mirror of
https://github.com/slackhq/nebula.git
synced 2025-01-27 10:19:04 +00:00
ae3ee42469
This commit augments the Control API by providing new methods to inject message packets destined peer nodes, and/or to intercept message packets of a custom message subtype that are received from peer nodes.
83 lines
3.5 KiB
Go
83 lines
3.5 KiB
Go
package nebula
|
|
|
|
func (f *Interface) newHook(w func([]byte) error) InsideHandler {
|
|
fn := func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
f.decryptTo(w, hostInfo, header.MessageCounter, out, packet, fwPacket, nb)
|
|
}
|
|
return f.encrypted(fn)
|
|
}
|
|
|
|
func (f *Interface) encrypted(h InsideHandler) InsideHandler {
|
|
return func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
if !f.handleEncrypted(ci, addr, header) {
|
|
return
|
|
}
|
|
|
|
h(hostInfo, ci, addr, header, out, packet, fwPacket, nb)
|
|
|
|
f.handleHostRoaming(hostInfo, addr)
|
|
f.connectionManager.In(hostInfo.hostId)
|
|
}
|
|
}
|
|
|
|
func (f *Interface) rxMetrics(h InsideHandler) InsideHandler {
|
|
return func(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
f.messageMetrics.Rx(header.Type, header.Subtype, 1)
|
|
h(hostInfo, ci, addr, header, out, packet, fwPacket, nb)
|
|
}
|
|
}
|
|
|
|
func (f *Interface) handleMessagePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
f.decryptTo(f.inside.WriteRaw, hostInfo, header.MessageCounter, out, packet, fwPacket, nb)
|
|
}
|
|
|
|
func (f *Interface) handleLighthousePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
d, err := f.decrypt(hostInfo, header.MessageCounter, out, packet, header, nb)
|
|
if err != nil {
|
|
hostInfo.logger().WithError(err).WithField("udpAddr", addr).
|
|
WithField("packet", packet).
|
|
Error("Failed to decrypt lighthouse packet")
|
|
|
|
//TODO: maybe after build 64 is out? 06/14/2018 - NB
|
|
//f.sendRecvError(net.Addr(addr), header.RemoteIndex)
|
|
return
|
|
}
|
|
|
|
f.lightHouse.HandleRequest(addr, hostInfo.hostId, d, hostInfo.GetCert(), f)
|
|
}
|
|
|
|
func (f *Interface) handleTestPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
d, err := f.decrypt(hostInfo, header.MessageCounter, out, packet, header, nb)
|
|
if err != nil {
|
|
hostInfo.logger().WithError(err).WithField("udpAddr", addr).
|
|
WithField("packet", packet).
|
|
Error("Failed to decrypt test packet")
|
|
|
|
//TODO: maybe after build 64 is out? 06/14/2018 - NB
|
|
//f.sendRecvError(net.Addr(addr), header.RemoteIndex)
|
|
return
|
|
}
|
|
|
|
if header.Subtype == testRequest {
|
|
// This testRequest might be from TryPromoteBest, so we should roam
|
|
// to the new IP address before responding
|
|
f.handleHostRoaming(hostInfo, addr)
|
|
f.send(test, testReply, ci, hostInfo, hostInfo.remote, d, nb, out)
|
|
}
|
|
}
|
|
|
|
func (f *Interface) handleHandshakePacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
HandleIncomingHandshake(f, addr, packet, header, hostInfo)
|
|
}
|
|
|
|
func (f *Interface) handleRecvErrorPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
// TODO: Remove this with recv_error deprecation
|
|
f.handleRecvError(addr, header)
|
|
}
|
|
|
|
func (f *Interface) handleCloseTunnelPacket(hostInfo *HostInfo, ci *ConnectionState, addr *udpAddr, header *Header, out []byte, packet []byte, fwPacket *FirewallPacket, nb []byte) {
|
|
hostInfo.logger().WithField("udpAddr", addr).
|
|
Info("Close tunnel received, tearing down.")
|
|
|
|
f.closeTunnel(hostInfo)
|
|
}
|