mirror of
https://github.com/Control-D-Inc/ctrld.git
synced 2026-02-03 22:18:39 +00:00
An interface may have multiple MAC addresses, that leads to the problem when looking up hostname for its multiple <ip, mac> pairs, because the "ip" map, which storing "mac => ip" mapping can only store 1 entry. It ends up returns an empty hostname for a known MAC address. Fixing this by filling empty hostname based on clients which is already listed, ensuring all clients with the same MAC address will have the same hostname information.
501 lines
13 KiB
Go
501 lines
13 KiB
Go
package clientinfo
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
"net/netip"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/Control-D-Inc/ctrld"
|
|
"github.com/Control-D-Inc/ctrld/internal/controld"
|
|
)
|
|
|
|
// IpResolver is the interface for retrieving IP from Mac.
|
|
type IpResolver interface {
|
|
fmt.Stringer
|
|
// LookupIP returns ip of the device with given mac.
|
|
LookupIP(mac string) string
|
|
}
|
|
|
|
// MacResolver is the interface for retrieving Mac from IP.
|
|
type MacResolver interface {
|
|
fmt.Stringer
|
|
// LookupMac returns mac of the device with given ip.
|
|
LookupMac(ip string) string
|
|
}
|
|
|
|
// HostnameByIpResolver is the interface for retrieving hostname from IP.
|
|
type HostnameByIpResolver interface {
|
|
// LookupHostnameByIP returns hostname of the given ip.
|
|
LookupHostnameByIP(ip string) string
|
|
}
|
|
|
|
// HostnameByMacResolver is the interface for retrieving hostname from Mac.
|
|
type HostnameByMacResolver interface {
|
|
// LookupHostnameByMac returns hostname of the device with given mac.
|
|
LookupHostnameByMac(mac string) string
|
|
}
|
|
|
|
// HostnameResolver is the interface for retrieving hostname from either IP or Mac.
|
|
type HostnameResolver interface {
|
|
fmt.Stringer
|
|
HostnameByIpResolver
|
|
HostnameByMacResolver
|
|
}
|
|
|
|
type refresher interface {
|
|
refresh() error
|
|
}
|
|
|
|
type ipLister interface {
|
|
fmt.Stringer
|
|
// List returns list of ip known by the resolver.
|
|
List() []string
|
|
}
|
|
|
|
type Client struct {
|
|
IP netip.Addr
|
|
Mac string
|
|
Hostname string
|
|
Source map[string]struct{}
|
|
QueryCount int64
|
|
IncludeQueryCount bool
|
|
}
|
|
|
|
type Table struct {
|
|
ipResolvers []IpResolver
|
|
macResolvers []MacResolver
|
|
hostnameResolvers []HostnameResolver
|
|
refreshers []refresher
|
|
initOnce sync.Once
|
|
refreshInterval int
|
|
|
|
dhcp *dhcp
|
|
merlin *merlinDiscover
|
|
ubios *ubiosDiscover
|
|
arp *arpDiscover
|
|
ndp *ndpDiscover
|
|
ptr *ptrDiscover
|
|
mdns *mdns
|
|
hf *hostsFile
|
|
vni *virtualNetworkIface
|
|
svcCfg ctrld.ServiceConfig
|
|
quitCh chan struct{}
|
|
selfIP string
|
|
cdUID string
|
|
ptrNameservers []string
|
|
}
|
|
|
|
func NewTable(cfg *ctrld.Config, selfIP, cdUID string, ns []string) *Table {
|
|
refreshInterval := cfg.Service.DiscoverRefreshInterval
|
|
if refreshInterval <= 0 {
|
|
refreshInterval = 2 * 60 // 2 minutes
|
|
}
|
|
return &Table{
|
|
svcCfg: cfg.Service,
|
|
quitCh: make(chan struct{}),
|
|
selfIP: selfIP,
|
|
cdUID: cdUID,
|
|
ptrNameservers: ns,
|
|
refreshInterval: refreshInterval,
|
|
}
|
|
}
|
|
|
|
func (t *Table) AddLeaseFile(name string, format ctrld.LeaseFileFormat) {
|
|
if !t.discoverDHCP() {
|
|
return
|
|
}
|
|
clientInfoFiles[name] = format
|
|
}
|
|
|
|
// RefreshLoop runs all the refresher to update new client info data.
|
|
func (t *Table) RefreshLoop(ctx context.Context) {
|
|
timer := time.NewTicker(time.Second * time.Duration(t.refreshInterval))
|
|
defer timer.Stop()
|
|
for {
|
|
select {
|
|
case <-timer.C:
|
|
for _, r := range t.refreshers {
|
|
_ = r.refresh()
|
|
}
|
|
case <-ctx.Done():
|
|
close(t.quitCh)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (t *Table) Init() {
|
|
t.initOnce.Do(t.init)
|
|
}
|
|
|
|
func (t *Table) init() {
|
|
// Custom client ID presents, use it as the only source.
|
|
if _, clientID := controld.ParseRawUID(t.cdUID); clientID != "" {
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start self discovery")
|
|
t.dhcp = &dhcp{selfIP: t.selfIP}
|
|
t.dhcp.addSelf()
|
|
t.ipResolvers = append(t.ipResolvers, t.dhcp)
|
|
t.macResolvers = append(t.macResolvers, t.dhcp)
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.dhcp)
|
|
return
|
|
}
|
|
|
|
// Otherwise, process all possible sources in order, that means
|
|
// the first result of IP/MAC/Hostname lookup will be used.
|
|
//
|
|
// Routers custom clients:
|
|
// - Merlin
|
|
// - Ubios
|
|
if t.discoverDHCP() || t.discoverARP() {
|
|
t.merlin = &merlinDiscover{}
|
|
t.ubios = &ubiosDiscover{}
|
|
discovers := map[string]interface {
|
|
refresher
|
|
HostnameResolver
|
|
}{
|
|
"Merlin": t.merlin,
|
|
"Ubios": t.ubios,
|
|
}
|
|
for platform, discover := range discovers {
|
|
if err := discover.refresh(); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msgf("could not init %s discover", platform)
|
|
} else {
|
|
t.hostnameResolvers = append(t.hostnameResolvers, discover)
|
|
t.refreshers = append(t.refreshers, discover)
|
|
}
|
|
}
|
|
}
|
|
// Hosts file mapping.
|
|
if t.discoverHosts() {
|
|
t.hf = &hostsFile{}
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start hosts file discovery")
|
|
if err := t.hf.init(); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msg("could not init hosts file discover")
|
|
} else {
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.hf)
|
|
t.refreshers = append(t.refreshers, t.hf)
|
|
}
|
|
go t.hf.watchChanges()
|
|
}
|
|
// DHCP lease files.
|
|
if t.discoverDHCP() {
|
|
t.dhcp = &dhcp{selfIP: t.selfIP}
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start dhcp discovery")
|
|
if err := t.dhcp.init(); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msg("could not init DHCP discover")
|
|
} else {
|
|
t.ipResolvers = append(t.ipResolvers, t.dhcp)
|
|
t.macResolvers = append(t.macResolvers, t.dhcp)
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.dhcp)
|
|
}
|
|
go t.dhcp.watchChanges()
|
|
}
|
|
// ARP/NDP table.
|
|
if t.discoverARP() {
|
|
t.arp = &arpDiscover{}
|
|
t.ndp = &ndpDiscover{}
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start arp discovery")
|
|
discovers := map[string]interface {
|
|
refresher
|
|
IpResolver
|
|
MacResolver
|
|
}{
|
|
"ARP": t.arp,
|
|
"NDP": t.ndp,
|
|
}
|
|
|
|
for protocol, discover := range discovers {
|
|
if err := discover.refresh(); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msgf("could not init %s discover", protocol)
|
|
} else {
|
|
t.ipResolvers = append(t.ipResolvers, discover)
|
|
t.macResolvers = append(t.macResolvers, discover)
|
|
t.refreshers = append(t.refreshers, discover)
|
|
}
|
|
}
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
go func() {
|
|
<-t.quitCh
|
|
cancel()
|
|
}()
|
|
go t.ndp.listen(ctx)
|
|
}
|
|
// PTR lookup.
|
|
if t.discoverPTR() {
|
|
t.ptr = &ptrDiscover{resolver: ctrld.NewPrivateResolver()}
|
|
if len(t.ptrNameservers) > 0 {
|
|
nss := make([]string, 0, len(t.ptrNameservers))
|
|
for _, ns := range t.ptrNameservers {
|
|
host, port := ns, "53"
|
|
if h, p, err := net.SplitHostPort(ns); err == nil {
|
|
host, port = h, p
|
|
}
|
|
// Only use valid ip:port pair.
|
|
if _, portErr := strconv.Atoi(port); portErr == nil && port != "0" && net.ParseIP(host) != nil {
|
|
nss = append(nss, net.JoinHostPort(host, port))
|
|
} else {
|
|
ctrld.ProxyLogger.Load().Warn().Msgf("ignoring invalid nameserver for ptr discover: %q", ns)
|
|
}
|
|
}
|
|
if len(nss) > 0 {
|
|
t.ptr.resolver = ctrld.NewResolverWithNameserver(nss)
|
|
ctrld.ProxyLogger.Load().Debug().Msgf("using nameservers %v for ptr discovery", nss)
|
|
}
|
|
|
|
}
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start ptr discovery")
|
|
if err := t.ptr.refresh(); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msg("could not init PTR discover")
|
|
} else {
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.ptr)
|
|
t.refreshers = append(t.refreshers, t.ptr)
|
|
}
|
|
}
|
|
// mdns.
|
|
if t.discoverMDNS() {
|
|
t.mdns = &mdns{}
|
|
ctrld.ProxyLogger.Load().Debug().Msg("start mdns discovery")
|
|
if err := t.mdns.init(t.quitCh); err != nil {
|
|
ctrld.ProxyLogger.Load().Error().Err(err).Msg("could not init mDNS discover")
|
|
} else {
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.mdns)
|
|
}
|
|
}
|
|
// VPN clients.
|
|
if t.discoverDHCP() || t.discoverARP() {
|
|
t.vni = &virtualNetworkIface{}
|
|
t.hostnameResolvers = append(t.hostnameResolvers, t.vni)
|
|
}
|
|
}
|
|
|
|
func (t *Table) LookupIP(mac string) string {
|
|
t.initOnce.Do(t.init)
|
|
for _, r := range t.ipResolvers {
|
|
if ip := r.LookupIP(mac); ip != "" {
|
|
return ip
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (t *Table) LookupMac(ip string) string {
|
|
t.initOnce.Do(t.init)
|
|
for _, r := range t.macResolvers {
|
|
if mac := r.LookupMac(ip); mac != "" {
|
|
return mac
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (t *Table) LookupHostname(ip, mac string) string {
|
|
t.initOnce.Do(t.init)
|
|
for _, r := range t.hostnameResolvers {
|
|
if name := r.LookupHostnameByIP(ip); name != "" {
|
|
return name
|
|
}
|
|
if name := r.LookupHostnameByMac(mac); name != "" {
|
|
return name
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// LookupRFC1918IPv4 returns the RFC1918 IPv4 address for the given MAC address, if any.
|
|
func (t *Table) LookupRFC1918IPv4(mac string) string {
|
|
t.initOnce.Do(t.init)
|
|
for _, r := range t.ipResolvers {
|
|
ip, err := netip.ParseAddr(r.LookupIP(mac))
|
|
if err != nil || ip.Is6() {
|
|
continue
|
|
}
|
|
if ip.IsPrivate() {
|
|
return ip.String()
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
type macEntry struct {
|
|
mac string
|
|
src string
|
|
}
|
|
|
|
type hostnameEntry struct {
|
|
name string
|
|
src string
|
|
}
|
|
|
|
func (t *Table) lookupMacAll(ip string) []*macEntry {
|
|
var res []*macEntry
|
|
for _, r := range t.macResolvers {
|
|
res = append(res, &macEntry{mac: r.LookupMac(ip), src: r.String()})
|
|
}
|
|
return res
|
|
}
|
|
|
|
func (t *Table) lookupHostnameAll(ip, mac string) []*hostnameEntry {
|
|
var res []*hostnameEntry
|
|
for _, r := range t.hostnameResolvers {
|
|
src := r.String()
|
|
// For ptrDiscover, lookup hostname may block due to server unavailable,
|
|
// so only lookup from cache to prevent timeout reached.
|
|
if ptrResolver, ok := r.(*ptrDiscover); ok {
|
|
if name := ptrResolver.lookupHostnameFromCache(ip); name != "" {
|
|
res = append(res, &hostnameEntry{name: name, src: src})
|
|
}
|
|
continue
|
|
}
|
|
if name := r.LookupHostnameByIP(ip); name != "" {
|
|
res = append(res, &hostnameEntry{name: name, src: src})
|
|
continue
|
|
}
|
|
if name := r.LookupHostnameByMac(mac); name != "" {
|
|
res = append(res, &hostnameEntry{name: name, src: src})
|
|
continue
|
|
}
|
|
}
|
|
return res
|
|
}
|
|
|
|
// ListClients returns list of clients discovered by ctrld.
|
|
func (t *Table) ListClients() []*Client {
|
|
for _, r := range t.refreshers {
|
|
_ = r.refresh()
|
|
}
|
|
ipMap := make(map[string]*Client)
|
|
il := []ipLister{t.dhcp, t.arp, t.ndp, t.ptr, t.mdns, t.vni}
|
|
for _, ir := range il {
|
|
for _, ip := range ir.List() {
|
|
c, ok := ipMap[ip]
|
|
if !ok {
|
|
c = &Client{
|
|
IP: netip.MustParseAddr(ip),
|
|
Source: map[string]struct{}{ir.String(): {}},
|
|
}
|
|
ipMap[ip] = c
|
|
} else {
|
|
c.Source[ir.String()] = struct{}{}
|
|
}
|
|
}
|
|
}
|
|
clientsByMAC := make(map[string]*Client)
|
|
for ip := range ipMap {
|
|
c := ipMap[ip]
|
|
for _, e := range t.lookupMacAll(ip) {
|
|
if c.Mac == "" && e.mac != "" {
|
|
c.Mac = e.mac
|
|
}
|
|
if e.mac != "" {
|
|
c.Source[e.src] = struct{}{}
|
|
}
|
|
}
|
|
for _, e := range t.lookupHostnameAll(ip, c.Mac) {
|
|
if c.Hostname == "" && e.name != "" {
|
|
c.Hostname = e.name
|
|
clientsByMAC[c.Mac] = c
|
|
}
|
|
if e.name != "" {
|
|
c.Source[e.src] = struct{}{}
|
|
}
|
|
}
|
|
}
|
|
clients := make([]*Client, 0, len(ipMap))
|
|
for _, c := range ipMap {
|
|
// If we found a client with empty hostname, use hostname from
|
|
// an existed client which has the same MAC address.
|
|
if cFromMac := clientsByMAC[c.Mac]; cFromMac != nil && c.Hostname == "" {
|
|
c.Hostname = cFromMac.Hostname
|
|
}
|
|
clients = append(clients, c)
|
|
}
|
|
return clients
|
|
}
|
|
|
|
// StoreVPNClient stores client info for VPN clients.
|
|
func (t *Table) StoreVPNClient(ci *ctrld.ClientInfo) {
|
|
if ci == nil || t.vni == nil {
|
|
return
|
|
}
|
|
t.vni.mac.Store(ci.IP, ci.Mac)
|
|
t.vni.ip2name.Store(ci.IP, ci.Hostname)
|
|
}
|
|
|
|
// ipFinder is the interface for retrieving IP address from hostname.
|
|
type ipFinder interface {
|
|
lookupIPByHostname(name string, v6 bool) string
|
|
}
|
|
|
|
// LookupIPByHostname returns the ip address of given hostname.
|
|
// If v6 is true, return IPv6 instead of default IPv4.
|
|
func (t *Table) LookupIPByHostname(hostname string, v6 bool) *netip.Addr {
|
|
if t == nil {
|
|
return nil
|
|
}
|
|
for _, finder := range []ipFinder{t.hf, t.ptr, t.mdns, t.dhcp} {
|
|
if addr := finder.lookupIPByHostname(hostname, v6); addr != "" {
|
|
if ip, err := netip.ParseAddr(addr); err == nil {
|
|
return &ip
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (t *Table) discoverDHCP() bool {
|
|
if t.svcCfg.DiscoverDHCP == nil {
|
|
return true
|
|
}
|
|
return *t.svcCfg.DiscoverDHCP
|
|
}
|
|
|
|
func (t *Table) discoverARP() bool {
|
|
if t.svcCfg.DiscoverARP == nil {
|
|
return true
|
|
}
|
|
return *t.svcCfg.DiscoverARP
|
|
}
|
|
|
|
func (t *Table) discoverMDNS() bool {
|
|
if t.svcCfg.DiscoverMDNS == nil {
|
|
return true
|
|
}
|
|
return *t.svcCfg.DiscoverMDNS
|
|
}
|
|
|
|
func (t *Table) discoverPTR() bool {
|
|
if t.svcCfg.DiscoverPtr == nil {
|
|
return true
|
|
}
|
|
return *t.svcCfg.DiscoverPtr
|
|
}
|
|
|
|
func (t *Table) discoverHosts() bool {
|
|
if t.svcCfg.DiscoverHosts == nil {
|
|
return true
|
|
}
|
|
return *t.svcCfg.DiscoverHosts
|
|
}
|
|
|
|
// normalizeIP normalizes the ip parsed from dnsmasq/dhcpd lease file.
|
|
func normalizeIP(in string) string {
|
|
// dnsmasq may put ip with interface index in lease file, strip it here.
|
|
ip, _, found := strings.Cut(in, "%")
|
|
if found {
|
|
return ip
|
|
}
|
|
return in
|
|
}
|
|
|
|
func normalizeHostname(name string) string {
|
|
if before, _, found := strings.Cut(name, "."); found {
|
|
return before // remove ".local.", ".lan.", ... suffix
|
|
}
|
|
return name
|
|
}
|