TUN-8688: Correct UDP bind for IPv6 edge connectivity on macOS
For macOS, we want to set the DF bit for the UDP packets used by the QUIC connection; to achieve this, you need to explicitly set the network to either "udp4" or "udp6". When determining which network type to pick we need to use the edge IP address chosen to align with what the local IP family interface we will use. This means we want cloudflared to bind to local interfaces for a random port, so we provide a zero IP and 0 port number (ex. 0.0.0.0:0). However, instead of providing the zero IP, we can leave the value as nil and let the kernel decide which interface and pick a random port as defined by the target edge IP family. This was previously broken for IPv6-only edge connectivity on macOS and all other operating systems should be unaffected because the network type was left as default "udp" which will rely on the provided local or remote IP for selection. Closes TUN-8688
This commit is contained in:
parent
d608a64cc5
commit
92e0f5fcf9
|
@ -90,7 +90,7 @@ type QUICConnection struct {
|
||||||
func NewQUICConnection(
|
func NewQUICConnection(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
quicConfig *quic.Config,
|
quicConfig *quic.Config,
|
||||||
edgeAddr net.Addr,
|
edgeAddr netip.AddrPort,
|
||||||
localAddr net.IP,
|
localAddr net.IP,
|
||||||
connIndex uint8,
|
connIndex uint8,
|
||||||
tlsConfig *tls.Config,
|
tlsConfig *tls.Config,
|
||||||
|
@ -103,12 +103,12 @@ func NewQUICConnection(
|
||||||
streamWriteTimeout time.Duration,
|
streamWriteTimeout time.Duration,
|
||||||
gracePeriod time.Duration,
|
gracePeriod time.Duration,
|
||||||
) (*QUICConnection, error) {
|
) (*QUICConnection, error) {
|
||||||
udpConn, err := createUDPConnForConnIndex(connIndex, localAddr, logger)
|
udpConn, err := createUDPConnForConnIndex(connIndex, localAddr, edgeAddr, logger)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
session, err := quic.Dial(ctx, udpConn, edgeAddr, tlsConfig, quicConfig)
|
session, err := quic.Dial(ctx, udpConn, net.UDPAddrFromAddrPort(edgeAddr), tlsConfig, quicConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// close the udp server socket in case of error connecting to the edge
|
// close the udp server socket in case of error connecting to the edge
|
||||||
udpConn.Close()
|
udpConn.Close()
|
||||||
|
@ -641,18 +641,15 @@ func (rp *muxerWrapper) Close() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func createUDPConnForConnIndex(connIndex uint8, localIP net.IP, logger *zerolog.Logger) (*net.UDPConn, error) {
|
func createUDPConnForConnIndex(connIndex uint8, localIP net.IP, edgeIP netip.AddrPort, logger *zerolog.Logger) (*net.UDPConn, error) {
|
||||||
portMapMutex.Lock()
|
portMapMutex.Lock()
|
||||||
defer portMapMutex.Unlock()
|
defer portMapMutex.Unlock()
|
||||||
|
|
||||||
if localIP == nil {
|
|
||||||
localIP = net.IPv4zero
|
|
||||||
}
|
|
||||||
|
|
||||||
listenNetwork := "udp"
|
listenNetwork := "udp"
|
||||||
// https://github.com/quic-go/quic-go/issues/3793 DF bit cannot be set for dual stack listener on OSX
|
// https://github.com/quic-go/quic-go/issues/3793 DF bit cannot be set for dual stack listener ("udp") on macOS,
|
||||||
|
// to set the DF bit properly, the network string needs to be specific to the IP family.
|
||||||
if runtime.GOOS == "darwin" {
|
if runtime.GOOS == "darwin" {
|
||||||
if localIP.To4() != nil {
|
if edgeIP.Addr().Is4() {
|
||||||
listenNetwork = "udp4"
|
listenNetwork = "udp4"
|
||||||
} else {
|
} else {
|
||||||
listenNetwork = "udp6"
|
listenNetwork = "udp6"
|
||||||
|
|
|
@ -13,6 +13,7 @@ import (
|
||||||
"math/big"
|
"math/big"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/netip"
|
||||||
"net/url"
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -26,6 +27,7 @@ import (
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
"golang.org/x/net/nettest"
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/datagramsession"
|
"github.com/cloudflare/cloudflared/datagramsession"
|
||||||
cfdquic "github.com/cloudflare/cloudflared/quic"
|
cfdquic "github.com/cloudflare/cloudflared/quic"
|
||||||
|
@ -162,7 +164,7 @@ func TestQUICServer(t *testing.T) {
|
||||||
close(serverDone)
|
close(serverDone)
|
||||||
}()
|
}()
|
||||||
|
|
||||||
qc := testQUICConnection(udpListener.LocalAddr(), t, uint8(i))
|
qc := testQUICConnection(netip.MustParseAddrPort(udpListener.LocalAddr().String()), t, uint8(i))
|
||||||
|
|
||||||
connDone := make(chan struct{})
|
connDone := make(chan struct{})
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -632,7 +634,6 @@ func TestServeUDPSession(t *testing.T) {
|
||||||
defer udpListener.Close()
|
defer udpListener.Close()
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
val := udpListener.LocalAddr()
|
|
||||||
|
|
||||||
// Establish QUIC connection with edge
|
// Establish QUIC connection with edge
|
||||||
edgeQUICSessionChan := make(chan quic.Connection)
|
edgeQUICSessionChan := make(chan quic.Connection)
|
||||||
|
@ -646,7 +647,7 @@ func TestServeUDPSession(t *testing.T) {
|
||||||
}()
|
}()
|
||||||
|
|
||||||
// Random index to avoid reusing port
|
// Random index to avoid reusing port
|
||||||
qc := testQUICConnection(val, t, 28)
|
qc := testQUICConnection(netip.MustParseAddrPort(udpListener.LocalAddr().String()), t, 28)
|
||||||
go qc.Serve(ctx)
|
go qc.Serve(ctx)
|
||||||
|
|
||||||
edgeQUICSession := <-edgeQUICSessionChan
|
edgeQUICSession := <-edgeQUICSessionChan
|
||||||
|
@ -695,8 +696,20 @@ func TestNopCloserReadWriterCloseAfterEOF(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
||||||
|
edgeIPv4 := netip.MustParseAddrPort("0.0.0.0:0")
|
||||||
|
edgeIPv6 := netip.MustParseAddrPort("[::]:0")
|
||||||
|
|
||||||
|
// We assume the test environment has access to an IPv4 interface
|
||||||
|
testCreateUDPConnReuseSourcePortForEdgeIP(t, edgeIPv4)
|
||||||
|
|
||||||
|
if nettest.SupportsIPv6() {
|
||||||
|
testCreateUDPConnReuseSourcePortForEdgeIP(t, edgeIPv6)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func testCreateUDPConnReuseSourcePortForEdgeIP(t *testing.T, edgeIP netip.AddrPort) {
|
||||||
logger := zerolog.Nop()
|
logger := zerolog.Nop()
|
||||||
conn, err := createUDPConnForConnIndex(0, nil, &logger)
|
conn, err := createUDPConnForConnIndex(0, nil, edgeIP, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
getPortFunc := func(conn *net.UDPConn) int {
|
getPortFunc := func(conn *net.UDPConn) int {
|
||||||
|
@ -710,17 +723,17 @@ func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
||||||
conn.Close()
|
conn.Close()
|
||||||
|
|
||||||
// should get the same port as before.
|
// should get the same port as before.
|
||||||
conn, err = createUDPConnForConnIndex(0, nil, &logger)
|
conn, err = createUDPConnForConnIndex(0, nil, edgeIP, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, initialPort, getPortFunc(conn))
|
require.Equal(t, initialPort, getPortFunc(conn))
|
||||||
|
|
||||||
// new index, should get a different port
|
// new index, should get a different port
|
||||||
conn1, err := createUDPConnForConnIndex(1, nil, &logger)
|
conn1, err := createUDPConnForConnIndex(1, nil, edgeIP, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotEqual(t, initialPort, getPortFunc(conn1))
|
require.NotEqual(t, initialPort, getPortFunc(conn1))
|
||||||
|
|
||||||
// not closing the conn and trying to obtain a new conn for same index should give a different random port
|
// not closing the conn and trying to obtain a new conn for same index should give a different random port
|
||||||
conn, err = createUDPConnForConnIndex(0, nil, &logger)
|
conn, err = createUDPConnForConnIndex(0, nil, edgeIP, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotEqual(t, initialPort, getPortFunc(conn))
|
require.NotEqual(t, initialPort, getPortFunc(conn))
|
||||||
}
|
}
|
||||||
|
@ -832,7 +845,7 @@ func (s mockSessionRPCServer) UnregisterUdpSession(ctx context.Context, sessionI
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func testQUICConnection(udpListenerAddr net.Addr, t *testing.T, index uint8) *QUICConnection {
|
func testQUICConnection(udpListenerAddr netip.AddrPort, t *testing.T, index uint8) *QUICConnection {
|
||||||
tlsClientConfig := &tls.Config{
|
tlsClientConfig := &tls.Config{
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
NextProtos: []string{"argotunnel"},
|
NextProtos: []string{"argotunnel"},
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
|
"net/netip"
|
||||||
"runtime/debug"
|
"runtime/debug"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
@ -465,7 +466,7 @@ func (e *EdgeTunnelServer) serveConnection(
|
||||||
case connection.QUIC:
|
case connection.QUIC:
|
||||||
connOptions := e.config.connectionOptions(addr.UDP.String(), uint8(backoff.Retries()))
|
connOptions := e.config.connectionOptions(addr.UDP.String(), uint8(backoff.Retries()))
|
||||||
return e.serveQUIC(ctx,
|
return e.serveQUIC(ctx,
|
||||||
addr.UDP,
|
addr.UDP.AddrPort(),
|
||||||
connLog,
|
connLog,
|
||||||
connOptions,
|
connOptions,
|
||||||
controlStream,
|
controlStream,
|
||||||
|
@ -548,7 +549,7 @@ func (e *EdgeTunnelServer) serveHTTP2(
|
||||||
|
|
||||||
func (e *EdgeTunnelServer) serveQUIC(
|
func (e *EdgeTunnelServer) serveQUIC(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
edgeAddr *net.UDPAddr,
|
edgeAddr netip.AddrPort,
|
||||||
connLogger *ConnAwareLogger,
|
connLogger *ConnAwareLogger,
|
||||||
connOptions *pogs.ConnectionOptions,
|
connOptions *pogs.ConnectionOptions,
|
||||||
controlStreamHandler connection.ControlStreamHandler,
|
controlStreamHandler connection.ControlStreamHandler,
|
||||||
|
@ -571,7 +572,7 @@ func (e *EdgeTunnelServer) serveQUIC(
|
||||||
// quic-go 0.44 increases the initial packet size to 1280 by default. That breaks anyone running tunnel through WARP
|
// quic-go 0.44 increases the initial packet size to 1280 by default. That breaks anyone running tunnel through WARP
|
||||||
// because WARP MTU is 1280.
|
// because WARP MTU is 1280.
|
||||||
var initialPacketSize uint16 = 1252
|
var initialPacketSize uint16 = 1252
|
||||||
if edgeAddr.IP.To4() == nil {
|
if edgeAddr.Addr().Is4() {
|
||||||
initialPacketSize = 1232
|
initialPacketSize = 1232
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,468 @@
|
||||||
|
// Copyright 2016 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package nettest
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/binary"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
"math/rand"
|
||||||
|
"net"
|
||||||
|
"runtime"
|
||||||
|
"sync"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// MakePipe creates a connection between two endpoints and returns the pair
|
||||||
|
// as c1 and c2, such that anything written to c1 is read by c2 and vice-versa.
|
||||||
|
// The stop function closes all resources, including c1, c2, and the underlying
|
||||||
|
// net.Listener (if there is one), and should not be nil.
|
||||||
|
type MakePipe func() (c1, c2 net.Conn, stop func(), err error)
|
||||||
|
|
||||||
|
// TestConn tests that a net.Conn implementation properly satisfies the interface.
|
||||||
|
// The tests should not produce any false positives, but may experience
|
||||||
|
// false negatives. Thus, some issues may only be detected when the test is
|
||||||
|
// run multiple times. For maximal effectiveness, run the tests under the
|
||||||
|
// race detector.
|
||||||
|
func TestConn(t *testing.T, mp MakePipe) {
|
||||||
|
t.Run("BasicIO", func(t *testing.T) { timeoutWrapper(t, mp, testBasicIO) })
|
||||||
|
t.Run("PingPong", func(t *testing.T) { timeoutWrapper(t, mp, testPingPong) })
|
||||||
|
t.Run("RacyRead", func(t *testing.T) { timeoutWrapper(t, mp, testRacyRead) })
|
||||||
|
t.Run("RacyWrite", func(t *testing.T) { timeoutWrapper(t, mp, testRacyWrite) })
|
||||||
|
t.Run("ReadTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testReadTimeout) })
|
||||||
|
t.Run("WriteTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testWriteTimeout) })
|
||||||
|
t.Run("PastTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testPastTimeout) })
|
||||||
|
t.Run("PresentTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testPresentTimeout) })
|
||||||
|
t.Run("FutureTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testFutureTimeout) })
|
||||||
|
t.Run("CloseTimeout", func(t *testing.T) { timeoutWrapper(t, mp, testCloseTimeout) })
|
||||||
|
t.Run("ConcurrentMethods", func(t *testing.T) { timeoutWrapper(t, mp, testConcurrentMethods) })
|
||||||
|
}
|
||||||
|
|
||||||
|
type connTester func(t *testing.T, c1, c2 net.Conn)
|
||||||
|
|
||||||
|
func timeoutWrapper(t *testing.T, mp MakePipe, f connTester) {
|
||||||
|
t.Helper()
|
||||||
|
c1, c2, stop, err := mp()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unable to make pipe: %v", err)
|
||||||
|
}
|
||||||
|
var once sync.Once
|
||||||
|
defer once.Do(func() { stop() })
|
||||||
|
timer := time.AfterFunc(time.Minute, func() {
|
||||||
|
once.Do(func() {
|
||||||
|
t.Error("test timed out; terminating pipe")
|
||||||
|
stop()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
defer timer.Stop()
|
||||||
|
f(t, c1, c2)
|
||||||
|
}
|
||||||
|
|
||||||
|
// testBasicIO tests that the data sent on c1 is properly received on c2.
|
||||||
|
func testBasicIO(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
want := make([]byte, 1<<20)
|
||||||
|
rand.New(rand.NewSource(0)).Read(want)
|
||||||
|
|
||||||
|
dataCh := make(chan []byte)
|
||||||
|
go func() {
|
||||||
|
rd := bytes.NewReader(want)
|
||||||
|
if err := chunkedCopy(c1, rd); err != nil {
|
||||||
|
t.Errorf("unexpected c1.Write error: %v", err)
|
||||||
|
}
|
||||||
|
if err := c1.Close(); err != nil {
|
||||||
|
t.Errorf("unexpected c1.Close error: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
wr := new(bytes.Buffer)
|
||||||
|
if err := chunkedCopy(wr, c2); err != nil {
|
||||||
|
t.Errorf("unexpected c2.Read error: %v", err)
|
||||||
|
}
|
||||||
|
if err := c2.Close(); err != nil {
|
||||||
|
t.Errorf("unexpected c2.Close error: %v", err)
|
||||||
|
}
|
||||||
|
dataCh <- wr.Bytes()
|
||||||
|
}()
|
||||||
|
|
||||||
|
if got := <-dataCh; !bytes.Equal(got, want) {
|
||||||
|
t.Error("transmitted data differs")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testPingPong tests that the two endpoints can synchronously send data to
|
||||||
|
// each other in a typical request-response pattern.
|
||||||
|
func testPingPong(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
defer wg.Wait()
|
||||||
|
|
||||||
|
pingPonger := func(c net.Conn) {
|
||||||
|
defer wg.Done()
|
||||||
|
buf := make([]byte, 8)
|
||||||
|
var prev uint64
|
||||||
|
for {
|
||||||
|
if _, err := io.ReadFull(c, buf); err != nil {
|
||||||
|
if err == io.EOF {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
t.Errorf("unexpected Read error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
v := binary.LittleEndian.Uint64(buf)
|
||||||
|
binary.LittleEndian.PutUint64(buf, v+1)
|
||||||
|
if prev != 0 && prev+2 != v {
|
||||||
|
t.Errorf("mismatching value: got %d, want %d", v, prev+2)
|
||||||
|
}
|
||||||
|
prev = v
|
||||||
|
if v == 1000 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := c.Write(buf); err != nil {
|
||||||
|
t.Errorf("unexpected Write error: %v", err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := c.Close(); err != nil {
|
||||||
|
t.Errorf("unexpected Close error: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
wg.Add(2)
|
||||||
|
go pingPonger(c1)
|
||||||
|
go pingPonger(c2)
|
||||||
|
|
||||||
|
// Start off the chain reaction.
|
||||||
|
if _, err := c1.Write(make([]byte, 8)); err != nil {
|
||||||
|
t.Errorf("unexpected c1.Write error: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testRacyRead tests that it is safe to mutate the input Read buffer
|
||||||
|
// immediately after cancelation has occurred.
|
||||||
|
func testRacyRead(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(c2, rand.New(rand.NewSource(0)))
|
||||||
|
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
defer wg.Wait()
|
||||||
|
|
||||||
|
c1.SetReadDeadline(time.Now().Add(time.Millisecond))
|
||||||
|
for i := 0; i < 10; i++ {
|
||||||
|
wg.Add(1)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
|
||||||
|
b1 := make([]byte, 1024)
|
||||||
|
b2 := make([]byte, 1024)
|
||||||
|
for j := 0; j < 100; j++ {
|
||||||
|
_, err := c1.Read(b1)
|
||||||
|
copy(b1, b2) // Mutate b1 to trigger potential race
|
||||||
|
if err != nil {
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
c1.SetReadDeadline(time.Now().Add(time.Millisecond))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testRacyWrite tests that it is safe to mutate the input Write buffer
|
||||||
|
// immediately after cancelation has occurred.
|
||||||
|
func testRacyWrite(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(ioutil.Discard, c2)
|
||||||
|
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
defer wg.Wait()
|
||||||
|
|
||||||
|
c1.SetWriteDeadline(time.Now().Add(time.Millisecond))
|
||||||
|
for i := 0; i < 10; i++ {
|
||||||
|
wg.Add(1)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
|
||||||
|
b1 := make([]byte, 1024)
|
||||||
|
b2 := make([]byte, 1024)
|
||||||
|
for j := 0; j < 100; j++ {
|
||||||
|
_, err := c1.Write(b1)
|
||||||
|
copy(b1, b2) // Mutate b1 to trigger potential race
|
||||||
|
if err != nil {
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
c1.SetWriteDeadline(time.Now().Add(time.Millisecond))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testReadTimeout tests that Read timeouts do not affect Write.
|
||||||
|
func testReadTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(ioutil.Discard, c2)
|
||||||
|
|
||||||
|
c1.SetReadDeadline(aLongTimeAgo)
|
||||||
|
_, err := c1.Read(make([]byte, 1024))
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
if _, err := c1.Write(make([]byte, 1024)); err != nil {
|
||||||
|
t.Errorf("unexpected Write error: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testWriteTimeout tests that Write timeouts do not affect Read.
|
||||||
|
func testWriteTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(c2, rand.New(rand.NewSource(0)))
|
||||||
|
|
||||||
|
c1.SetWriteDeadline(aLongTimeAgo)
|
||||||
|
_, err := c1.Write(make([]byte, 1024))
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
if _, err := c1.Read(make([]byte, 1024)); err != nil {
|
||||||
|
t.Errorf("unexpected Read error: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testPastTimeout tests that a deadline set in the past immediately times out
|
||||||
|
// Read and Write requests.
|
||||||
|
func testPastTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(c2, c2)
|
||||||
|
|
||||||
|
testRoundtrip(t, c1)
|
||||||
|
|
||||||
|
c1.SetDeadline(aLongTimeAgo)
|
||||||
|
n, err := c1.Write(make([]byte, 1024))
|
||||||
|
if n != 0 {
|
||||||
|
t.Errorf("unexpected Write count: got %d, want 0", n)
|
||||||
|
}
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
n, err = c1.Read(make([]byte, 1024))
|
||||||
|
if n != 0 {
|
||||||
|
t.Errorf("unexpected Read count: got %d, want 0", n)
|
||||||
|
}
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
|
||||||
|
testRoundtrip(t, c1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// testPresentTimeout tests that a past deadline set while there are pending
|
||||||
|
// Read and Write operations immediately times out those operations.
|
||||||
|
func testPresentTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
defer wg.Wait()
|
||||||
|
wg.Add(3)
|
||||||
|
|
||||||
|
deadlineSet := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
time.Sleep(100 * time.Millisecond)
|
||||||
|
deadlineSet <- true
|
||||||
|
c1.SetReadDeadline(aLongTimeAgo)
|
||||||
|
c1.SetWriteDeadline(aLongTimeAgo)
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
n, err := c1.Read(make([]byte, 1024))
|
||||||
|
if n != 0 {
|
||||||
|
t.Errorf("unexpected Read count: got %d, want 0", n)
|
||||||
|
}
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
if len(deadlineSet) == 0 {
|
||||||
|
t.Error("Read timed out before deadline is set")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
var err error
|
||||||
|
for err == nil {
|
||||||
|
_, err = c1.Write(make([]byte, 1024))
|
||||||
|
}
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
if len(deadlineSet) == 0 {
|
||||||
|
t.Error("Write timed out before deadline is set")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// testFutureTimeout tests that a future deadline will eventually time out
|
||||||
|
// Read and Write operations.
|
||||||
|
func testFutureTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
wg.Add(2)
|
||||||
|
|
||||||
|
c1.SetDeadline(time.Now().Add(100 * time.Millisecond))
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
_, err := c1.Read(make([]byte, 1024))
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
var err error
|
||||||
|
for err == nil {
|
||||||
|
_, err = c1.Write(make([]byte, 1024))
|
||||||
|
}
|
||||||
|
checkForTimeoutError(t, err)
|
||||||
|
}()
|
||||||
|
wg.Wait()
|
||||||
|
|
||||||
|
go chunkedCopy(c2, c2)
|
||||||
|
resyncConn(t, c1)
|
||||||
|
testRoundtrip(t, c1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// testCloseTimeout tests that calling Close immediately times out pending
|
||||||
|
// Read and Write operations.
|
||||||
|
func testCloseTimeout(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
go chunkedCopy(c2, c2)
|
||||||
|
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
defer wg.Wait()
|
||||||
|
wg.Add(3)
|
||||||
|
|
||||||
|
// Test for cancelation upon connection closure.
|
||||||
|
c1.SetDeadline(neverTimeout)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
time.Sleep(100 * time.Millisecond)
|
||||||
|
c1.Close()
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
var err error
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
for err == nil {
|
||||||
|
_, err = c1.Read(buf)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
var err error
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
for err == nil {
|
||||||
|
_, err = c1.Write(buf)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// testConcurrentMethods tests that the methods of net.Conn can safely
|
||||||
|
// be called concurrently.
|
||||||
|
func testConcurrentMethods(t *testing.T, c1, c2 net.Conn) {
|
||||||
|
if runtime.GOOS == "plan9" {
|
||||||
|
t.Skip("skipping on plan9; see https://golang.org/issue/20489")
|
||||||
|
}
|
||||||
|
go chunkedCopy(c2, c2)
|
||||||
|
|
||||||
|
// The results of the calls may be nonsensical, but this should
|
||||||
|
// not trigger a race detector warning.
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
for i := 0; i < 100; i++ {
|
||||||
|
wg.Add(7)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.Read(make([]byte, 1024))
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.Write(make([]byte, 1024))
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.SetDeadline(time.Now().Add(10 * time.Millisecond))
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.SetReadDeadline(aLongTimeAgo)
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.SetWriteDeadline(aLongTimeAgo)
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.LocalAddr()
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
c1.RemoteAddr()
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
wg.Wait() // At worst, the deadline is set 10ms into the future
|
||||||
|
|
||||||
|
resyncConn(t, c1)
|
||||||
|
testRoundtrip(t, c1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// checkForTimeoutError checks that the error satisfies the Error interface
|
||||||
|
// and that Timeout returns true.
|
||||||
|
func checkForTimeoutError(t *testing.T, err error) {
|
||||||
|
t.Helper()
|
||||||
|
if nerr, ok := err.(net.Error); ok {
|
||||||
|
if !nerr.Timeout() {
|
||||||
|
if runtime.GOOS == "windows" && runtime.GOARCH == "arm64" && t.Name() == "TestTestConn/TCP/RacyRead" {
|
||||||
|
t.Logf("ignoring known failure mode on windows/arm64; see https://go.dev/issue/52893")
|
||||||
|
} else {
|
||||||
|
t.Errorf("got error: %v, want err.Timeout() = true", nerr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
t.Errorf("got %T: %v, want net.Error", err, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// testRoundtrip writes something into c and reads it back.
|
||||||
|
// It assumes that everything written into c is echoed back to itself.
|
||||||
|
func testRoundtrip(t *testing.T, c net.Conn) {
|
||||||
|
t.Helper()
|
||||||
|
if err := c.SetDeadline(neverTimeout); err != nil {
|
||||||
|
t.Errorf("roundtrip SetDeadline error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
const s = "Hello, world!"
|
||||||
|
buf := []byte(s)
|
||||||
|
if _, err := c.Write(buf); err != nil {
|
||||||
|
t.Errorf("roundtrip Write error: %v", err)
|
||||||
|
}
|
||||||
|
if _, err := io.ReadFull(c, buf); err != nil {
|
||||||
|
t.Errorf("roundtrip Read error: %v", err)
|
||||||
|
}
|
||||||
|
if string(buf) != s {
|
||||||
|
t.Errorf("roundtrip data mismatch: got %q, want %q", buf, s)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// resyncConn resynchronizes the connection into a sane state.
|
||||||
|
// It assumes that everything written into c is echoed back to itself.
|
||||||
|
// It assumes that 0xff is not currently on the wire or in the read buffer.
|
||||||
|
func resyncConn(t *testing.T, c net.Conn) {
|
||||||
|
t.Helper()
|
||||||
|
c.SetDeadline(neverTimeout)
|
||||||
|
errCh := make(chan error)
|
||||||
|
go func() {
|
||||||
|
_, err := c.Write([]byte{0xff})
|
||||||
|
errCh <- err
|
||||||
|
}()
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
for {
|
||||||
|
n, err := c.Read(buf)
|
||||||
|
if n > 0 && bytes.IndexByte(buf[:n], 0xff) == n-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("unexpected Read error: %v", err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := <-errCh; err != nil {
|
||||||
|
t.Errorf("unexpected Write error: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// chunkedCopy copies from r to w in fixed-width chunks to avoid
|
||||||
|
// causing a Write that exceeds the maximum packet size for packet-based
|
||||||
|
// connections like "unixpacket".
|
||||||
|
// We assume that the maximum packet size is at least 1024.
|
||||||
|
func chunkedCopy(w io.Writer, r io.Reader) error {
|
||||||
|
b := make([]byte, 1024)
|
||||||
|
_, err := io.CopyBuffer(struct{ io.Writer }{w}, struct{ io.Reader }{r}, b)
|
||||||
|
return err
|
||||||
|
}
|
|
@ -0,0 +1,345 @@
|
||||||
|
// Copyright 2019 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Package nettest provides utilities for network testing.
|
||||||
|
package nettest
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"runtime"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
stackOnce sync.Once
|
||||||
|
ipv4Enabled bool
|
||||||
|
canListenTCP4OnLoopback bool
|
||||||
|
ipv6Enabled bool
|
||||||
|
canListenTCP6OnLoopback bool
|
||||||
|
unStrmDgramEnabled bool
|
||||||
|
rawSocketSess bool
|
||||||
|
|
||||||
|
aLongTimeAgo = time.Unix(233431200, 0)
|
||||||
|
neverTimeout = time.Time{}
|
||||||
|
|
||||||
|
errNoAvailableInterface = errors.New("no available interface")
|
||||||
|
errNoAvailableAddress = errors.New("no available address")
|
||||||
|
)
|
||||||
|
|
||||||
|
func probeStack() {
|
||||||
|
if _, err := RoutedInterface("ip4", net.FlagUp); err == nil {
|
||||||
|
ipv4Enabled = true
|
||||||
|
}
|
||||||
|
if ln, err := net.Listen("tcp4", "127.0.0.1:0"); err == nil {
|
||||||
|
ln.Close()
|
||||||
|
canListenTCP4OnLoopback = true
|
||||||
|
}
|
||||||
|
if _, err := RoutedInterface("ip6", net.FlagUp); err == nil {
|
||||||
|
ipv6Enabled = true
|
||||||
|
}
|
||||||
|
if ln, err := net.Listen("tcp6", "[::1]:0"); err == nil {
|
||||||
|
ln.Close()
|
||||||
|
canListenTCP6OnLoopback = true
|
||||||
|
}
|
||||||
|
rawSocketSess = supportsRawSocket()
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "aix":
|
||||||
|
// Unix network isn't properly working on AIX 7.2 with
|
||||||
|
// Technical Level < 2.
|
||||||
|
out, _ := exec.Command("oslevel", "-s").Output()
|
||||||
|
if len(out) >= len("7200-XX-ZZ-YYMM") { // AIX 7.2, Tech Level XX, Service Pack ZZ, date YYMM
|
||||||
|
ver := string(out[:4])
|
||||||
|
tl, _ := strconv.Atoi(string(out[5:7]))
|
||||||
|
unStrmDgramEnabled = ver > "7200" || (ver == "7200" && tl >= 2)
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
unStrmDgramEnabled = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func unixStrmDgramEnabled() bool {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
return unStrmDgramEnabled
|
||||||
|
}
|
||||||
|
|
||||||
|
// SupportsIPv4 reports whether the platform supports IPv4 networking
|
||||||
|
// functionality.
|
||||||
|
func SupportsIPv4() bool {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
return ipv4Enabled
|
||||||
|
}
|
||||||
|
|
||||||
|
// SupportsIPv6 reports whether the platform supports IPv6 networking
|
||||||
|
// functionality.
|
||||||
|
func SupportsIPv6() bool {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
return ipv6Enabled
|
||||||
|
}
|
||||||
|
|
||||||
|
// SupportsRawSocket reports whether the current session is available
|
||||||
|
// to use raw sockets.
|
||||||
|
func SupportsRawSocket() bool {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
return rawSocketSess
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestableNetwork reports whether network is testable on the current
|
||||||
|
// platform configuration.
|
||||||
|
//
|
||||||
|
// See func Dial of the standard library for the supported networks.
|
||||||
|
func TestableNetwork(network string) bool {
|
||||||
|
ss := strings.Split(network, ":")
|
||||||
|
switch ss[0] {
|
||||||
|
case "ip+nopriv":
|
||||||
|
// This is an internal network name for testing on the
|
||||||
|
// package net of the standard library.
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "android", "fuchsia", "hurd", "ios", "js", "nacl", "plan9", "wasip1", "windows":
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
case "ip", "ip4", "ip6":
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "fuchsia", "hurd", "js", "nacl", "plan9", "wasip1":
|
||||||
|
return false
|
||||||
|
default:
|
||||||
|
if os.Getuid() != 0 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case "unix", "unixgram":
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "android", "fuchsia", "hurd", "ios", "js", "nacl", "plan9", "wasip1", "windows":
|
||||||
|
return false
|
||||||
|
case "aix":
|
||||||
|
return unixStrmDgramEnabled()
|
||||||
|
}
|
||||||
|
case "unixpacket":
|
||||||
|
switch runtime.GOOS {
|
||||||
|
case "aix", "android", "fuchsia", "hurd", "darwin", "ios", "js", "nacl", "plan9", "wasip1", "windows", "zos":
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
switch ss[0] {
|
||||||
|
case "tcp4", "udp4", "ip4":
|
||||||
|
return SupportsIPv4()
|
||||||
|
case "tcp6", "udp6", "ip6":
|
||||||
|
return SupportsIPv6()
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestableAddress reports whether address of network is testable on
|
||||||
|
// the current platform configuration.
|
||||||
|
func TestableAddress(network, address string) bool {
|
||||||
|
switch ss := strings.Split(network, ":"); ss[0] {
|
||||||
|
case "unix", "unixgram", "unixpacket":
|
||||||
|
// Abstract unix domain sockets, a Linux-ism.
|
||||||
|
if address[0] == '@' && runtime.GOOS != "linux" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLocalListener returns a listener which listens to a loopback IP
|
||||||
|
// address or local file system path.
|
||||||
|
//
|
||||||
|
// The provided network must be "tcp", "tcp4", "tcp6", "unix" or
|
||||||
|
// "unixpacket".
|
||||||
|
func NewLocalListener(network string) (net.Listener, error) {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
switch network {
|
||||||
|
case "tcp":
|
||||||
|
if canListenTCP4OnLoopback {
|
||||||
|
if ln, err := net.Listen("tcp4", "127.0.0.1:0"); err == nil {
|
||||||
|
return ln, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if canListenTCP6OnLoopback {
|
||||||
|
return net.Listen("tcp6", "[::1]:0")
|
||||||
|
}
|
||||||
|
case "tcp4":
|
||||||
|
if canListenTCP4OnLoopback {
|
||||||
|
return net.Listen("tcp4", "127.0.0.1:0")
|
||||||
|
}
|
||||||
|
case "tcp6":
|
||||||
|
if canListenTCP6OnLoopback {
|
||||||
|
return net.Listen("tcp6", "[::1]:0")
|
||||||
|
}
|
||||||
|
case "unix", "unixpacket":
|
||||||
|
path, err := LocalPath()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return net.Listen(network, path)
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("%s is not supported on %s/%s", network, runtime.GOOS, runtime.GOARCH)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLocalPacketListener returns a packet listener which listens to a
|
||||||
|
// loopback IP address or local file system path.
|
||||||
|
//
|
||||||
|
// The provided network must be "udp", "udp4", "udp6" or "unixgram".
|
||||||
|
func NewLocalPacketListener(network string) (net.PacketConn, error) {
|
||||||
|
stackOnce.Do(probeStack)
|
||||||
|
switch network {
|
||||||
|
case "udp":
|
||||||
|
if canListenTCP4OnLoopback {
|
||||||
|
if c, err := net.ListenPacket("udp4", "127.0.0.1:0"); err == nil {
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if canListenTCP6OnLoopback {
|
||||||
|
return net.ListenPacket("udp6", "[::1]:0")
|
||||||
|
}
|
||||||
|
case "udp4":
|
||||||
|
if canListenTCP4OnLoopback {
|
||||||
|
return net.ListenPacket("udp4", "127.0.0.1:0")
|
||||||
|
}
|
||||||
|
case "udp6":
|
||||||
|
if canListenTCP6OnLoopback {
|
||||||
|
return net.ListenPacket("udp6", "[::1]:0")
|
||||||
|
}
|
||||||
|
case "unixgram":
|
||||||
|
path, err := LocalPath()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return net.ListenPacket(network, path)
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("%s is not supported on %s/%s", network, runtime.GOOS, runtime.GOARCH)
|
||||||
|
}
|
||||||
|
|
||||||
|
// LocalPath returns a local path that can be used for Unix-domain
|
||||||
|
// protocol testing.
|
||||||
|
func LocalPath() (string, error) {
|
||||||
|
dir := ""
|
||||||
|
if runtime.GOOS == "darwin" {
|
||||||
|
dir = "/tmp"
|
||||||
|
}
|
||||||
|
f, err := ioutil.TempFile(dir, "go-nettest")
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
path := f.Name()
|
||||||
|
f.Close()
|
||||||
|
os.Remove(path)
|
||||||
|
return path, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MulticastSource returns a unicast IP address on ifi when ifi is an
|
||||||
|
// IP multicast-capable network interface.
|
||||||
|
//
|
||||||
|
// The provided network must be "ip", "ip4" or "ip6".
|
||||||
|
func MulticastSource(network string, ifi *net.Interface) (net.IP, error) {
|
||||||
|
switch network {
|
||||||
|
case "ip", "ip4", "ip6":
|
||||||
|
default:
|
||||||
|
return nil, errNoAvailableAddress
|
||||||
|
}
|
||||||
|
if ifi == nil || ifi.Flags&net.FlagUp == 0 || ifi.Flags&net.FlagMulticast == 0 {
|
||||||
|
return nil, errNoAvailableAddress
|
||||||
|
}
|
||||||
|
ip, ok := hasRoutableIP(network, ifi)
|
||||||
|
if !ok {
|
||||||
|
return nil, errNoAvailableAddress
|
||||||
|
}
|
||||||
|
return ip, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoopbackInterface returns an available logical network interface
|
||||||
|
// for loopback test.
|
||||||
|
func LoopbackInterface() (*net.Interface, error) {
|
||||||
|
ift, err := net.Interfaces()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errNoAvailableInterface
|
||||||
|
}
|
||||||
|
for _, ifi := range ift {
|
||||||
|
if ifi.Flags&net.FlagLoopback != 0 && ifi.Flags&net.FlagUp != 0 {
|
||||||
|
return &ifi, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, errNoAvailableInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoutedInterface returns a network interface that can route IP
|
||||||
|
// traffic and satisfies flags.
|
||||||
|
//
|
||||||
|
// The provided network must be "ip", "ip4" or "ip6".
|
||||||
|
func RoutedInterface(network string, flags net.Flags) (*net.Interface, error) {
|
||||||
|
switch network {
|
||||||
|
case "ip", "ip4", "ip6":
|
||||||
|
default:
|
||||||
|
return nil, errNoAvailableInterface
|
||||||
|
}
|
||||||
|
ift, err := net.Interfaces()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errNoAvailableInterface
|
||||||
|
}
|
||||||
|
for _, ifi := range ift {
|
||||||
|
if ifi.Flags&flags != flags {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _, ok := hasRoutableIP(network, &ifi); !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return &ifi, nil
|
||||||
|
}
|
||||||
|
return nil, errNoAvailableInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
func hasRoutableIP(network string, ifi *net.Interface) (net.IP, bool) {
|
||||||
|
ifat, err := ifi.Addrs()
|
||||||
|
if err != nil {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
for _, ifa := range ifat {
|
||||||
|
switch ifa := ifa.(type) {
|
||||||
|
case *net.IPAddr:
|
||||||
|
if ip, ok := routableIP(network, ifa.IP); ok {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
case *net.IPNet:
|
||||||
|
if ip, ok := routableIP(network, ifa.IP); ok {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
func routableIP(network string, ip net.IP) (net.IP, bool) {
|
||||||
|
if !ip.IsLoopback() && !ip.IsLinkLocalUnicast() && !ip.IsGlobalUnicast() {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
switch network {
|
||||||
|
case "ip4":
|
||||||
|
if ip := ip.To4(); ip != nil {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
case "ip6":
|
||||||
|
if ip.IsLoopback() { // addressing scope of the loopback address depends on each implementation
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
if ip := ip.To16(); ip != nil && ip.To4() == nil {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
if ip := ip.To4(); ip != nil {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
if ip := ip.To16(); ip != nil {
|
||||||
|
return ip, true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil, false
|
||||||
|
}
|
|
@ -0,0 +1,11 @@
|
||||||
|
// Copyright 2019 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build !aix && !darwin && !dragonfly && !freebsd && !linux && !netbsd && !openbsd && !solaris && !windows && !zos
|
||||||
|
|
||||||
|
package nettest
|
||||||
|
|
||||||
|
func supportsRawSocket() bool {
|
||||||
|
return false
|
||||||
|
}
|
|
@ -0,0 +1,21 @@
|
||||||
|
// Copyright 2019 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris || zos
|
||||||
|
|
||||||
|
package nettest
|
||||||
|
|
||||||
|
import "syscall"
|
||||||
|
|
||||||
|
func supportsRawSocket() bool {
|
||||||
|
for _, af := range []int{syscall.AF_INET, syscall.AF_INET6} {
|
||||||
|
s, err := syscall.Socket(af, syscall.SOCK_RAW, 0)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
syscall.Close(s)
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
|
@ -0,0 +1,26 @@
|
||||||
|
// Copyright 2019 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package nettest
|
||||||
|
|
||||||
|
import "syscall"
|
||||||
|
|
||||||
|
func supportsRawSocket() bool {
|
||||||
|
// From http://msdn.microsoft.com/en-us/library/windows/desktop/ms740548.aspx:
|
||||||
|
// Note: To use a socket of type SOCK_RAW requires administrative privileges.
|
||||||
|
// Users running Winsock applications that use raw sockets must be a member of
|
||||||
|
// the Administrators group on the local computer, otherwise raw socket calls
|
||||||
|
// will fail with an error code of WSAEACCES. On Windows Vista and later, access
|
||||||
|
// for raw sockets is enforced at socket creation. In earlier versions of Windows,
|
||||||
|
// access for raw sockets is enforced during other socket operations.
|
||||||
|
for _, af := range []int{syscall.AF_INET, syscall.AF_INET6} {
|
||||||
|
s, err := syscall.Socket(af, syscall.SOCK_RAW, 0)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
syscall.Closesocket(s)
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
|
@ -349,6 +349,7 @@ golang.org/x/net/internal/socks
|
||||||
golang.org/x/net/internal/timeseries
|
golang.org/x/net/internal/timeseries
|
||||||
golang.org/x/net/ipv4
|
golang.org/x/net/ipv4
|
||||||
golang.org/x/net/ipv6
|
golang.org/x/net/ipv6
|
||||||
|
golang.org/x/net/nettest
|
||||||
golang.org/x/net/proxy
|
golang.org/x/net/proxy
|
||||||
golang.org/x/net/trace
|
golang.org/x/net/trace
|
||||||
golang.org/x/net/websocket
|
golang.org/x/net/websocket
|
||||||
|
|
Loading…
Reference in New Issue