allow use ipv4 address in any cidr (#404)
Some checks are pending
EasyTier Core / pre_job (push) Waiting to run
EasyTier Core / build (freebsd-13.2-x86_64, 13.2, ubuntu-latest, x86_64-unknown-freebsd) (push) Blocked by required conditions
EasyTier Core / build (linux-aarch64, ubuntu-latest, aarch64-unknown-linux-musl) (push) Blocked by required conditions
EasyTier Core / build (linux-arm, ubuntu-latest, arm-unknown-linux-musleabi) (push) Blocked by required conditions
EasyTier Core / build (linux-armhf, ubuntu-latest, arm-unknown-linux-musleabihf) (push) Blocked by required conditions
EasyTier Core / build (linux-armv7, ubuntu-latest, armv7-unknown-linux-musleabi) (push) Blocked by required conditions
EasyTier Core / build (linux-armv7hf, ubuntu-latest, armv7-unknown-linux-musleabihf) (push) Blocked by required conditions
EasyTier Core / build (linux-mips, ubuntu-latest, mips-unknown-linux-musl) (push) Blocked by required conditions
EasyTier Core / build (linux-mipsel, ubuntu-latest, mipsel-unknown-linux-musl) (push) Blocked by required conditions
EasyTier Core / build (linux-x86_64, ubuntu-latest, x86_64-unknown-linux-musl) (push) Blocked by required conditions
EasyTier Core / build (macos-aarch64, macos-latest, aarch64-apple-darwin) (push) Blocked by required conditions
EasyTier Core / build (macos-x86_64, macos-latest, x86_64-apple-darwin) (push) Blocked by required conditions
EasyTier Core / build (windows-x86_64, windows-latest, x86_64-pc-windows-msvc) (push) Blocked by required conditions
EasyTier Core / core-result (push) Blocked by required conditions
EasyTier GUI / pre_job (push) Waiting to run
EasyTier GUI / build-gui (linux-aarch64, aarch64-unknown-linux-gnu, ubuntu-latest, aarch64-unknown-linux-musl) (push) Blocked by required conditions
EasyTier GUI / build-gui (linux-x86_64, x86_64-unknown-linux-gnu, ubuntu-latest, x86_64-unknown-linux-musl) (push) Blocked by required conditions
EasyTier GUI / build-gui (macos-aarch64, aarch64-apple-darwin, macos-latest, aarch64-apple-darwin) (push) Blocked by required conditions
EasyTier GUI / build-gui (macos-x86_64, x86_64-apple-darwin, macos-latest, x86_64-apple-darwin) (push) Blocked by required conditions
EasyTier GUI / build-gui (windows-x86_64, x86_64-pc-windows-msvc, windows-latest, x86_64-pc-windows-msvc) (push) Blocked by required conditions
EasyTier GUI / gui-result (push) Blocked by required conditions
EasyTier Mobile / pre_job (push) Waiting to run
EasyTier Mobile / build-mobile (android, ubuntu-latest, android) (push) Blocked by required conditions
EasyTier Mobile / mobile-result (push) Blocked by required conditions
EasyTier Test / pre_job (push) Waiting to run
EasyTier Test / test (push) Blocked by required conditions

This commit is contained in:
Sijie.Sun 2024-10-10 10:28:48 +08:00 committed by GitHub
parent 2c017e0fc5
commit 7ab8cad1af
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
18 changed files with 175 additions and 77 deletions

View File

@ -23,8 +23,8 @@ pub trait ConfigLoader: Send + Sync {
fn get_netns(&self) -> Option<String>; fn get_netns(&self) -> Option<String>;
fn set_netns(&self, ns: Option<String>); fn set_netns(&self, ns: Option<String>);
fn get_ipv4(&self) -> Option<std::net::Ipv4Addr>; fn get_ipv4(&self) -> Option<cidr::Ipv4Inet>;
fn set_ipv4(&self, addr: Option<std::net::Ipv4Addr>); fn set_ipv4(&self, addr: Option<cidr::Ipv4Inet>);
fn get_dhcp(&self) -> bool; fn get_dhcp(&self) -> bool;
fn set_dhcp(&self, dhcp: bool); fn set_dhcp(&self, dhcp: bool);
@ -324,16 +324,23 @@ impl ConfigLoader for TomlConfigLoader {
self.config.lock().unwrap().netns = ns; self.config.lock().unwrap().netns = ns;
} }
fn get_ipv4(&self) -> Option<std::net::Ipv4Addr> { fn get_ipv4(&self) -> Option<cidr::Ipv4Inet> {
let locked_config = self.config.lock().unwrap(); let locked_config = self.config.lock().unwrap();
locked_config locked_config
.ipv4 .ipv4
.as_ref() .as_ref()
.map(|s| s.parse().ok()) .map(|s| s.parse().ok())
.flatten() .flatten()
.map(|c: cidr::Ipv4Inet| {
if c.network_length() == 32 {
cidr::Ipv4Inet::new(c.address(), 24).unwrap()
} else {
c
}
})
} }
fn set_ipv4(&self, addr: Option<std::net::Ipv4Addr>) { fn set_ipv4(&self, addr: Option<cidr::Ipv4Inet>) {
self.config.lock().unwrap().ipv4 = if let Some(addr) = addr { self.config.lock().unwrap().ipv4 = if let Some(addr) = addr {
Some(addr.to_string()) Some(addr.to_string())
} else { } else {
@ -590,7 +597,7 @@ level = "warn"
assert!(ret.is_ok()); assert!(ret.is_ok());
let ret = ret.unwrap(); let ret = ret.unwrap();
assert_eq!("10.144.144.10", ret.get_ipv4().unwrap().to_string()); assert_eq!("10.144.144.10/24", ret.get_ipv4().unwrap().to_string());
assert_eq!( assert_eq!(
vec!["tcp://0.0.0.0:11010", "udp://0.0.0.0:11010"], vec!["tcp://0.0.0.0:11010", "udp://0.0.0.0:11010"],

View File

@ -40,8 +40,8 @@ pub enum GlobalCtxEvent {
VpnPortalClientConnected(String, String), // (portal, client ip) VpnPortalClientConnected(String, String), // (portal, client ip)
VpnPortalClientDisconnected(String, String), // (portal, client ip) VpnPortalClientDisconnected(String, String), // (portal, client ip)
DhcpIpv4Changed(Option<std::net::Ipv4Addr>, Option<std::net::Ipv4Addr>), // (old, new) DhcpIpv4Changed(Option<cidr::Ipv4Inet>, Option<cidr::Ipv4Inet>), // (old, new)
DhcpIpv4Conflicted(Option<std::net::Ipv4Addr>), DhcpIpv4Conflicted(Option<cidr::Ipv4Inet>),
} }
type EventBus = tokio::sync::broadcast::Sender<GlobalCtxEvent>; type EventBus = tokio::sync::broadcast::Sender<GlobalCtxEvent>;
@ -56,7 +56,7 @@ pub struct GlobalCtx {
event_bus: EventBus, event_bus: EventBus,
cached_ipv4: AtomicCell<Option<std::net::Ipv4Addr>>, cached_ipv4: AtomicCell<Option<cidr::Ipv4Inet>>,
cached_proxy_cidrs: AtomicCell<Option<Vec<cidr::IpCidr>>>, cached_proxy_cidrs: AtomicCell<Option<Vec<cidr::IpCidr>>>,
ip_collector: Arc<IPCollector>, ip_collector: Arc<IPCollector>,
@ -139,7 +139,7 @@ impl GlobalCtx {
} }
} }
pub fn get_ipv4(&self) -> Option<std::net::Ipv4Addr> { pub fn get_ipv4(&self) -> Option<cidr::Ipv4Inet> {
if let Some(ret) = self.cached_ipv4.load() { if let Some(ret) = self.cached_ipv4.load() {
return Some(ret); return Some(ret);
} }
@ -148,7 +148,7 @@ impl GlobalCtx {
return addr; return addr;
} }
pub fn set_ipv4(&self, addr: Option<std::net::Ipv4Addr>) { pub fn set_ipv4(&self, addr: Option<cidr::Ipv4Inet>) {
self.config.set_ipv4(addr); self.config.set_ipv4(addr);
self.cached_ipv4.store(None); self.cached_ipv4.store(None);
} }

View File

@ -227,7 +227,12 @@ impl CommandHandler {
impl From<PeerRoutePair> for PeerTableItem { impl From<PeerRoutePair> for PeerTableItem {
fn from(p: PeerRoutePair) -> Self { fn from(p: PeerRoutePair) -> Self {
PeerTableItem { PeerTableItem {
ipv4: p.route.ipv4_addr.clone(), ipv4: p
.route
.ipv4_addr
.clone()
.map(|ip| ip.to_string())
.unwrap_or_default(),
hostname: p.route.hostname.clone(), hostname: p.route.hostname.clone(),
cost: cost_to_str(p.route.cost), cost: cost_to_str(p.route.cost),
lat_ms: float_to_str(p.get_latency_ms().unwrap_or(0.0), 3), lat_ms: float_to_str(p.get_latency_ms().unwrap_or(0.0), 3),
@ -413,7 +418,12 @@ impl CommandHandler {
if p.route.cost == 1 { if p.route.cost == 1 {
items.push(RouteTableItem { items.push(RouteTableItem {
ipv4: p.route.ipv4_addr.clone(), ipv4: p
.route
.ipv4_addr
.clone()
.map(|ip| ip.to_string())
.unwrap_or_default(),
hostname: p.route.hostname.clone(), hostname: p.route.hostname.clone(),
proxy_cidrs: p.route.proxy_cidrs.clone().join(",").to_string(), proxy_cidrs: p.route.proxy_cidrs.clone().join(",").to_string(),
next_hop_ipv4: "DIRECT".to_string(), next_hop_ipv4: "DIRECT".to_string(),
@ -428,10 +438,20 @@ impl CommandHandler {
}); });
} else { } else {
items.push(RouteTableItem { items.push(RouteTableItem {
ipv4: p.route.ipv4_addr.clone(), ipv4: p
.route
.ipv4_addr
.clone()
.map(|ip| ip.to_string())
.unwrap_or_default(),
hostname: p.route.hostname.clone(), hostname: p.route.hostname.clone(),
proxy_cidrs: p.route.proxy_cidrs.clone().join(",").to_string(), proxy_cidrs: p.route.proxy_cidrs.clone().join(",").to_string(),
next_hop_ipv4: next_hop_pair.route.ipv4_addr.clone(), next_hop_ipv4: next_hop_pair
.route
.ipv4_addr
.clone()
.map(|ip| ip.to_string())
.unwrap_or_default(),
next_hop_hostname: next_hop_pair.route.hostname.clone(), next_hop_hostname: next_hop_pair.route.hostname.clone(),
next_hop_lat: next_hop_pair.get_latency_ms().unwrap_or(0.0), next_hop_lat: next_hop_pair.get_latency_ms().unwrap_or(0.0),
cost: p.route.cost, cost: p.route.cost,

View File

@ -358,7 +358,12 @@ impl IcmpProxy {
if !self.cidr_set.contains_v4(ipv4.get_destination()) if !self.cidr_set.contains_v4(ipv4.get_destination())
&& !is_exit_node && !is_exit_node
&& !(self.global_ctx.no_tun() && !(self.global_ctx.no_tun()
&& Some(ipv4.get_destination()) == self.global_ctx.get_ipv4()) && Some(ipv4.get_destination())
== self
.global_ctx
.get_ipv4()
.as_ref()
.map(cidr::Ipv4Inet::address))
{ {
return None; return None;
} }
@ -382,7 +387,14 @@ impl IcmpProxy {
return None; return None;
} }
if self.global_ctx.no_tun() && Some(ipv4.get_destination()) == self.global_ctx.get_ipv4() { if self.global_ctx.no_tun()
&& Some(ipv4.get_destination())
== self
.global_ctx
.get_ipv4()
.as_ref()
.map(cidr::Ipv4Inet::address)
{
self.send_icmp_reply_to_peer( self.send_icmp_reply_to_peer(
&ipv4.get_destination(), &ipv4.get_destination(),
&ipv4.get_source(), &ipv4.get_source(),

View File

@ -111,7 +111,7 @@ struct Socks5Entry {
type Socks5EntrySet = Arc<DashSet<Socks5Entry>>; type Socks5EntrySet = Arc<DashSet<Socks5Entry>>;
struct Socks5ServerNet { struct Socks5ServerNet {
ipv4_addr: Ipv4Addr, ipv4_addr: cidr::Ipv4Inet,
auth: Option<SimpleUserPassword>, auth: Option<SimpleUserPassword>,
smoltcp_net: Arc<Net>, smoltcp_net: Arc<Net>,
@ -122,7 +122,7 @@ struct Socks5ServerNet {
impl Socks5ServerNet { impl Socks5ServerNet {
pub fn new( pub fn new(
ipv4_addr: Ipv4Addr, ipv4_addr: cidr::Ipv4Inet,
auth: Option<SimpleUserPassword>, auth: Option<SimpleUserPassword>,
peer_manager: Arc<PeerManager>, peer_manager: Arc<PeerManager>,
packet_recv: Arc<Mutex<mpsc::Receiver<ZCPacket>>>, packet_recv: Arc<Mutex<mpsc::Receiver<ZCPacket>>>,
@ -173,8 +173,10 @@ impl Socks5ServerNet {
dev, dev,
NetConfig::new( NetConfig::new(
interface_config, interface_config,
format!("{}/24", ipv4_addr).parse().unwrap(), format!("{}/{}", ipv4_addr.address(), ipv4_addr.network_length())
vec![format!("{}", ipv4_addr).parse().unwrap()], .parse()
.unwrap(),
vec![format!("{}", ipv4_addr.address()).parse().unwrap()],
), ),
); );

View File

@ -1,3 +1,4 @@
use cidr::Ipv4Inet;
use core::panic; use core::panic;
use crossbeam::atomic::AtomicCell; use crossbeam::atomic::AtomicCell;
use dashmap::DashMap; use dashmap::DashMap;
@ -526,7 +527,8 @@ impl TcpProxy {
tracing::warn!("set_nodelay failed, ignore it: {:?}", e); tracing::warn!("set_nodelay failed, ignore it: {:?}", e);
} }
let nat_dst = if Some(nat_entry.dst.ip()) == global_ctx.get_ipv4().map(|ip| IpAddr::V4(ip)) let nat_dst = if Some(nat_entry.dst.ip())
== global_ctx.get_ipv4().map(|ip| IpAddr::V4(ip.address()))
{ {
format!("127.0.0.1:{}", nat_entry.dst.port()) format!("127.0.0.1:{}", nat_entry.dst.port())
.parse() .parse()
@ -591,7 +593,10 @@ impl TcpProxy {
{ {
Some(Ipv4Addr::new(192, 88, 99, 254)) Some(Ipv4Addr::new(192, 88, 99, 254))
} else { } else {
self.global_ctx.get_ipv4() self.global_ctx
.get_ipv4()
.as_ref()
.map(cidr::Ipv4Inet::address)
} }
} }
@ -621,7 +626,8 @@ impl TcpProxy {
if !self.cidr_set.contains_v4(ipv4.get_destination()) if !self.cidr_set.contains_v4(ipv4.get_destination())
&& !is_exit_node && !is_exit_node
&& !(self.global_ctx.no_tun() && !(self.global_ctx.no_tun()
&& Some(ipv4.get_destination()) == self.global_ctx.get_ipv4()) && Some(ipv4.get_destination())
== self.global_ctx.get_ipv4().as_ref().map(Ipv4Inet::address))
{ {
return None; return None;
} }

View File

@ -4,6 +4,7 @@ use std::{
time::Duration, time::Duration,
}; };
use cidr::Ipv4Inet;
use crossbeam::atomic::AtomicCell; use crossbeam::atomic::AtomicCell;
use dashmap::DashMap; use dashmap::DashMap;
use pnet::packet::{ use pnet::packet::{
@ -245,7 +246,8 @@ impl UdpProxy {
if !self.cidr_set.contains_v4(ipv4.get_destination()) if !self.cidr_set.contains_v4(ipv4.get_destination())
&& !is_exit_node && !is_exit_node
&& !(self.global_ctx.no_tun() && !(self.global_ctx.no_tun()
&& Some(ipv4.get_destination()) == self.global_ctx.get_ipv4()) && Some(ipv4.get_destination())
== self.global_ctx.get_ipv4().as_ref().map(Ipv4Inet::address))
{ {
return None; return None;
} }
@ -296,14 +298,16 @@ impl UdpProxy {
.replace(tokio::spawn(UdpNatEntry::forward_task( .replace(tokio::spawn(UdpNatEntry::forward_task(
nat_entry.clone(), nat_entry.clone(),
self.sender.clone(), self.sender.clone(),
self.global_ctx.get_ipv4()?, self.global_ctx.get_ipv4().map(|x| x.address())?,
))); )));
} }
nat_entry.mark_active(); nat_entry.mark_active();
// TODO: should it be async. // TODO: should it be async.
let dst_socket = if Some(ipv4.get_destination()) == self.global_ctx.get_ipv4() { let dst_socket = if Some(ipv4.get_destination())
== self.global_ctx.get_ipv4().as_ref().map(Ipv4Inet::address)
{
format!("127.0.0.1:{}", udp_packet.get_destination()) format!("127.0.0.1:{}", udp_packet.get_destination())
.parse() .parse()
.unwrap() .unwrap()

View File

@ -270,19 +270,11 @@ impl Instance {
let mut used_ipv4 = HashSet::new(); let mut used_ipv4 = HashSet::new();
for route in routes { for route in routes {
if route.ipv4_addr.is_empty() { let Some(peer_ipv4_addr) = route.ipv4_addr else {
continue;
}
let Ok(peer_ipv4_addr) = route.ipv4_addr.parse::<Ipv4Addr>() else {
continue; continue;
}; };
let Ok(peer_ipv4_addr) = Ipv4Inet::new(peer_ipv4_addr, 24) else { used_ipv4.insert(peer_ipv4_addr.into());
continue;
};
used_ipv4.insert(peer_ipv4_addr);
} }
let dhcp_inet = used_ipv4.iter().next().unwrap_or(&default_ipv4_addr); let dhcp_inet = used_ipv4.iter().next().unwrap_or(&default_ipv4_addr);
@ -304,7 +296,7 @@ impl Instance {
continue; continue;
} }
let last_ip = current_dhcp_ip.as_ref().map(Ipv4Inet::address); let last_ip = current_dhcp_ip.clone();
tracing::debug!( tracing::debug!(
?current_dhcp_ip, ?current_dhcp_ip,
?candidate_ipv4_addr, ?candidate_ipv4_addr,
@ -316,11 +308,9 @@ impl Instance {
if let Some(ip) = candidate_ipv4_addr { if let Some(ip) = candidate_ipv4_addr {
if global_ctx_c.no_tun() { if global_ctx_c.no_tun() {
current_dhcp_ip = Some(ip); current_dhcp_ip = Some(ip);
global_ctx_c.set_ipv4(Some(ip.address())); global_ctx_c.set_ipv4(Some(ip));
global_ctx_c.issue_event(GlobalCtxEvent::DhcpIpv4Changed( global_ctx_c
last_ip, .issue_event(GlobalCtxEvent::DhcpIpv4Changed(last_ip, Some(ip)));
Some(ip.address()),
));
continue; continue;
} }
@ -331,7 +321,7 @@ impl Instance {
&peer_manager_c, &peer_manager_c,
_peer_packet_receiver.clone(), _peer_packet_receiver.clone(),
); );
if let Err(e) = new_nic_ctx.run(ip.address()).await { if let Err(e) = new_nic_ctx.run(ip).await {
tracing::error!( tracing::error!(
?current_dhcp_ip, ?current_dhcp_ip,
?candidate_ipv4_addr, ?candidate_ipv4_addr,
@ -345,9 +335,8 @@ impl Instance {
} }
current_dhcp_ip = Some(ip); current_dhcp_ip = Some(ip);
global_ctx_c.set_ipv4(Some(ip.address())); global_ctx_c.set_ipv4(Some(ip));
global_ctx_c global_ctx_c.issue_event(GlobalCtxEvent::DhcpIpv4Changed(last_ip, Some(ip)));
.issue_event(GlobalCtxEvent::DhcpIpv4Changed(last_ip, Some(ip.address())));
} else { } else {
current_dhcp_ip = None; current_dhcp_ip = None;
global_ctx_c.set_ipv4(None); global_ctx_c.set_ipv4(None);

View File

@ -504,8 +504,7 @@ pub fn reg_change_catrgory_in_profile(dev_name: &str) -> io::Result<()> {
let subkey = profiles_key.open_subkey_with_flags(&subkey_name, KEY_ALL_ACCESS)?; let subkey = profiles_key.open_subkey_with_flags(&subkey_name, KEY_ALL_ACCESS)?;
match subkey.get_value::<String, _>("ProfileName") { match subkey.get_value::<String, _>("ProfileName") {
Ok(profile_name) => { Ok(profile_name) => {
if !dev_name.is_empty() && dev_name == profile_name if !dev_name.is_empty() && dev_name == profile_name {
{
match subkey.set_value("Category", &1u32) { match subkey.set_value("Category", &1u32) {
Ok(_) => tracing::trace!("Successfully set Category in registry"), Ok(_) => tracing::trace!("Successfully set Category in registry"),
Err(e) => tracing::error!("Failed to set Category in registry: {}", e), Err(e) => tracing::error!("Failed to set Category in registry: {}", e),
@ -548,14 +547,16 @@ impl NicCtx {
} }
} }
async fn assign_ipv4_to_tun_device(&self, ipv4_addr: Ipv4Addr) -> Result<(), Error> { async fn assign_ipv4_to_tun_device(&self, ipv4_addr: cidr::Ipv4Inet) -> Result<(), Error> {
let nic = self.nic.lock().await; let nic = self.nic.lock().await;
nic.link_up().await?; nic.link_up().await?;
nic.remove_ip(None).await?; nic.remove_ip(None).await?;
nic.add_ip(ipv4_addr, 24).await?; nic.add_ip(ipv4_addr.address(), ipv4_addr.network_length() as i32)
.await?;
#[cfg(any(target_os = "macos", target_os = "freebsd"))] #[cfg(any(target_os = "macos", target_os = "freebsd"))]
{ {
nic.add_route(ipv4_addr, 24).await?; nic.add_route(ipv4_addr.first_address(), ipv4_addr.network_length())
.await?;
} }
Ok(()) Ok(())
} }
@ -710,18 +711,17 @@ impl NicCtx {
Ok(()) Ok(())
} }
pub async fn run(&mut self, ipv4_addr: Ipv4Addr) -> Result<(), Error> { pub async fn run(&mut self, ipv4_addr: cidr::Ipv4Inet) -> Result<(), Error> {
let tunnel = { let tunnel = {
let mut nic = self.nic.lock().await; let mut nic = self.nic.lock().await;
match nic.create_dev().await { match nic.create_dev().await {
Ok(ret) => { Ok(ret) => {
#[cfg(target_os = "windows")]
#[cfg(target_os = "windows")]
{ {
let dev_name = self.global_ctx.get_flags().dev_name; let dev_name = self.global_ctx.get_flags().dev_name;
let _ = reg_change_catrgory_in_profile(&dev_name); let _ = reg_change_catrgory_in_profile(&dev_name);
} }
self.global_ctx self.global_ctx
.issue_event(GlobalCtxEvent::TunDeviceReady(nic.ifname().to_string())); .issue_event(GlobalCtxEvent::TunDeviceReady(nic.ifname().to_string()));
ret ret

View File

@ -718,8 +718,16 @@ impl PeerManager {
let mut is_exit_node = false; let mut is_exit_node = false;
let mut dst_peers = vec![]; let mut dst_peers = vec![];
// NOTE: currently we only support ipv4 and cidr is 24 let network_length = self
if ipv4_addr.is_broadcast() || ipv4_addr.is_multicast() || ipv4_addr.octets()[3] == 255 { .global_ctx
.get_ipv4()
.map(|x| x.network_length())
.unwrap_or(24);
let ipv4_inet = cidr::Ipv4Inet::new(ipv4_addr, network_length).unwrap();
if ipv4_addr.is_broadcast()
|| ipv4_addr.is_multicast()
|| ipv4_addr == ipv4_inet.last_address()
{
dst_peers.extend( dst_peers.extend(
self.peers self.peers
.list_routes() .list_routes()

View File

@ -30,7 +30,7 @@ use crate::{
}, },
peers::route_trait::{Route, RouteInterfaceBox}, peers::route_trait::{Route, RouteInterfaceBox},
proto::{ proto::{
common::{NatType, StunInfo}, common::{Ipv4Inet, NatType, StunInfo},
peer_rpc::{ peer_rpc::{
route_foreign_network_infos, ForeignNetworkRouteInfoEntry, ForeignNetworkRouteInfoKey, route_foreign_network_infos, ForeignNetworkRouteInfoEntry, ForeignNetworkRouteInfoKey,
OspfRouteRpc, OspfRouteRpcClientFactory, OspfRouteRpcServer, PeerIdVersion, OspfRouteRpc, OspfRouteRpcClientFactory, OspfRouteRpcServer, PeerIdVersion,
@ -118,6 +118,7 @@ impl RoutePeerInfo {
easytier_version: EASYTIER_VERSION.to_string(), easytier_version: EASYTIER_VERSION.to_string(),
feature_flag: None, feature_flag: None,
peer_route_id: 0, peer_route_id: 0,
network_length: 24,
} }
} }
@ -131,7 +132,7 @@ impl RoutePeerInfo {
peer_id: my_peer_id, peer_id: my_peer_id,
inst_id: Some(global_ctx.get_id().into()), inst_id: Some(global_ctx.get_id().into()),
cost: 0, cost: 0,
ipv4_addr: global_ctx.get_ipv4().map(|x| x.into()), ipv4_addr: global_ctx.get_ipv4().map(|x| x.address().into()),
proxy_cidrs: global_ctx proxy_cidrs: global_ctx
.get_proxy_cidrs() .get_proxy_cidrs()
.iter() .iter()
@ -150,6 +151,10 @@ impl RoutePeerInfo {
easytier_version: EASYTIER_VERSION.to_string(), easytier_version: EASYTIER_VERSION.to_string(),
feature_flag: Some(global_ctx.get_feature_flags()), feature_flag: Some(global_ctx.get_feature_flags()),
peer_route_id, peer_route_id,
network_length: global_ctx
.get_ipv4()
.map(|x| x.network_length() as u32)
.unwrap_or(24),
}; };
let need_update_periodically = if let Ok(Ok(d)) = let need_update_periodically = if let Ok(Ok(d)) =
@ -171,12 +176,21 @@ impl RoutePeerInfo {
impl Into<crate::proto::cli::Route> for RoutePeerInfo { impl Into<crate::proto::cli::Route> for RoutePeerInfo {
fn into(self) -> crate::proto::cli::Route { fn into(self) -> crate::proto::cli::Route {
let network_length = if self.network_length == 0 {
24
} else {
self.network_length
};
crate::proto::cli::Route { crate::proto::cli::Route {
peer_id: self.peer_id, peer_id: self.peer_id,
ipv4_addr: if let Some(ipv4_addr) = self.ipv4_addr { ipv4_addr: if let Some(ipv4_addr) = self.ipv4_addr {
ipv4_addr.to_string() Some(Ipv4Inet {
address: Some(ipv4_addr.into()),
network_length,
})
} else { } else {
"".to_string() None
}, },
next_hop_peer_id: 0, next_hop_peer_id: 0,
cost: self.cost as i32, cost: self.cost as i32,

View File

@ -45,7 +45,7 @@ message ListPeerResponse {
message Route { message Route {
uint32 peer_id = 1; uint32 peer_id = 1;
string ipv4_addr = 2; common.Ipv4Inet ipv4_addr = 2;
uint32 next_hop_peer_id = 3; uint32 next_hop_peer_id = 3;
int32 cost = 4; int32 cost = 4;
repeated string proxy_cidrs = 5; repeated string proxy_cidrs = 5;

View File

@ -72,6 +72,11 @@ message Ipv6Addr {
uint32 part4 = 4; uint32 part4 = 4;
} }
message Ipv4Inet {
Ipv4Addr address = 1;
uint32 network_length = 2;
}
message Url { string url = 1; } message Url { string url = 1; }
message SocketAddr { message SocketAddr {

View File

@ -1,5 +1,7 @@
use std::{fmt::Display, str::FromStr}; use std::{fmt::Display, str::FromStr};
use anyhow::Context;
include!(concat!(env!("OUT_DIR"), "/common.rs")); include!(concat!(env!("OUT_DIR"), "/common.rs"));
impl From<uuid::Uuid> for Uuid { impl From<uuid::Uuid> for Uuid {
@ -60,10 +62,8 @@ impl From<Ipv6Addr> for std::net::Ipv6Addr {
let part3 = value.part3.to_be_bytes(); let part3 = value.part3.to_be_bytes();
let part4 = value.part4.to_be_bytes(); let part4 = value.part4.to_be_bytes();
std::net::Ipv6Addr::from([ std::net::Ipv6Addr::from([
part1[0], part1[1], part1[2], part1[3], part1[0], part1[1], part1[2], part1[3], part2[0], part2[1], part2[2], part2[3],
part2[0], part2[1], part2[2], part2[3], part3[0], part3[1], part3[2], part3[3], part4[0], part4[1], part4[2], part4[3],
part3[0], part3[1], part3[2], part3[3],
part4[0], part4[1], part4[2], part4[3]
]) ])
} }
} }
@ -74,6 +74,37 @@ impl ToString for Ipv6Addr {
} }
} }
impl From<cidr::Ipv4Inet> for Ipv4Inet {
fn from(value: cidr::Ipv4Inet) -> Self {
Ipv4Inet {
address: Some(value.address().into()),
network_length: value.network_length() as u32,
}
}
}
impl From<Ipv4Inet> for cidr::Ipv4Inet {
fn from(value: Ipv4Inet) -> Self {
cidr::Ipv4Inet::new(value.address.unwrap().into(), value.network_length as u8).unwrap()
}
}
impl std::fmt::Display for Ipv4Inet {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "{}", cidr::Ipv4Inet::from(self.clone()))
}
}
impl FromStr for Ipv4Inet {
type Err = anyhow::Error;
fn from_str(s: &str) -> Result<Self, Self::Err> {
Ok(Ipv4Inet::from(
cidr::Ipv4Inet::from_str(s).with_context(|| "Failed to parse Ipv4Inet")?,
))
}
}
impl From<url::Url> for Url { impl From<url::Url> for Url {
fn from(value: url::Url) -> Self { fn from(value: url::Url) -> Self {
Url { Url {

View File

@ -20,6 +20,8 @@ message RoutePeerInfo {
string easytier_version = 10; string easytier_version = 10;
common.PeerFeatureFlag feature_flag = 11; common.PeerFeatureFlag feature_flag = 11;
uint64 peer_route_id = 12; uint64 peer_route_id = 12;
uint32 network_length = 13;
} }
message PeerIdVersion { message PeerIdVersion {

View File

@ -130,7 +130,7 @@ pub fn enable_log() {
fn check_route(ipv4: &str, dst_peer_id: PeerId, routes: Vec<crate::proto::cli::Route>) { fn check_route(ipv4: &str, dst_peer_id: PeerId, routes: Vec<crate::proto::cli::Route>) {
let mut found = false; let mut found = false;
for r in routes.iter() { for r in routes.iter() {
if r.ipv4_addr == ipv4.to_string() { if r.ipv4_addr == Some(ipv4.parse().unwrap()) {
found = true; found = true;
assert_eq!(r.peer_id, dst_peer_id, "{:?}", routes); assert_eq!(r.peer_id, dst_peer_id, "{:?}", routes);
} }
@ -154,7 +154,7 @@ async fn wait_proxy_route_appear(
let r = r; let r = r;
if r.proxy_cidrs.contains(&proxy_cidr.to_owned()) { if r.proxy_cidrs.contains(&proxy_cidr.to_owned()) {
assert_eq!(r.peer_id, dst_peer_id); assert_eq!(r.peer_id, dst_peer_id);
assert_eq!(r.ipv4_addr, ipv4); assert_eq!(r.ipv4_addr, Some(ipv4.parse().unwrap()));
return; return;
} }
} }

View File

@ -184,13 +184,13 @@ pub async fn basic_three_node_test(#[values("tcp", "udp", "wg", "ws", "wss")] pr
let insts = init_three_node(proto).await; let insts = init_three_node(proto).await;
check_route( check_route(
"10.144.144.2", "10.144.144.2/24",
insts[1].peer_id(), insts[1].peer_id(),
insts[0].get_peer_manager().list_routes().await, insts[0].get_peer_manager().list_routes().await,
); );
check_route( check_route(
"10.144.144.3", "10.144.144.3/24",
insts[2].peer_id(), insts[2].peer_id(),
insts[0].get_peer_manager().list_routes().await, insts[0].get_peer_manager().list_routes().await,
); );
@ -357,7 +357,7 @@ pub async fn subnet_proxy_three_node_test(
wait_proxy_route_appear( wait_proxy_route_appear(
&insts[0].get_peer_manager(), &insts[0].get_peer_manager(),
"10.144.144.3", "10.144.144.3/24",
insts[2].peer_id(), insts[2].peer_id(),
"10.1.2.0/24", "10.1.2.0/24",
) )

View File

@ -284,13 +284,11 @@ impl VpnPortal for WireGuard {
.collect::<Vec<_>>(); .collect::<Vec<_>>();
for ipv4 in routes for ipv4 in routes
.iter() .iter()
.map(|x| x.ipv4_addr.clone()) .filter(|x| x.ipv4_addr.is_some())
.chain(global_ctx.get_ipv4().iter().map(|x| x.to_string())) .map(|x| x.ipv4_addr.unwrap())
.chain(global_ctx.get_ipv4().into_iter().map(Into::into))
{ {
let Ok(ipv4) = ipv4.parse() else { let inet = Ipv4Inet::from(ipv4);
continue;
};
let inet = Ipv4Inet::new(ipv4, 24).unwrap();
allow_ips.push(inet.network().to_string()); allow_ips.push(inet.network().to_string());
break; break;
} }