tstest/natlab/vnet: move some boilerplate to mkPacket helper

No need to make callers specify the redundant IP version or
TTL/HopLimit or EthernetType in the common case. The mkPacket helper
can set those when unset.

And use the mkIPLayer in another place, simplifying some code.

And rename mkPacketErr to just mkPacket, then move mkPacket to
test-only code, as mustPacket.

Updates #13038

Change-Id: Ic216e44dda760c69ab9bfc509370040874a47d30
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
pull/13333/head
Brad Fitzpatrick 3 months ago committed by Brad Fitzpatrick
parent 7e88d6712e
commit 3d9e3a17fa

@ -245,12 +245,9 @@ func (n *network) handleIPPacketFromGvisor(ipRaw []byte) {
return return
} }
eth := &layers.Ethernet{ eth := &layers.Ethernet{
SrcMAC: n.mac.HWAddr(), SrcMAC: n.mac.HWAddr(),
DstMAC: node.mac.HWAddr(), DstMAC: node.mac.HWAddr(),
EthernetType: flow.etherType(),
} }
buffer := gopacket.NewSerializeBuffer()
options := gopacket.SerializeOptions{FixLengths: true, ComputeChecksums: true}
sls := []gopacket.SerializableLayer{ sls := []gopacket.SerializableLayer{
eth, eth,
} }
@ -259,21 +256,16 @@ func (n *network) handleIPPacketFromGvisor(ipRaw []byte) {
if !ok { if !ok {
log.Fatalf("layer %s is not serializable", layer.LayerType().String()) log.Fatalf("layer %s is not serializable", layer.LayerType().String())
} }
switch gl := layer.(type) {
case *layers.TCP:
gl.SetNetworkLayerForChecksum(goPkt.NetworkLayer())
case *layers.UDP:
gl.SetNetworkLayerForChecksum(goPkt.NetworkLayer())
}
sls = append(sls, sl) sls = append(sls, sl)
} }
if err := gopacket.SerializeLayers(buffer, options, sls...); err != nil { resPkt, err := mkPacket(sls...)
if err != nil {
n.logf("gvisor: serialize error: %v", err) n.logf("gvisor: serialize error: %v", err)
return return
} }
if nw, ok := n.writers.Load(node.mac); ok { if nw, ok := n.writers.Load(node.mac); ok {
nw.write(buffer.Bytes()) nw.write(resPkt)
} else { } else {
n.logf("gvisor write: no writeFunc for %v", node.mac) n.logf("gvisor write: no writeFunc for %v", node.mac)
} }
@ -1168,9 +1160,8 @@ func (n *network) WriteUDPPacketNoNAT(p UDPPacket) {
} }
eth := &layers.Ethernet{ eth := &layers.Ethernet{
SrcMAC: n.mac.HWAddr(), // of gateway SrcMAC: n.mac.HWAddr(), // of gateway
DstMAC: node.mac.HWAddr(), DstMAC: node.mac.HWAddr(),
EthernetType: p.etherType(),
} }
ethRaw, err := n.serializedUDPPacket(src, dst, p.Payload, eth) ethRaw, err := n.serializedUDPPacket(src, dst, p.Payload, eth)
if err != nil { if err != nil {
@ -1188,8 +1179,6 @@ type serializableNetworkLayer interface {
func mkIPLayer(proto layers.IPProtocol, src, dst netip.Addr) serializableNetworkLayer { func mkIPLayer(proto layers.IPProtocol, src, dst netip.Addr) serializableNetworkLayer {
if src.Is4() { if src.Is4() {
return &layers.IPv4{ return &layers.IPv4{
Version: 4,
TTL: 64,
Protocol: proto, Protocol: proto,
SrcIP: src.AsSlice(), SrcIP: src.AsSlice(),
DstIP: dst.AsSlice(), DstIP: dst.AsSlice(),
@ -1197,8 +1186,6 @@ func mkIPLayer(proto layers.IPProtocol, src, dst netip.Addr) serializableNetwork
} }
if src.Is6() { if src.Is6() {
return &layers.IPv6{ return &layers.IPv6{
Version: 6,
HopLimit: 64,
NextHeader: proto, NextHeader: proto,
SrcIP: src.AsSlice(), SrcIP: src.AsSlice(),
DstIP: dst.AsSlice(), DstIP: dst.AsSlice(),
@ -1219,9 +1206,9 @@ func (n *network) serializedUDPPacket(src, dst netip.AddrPort, payload []byte, e
DstPort: layers.UDPPort(dst.Port()), DstPort: layers.UDPPort(dst.Port()),
} }
if eth == nil { if eth == nil {
return mkPacketErr(ip, udp, gopacket.Payload(payload)) return mkPacket(ip, udp, gopacket.Payload(payload))
} else { } else {
return mkPacketErr(eth, ip, udp, gopacket.Payload(payload)) return mkPacket(eth, ip, udp, gopacket.Payload(payload))
} }
} }
@ -1404,9 +1391,8 @@ func (n *network) handleIPv6RouterSolicitation(ep EthernetPacket, rs *layers.ICM
} }
n.logf("sending IPv6 router advertisement to %v from %v", eth.DstMAC, eth.SrcMAC) n.logf("sending IPv6 router advertisement to %v from %v", eth.DstMAC, eth.SrcMAC)
ip := &layers.IPv6{ ip := &layers.IPv6{
Version: 6,
HopLimit: 255,
NextHeader: layers.IPProtocolICMPv6, NextHeader: layers.IPProtocolICMPv6,
HopLimit: 255, // per RFC 4861, 7.1.1 etc (all NDP messages); don't use mkPacket's default of 64
SrcIP: net.ParseIP("fe80::1"), SrcIP: net.ParseIP("fe80::1"),
DstIP: v6.SrcIP, DstIP: v6.SrcIP,
} }
@ -1431,7 +1417,7 @@ func (n *network) handleIPv6RouterSolicitation(ep EthernetPacket, rs *layers.ICM
}, },
}, },
} }
pkt, err := mkPacketErr(eth, ip, icmp, ra) pkt, err := mkPacket(eth, ip, icmp, ra)
if err != nil { if err != nil {
n.logf("serializing ICMPv6 RA: %v", err) n.logf("serializing ICMPv6 RA: %v", err)
return return
@ -1462,8 +1448,7 @@ func (n *network) handleIPv6NeighborSolicitation(ep EthernetPacket, ns *layers.I
EthernetType: layers.EthernetTypeIPv6, EthernetType: layers.EthernetTypeIPv6,
} }
ip := &layers.IPv6{ ip := &layers.IPv6{
Version: 6, HopLimit: 255, // per RFC 4861, 7.1.1 etc (all NDP messages); don't use mkPacket's default of 64
HopLimit: 255,
NextHeader: layers.IPProtocolICMPv6, NextHeader: layers.IPProtocolICMPv6,
SrcIP: ns.TargetAddress, SrcIP: ns.TargetAddress,
DstIP: v6.SrcIP, DstIP: v6.SrcIP,
@ -1485,7 +1470,7 @@ func (n *network) handleIPv6NeighborSolicitation(ep EthernetPacket, ns *layers.I
Type: layers.ICMPv6OptTargetAddress, Type: layers.ICMPv6OptTargetAddress,
Data: srcMAC.HWAddr(), Data: srcMAC.HWAddr(),
}) })
pkt, err := mkPacketErr(eth, ip, icmp, na) pkt, err := mkPacket(eth, ip, icmp, na)
if err != nil { if err != nil {
n.logf("serializing ICMPv6 NA: %v", err) n.logf("serializing ICMPv6 NA: %v", err)
} }
@ -1578,8 +1563,6 @@ func (s *Server) createDHCPResponse(request gopacket.Packet) ([]byte, error) {
EthernetType: layers.EthernetTypeIPv4, // never IPv6 for DHCP EthernetType: layers.EthernetTypeIPv4, // never IPv6 for DHCP
} }
ip := &layers.IPv4{ ip := &layers.IPv4{
Version: 4,
TTL: 64,
Protocol: layers.IPProtocolUDP, Protocol: layers.IPProtocolUDP,
SrcIP: ipLayer.DstIP, SrcIP: ipLayer.DstIP,
DstIP: ipLayer.SrcIP, DstIP: ipLayer.SrcIP,
@ -1588,7 +1571,7 @@ func (s *Server) createDHCPResponse(request gopacket.Packet) ([]byte, error) {
SrcPort: udpLayer.DstPort, SrcPort: udpLayer.DstPort,
DstPort: udpLayer.SrcPort, DstPort: udpLayer.SrcPort,
} }
return mkPacketErr(eth, ip, udp, response) return mkPacket(eth, ip, udp, response)
} }
// isDHCPRequest reports whether pkt is a DHCPv4 request. // isDHCPRequest reports whether pkt is a DHCPv4 request.
@ -1654,20 +1637,6 @@ type ipSrcDst struct {
dst netip.Addr dst netip.Addr
} }
func (f ipSrcDst) etherType() layers.EthernetType {
if f.dst.Is6() {
return layers.EthernetTypeIPv6
}
return layers.EthernetTypeIPv4
}
func (p UDPPacket) etherType() layers.EthernetType {
if p.Dst.Addr().Is6() {
return layers.EthernetTypeIPv6
}
return layers.EthernetTypeIPv4
}
func flow(gp gopacket.Packet) (f ipSrcDst, ok bool) { func flow(gp gopacket.Packet) (f ipSrcDst, ok bool) {
if gp == nil { if gp == nil {
return f, false return f, false
@ -1778,9 +1747,8 @@ func (s *Server) createDNSResponse(pkt gopacket.Packet) ([]byte, error) {
// Make reply layers, all reversed. // Make reply layers, all reversed.
eth2 := &layers.Ethernet{ eth2 := &layers.Ethernet{
SrcMAC: ethLayer.DstMAC, SrcMAC: ethLayer.DstMAC,
DstMAC: ethLayer.SrcMAC, DstMAC: ethLayer.SrcMAC,
EthernetType: flow.etherType(),
} }
ip2 := mkIPLayer(layers.IPProtocolUDP, flow.dst, flow.src) ip2 := mkIPLayer(layers.IPProtocolUDP, flow.dst, flow.src)
udp2 := &layers.UDP{ udp2 := &layers.UDP{
@ -1788,7 +1756,7 @@ func (s *Server) createDNSResponse(pkt gopacket.Packet) ([]byte, error) {
DstPort: udpLayer.SrcPort, DstPort: udpLayer.SrcPort,
} }
resPkt, err := mkPacketErr(eth2, ip2, udp2, response) resPkt, err := mkPacket(eth2, ip2, udp2, response)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -2180,18 +2148,48 @@ func (c *NodeAgentClient) EnableHostFirewall(ctx context.Context) error {
return nil return nil
} }
func mkPacket(layers ...gopacket.SerializableLayer) []byte { // mkPacket is a serializes a number of layers into a packet.
return must.Get(mkPacketErr(layers...)) //
} // It's a convenience wrapper around gopacket.SerializeLayers
// that does some things automatically:
func mkPacketErr(ll ...gopacket.SerializableLayer) ([]byte, error) { //
// * layers.Ethernet.EthernetType is set to IPv4 or IPv6 if not already set
// * layers.IPv4/IPv6 Version is set to 4/6 if not already set
// * layers.IPv4/IPv6 TTL/HopLimit is set to 64 if not already set
// * the TCP/UDP/ICMPv6 checksum is set based on the network layer
//
// The provided layers in ll must be sorted from lowest (e.g. *layers.Ethernet)
// to highest. (Depending on the need, the first layer will be either *layers.Ethernet
// or *layers.IPv4/IPv6).
func mkPacket(ll ...gopacket.SerializableLayer) ([]byte, error) {
var el *layers.Ethernet
var nl gopacket.NetworkLayer var nl gopacket.NetworkLayer
for _, la := range ll { for _, la := range ll {
switch la := la.(type) { switch la := la.(type) {
case *layers.IPv4: case *layers.IPv4:
nl = la nl = la
if el != nil && el.EthernetType == 0 {
el.EthernetType = layers.EthernetTypeIPv4
}
if la.Version == 0 {
la.Version = 4
}
if la.TTL == 0 {
la.TTL = 64
}
case *layers.IPv6: case *layers.IPv6:
nl = la nl = la
if el != nil && el.EthernetType == 0 {
el.EthernetType = layers.EthernetTypeIPv6
}
if la.Version == 0 {
la.Version = 6
}
if la.HopLimit == 0 {
la.HopLimit = 64
}
case *layers.Ethernet:
el = la
} }
} }
for _, la := range ll { for _, la := range ll {

@ -152,6 +152,7 @@ func TestPacketSideEffects(t *testing.T) {
logSubstr("sending IPv6 router advertisement to 52:cc:cc:cc:cc:01 from 52:ee:ee:ee:ee:01"), logSubstr("sending IPv6 router advertisement to 52:cc:cc:cc:cc:01 from 52:ee:ee:ee:ee:01"),
numPkts(1), numPkts(1),
pktSubstr("TypeCode=RouterAdvertisement"), pktSubstr("TypeCode=RouterAdvertisement"),
pktSubstr("HopLimit=255 "), // per RFC 4861, 7.1.1 etc (all NDP messages)
pktSubstr("= ICMPv6RouterAdvertisement"), pktSubstr("= ICMPv6RouterAdvertisement"),
pktSubstr("SrcMAC=52:ee:ee:ee:ee:01 DstMAC=52:cc:cc:cc:cc:01 EthernetType=IPv6"), pktSubstr("SrcMAC=52:ee:ee:ee:ee:01 DstMAC=52:cc:cc:cc:cc:01 EthernetType=IPv6"),
), ),
@ -222,6 +223,11 @@ func TestPacketSideEffects(t *testing.T) {
} }
// mustPacket is like mkPacket but panics on error.
func mustPacket(layers ...gopacket.SerializableLayer) []byte {
return must.Get(mkPacket(layers...))
}
// mkEth encodes an ethernet frame with the given payload. // mkEth encodes an ethernet frame with the given payload.
func mkEth(dst, src MAC, ethType layers.EthernetType, payload []byte) []byte { func mkEth(dst, src MAC, ethType layers.EthernetType, payload []byte) []byte {
ret := make([]byte, 0, 14+len(payload)) ret := make([]byte, 0, 14+len(payload))
@ -260,7 +266,7 @@ func mkIPv6RouterSolicit(srcMAC MAC, srcIP netip.Addr) []byte {
}}, }},
} }
icmp.SetNetworkLayerForChecksum(ip) icmp.SetNetworkLayerForChecksum(ip)
return mkEth(macAllRouters, srcMAC, ethType6, mkPacket(ip, icmp, ra)) return mkEth(macAllRouters, srcMAC, ethType6, mustPacket(ip, icmp, ra))
} }
func mkAllNodesPing(srcMAC MAC, srcIP netip.Addr) []byte { func mkAllNodesPing(srcMAC MAC, srcIP netip.Addr) []byte {
@ -275,7 +281,7 @@ func mkAllNodesPing(srcMAC MAC, srcIP netip.Addr) []byte {
TypeCode: layers.CreateICMPv6TypeCode(layers.ICMPv6TypeEchoRequest, 0), TypeCode: layers.CreateICMPv6TypeCode(layers.ICMPv6TypeEchoRequest, 0),
} }
icmp.SetNetworkLayerForChecksum(ip) icmp.SetNetworkLayerForChecksum(ip)
return mkEth(macAllNodes, srcMAC, ethType6, mkPacket(ip, icmp)) return mkEth(macAllNodes, srcMAC, ethType6, mustPacket(ip, icmp))
} }
// mkDNSReq makes a DNS request to "control.tailscale" using the source IPs as // mkDNSReq makes a DNS request to "control.tailscale" using the source IPs as
@ -336,7 +342,7 @@ func mkDNSReq(ipVer int) []byte {
if ipVer == 6 { if ipVer == 6 {
dns.Questions[0].Type = layers.DNSTypeAAAA dns.Questions[0].Type = layers.DNSTypeAAAA
} }
return mkPacket(eth, ip, udp, dns) return mustPacket(eth, ip, udp, dns)
} }
func mkDHCP(srcMAC MAC, typ layers.DHCPMsgType) []byte { func mkDHCP(srcMAC MAC, typ layers.DHCPMsgType) []byte {
@ -367,41 +373,28 @@ func mkDHCP(srcMAC MAC, typ layers.DHCPMsgType) []byte {
{Type: layers.DHCPOptMessageType, Length: 1, Data: []byte{byte(typ)}}, {Type: layers.DHCPOptMessageType, Length: 1, Data: []byte{byte(typ)}},
}, },
} }
return mkPacket(eth, ip, udp, dhcp) return mustPacket(eth, ip, udp, dhcp)
} }
func mkSyslogPacket(srcIP netip.Addr, msg string) []byte { func mkSyslogPacket(srcIP netip.Addr, msg string) []byte {
eth := &layers.Ethernet{ eth := &layers.Ethernet{
SrcMAC: nodeMac(1).HWAddr(), SrcMAC: nodeMac(1).HWAddr(),
DstMAC: routerMac(1).HWAddr(), DstMAC: routerMac(1).HWAddr(),
EthernetType: layers.EthernetTypeIPv4,
}
if srcIP.Is6() {
eth.EthernetType = layers.EthernetTypeIPv6
}
var ip serializableNetworkLayer
if srcIP.Is4() {
ip = &layers.IPv4{
Version: 4,
Protocol: layers.IPProtocolUDP,
SrcIP: srcIP.AsSlice(),
TTL: 64,
DstIP: FakeSyslogIPv4().AsSlice(),
}
} else if srcIP.Is6() {
ip = &layers.IPv6{
Version: 6,
HopLimit: 64,
NextHeader: layers.IPProtocolUDP,
SrcIP: srcIP.AsSlice(),
DstIP: FakeSyslogIPv6().AsSlice(),
}
} }
ip := mkIPLayer(layers.IPProtocolUDP, srcIP, matchingIP(srcIP, FakeSyslogIPv4(), FakeSyslogIPv6()))
udp := &layers.UDP{ udp := &layers.UDP{
SrcPort: 123, SrcPort: 123,
DstPort: 456, // unused; only IP matches DstPort: 456, // unused; only IP matches
} }
return mkPacket(eth, ip, udp, gopacket.Payload([]byte(msg))) return mustPacket(eth, ip, udp, gopacket.Payload([]byte(msg)))
}
// matchingIP returns ip4 if toMatch is an IPv4 address, otherwise ip6.
func matchingIP(toMatch, if4, if6 netip.Addr) netip.Addr {
if toMatch.Is4() {
return if4
}
return if6
} }
// receivedPacket is an ethernet frame that was received during a test. // receivedPacket is an ethernet frame that was received during a test.

Loading…
Cancel
Save