summaryrefslogtreecommitdiffhomepage
path: root/ipc/uapi_bsd.go
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2019-03-03 04:04:41 +0100
committerJason A. Donenfeld <Jason@zx2c4.com>2019-03-03 05:00:40 +0100
commit69f0fe67b63d90e523a5a1241fb1b46c2e8dbe03 (patch)
tree1ef86da3242afde462dcadb7241bb09f499d5bd7 /ipc/uapi_bsd.go
parentd435be35cac49af9367b2005d831d55e570c4b1b (diff)
global: begin modularization
Diffstat (limited to 'ipc/uapi_bsd.go')
-rw-r--r--ipc/uapi_bsd.go202
1 files changed, 202 insertions, 0 deletions
diff --git a/ipc/uapi_bsd.go b/ipc/uapi_bsd.go
new file mode 100644
index 0000000..f66c386
--- /dev/null
+++ b/ipc/uapi_bsd.go
@@ -0,0 +1,202 @@
+// +build darwin freebsd openbsd
+
+/* SPDX-License-Identifier: MIT
+ *
+ * Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved.
+ */
+
+package ipc
+
+import (
+ "errors"
+ "fmt"
+ "golang.org/x/sys/unix"
+ "net"
+ "os"
+ "path"
+ "unsafe"
+)
+
+var socketDirectory = "/var/run/wireguard"
+
+const (
+ IpcErrorIO = -int64(unix.EIO)
+ IpcErrorProtocol = -int64(unix.EPROTO)
+ IpcErrorInvalid = -int64(unix.EINVAL)
+ IpcErrorPortInUse = -int64(unix.EADDRINUSE)
+ socketName = "%s.sock"
+)
+
+type UAPIListener struct {
+ listener net.Listener // unix socket listener
+ connNew chan net.Conn
+ connErr chan error
+ kqueueFd int
+ keventFd int
+}
+
+func (l *UAPIListener) Accept() (net.Conn, error) {
+ for {
+ select {
+ case conn := <-l.connNew:
+ return conn, nil
+
+ case err := <-l.connErr:
+ return nil, err
+ }
+ }
+}
+
+func (l *UAPIListener) Close() error {
+ err1 := unix.Close(l.kqueueFd)
+ err2 := unix.Close(l.keventFd)
+ err3 := l.listener.Close()
+ if err1 != nil {
+ return err1
+ }
+ if err2 != nil {
+ return err2
+ }
+ return err3
+}
+
+func (l *UAPIListener) Addr() net.Addr {
+ return l.listener.Addr()
+}
+
+func UAPIListen(name string, file *os.File) (net.Listener, error) {
+
+ // wrap file in listener
+
+ listener, err := net.FileListener(file)
+ if err != nil {
+ return nil, err
+ }
+
+ uapi := &UAPIListener{
+ listener: listener,
+ connNew: make(chan net.Conn, 1),
+ connErr: make(chan error, 1),
+ }
+
+ if unixListener, ok := listener.(*net.UnixListener); ok {
+ unixListener.SetUnlinkOnClose(true)
+ }
+
+ socketPath := path.Join(
+ socketDirectory,
+ fmt.Sprintf(socketName, name),
+ )
+
+ // watch for deletion of socket
+
+ uapi.kqueueFd, err = unix.Kqueue()
+ if err != nil {
+ return nil, err
+ }
+ uapi.keventFd, err = unix.Open(socketDirectory, unix.O_RDONLY, 0)
+ if err != nil {
+ unix.Close(uapi.kqueueFd)
+ return nil, err
+ }
+
+ go func(l *UAPIListener) {
+ event := unix.Kevent_t{
+ Filter: unix.EVFILT_VNODE,
+ Flags: unix.EV_ADD | unix.EV_ENABLE | unix.EV_ONESHOT,
+ Fflags: unix.NOTE_WRITE,
+ }
+ // Allow this assignment to work with both the 32-bit and 64-bit version
+ // of the above struct. If you know another way, please submit a patch.
+ *(*uintptr)(unsafe.Pointer(&event.Ident)) = uintptr(uapi.keventFd)
+ events := make([]unix.Kevent_t, 1)
+ n := 1
+ var kerr error
+ for {
+ // start with lstat to avoid race condition
+ if _, err := os.Lstat(socketPath); os.IsNotExist(err) {
+ l.connErr <- err
+ return
+ }
+ if kerr != nil || n != 1 {
+ if kerr != nil {
+ l.connErr <- kerr
+ } else {
+ l.connErr <- errors.New("kqueue returned empty")
+ }
+ return
+ }
+ n, kerr = unix.Kevent(uapi.kqueueFd, []unix.Kevent_t{event}, events, nil)
+ }
+ }(uapi)
+
+ // watch for new connections
+
+ go func(l *UAPIListener) {
+ for {
+ conn, err := l.listener.Accept()
+ if err != nil {
+ l.connErr <- err
+ break
+ }
+ l.connNew <- conn
+ }
+ }(uapi)
+
+ return uapi, nil
+}
+
+func UAPIOpen(name string) (*os.File, error) {
+
+ // check if path exist
+
+ err := os.MkdirAll(socketDirectory, 0755)
+ if err != nil && !os.IsExist(err) {
+ return nil, err
+ }
+
+ // open UNIX socket
+
+ socketPath := path.Join(
+ socketDirectory,
+ fmt.Sprintf(socketName, name),
+ )
+
+ addr, err := net.ResolveUnixAddr("unix", socketPath)
+ if err != nil {
+ return nil, err
+ }
+
+ oldUmask := unix.Umask(0077)
+ listener, err := func() (*net.UnixListener, error) {
+
+ // initial connection attempt
+
+ listener, err := net.ListenUnix("unix", addr)
+ if err == nil {
+ return listener, nil
+ }
+
+ // check if socket already active
+
+ _, err = net.Dial("unix", socketPath)
+ if err == nil {
+ return nil, errors.New("unix socket in use")
+ }
+
+ // cleanup & attempt again
+
+ err = os.Remove(socketPath)
+ if err != nil {
+ return nil, err
+ }
+ return net.ListenUnix("unix", addr)
+ }()
+ unix.Umask(oldUmask)
+
+ if err != nil {
+ return nil, err
+ }
+
+ return listener.File()
+}