mirror of
https://github.com/EasyTier/EasyTier.git
synced 2026-05-06 17:59:11 +00:00
fb59f01058
* reconcile infra configs on webhook validate * make disable_p2p more intelligent * fix stats
295 lines
8.7 KiB
Rust
295 lines
8.7 KiB
Rust
use std::{
|
|
net::{SocketAddr, SocketAddrV4, SocketAddrV6},
|
|
sync::Arc,
|
|
};
|
|
|
|
use crate::{
|
|
common::{error::Error, global_ctx::ArcGlobalCtx, idn, network::IPCollector},
|
|
connector::dns_connector::DnsTunnelConnector,
|
|
proto::common::PeerFeatureFlag,
|
|
tunnel::{
|
|
self, ring::RingTunnelConnector, tcp::TcpTunnelConnector, udp::UdpTunnelConnector, FromUrl,
|
|
IpScheme, IpVersion, TunnelConnector, TunnelError, TunnelScheme,
|
|
},
|
|
utils::BoxExt,
|
|
};
|
|
use http_connector::HttpTunnelConnector;
|
|
|
|
pub mod direct;
|
|
pub mod manual;
|
|
pub mod tcp_hole_punch;
|
|
pub mod udp_hole_punch;
|
|
|
|
pub mod dns_connector;
|
|
pub mod http_connector;
|
|
|
|
pub(crate) fn should_try_p2p_with_peer(
|
|
feature_flag: Option<&PeerFeatureFlag>,
|
|
allow_public_server: bool,
|
|
local_disable_p2p: bool,
|
|
local_need_p2p: bool,
|
|
) -> bool {
|
|
feature_flag
|
|
.map(|flag| {
|
|
(allow_public_server || !flag.is_public_server)
|
|
&& (!local_disable_p2p || flag.need_p2p)
|
|
&& (!flag.disable_p2p || local_need_p2p)
|
|
})
|
|
.unwrap_or(!local_disable_p2p)
|
|
}
|
|
|
|
pub(crate) fn should_background_p2p_with_peer(
|
|
feature_flag: Option<&PeerFeatureFlag>,
|
|
allow_public_server: bool,
|
|
lazy_p2p: bool,
|
|
local_disable_p2p: bool,
|
|
local_need_p2p: bool,
|
|
) -> bool {
|
|
should_try_p2p_with_peer(
|
|
feature_flag,
|
|
allow_public_server,
|
|
local_disable_p2p,
|
|
local_need_p2p,
|
|
) && (!lazy_p2p || feature_flag.map(|flag| flag.need_p2p).unwrap_or(false))
|
|
}
|
|
|
|
async fn set_bind_addr_for_peer_connector(
|
|
connector: &mut (impl TunnelConnector + ?Sized),
|
|
is_ipv4: bool,
|
|
ip_collector: &Arc<IPCollector>,
|
|
) {
|
|
if cfg!(any(
|
|
target_os = "android",
|
|
any(
|
|
target_os = "ios",
|
|
all(target_os = "macos", feature = "macos-ne")
|
|
),
|
|
target_env = "ohos"
|
|
)) {
|
|
return;
|
|
}
|
|
|
|
let ips = ip_collector.collect_ip_addrs().await;
|
|
if is_ipv4 {
|
|
let mut bind_addrs = vec![];
|
|
for ipv4 in ips.interface_ipv4s {
|
|
let socket_addr = SocketAddrV4::new(ipv4.into(), 0).into();
|
|
bind_addrs.push(socket_addr);
|
|
}
|
|
connector.set_bind_addrs(bind_addrs);
|
|
} else {
|
|
let mut bind_addrs = vec![];
|
|
for ipv6 in ips.interface_ipv6s.iter().chain(ips.public_ipv6.iter()) {
|
|
let socket_addr = SocketAddrV6::new(std::net::Ipv6Addr::from(*ipv6), 0, 0, 0).into();
|
|
bind_addrs.push(socket_addr);
|
|
}
|
|
connector.set_bind_addrs(bind_addrs);
|
|
}
|
|
let _ = connector;
|
|
}
|
|
|
|
pub async fn create_connector_by_url(
|
|
url: &str,
|
|
global_ctx: &ArcGlobalCtx,
|
|
ip_version: IpVersion,
|
|
) -> Result<Box<dyn TunnelConnector + 'static>, Error> {
|
|
let url = url::Url::parse(url).map_err(|_| Error::InvalidUrl(url.to_owned()))?;
|
|
let url = idn::convert_idn_to_ascii(url)?;
|
|
let scheme = (&url)
|
|
.try_into()
|
|
.map_err(|_| TunnelError::InvalidProtocol(url.scheme().to_owned()))?;
|
|
let mut connector: Box<dyn TunnelConnector + 'static> = match scheme {
|
|
TunnelScheme::Ip(scheme) => {
|
|
let dst_addr = SocketAddr::from_url(url.clone(), ip_version).await?;
|
|
let mut connector: Box<dyn TunnelConnector> = match scheme {
|
|
IpScheme::Tcp => TcpTunnelConnector::new(url).boxed(),
|
|
IpScheme::Udp => UdpTunnelConnector::new(url).boxed(),
|
|
#[cfg(feature = "quic")]
|
|
IpScheme::Quic => tunnel::quic::QuicTunnelConnector::new(url).boxed(),
|
|
#[cfg(feature = "wireguard")]
|
|
IpScheme::Wg => {
|
|
use crate::tunnel::wireguard::{WgConfig, WgTunnelConnector};
|
|
let nid = global_ctx.get_network_identity();
|
|
let wg_config = WgConfig::new_from_network_identity(
|
|
&nid.network_name,
|
|
&nid.network_secret.unwrap_or_default(),
|
|
);
|
|
WgTunnelConnector::new(url, wg_config).boxed()
|
|
}
|
|
#[cfg(feature = "websocket")]
|
|
IpScheme::Ws | IpScheme::Wss => {
|
|
tunnel::websocket::WsTunnelConnector::new(url).boxed()
|
|
}
|
|
#[cfg(feature = "faketcp")]
|
|
IpScheme::FakeTcp => tunnel::fake_tcp::FakeTcpTunnelConnector::new(url).boxed(),
|
|
};
|
|
if global_ctx.config.get_flags().bind_device {
|
|
set_bind_addr_for_peer_connector(
|
|
&mut connector,
|
|
dst_addr.is_ipv4(),
|
|
&global_ctx.get_ip_collector(),
|
|
)
|
|
.await;
|
|
}
|
|
connector
|
|
}
|
|
#[cfg(unix)]
|
|
TunnelScheme::Unix => tunnel::unix::UnixSocketTunnelConnector::new(url).boxed(),
|
|
TunnelScheme::Http | TunnelScheme::Https => {
|
|
HttpTunnelConnector::new(url, global_ctx.clone()).boxed()
|
|
}
|
|
TunnelScheme::Ring => RingTunnelConnector::new(url).boxed(),
|
|
TunnelScheme::Txt | TunnelScheme::Srv => {
|
|
if url.host_str().is_none() {
|
|
return Err(Error::InvalidUrl(format!(
|
|
"host should not be empty in txt or srv url: {}",
|
|
url
|
|
)));
|
|
}
|
|
DnsTunnelConnector::new(url, global_ctx.clone()).boxed()
|
|
}
|
|
};
|
|
connector.set_ip_version(ip_version);
|
|
|
|
Ok(connector)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use crate::proto::common::PeerFeatureFlag;
|
|
|
|
use super::{should_background_p2p_with_peer, should_try_p2p_with_peer};
|
|
|
|
#[test]
|
|
fn lazy_background_p2p_requires_need_p2p() {
|
|
let no_need_p2p = PeerFeatureFlag {
|
|
need_p2p: false,
|
|
..Default::default()
|
|
};
|
|
let need_p2p = PeerFeatureFlag {
|
|
need_p2p: true,
|
|
..Default::default()
|
|
};
|
|
|
|
assert!(should_background_p2p_with_peer(
|
|
Some(&no_need_p2p),
|
|
false,
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
assert!(!should_background_p2p_with_peer(
|
|
Some(&no_need_p2p),
|
|
false,
|
|
true,
|
|
false,
|
|
false
|
|
));
|
|
assert!(should_background_p2p_with_peer(
|
|
Some(&need_p2p),
|
|
false,
|
|
true,
|
|
false,
|
|
false
|
|
));
|
|
}
|
|
|
|
#[test]
|
|
fn p2p_policy_respects_public_server_setting() {
|
|
let public_server = PeerFeatureFlag {
|
|
is_public_server: true,
|
|
..Default::default()
|
|
};
|
|
|
|
assert!(!should_try_p2p_with_peer(
|
|
Some(&public_server),
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
assert!(should_try_p2p_with_peer(
|
|
Some(&public_server),
|
|
true,
|
|
false,
|
|
false
|
|
));
|
|
assert!(!should_background_p2p_with_peer(
|
|
Some(&public_server),
|
|
false,
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
assert!(should_background_p2p_with_peer(
|
|
Some(&public_server),
|
|
true,
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
}
|
|
|
|
#[test]
|
|
fn disable_p2p_only_allows_need_p2p_exceptions() {
|
|
let normal_peer = PeerFeatureFlag::default();
|
|
let need_peer = PeerFeatureFlag {
|
|
need_p2p: true,
|
|
..Default::default()
|
|
};
|
|
let disable_peer = PeerFeatureFlag {
|
|
disable_p2p: true,
|
|
..Default::default()
|
|
};
|
|
let disable_need_peer = PeerFeatureFlag {
|
|
disable_p2p: true,
|
|
need_p2p: true,
|
|
..Default::default()
|
|
};
|
|
|
|
assert!(should_try_p2p_with_peer(
|
|
Some(&normal_peer),
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
assert!(should_try_p2p_with_peer(None, false, false, false));
|
|
assert!(!should_try_p2p_with_peer(None, false, true, false));
|
|
assert!(!should_try_p2p_with_peer(
|
|
Some(&normal_peer),
|
|
false,
|
|
true,
|
|
false
|
|
));
|
|
assert!(should_try_p2p_with_peer(
|
|
Some(&need_peer),
|
|
false,
|
|
true,
|
|
false
|
|
));
|
|
assert!(!should_try_p2p_with_peer(
|
|
Some(&disable_peer),
|
|
false,
|
|
false,
|
|
false
|
|
));
|
|
assert!(should_try_p2p_with_peer(
|
|
Some(&disable_peer),
|
|
false,
|
|
false,
|
|
true
|
|
));
|
|
assert!(should_try_p2p_with_peer(
|
|
Some(&disable_need_peer),
|
|
false,
|
|
true,
|
|
true
|
|
));
|
|
assert!(!should_try_p2p_with_peer(
|
|
Some(&disable_need_peer),
|
|
false,
|
|
true,
|
|
false
|
|
));
|
|
}
|
|
}
|