mirror of
https://github.com/fosrl/newt.git
synced 2026-03-26 20:46:41 +00:00
Compare commits
93 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
e1edbcea07 | ||
|
|
392e4c83bf | ||
|
|
a85454e770 | ||
|
|
068145c539 | ||
|
|
91a035f4ab | ||
|
|
beaf386615 | ||
|
|
e474866f84 | ||
|
|
7920295b8c | ||
|
|
bf7882eacc | ||
|
|
86a7d79092 | ||
|
|
1c22555bd4 | ||
|
|
30ade8102d | ||
|
|
6c6ba45024 | ||
|
|
3f84354e7f | ||
|
|
ec399e9d4d | ||
|
|
19f143fc6a | ||
|
|
6d5e099681 | ||
|
|
d6ea37f45c | ||
|
|
de3d358fe9 | ||
|
|
4bcd2ffc59 | ||
|
|
06e175ac9a | ||
|
|
6e79eef224 | ||
|
|
23dc230654 | ||
|
|
9b8bc7b66e | ||
|
|
c5ae4a8f11 | ||
|
|
b2600b0dab | ||
|
|
1656141599 | ||
|
|
1bf89a2cc9 | ||
|
|
555e1ddc7c | ||
|
|
514c94519e | ||
|
|
1a3eaedfa5 | ||
|
|
01e2ba31b7 | ||
|
|
9738565a3a | ||
|
|
c42a606bbd | ||
|
|
5977667291 | ||
|
|
556be90b7e | ||
|
|
5d04be92f7 | ||
|
|
b7af49d759 | ||
|
|
00a5fa1f37 | ||
|
|
d256d6c746 | ||
|
|
2cc957d55f | ||
|
|
d98eaa88b3 | ||
|
|
5b884042cd | ||
|
|
2265b61381 | ||
|
|
60dac98514 | ||
|
|
759e4c5bac | ||
|
|
8609be130e | ||
|
|
e06b8de0a7 | ||
|
|
0af6fb8fef | ||
|
|
9526768dfe | ||
|
|
051ab6ca9d | ||
|
|
50fbfdc262 | ||
|
|
5fb60baa14 | ||
|
|
ea2e166973 | ||
|
|
a8549f32e9 | ||
|
|
ad6bbd47ad | ||
|
|
f6b7aaedfd | ||
|
|
2055b773fd | ||
|
|
1c9c98e2f6 | ||
|
|
9c57677493 | ||
|
|
ff825a51dd | ||
|
|
cdfc5733f0 | ||
|
|
cadbb50bdf | ||
|
|
4ac33c824b | ||
|
|
d91228f636 | ||
|
|
6c3b85bb9a | ||
|
|
77d99f1722 | ||
|
|
43e1341352 | ||
|
|
daa1a90e05 | ||
|
|
3739c237c7 | ||
|
|
ddde1758e5 | ||
|
|
dca29781f3 | ||
|
|
91bfd69179 | ||
|
|
060d876429 | ||
|
|
69952efe89 | ||
|
|
66949ca047 | ||
|
|
8c12db6dff | ||
|
|
b84d465763 | ||
|
|
a62567997d | ||
|
|
9bb4bbccb8 | ||
|
|
c3fad797e5 | ||
|
|
0168b4796e | ||
|
|
6c05d76c88 | ||
|
|
a701add824 | ||
|
|
d754cea397 | ||
|
|
31d52ad3ff | ||
|
|
e1ee4dc8f2 | ||
|
|
f9b6f36b4f | ||
|
|
0e961761b8 | ||
|
|
baf1b9b972 | ||
|
|
f078136b5a | ||
|
|
ca341a8bb0 | ||
|
|
1cf75b00ff |
@@ -1,5 +1,5 @@
|
|||||||
# Copy this file to .env and fill in your values
|
# Copy this file to .env and fill in your values
|
||||||
# Required for connecting to Pangolin service
|
# Required for connecting to Pangolin service
|
||||||
PANGOLIN_ENDPOINT=https://example.com
|
PANGOLIN_ENDPOINT=https://app.pangolin.net
|
||||||
NEWT_ID=changeme-id
|
NEWT_ID=changeme-id
|
||||||
NEWT_SECRET=changeme-secret
|
NEWT_SECRET=changeme-secret
|
||||||
1021
.github/workflows/cicd.yml
vendored
1021
.github/workflows/cicd.yml
vendored
File diff suppressed because it is too large
Load Diff
23
.github/workflows/nix-build.yml
vendored
Normal file
23
.github/workflows/nix-build.yml
vendored
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
name: Build Nix package
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
pull_request:
|
||||||
|
paths:
|
||||||
|
- go.mod
|
||||||
|
- go.sum
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
nix-build:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v6
|
||||||
|
|
||||||
|
- name: Install Nix
|
||||||
|
uses: DeterminateSystems/nix-installer-action@main
|
||||||
|
|
||||||
|
- name: Build flake package
|
||||||
|
run: |
|
||||||
|
nix build .#pangolin-newt -L
|
||||||
48
.github/workflows/nix-dependabot-update-hash.yml
vendored
Normal file
48
.github/workflows/nix-dependabot-update-hash.yml
vendored
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
name: Update Nix Package Hash On Dependabot PRs
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types: [opened, synchronize]
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
nix-update:
|
||||||
|
if: github.actor == 'dependabot[bot]'
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: write
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v6
|
||||||
|
with:
|
||||||
|
ref: ${{ github.head_ref }}
|
||||||
|
token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Install Nix
|
||||||
|
uses: DeterminateSystems/nix-installer-action@main
|
||||||
|
|
||||||
|
- name: Run nix-update
|
||||||
|
run: |
|
||||||
|
nix run nixpkgs#nix-update -- --flake pangolin-newt --no-src --version skip
|
||||||
|
|
||||||
|
- name: Check for changes
|
||||||
|
id: changes
|
||||||
|
run: |
|
||||||
|
if git diff --quiet; then
|
||||||
|
echo "changed=false" >> "$GITHUB_OUTPUT"
|
||||||
|
else
|
||||||
|
echo "changed=true" >> "$GITHUB_OUTPUT"
|
||||||
|
fi
|
||||||
|
|
||||||
|
- name: Commit and push changes
|
||||||
|
if: steps.changes.outputs.changed == 'true'
|
||||||
|
run: |
|
||||||
|
git config user.name "dependabot[bot]"
|
||||||
|
git config user.email "dependabot[bot]@users.noreply.github.com"
|
||||||
|
|
||||||
|
git add .
|
||||||
|
git commit -m "chore(nix): fix hash for updated go dependencies"
|
||||||
|
git push
|
||||||
37
.github/workflows/stale-bot.yml
vendored
Normal file
37
.github/workflows/stale-bot.yml
vendored
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
name: Mark and Close Stale Issues
|
||||||
|
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: '0 0 * * *'
|
||||||
|
workflow_dispatch: # Allow manual trigger
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: write # only for delete-branch option
|
||||||
|
issues: write
|
||||||
|
pull-requests: write
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
stale:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/stale@997185467fa4f803885201cee163a9f38240193d # v10.1.1
|
||||||
|
with:
|
||||||
|
days-before-stale: 14
|
||||||
|
days-before-close: 14
|
||||||
|
stale-issue-message: 'This issue has been automatically marked as stale due to 14 days of inactivity. It will be closed in 14 days if no further activity occurs.'
|
||||||
|
close-issue-message: 'This issue has been automatically closed due to inactivity. If you believe this is still relevant, please open a new issue with up-to-date information.'
|
||||||
|
stale-issue-label: 'stale'
|
||||||
|
|
||||||
|
exempt-issue-labels: 'needs investigating, networking, new feature, reverse proxy, bug, api, authentication, documentation, enhancement, help wanted, good first issue, question'
|
||||||
|
|
||||||
|
exempt-all-issue-assignees: true
|
||||||
|
|
||||||
|
only-labels: ''
|
||||||
|
exempt-pr-labels: ''
|
||||||
|
days-before-pr-stale: -1
|
||||||
|
days-before-pr-close: -1
|
||||||
|
|
||||||
|
operations-per-run: 100
|
||||||
|
remove-stale-when-updated: true
|
||||||
|
delete-branch: false
|
||||||
|
enable-statistics: true
|
||||||
4
.github/workflows/test.yml
vendored
4
.github/workflows/test.yml
vendored
@@ -28,10 +28,10 @@ jobs:
|
|||||||
- go-build-release-windows-amd64
|
- go-build-release-windows-amd64
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
|
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
|
uses: actions/setup-go@7a3fe6cf4cb3a834922a1244abfce67bcef6a0c5 # v6.2.0
|
||||||
with:
|
with:
|
||||||
go-version: 1.25
|
go-version: 1.25
|
||||||
|
|
||||||
|
|||||||
2
.gitignore
vendored
2
.gitignore
vendored
@@ -6,3 +6,5 @@ nohup.out
|
|||||||
certs/
|
certs/
|
||||||
newt_arm64
|
newt_arm64
|
||||||
key
|
key
|
||||||
|
/.direnv/
|
||||||
|
/result*
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
FROM golang:1.25-alpine AS builder
|
# FROM golang:1.25-alpine AS builder
|
||||||
|
FROM public.ecr.aws/docker/library/golang:1.25-alpine AS builder
|
||||||
|
|
||||||
# Install git and ca-certificates
|
# Install git and ca-certificates
|
||||||
RUN apk --no-cache add ca-certificates git tzdata
|
RUN apk --no-cache add ca-certificates git tzdata
|
||||||
@@ -18,7 +19,7 @@ COPY . .
|
|||||||
# Build the application
|
# Build the application
|
||||||
RUN CGO_ENABLED=0 GOOS=linux go build -ldflags="-s -w" -o /newt
|
RUN CGO_ENABLED=0 GOOS=linux go build -ldflags="-s -w" -o /newt
|
||||||
|
|
||||||
FROM alpine:3.23 AS runner
|
FROM public.ecr.aws/docker/library/alpine:3.23 AS runner
|
||||||
|
|
||||||
RUN apk --no-cache add ca-certificates tzdata iputils
|
RUN apk --no-cache add ca-certificates tzdata iputils
|
||||||
|
|
||||||
|
|||||||
23
Makefile
23
Makefile
@@ -2,6 +2,9 @@
|
|||||||
|
|
||||||
all: local
|
all: local
|
||||||
|
|
||||||
|
VERSION ?= dev
|
||||||
|
LDFLAGS = -X main.newtVersion=$(VERSION)
|
||||||
|
|
||||||
local:
|
local:
|
||||||
CGO_ENABLED=0 go build -o ./bin/newt
|
CGO_ENABLED=0 go build -o ./bin/newt
|
||||||
|
|
||||||
@@ -40,31 +43,31 @@ go-build-release: \
|
|||||||
go-build-release-freebsd-arm64
|
go-build-release-freebsd-arm64
|
||||||
|
|
||||||
go-build-release-linux-arm64:
|
go-build-release-linux-arm64:
|
||||||
CGO_ENABLED=0 GOOS=linux GOARCH=arm64 go build -o bin/newt_linux_arm64
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm64 go build -ldflags "$(LDFLAGS)" -o bin/newt_linux_arm64
|
||||||
|
|
||||||
go-build-release-linux-arm32-v7:
|
go-build-release-linux-arm32-v7:
|
||||||
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=7 go build -o bin/newt_linux_arm32
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=7 go build -ldflags "$(LDFLAGS)" -o bin/newt_linux_arm32
|
||||||
|
|
||||||
go-build-release-linux-arm32-v6:
|
go-build-release-linux-arm32-v6:
|
||||||
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=6 go build -o bin/newt_linux_arm32v6
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=6 go build -ldflags "$(LDFLAGS)" -o bin/newt_linux_arm32v6
|
||||||
|
|
||||||
go-build-release-linux-amd64:
|
go-build-release-linux-amd64:
|
||||||
CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -o bin/newt_linux_amd64
|
CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -ldflags "$(LDFLAGS)" -o bin/newt_linux_amd64
|
||||||
|
|
||||||
go-build-release-linux-riscv64:
|
go-build-release-linux-riscv64:
|
||||||
CGO_ENABLED=0 GOOS=linux GOARCH=riscv64 go build -o bin/newt_linux_riscv64
|
CGO_ENABLED=0 GOOS=linux GOARCH=riscv64 go build -ldflags "$(LDFLAGS)" -o bin/newt_linux_riscv64
|
||||||
|
|
||||||
go-build-release-darwin-arm64:
|
go-build-release-darwin-arm64:
|
||||||
CGO_ENABLED=0 GOOS=darwin GOARCH=arm64 go build -o bin/newt_darwin_arm64
|
CGO_ENABLED=0 GOOS=darwin GOARCH=arm64 go build -ldflags "$(LDFLAGS)" -o bin/newt_darwin_arm64
|
||||||
|
|
||||||
go-build-release-darwin-amd64:
|
go-build-release-darwin-amd64:
|
||||||
CGO_ENABLED=0 GOOS=darwin GOARCH=amd64 go build -o bin/newt_darwin_amd64
|
CGO_ENABLED=0 GOOS=darwin GOARCH=amd64 go build -ldflags "$(LDFLAGS)" -o bin/newt_darwin_amd64
|
||||||
|
|
||||||
go-build-release-windows-amd64:
|
go-build-release-windows-amd64:
|
||||||
CGO_ENABLED=0 GOOS=windows GOARCH=amd64 go build -o bin/newt_windows_amd64.exe
|
CGO_ENABLED=0 GOOS=windows GOARCH=amd64 go build -ldflags "$(LDFLAGS)" -o bin/newt_windows_amd64.exe
|
||||||
|
|
||||||
go-build-release-freebsd-amd64:
|
go-build-release-freebsd-amd64:
|
||||||
CGO_ENABLED=0 GOOS=freebsd GOARCH=amd64 go build -o bin/newt_freebsd_amd64
|
CGO_ENABLED=0 GOOS=freebsd GOARCH=amd64 go build -ldflags "$(LDFLAGS)" -o bin/newt_freebsd_amd64
|
||||||
|
|
||||||
go-build-release-freebsd-arm64:
|
go-build-release-freebsd-arm64:
|
||||||
CGO_ENABLED=0 GOOS=freebsd GOARCH=arm64 go build -o bin/newt_freebsd_arm64
|
CGO_ENABLED=0 GOOS=freebsd GOARCH=arm64 go build -ldflags "$(LDFLAGS)" -o bin/newt_freebsd_arm64
|
||||||
150
authdaemon.go
Normal file
150
authdaemon.go
Normal file
@@ -0,0 +1,150 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"github.com/fosrl/newt/authdaemon"
|
||||||
|
"github.com/fosrl/newt/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultPrincipalsPath = "/var/run/auth-daemon/principals"
|
||||||
|
defaultCACertPath = "/etc/ssh/ca.pem"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
errPresharedKeyRequired = errors.New("auth-daemon-key is required when --auth-daemon is enabled")
|
||||||
|
errRootRequired = errors.New("auth-daemon must be run as root (use sudo)")
|
||||||
|
authDaemonServer *authdaemon.Server // Global auth daemon server instance
|
||||||
|
)
|
||||||
|
|
||||||
|
// startAuthDaemon initializes and starts the auth daemon in the background.
|
||||||
|
// It validates requirements (Linux, root, preshared key) and starts the server
|
||||||
|
// in a goroutine so it runs alongside normal newt operation.
|
||||||
|
func startAuthDaemon(ctx context.Context) error {
|
||||||
|
// Validation
|
||||||
|
if runtime.GOOS != "linux" {
|
||||||
|
return fmt.Errorf("auth-daemon is only supported on Linux, not %s", runtime.GOOS)
|
||||||
|
}
|
||||||
|
if os.Geteuid() != 0 {
|
||||||
|
return errRootRequired
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use defaults if not set
|
||||||
|
principalsFile := authDaemonPrincipalsFile
|
||||||
|
if principalsFile == "" {
|
||||||
|
principalsFile = defaultPrincipalsPath
|
||||||
|
}
|
||||||
|
caCertPath := authDaemonCACertPath
|
||||||
|
if caCertPath == "" {
|
||||||
|
caCertPath = defaultCACertPath
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create auth daemon server
|
||||||
|
cfg := authdaemon.Config{
|
||||||
|
DisableHTTPS: true, // We run without HTTP server in newt
|
||||||
|
PresharedKey: "this-key-is-not-used", // Not used in embedded mode, but set to non-empty to satisfy validation
|
||||||
|
PrincipalsFilePath: principalsFile,
|
||||||
|
CACertPath: caCertPath,
|
||||||
|
Force: true,
|
||||||
|
GenerateRandomPassword: authDaemonGenerateRandomPassword,
|
||||||
|
}
|
||||||
|
|
||||||
|
srv, err := authdaemon.NewServer(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("create auth daemon server: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
authDaemonServer = srv
|
||||||
|
|
||||||
|
// Start the auth daemon in a goroutine so it runs alongside newt
|
||||||
|
go func() {
|
||||||
|
logger.Info("Auth daemon starting (native mode, no HTTP server)")
|
||||||
|
if err := srv.Run(ctx); err != nil {
|
||||||
|
logger.Error("Auth daemon error: %v", err)
|
||||||
|
}
|
||||||
|
logger.Info("Auth daemon stopped")
|
||||||
|
}()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// runPrincipalsCmd executes the principals subcommand logic
|
||||||
|
func runPrincipalsCmd(args []string) {
|
||||||
|
opts := struct {
|
||||||
|
PrincipalsFile string
|
||||||
|
Username string
|
||||||
|
}{
|
||||||
|
PrincipalsFile: defaultPrincipalsPath,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse flags manually
|
||||||
|
for i := 0; i < len(args); i++ {
|
||||||
|
switch args[i] {
|
||||||
|
case "--principals-file":
|
||||||
|
if i+1 >= len(args) {
|
||||||
|
fmt.Fprintf(os.Stderr, "Error: --principals-file requires a value\n")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
opts.PrincipalsFile = args[i+1]
|
||||||
|
i++
|
||||||
|
case "--username":
|
||||||
|
if i+1 >= len(args) {
|
||||||
|
fmt.Fprintf(os.Stderr, "Error: --username requires a value\n")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
opts.Username = args[i+1]
|
||||||
|
i++
|
||||||
|
case "--help", "-h":
|
||||||
|
printPrincipalsHelp()
|
||||||
|
os.Exit(0)
|
||||||
|
default:
|
||||||
|
fmt.Fprintf(os.Stderr, "Error: unknown flag: %s\n", args[i])
|
||||||
|
printPrincipalsHelp()
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validation
|
||||||
|
if opts.Username == "" {
|
||||||
|
fmt.Fprintf(os.Stderr, "Error: username is required\n")
|
||||||
|
printPrincipalsHelp()
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get principals
|
||||||
|
list, err := authdaemon.GetPrincipals(opts.PrincipalsFile, opts.Username)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(os.Stderr, "Error: %v\n", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if len(list) == 0 {
|
||||||
|
fmt.Println("")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for _, principal := range list {
|
||||||
|
fmt.Println(principal)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func printPrincipalsHelp() {
|
||||||
|
fmt.Fprintf(os.Stderr, `Usage: newt principals [flags]
|
||||||
|
|
||||||
|
Output principals for a username (for AuthorizedPrincipalsCommand in sshd_config).
|
||||||
|
Read the principals file and print principals that match the given username, one per line.
|
||||||
|
Configure in sshd_config with AuthorizedPrincipalsCommand and %%u for the username.
|
||||||
|
|
||||||
|
Flags:
|
||||||
|
--principals-file string Path to the principals file (default "%s")
|
||||||
|
--username string Username to look up (required)
|
||||||
|
--help, -h Show this help message
|
||||||
|
|
||||||
|
Example:
|
||||||
|
newt principals --username alice
|
||||||
|
|
||||||
|
`, defaultPrincipalsPath)
|
||||||
|
}
|
||||||
27
authdaemon/connection.go
Normal file
27
authdaemon/connection.go
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/fosrl/newt/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ProcessConnection runs the same logic as POST /connection: CA cert, user create/reconcile, principals.
|
||||||
|
// Use this when DisableHTTPS is true (e.g. embedded in Newt) instead of calling the API.
|
||||||
|
func (s *Server) ProcessConnection(req ConnectionRequest) {
|
||||||
|
logger.Info("connection: niceId=%q username=%q metadata.sudoMode=%q metadata.sudoCommands=%v metadata.homedir=%v metadata.groups=%v",
|
||||||
|
req.NiceId, req.Username, req.Metadata.SudoMode, req.Metadata.SudoCommands, req.Metadata.Homedir, req.Metadata.Groups)
|
||||||
|
|
||||||
|
cfg := &s.cfg
|
||||||
|
if cfg.CACertPath != "" {
|
||||||
|
if err := writeCACertIfNotExists(cfg.CACertPath, req.CaCert, cfg.Force); err != nil {
|
||||||
|
logger.Warn("auth-daemon: write CA cert: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := ensureUser(req.Username, req.Metadata, s.cfg.GenerateRandomPassword); err != nil {
|
||||||
|
logger.Warn("auth-daemon: ensure user: %v", err)
|
||||||
|
}
|
||||||
|
if cfg.PrincipalsFilePath != "" {
|
||||||
|
if err := writePrincipals(cfg.PrincipalsFilePath, req.Username, req.NiceId); err != nil {
|
||||||
|
logger.Warn("auth-daemon: write principals: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
396
authdaemon/host_linux.go
Normal file
396
authdaemon/host_linux.go
Normal file
@@ -0,0 +1,396 @@
|
|||||||
|
//go:build linux
|
||||||
|
|
||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"crypto/rand"
|
||||||
|
"encoding/hex"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"os/user"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/fosrl/newt/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
// writeCACertIfNotExists writes contents to path. If the file already exists: when force is false, skip; when force is true, overwrite only if content differs.
|
||||||
|
func writeCACertIfNotExists(path, contents string, force bool) error {
|
||||||
|
contents = strings.TrimSpace(contents)
|
||||||
|
if contents != "" && !strings.HasSuffix(contents, "\n") {
|
||||||
|
contents += "\n"
|
||||||
|
}
|
||||||
|
existing, err := os.ReadFile(path)
|
||||||
|
if err == nil {
|
||||||
|
existingStr := strings.TrimSpace(string(existing))
|
||||||
|
if existingStr != "" && !strings.HasSuffix(existingStr, "\n") {
|
||||||
|
existingStr += "\n"
|
||||||
|
}
|
||||||
|
if existingStr == contents {
|
||||||
|
logger.Debug("auth-daemon: CA cert unchanged at %s, skipping write", path)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if !force {
|
||||||
|
logger.Debug("auth-daemon: CA cert already exists at %s, skipping write (Force disabled)", path)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
} else if !os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("read %s: %w", path, err)
|
||||||
|
}
|
||||||
|
dir := filepath.Dir(path)
|
||||||
|
if err := os.MkdirAll(dir, 0755); err != nil {
|
||||||
|
return fmt.Errorf("mkdir %s: %w", dir, err)
|
||||||
|
}
|
||||||
|
if err := os.WriteFile(path, []byte(contents), 0644); err != nil {
|
||||||
|
return fmt.Errorf("write CA cert: %w", err)
|
||||||
|
}
|
||||||
|
logger.Info("auth-daemon: wrote CA cert to %s", path)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// writePrincipals updates the principals file at path: JSON object keyed by username, value is array of principals. Adds username and niceId to that user's list (deduped).
|
||||||
|
func writePrincipals(path, username, niceId string) error {
|
||||||
|
if path == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
username = strings.TrimSpace(username)
|
||||||
|
niceId = strings.TrimSpace(niceId)
|
||||||
|
if username == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
data := make(map[string][]string)
|
||||||
|
if raw, err := os.ReadFile(path); err == nil {
|
||||||
|
_ = json.Unmarshal(raw, &data)
|
||||||
|
}
|
||||||
|
list := data[username]
|
||||||
|
seen := make(map[string]struct{}, len(list)+2)
|
||||||
|
for _, p := range list {
|
||||||
|
seen[p] = struct{}{}
|
||||||
|
}
|
||||||
|
for _, p := range []string{username, niceId} {
|
||||||
|
if p == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _, ok := seen[p]; !ok {
|
||||||
|
seen[p] = struct{}{}
|
||||||
|
list = append(list, p)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
data[username] = list
|
||||||
|
body, err := json.Marshal(data)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("marshal principals: %w", err)
|
||||||
|
}
|
||||||
|
dir := filepath.Dir(path)
|
||||||
|
if err := os.MkdirAll(dir, 0755); err != nil {
|
||||||
|
return fmt.Errorf("mkdir %s: %w", dir, err)
|
||||||
|
}
|
||||||
|
if err := os.WriteFile(path, body, 0644); err != nil {
|
||||||
|
return fmt.Errorf("write principals: %w", err)
|
||||||
|
}
|
||||||
|
logger.Debug("auth-daemon: wrote principals to %s", path)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// sudoGroup returns the name of the sudo group (wheel or sudo) that exists on the system. Prefers wheel.
|
||||||
|
func sudoGroup() string {
|
||||||
|
f, err := os.Open("/etc/group")
|
||||||
|
if err != nil {
|
||||||
|
return "sudo"
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
sc := bufio.NewScanner(f)
|
||||||
|
hasWheel := false
|
||||||
|
hasSudo := false
|
||||||
|
for sc.Scan() {
|
||||||
|
line := sc.Text()
|
||||||
|
if strings.HasPrefix(line, "wheel:") {
|
||||||
|
hasWheel = true
|
||||||
|
}
|
||||||
|
if strings.HasPrefix(line, "sudo:") {
|
||||||
|
hasSudo = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if hasWheel {
|
||||||
|
return "wheel"
|
||||||
|
}
|
||||||
|
if hasSudo {
|
||||||
|
return "sudo"
|
||||||
|
}
|
||||||
|
return "sudo"
|
||||||
|
}
|
||||||
|
|
||||||
|
// setRandomPassword generates a random password and sets it for username via chpasswd.
|
||||||
|
// Used when GenerateRandomPassword is true so SSH with PermitEmptyPasswords no can accept the user.
|
||||||
|
func setRandomPassword(username string) error {
|
||||||
|
b := make([]byte, 16)
|
||||||
|
if _, err := rand.Read(b); err != nil {
|
||||||
|
return fmt.Errorf("generate password: %w", err)
|
||||||
|
}
|
||||||
|
password := hex.EncodeToString(b)
|
||||||
|
cmd := exec.Command("chpasswd")
|
||||||
|
cmd.Stdin = strings.NewReader(username + ":" + password)
|
||||||
|
if out, err := cmd.CombinedOutput(); err != nil {
|
||||||
|
return fmt.Errorf("chpasswd: %w (output: %s)", err, string(out))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
const skelDir = "/etc/skel"
|
||||||
|
|
||||||
|
// copySkelInto copies files from srcDir (e.g. /etc/skel) into dstDir (e.g. user's home).
|
||||||
|
// Only creates files that don't already exist. All created paths are chowned to uid:gid.
|
||||||
|
func copySkelInto(srcDir, dstDir string, uid, gid int) {
|
||||||
|
entries, err := os.ReadDir(srcDir)
|
||||||
|
if err != nil {
|
||||||
|
if !os.IsNotExist(err) {
|
||||||
|
logger.Warn("auth-daemon: read %s: %v", srcDir, err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for _, e := range entries {
|
||||||
|
name := e.Name()
|
||||||
|
src := filepath.Join(srcDir, name)
|
||||||
|
dst := filepath.Join(dstDir, name)
|
||||||
|
if e.IsDir() {
|
||||||
|
if st, err := os.Stat(dst); err == nil && st.IsDir() {
|
||||||
|
copySkelInto(src, dst, uid, gid)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(dst, 0755); err != nil {
|
||||||
|
logger.Warn("auth-daemon: mkdir %s: %v", dst, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.Chown(dst, uid, gid); err != nil {
|
||||||
|
logger.Warn("auth-daemon: chown %s: %v", dst, err)
|
||||||
|
}
|
||||||
|
copySkelInto(src, dst, uid, gid)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _, err := os.Stat(dst); err == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
data, err := os.ReadFile(src)
|
||||||
|
if err != nil {
|
||||||
|
logger.Warn("auth-daemon: read %s: %v", src, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.WriteFile(dst, data, 0644); err != nil {
|
||||||
|
logger.Warn("auth-daemon: write %s: %v", dst, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.Chown(dst, uid, gid); err != nil {
|
||||||
|
logger.Warn("auth-daemon: chown %s: %v", dst, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensureUser creates the system user if missing, or reconciles sudo and homedir to match meta.
|
||||||
|
func ensureUser(username string, meta ConnectionMetadata, generateRandomPassword bool) error {
|
||||||
|
if username == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
u, err := user.Lookup(username)
|
||||||
|
if err != nil {
|
||||||
|
if _, ok := err.(user.UnknownUserError); !ok {
|
||||||
|
return fmt.Errorf("lookup user %s: %w", username, err)
|
||||||
|
}
|
||||||
|
return createUser(username, meta, generateRandomPassword)
|
||||||
|
}
|
||||||
|
return reconcileUser(u, meta)
|
||||||
|
}
|
||||||
|
|
||||||
|
// desiredGroups returns the exact list of supplementary groups the user should have:
|
||||||
|
// meta.Groups plus the sudo group when meta.SudoMode is "full" (deduped).
|
||||||
|
func desiredGroups(meta ConnectionMetadata) []string {
|
||||||
|
seen := make(map[string]struct{})
|
||||||
|
var out []string
|
||||||
|
for _, g := range meta.Groups {
|
||||||
|
g = strings.TrimSpace(g)
|
||||||
|
if g == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _, ok := seen[g]; ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
seen[g] = struct{}{}
|
||||||
|
out = append(out, g)
|
||||||
|
}
|
||||||
|
if meta.SudoMode == "full" {
|
||||||
|
sg := sudoGroup()
|
||||||
|
if _, ok := seen[sg]; !ok {
|
||||||
|
out = append(out, sg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// setUserGroups sets the user's supplementary groups to exactly groups (local mirrors metadata).
|
||||||
|
// When groups is empty, clears all supplementary groups (usermod -G "").
|
||||||
|
func setUserGroups(username string, groups []string) {
|
||||||
|
list := strings.Join(groups, ",")
|
||||||
|
cmd := exec.Command("usermod", "-G", list, username)
|
||||||
|
if out, err := cmd.CombinedOutput(); err != nil {
|
||||||
|
logger.Warn("auth-daemon: usermod -G %s: %v (output: %s)", list, err, string(out))
|
||||||
|
} else {
|
||||||
|
logger.Info("auth-daemon: set %s supplementary groups to %s", username, list)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func createUser(username string, meta ConnectionMetadata, generateRandomPassword bool) error {
|
||||||
|
args := []string{"-s", "/bin/bash"}
|
||||||
|
if meta.Homedir {
|
||||||
|
args = append(args, "-m")
|
||||||
|
} else {
|
||||||
|
args = append(args, "-M")
|
||||||
|
}
|
||||||
|
args = append(args, username)
|
||||||
|
cmd := exec.Command("useradd", args...)
|
||||||
|
if out, err := cmd.CombinedOutput(); err != nil {
|
||||||
|
return fmt.Errorf("useradd %s: %w (output: %s)", username, err, string(out))
|
||||||
|
}
|
||||||
|
logger.Info("auth-daemon: created user %s (homedir=%v)", username, meta.Homedir)
|
||||||
|
if generateRandomPassword {
|
||||||
|
if err := setRandomPassword(username); err != nil {
|
||||||
|
logger.Warn("auth-daemon: set random password for %s: %v", username, err)
|
||||||
|
} else {
|
||||||
|
logger.Info("auth-daemon: set random password for %s (PermitEmptyPasswords no)", username)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if meta.Homedir {
|
||||||
|
if u, err := user.Lookup(username); err == nil && u.HomeDir != "" {
|
||||||
|
uid, gid := mustAtoi(u.Uid), mustAtoi(u.Gid)
|
||||||
|
copySkelInto(skelDir, u.HomeDir, uid, gid)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
setUserGroups(username, desiredGroups(meta))
|
||||||
|
switch meta.SudoMode {
|
||||||
|
case "full":
|
||||||
|
if err := configurePasswordlessSudo(username); err != nil {
|
||||||
|
logger.Warn("auth-daemon: configure passwordless sudo for %s: %v", username, err)
|
||||||
|
}
|
||||||
|
case "commands":
|
||||||
|
if len(meta.SudoCommands) > 0 {
|
||||||
|
if err := configureSudoCommands(username, meta.SudoCommands); err != nil {
|
||||||
|
logger.Warn("auth-daemon: configure sudo commands for %s: %v", username, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
removeSudoers(username)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
const sudoersFilePrefix = "90-pangolin-"
|
||||||
|
|
||||||
|
func sudoersPath(username string) string {
|
||||||
|
return filepath.Join("/etc/sudoers.d", sudoersFilePrefix+username)
|
||||||
|
}
|
||||||
|
|
||||||
|
// writeSudoersFile writes content to the user's sudoers.d file and validates with visudo.
|
||||||
|
func writeSudoersFile(username, content string) error {
|
||||||
|
sudoersFile := sudoersPath(username)
|
||||||
|
tmpFile := sudoersFile + ".tmp"
|
||||||
|
if err := os.WriteFile(tmpFile, []byte(content), 0440); err != nil {
|
||||||
|
return fmt.Errorf("write temp sudoers file: %w", err)
|
||||||
|
}
|
||||||
|
cmd := exec.Command("visudo", "-c", "-f", tmpFile)
|
||||||
|
if out, err := cmd.CombinedOutput(); err != nil {
|
||||||
|
os.Remove(tmpFile)
|
||||||
|
return fmt.Errorf("visudo validation failed: %w (output: %s)", err, string(out))
|
||||||
|
}
|
||||||
|
if err := os.Rename(tmpFile, sudoersFile); err != nil {
|
||||||
|
os.Remove(tmpFile)
|
||||||
|
return fmt.Errorf("move sudoers file: %w", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// configurePasswordlessSudo creates a sudoers.d file to allow passwordless sudo for the user.
|
||||||
|
func configurePasswordlessSudo(username string) error {
|
||||||
|
content := fmt.Sprintf("# Created by Pangolin auth-daemon\n%s ALL=(ALL) NOPASSWD:ALL\n", username)
|
||||||
|
if err := writeSudoersFile(username, content); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
logger.Info("auth-daemon: configured passwordless sudo for %s", username)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureSudoCommands creates a sudoers.d file allowing only the listed commands (NOPASSWD).
|
||||||
|
// Each command should be a full path (e.g. /usr/bin/systemctl).
|
||||||
|
func configureSudoCommands(username string, commands []string) error {
|
||||||
|
var b strings.Builder
|
||||||
|
b.WriteString("# Created by Pangolin auth-daemon (restricted commands)\n")
|
||||||
|
n := 0
|
||||||
|
for _, c := range commands {
|
||||||
|
c = strings.TrimSpace(c)
|
||||||
|
if c == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
fmt.Fprintf(&b, "%s ALL=(ALL) NOPASSWD: %s\n", username, c)
|
||||||
|
n++
|
||||||
|
}
|
||||||
|
if n == 0 {
|
||||||
|
return fmt.Errorf("no valid sudo commands")
|
||||||
|
}
|
||||||
|
if err := writeSudoersFile(username, b.String()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
logger.Info("auth-daemon: configured restricted sudo for %s (%d commands)", username, len(commands))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// removeSudoers removes the sudoers.d file for the user.
|
||||||
|
func removeSudoers(username string) {
|
||||||
|
sudoersFile := sudoersPath(username)
|
||||||
|
if err := os.Remove(sudoersFile); err != nil && !os.IsNotExist(err) {
|
||||||
|
logger.Warn("auth-daemon: remove sudoers for %s: %v", username, err)
|
||||||
|
} else if err == nil {
|
||||||
|
logger.Info("auth-daemon: removed sudoers for %s", username)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func mustAtoi(s string) int {
|
||||||
|
n, _ := strconv.Atoi(s)
|
||||||
|
return n
|
||||||
|
}
|
||||||
|
|
||||||
|
func reconcileUser(u *user.User, meta ConnectionMetadata) error {
|
||||||
|
setUserGroups(u.Username, desiredGroups(meta))
|
||||||
|
switch meta.SudoMode {
|
||||||
|
case "full":
|
||||||
|
if err := configurePasswordlessSudo(u.Username); err != nil {
|
||||||
|
logger.Warn("auth-daemon: configure passwordless sudo for %s: %v", u.Username, err)
|
||||||
|
}
|
||||||
|
case "commands":
|
||||||
|
if len(meta.SudoCommands) > 0 {
|
||||||
|
if err := configureSudoCommands(u.Username, meta.SudoCommands); err != nil {
|
||||||
|
logger.Warn("auth-daemon: configure sudo commands for %s: %v", u.Username, err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
removeSudoers(u.Username)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
removeSudoers(u.Username)
|
||||||
|
}
|
||||||
|
if meta.Homedir && u.HomeDir != "" {
|
||||||
|
uid, gid := mustAtoi(u.Uid), mustAtoi(u.Gid)
|
||||||
|
if st, err := os.Stat(u.HomeDir); err != nil || !st.IsDir() {
|
||||||
|
if err := os.MkdirAll(u.HomeDir, 0755); err != nil {
|
||||||
|
logger.Warn("auth-daemon: mkdir %s: %v", u.HomeDir, err)
|
||||||
|
} else {
|
||||||
|
_ = os.Chown(u.HomeDir, uid, gid)
|
||||||
|
copySkelInto(skelDir, u.HomeDir, uid, gid)
|
||||||
|
logger.Info("auth-daemon: created home %s for %s", u.HomeDir, u.Username)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Ensure .bashrc etc. exist (e.g. home existed but was empty or skel was minimal)
|
||||||
|
copySkelInto(skelDir, u.HomeDir, uid, gid)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
22
authdaemon/host_stub.go
Normal file
22
authdaemon/host_stub.go
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
//go:build !linux
|
||||||
|
|
||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import "fmt"
|
||||||
|
|
||||||
|
var errLinuxOnly = fmt.Errorf("auth-daemon PAM agent is only supported on Linux")
|
||||||
|
|
||||||
|
// writeCACertIfNotExists returns an error on non-Linux.
|
||||||
|
func writeCACertIfNotExists(path, contents string, force bool) error {
|
||||||
|
return errLinuxOnly
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensureUser returns an error on non-Linux.
|
||||||
|
func ensureUser(username string, meta ConnectionMetadata, generateRandomPassword bool) error {
|
||||||
|
return errLinuxOnly
|
||||||
|
}
|
||||||
|
|
||||||
|
// writePrincipals returns an error on non-Linux.
|
||||||
|
func writePrincipals(path, username, niceId string) error {
|
||||||
|
return errLinuxOnly
|
||||||
|
}
|
||||||
28
authdaemon/principals.go
Normal file
28
authdaemon/principals.go
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetPrincipals reads the principals data file at path, looks up the given user, and returns that user's principals as a string slice.
|
||||||
|
// The file format is JSON: object with username keys and array-of-principals values, e.g. {"alice":["alice","usr-123"],"bob":["bob","usr-456"]}.
|
||||||
|
// If the user is not found or the file is missing, returns nil and nil.
|
||||||
|
func GetPrincipals(path, user string) ([]string, error) {
|
||||||
|
if path == "" {
|
||||||
|
return nil, fmt.Errorf("principals file path is required")
|
||||||
|
}
|
||||||
|
data, err := os.ReadFile(path)
|
||||||
|
if err != nil {
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("read principals file: %w", err)
|
||||||
|
}
|
||||||
|
var m map[string][]string
|
||||||
|
if err := json.Unmarshal(data, &m); err != nil {
|
||||||
|
return nil, fmt.Errorf("parse principals file: %w", err)
|
||||||
|
}
|
||||||
|
return m[user], nil
|
||||||
|
}
|
||||||
58
authdaemon/routes.go
Normal file
58
authdaemon/routes.go
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
)
|
||||||
|
|
||||||
|
// registerRoutes registers all API routes. Add new endpoints here.
|
||||||
|
func (s *Server) registerRoutes() {
|
||||||
|
s.mux.HandleFunc("/health", s.handleHealth)
|
||||||
|
s.mux.HandleFunc("/connection", s.handleConnection)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ConnectionMetadata is the metadata object in POST /connection.
|
||||||
|
type ConnectionMetadata struct {
|
||||||
|
SudoMode string `json:"sudoMode"` // "none" | "full" | "commands"
|
||||||
|
SudoCommands []string `json:"sudoCommands"` // used when sudoMode is "commands"
|
||||||
|
Homedir bool `json:"homedir"`
|
||||||
|
Groups []string `json:"groups"` // system groups to add the user to
|
||||||
|
}
|
||||||
|
|
||||||
|
// ConnectionRequest is the JSON body for POST /connection.
|
||||||
|
type ConnectionRequest struct {
|
||||||
|
CaCert string `json:"caCert"`
|
||||||
|
NiceId string `json:"niceId"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
Metadata ConnectionMetadata `json:"metadata"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// healthResponse is the JSON body for GET /health.
|
||||||
|
type healthResponse struct {
|
||||||
|
Status string `json:"status"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// handleHealth responds with 200 and {"status":"ok"}.
|
||||||
|
func (s *Server) handleHealth(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodGet {
|
||||||
|
http.Error(w, "Method Not Allowed", http.StatusMethodNotAllowed)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
_ = json.NewEncoder(w).Encode(healthResponse{Status: "ok"})
|
||||||
|
}
|
||||||
|
|
||||||
|
// handleConnection accepts POST with connection payload and delegates to ProcessConnection.
|
||||||
|
func (s *Server) handleConnection(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
http.Error(w, "Method Not Allowed", http.StatusMethodNotAllowed)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var req ConnectionRequest
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
http.Error(w, "Bad Request", http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.ProcessConnection(req)
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
}
|
||||||
180
authdaemon/server.go
Normal file
180
authdaemon/server.go
Normal file
@@ -0,0 +1,180 @@
|
|||||||
|
package authdaemon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/elliptic"
|
||||||
|
"crypto/rand"
|
||||||
|
"crypto/subtle"
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
|
"crypto/x509/pkix"
|
||||||
|
"encoding/pem"
|
||||||
|
"fmt"
|
||||||
|
"math/big"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/fosrl/newt/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Config struct {
|
||||||
|
// DisableHTTPS: when true, Run() does not start the HTTPS server (for embedded use inside Newt). Call ProcessConnection directly for connection events.
|
||||||
|
DisableHTTPS bool
|
||||||
|
Port int // Required when DisableHTTPS is false. Listen port for the HTTPS server. No default.
|
||||||
|
PresharedKey string // Required when DisableHTTPS is false. HTTP auth (Authorization: Bearer <key> or X-Preshared-Key: <key>). No default.
|
||||||
|
CACertPath string // Required. Where to write the CA cert (e.g. /etc/ssh/ca.pem). No default.
|
||||||
|
Force bool // If true, overwrite existing CA cert (and other items) when content differs. Default false.
|
||||||
|
PrincipalsFilePath string // Required. Path to the principals data file (JSON: username -> array of principals). No default.
|
||||||
|
GenerateRandomPassword bool // If true, set a random password on users when they are provisioned (for SSH PermitEmptyPasswords no).
|
||||||
|
}
|
||||||
|
|
||||||
|
type Server struct {
|
||||||
|
cfg Config
|
||||||
|
addr string
|
||||||
|
presharedKey string
|
||||||
|
mux *http.ServeMux
|
||||||
|
tlsCert tls.Certificate
|
||||||
|
}
|
||||||
|
|
||||||
|
// generateTLSCert creates a self-signed certificate and key in memory (no disk).
|
||||||
|
func generateTLSCert() (tls.Certificate, error) {
|
||||||
|
key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
||||||
|
if err != nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("generate key: %w", err)
|
||||||
|
}
|
||||||
|
serial, err := rand.Int(rand.Reader, new(big.Int).Lsh(big.NewInt(1), 128))
|
||||||
|
if err != nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("serial: %w", err)
|
||||||
|
}
|
||||||
|
tmpl := &x509.Certificate{
|
||||||
|
SerialNumber: serial,
|
||||||
|
Subject: pkix.Name{
|
||||||
|
CommonName: "localhost",
|
||||||
|
},
|
||||||
|
NotBefore: time.Now(),
|
||||||
|
NotAfter: time.Now().Add(365 * 24 * time.Hour),
|
||||||
|
KeyUsage: x509.KeyUsageDigitalSignature,
|
||||||
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
|
||||||
|
BasicConstraintsValid: true,
|
||||||
|
DNSNames: []string{"localhost", "127.0.0.1"},
|
||||||
|
}
|
||||||
|
certDER, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, key.Public(), key)
|
||||||
|
if err != nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("create certificate: %w", err)
|
||||||
|
}
|
||||||
|
keyDER, err := x509.MarshalECPrivateKey(key)
|
||||||
|
if err != nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("marshal key: %w", err)
|
||||||
|
}
|
||||||
|
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
|
||||||
|
keyPEM := pem.EncodeToMemory(&pem.Block{Type: "EC PRIVATE KEY", Bytes: keyDER})
|
||||||
|
cert, err := tls.X509KeyPair(certPEM, keyPEM)
|
||||||
|
if err != nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("x509 key pair: %w", err)
|
||||||
|
}
|
||||||
|
return cert, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// authMiddleware wraps next and requires a valid preshared key on every request.
|
||||||
|
// Accepts Authorization: Bearer <key> or X-Preshared-Key: <key>.
|
||||||
|
func (s *Server) authMiddleware(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
key := ""
|
||||||
|
if v := r.Header.Get("Authorization"); strings.HasPrefix(v, "Bearer ") {
|
||||||
|
key = strings.TrimSpace(strings.TrimPrefix(v, "Bearer "))
|
||||||
|
}
|
||||||
|
if key == "" {
|
||||||
|
key = strings.TrimSpace(r.Header.Get("X-Preshared-Key"))
|
||||||
|
}
|
||||||
|
if key == "" || subtle.ConstantTimeCompare([]byte(key), []byte(s.presharedKey)) != 1 {
|
||||||
|
http.Error(w, "Unauthorized", http.StatusUnauthorized)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewServer builds a new auth-daemon server from cfg. Port, PresharedKey, CACertPath, and PrincipalsFilePath are required (no defaults).
|
||||||
|
func NewServer(cfg Config) (*Server, error) {
|
||||||
|
if runtime.GOOS != "linux" {
|
||||||
|
return nil, fmt.Errorf("auth-daemon is only supported on Linux, not %s", runtime.GOOS)
|
||||||
|
}
|
||||||
|
if !cfg.DisableHTTPS {
|
||||||
|
if cfg.Port <= 0 {
|
||||||
|
return nil, fmt.Errorf("port is required and must be positive")
|
||||||
|
}
|
||||||
|
if cfg.PresharedKey == "" {
|
||||||
|
return nil, fmt.Errorf("preshared key is required")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if cfg.CACertPath == "" {
|
||||||
|
return nil, fmt.Errorf("CACertPath is required")
|
||||||
|
}
|
||||||
|
if cfg.PrincipalsFilePath == "" {
|
||||||
|
return nil, fmt.Errorf("PrincipalsFilePath is required")
|
||||||
|
}
|
||||||
|
s := &Server{cfg: cfg}
|
||||||
|
if !cfg.DisableHTTPS {
|
||||||
|
cert, err := generateTLSCert()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
s.addr = fmt.Sprintf(":%d", cfg.Port)
|
||||||
|
s.presharedKey = cfg.PresharedKey
|
||||||
|
s.mux = http.NewServeMux()
|
||||||
|
s.tlsCert = cert
|
||||||
|
s.registerRoutes()
|
||||||
|
}
|
||||||
|
return s, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run starts the HTTPS server (unless DisableHTTPS) and blocks until ctx is cancelled or the server errors.
|
||||||
|
// When DisableHTTPS is true, Run() blocks on ctx only and does not listen; use ProcessConnection for connection events.
|
||||||
|
func (s *Server) Run(ctx context.Context) error {
|
||||||
|
if s.cfg.DisableHTTPS {
|
||||||
|
logger.Info("auth-daemon running (HTTPS disabled)")
|
||||||
|
<-ctx.Done()
|
||||||
|
s.cleanupPrincipalsFile()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
tcfg := &tls.Config{
|
||||||
|
Certificates: []tls.Certificate{s.tlsCert},
|
||||||
|
MinVersion: tls.VersionTLS12,
|
||||||
|
}
|
||||||
|
handler := s.authMiddleware(s.mux)
|
||||||
|
srv := &http.Server{
|
||||||
|
Addr: s.addr,
|
||||||
|
Handler: handler,
|
||||||
|
TLSConfig: tcfg,
|
||||||
|
ReadTimeout: 10 * time.Second,
|
||||||
|
WriteTimeout: 10 * time.Second,
|
||||||
|
ReadHeaderTimeout: 5 * time.Second,
|
||||||
|
IdleTimeout: 60 * time.Second,
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
<-ctx.Done()
|
||||||
|
shutdownCtx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
if err := srv.Shutdown(shutdownCtx); err != nil {
|
||||||
|
logger.Warn("auth-daemon shutdown: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
logger.Info("auth-daemon listening on https://127.0.0.1%s", s.addr)
|
||||||
|
if err := srv.ListenAndServeTLS("", ""); err != nil && err != http.ErrServerClosed {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
s.cleanupPrincipalsFile()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Server) cleanupPrincipalsFile() {
|
||||||
|
if s.cfg.PrincipalsFilePath != "" {
|
||||||
|
if err := os.Remove(s.cfg.PrincipalsFilePath); err != nil && !os.IsNotExist(err) {
|
||||||
|
logger.Warn("auth-daemon: remove principals file: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -144,6 +144,10 @@ type SharedBind struct {
|
|||||||
|
|
||||||
// Callback for magic test responses (used for holepunch testing)
|
// Callback for magic test responses (used for holepunch testing)
|
||||||
magicResponseCallback atomic.Pointer[func(addr netip.AddrPort, echoData []byte)]
|
magicResponseCallback atomic.Pointer[func(addr netip.AddrPort, echoData []byte)]
|
||||||
|
|
||||||
|
// Rebinding state - used to keep receive goroutines alive during socket transition
|
||||||
|
rebinding bool // true when socket is being replaced
|
||||||
|
rebindingCond *sync.Cond // signaled when rebind completes
|
||||||
}
|
}
|
||||||
|
|
||||||
// MagicResponseCallback is the function signature for magic packet response callbacks
|
// MagicResponseCallback is the function signature for magic packet response callbacks
|
||||||
@@ -163,6 +167,9 @@ func New(udpConn *net.UDPConn) (*SharedBind, error) {
|
|||||||
closeChan: make(chan struct{}),
|
closeChan: make(chan struct{}),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Initialize the rebinding condition variable
|
||||||
|
bind.rebindingCond = sync.NewCond(&bind.mu)
|
||||||
|
|
||||||
// Initialize reference count to 1 (the creator holds the first reference)
|
// Initialize reference count to 1 (the creator holds the first reference)
|
||||||
bind.refCount.Store(1)
|
bind.refCount.Store(1)
|
||||||
|
|
||||||
@@ -310,6 +317,109 @@ func (b *SharedBind) IsClosed() bool {
|
|||||||
return b.closed.Load()
|
return b.closed.Load()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// GetPort returns the current UDP port the bind is using.
|
||||||
|
// This is useful when rebinding to try to reuse the same port.
|
||||||
|
func (b *SharedBind) GetPort() uint16 {
|
||||||
|
b.mu.RLock()
|
||||||
|
defer b.mu.RUnlock()
|
||||||
|
return b.port
|
||||||
|
}
|
||||||
|
|
||||||
|
// CloseSocket closes the underlying UDP connection to release the port,
|
||||||
|
// but keeps the SharedBind in a state where it can accept a new connection via Rebind.
|
||||||
|
// This allows the caller to close the old socket first, then bind a new socket
|
||||||
|
// to the same port before calling Rebind.
|
||||||
|
//
|
||||||
|
// Returns the port that was being used, so the caller can attempt to rebind to it.
|
||||||
|
// Sets the rebinding flag so receive goroutines will wait for the new socket
|
||||||
|
// instead of exiting.
|
||||||
|
func (b *SharedBind) CloseSocket() (uint16, error) {
|
||||||
|
b.mu.Lock()
|
||||||
|
defer b.mu.Unlock()
|
||||||
|
|
||||||
|
if b.closed.Load() {
|
||||||
|
return 0, fmt.Errorf("bind is closed")
|
||||||
|
}
|
||||||
|
|
||||||
|
port := b.port
|
||||||
|
|
||||||
|
// Set rebinding flag BEFORE closing the socket so receive goroutines
|
||||||
|
// know to wait instead of exit
|
||||||
|
b.rebinding = true
|
||||||
|
|
||||||
|
// Close the old connection to release the port
|
||||||
|
if b.udpConn != nil {
|
||||||
|
logger.Debug("Closing UDP connection to release port %d (rebinding)", port)
|
||||||
|
b.udpConn.Close()
|
||||||
|
b.udpConn = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return port, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Rebind replaces the underlying UDP connection with a new one.
|
||||||
|
// This is necessary when network connectivity changes (e.g., WiFi to cellular
|
||||||
|
// transition on macOS/iOS) and the old socket becomes stale.
|
||||||
|
//
|
||||||
|
// The caller is responsible for creating the new UDP connection and passing it here.
|
||||||
|
// After rebind, the caller should trigger a hole punch to re-establish NAT mappings.
|
||||||
|
//
|
||||||
|
// Note: Call CloseSocket() first if you need to rebind to the same port, as the
|
||||||
|
// old socket must be closed before a new socket can bind to the same port.
|
||||||
|
func (b *SharedBind) Rebind(newConn *net.UDPConn) error {
|
||||||
|
if newConn == nil {
|
||||||
|
return fmt.Errorf("newConn cannot be nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
b.mu.Lock()
|
||||||
|
defer b.mu.Unlock()
|
||||||
|
|
||||||
|
if b.closed.Load() {
|
||||||
|
return fmt.Errorf("bind is closed")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close the old connection if it's still open
|
||||||
|
// (it may have already been closed via CloseSocket)
|
||||||
|
if b.udpConn != nil {
|
||||||
|
logger.Debug("Closing old UDP connection during rebind")
|
||||||
|
b.udpConn.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set up the new connection
|
||||||
|
b.udpConn = newConn
|
||||||
|
|
||||||
|
// Update packet connections for the new socket
|
||||||
|
if runtime.GOOS == "linux" || runtime.GOOS == "android" {
|
||||||
|
b.ipv4PC = ipv4.NewPacketConn(newConn)
|
||||||
|
b.ipv6PC = ipv6.NewPacketConn(newConn)
|
||||||
|
|
||||||
|
// Re-initialize message buffers for batch operations
|
||||||
|
batchSize := wgConn.IdealBatchSize
|
||||||
|
b.ipv4Msgs = make([]ipv4.Message, batchSize)
|
||||||
|
for i := range b.ipv4Msgs {
|
||||||
|
b.ipv4Msgs[i].OOB = make([]byte, 0)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// For non-Linux platforms, still set up ipv4PC for consistency
|
||||||
|
b.ipv4PC = ipv4.NewPacketConn(newConn)
|
||||||
|
b.ipv6PC = ipv6.NewPacketConn(newConn)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update the port
|
||||||
|
if addr, ok := newConn.LocalAddr().(*net.UDPAddr); ok {
|
||||||
|
b.port = uint16(addr.Port)
|
||||||
|
logger.Info("Rebound UDP socket to port %d", b.port)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Clear the rebinding flag and wake up any waiting receive goroutines
|
||||||
|
b.rebinding = false
|
||||||
|
b.rebindingCond.Broadcast()
|
||||||
|
|
||||||
|
logger.Debug("Rebind complete, signaled waiting receive goroutines")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// SetMagicResponseCallback sets a callback function that will be called when
|
// SetMagicResponseCallback sets a callback function that will be called when
|
||||||
// a magic test response packet is received. This is used for holepunch testing.
|
// a magic test response packet is received. This is used for holepunch testing.
|
||||||
// Pass nil to clear the callback.
|
// Pass nil to clear the callback.
|
||||||
@@ -392,6 +502,7 @@ func (b *SharedBind) Open(uport uint16) ([]wgConn.ReceiveFunc, uint16, error) {
|
|||||||
// makeReceiveSocket creates a receive function for physical UDP socket packets
|
// makeReceiveSocket creates a receive function for physical UDP socket packets
|
||||||
func (b *SharedBind) makeReceiveSocket() wgConn.ReceiveFunc {
|
func (b *SharedBind) makeReceiveSocket() wgConn.ReceiveFunc {
|
||||||
return func(bufs [][]byte, sizes []int, eps []wgConn.Endpoint) (n int, err error) {
|
return func(bufs [][]byte, sizes []int, eps []wgConn.Endpoint) (n int, err error) {
|
||||||
|
for {
|
||||||
if b.closed.Load() {
|
if b.closed.Load() {
|
||||||
return 0, net.ErrClosed
|
return 0, net.ErrClosed
|
||||||
}
|
}
|
||||||
@@ -402,14 +513,66 @@ func (b *SharedBind) makeReceiveSocket() wgConn.ReceiveFunc {
|
|||||||
b.mu.RUnlock()
|
b.mu.RUnlock()
|
||||||
|
|
||||||
if conn == nil {
|
if conn == nil {
|
||||||
|
// Socket is nil - check if we're rebinding or truly closed
|
||||||
|
if b.closed.Load() {
|
||||||
return 0, net.ErrClosed
|
return 0, net.ErrClosed
|
||||||
}
|
}
|
||||||
|
|
||||||
// Use batch reading on Linux for performance
|
// Wait for rebind to complete
|
||||||
if pc != nil && (runtime.GOOS == "linux" || runtime.GOOS == "android") {
|
b.mu.Lock()
|
||||||
return b.receiveIPv4Batch(pc, bufs, sizes, eps)
|
for b.rebinding && !b.closed.Load() {
|
||||||
|
logger.Debug("Receive goroutine waiting for socket rebind to complete")
|
||||||
|
b.rebindingCond.Wait()
|
||||||
|
}
|
||||||
|
b.mu.Unlock()
|
||||||
|
|
||||||
|
// Check again after waking up
|
||||||
|
if b.closed.Load() {
|
||||||
|
return 0, net.ErrClosed
|
||||||
|
}
|
||||||
|
|
||||||
|
// Loop back to retry with new socket
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use batch reading on Linux for performance
|
||||||
|
var n int
|
||||||
|
var err error
|
||||||
|
if pc != nil && (runtime.GOOS == "linux" || runtime.GOOS == "android") {
|
||||||
|
n, err = b.receiveIPv4Batch(pc, bufs, sizes, eps)
|
||||||
|
} else {
|
||||||
|
n, err = b.receiveIPv4Simple(conn, bufs, sizes, eps)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
// Check if this error is due to rebinding
|
||||||
|
b.mu.RLock()
|
||||||
|
rebinding := b.rebinding
|
||||||
|
b.mu.RUnlock()
|
||||||
|
|
||||||
|
if rebinding {
|
||||||
|
logger.Debug("Receive got error during rebind, waiting for new socket: %v", err)
|
||||||
|
// Wait for rebind to complete and retry
|
||||||
|
b.mu.Lock()
|
||||||
|
for b.rebinding && !b.closed.Load() {
|
||||||
|
b.rebindingCond.Wait()
|
||||||
|
}
|
||||||
|
b.mu.Unlock()
|
||||||
|
|
||||||
|
if b.closed.Load() {
|
||||||
|
return 0, net.ErrClosed
|
||||||
|
}
|
||||||
|
|
||||||
|
// Retry with new socket
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Not rebinding, return the error
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return n, nil
|
||||||
}
|
}
|
||||||
return b.receiveIPv4Simple(conn, bufs, sizes, eps)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -492,6 +655,8 @@ func (b *SharedBind) receiveIPv4Batch(pc *ipv4.PacketConn, bufs [][]byte, sizes
|
|||||||
|
|
||||||
// receiveIPv4Simple uses simple ReadFromUDP for non-Linux platforms
|
// receiveIPv4Simple uses simple ReadFromUDP for non-Linux platforms
|
||||||
func (b *SharedBind) receiveIPv4Simple(conn *net.UDPConn, bufs [][]byte, sizes []int, eps []wgConn.Endpoint) (int, error) {
|
func (b *SharedBind) receiveIPv4Simple(conn *net.UDPConn, bufs [][]byte, sizes []int, eps []wgConn.Endpoint) (int, error) {
|
||||||
|
// No read deadline - we rely on socket close to unblock during rebind.
|
||||||
|
// The caller (makeReceiveSocket) handles rebind state when errors occur.
|
||||||
for {
|
for {
|
||||||
n, addr, err := conn.ReadFromUDP(bufs[0])
|
n, addr, err := conn.ReadFromUDP(bufs[0])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -523,7 +688,7 @@ func (b *SharedBind) receiveIPv4Simple(conn *net.UDPConn, bufs [][]byte, sizes [
|
|||||||
func (b *SharedBind) handleMagicPacket(data []byte, addr *net.UDPAddr) bool {
|
func (b *SharedBind) handleMagicPacket(data []byte, addr *net.UDPAddr) bool {
|
||||||
// Check if this is a test request packet
|
// Check if this is a test request packet
|
||||||
if len(data) >= MagicTestRequestLen && bytes.HasPrefix(data, MagicTestRequest) {
|
if len(data) >= MagicTestRequestLen && bytes.HasPrefix(data, MagicTestRequest) {
|
||||||
logger.Debug("Received magic test REQUEST from %s, sending response", addr.String())
|
// logger.Debug("Received magic test REQUEST from %s, sending response", addr.String())
|
||||||
// Extract the random data portion to echo back
|
// Extract the random data portion to echo back
|
||||||
echoData := data[len(MagicTestRequest) : len(MagicTestRequest)+MagicPacketDataLen]
|
echoData := data[len(MagicTestRequest) : len(MagicTestRequest)+MagicPacketDataLen]
|
||||||
|
|
||||||
@@ -546,7 +711,7 @@ func (b *SharedBind) handleMagicPacket(data []byte, addr *net.UDPAddr) bool {
|
|||||||
|
|
||||||
// Check if this is a test response packet
|
// Check if this is a test response packet
|
||||||
if len(data) >= MagicTestResponseLen && bytes.HasPrefix(data, MagicTestResponse) {
|
if len(data) >= MagicTestResponseLen && bytes.HasPrefix(data, MagicTestResponse) {
|
||||||
logger.Debug("Received magic test RESPONSE from %s", addr.String())
|
// logger.Debug("Received magic test RESPONSE from %s", addr.String())
|
||||||
// Extract the echoed data
|
// Extract the echoed data
|
||||||
echoData := data[len(MagicTestResponse) : len(MagicTestResponse)+MagicPacketDataLen]
|
echoData := data[len(MagicTestResponse) : len(MagicTestResponse)+MagicPacketDataLen]
|
||||||
|
|
||||||
|
|||||||
@@ -112,6 +112,8 @@ func NewWireGuardService(interfaceName string, port uint16, mtu int, host string
|
|||||||
return nil, fmt.Errorf("failed to generate private key: %v", err)
|
return nil, fmt.Errorf("failed to generate private key: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
logger.Debug("+++++++++++++++++++++++++++++++= the port is %d", port)
|
||||||
|
|
||||||
if port == 0 {
|
if port == 0 {
|
||||||
// Find an available port
|
// Find an available port
|
||||||
portRandom, err := util.FindAvailableUDPPort(49152, 65535)
|
portRandom, err := util.FindAvailableUDPPort(49152, 65535)
|
||||||
@@ -724,7 +726,7 @@ func (s *WireGuardService) ensureTargets(targets []Target) error {
|
|||||||
|
|
||||||
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
||||||
|
|
||||||
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange)
|
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v disableIcmp: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange, target.DisableIcmp)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@@ -1035,21 +1037,22 @@ func (s *WireGuardService) processPeerBandwidth(publicKey string, rxBytes, txByt
|
|||||||
// Update the last reading
|
// Update the last reading
|
||||||
s.lastReadings[publicKey] = currentReading
|
s.lastReadings[publicKey] = currentReading
|
||||||
|
|
||||||
|
// Only return bandwidth data if there was an increase
|
||||||
|
if bytesInDiff > 0 || bytesOutDiff > 0 {
|
||||||
return &PeerBandwidth{
|
return &PeerBandwidth{
|
||||||
PublicKey: publicKey,
|
PublicKey: publicKey,
|
||||||
BytesIn: bytesInMB,
|
BytesIn: bytesInMB,
|
||||||
BytesOut: bytesOutMB,
|
BytesOut: bytesOutMB,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// For first reading or if readings are too close together, report 0
|
// For first reading or if readings are too close together, don't report
|
||||||
s.lastReadings[publicKey] = currentReading
|
s.lastReadings[publicKey] = currentReading
|
||||||
return &PeerBandwidth{
|
return nil
|
||||||
PublicKey: publicKey,
|
|
||||||
BytesIn: 0,
|
|
||||||
BytesOut: 0,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *WireGuardService) reportPeerBandwidth() error {
|
func (s *WireGuardService) reportPeerBandwidth() error {
|
||||||
@@ -1116,7 +1119,7 @@ func (s *WireGuardService) handleAddTarget(msg websocket.WSMessage) {
|
|||||||
|
|
||||||
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
||||||
|
|
||||||
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange)
|
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v disableIcmp: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange, target.DisableIcmp)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1233,7 +1236,7 @@ func (s *WireGuardService) handleUpdateTarget(msg websocket.WSMessage) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
s.tnet.AddProxySubnetRule(sourcePrefix, destPrefix, target.RewriteTo, portRanges, target.DisableIcmp)
|
||||||
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange)
|
logger.Info("Added target subnet from %s to %s rewrite to %s with port ranges: %v disableIcmp: %v", target.SourcePrefix, target.DestPrefix, target.RewriteTo, target.PortRange, target.DisableIcmp)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
8
clients/permissions/permissions_android.go
Normal file
8
clients/permissions/permissions_android.go
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
//go:build android
|
||||||
|
|
||||||
|
package permissions
|
||||||
|
|
||||||
|
// CheckNativeInterfacePermissions always allows permission on Android.
|
||||||
|
func CheckNativeInterfacePermissions() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
//go:build darwin
|
//go:build darwin && !ios
|
||||||
|
|
||||||
package permissions
|
package permissions
|
||||||
|
|
||||||
|
|||||||
8
clients/permissions/permissions_ios.go
Normal file
8
clients/permissions/permissions_ios.go
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
//go:build ios
|
||||||
|
|
||||||
|
package permissions
|
||||||
|
|
||||||
|
// CheckNativeInterfacePermissions always allows permission on iOS.
|
||||||
|
func CheckNativeInterfacePermissions() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
//go:build linux
|
//go:build linux && !android
|
||||||
|
|
||||||
package permissions
|
package permissions
|
||||||
|
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ services:
|
|||||||
container_name: newt
|
container_name: newt
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
environment:
|
environment:
|
||||||
- PANGOLIN_ENDPOINT=https://example.com
|
- PANGOLIN_ENDPOINT=https://app.pangolin.net
|
||||||
- NEWT_ID=2ix2t8xk22ubpfy
|
- NEWT_ID=2ix2t8xk22ubpfy
|
||||||
- NEWT_SECRET=nnisrfsdfc7prqsp9ewo1dvtvci50j5uiqotez00dgap0ii2
|
- NEWT_SECRET=nnisrfsdfc7prqsp9ewo1dvtvci50j5uiqotez00dgap0ii2
|
||||||
- LOG_LEVEL=DEBUG
|
- LOG_LEVEL=DEBUG
|
||||||
17
flake.nix
17
flake.nix
@@ -25,7 +25,7 @@
|
|||||||
inherit (pkgs) lib;
|
inherit (pkgs) lib;
|
||||||
|
|
||||||
# Update version when releasing
|
# Update version when releasing
|
||||||
version = "1.7.0";
|
version = "1.8.0";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
default = self.packages.${system}.pangolin-newt;
|
default = self.packages.${system}.pangolin-newt;
|
||||||
@@ -35,16 +35,28 @@
|
|||||||
inherit version;
|
inherit version;
|
||||||
src = pkgs.nix-gitignore.gitignoreSource [ ] ./.;
|
src = pkgs.nix-gitignore.gitignoreSource [ ] ./.;
|
||||||
|
|
||||||
vendorHash = "sha256-5Xr6mwPtsqEliKeKv2rhhp6JC7u3coP4nnhIxGMqccU=";
|
vendorHash = "sha256-kmQM8Yy5TuOiNpMpUme/2gfE+vrhUK+0AphN+p71wGs=";
|
||||||
|
|
||||||
|
nativeInstallCheckInputs = [ pkgs.versionCheckHook ];
|
||||||
|
|
||||||
env = {
|
env = {
|
||||||
CGO_ENABLED = 0;
|
CGO_ENABLED = 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
ldflags = [
|
ldflags = [
|
||||||
|
"-s"
|
||||||
|
"-w"
|
||||||
"-X main.newtVersion=${version}"
|
"-X main.newtVersion=${version}"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
# Tests are broken due to a lack of Internet.
|
||||||
|
# Disable running `go test`, and instead do
|
||||||
|
# a simple version check instead.
|
||||||
|
doCheck = false;
|
||||||
|
doInstallCheck = true;
|
||||||
|
|
||||||
|
versionCheckProgramArg = [ "-version" ];
|
||||||
|
|
||||||
meta = {
|
meta = {
|
||||||
description = "A tunneling client for Pangolin";
|
description = "A tunneling client for Pangolin";
|
||||||
homepage = "https://github.com/fosrl/newt";
|
homepage = "https://github.com/fosrl/newt";
|
||||||
@@ -52,6 +64,7 @@
|
|||||||
maintainers = [
|
maintainers = [
|
||||||
lib.maintainers.water-sucks
|
lib.maintainers.water-sucks
|
||||||
];
|
];
|
||||||
|
mainProgram = "newt";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
64
go.mod
64
go.mod
@@ -1,32 +1,33 @@
|
|||||||
module github.com/fosrl/newt
|
module github.com/fosrl/newt
|
||||||
|
|
||||||
go 1.25
|
go 1.25.0
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/docker/docker v28.5.2+incompatible
|
github.com/docker/docker v28.5.2+incompatible
|
||||||
|
github.com/gaissmai/bart v0.26.0
|
||||||
github.com/gorilla/websocket v1.5.3
|
github.com/gorilla/websocket v1.5.3
|
||||||
github.com/prometheus/client_golang v1.23.2
|
github.com/prometheus/client_golang v1.23.2
|
||||||
github.com/vishvananda/netlink v1.3.1
|
github.com/vishvananda/netlink v1.3.1
|
||||||
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.63.0
|
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.66.0
|
||||||
go.opentelemetry.io/contrib/instrumentation/runtime v0.63.0
|
go.opentelemetry.io/contrib/instrumentation/runtime v0.66.0
|
||||||
go.opentelemetry.io/otel v1.38.0
|
go.opentelemetry.io/otel v1.41.0
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.38.0
|
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.41.0
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.38.0
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.41.0
|
||||||
go.opentelemetry.io/otel/exporters/prometheus v0.60.0
|
go.opentelemetry.io/otel/exporters/prometheus v0.63.0
|
||||||
go.opentelemetry.io/otel/metric v1.38.0
|
go.opentelemetry.io/otel/metric v1.41.0
|
||||||
go.opentelemetry.io/otel/sdk v1.38.0
|
go.opentelemetry.io/otel/sdk v1.41.0
|
||||||
go.opentelemetry.io/otel/sdk/metric v1.38.0
|
go.opentelemetry.io/otel/sdk/metric v1.41.0
|
||||||
golang.org/x/crypto v0.45.0
|
golang.org/x/crypto v0.48.0
|
||||||
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6
|
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6
|
||||||
golang.org/x/net v0.47.0
|
golang.org/x/net v0.51.0
|
||||||
golang.org/x/sys v0.38.0
|
golang.org/x/sys v0.41.0
|
||||||
golang.zx2c4.com/wireguard v0.0.0-20250521234502-f333402bd9cb
|
golang.zx2c4.com/wireguard v0.0.0-20250521234502-f333402bd9cb
|
||||||
golang.zx2c4.com/wireguard/wgctrl v0.0.0-20241231184526-a9ab2273dd10
|
golang.zx2c4.com/wireguard/wgctrl v0.0.0-20241231184526-a9ab2273dd10
|
||||||
golang.zx2c4.com/wireguard/windows v0.5.3
|
golang.zx2c4.com/wireguard/windows v0.5.3
|
||||||
google.golang.org/grpc v1.76.0
|
google.golang.org/grpc v1.79.1
|
||||||
gopkg.in/yaml.v3 v3.0.1
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c
|
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c
|
||||||
software.sslmate.com/src/go-pkcs12 v0.6.0
|
software.sslmate.com/src/go-pkcs12 v0.7.0
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
@@ -44,8 +45,7 @@ require (
|
|||||||
github.com/go-logr/stdr v1.2.2 // indirect
|
github.com/go-logr/stdr v1.2.2 // indirect
|
||||||
github.com/google/btree v1.1.3 // indirect
|
github.com/google/btree v1.1.3 // indirect
|
||||||
github.com/google/uuid v1.6.0 // indirect
|
github.com/google/uuid v1.6.0 // indirect
|
||||||
github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc // indirect
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0 // indirect
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.2 // indirect
|
|
||||||
github.com/moby/docker-image-spec v1.3.1 // indirect
|
github.com/moby/docker-image-spec v1.3.1 // indirect
|
||||||
github.com/moby/sys/atomicwriter v0.1.0 // indirect
|
github.com/moby/sys/atomicwriter v0.1.0 // indirect
|
||||||
github.com/moby/term v0.5.2 // indirect
|
github.com/moby/term v0.5.2 // indirect
|
||||||
@@ -55,23 +55,23 @@ require (
|
|||||||
github.com/opencontainers/image-spec v1.1.0 // indirect
|
github.com/opencontainers/image-spec v1.1.0 // indirect
|
||||||
github.com/pkg/errors v0.9.1 // indirect
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
github.com/prometheus/client_model v0.6.2 // indirect
|
github.com/prometheus/client_model v0.6.2 // indirect
|
||||||
github.com/prometheus/common v0.66.1 // indirect
|
github.com/prometheus/common v0.67.5 // indirect
|
||||||
github.com/prometheus/otlptranslator v0.0.2 // indirect
|
github.com/prometheus/otlptranslator v1.0.0 // indirect
|
||||||
github.com/prometheus/procfs v0.17.0 // indirect
|
github.com/prometheus/procfs v0.19.2 // indirect
|
||||||
github.com/vishvananda/netns v0.0.5 // indirect
|
github.com/vishvananda/netns v0.0.5 // indirect
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
|
go.opentelemetry.io/auto/sdk v1.2.1 // indirect
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.38.0 // indirect
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.41.0 // indirect
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0 // indirect
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0 // indirect
|
||||||
go.opentelemetry.io/otel/trace v1.38.0 // indirect
|
go.opentelemetry.io/otel/trace v1.41.0 // indirect
|
||||||
go.opentelemetry.io/proto/otlp v1.7.1 // indirect
|
go.opentelemetry.io/proto/otlp v1.9.0 // indirect
|
||||||
go.yaml.in/yaml/v2 v2.4.2 // indirect
|
go.yaml.in/yaml/v2 v2.4.3 // indirect
|
||||||
golang.org/x/mod v0.30.0 // indirect
|
golang.org/x/mod v0.32.0 // indirect
|
||||||
golang.org/x/sync v0.18.0 // indirect
|
golang.org/x/sync v0.19.0 // indirect
|
||||||
golang.org/x/text v0.31.0 // indirect
|
golang.org/x/text v0.34.0 // indirect
|
||||||
golang.org/x/time v0.12.0 // indirect
|
golang.org/x/time v0.12.0 // indirect
|
||||||
golang.org/x/tools v0.39.0 // indirect
|
golang.org/x/tools v0.41.0 // indirect
|
||||||
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect
|
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect
|
||||||
google.golang.org/genproto/googleapis/api v0.0.0-20250825161204-c5933d9347a5 // indirect
|
google.golang.org/genproto/googleapis/api v0.0.0-20260209200024-4cfbd4190f57 // indirect
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250825161204-c5933d9347a5 // indirect
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20260209200024-4cfbd4190f57 // indirect
|
||||||
google.golang.org/protobuf v1.36.8 // indirect
|
google.golang.org/protobuf v1.36.11 // indirect
|
||||||
)
|
)
|
||||||
|
|||||||
128
go.sum
128
go.sum
@@ -26,6 +26,8 @@ github.com/docker/go-units v0.4.0 h1:3uh0PgVws3nIA0Q+MwDC8yjEPf9zjRfZZWXZYDct3Tw
|
|||||||
github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
|
github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
|
||||||
github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
|
github.com/felixge/httpsnoop v1.0.4 h1:NFTV2Zj1bL4mc9sqWACXbQFVBBg2W3GPvqp8/ESS2Wg=
|
||||||
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
|
github.com/felixge/httpsnoop v1.0.4/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
|
||||||
|
github.com/gaissmai/bart v0.26.0 h1:xOZ57E9hJLBiQaSyeZa9wgWhGuzfGACgqp4BE77OkO0=
|
||||||
|
github.com/gaissmai/bart v0.26.0/go.mod h1:GREWQfTLRWz/c5FTOsIw+KkscuFkIV5t8Rp7Nd1Td5c=
|
||||||
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
||||||
github.com/go-logr/logr v1.4.3 h1:CjnDlHq8ikf6E492q6eKboGOC0T8CDaOvkHCIg8idEI=
|
github.com/go-logr/logr v1.4.3 h1:CjnDlHq8ikf6E492q6eKboGOC0T8CDaOvkHCIg8idEI=
|
||||||
github.com/go-logr/logr v1.4.3/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
github.com/go-logr/logr v1.4.3/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
||||||
@@ -41,10 +43,8 @@ github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
|||||||
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
github.com/gorilla/websocket v1.5.3 h1:saDtZ6Pbx/0u+bgYQ3q96pZgCzfhKXGPqt7kZ72aNNg=
|
github.com/gorilla/websocket v1.5.3 h1:saDtZ6Pbx/0u+bgYQ3q96pZgCzfhKXGPqt7kZ72aNNg=
|
||||||
github.com/gorilla/websocket v1.5.3/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
|
github.com/gorilla/websocket v1.5.3/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
|
||||||
github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc h1:GN2Lv3MGO7AS6PrRoT6yV5+wkrOpcszoIsO4+4ds248=
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0 h1:HWRh5R2+9EifMyIHV7ZV+MIZqgz+PMpZ14Jynv3O2Zs=
|
||||||
github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc/go.mod h1:+JKpmjMGhpgPL+rXZ5nsZieVzvarn86asRlBg4uNGnk=
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0/go.mod h1:JfhWUomR1baixubs02l85lZYYOm7LV6om4ceouMv45c=
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.2 h1:8Tjv8EJ+pM1xP8mK6egEbD1OgnVTyacbefKhmbLhIhU=
|
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.2/go.mod h1:pkJQ2tZHJ0aFOVEEot6oZmaVEZcRme73eIFmhiVuRWs=
|
|
||||||
github.com/klauspost/compress v1.18.0 h1:c/Cqfb0r+Yi+JtIEq73FWXVkRonBlf0CRNYc8Zttxdo=
|
github.com/klauspost/compress v1.18.0 h1:c/Cqfb0r+Yi+JtIEq73FWXVkRonBlf0CRNYc8Zttxdo=
|
||||||
github.com/klauspost/compress v1.18.0/go.mod h1:2Pp+KzxcywXVXMr50+X0Q/Lsb43OQHYWRCY2AiWywWQ=
|
github.com/klauspost/compress v1.18.0/go.mod h1:2Pp+KzxcywXVXMr50+X0Q/Lsb43OQHYWRCY2AiWywWQ=
|
||||||
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
|
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
|
||||||
@@ -77,14 +77,14 @@ github.com/prometheus/client_golang v1.23.2 h1:Je96obch5RDVy3FDMndoUsjAhG5Edi49h
|
|||||||
github.com/prometheus/client_golang v1.23.2/go.mod h1:Tb1a6LWHB3/SPIzCoaDXI4I8UHKeFTEQ1YCr+0Gyqmg=
|
github.com/prometheus/client_golang v1.23.2/go.mod h1:Tb1a6LWHB3/SPIzCoaDXI4I8UHKeFTEQ1YCr+0Gyqmg=
|
||||||
github.com/prometheus/client_model v0.6.2 h1:oBsgwpGs7iVziMvrGhE53c/GrLUsZdHnqNwqPLxwZyk=
|
github.com/prometheus/client_model v0.6.2 h1:oBsgwpGs7iVziMvrGhE53c/GrLUsZdHnqNwqPLxwZyk=
|
||||||
github.com/prometheus/client_model v0.6.2/go.mod h1:y3m2F6Gdpfy6Ut/GBsUqTWZqCUvMVzSfMLjcu6wAwpE=
|
github.com/prometheus/client_model v0.6.2/go.mod h1:y3m2F6Gdpfy6Ut/GBsUqTWZqCUvMVzSfMLjcu6wAwpE=
|
||||||
github.com/prometheus/common v0.66.1 h1:h5E0h5/Y8niHc5DlaLlWLArTQI7tMrsfQjHV+d9ZoGs=
|
github.com/prometheus/common v0.67.5 h1:pIgK94WWlQt1WLwAC5j2ynLaBRDiinoAb86HZHTUGI4=
|
||||||
github.com/prometheus/common v0.66.1/go.mod h1:gcaUsgf3KfRSwHY4dIMXLPV0K/Wg1oZ8+SbZk/HH/dA=
|
github.com/prometheus/common v0.67.5/go.mod h1:SjE/0MzDEEAyrdr5Gqc6G+sXI67maCxzaT3A2+HqjUw=
|
||||||
github.com/prometheus/otlptranslator v0.0.2 h1:+1CdeLVrRQ6Psmhnobldo0kTp96Rj80DRXRd5OSnMEQ=
|
github.com/prometheus/otlptranslator v1.0.0 h1:s0LJW/iN9dkIH+EnhiD3BlkkP5QVIUVEoIwkU+A6qos=
|
||||||
github.com/prometheus/otlptranslator v0.0.2/go.mod h1:P8AwMgdD7XEr6QRUJ2QWLpiAZTgTE2UYgjlu3svompI=
|
github.com/prometheus/otlptranslator v1.0.0/go.mod h1:vRYWnXvI6aWGpsdY/mOT/cbeVRBlPWtBNDb7kGR3uKM=
|
||||||
github.com/prometheus/procfs v0.17.0 h1:FuLQ+05u4ZI+SS/w9+BWEM2TXiHKsUQ9TADiRH7DuK0=
|
github.com/prometheus/procfs v0.19.2 h1:zUMhqEW66Ex7OXIiDkll3tl9a1ZdilUOd/F6ZXw4Vws=
|
||||||
github.com/prometheus/procfs v0.17.0/go.mod h1:oPQLaDAMRbA+u8H5Pbfq+dl3VDAvHxMUOVhe0wYB2zw=
|
github.com/prometheus/procfs v0.19.2/go.mod h1:M0aotyiemPhBCM0z5w87kL22CxfcH05ZpYlu+b4J7mw=
|
||||||
github.com/rogpeppe/go-internal v1.13.1 h1:KvO1DLK/DRN07sQ1LQKScxyZJuNnedQ5/wKSR38lUII=
|
github.com/rogpeppe/go-internal v1.14.1 h1:UQB4HGPB6osV0SQTLymcB4TgvyWu6ZyliaW0tI/otEQ=
|
||||||
github.com/rogpeppe/go-internal v1.13.1/go.mod h1:uMEvuHeurkdAXX61udpOXGD/AzZDWNMNyH2VO9fmH0o=
|
github.com/rogpeppe/go-internal v1.14.1/go.mod h1:MaRKkUm5W0goXpeCfT7UZI6fk/L7L7so1lCWt35ZSgc=
|
||||||
github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
|
github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
|
||||||
github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
|
github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
|
||||||
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
|
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
|
||||||
@@ -93,58 +93,58 @@ github.com/vishvananda/netlink v1.3.1 h1:3AEMt62VKqz90r0tmNhog0r/PpWKmrEShJU0wJW
|
|||||||
github.com/vishvananda/netlink v1.3.1/go.mod h1:ARtKouGSTGchR8aMwmkzC0qiNPrrWO5JS/XMVl45+b4=
|
github.com/vishvananda/netlink v1.3.1/go.mod h1:ARtKouGSTGchR8aMwmkzC0qiNPrrWO5JS/XMVl45+b4=
|
||||||
github.com/vishvananda/netns v0.0.5 h1:DfiHV+j8bA32MFM7bfEunvT8IAqQ/NzSJHtcmW5zdEY=
|
github.com/vishvananda/netns v0.0.5 h1:DfiHV+j8bA32MFM7bfEunvT8IAqQ/NzSJHtcmW5zdEY=
|
||||||
github.com/vishvananda/netns v0.0.5/go.mod h1:SpkAiCQRtJ6TvvxPnOSyH3BMl6unz3xZlaprSwhNNJM=
|
github.com/vishvananda/netns v0.0.5/go.mod h1:SpkAiCQRtJ6TvvxPnOSyH3BMl6unz3xZlaprSwhNNJM=
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0 h1:cH53jehLUN6UFLY71z+NDOiNJqDdPRaXzTel0sJySYA=
|
go.opentelemetry.io/auto/sdk v1.2.1 h1:jXsnJ4Lmnqd11kwkBV2LgLoFMZKizbCi5fNZ/ipaZ64=
|
||||||
go.opentelemetry.io/auto/sdk v1.1.0/go.mod h1:3wSPjt5PWp2RhlCcmmOial7AvC4DQqZb7a7wCow3W8A=
|
go.opentelemetry.io/auto/sdk v1.2.1/go.mod h1:KRTj+aOaElaLi+wW1kO/DZRXwkF4C5xPbEe3ZiIhN7Y=
|
||||||
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.63.0 h1:RbKq8BG0FI8OiXhBfcRtqqHcZcka+gU3cskNuf05R18=
|
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.66.0 h1:PnV4kVnw0zOmwwFkAzCN5O07fw1YOIQor120zrh0AVo=
|
||||||
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.63.0/go.mod h1:h06DGIukJOevXaj/xrNjhi/2098RZzcLTbc0jDAUbsg=
|
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.66.0/go.mod h1:ofAwF4uinaf8SXdVzzbL4OsxJ3VfeEg3f/F6CeF49/Y=
|
||||||
go.opentelemetry.io/contrib/instrumentation/runtime v0.63.0 h1:PeBoRj6af6xMI7qCupwFvTbbnd49V7n5YpG6pg8iDYQ=
|
go.opentelemetry.io/contrib/instrumentation/runtime v0.66.0 h1:JruBNmrPELWjR+PU3fsQBFQRYtsMLQ/zPfbvwDz9I/w=
|
||||||
go.opentelemetry.io/contrib/instrumentation/runtime v0.63.0/go.mod h1:ingqBCtMCe8I4vpz/UVzCW6sxoqgZB37nao91mLQ3Bw=
|
go.opentelemetry.io/contrib/instrumentation/runtime v0.66.0/go.mod h1:vwNrfL6w1uAE3qX48KFii2Qoqf+NEDP5wNjus+RHz8Y=
|
||||||
go.opentelemetry.io/otel v1.38.0 h1:RkfdswUDRimDg0m2Az18RKOsnI8UDzppJAtj01/Ymk8=
|
go.opentelemetry.io/otel v1.41.0 h1:YlEwVsGAlCvczDILpUXpIpPSL/VPugt7zHThEMLce1c=
|
||||||
go.opentelemetry.io/otel v1.38.0/go.mod h1:zcmtmQ1+YmQM9wrNsTGV/q/uyusom3P8RxwExxkZhjM=
|
go.opentelemetry.io/otel v1.41.0/go.mod h1:Yt4UwgEKeT05QbLwbyHXEwhnjxNO6D8L5PQP51/46dE=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.38.0 h1:vl9obrcoWVKp/lwl8tRE33853I8Xru9HFbw/skNeLs8=
|
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.41.0 h1:VO3BL6OZXRQ1yQc8W6EVfJzINeJ35BkiHx4MYfoQf44=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.38.0/go.mod h1:GAXRxmLJcVM3u22IjTg74zWBrRCKq8BnOqUVLodpcpw=
|
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.41.0/go.mod h1:qRDnJ2nv3CQXMK2HUd9K9VtvedsPAce3S+/4LZHjX/s=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.38.0 h1:GqRJVj7UmLjCVyVJ3ZFLdPRmhDUp2zFmQe3RHIOsw24=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.41.0 h1:ao6Oe+wSebTlQ1OEht7jlYTzQKE+pnx/iNywFvTbuuI=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.38.0/go.mod h1:ri3aaHSmCTVYu2AWv44YMauwAQc0aqI9gHKIcSbI1pU=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.41.0/go.mod h1:u3T6vz0gh/NVzgDgiwkgLxpsSF6PaPmo2il0apGJbls=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.38.0 h1:lwI4Dc5leUqENgGuQImwLo4WnuXFPetmPpkLi2IrX54=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.41.0 h1:mq/Qcf28TWz719lE3/hMB4KkyDuLJIvgJnFGcd0kEUI=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.38.0/go.mod h1:Kz/oCE7z5wuyhPxsXDuaPteSWqjSBD5YaSdbxZYGbGk=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.41.0/go.mod h1:yk5LXEYhsL2htyDNJbEq7fWzNEigeEdV5xBF/Y+kAv0=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0 h1:aTL7F04bJHUlztTsNGJ2l+6he8c+y/b//eR0jjjemT4=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0 h1:aTL7F04bJHUlztTsNGJ2l+6he8c+y/b//eR0jjjemT4=
|
||||||
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0/go.mod h1:kldtb7jDTeol0l3ewcmd8SDvx3EmIE7lyvqbasU3QC4=
|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.38.0/go.mod h1:kldtb7jDTeol0l3ewcmd8SDvx3EmIE7lyvqbasU3QC4=
|
||||||
go.opentelemetry.io/otel/exporters/prometheus v0.60.0 h1:cGtQxGvZbnrWdC2GyjZi0PDKVSLWP/Jocix3QWfXtbo=
|
go.opentelemetry.io/otel/exporters/prometheus v0.63.0 h1:OLo1FNb0pBZykLqbKRZolKtGZd0Waqlr240YdMEnhhg=
|
||||||
go.opentelemetry.io/otel/exporters/prometheus v0.60.0/go.mod h1:hkd1EekxNo69PTV4OWFGZcKQiIqg0RfuWExcPKFvepk=
|
go.opentelemetry.io/otel/exporters/prometheus v0.63.0/go.mod h1:8yeQAdhrK5xsWuFehO13Dk/Xb9FuhZoVpJfpoNCfJnw=
|
||||||
go.opentelemetry.io/otel/metric v1.38.0 h1:Kl6lzIYGAh5M159u9NgiRkmoMKjvbsKtYRwgfrA6WpA=
|
go.opentelemetry.io/otel/metric v1.41.0 h1:rFnDcs4gRzBcsO9tS8LCpgR0dxg4aaxWlJxCno7JlTQ=
|
||||||
go.opentelemetry.io/otel/metric v1.38.0/go.mod h1:kB5n/QoRM8YwmUahxvI3bO34eVtQf2i4utNVLr9gEmI=
|
go.opentelemetry.io/otel/metric v1.41.0/go.mod h1:xPvCwd9pU0VN8tPZYzDZV/BMj9CM9vs00GuBjeKhJps=
|
||||||
go.opentelemetry.io/otel/sdk v1.38.0 h1:l48sr5YbNf2hpCUj/FoGhW9yDkl+Ma+LrVl8qaM5b+E=
|
go.opentelemetry.io/otel/sdk v1.41.0 h1:YPIEXKmiAwkGl3Gu1huk1aYWwtpRLeskpV+wPisxBp8=
|
||||||
go.opentelemetry.io/otel/sdk v1.38.0/go.mod h1:ghmNdGlVemJI3+ZB5iDEuk4bWA3GkTpW+DOoZMYBVVg=
|
go.opentelemetry.io/otel/sdk v1.41.0/go.mod h1:ahFdU0G5y8IxglBf0QBJXgSe7agzjE4GiTJ6HT9ud90=
|
||||||
go.opentelemetry.io/otel/sdk/metric v1.38.0 h1:aSH66iL0aZqo//xXzQLYozmWrXxyFkBJ6qT5wthqPoM=
|
go.opentelemetry.io/otel/sdk/metric v1.41.0 h1:siZQIYBAUd1rlIWQT2uCxWJxcCO7q3TriaMlf08rXw8=
|
||||||
go.opentelemetry.io/otel/sdk/metric v1.38.0/go.mod h1:dg9PBnW9XdQ1Hd6ZnRz689CbtrUp0wMMs9iPcgT9EZA=
|
go.opentelemetry.io/otel/sdk/metric v1.41.0/go.mod h1:HNBuSvT7ROaGtGI50ArdRLUnvRTRGniSUZbxiWxSO8Y=
|
||||||
go.opentelemetry.io/otel/trace v1.38.0 h1:Fxk5bKrDZJUH+AMyyIXGcFAPah0oRcT+LuNtJrmcNLE=
|
go.opentelemetry.io/otel/trace v1.41.0 h1:Vbk2co6bhj8L59ZJ6/xFTskY+tGAbOnCtQGVVa9TIN0=
|
||||||
go.opentelemetry.io/otel/trace v1.38.0/go.mod h1:j1P9ivuFsTceSWe1oY+EeW3sc+Pp42sO++GHkg4wwhs=
|
go.opentelemetry.io/otel/trace v1.41.0/go.mod h1:U1NU4ULCoxeDKc09yCWdWe+3QoyweJcISEVa1RBzOis=
|
||||||
go.opentelemetry.io/proto/otlp v1.7.1 h1:gTOMpGDb0WTBOP8JaO72iL3auEZhVmAQg4ipjOVAtj4=
|
go.opentelemetry.io/proto/otlp v1.9.0 h1:l706jCMITVouPOqEnii2fIAuO3IVGBRPV5ICjceRb/A=
|
||||||
go.opentelemetry.io/proto/otlp v1.7.1/go.mod h1:b2rVh6rfI/s2pHWNlB7ILJcRALpcNDzKhACevjI+ZnE=
|
go.opentelemetry.io/proto/otlp v1.9.0/go.mod h1:xE+Cx5E/eEHw+ISFkwPLwCZefwVjY+pqKg1qcK03+/4=
|
||||||
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
|
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
|
||||||
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
|
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
|
||||||
go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI=
|
go.yaml.in/yaml/v2 v2.4.3 h1:6gvOSjQoTB3vt1l+CU+tSyi/HOjfOjRLJ4YwYZGwRO0=
|
||||||
go.yaml.in/yaml/v2 v2.4.2/go.mod h1:081UH+NErpNdqlCXm3TtEran0rJZGxAYx9hb/ELlsPU=
|
go.yaml.in/yaml/v2 v2.4.3/go.mod h1:zSxWcmIDjOzPXpjlTTbAsKokqkDNAVtZO0WOMiT90s8=
|
||||||
golang.org/x/crypto v0.45.0 h1:jMBrvKuj23MTlT0bQEOBcAE0mjg8mK9RXFhRH6nyF3Q=
|
golang.org/x/crypto v0.48.0 h1:/VRzVqiRSggnhY7gNRxPauEQ5Drw9haKdM0jqfcCFts=
|
||||||
golang.org/x/crypto v0.45.0/go.mod h1:XTGrrkGJve7CYK7J8PEww4aY7gM3qMCElcJQ8n8JdX4=
|
golang.org/x/crypto v0.48.0/go.mod h1:r0kV5h3qnFPlQnBSrULhlsRfryS2pmewsg+XfMgkVos=
|
||||||
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6 h1:zfMcR1Cs4KNuomFFgGefv5N0czO2XZpUbxGUy8i8ug0=
|
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6 h1:zfMcR1Cs4KNuomFFgGefv5N0czO2XZpUbxGUy8i8ug0=
|
||||||
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6/go.mod h1:46edojNIoXTNOhySWIWdix628clX9ODXwPsQuG6hsK0=
|
golang.org/x/exp v0.0.0-20251113190631-e25ba8c21ef6/go.mod h1:46edojNIoXTNOhySWIWdix628clX9ODXwPsQuG6hsK0=
|
||||||
golang.org/x/mod v0.30.0 h1:fDEXFVZ/fmCKProc/yAXXUijritrDzahmwwefnjoPFk=
|
golang.org/x/mod v0.32.0 h1:9F4d3PHLljb6x//jOyokMv3eX+YDeepZSEo3mFJy93c=
|
||||||
golang.org/x/mod v0.30.0/go.mod h1:lAsf5O2EvJeSFMiBxXDki7sCgAxEUcZHXoXMKT4GJKc=
|
golang.org/x/mod v0.32.0/go.mod h1:SgipZ/3h2Ci89DlEtEXWUk/HteuRin+HHhN+WbNhguU=
|
||||||
golang.org/x/net v0.47.0 h1:Mx+4dIFzqraBXUugkia1OOvlD6LemFo1ALMHjrXDOhY=
|
golang.org/x/net v0.51.0 h1:94R/GTO7mt3/4wIKpcR5gkGmRLOuE/2hNGeWq/GBIFo=
|
||||||
golang.org/x/net v0.47.0/go.mod h1:/jNxtkgq5yWUGYkaZGqo27cfGZ1c5Nen03aYrrKpVRU=
|
golang.org/x/net v0.51.0/go.mod h1:aamm+2QF5ogm02fjy5Bb7CQ0WMt1/WVM7FtyaTLlA9Y=
|
||||||
golang.org/x/sync v0.18.0 h1:kr88TuHDroi+UVf+0hZnirlk8o8T+4MrK6mr60WkH/I=
|
golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4=
|
||||||
golang.org/x/sync v0.18.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
||||||
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.38.0 h1:3yZWxaJjBmCWXqhN1qh02AkOnCQ1poK6oF+a7xWL6Gc=
|
golang.org/x/sys v0.41.0 h1:Ivj+2Cp/ylzLiEU89QhWblYnOE9zerudt9Ftecq2C6k=
|
||||||
golang.org/x/sys v0.38.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
golang.org/x/sys v0.41.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
||||||
golang.org/x/text v0.31.0 h1:aC8ghyu4JhP8VojJ2lEHBnochRno1sgL6nEi9WGFGMM=
|
golang.org/x/text v0.34.0 h1:oL/Qq0Kdaqxa1KbNeMKwQq0reLCCaFtqu2eNuSeNHbk=
|
||||||
golang.org/x/text v0.31.0/go.mod h1:tKRAlv61yKIjGGHX/4tP1LTbc13YSec1pxVEWXzfoeM=
|
golang.org/x/text v0.34.0/go.mod h1:homfLqTYRFyVYemLBFl5GgL/DWEiH5wcsQ5gSh1yziA=
|
||||||
golang.org/x/time v0.12.0 h1:ScB/8o8olJvc+CQPWrK3fPZNfh7qgwCrY0zJmoEQLSE=
|
golang.org/x/time v0.12.0 h1:ScB/8o8olJvc+CQPWrK3fPZNfh7qgwCrY0zJmoEQLSE=
|
||||||
golang.org/x/time v0.12.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg=
|
golang.org/x/time v0.12.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg=
|
||||||
golang.org/x/tools v0.39.0 h1:ik4ho21kwuQln40uelmciQPp9SipgNDdrafrYA4TmQQ=
|
golang.org/x/tools v0.41.0 h1:a9b8iMweWG+S0OBnlU36rzLp20z1Rp10w+IY2czHTQc=
|
||||||
golang.org/x/tools v0.39.0/go.mod h1:JnefbkDPyD8UU2kI5fuf8ZX4/yUeh9W877ZeBONxUqQ=
|
golang.org/x/tools v0.41.0/go.mod h1:XSY6eDqxVNiYgezAVqqCeihT4j1U2CCsqvH3WhQpnlg=
|
||||||
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 h1:B82qJJgjvYKsXS9jeunTOisW56dUokqW/FOteYJJ/yg=
|
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 h1:B82qJJgjvYKsXS9jeunTOisW56dUokqW/FOteYJJ/yg=
|
||||||
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2/go.mod h1:deeaetjYA+DHMHg+sMSMI58GrEteJUUzzw7en6TJQcI=
|
golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2/go.mod h1:deeaetjYA+DHMHg+sMSMI58GrEteJUUzzw7en6TJQcI=
|
||||||
golang.zx2c4.com/wireguard v0.0.0-20250521234502-f333402bd9cb h1:whnFRlWMcXI9d+ZbWg+4sHnLp52d5yiIPUxMBSt4X9A=
|
golang.zx2c4.com/wireguard v0.0.0-20250521234502-f333402bd9cb h1:whnFRlWMcXI9d+ZbWg+4sHnLp52d5yiIPUxMBSt4X9A=
|
||||||
@@ -155,14 +155,14 @@ golang.zx2c4.com/wireguard/windows v0.5.3 h1:On6j2Rpn3OEMXqBq00QEDC7bWSZrPIHKIus
|
|||||||
golang.zx2c4.com/wireguard/windows v0.5.3/go.mod h1:9TEe8TJmtwyQebdFwAkEWOPr3prrtqm+REGFifP60hI=
|
golang.zx2c4.com/wireguard/windows v0.5.3/go.mod h1:9TEe8TJmtwyQebdFwAkEWOPr3prrtqm+REGFifP60hI=
|
||||||
gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk=
|
gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk=
|
||||||
gonum.org/v1/gonum v0.16.0/go.mod h1:fef3am4MQ93R2HHpKnLk4/Tbh/s0+wqD5nfa6Pnwy4E=
|
gonum.org/v1/gonum v0.16.0/go.mod h1:fef3am4MQ93R2HHpKnLk4/Tbh/s0+wqD5nfa6Pnwy4E=
|
||||||
google.golang.org/genproto/googleapis/api v0.0.0-20250825161204-c5933d9347a5 h1:BIRfGDEjiHRrk0QKZe3Xv2ieMhtgRGeLcZQ0mIVn4EY=
|
google.golang.org/genproto/googleapis/api v0.0.0-20260209200024-4cfbd4190f57 h1:JLQynH/LBHfCTSbDWl+py8C+Rg/k1OVH3xfcaiANuF0=
|
||||||
google.golang.org/genproto/googleapis/api v0.0.0-20250825161204-c5933d9347a5/go.mod h1:j3QtIyytwqGr1JUDtYXwtMXWPKsEa5LtzIFN1Wn5WvE=
|
google.golang.org/genproto/googleapis/api v0.0.0-20260209200024-4cfbd4190f57/go.mod h1:kSJwQxqmFXeo79zOmbrALdflXQeAYcUbgS7PbpMknCY=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250825161204-c5933d9347a5 h1:eaY8u2EuxbRv7c3NiGK0/NedzVsCcV6hDuU5qPX5EGE=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20260209200024-4cfbd4190f57 h1:mWPCjDEyshlQYzBpMNHaEof6UX1PmHcaUODUywQ0uac=
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250825161204-c5933d9347a5/go.mod h1:M4/wBTSeyLxupu3W3tJtOgB14jILAS/XWPSSa3TAlJc=
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20260209200024-4cfbd4190f57/go.mod h1:j9x/tPzZkyxcgEFkiKEEGxfvyumM01BEtsW8xzOahRQ=
|
||||||
google.golang.org/grpc v1.76.0 h1:UnVkv1+uMLYXoIz6o7chp59WfQUYA2ex/BXQ9rHZu7A=
|
google.golang.org/grpc v1.79.1 h1:zGhSi45ODB9/p3VAawt9a+O/MULLl9dpizzNNpq7flY=
|
||||||
google.golang.org/grpc v1.76.0/go.mod h1:Ju12QI8M6iQJtbcsV+awF5a4hfJMLi4X0JLo94ULZ6c=
|
google.golang.org/grpc v1.79.1/go.mod h1:KmT0Kjez+0dde/v2j9vzwoAScgEPx/Bw1CYChhHLrHQ=
|
||||||
google.golang.org/protobuf v1.36.8 h1:xHScyCOEuuwZEc6UtSOvPbAT4zRh0xcNRYekJwfqyMc=
|
google.golang.org/protobuf v1.36.11 h1:fV6ZwhNocDyBLK0dj+fg8ektcVegBBuEolpbTQyBNVE=
|
||||||
google.golang.org/protobuf v1.36.8/go.mod h1:fuxRtAxBytpl4zzqUh6/eyUujkJdNiuEkXntxiD/uRU=
|
google.golang.org/protobuf v1.36.11/go.mod h1:HTf+CrKn2C3g5S8VImy6tdcUvCska2kB7j23XfzDpco=
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
||||||
@@ -172,5 +172,5 @@ gotest.tools/v3 v3.4.0 h1:ZazjZUfuVeZGLAmlKKuyv3IKP5orXcwtOwDQH6YVr6o=
|
|||||||
gotest.tools/v3 v3.4.0/go.mod h1:CtbdzLSsqVhDgMtKsx03ird5YTGB3ar27v0u/yKBW5g=
|
gotest.tools/v3 v3.4.0/go.mod h1:CtbdzLSsqVhDgMtKsx03ird5YTGB3ar27v0u/yKBW5g=
|
||||||
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c h1:m/r7OM+Y2Ty1sgBQ7Qb27VgIMBW8ZZhT4gLnUyDIhzI=
|
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c h1:m/r7OM+Y2Ty1sgBQ7Qb27VgIMBW8ZZhT4gLnUyDIhzI=
|
||||||
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c/go.mod h1:3r5CMtNQMKIvBlrmM9xWUNamjKBYPOWyXOjmg5Kts3g=
|
gvisor.dev/gvisor v0.0.0-20250503011706-39ed1f5ac29c/go.mod h1:3r5CMtNQMKIvBlrmM9xWUNamjKBYPOWyXOjmg5Kts3g=
|
||||||
software.sslmate.com/src/go-pkcs12 v0.6.0 h1:f3sQittAeF+pao32Vb+mkli+ZyT+VwKaD014qFGq6oU=
|
software.sslmate.com/src/go-pkcs12 v0.7.0 h1:Db8W44cB54TWD7stUFFSWxdfpdn6fZVcDl0w3R4RVM0=
|
||||||
software.sslmate.com/src/go-pkcs12 v0.6.0/go.mod h1:Qiz0EyvDRJjjxGyUQa2cCNZn/wMyzrRJ/qcDXOQazLI=
|
software.sslmate.com/src/go-pkcs12 v0.7.0/go.mod h1:Qiz0EyvDRJjjxGyUQa2cCNZn/wMyzrRJ/qcDXOQazLI=
|
||||||
|
|||||||
@@ -61,6 +61,7 @@ type Target struct {
|
|||||||
timer *time.Timer
|
timer *time.Timer
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
|
client *http.Client
|
||||||
}
|
}
|
||||||
|
|
||||||
// StatusChangeCallback is called when any target's status changes
|
// StatusChangeCallback is called when any target's status changes
|
||||||
@@ -185,6 +186,16 @@ func (m *Monitor) addTargetUnsafe(config Config) error {
|
|||||||
Status: StatusUnknown,
|
Status: StatusUnknown,
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
cancel: cancel,
|
cancel: cancel,
|
||||||
|
client: &http.Client{
|
||||||
|
Transport: &http.Transport{
|
||||||
|
TLSClientConfig: &tls.Config{
|
||||||
|
// Configure TLS settings based on certificate enforcement
|
||||||
|
InsecureSkipVerify: !m.enforceCert,
|
||||||
|
// Use SNI TLS header if present
|
||||||
|
ServerName: config.TLSServerName,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
m.targets[config.ID] = target
|
m.targets[config.ID] = target
|
||||||
@@ -378,17 +389,6 @@ func (m *Monitor) performHealthCheck(target *Target) {
|
|||||||
ctx, cancel := context.WithTimeout(context.Background(), time.Duration(target.Config.Timeout)*time.Second)
|
ctx, cancel := context.WithTimeout(context.Background(), time.Duration(target.Config.Timeout)*time.Second)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
|
|
||||||
client := &http.Client{
|
|
||||||
Transport: &http.Transport{
|
|
||||||
TLSClientConfig: &tls.Config{
|
|
||||||
// Configure TLS settings based on certificate enforcement
|
|
||||||
InsecureSkipVerify: !m.enforceCert,
|
|
||||||
// Use SNI TLS header if present
|
|
||||||
ServerName: target.Config.TLSServerName,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
req, err := http.NewRequestWithContext(ctx, target.Config.Method, url, nil)
|
req, err := http.NewRequestWithContext(ctx, target.Config.Method, url, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
target.Status = StatusUnhealthy
|
target.Status = StatusUnhealthy
|
||||||
@@ -408,7 +408,7 @@ func (m *Monitor) performHealthCheck(target *Target) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Perform request
|
// Perform request
|
||||||
resp, err := client.Do(req)
|
resp, err := target.client.Do(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
target.Status = StatusUnhealthy
|
target.Status = StatusUnhealthy
|
||||||
target.LastError = fmt.Sprintf("request failed: %v", err)
|
target.LastError = fmt.Sprintf("request failed: %v", err)
|
||||||
|
|||||||
@@ -39,10 +39,14 @@ type Manager struct {
|
|||||||
updateChan chan struct{} // signals the goroutine to refresh exit nodes
|
updateChan chan struct{} // signals the goroutine to refresh exit nodes
|
||||||
|
|
||||||
sendHolepunchInterval time.Duration
|
sendHolepunchInterval time.Duration
|
||||||
|
sendHolepunchIntervalMin time.Duration
|
||||||
|
sendHolepunchIntervalMax time.Duration
|
||||||
|
defaultIntervalMin time.Duration
|
||||||
|
defaultIntervalMax time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
const sendHolepunchIntervalMax = 60 * time.Second
|
const defaultSendHolepunchIntervalMax = 60 * time.Second
|
||||||
const sendHolepunchIntervalMin = 1 * time.Second
|
const defaultSendHolepunchIntervalMin = 1 * time.Second
|
||||||
|
|
||||||
// NewManager creates a new hole punch manager
|
// NewManager creates a new hole punch manager
|
||||||
func NewManager(sharedBind *bind.SharedBind, ID string, clientType string, publicKey string) *Manager {
|
func NewManager(sharedBind *bind.SharedBind, ID string, clientType string, publicKey string) *Manager {
|
||||||
@@ -52,7 +56,11 @@ func NewManager(sharedBind *bind.SharedBind, ID string, clientType string, publi
|
|||||||
clientType: clientType,
|
clientType: clientType,
|
||||||
publicKey: publicKey,
|
publicKey: publicKey,
|
||||||
exitNodes: make(map[string]ExitNode),
|
exitNodes: make(map[string]ExitNode),
|
||||||
sendHolepunchInterval: sendHolepunchIntervalMin,
|
sendHolepunchInterval: defaultSendHolepunchIntervalMin,
|
||||||
|
sendHolepunchIntervalMin: defaultSendHolepunchIntervalMin,
|
||||||
|
sendHolepunchIntervalMax: defaultSendHolepunchIntervalMax,
|
||||||
|
defaultIntervalMin: defaultSendHolepunchIntervalMin,
|
||||||
|
defaultIntervalMax: defaultSendHolepunchIntervalMax,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -200,17 +208,46 @@ func (m *Manager) GetExitNodes() []ExitNode {
|
|||||||
return nodes
|
return nodes
|
||||||
}
|
}
|
||||||
|
|
||||||
// ResetInterval resets the hole punch interval back to the minimum value,
|
// SetServerHolepunchInterval sets custom min and max intervals for hole punching.
|
||||||
// allowing it to climb back up through exponential backoff.
|
// This is useful for low power mode where longer intervals are desired.
|
||||||
// This is useful when network conditions change or connectivity is restored.
|
func (m *Manager) SetServerHolepunchInterval(min, max time.Duration) {
|
||||||
func (m *Manager) ResetInterval() {
|
|
||||||
m.mu.Lock()
|
m.mu.Lock()
|
||||||
defer m.mu.Unlock()
|
defer m.mu.Unlock()
|
||||||
|
|
||||||
if m.sendHolepunchInterval != sendHolepunchIntervalMin {
|
m.sendHolepunchIntervalMin = min
|
||||||
m.sendHolepunchInterval = sendHolepunchIntervalMin
|
m.sendHolepunchIntervalMax = max
|
||||||
logger.Info("Reset hole punch interval to minimum (%v)", sendHolepunchIntervalMin)
|
m.sendHolepunchInterval = min
|
||||||
|
|
||||||
|
logger.Info("Set hole punch intervals: min=%v, max=%v", min, max)
|
||||||
|
|
||||||
|
// Signal the goroutine to apply the new interval if running
|
||||||
|
if m.running && m.updateChan != nil {
|
||||||
|
select {
|
||||||
|
case m.updateChan <- struct{}{}:
|
||||||
|
default:
|
||||||
|
// Channel full or closed, skip
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetInterval returns the current min and max intervals
|
||||||
|
func (m *Manager) GetServerHolepunchInterval() (min, max time.Duration) {
|
||||||
|
m.mu.Lock()
|
||||||
|
defer m.mu.Unlock()
|
||||||
|
return m.sendHolepunchIntervalMin, m.sendHolepunchIntervalMax
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResetServerHolepunchInterval resets the hole punch interval back to the default values.
|
||||||
|
// This restores normal operation after low power mode or other custom settings.
|
||||||
|
func (m *Manager) ResetServerHolepunchInterval() {
|
||||||
|
m.mu.Lock()
|
||||||
|
defer m.mu.Unlock()
|
||||||
|
|
||||||
|
m.sendHolepunchIntervalMin = m.defaultIntervalMin
|
||||||
|
m.sendHolepunchIntervalMax = m.defaultIntervalMax
|
||||||
|
m.sendHolepunchInterval = m.defaultIntervalMin
|
||||||
|
|
||||||
|
logger.Info("Reset hole punch intervals to defaults: min=%v, max=%v", m.defaultIntervalMin, m.defaultIntervalMax)
|
||||||
|
|
||||||
// Signal the goroutine to apply the new interval if running
|
// Signal the goroutine to apply the new interval if running
|
||||||
if m.running && m.updateChan != nil {
|
if m.running && m.updateChan != nil {
|
||||||
@@ -393,7 +430,7 @@ func (m *Manager) runMultipleExitNodes() {
|
|||||||
|
|
||||||
// Start with minimum interval
|
// Start with minimum interval
|
||||||
m.mu.Lock()
|
m.mu.Lock()
|
||||||
m.sendHolepunchInterval = sendHolepunchIntervalMin
|
m.sendHolepunchInterval = m.sendHolepunchIntervalMin
|
||||||
m.mu.Unlock()
|
m.mu.Unlock()
|
||||||
|
|
||||||
ticker := time.NewTicker(m.sendHolepunchInterval)
|
ticker := time.NewTicker(m.sendHolepunchInterval)
|
||||||
@@ -415,7 +452,7 @@ func (m *Manager) runMultipleExitNodes() {
|
|||||||
}
|
}
|
||||||
// Reset interval to minimum on update
|
// Reset interval to minimum on update
|
||||||
m.mu.Lock()
|
m.mu.Lock()
|
||||||
m.sendHolepunchInterval = sendHolepunchIntervalMin
|
m.sendHolepunchInterval = m.sendHolepunchIntervalMin
|
||||||
m.mu.Unlock()
|
m.mu.Unlock()
|
||||||
ticker.Reset(m.sendHolepunchInterval)
|
ticker.Reset(m.sendHolepunchInterval)
|
||||||
// Send immediate hole punch to newly resolved nodes
|
// Send immediate hole punch to newly resolved nodes
|
||||||
@@ -435,8 +472,8 @@ func (m *Manager) runMultipleExitNodes() {
|
|||||||
// Exponential backoff: double the interval up to max
|
// Exponential backoff: double the interval up to max
|
||||||
m.mu.Lock()
|
m.mu.Lock()
|
||||||
newInterval := m.sendHolepunchInterval * 2
|
newInterval := m.sendHolepunchInterval * 2
|
||||||
if newInterval > sendHolepunchIntervalMax {
|
if newInterval > m.sendHolepunchIntervalMax {
|
||||||
newInterval = sendHolepunchIntervalMax
|
newInterval = m.sendHolepunchIntervalMax
|
||||||
}
|
}
|
||||||
if newInterval != m.sendHolepunchInterval {
|
if newInterval != m.sendHolepunchInterval {
|
||||||
m.sendHolepunchInterval = newInterval
|
m.sendHolepunchInterval = newInterval
|
||||||
|
|||||||
@@ -41,6 +41,12 @@ func DefaultTestOptions() TestConnectionOptions {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// cachedAddr holds a cached resolved UDP address
|
||||||
|
type cachedAddr struct {
|
||||||
|
addr *net.UDPAddr
|
||||||
|
resolvedAt time.Time
|
||||||
|
}
|
||||||
|
|
||||||
// HolepunchTester monitors holepunch connectivity using magic packets
|
// HolepunchTester monitors holepunch connectivity using magic packets
|
||||||
type HolepunchTester struct {
|
type HolepunchTester struct {
|
||||||
sharedBind *bind.SharedBind
|
sharedBind *bind.SharedBind
|
||||||
@@ -53,6 +59,11 @@ type HolepunchTester struct {
|
|||||||
|
|
||||||
// Callback when connection status changes
|
// Callback when connection status changes
|
||||||
callback HolepunchStatusCallback
|
callback HolepunchStatusCallback
|
||||||
|
|
||||||
|
// Address cache to avoid repeated DNS/UDP resolution
|
||||||
|
addrCache map[string]*cachedAddr
|
||||||
|
addrCacheMu sync.RWMutex
|
||||||
|
addrCacheTTL time.Duration // How long cached addresses are valid
|
||||||
}
|
}
|
||||||
|
|
||||||
// HolepunchStatus represents the status of a holepunch connection
|
// HolepunchStatus represents the status of a holepunch connection
|
||||||
@@ -76,6 +87,8 @@ type pendingRequest struct {
|
|||||||
func NewHolepunchTester(sharedBind *bind.SharedBind) *HolepunchTester {
|
func NewHolepunchTester(sharedBind *bind.SharedBind) *HolepunchTester {
|
||||||
return &HolepunchTester{
|
return &HolepunchTester{
|
||||||
sharedBind: sharedBind,
|
sharedBind: sharedBind,
|
||||||
|
addrCache: make(map[string]*cachedAddr),
|
||||||
|
addrCacheTTL: 5 * time.Minute, // Cache addresses for 5 minutes
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -135,12 +148,70 @@ func (t *HolepunchTester) Stop() {
|
|||||||
return true
|
return true
|
||||||
})
|
})
|
||||||
|
|
||||||
|
// Clear address cache
|
||||||
|
t.addrCacheMu.Lock()
|
||||||
|
t.addrCache = make(map[string]*cachedAddr)
|
||||||
|
t.addrCacheMu.Unlock()
|
||||||
|
|
||||||
logger.Debug("HolepunchTester stopped")
|
logger.Debug("HolepunchTester stopped")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// resolveEndpoint resolves an endpoint to a UDP address, using cache when possible
|
||||||
|
func (t *HolepunchTester) resolveEndpoint(endpoint string) (*net.UDPAddr, error) {
|
||||||
|
// Check cache first
|
||||||
|
t.addrCacheMu.RLock()
|
||||||
|
cached, ok := t.addrCache[endpoint]
|
||||||
|
ttl := t.addrCacheTTL
|
||||||
|
t.addrCacheMu.RUnlock()
|
||||||
|
|
||||||
|
if ok && time.Since(cached.resolvedAt) < ttl {
|
||||||
|
return cached.addr, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resolve the endpoint
|
||||||
|
host, err := util.ResolveDomain(endpoint)
|
||||||
|
if err != nil {
|
||||||
|
host = endpoint
|
||||||
|
}
|
||||||
|
|
||||||
|
_, _, err = net.SplitHostPort(host)
|
||||||
|
if err != nil {
|
||||||
|
host = net.JoinHostPort(host, "21820")
|
||||||
|
}
|
||||||
|
|
||||||
|
remoteAddr, err := net.ResolveUDPAddr("udp", host)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to resolve UDP address %s: %w", host, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cache the result
|
||||||
|
t.addrCacheMu.Lock()
|
||||||
|
t.addrCache[endpoint] = &cachedAddr{
|
||||||
|
addr: remoteAddr,
|
||||||
|
resolvedAt: time.Now(),
|
||||||
|
}
|
||||||
|
t.addrCacheMu.Unlock()
|
||||||
|
|
||||||
|
return remoteAddr, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// InvalidateCache removes a specific endpoint from the address cache
|
||||||
|
func (t *HolepunchTester) InvalidateCache(endpoint string) {
|
||||||
|
t.addrCacheMu.Lock()
|
||||||
|
delete(t.addrCache, endpoint)
|
||||||
|
t.addrCacheMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClearCache clears all cached addresses
|
||||||
|
func (t *HolepunchTester) ClearCache() {
|
||||||
|
t.addrCacheMu.Lock()
|
||||||
|
t.addrCache = make(map[string]*cachedAddr)
|
||||||
|
t.addrCacheMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
// handleResponse is called by SharedBind when a magic response is received
|
// handleResponse is called by SharedBind when a magic response is received
|
||||||
func (t *HolepunchTester) handleResponse(addr netip.AddrPort, echoData []byte) {
|
func (t *HolepunchTester) handleResponse(addr netip.AddrPort, echoData []byte) {
|
||||||
logger.Debug("Received magic response from %s", addr.String())
|
// logger.Debug("Received magic response from %s", addr.String())
|
||||||
key := string(echoData)
|
key := string(echoData)
|
||||||
|
|
||||||
value, ok := t.pendingRequests.LoadAndDelete(key)
|
value, ok := t.pendingRequests.LoadAndDelete(key)
|
||||||
@@ -152,7 +223,7 @@ func (t *HolepunchTester) handleResponse(addr netip.AddrPort, echoData []byte) {
|
|||||||
|
|
||||||
req := value.(*pendingRequest)
|
req := value.(*pendingRequest)
|
||||||
rtt := time.Since(req.sentAt)
|
rtt := time.Since(req.sentAt)
|
||||||
logger.Debug("Magic response matched pending request for %s (RTT: %v)", req.endpoint, rtt)
|
// logger.Debug("Magic response matched pending request for %s (RTT: %v)", req.endpoint, rtt)
|
||||||
|
|
||||||
// Send RTT to the waiting goroutine (non-blocking)
|
// Send RTT to the waiting goroutine (non-blocking)
|
||||||
select {
|
select {
|
||||||
@@ -183,20 +254,10 @@ func (t *HolepunchTester) TestEndpoint(endpoint string, timeout time.Duration) T
|
|||||||
return result
|
return result
|
||||||
}
|
}
|
||||||
|
|
||||||
// Resolve the endpoint
|
// Resolve the endpoint (using cache)
|
||||||
host, err := util.ResolveDomain(endpoint)
|
remoteAddr, err := t.resolveEndpoint(endpoint)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
host = endpoint
|
result.Error = err
|
||||||
}
|
|
||||||
|
|
||||||
_, _, err = net.SplitHostPort(host)
|
|
||||||
if err != nil {
|
|
||||||
host = net.JoinHostPort(host, "21820")
|
|
||||||
}
|
|
||||||
|
|
||||||
remoteAddr, err := net.ResolveUDPAddr("udp", host)
|
|
||||||
if err != nil {
|
|
||||||
result.Error = fmt.Errorf("failed to resolve UDP address %s: %w", host, err)
|
|
||||||
return result
|
return result
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
358
main.go
358
main.go
@@ -1,7 +1,9 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
|
"crypto/tls"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"flag"
|
"flag"
|
||||||
@@ -11,12 +13,12 @@ import (
|
|||||||
"net/netip"
|
"net/netip"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
"os/signal"
|
||||||
"path/filepath"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"syscall"
|
"syscall"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/fosrl/newt/authdaemon"
|
||||||
"github.com/fosrl/newt/docker"
|
"github.com/fosrl/newt/docker"
|
||||||
"github.com/fosrl/newt/healthcheck"
|
"github.com/fosrl/newt/healthcheck"
|
||||||
"github.com/fosrl/newt/logger"
|
"github.com/fosrl/newt/logger"
|
||||||
@@ -58,10 +60,6 @@ type ExitNodeData struct {
|
|||||||
ExitNodes []ExitNode `json:"exitNodes"`
|
ExitNodes []ExitNode `json:"exitNodes"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type SSHPublicKeyData struct {
|
|
||||||
PublicKey string `json:"publicKey"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// ExitNode represents an exit node with an ID, endpoint, and weight.
|
// ExitNode represents an exit node with an ID, endpoint, and weight.
|
||||||
type ExitNode struct {
|
type ExitNode struct {
|
||||||
ID int `json:"exitNodeId"`
|
ID int `json:"exitNodeId"`
|
||||||
@@ -118,6 +116,7 @@ var (
|
|||||||
logLevel string
|
logLevel string
|
||||||
interfaceName string
|
interfaceName string
|
||||||
port uint16
|
port uint16
|
||||||
|
portStr string
|
||||||
disableClients bool
|
disableClients bool
|
||||||
updownScript string
|
updownScript string
|
||||||
dockerSocket string
|
dockerSocket string
|
||||||
@@ -134,6 +133,11 @@ var (
|
|||||||
preferEndpoint string
|
preferEndpoint string
|
||||||
healthMonitor *healthcheck.Monitor
|
healthMonitor *healthcheck.Monitor
|
||||||
enforceHealthcheckCert bool
|
enforceHealthcheckCert bool
|
||||||
|
authDaemonKey string
|
||||||
|
authDaemonPrincipalsFile string
|
||||||
|
authDaemonCACertPath string
|
||||||
|
authDaemonEnabled bool
|
||||||
|
authDaemonGenerateRandomPassword bool
|
||||||
// Build/version (can be overridden via -ldflags "-X main.newtVersion=...")
|
// Build/version (can be overridden via -ldflags "-X main.newtVersion=...")
|
||||||
newtVersion = "version_replaceme"
|
newtVersion = "version_replaceme"
|
||||||
|
|
||||||
@@ -156,6 +160,28 @@ var (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
|
// Check for subcommands first (only principals exits early)
|
||||||
|
if len(os.Args) > 1 {
|
||||||
|
switch os.Args[1] {
|
||||||
|
case "auth-daemon":
|
||||||
|
// Run principals subcommand only if the next argument is "principals"
|
||||||
|
if len(os.Args) > 2 && os.Args[2] == "principals" {
|
||||||
|
runPrincipalsCmd(os.Args[3:])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// auth-daemon subcommand without "principals" - show help
|
||||||
|
fmt.Println("Error: auth-daemon subcommand requires 'principals' argument")
|
||||||
|
fmt.Println()
|
||||||
|
fmt.Println("Usage:")
|
||||||
|
fmt.Println(" newt auth-daemon principals [options]")
|
||||||
|
fmt.Println()
|
||||||
|
|
||||||
|
// If not "principals", exit the switch to continue with normal execution
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Check if we're running as a Windows service
|
// Check if we're running as a Windows service
|
||||||
if isWindowsService() {
|
if isWindowsService() {
|
||||||
runService("NewtWireguardService", false, os.Args[1:])
|
runService("NewtWireguardService", false, os.Args[1:])
|
||||||
@@ -186,7 +212,12 @@ func runNewtMain(ctx context.Context) {
|
|||||||
logLevel = os.Getenv("LOG_LEVEL")
|
logLevel = os.Getenv("LOG_LEVEL")
|
||||||
updownScript = os.Getenv("UPDOWN_SCRIPT")
|
updownScript = os.Getenv("UPDOWN_SCRIPT")
|
||||||
interfaceName = os.Getenv("INTERFACE")
|
interfaceName = os.Getenv("INTERFACE")
|
||||||
portStr := os.Getenv("PORT")
|
portStr = os.Getenv("PORT")
|
||||||
|
authDaemonKey = os.Getenv("AD_KEY")
|
||||||
|
authDaemonPrincipalsFile = os.Getenv("AD_PRINCIPALS_FILE")
|
||||||
|
authDaemonCACertPath = os.Getenv("AD_CA_CERT_PATH")
|
||||||
|
authDaemonEnabledEnv := os.Getenv("AUTH_DAEMON_ENABLED")
|
||||||
|
authDaemonGenerateRandomPasswordEnv := os.Getenv("AD_GENERATE_RANDOM_PASSWORD")
|
||||||
|
|
||||||
// Metrics/observability env mirrors
|
// Metrics/observability env mirrors
|
||||||
metricsEnabledEnv := os.Getenv("NEWT_METRICS_PROMETHEUS_ENABLED")
|
metricsEnabledEnv := os.Getenv("NEWT_METRICS_PROMETHEUS_ENABLED")
|
||||||
@@ -279,10 +310,6 @@ func runNewtMain(ctx context.Context) {
|
|||||||
// load the prefer endpoint just as a flag
|
// load the prefer endpoint just as a flag
|
||||||
flag.StringVar(&preferEndpoint, "prefer-endpoint", "", "Prefer this endpoint for the connection (if set, will override the endpoint from the server)")
|
flag.StringVar(&preferEndpoint, "prefer-endpoint", "", "Prefer this endpoint for the connection (if set, will override the endpoint from the server)")
|
||||||
|
|
||||||
// if authorizedKeysFile == "" {
|
|
||||||
// flag.StringVar(&authorizedKeysFile, "authorized-keys-file", "~/.ssh/authorized_keys", "Path to authorized keys file (if unset, no keys will be authorized)")
|
|
||||||
// }
|
|
||||||
|
|
||||||
// Add new mTLS flags
|
// Add new mTLS flags
|
||||||
if tlsClientCert == "" {
|
if tlsClientCert == "" {
|
||||||
flag.StringVar(&tlsClientCert, "tls-client-cert-file", "", "Path to client certificate file (PEM/DER format)")
|
flag.StringVar(&tlsClientCert, "tls-client-cert-file", "", "Path to client certificate file (PEM/DER format)")
|
||||||
@@ -320,15 +347,6 @@ func runNewtMain(ctx context.Context) {
|
|||||||
pingTimeout = 5 * time.Second
|
pingTimeout = 5 * time.Second
|
||||||
}
|
}
|
||||||
|
|
||||||
if portStr != "" {
|
|
||||||
portInt, err := strconv.Atoi(portStr)
|
|
||||||
if err != nil {
|
|
||||||
logger.Warn("Failed to parse PORT, choosing a random port")
|
|
||||||
} else {
|
|
||||||
port = uint16(portInt)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if dockerEnforceNetworkValidation == "" {
|
if dockerEnforceNetworkValidation == "" {
|
||||||
flag.StringVar(&dockerEnforceNetworkValidation, "docker-enforce-network-validation", "false", "Enforce validation of container on newt network (true or false)")
|
flag.StringVar(&dockerEnforceNetworkValidation, "docker-enforce-network-validation", "false", "Enforce validation of container on newt network (true or false)")
|
||||||
}
|
}
|
||||||
@@ -344,7 +362,7 @@ func runNewtMain(ctx context.Context) {
|
|||||||
|
|
||||||
// Metrics/observability flags (mirror ENV if unset)
|
// Metrics/observability flags (mirror ENV if unset)
|
||||||
if metricsEnabledEnv == "" {
|
if metricsEnabledEnv == "" {
|
||||||
flag.BoolVar(&metricsEnabled, "metrics", true, "Enable Prometheus /metrics exporter")
|
flag.BoolVar(&metricsEnabled, "metrics", false, "Enable Prometheus metrics exporter")
|
||||||
} else {
|
} else {
|
||||||
if v, err := strconv.ParseBool(metricsEnabledEnv); err == nil {
|
if v, err := strconv.ParseBool(metricsEnabledEnv); err == nil {
|
||||||
metricsEnabled = v
|
metricsEnabled = v
|
||||||
@@ -379,6 +397,31 @@ func runNewtMain(ctx context.Context) {
|
|||||||
region = regionEnv
|
region = regionEnv
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Auth daemon flags
|
||||||
|
if authDaemonKey == "" {
|
||||||
|
flag.StringVar(&authDaemonKey, "ad-pre-shared-key", "", "Pre-shared key for auth daemon authentication")
|
||||||
|
}
|
||||||
|
if authDaemonPrincipalsFile == "" {
|
||||||
|
flag.StringVar(&authDaemonPrincipalsFile, "ad-principals-file", "/var/run/auth-daemon/principals", "Path to the principals file for auth daemon")
|
||||||
|
}
|
||||||
|
if authDaemonCACertPath == "" {
|
||||||
|
flag.StringVar(&authDaemonCACertPath, "ad-ca-cert-path", "/etc/ssh/ca.pem", "Path to the CA certificate file for auth daemon")
|
||||||
|
}
|
||||||
|
if authDaemonEnabledEnv == "" {
|
||||||
|
flag.BoolVar(&authDaemonEnabled, "auth-daemon", false, "Enable auth daemon mode (runs alongside normal newt operation)")
|
||||||
|
} else {
|
||||||
|
if v, err := strconv.ParseBool(authDaemonEnabledEnv); err == nil {
|
||||||
|
authDaemonEnabled = v
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if authDaemonGenerateRandomPasswordEnv == "" {
|
||||||
|
flag.BoolVar(&authDaemonGenerateRandomPassword, "ad-generate-random-password", false, "Generate a random password for authenticated users")
|
||||||
|
} else {
|
||||||
|
if v, err := strconv.ParseBool(authDaemonGenerateRandomPasswordEnv); err == nil {
|
||||||
|
authDaemonGenerateRandomPassword = v
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// do a --version check
|
// do a --version check
|
||||||
version := flag.Bool("version", false, "Print the version")
|
version := flag.Bool("version", false, "Print the version")
|
||||||
|
|
||||||
@@ -389,6 +432,15 @@ func runNewtMain(ctx context.Context) {
|
|||||||
tlsClientCAs = append(tlsClientCAs, tlsClientCAsFlag...)
|
tlsClientCAs = append(tlsClientCAs, tlsClientCAsFlag...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if portStr != "" {
|
||||||
|
portInt, err := strconv.Atoi(portStr)
|
||||||
|
if err != nil {
|
||||||
|
logger.Warn("Failed to parse PORT, choosing a random port")
|
||||||
|
} else {
|
||||||
|
port = uint16(portInt)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if *version {
|
if *version {
|
||||||
fmt.Println("Newt version " + newtVersion)
|
fmt.Println("Newt version " + newtVersion)
|
||||||
os.Exit(0)
|
os.Exit(0)
|
||||||
@@ -398,6 +450,13 @@ func runNewtMain(ctx context.Context) {
|
|||||||
|
|
||||||
logger.Init(nil)
|
logger.Init(nil)
|
||||||
loggerLevel := util.ParseLogLevel(logLevel)
|
loggerLevel := util.ParseLogLevel(logLevel)
|
||||||
|
|
||||||
|
// Start auth daemon if enabled
|
||||||
|
if authDaemonEnabled {
|
||||||
|
if err := startAuthDaemon(ctx); err != nil {
|
||||||
|
logger.Fatal("Failed to start auth daemon: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
logger.GetLogger().SetLevel(loggerLevel)
|
logger.GetLogger().SetLevel(loggerLevel)
|
||||||
|
|
||||||
// Initialize telemetry after flags are parsed (so flags override env)
|
// Initialize telemetry after flags are parsed (so flags override env)
|
||||||
@@ -560,6 +619,8 @@ func runNewtMain(ctx context.Context) {
|
|||||||
var wgData WgData
|
var wgData WgData
|
||||||
var dockerEventMonitor *docker.EventMonitor
|
var dockerEventMonitor *docker.EventMonitor
|
||||||
|
|
||||||
|
logger.Debug("++++++++++++++++++++++ the port is %d", port)
|
||||||
|
|
||||||
if !disableClients {
|
if !disableClients {
|
||||||
setupClients(client)
|
setupClients(client)
|
||||||
}
|
}
|
||||||
@@ -1168,94 +1229,6 @@ persistent_keepalive_interval=5`, util.FixKey(privateKey.String()), util.FixKey(
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
// EXPERIMENTAL: WHAT SHOULD WE DO ABOUT SECURITY?
|
|
||||||
client.RegisterHandler("newt/send/ssh/publicKey", func(msg websocket.WSMessage) {
|
|
||||||
logger.Debug("Received SSH public key request")
|
|
||||||
|
|
||||||
var sshPublicKeyData SSHPublicKeyData
|
|
||||||
|
|
||||||
jsonData, err := json.Marshal(msg.Data)
|
|
||||||
if err != nil {
|
|
||||||
logger.Info(fmtErrMarshaling, err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if err := json.Unmarshal(jsonData, &sshPublicKeyData); err != nil {
|
|
||||||
logger.Info("Error unmarshaling SSH public key data: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
sshPublicKey := sshPublicKeyData.PublicKey
|
|
||||||
|
|
||||||
if authorizedKeysFile == "" {
|
|
||||||
logger.Debug("No authorized keys file set, skipping public key response")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Expand tilde to home directory if present
|
|
||||||
expandedPath := authorizedKeysFile
|
|
||||||
if strings.HasPrefix(authorizedKeysFile, "~/") {
|
|
||||||
homeDir, err := os.UserHomeDir()
|
|
||||||
if err != nil {
|
|
||||||
logger.Error("Failed to get user home directory: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
expandedPath = filepath.Join(homeDir, authorizedKeysFile[2:])
|
|
||||||
}
|
|
||||||
|
|
||||||
// if it is set but the file does not exist, create it
|
|
||||||
if _, err := os.Stat(expandedPath); os.IsNotExist(err) {
|
|
||||||
logger.Debug("Authorized keys file does not exist, creating it: %s", expandedPath)
|
|
||||||
if err := os.MkdirAll(filepath.Dir(expandedPath), 0755); err != nil {
|
|
||||||
logger.Error("Failed to create directory for authorized keys file: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if _, err := os.Create(expandedPath); err != nil {
|
|
||||||
logger.Error("Failed to create authorized keys file: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the public key already exists in the file
|
|
||||||
fileContent, err := os.ReadFile(expandedPath)
|
|
||||||
if err != nil {
|
|
||||||
logger.Error("Failed to read authorized keys file: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the key already exists (trim whitespace for comparison)
|
|
||||||
existingKeys := strings.Split(string(fileContent), "\n")
|
|
||||||
keyAlreadyExists := false
|
|
||||||
trimmedNewKey := strings.TrimSpace(sshPublicKey)
|
|
||||||
|
|
||||||
for _, existingKey := range existingKeys {
|
|
||||||
if strings.TrimSpace(existingKey) == trimmedNewKey && trimmedNewKey != "" {
|
|
||||||
keyAlreadyExists = true
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if keyAlreadyExists {
|
|
||||||
logger.Info("SSH public key already exists in authorized keys file, skipping")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// append the public key to the authorized keys file
|
|
||||||
logger.Debug("Appending public key to authorized keys file: %s", sshPublicKey)
|
|
||||||
file, err := os.OpenFile(expandedPath, os.O_APPEND|os.O_WRONLY, 0644)
|
|
||||||
if err != nil {
|
|
||||||
logger.Error("Failed to open authorized keys file: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
defer file.Close()
|
|
||||||
|
|
||||||
if _, err := file.WriteString(sshPublicKey + "\n"); err != nil {
|
|
||||||
logger.Error("Failed to write public key to authorized keys file: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
logger.Info("SSH public key appended to authorized keys file")
|
|
||||||
})
|
|
||||||
|
|
||||||
// Register handler for adding health check targets
|
// Register handler for adding health check targets
|
||||||
client.RegisterHandler("newt/healthcheck/add", func(msg websocket.WSMessage) {
|
client.RegisterHandler("newt/healthcheck/add", func(msg websocket.WSMessage) {
|
||||||
logger.Debug("Received health check add request: %+v", msg)
|
logger.Debug("Received health check add request: %+v", msg)
|
||||||
@@ -1411,6 +1384,175 @@ persistent_keepalive_interval=5`, util.FixKey(privateKey.String()), util.FixKey(
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
|
// Register handler for SSH certificate issued events
|
||||||
|
client.RegisterHandler("newt/pam/connection", func(msg websocket.WSMessage) {
|
||||||
|
logger.Debug("Received SSH certificate issued message")
|
||||||
|
|
||||||
|
// Define the structure of the incoming message
|
||||||
|
type SSHCertData struct {
|
||||||
|
MessageId int `json:"messageId"`
|
||||||
|
AgentPort int `json:"agentPort"`
|
||||||
|
AgentHost string `json:"agentHost"`
|
||||||
|
ExternalAuthDaemon bool `json:"externalAuthDaemon"`
|
||||||
|
CACert string `json:"caCert"`
|
||||||
|
Username string `json:"username"`
|
||||||
|
NiceID string `json:"niceId"`
|
||||||
|
Metadata struct {
|
||||||
|
SudoMode string `json:"sudoMode"`
|
||||||
|
SudoCommands []string `json:"sudoCommands"`
|
||||||
|
Homedir bool `json:"homedir"`
|
||||||
|
Groups []string `json:"groups"`
|
||||||
|
} `json:"metadata"`
|
||||||
|
}
|
||||||
|
|
||||||
|
var certData SSHCertData
|
||||||
|
jsonData, err := json.Marshal(msg.Data)
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Error marshaling SSH cert data: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// print the received data for debugging
|
||||||
|
logger.Debug("Received SSH cert data: %s", string(jsonData))
|
||||||
|
|
||||||
|
if err := json.Unmarshal(jsonData, &certData); err != nil {
|
||||||
|
logger.Error("Error unmarshaling SSH cert data: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if we're running the auth daemon internally
|
||||||
|
if authDaemonServer != nil && !certData.ExternalAuthDaemon { // if the auth daemon is running internally and the external auth daemon is not enabled
|
||||||
|
// Call ProcessConnection directly when running internally
|
||||||
|
logger.Debug("Calling internal auth daemon ProcessConnection for user %s", certData.Username)
|
||||||
|
|
||||||
|
authDaemonServer.ProcessConnection(authdaemon.ConnectionRequest{
|
||||||
|
CaCert: certData.CACert,
|
||||||
|
NiceId: certData.NiceID,
|
||||||
|
Username: certData.Username,
|
||||||
|
Metadata: authdaemon.ConnectionMetadata{
|
||||||
|
SudoMode: certData.Metadata.SudoMode,
|
||||||
|
SudoCommands: certData.Metadata.SudoCommands,
|
||||||
|
Homedir: certData.Metadata.Homedir,
|
||||||
|
Groups: certData.Metadata.Groups,
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
// Send success response back to cloud
|
||||||
|
err = client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
})
|
||||||
|
|
||||||
|
logger.Info("Successfully processed connection via internal auth daemon for user %s", certData.Username)
|
||||||
|
} else {
|
||||||
|
// External auth daemon mode - make HTTP request
|
||||||
|
// Check if auth daemon key is configured
|
||||||
|
if authDaemonKey == "" {
|
||||||
|
logger.Error("Auth daemon key not configured, cannot communicate with daemon")
|
||||||
|
// Send failure response back to cloud
|
||||||
|
err := client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
"error": "auth daemon key not configured",
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Failed to send SSH cert failure response: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare the request body for the auth daemon
|
||||||
|
requestBody := map[string]interface{}{
|
||||||
|
"caCert": certData.CACert,
|
||||||
|
"niceId": certData.NiceID,
|
||||||
|
"username": certData.Username,
|
||||||
|
"metadata": map[string]interface{}{
|
||||||
|
"sudoMode": certData.Metadata.SudoMode,
|
||||||
|
"sudoCommands": certData.Metadata.SudoCommands,
|
||||||
|
"homedir": certData.Metadata.Homedir,
|
||||||
|
"groups": certData.Metadata.Groups,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
requestJSON, err := json.Marshal(requestBody)
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Failed to marshal auth daemon request: %v", err)
|
||||||
|
// Send failure response
|
||||||
|
client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
"error": fmt.Sprintf("failed to marshal request: %v", err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create HTTPS client that skips certificate verification
|
||||||
|
// (auth daemon uses self-signed cert)
|
||||||
|
httpClient := &http.Client{
|
||||||
|
Transport: &http.Transport{
|
||||||
|
TLSClientConfig: &tls.Config{
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Timeout: 10 * time.Second,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make the request to the auth daemon
|
||||||
|
url := fmt.Sprintf("https://%s:%d/connection", certData.AgentHost, certData.AgentPort)
|
||||||
|
req, err := http.NewRequest("POST", url, bytes.NewBuffer(requestJSON))
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Failed to create auth daemon request: %v", err)
|
||||||
|
client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
"error": fmt.Sprintf("failed to create request: %v", err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set headers
|
||||||
|
req.Header.Set("Content-Type", "application/json")
|
||||||
|
req.Header.Set("Authorization", "Bearer "+authDaemonKey)
|
||||||
|
|
||||||
|
logger.Debug("Sending SSH cert to auth daemon at %s", url)
|
||||||
|
|
||||||
|
// Send the request
|
||||||
|
resp, err := httpClient.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Failed to connect to auth daemon: %v", err)
|
||||||
|
client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
"error": fmt.Sprintf("failed to connect to auth daemon: %v", err),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
// Check response status
|
||||||
|
if resp.StatusCode != http.StatusOK {
|
||||||
|
logger.Error("Auth daemon returned non-OK status: %d", resp.StatusCode)
|
||||||
|
client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
"error": fmt.Sprintf("auth daemon returned status %d", resp.StatusCode),
|
||||||
|
})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Info("Successfully registered SSH certificate with external auth daemon for user %s", certData.Username)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Send success response back to cloud
|
||||||
|
err = client.SendMessage("ws/round-trip/complete", map[string]interface{}{
|
||||||
|
"messageId": certData.MessageId,
|
||||||
|
"complete": true,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
logger.Error("Failed to send SSH cert success response: %v", err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
client.OnConnect(func() error {
|
client.OnConnect(func() error {
|
||||||
publicKey = privateKey.PublicKey()
|
publicKey = privateKey.PublicKey()
|
||||||
logger.Debug("Public key: %s", publicKey)
|
logger.Debug("Public key: %s", publicKey)
|
||||||
|
|||||||
@@ -48,115 +48,6 @@ type SubnetRule struct {
|
|||||||
PortRanges []PortRange // empty slice means all ports allowed
|
PortRanges []PortRange // empty slice means all ports allowed
|
||||||
}
|
}
|
||||||
|
|
||||||
// ruleKey is used as a map key for fast O(1) lookups
|
|
||||||
type ruleKey struct {
|
|
||||||
sourcePrefix string
|
|
||||||
destPrefix string
|
|
||||||
}
|
|
||||||
|
|
||||||
// SubnetLookup provides fast IP subnet and port matching with O(1) lookup performance
|
|
||||||
type SubnetLookup struct {
|
|
||||||
mu sync.RWMutex
|
|
||||||
rules map[ruleKey]*SubnetRule // Map for O(1) lookups by prefix combination
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewSubnetLookup creates a new subnet lookup table
|
|
||||||
func NewSubnetLookup() *SubnetLookup {
|
|
||||||
return &SubnetLookup{
|
|
||||||
rules: make(map[ruleKey]*SubnetRule),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// AddSubnet adds a subnet rule with source and destination prefixes and optional port restrictions
|
|
||||||
// If portRanges is nil or empty, all ports are allowed for this subnet
|
|
||||||
// rewriteTo can be either an IP/CIDR (e.g., "192.168.1.1/32") or a domain name (e.g., "example.com")
|
|
||||||
func (sl *SubnetLookup) AddSubnet(sourcePrefix, destPrefix netip.Prefix, rewriteTo string, portRanges []PortRange, disableIcmp bool) {
|
|
||||||
sl.mu.Lock()
|
|
||||||
defer sl.mu.Unlock()
|
|
||||||
|
|
||||||
key := ruleKey{
|
|
||||||
sourcePrefix: sourcePrefix.String(),
|
|
||||||
destPrefix: destPrefix.String(),
|
|
||||||
}
|
|
||||||
|
|
||||||
sl.rules[key] = &SubnetRule{
|
|
||||||
SourcePrefix: sourcePrefix,
|
|
||||||
DestPrefix: destPrefix,
|
|
||||||
DisableIcmp: disableIcmp,
|
|
||||||
RewriteTo: rewriteTo,
|
|
||||||
PortRanges: portRanges,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// RemoveSubnet removes a subnet rule from the lookup table
|
|
||||||
func (sl *SubnetLookup) RemoveSubnet(sourcePrefix, destPrefix netip.Prefix) {
|
|
||||||
sl.mu.Lock()
|
|
||||||
defer sl.mu.Unlock()
|
|
||||||
|
|
||||||
key := ruleKey{
|
|
||||||
sourcePrefix: sourcePrefix.String(),
|
|
||||||
destPrefix: destPrefix.String(),
|
|
||||||
}
|
|
||||||
|
|
||||||
delete(sl.rules, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Match checks if a source IP, destination IP, port, and protocol match any subnet rule
|
|
||||||
// Returns the matched rule if ALL of these conditions are met:
|
|
||||||
// - The source IP is in the rule's source prefix
|
|
||||||
// - The destination IP is in the rule's destination prefix
|
|
||||||
// - The port is in an allowed range (or no port restrictions exist)
|
|
||||||
// - The protocol matches (or the port range allows both protocols)
|
|
||||||
//
|
|
||||||
// proto should be header.TCPProtocolNumber or header.UDPProtocolNumber
|
|
||||||
// Returns nil if no rule matches
|
|
||||||
func (sl *SubnetLookup) Match(srcIP, dstIP netip.Addr, port uint16, proto tcpip.TransportProtocolNumber) *SubnetRule {
|
|
||||||
sl.mu.RLock()
|
|
||||||
defer sl.mu.RUnlock()
|
|
||||||
|
|
||||||
// Iterate through all rules to find matching source and destination prefixes
|
|
||||||
// This is O(n) but necessary since we need to check prefix containment, not exact match
|
|
||||||
for _, rule := range sl.rules {
|
|
||||||
// Check if source and destination IPs match their respective prefixes
|
|
||||||
if !rule.SourcePrefix.Contains(srcIP) {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if !rule.DestPrefix.Contains(dstIP) {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if rule.DisableIcmp && (proto == header.ICMPv4ProtocolNumber || proto == header.ICMPv6ProtocolNumber) {
|
|
||||||
// ICMP is disabled for this subnet
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Both IPs match - now check port restrictions
|
|
||||||
// If no port ranges specified, all ports are allowed
|
|
||||||
if len(rule.PortRanges) == 0 {
|
|
||||||
return rule
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if port and protocol are in any of the allowed ranges
|
|
||||||
for _, pr := range rule.PortRanges {
|
|
||||||
if port >= pr.Min && port <= pr.Max {
|
|
||||||
// Check protocol compatibility
|
|
||||||
if pr.Protocol == "" {
|
|
||||||
// Empty protocol means allow both TCP and UDP
|
|
||||||
return rule
|
|
||||||
}
|
|
||||||
// Check if the packet protocol matches the port range protocol
|
|
||||||
if (pr.Protocol == "tcp" && proto == header.TCPProtocolNumber) ||
|
|
||||||
(pr.Protocol == "udp" && proto == header.UDPProtocolNumber) {
|
|
||||||
return rule
|
|
||||||
}
|
|
||||||
// Port matches but protocol doesn't - continue checking other ranges
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// connKey uniquely identifies a connection for NAT tracking
|
// connKey uniquely identifies a connection for NAT tracking
|
||||||
type connKey struct {
|
type connKey struct {
|
||||||
srcIP string
|
srcIP string
|
||||||
@@ -166,6 +57,17 @@ type connKey struct {
|
|||||||
proto uint8
|
proto uint8
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// reverseConnKey uniquely identifies a connection for reverse NAT lookup (reply direction)
|
||||||
|
// Key structure: (rewrittenTo, originalSrcIP, originalSrcPort, originalDstPort, proto)
|
||||||
|
// This allows O(1) lookup of NAT entries for reply packets
|
||||||
|
type reverseConnKey struct {
|
||||||
|
rewrittenTo string // The address we rewrote to (becomes src in replies)
|
||||||
|
originalSrcIP string // Original source IP (becomes dst in replies)
|
||||||
|
originalSrcPort uint16 // Original source port (becomes dst port in replies)
|
||||||
|
originalDstPort uint16 // Original destination port (becomes src port in replies)
|
||||||
|
proto uint8
|
||||||
|
}
|
||||||
|
|
||||||
// destKey identifies a destination for handler lookups (without source port since it may change)
|
// destKey identifies a destination for handler lookups (without source port since it may change)
|
||||||
type destKey struct {
|
type destKey struct {
|
||||||
srcIP string
|
srcIP string
|
||||||
@@ -190,6 +92,7 @@ type ProxyHandler struct {
|
|||||||
icmpHandler *ICMPHandler
|
icmpHandler *ICMPHandler
|
||||||
subnetLookup *SubnetLookup
|
subnetLookup *SubnetLookup
|
||||||
natTable map[connKey]*natState
|
natTable map[connKey]*natState
|
||||||
|
reverseNatTable map[reverseConnKey]*natState // Reverse lookup map for O(1) reply packet NAT
|
||||||
destRewriteTable map[destKey]netip.Addr // Maps original dest to rewritten dest for handler lookups
|
destRewriteTable map[destKey]netip.Addr // Maps original dest to rewritten dest for handler lookups
|
||||||
natMu sync.RWMutex
|
natMu sync.RWMutex
|
||||||
enabled bool
|
enabled bool
|
||||||
@@ -215,6 +118,7 @@ func NewProxyHandler(options ProxyHandlerOptions) (*ProxyHandler, error) {
|
|||||||
enabled: true,
|
enabled: true,
|
||||||
subnetLookup: NewSubnetLookup(),
|
subnetLookup: NewSubnetLookup(),
|
||||||
natTable: make(map[connKey]*natState),
|
natTable: make(map[connKey]*natState),
|
||||||
|
reverseNatTable: make(map[reverseConnKey]*natState),
|
||||||
destRewriteTable: make(map[destKey]netip.Addr),
|
destRewriteTable: make(map[destKey]netip.Addr),
|
||||||
icmpReplies: make(chan []byte, 256), // Buffer for ICMP reply packets
|
icmpReplies: make(chan []byte, 256), // Buffer for ICMP reply packets
|
||||||
proxyEp: channel.New(1024, uint32(options.MTU), ""),
|
proxyEp: channel.New(1024, uint32(options.MTU), ""),
|
||||||
@@ -517,10 +421,23 @@ func (p *ProxyHandler) HandleIncomingPacket(packet []byte) bool {
|
|||||||
|
|
||||||
// Store NAT state for this connection
|
// Store NAT state for this connection
|
||||||
p.natMu.Lock()
|
p.natMu.Lock()
|
||||||
p.natTable[key] = &natState{
|
natEntry := &natState{
|
||||||
originalDst: dstAddr,
|
originalDst: dstAddr,
|
||||||
rewrittenTo: newDst,
|
rewrittenTo: newDst,
|
||||||
}
|
}
|
||||||
|
p.natTable[key] = natEntry
|
||||||
|
|
||||||
|
// Create reverse lookup key for O(1) reply packet lookups
|
||||||
|
// Key: (rewrittenTo, originalSrcIP, originalSrcPort, originalDstPort, proto)
|
||||||
|
reverseKey := reverseConnKey{
|
||||||
|
rewrittenTo: newDst.String(),
|
||||||
|
originalSrcIP: srcAddr.String(),
|
||||||
|
originalSrcPort: srcPort,
|
||||||
|
originalDstPort: dstPort,
|
||||||
|
proto: uint8(protocol),
|
||||||
|
}
|
||||||
|
p.reverseNatTable[reverseKey] = natEntry
|
||||||
|
|
||||||
// Store destination rewrite for handler lookups
|
// Store destination rewrite for handler lookups
|
||||||
p.destRewriteTable[dKey] = newDst
|
p.destRewriteTable[dKey] = newDst
|
||||||
p.natMu.Unlock()
|
p.natMu.Unlock()
|
||||||
@@ -550,8 +467,8 @@ func (p *ProxyHandler) HandleIncomingPacket(packet []byte) bool {
|
|||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Debug("HandleIncomingPacket: No matching rule for %s -> %s (proto=%d, port=%d)",
|
// logger.Debug("HandleIncomingPacket: No matching rule for %s -> %s (proto=%d, port=%d)",
|
||||||
srcAddr, dstAddr, protocol, dstPort)
|
// srcAddr, dstAddr, protocol, dstPort)
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -719,20 +636,22 @@ func (p *ProxyHandler) ReadOutgoingPacket() *buffer.View {
|
|||||||
return view
|
return view
|
||||||
}
|
}
|
||||||
|
|
||||||
// Look up NAT state for reverse translation
|
// Look up NAT state for reverse translation using O(1) reverse lookup map
|
||||||
// The key uses the original dst (before rewrite), so for replies we need to
|
// Key: (rewrittenTo, originalSrcIP, originalSrcPort, originalDstPort, proto)
|
||||||
// find the entry where the rewritten address matches the current source
|
// For reply packets:
|
||||||
|
// - reply's srcIP = rewrittenTo (the address we rewrote to)
|
||||||
|
// - reply's dstIP = originalSrcIP (original source IP)
|
||||||
|
// - reply's srcPort = originalDstPort (original destination port)
|
||||||
|
// - reply's dstPort = originalSrcPort (original source port)
|
||||||
p.natMu.RLock()
|
p.natMu.RLock()
|
||||||
var natEntry *natState
|
reverseKey := reverseConnKey{
|
||||||
for k, entry := range p.natTable {
|
rewrittenTo: srcIP.String(), // Reply's source is the rewritten address
|
||||||
// Match: reply's dst should be original src, reply's src should be rewritten dst
|
originalSrcIP: dstIP.String(), // Reply's destination is the original source
|
||||||
if k.srcIP == dstIP.String() && k.srcPort == dstPort &&
|
originalSrcPort: dstPort, // Reply's destination port is the original source port
|
||||||
entry.rewrittenTo.String() == srcIP.String() && k.dstPort == srcPort &&
|
originalDstPort: srcPort, // Reply's source port is the original destination port
|
||||||
k.proto == uint8(protocol) {
|
proto: uint8(protocol),
|
||||||
natEntry = entry
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
natEntry := p.reverseNatTable[reverseKey]
|
||||||
p.natMu.RUnlock()
|
p.natMu.RUnlock()
|
||||||
|
|
||||||
if natEntry != nil {
|
if natEntry != nil {
|
||||||
|
|||||||
206
netstack2/subnet_lookup.go
Normal file
206
netstack2/subnet_lookup.go
Normal file
@@ -0,0 +1,206 @@
|
|||||||
|
package netstack2
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/netip"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"github.com/gaissmai/bart"
|
||||||
|
"gvisor.dev/gvisor/pkg/tcpip"
|
||||||
|
"gvisor.dev/gvisor/pkg/tcpip/header"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SubnetLookup provides fast IP subnet and port matching using BART (Binary Aggregated Range Tree)
|
||||||
|
// This uses BART Table for O(log n) prefix matching with Supernets() for efficient lookups
|
||||||
|
//
|
||||||
|
// Architecture:
|
||||||
|
// - Two-level BART structure for matching both source AND destination prefixes
|
||||||
|
// - Level 1: Source prefix -> Level 2 (destination prefix -> rules)
|
||||||
|
// - This reduces search space: only check destination prefixes for matching source prefixes
|
||||||
|
type SubnetLookup struct {
|
||||||
|
mu sync.RWMutex
|
||||||
|
// Two-level BART structure:
|
||||||
|
// Level 1: Source prefix -> Level 2 (destination prefix -> rules)
|
||||||
|
// This allows us to first match source prefix, then only check destination prefixes
|
||||||
|
// for matching source prefixes, reducing the search space significantly
|
||||||
|
sourceTrie *bart.Table[*destTrie]
|
||||||
|
}
|
||||||
|
|
||||||
|
// destTrie is a BART for destination prefixes, containing the actual rules
|
||||||
|
type destTrie struct {
|
||||||
|
trie *bart.Table[[]*SubnetRule]
|
||||||
|
rules []*SubnetRule // All rules for this source prefix (for iteration if needed)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewSubnetLookup creates a new subnet lookup table using BART
|
||||||
|
func NewSubnetLookup() *SubnetLookup {
|
||||||
|
return &SubnetLookup{
|
||||||
|
sourceTrie: &bart.Table[*destTrie]{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// prefixEqual compares two prefixes after masking to handle host bits correctly.
|
||||||
|
// For example, 10.0.0.5/24 and 10.0.0.0/24 are treated as equal.
|
||||||
|
func prefixEqual(a, b netip.Prefix) bool {
|
||||||
|
return a.Masked() == b.Masked()
|
||||||
|
}
|
||||||
|
|
||||||
|
// AddSubnet adds a subnet rule with source and destination prefixes and optional port restrictions
|
||||||
|
// If portRanges is nil or empty, all ports are allowed for this subnet
|
||||||
|
// rewriteTo can be either an IP/CIDR (e.g., "192.168.1.1/32") or a domain name (e.g., "example.com")
|
||||||
|
func (sl *SubnetLookup) AddSubnet(sourcePrefix, destPrefix netip.Prefix, rewriteTo string, portRanges []PortRange, disableIcmp bool) {
|
||||||
|
sl.mu.Lock()
|
||||||
|
defer sl.mu.Unlock()
|
||||||
|
|
||||||
|
rule := &SubnetRule{
|
||||||
|
SourcePrefix: sourcePrefix,
|
||||||
|
DestPrefix: destPrefix,
|
||||||
|
DisableIcmp: disableIcmp,
|
||||||
|
RewriteTo: rewriteTo,
|
||||||
|
PortRanges: portRanges,
|
||||||
|
}
|
||||||
|
|
||||||
|
// Canonicalize source prefix to handle host bits correctly
|
||||||
|
canonicalSourcePrefix := sourcePrefix.Masked()
|
||||||
|
|
||||||
|
// Get or create destination trie for this source prefix
|
||||||
|
destTriePtr, exists := sl.sourceTrie.Get(canonicalSourcePrefix)
|
||||||
|
if !exists {
|
||||||
|
// Create new destination trie for this source prefix
|
||||||
|
destTriePtr = &destTrie{
|
||||||
|
trie: &bart.Table[[]*SubnetRule]{},
|
||||||
|
rules: make([]*SubnetRule, 0),
|
||||||
|
}
|
||||||
|
sl.sourceTrie.Insert(canonicalSourcePrefix, destTriePtr)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Canonicalize destination prefix to handle host bits correctly
|
||||||
|
// BART masks prefixes internally, so we need to match that behavior in our bookkeeping
|
||||||
|
canonicalDestPrefix := destPrefix.Masked()
|
||||||
|
|
||||||
|
// Add rule to destination trie
|
||||||
|
// Original behavior: overwrite if same (sourcePrefix, destPrefix) exists
|
||||||
|
// Store as single-element slice to match original overwrite behavior
|
||||||
|
destTriePtr.trie.Insert(canonicalDestPrefix, []*SubnetRule{rule})
|
||||||
|
|
||||||
|
// Update destTriePtr.rules - remove old rule with same canonical prefix if exists, then add new one
|
||||||
|
// Use canonical comparison to handle cases like 10.0.0.5/24 vs 10.0.0.0/24
|
||||||
|
newRules := make([]*SubnetRule, 0, len(destTriePtr.rules)+1)
|
||||||
|
for _, r := range destTriePtr.rules {
|
||||||
|
if !prefixEqual(r.DestPrefix, canonicalDestPrefix) || !prefixEqual(r.SourcePrefix, canonicalSourcePrefix) {
|
||||||
|
newRules = append(newRules, r)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
newRules = append(newRules, rule)
|
||||||
|
destTriePtr.rules = newRules
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoveSubnet removes a subnet rule from the lookup table
|
||||||
|
func (sl *SubnetLookup) RemoveSubnet(sourcePrefix, destPrefix netip.Prefix) {
|
||||||
|
sl.mu.Lock()
|
||||||
|
defer sl.mu.Unlock()
|
||||||
|
|
||||||
|
// Canonicalize prefixes to handle host bits correctly
|
||||||
|
canonicalSourcePrefix := sourcePrefix.Masked()
|
||||||
|
canonicalDestPrefix := destPrefix.Masked()
|
||||||
|
|
||||||
|
destTriePtr, exists := sl.sourceTrie.Get(canonicalSourcePrefix)
|
||||||
|
if !exists {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Remove the rule - original behavior: delete exact (sourcePrefix, destPrefix) combination
|
||||||
|
// BART masks prefixes internally, so Delete works with canonical form
|
||||||
|
destTriePtr.trie.Delete(canonicalDestPrefix)
|
||||||
|
|
||||||
|
// Also remove from destTriePtr.rules using canonical comparison
|
||||||
|
// This ensures we remove rules even if they were added with host bits set
|
||||||
|
newDestRules := make([]*SubnetRule, 0, len(destTriePtr.rules))
|
||||||
|
for _, r := range destTriePtr.rules {
|
||||||
|
if !prefixEqual(r.DestPrefix, canonicalDestPrefix) || !prefixEqual(r.SourcePrefix, canonicalSourcePrefix) {
|
||||||
|
newDestRules = append(newDestRules, r)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
destTriePtr.rules = newDestRules
|
||||||
|
|
||||||
|
// Check if the trie is actually empty using BART's Size() method
|
||||||
|
// This is more efficient than iterating and ensures we clean up empty tries
|
||||||
|
// even if there were stale entries in the rules slice (which shouldn't happen
|
||||||
|
// with proper canonicalization, but this provides a definitive check)
|
||||||
|
if destTriePtr.trie.Size() == 0 {
|
||||||
|
sl.sourceTrie.Delete(canonicalSourcePrefix)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Match checks if a source IP, destination IP, port, and protocol match any subnet rule
|
||||||
|
// Returns the matched rule if ALL of these conditions are met:
|
||||||
|
// - The source IP is in the rule's source prefix
|
||||||
|
// - The destination IP is in the rule's destination prefix
|
||||||
|
// - The port is in an allowed range (or no port restrictions exist)
|
||||||
|
// - The protocol matches (or the port range allows both protocols)
|
||||||
|
//
|
||||||
|
// proto should be header.TCPProtocolNumber, header.UDPProtocolNumber, or header.ICMPv4ProtocolNumber
|
||||||
|
// Returns nil if no rule matches
|
||||||
|
// This uses BART's Supernets() for O(log n) prefix matching instead of O(n) iteration
|
||||||
|
func (sl *SubnetLookup) Match(srcIP, dstIP netip.Addr, port uint16, proto tcpip.TransportProtocolNumber) *SubnetRule {
|
||||||
|
sl.mu.RLock()
|
||||||
|
defer sl.mu.RUnlock()
|
||||||
|
|
||||||
|
// Convert IP addresses to /32 (IPv4) or /128 (IPv6) prefixes
|
||||||
|
// Supernets() finds all prefixes that contain this IP (i.e., are supernets of /32 or /128)
|
||||||
|
srcPrefix := netip.PrefixFrom(srcIP, srcIP.BitLen())
|
||||||
|
dstPrefix := netip.PrefixFrom(dstIP, dstIP.BitLen())
|
||||||
|
|
||||||
|
// Step 1: Find all source prefixes that contain srcIP using BART's Supernets
|
||||||
|
// This is O(log n) instead of O(n) iteration
|
||||||
|
// Supernets returns all prefixes that are supernets (contain) the given prefix
|
||||||
|
for _, destTriePtr := range sl.sourceTrie.Supernets(srcPrefix) {
|
||||||
|
if destTriePtr == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 2: Find all destination prefixes that contain dstIP
|
||||||
|
// This is also O(log n) for each matching source prefix
|
||||||
|
for _, rules := range destTriePtr.trie.Supernets(dstPrefix) {
|
||||||
|
if rules == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 3: Check each rule for ICMP and port restrictions
|
||||||
|
for _, rule := range rules {
|
||||||
|
// Handle ICMP before port range check — ICMP has no ports
|
||||||
|
if proto == header.ICMPv4ProtocolNumber || proto == header.ICMPv6ProtocolNumber {
|
||||||
|
if rule.DisableIcmp {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// ICMP is allowed; port ranges don't apply to ICMP
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check port restrictions
|
||||||
|
if len(rule.PortRanges) == 0 {
|
||||||
|
// No port restrictions, match!
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if port and protocol are in any of the allowed ranges
|
||||||
|
for _, pr := range rule.PortRanges {
|
||||||
|
if port >= pr.Min && port <= pr.Max {
|
||||||
|
// Check protocol compatibility
|
||||||
|
if pr.Protocol == "" {
|
||||||
|
// Empty protocol means allow both TCP and UDP
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
// Check if the packet protocol matches the port range protocol
|
||||||
|
if (pr.Protocol == "tcp" && proto == header.TCPProtocolNumber) ||
|
||||||
|
(pr.Protocol == "udp" && proto == header.UDPProtocolNumber) {
|
||||||
|
return rule
|
||||||
|
}
|
||||||
|
// Port matches but protocol doesn't - continue checking other ranges
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -44,9 +44,13 @@ func ConfigureInterface(interfaceName string, tunnelIp string, mtu int) error {
|
|||||||
return configureDarwin(interfaceName, ip, ipNet)
|
return configureDarwin(interfaceName, ip, ipNet)
|
||||||
case "windows":
|
case "windows":
|
||||||
return configureWindows(interfaceName, ip, ipNet)
|
return configureWindows(interfaceName, ip, ipNet)
|
||||||
default:
|
case "android":
|
||||||
return fmt.Errorf("unsupported operating system: %s", runtime.GOOS)
|
return nil
|
||||||
|
case "ios":
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// waitForInterfaceUp polls the network interface until it's up or times out
|
// waitForInterfaceUp polls the network interface until it's up or times out
|
||||||
|
|||||||
@@ -126,13 +126,14 @@ func LinuxRemoveRoute(destination string) error {
|
|||||||
|
|
||||||
// addRouteForServerIP adds an OS-specific route for the server IP
|
// addRouteForServerIP adds an OS-specific route for the server IP
|
||||||
func AddRouteForServerIP(serverIP, interfaceName string) error {
|
func AddRouteForServerIP(serverIP, interfaceName string) error {
|
||||||
if err := AddRouteForNetworkConfig(serverIP); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if interfaceName == "" {
|
if interfaceName == "" {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
if runtime.GOOS == "darwin" {
|
// TODO: does this also need to be ios?
|
||||||
|
if runtime.GOOS == "darwin" { // macos requires routes for each peer to be added but this messes with other platforms
|
||||||
|
if err := AddRouteForNetworkConfig(serverIP); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
return DarwinAddRoute(serverIP, "", interfaceName)
|
return DarwinAddRoute(serverIP, "", interfaceName)
|
||||||
}
|
}
|
||||||
// else if runtime.GOOS == "windows" {
|
// else if runtime.GOOS == "windows" {
|
||||||
@@ -145,13 +146,14 @@ func AddRouteForServerIP(serverIP, interfaceName string) error {
|
|||||||
|
|
||||||
// removeRouteForServerIP removes an OS-specific route for the server IP
|
// removeRouteForServerIP removes an OS-specific route for the server IP
|
||||||
func RemoveRouteForServerIP(serverIP string, interfaceName string) error {
|
func RemoveRouteForServerIP(serverIP string, interfaceName string) error {
|
||||||
if err := RemoveRouteForNetworkConfig(serverIP); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if interfaceName == "" {
|
if interfaceName == "" {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
if runtime.GOOS == "darwin" {
|
// TODO: does this also need to be ios?
|
||||||
|
if runtime.GOOS == "darwin" { // macos requires routes for each peer to be added but this messes with other platforms
|
||||||
|
if err := RemoveRouteForNetworkConfig(serverIP); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
return DarwinRemoveRoute(serverIP)
|
return DarwinRemoveRoute(serverIP)
|
||||||
}
|
}
|
||||||
// else if runtime.GOOS == "windows" {
|
// else if runtime.GOOS == "windows" {
|
||||||
@@ -217,21 +219,22 @@ func AddRoutes(remoteSubnets []string, interfaceName string) error {
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if runtime.GOOS == "darwin" {
|
switch runtime.GOOS {
|
||||||
|
case "darwin":
|
||||||
if err := DarwinAddRoute(subnet, "", interfaceName); err != nil {
|
if err := DarwinAddRoute(subnet, "", interfaceName); err != nil {
|
||||||
logger.Error("Failed to add Darwin route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to add Darwin route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
} else if runtime.GOOS == "windows" {
|
case "windows":
|
||||||
if err := WindowsAddRoute(subnet, "", interfaceName); err != nil {
|
if err := WindowsAddRoute(subnet, "", interfaceName); err != nil {
|
||||||
logger.Error("Failed to add Windows route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to add Windows route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
} else if runtime.GOOS == "linux" {
|
case "linux":
|
||||||
if err := LinuxAddRoute(subnet, "", interfaceName); err != nil {
|
if err := LinuxAddRoute(subnet, "", interfaceName); err != nil {
|
||||||
logger.Error("Failed to add Linux route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to add Linux route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
case "android", "ios":
|
||||||
|
// Routes handled by the OS/VPN service
|
||||||
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Info("Added route for remote subnet: %s", subnet)
|
logger.Info("Added route for remote subnet: %s", subnet)
|
||||||
@@ -258,21 +261,22 @@ func RemoveRoutes(remoteSubnets []string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Remove route based on operating system
|
// Remove route based on operating system
|
||||||
if runtime.GOOS == "darwin" {
|
switch runtime.GOOS {
|
||||||
|
case "darwin":
|
||||||
if err := DarwinRemoveRoute(subnet); err != nil {
|
if err := DarwinRemoveRoute(subnet); err != nil {
|
||||||
logger.Error("Failed to remove Darwin route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to remove Darwin route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
} else if runtime.GOOS == "windows" {
|
case "windows":
|
||||||
if err := WindowsRemoveRoute(subnet); err != nil {
|
if err := WindowsRemoveRoute(subnet); err != nil {
|
||||||
logger.Error("Failed to remove Windows route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to remove Windows route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
} else if runtime.GOOS == "linux" {
|
case "linux":
|
||||||
if err := LinuxRemoveRoute(subnet); err != nil {
|
if err := LinuxRemoveRoute(subnet); err != nil {
|
||||||
logger.Error("Failed to remove Linux route for subnet %s: %v", subnet, err)
|
logger.Error("Failed to remove Linux route for subnet %s: %v", subnet, err)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
case "android", "ios":
|
||||||
|
// Routes handled by the OS/VPN service
|
||||||
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
logger.Info("Removed route for remote subnet: %s", subnet)
|
logger.Info("Removed route for remote subnet: %s", subnet)
|
||||||
|
|||||||
@@ -115,7 +115,7 @@ func RemoveIPv4IncludedRoute(route IPv4Route) {
|
|||||||
if r == route {
|
if r == route {
|
||||||
networkSettings.IPv4IncludedRoutes = append(routes[:i], routes[i+1:]...)
|
networkSettings.IPv4IncludedRoutes = append(routes[:i], routes[i+1:]...)
|
||||||
logger.Info("Removed IPv4 included route: %+v", route)
|
logger.Info("Removed IPv4 included route: %+v", route)
|
||||||
return
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
incrementor++
|
incrementor++
|
||||||
|
|||||||
2
newt.iss
2
newt.iss
@@ -32,7 +32,7 @@ DefaultGroupName={#MyAppName}
|
|||||||
DisableProgramGroupPage=yes
|
DisableProgramGroupPage=yes
|
||||||
; Uncomment the following line to run in non administrative install mode (install for current user only).
|
; Uncomment the following line to run in non administrative install mode (install for current user only).
|
||||||
;PrivilegesRequired=lowest
|
;PrivilegesRequired=lowest
|
||||||
OutputBaseFilename=mysetup
|
OutputBaseFilename=newt_windows_installer
|
||||||
SolidCompression=yes
|
SolidCompression=yes
|
||||||
WizardStyle=modern
|
WizardStyle=modern
|
||||||
; Add this to ensure PATH changes are applied and the system is prompted for a restart if needed
|
; Add this to ensure PATH changes are applied and the system is prompted for a restart if needed
|
||||||
|
|||||||
@@ -119,7 +119,7 @@ func CheckForUpdate(owner, repo, currentVersion string) error {
|
|||||||
|
|
||||||
// Check if update is available
|
// Check if update is available
|
||||||
if currentVer.isNewer(latestVer) {
|
if currentVer.isNewer(latestVer) {
|
||||||
printUpdateBanner(currentVer.String(), latestVer.String(), release.HTMLURL)
|
printUpdateBanner(currentVer.String(), latestVer.String(), "curl -fsSL https://static.pangolin.net/get-newt.sh | bash")
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@@ -145,7 +145,7 @@ func printUpdateBanner(currentVersion, latestVersion, releaseURL string) {
|
|||||||
"║ A newer version is available! Please update to get the" + padRight("", contentWidth-56) + "║",
|
"║ A newer version is available! Please update to get the" + padRight("", contentWidth-56) + "║",
|
||||||
"║ latest features, bug fixes, and security improvements." + padRight("", contentWidth-56) + "║",
|
"║ latest features, bug fixes, and security improvements." + padRight("", contentWidth-56) + "║",
|
||||||
emptyLine,
|
emptyLine,
|
||||||
"║ Release URL: " + padRight(releaseURL, contentWidth-15) + "║",
|
"║ Update: " + padRight(releaseURL, contentWidth-10) + "║",
|
||||||
emptyLine,
|
emptyLine,
|
||||||
borderBot,
|
borderBot,
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user