816 lines
17 KiB
Go
816 lines
17 KiB
Go
package gost
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"os"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/go-log/log"
|
|
"github.com/shadowsocks/go-shadowsocks2/core"
|
|
"github.com/shadowsocks/go-shadowsocks2/shadowaead"
|
|
"github.com/songgao/water"
|
|
"github.com/songgao/water/waterutil"
|
|
"github.com/xtaci/tcpraw"
|
|
"golang.org/x/net/ipv4"
|
|
"golang.org/x/net/ipv6"
|
|
)
|
|
|
|
var mIPProts = map[waterutil.IPProtocol]string{
|
|
waterutil.HOPOPT: "HOPOPT",
|
|
waterutil.ICMP: "ICMP",
|
|
waterutil.IGMP: "IGMP",
|
|
waterutil.GGP: "GGP",
|
|
waterutil.TCP: "TCP",
|
|
waterutil.UDP: "UDP",
|
|
waterutil.IPv6_Route: "IPv6-Route",
|
|
waterutil.IPv6_Frag: "IPv6-Frag",
|
|
waterutil.IPv6_ICMP: "IPv6-ICMP",
|
|
}
|
|
|
|
func ipProtocol(p waterutil.IPProtocol) string {
|
|
if v, ok := mIPProts[p]; ok {
|
|
return v
|
|
}
|
|
return fmt.Sprintf("unknown(%d)", p)
|
|
}
|
|
|
|
// IPRoute is an IP routing entry.
|
|
type IPRoute struct {
|
|
Dest *net.IPNet
|
|
Gateway net.IP
|
|
}
|
|
|
|
// TunConfig is the config for TUN device.
|
|
type TunConfig struct {
|
|
Name string
|
|
Addr string
|
|
Peer string // peer addr of point-to-point on MacOS
|
|
MTU int
|
|
Routes []IPRoute
|
|
Gateway string
|
|
}
|
|
|
|
type tunRouteKey [16]byte
|
|
|
|
func ipToTunRouteKey(ip net.IP) (key tunRouteKey) {
|
|
copy(key[:], ip.To16())
|
|
return
|
|
}
|
|
|
|
type tunListener struct {
|
|
addr net.Addr
|
|
conns chan net.Conn
|
|
closed chan struct{}
|
|
config TunConfig
|
|
}
|
|
|
|
// TunListener creates a listener for tun tunnel.
|
|
func TunListener(cfg TunConfig) (Listener, error) {
|
|
threads := 1
|
|
ln := &tunListener{
|
|
conns: make(chan net.Conn, threads),
|
|
closed: make(chan struct{}),
|
|
config: cfg,
|
|
}
|
|
|
|
for i := 0; i < threads; i++ {
|
|
conn, ifce, err := createTun(cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ln.addr = conn.LocalAddr()
|
|
|
|
addrs, _ := ifce.Addrs()
|
|
log.Logf("[tun] %s: name: %s, mtu: %d, addrs: %s",
|
|
conn.LocalAddr(), ifce.Name, ifce.MTU, addrs)
|
|
|
|
ln.conns <- conn
|
|
}
|
|
|
|
return ln, nil
|
|
}
|
|
|
|
func (l *tunListener) Accept() (net.Conn, error) {
|
|
select {
|
|
case conn := <-l.conns:
|
|
return conn, nil
|
|
case <-l.closed:
|
|
}
|
|
|
|
return nil, errors.New("accept on closed listener")
|
|
}
|
|
|
|
func (l *tunListener) Addr() net.Addr {
|
|
return l.addr
|
|
}
|
|
|
|
func (l *tunListener) Close() error {
|
|
select {
|
|
case <-l.closed:
|
|
return errors.New("listener has been closed")
|
|
default:
|
|
close(l.closed)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type tunHandler struct {
|
|
options *HandlerOptions
|
|
routes sync.Map
|
|
chExit chan struct{}
|
|
}
|
|
|
|
// TunHandler creates a handler for tun tunnel.
|
|
func TunHandler(opts ...HandlerOption) Handler {
|
|
h := &tunHandler{
|
|
options: &HandlerOptions{},
|
|
chExit: make(chan struct{}, 1),
|
|
}
|
|
for _, opt := range opts {
|
|
opt(h.options)
|
|
}
|
|
|
|
return h
|
|
}
|
|
|
|
func (h *tunHandler) Init(options ...HandlerOption) {
|
|
if h.options == nil {
|
|
h.options = &HandlerOptions{}
|
|
}
|
|
for _, opt := range options {
|
|
opt(h.options)
|
|
}
|
|
}
|
|
|
|
func (h *tunHandler) Handle(conn net.Conn) {
|
|
defer os.Exit(0)
|
|
defer conn.Close()
|
|
|
|
var err error
|
|
var raddr net.Addr
|
|
if addr := h.options.Node.Remote; addr != "" {
|
|
raddr, err = net.ResolveUDPAddr("udp", addr)
|
|
if err != nil {
|
|
log.Logf("[tun] %s: remote addr: %v", conn.LocalAddr(), err)
|
|
return
|
|
}
|
|
}
|
|
|
|
var tempDelay time.Duration
|
|
for {
|
|
err := func() error {
|
|
var err error
|
|
var pc net.PacketConn
|
|
// fake tcp mode will be ignored when the client specifies a chain.
|
|
if raddr != nil && !h.options.Chain.IsEmpty() {
|
|
cc, err := h.options.Chain.DialContext(context.Background(), "udp", raddr.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var ok bool
|
|
pc, ok = cc.(net.PacketConn)
|
|
if !ok {
|
|
err = errors.New("not a packet connection")
|
|
log.Logf("[tun] %s - %s: %s", conn.LocalAddr(), raddr, err)
|
|
return err
|
|
}
|
|
} else {
|
|
if h.options.TCPMode {
|
|
if raddr != nil {
|
|
pc, err = tcpraw.Dial("tcp", raddr.String())
|
|
} else {
|
|
pc, err = tcpraw.Listen("tcp", h.options.Node.Addr)
|
|
}
|
|
} else {
|
|
laddr, _ := net.ResolveUDPAddr("udp", h.options.Node.Addr)
|
|
pc, err = net.ListenUDP("udp", laddr)
|
|
}
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
pc, err = h.initTunnelConn(pc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return h.transportTun(conn, pc, raddr)
|
|
}()
|
|
if err != nil {
|
|
log.Logf("[tun] %s: %v", conn.LocalAddr(), err)
|
|
}
|
|
|
|
select {
|
|
case <-h.chExit:
|
|
return
|
|
default:
|
|
}
|
|
|
|
if err != nil {
|
|
if tempDelay == 0 {
|
|
tempDelay = 1000 * time.Millisecond
|
|
} else {
|
|
tempDelay *= 2
|
|
}
|
|
if max := 6 * time.Second; tempDelay > max {
|
|
tempDelay = max
|
|
}
|
|
time.Sleep(tempDelay)
|
|
continue
|
|
}
|
|
tempDelay = 0
|
|
}
|
|
}
|
|
|
|
func (h *tunHandler) initTunnelConn(pc net.PacketConn) (net.PacketConn, error) {
|
|
if len(h.options.Users) > 0 && h.options.Users[0] != nil {
|
|
passwd, _ := h.options.Users[0].Password()
|
|
cipher, err := core.PickCipher(h.options.Users[0].Username(), nil, passwd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pc = cipher.PacketConn(pc)
|
|
}
|
|
return pc, nil
|
|
}
|
|
|
|
func (h *tunHandler) findRouteFor(dst net.IP) net.Addr {
|
|
if v, ok := h.routes.Load(ipToTunRouteKey(dst)); ok {
|
|
return v.(net.Addr)
|
|
}
|
|
for _, route := range h.options.IPRoutes {
|
|
if route.Dest.Contains(dst) && route.Gateway != nil {
|
|
if v, ok := h.routes.Load(ipToTunRouteKey(route.Gateway)); ok {
|
|
return v.(net.Addr)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (h *tunHandler) transportTun(tun net.Conn, conn net.PacketConn, raddr net.Addr) error {
|
|
errc := make(chan error, 1)
|
|
|
|
go func() {
|
|
for {
|
|
err := func() error {
|
|
b := sPool.Get().([]byte)
|
|
defer sPool.Put(b)
|
|
|
|
n, err := tun.Read(b)
|
|
if err != nil {
|
|
select {
|
|
case h.chExit <- struct{}{}:
|
|
default:
|
|
}
|
|
return err
|
|
}
|
|
|
|
var src, dst net.IP
|
|
if waterutil.IsIPv4(b[:n]) {
|
|
header, err := ipv4.ParseHeader(b[:n])
|
|
if err != nil {
|
|
log.Logf("[tun] %s: %v", tun.LocalAddr(), err)
|
|
return nil
|
|
}
|
|
if Debug {
|
|
log.Logf("[tun] %s -> %s %-4s %d/%-4d %-4x %d",
|
|
header.Src, header.Dst, ipProtocol(waterutil.IPv4Protocol(b[:n])),
|
|
header.Len, header.TotalLen, header.ID, header.Flags)
|
|
}
|
|
src, dst = header.Src, header.Dst
|
|
} else if waterutil.IsIPv6(b[:n]) {
|
|
header, err := ipv6.ParseHeader(b[:n])
|
|
if err != nil {
|
|
log.Logf("[tun] %s: %v", tun.LocalAddr(), err)
|
|
return nil
|
|
}
|
|
if Debug {
|
|
log.Logf("[tun] %s -> %s %s %d %d",
|
|
header.Src, header.Dst,
|
|
ipProtocol(waterutil.IPProtocol(header.NextHeader)),
|
|
header.PayloadLen, header.TrafficClass)
|
|
}
|
|
src, dst = header.Src, header.Dst
|
|
} else {
|
|
log.Logf("[tun] unknown packet")
|
|
return nil
|
|
}
|
|
|
|
// client side, deliver packet directly.
|
|
if raddr != nil {
|
|
_, err := conn.WriteTo(b[:n], raddr)
|
|
return err
|
|
}
|
|
|
|
addr := h.findRouteFor(dst)
|
|
if addr == nil {
|
|
log.Logf("[tun] no route for %s -> %s", src, dst)
|
|
return nil
|
|
}
|
|
|
|
if Debug {
|
|
log.Logf("[tun] find route: %s -> %s", dst, addr)
|
|
}
|
|
if _, err := conn.WriteTo(b[:n], addr); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}()
|
|
|
|
if err != nil {
|
|
errc <- err
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
go func() {
|
|
for {
|
|
err := func() error {
|
|
b := sPool.Get().([]byte)
|
|
defer sPool.Put(b)
|
|
|
|
n, addr, err := conn.ReadFrom(b)
|
|
if err != nil &&
|
|
err != shadowaead.ErrShortPacket {
|
|
return err
|
|
}
|
|
|
|
var src, dst net.IP
|
|
if waterutil.IsIPv4(b[:n]) {
|
|
header, err := ipv4.ParseHeader(b[:n])
|
|
if err != nil {
|
|
log.Logf("[tun] %s: %v", tun.LocalAddr(), err)
|
|
return nil
|
|
}
|
|
if Debug {
|
|
log.Logf("[tun] %s -> %s %-4s %d/%-4d %-4x %d",
|
|
header.Src, header.Dst, ipProtocol(waterutil.IPv4Protocol(b[:n])),
|
|
header.Len, header.TotalLen, header.ID, header.Flags)
|
|
}
|
|
src, dst = header.Src, header.Dst
|
|
} else if waterutil.IsIPv6(b[:n]) {
|
|
header, err := ipv6.ParseHeader(b[:n])
|
|
if err != nil {
|
|
log.Logf("[tun] %s: %v", tun.LocalAddr(), err)
|
|
return nil
|
|
}
|
|
if Debug {
|
|
log.Logf("[tun] %s -> %s %s %d %d",
|
|
header.Src, header.Dst,
|
|
ipProtocol(waterutil.IPProtocol(header.NextHeader)),
|
|
header.PayloadLen, header.TrafficClass)
|
|
}
|
|
src, dst = header.Src, header.Dst
|
|
} else {
|
|
log.Logf("[tun] unknown packet")
|
|
return nil
|
|
}
|
|
|
|
// client side, deliver packet to tun device.
|
|
if raddr != nil {
|
|
_, err := tun.Write(b[:n])
|
|
return err
|
|
}
|
|
|
|
rkey := ipToTunRouteKey(src)
|
|
if actual, loaded := h.routes.LoadOrStore(rkey, addr); loaded {
|
|
if actual.(net.Addr).String() != addr.String() {
|
|
log.Logf("[tun] update route: %s -> %s (old %s)",
|
|
src, addr, actual.(net.Addr))
|
|
h.routes.Store(rkey, addr)
|
|
}
|
|
} else {
|
|
log.Logf("[tun] new route: %s -> %s", src, addr)
|
|
}
|
|
|
|
if addr := h.findRouteFor(dst); addr != nil {
|
|
if Debug {
|
|
log.Logf("[tun] find route: %s -> %s", dst, addr)
|
|
}
|
|
_, err := conn.WriteTo(b[:n], addr)
|
|
return err
|
|
}
|
|
|
|
if _, err := tun.Write(b[:n]); err != nil {
|
|
select {
|
|
case h.chExit <- struct{}{}:
|
|
default:
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
}()
|
|
|
|
if err != nil {
|
|
errc <- err
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
err := <-errc
|
|
if err != nil && err == io.EOF {
|
|
err = nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
var mEtherTypes = map[waterutil.Ethertype]string{
|
|
waterutil.IPv4: "ip",
|
|
waterutil.ARP: "arp",
|
|
waterutil.RARP: "rarp",
|
|
waterutil.IPv6: "ip6",
|
|
}
|
|
|
|
func etherType(et waterutil.Ethertype) string {
|
|
if s, ok := mEtherTypes[et]; ok {
|
|
return s
|
|
}
|
|
return fmt.Sprintf("unknown(%v)", et)
|
|
}
|
|
|
|
// TapConfig is the config for TAP device.
|
|
type TapConfig struct {
|
|
Name string
|
|
Addr string
|
|
MTU int
|
|
Routes []string
|
|
Gateway string
|
|
}
|
|
|
|
type tapRouteKey [6]byte
|
|
|
|
func hwAddrToTapRouteKey(addr net.HardwareAddr) (key tapRouteKey) {
|
|
copy(key[:], addr)
|
|
return
|
|
}
|
|
|
|
type tapListener struct {
|
|
addr net.Addr
|
|
conns chan net.Conn
|
|
closed chan struct{}
|
|
config TapConfig
|
|
}
|
|
|
|
// TapListener creates a listener for tap tunnel.
|
|
func TapListener(cfg TapConfig) (Listener, error) {
|
|
threads := 1
|
|
ln := &tapListener{
|
|
conns: make(chan net.Conn, threads),
|
|
closed: make(chan struct{}),
|
|
config: cfg,
|
|
}
|
|
|
|
for i := 0; i < threads; i++ {
|
|
conn, ifce, err := createTap(cfg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ln.addr = conn.LocalAddr()
|
|
|
|
addrs, _ := ifce.Addrs()
|
|
log.Logf("[tap] %s: name: %s, mac: %s, mtu: %d, addrs: %s",
|
|
conn.LocalAddr(), ifce.Name, ifce.HardwareAddr, ifce.MTU, addrs)
|
|
|
|
ln.conns <- conn
|
|
}
|
|
return ln, nil
|
|
}
|
|
|
|
func (l *tapListener) Accept() (net.Conn, error) {
|
|
select {
|
|
case conn := <-l.conns:
|
|
return conn, nil
|
|
case <-l.closed:
|
|
}
|
|
|
|
return nil, errors.New("accept on closed listener")
|
|
}
|
|
|
|
func (l *tapListener) Addr() net.Addr {
|
|
return l.addr
|
|
}
|
|
|
|
func (l *tapListener) Close() error {
|
|
select {
|
|
case <-l.closed:
|
|
return errors.New("listener has been closed")
|
|
default:
|
|
close(l.closed)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type tapHandler struct {
|
|
options *HandlerOptions
|
|
routes sync.Map
|
|
chExit chan struct{}
|
|
}
|
|
|
|
// TapHandler creates a handler for tap tunnel.
|
|
func TapHandler(opts ...HandlerOption) Handler {
|
|
h := &tapHandler{
|
|
options: &HandlerOptions{},
|
|
chExit: make(chan struct{}, 1),
|
|
}
|
|
for _, opt := range opts {
|
|
opt(h.options)
|
|
}
|
|
|
|
return h
|
|
}
|
|
|
|
func (h *tapHandler) Init(options ...HandlerOption) {
|
|
if h.options == nil {
|
|
h.options = &HandlerOptions{}
|
|
}
|
|
for _, opt := range options {
|
|
opt(h.options)
|
|
}
|
|
}
|
|
|
|
func (h *tapHandler) Handle(conn net.Conn) {
|
|
defer os.Exit(0)
|
|
defer conn.Close()
|
|
|
|
var err error
|
|
var raddr net.Addr
|
|
if addr := h.options.Node.Remote; addr != "" {
|
|
raddr, err = net.ResolveUDPAddr("udp", addr)
|
|
if err != nil {
|
|
log.Logf("[tap] %s: remote addr: %v", conn.LocalAddr(), err)
|
|
return
|
|
}
|
|
}
|
|
|
|
var tempDelay time.Duration
|
|
for {
|
|
err := func() error {
|
|
var err error
|
|
var pc net.PacketConn
|
|
// fake tcp mode will be ignored when the client specifies a chain.
|
|
if raddr != nil && !h.options.Chain.IsEmpty() {
|
|
cc, err := h.options.Chain.DialContext(context.Background(), "udp", raddr.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var ok bool
|
|
pc, ok = cc.(net.PacketConn)
|
|
if !ok {
|
|
err = errors.New("not a packet connection")
|
|
log.Logf("[tap] %s - %s: %s", conn.LocalAddr(), raddr, err)
|
|
return err
|
|
}
|
|
} else {
|
|
if h.options.TCPMode {
|
|
if raddr != nil {
|
|
pc, err = tcpraw.Dial("tcp", raddr.String())
|
|
} else {
|
|
pc, err = tcpraw.Listen("tcp", h.options.Node.Addr)
|
|
}
|
|
} else {
|
|
laddr, _ := net.ResolveUDPAddr("udp", h.options.Node.Addr)
|
|
pc, err = net.ListenUDP("udp", laddr)
|
|
}
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
pc, err = h.initTunnelConn(pc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return h.transportTap(conn, pc, raddr)
|
|
}()
|
|
if err != nil {
|
|
log.Logf("[tap] %s: %v", conn.LocalAddr(), err)
|
|
}
|
|
|
|
select {
|
|
case <-h.chExit:
|
|
return
|
|
default:
|
|
}
|
|
|
|
if err != nil {
|
|
if tempDelay == 0 {
|
|
tempDelay = 1000 * time.Millisecond
|
|
} else {
|
|
tempDelay *= 2
|
|
}
|
|
if max := 6 * time.Second; tempDelay > max {
|
|
tempDelay = max
|
|
}
|
|
time.Sleep(tempDelay)
|
|
continue
|
|
}
|
|
tempDelay = 0
|
|
}
|
|
}
|
|
|
|
func (h *tapHandler) initTunnelConn(pc net.PacketConn) (net.PacketConn, error) {
|
|
if len(h.options.Users) > 0 && h.options.Users[0] != nil {
|
|
passwd, _ := h.options.Users[0].Password()
|
|
cipher, err := core.PickCipher(h.options.Users[0].Username(), nil, passwd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pc = cipher.PacketConn(pc)
|
|
}
|
|
return pc, nil
|
|
}
|
|
|
|
func (h *tapHandler) transportTap(tap net.Conn, conn net.PacketConn, raddr net.Addr) error {
|
|
errc := make(chan error, 1)
|
|
|
|
go func() {
|
|
for {
|
|
err := func() error {
|
|
b := sPool.Get().([]byte)
|
|
defer sPool.Put(b)
|
|
|
|
n, err := tap.Read(b)
|
|
if err != nil {
|
|
select {
|
|
case h.chExit <- struct{}{}:
|
|
default:
|
|
}
|
|
return err
|
|
}
|
|
|
|
src := waterutil.MACSource(b[:n])
|
|
dst := waterutil.MACDestination(b[:n])
|
|
eType := etherType(waterutil.MACEthertype(b[:n]))
|
|
|
|
if Debug {
|
|
log.Logf("[tap] %s -> %s %s %d", src, dst, eType, n)
|
|
}
|
|
|
|
// client side, deliver frame directly.
|
|
if raddr != nil {
|
|
_, err := conn.WriteTo(b[:n], raddr)
|
|
return err
|
|
}
|
|
|
|
// server side, broadcast.
|
|
if waterutil.IsBroadcast(dst) {
|
|
go h.routes.Range(func(k, v interface{}) bool {
|
|
conn.WriteTo(b[:n], v.(net.Addr))
|
|
return true
|
|
})
|
|
return nil
|
|
}
|
|
|
|
var addr net.Addr
|
|
if v, ok := h.routes.Load(hwAddrToTapRouteKey(dst)); ok {
|
|
addr = v.(net.Addr)
|
|
}
|
|
if addr == nil {
|
|
log.Logf("[tap] no route for %s -> %s %s %d", src, dst, eType, n)
|
|
return nil
|
|
}
|
|
|
|
if _, err := conn.WriteTo(b[:n], addr); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}()
|
|
|
|
if err != nil {
|
|
errc <- err
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
go func() {
|
|
for {
|
|
err := func() error {
|
|
b := sPool.Get().([]byte)
|
|
defer sPool.Put(b)
|
|
|
|
n, addr, err := conn.ReadFrom(b)
|
|
if err != nil &&
|
|
err != shadowaead.ErrShortPacket {
|
|
return err
|
|
}
|
|
|
|
src := waterutil.MACSource(b[:n])
|
|
dst := waterutil.MACDestination(b[:n])
|
|
eType := etherType(waterutil.MACEthertype(b[:n]))
|
|
|
|
if Debug {
|
|
log.Logf("[tap] %s -> %s %s %d", src, dst, eType, n)
|
|
}
|
|
|
|
// client side, deliver frame to tap device.
|
|
if raddr != nil {
|
|
_, err := tap.Write(b[:n])
|
|
return err
|
|
}
|
|
|
|
// server side, record route.
|
|
rkey := hwAddrToTapRouteKey(src)
|
|
if actual, loaded := h.routes.LoadOrStore(rkey, addr); loaded {
|
|
if actual.(net.Addr).String() != addr.String() {
|
|
log.Logf("[tap] update route: %s -> %s (old %s)",
|
|
src, addr, actual.(net.Addr))
|
|
h.routes.Store(rkey, addr)
|
|
}
|
|
} else {
|
|
log.Logf("[tap] new route: %s -> %s", src, addr)
|
|
}
|
|
|
|
if waterutil.IsBroadcast(dst) {
|
|
go h.routes.Range(func(k, v interface{}) bool {
|
|
if k.(tapRouteKey) != rkey {
|
|
conn.WriteTo(b[:n], v.(net.Addr))
|
|
}
|
|
return true
|
|
})
|
|
}
|
|
|
|
if v, ok := h.routes.Load(hwAddrToTapRouteKey(dst)); ok {
|
|
if Debug {
|
|
log.Logf("[tap] find route: %s -> %s", dst, v)
|
|
}
|
|
_, err := conn.WriteTo(b[:n], v.(net.Addr))
|
|
return err
|
|
}
|
|
|
|
if _, err := tap.Write(b[:n]); err != nil {
|
|
select {
|
|
case h.chExit <- struct{}{}:
|
|
default:
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
}()
|
|
|
|
if err != nil {
|
|
errc <- err
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
err := <-errc
|
|
if err != nil && err == io.EOF {
|
|
err = nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
type tunTapConn struct {
|
|
ifce *water.Interface
|
|
addr net.Addr
|
|
}
|
|
|
|
func (c *tunTapConn) Read(b []byte) (n int, err error) {
|
|
return c.ifce.Read(b)
|
|
}
|
|
|
|
func (c *tunTapConn) Write(b []byte) (n int, err error) {
|
|
return c.ifce.Write(b)
|
|
}
|
|
|
|
func (c *tunTapConn) Close() (err error) {
|
|
return c.ifce.Close()
|
|
}
|
|
|
|
func (c *tunTapConn) LocalAddr() net.Addr {
|
|
return c.addr
|
|
}
|
|
|
|
func (c *tunTapConn) RemoteAddr() net.Addr {
|
|
return &net.IPAddr{}
|
|
}
|
|
|
|
func (c *tunTapConn) SetDeadline(t time.Time) error {
|
|
return &net.OpError{Op: "set", Net: "tuntap", Source: nil, Addr: nil, Err: errors.New("deadline not supported")}
|
|
}
|
|
|
|
func (c *tunTapConn) SetReadDeadline(t time.Time) error {
|
|
return &net.OpError{Op: "set", Net: "tuntap", Source: nil, Addr: nil, Err: errors.New("deadline not supported")}
|
|
}
|
|
|
|
func (c *tunTapConn) SetWriteDeadline(t time.Time) error {
|
|
return &net.OpError{Op: "set", Net: "tuntap", Source: nil, Addr: nil, Err: errors.New("deadline not supported")}
|
|
}
|
|
|
|
// IsIPv6Multicast reports whether the address addr is an IPv6 multicast address.
|
|
func IsIPv6Multicast(addr net.HardwareAddr) bool {
|
|
return addr[0] == 0x33 && addr[1] == 0x33
|
|
}
|