.de> * pkg/wireguard/conf_test.go: add tests for Endpoint Signed-off-by: leonnicolas <leonloechner@gmx.de> * cmd/kg/main.go: validate port range Signed-off-by: leonnicolas <leonloechner@gmx.de> * add suggestions from review Signed-off-by: leonnicolas <leonloechner@gmx.de> * pkg/mesh/mesh.go: use Equal func Implement an Equal func for Enpoint and use it instead of comparing strings. Signed-off-by: leonnicolas <leonloechner@gmx.de> * cmd/kgctl/main.go: check port range Signed-off-by: leonnicolas <leonloechner@gmx.de> * vendor Signed-off-by: leonnicolas <leonloechner@gmx.de>
89 lines
2.0 KiB
Go
89 lines
2.0 KiB
Go
//go:build linux
|
|
// +build linux
|
|
|
|
package socket
|
|
|
|
import (
|
|
"os"
|
|
"unsafe"
|
|
|
|
"golang.org/x/net/bpf"
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
// SetBPF attaches an assembled BPF program to a Conn.
|
|
func (c *Conn) SetBPF(filter []bpf.RawInstruction) error {
|
|
// We can't point to the first instruction in the array if no instructions
|
|
// are present.
|
|
if len(filter) == 0 {
|
|
return os.NewSyscallError("setsockopt", unix.EINVAL)
|
|
}
|
|
|
|
prog := unix.SockFprog{
|
|
Len: uint16(len(filter)),
|
|
Filter: (*unix.SockFilter)(unsafe.Pointer(&filter[0])),
|
|
}
|
|
|
|
return c.SetsockoptSockFprog(unix.SOL_SOCKET, unix.SO_ATTACH_FILTER, &prog)
|
|
}
|
|
|
|
// RemoveBPF removes a BPF filter from a Conn.
|
|
func (c *Conn) RemoveBPF() error {
|
|
// 0 argument is ignored.
|
|
return c.SetsockoptInt(unix.SOL_SOCKET, unix.SO_DETACH_FILTER, 0)
|
|
}
|
|
|
|
// SetsockoptSockFprog wraps setsockopt(2) for unix.SockFprog values.
|
|
func (c *Conn) SetsockoptSockFprog(level, opt int, fprog *unix.SockFprog) error {
|
|
const op = "setsockopt"
|
|
|
|
var err error
|
|
doErr := c.control(op, func(fd int) error {
|
|
err = unix.SetsockoptSockFprog(fd, level, opt, fprog)
|
|
return err
|
|
})
|
|
if doErr != nil {
|
|
return doErr
|
|
}
|
|
|
|
return os.NewSyscallError(op, err)
|
|
}
|
|
|
|
// GetSockoptTpacketStats wraps getsockopt(2) for getting TpacketStats
|
|
func (c *Conn) GetSockoptTpacketStats(level, name int) (*unix.TpacketStats, error) {
|
|
const op = "getsockopt"
|
|
|
|
var (
|
|
stats *unix.TpacketStats
|
|
err error
|
|
)
|
|
|
|
doErr := c.control(op, func(fd int) error {
|
|
stats, err = unix.GetsockoptTpacketStats(fd, level, name)
|
|
return err
|
|
})
|
|
if doErr != nil {
|
|
return stats, doErr
|
|
}
|
|
return stats, os.NewSyscallError(op, err)
|
|
}
|
|
|
|
// GetSockoptTpacketStatsV3 wraps getsockopt(2) for getting TpacketStatsV3
|
|
func (c *Conn) GetSockoptTpacketStatsV3(level, name int) (*unix.TpacketStatsV3, error) {
|
|
const op = "getsockopt"
|
|
|
|
var (
|
|
stats *unix.TpacketStatsV3
|
|
err error
|
|
)
|
|
|
|
doErr := c.control(op, func(fd int) error {
|
|
stats, err = unix.GetsockoptTpacketStatsV3(fd, level, name)
|
|
return err
|
|
})
|
|
if doErr != nil {
|
|
return stats, doErr
|
|
}
|
|
return stats, os.NewSyscallError(op, err)
|
|
}
|