Compare commits
2 Commits
main
...
andrew/lin
Author | SHA1 | Date |
---|---|---|
![]() |
d067c7cf41 | |
![]() |
91d28e7155 |
|
@ -112,6 +112,7 @@ type linuxRouter struct {
|
|||
v6Available bool
|
||||
v6NATAvailable bool
|
||||
fwmaskWorks bool // whether we can use 'ip rule...fwmark <mark>/<mask>'
|
||||
hasV4Prefix bool // false when 'DisableIPv4' is set on the tailnet
|
||||
|
||||
// ipPolicyPrefBase is the base priority at which ip rules are installed.
|
||||
ipPolicyPrefBase int
|
||||
|
@ -376,7 +377,7 @@ func (r *linuxRouter) Up() error {
|
|||
if err := r.addIPRules(); err != nil {
|
||||
return fmt.Errorf("adding IP rules: %w", err)
|
||||
}
|
||||
if err := r.setNetfilterMode(netfilterOff); err != nil {
|
||||
if err := r.setNetfilterMode(netfilterOff, true); err != nil {
|
||||
return fmt.Errorf("setting netfilter mode: %w", err)
|
||||
}
|
||||
if err := r.upInterface(); err != nil {
|
||||
|
@ -397,7 +398,7 @@ func (r *linuxRouter) Close() error {
|
|||
if err := r.delIPRules(); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := r.setNetfilterMode(netfilterOff); err != nil {
|
||||
if err := r.setNetfilterMode(netfilterOff, true); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := r.delRoutes(); err != nil {
|
||||
|
@ -418,7 +419,38 @@ func (r *linuxRouter) Set(cfg *Config) error {
|
|||
cfg = &shutdownConfig
|
||||
}
|
||||
|
||||
if err := r.setNetfilterMode(cfg.NetfilterMode); err != nil {
|
||||
// Because the tailnet may have IPv4 disabled, check if we have any v4
|
||||
// prefixes from addresses, routes, or local routes.
|
||||
var foundV4 bool
|
||||
findV4 := func(arr []netip.Prefix) {
|
||||
// Skip useless loop if we've already found a v4 prefix
|
||||
if foundV4 {
|
||||
return
|
||||
}
|
||||
for _, pref := range arr {
|
||||
if pref.Addr().Is4() {
|
||||
foundV4 = true
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
findV4(cfg.LocalAddrs)
|
||||
findV4(cfg.Routes)
|
||||
findV4(cfg.LocalRoutes)
|
||||
findV4(cfg.SubnetRoutes)
|
||||
|
||||
if !foundV4 && !r.v6Available {
|
||||
return fmt.Errorf("No IPv4 routes and IPv6 isn't available")
|
||||
}
|
||||
|
||||
// Update our "have IPv4" setting after we're done with this function;
|
||||
// we can't do this earlier because both 'setNetfilterMode' and the
|
||||
// SNAT rules need to know what the previous value was.
|
||||
defer func() {
|
||||
r.hasV4Prefix = foundV4
|
||||
}()
|
||||
|
||||
if err := r.setNetfilterMode(cfg.NetfilterMode, foundV4); err != nil {
|
||||
errs = append(errs, err)
|
||||
}
|
||||
|
||||
|
@ -444,7 +476,7 @@ func (r *linuxRouter) Set(cfg *Config) error {
|
|||
case cfg.SNATSubnetRoutes == r.snatSubnetRoutes:
|
||||
// state already correct, nothing to do.
|
||||
case cfg.SNATSubnetRoutes:
|
||||
if err := r.addSNATRule(); err != nil {
|
||||
if err := r.addSNATRule(foundV4); err != nil {
|
||||
errs = append(errs, err)
|
||||
}
|
||||
default:
|
||||
|
@ -461,14 +493,27 @@ func (r *linuxRouter) Set(cfg *Config) error {
|
|||
// mode. Netfilter state is created or deleted appropriately to
|
||||
// reflect the new mode, and r.snatSubnetRoutes is updated to reflect
|
||||
// the current state of subnet SNATing.
|
||||
func (r *linuxRouter) setNetfilterMode(mode preftype.NetfilterMode) error {
|
||||
func (r *linuxRouter) setNetfilterMode(mode preftype.NetfilterMode, foundV4 bool) error {
|
||||
if distro.Get() == distro.Synology {
|
||||
mode = netfilterOff
|
||||
}
|
||||
if r.netfilterMode == mode {
|
||||
if r.netfilterMode == mode && r.hasV4Prefix == foundV4 {
|
||||
return nil
|
||||
}
|
||||
|
||||
// In the (unlikely) case where we change whether or not we install
|
||||
// IPv4 rules, recreate everything rather than complicating our diff
|
||||
// logic. This should only happen if the user changes the tailnet-wide
|
||||
// "DisableIPv4" setting.
|
||||
if r.hasV4Prefix != foundV4 {
|
||||
// Turn off netfilter (recursively) to force the code below to
|
||||
// recreate things in the "correct" mode.
|
||||
// TODO(andrew): this is a bit janky; think about this before merging
|
||||
if err := r.setNetfilterMode(netfilterOff, r.hasV4Prefix); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
// Depending on the netfilter mode we switch from and to, we may
|
||||
// have created the Tailscale netfilter chains. If so, we have to
|
||||
// go back through existing router state, and add the netfilter
|
||||
|
@ -1478,14 +1523,16 @@ func (r *linuxRouter) delNetfilterHooks() error {
|
|||
|
||||
// addSNATRule adds a netfilter rule to SNAT traffic destined for
|
||||
// local subnets.
|
||||
func (r *linuxRouter) addSNATRule() error {
|
||||
func (r *linuxRouter) addSNATRule(foundV4 bool) error {
|
||||
if r.netfilterMode == netfilterOff {
|
||||
return nil
|
||||
}
|
||||
|
||||
args := []string{"-m", "mark", "--mark", tailscaleSubnetRouteMark + "/" + tailscaleFwmarkMask, "-j", "MASQUERADE"}
|
||||
if err := r.ipt4.Append("nat", "ts-postrouting", args...); err != nil {
|
||||
return fmt.Errorf("adding %v in v4/nat/ts-postrouting: %w", args, err)
|
||||
if foundV4 {
|
||||
if err := r.ipt4.Append("nat", "ts-postrouting", args...); err != nil {
|
||||
return fmt.Errorf("adding %v in v4/nat/ts-postrouting: %w", args, err)
|
||||
}
|
||||
}
|
||||
if r.v6NATAvailable {
|
||||
if err := r.ipt6.Append("nat", "ts-postrouting", args...); err != nil {
|
||||
|
@ -1503,8 +1550,10 @@ func (r *linuxRouter) delSNATRule() error {
|
|||
}
|
||||
|
||||
args := []string{"-m", "mark", "--mark", tailscaleSubnetRouteMark + "/" + tailscaleFwmarkMask, "-j", "MASQUERADE"}
|
||||
if err := r.ipt4.Delete("nat", "ts-postrouting", args...); err != nil {
|
||||
return fmt.Errorf("deleting %v in v4/nat/ts-postrouting: %w", args, err)
|
||||
if r.hasV4Prefix {
|
||||
if err := r.ipt4.Delete("nat", "ts-postrouting", args...); err != nil {
|
||||
return fmt.Errorf("deleting %v in v4/nat/ts-postrouting: %w", args, err)
|
||||
}
|
||||
}
|
||||
if r.v6NATAvailable {
|
||||
if err := r.ipt6.Delete("nat", "ts-postrouting", args...); err != nil {
|
||||
|
|
Loading…
Reference in New Issue