// Copyright 2018 Google Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // Binary dhcp4d hands out DHCPv4 leases to clients. package main import ( "bytes" "encoding/json" "flag" "fmt" "html/template" "io/ioutil" "net" "net/http" "os" "os/signal" "sort" "syscall" "time" "github.com/gokrazy/gokrazy" "github.com/google/renameio" "github.com/krolaw/dhcp4" "github.com/krolaw/dhcp4/conn" "github.com/prometheus/client_golang/prometheus" "github.com/prometheus/client_golang/prometheus/promauto" "github.com/prometheus/client_golang/prometheus/promhttp" "github.com/rtr7/router7/internal/dhcp4d" "github.com/rtr7/router7/internal/multilisten" "github.com/rtr7/router7/internal/notify" "github.com/rtr7/router7/internal/oui" "github.com/rtr7/router7/internal/teelogger" ) var iface = flag.String("interface", "lan0", "ethernet interface to listen for DHCPv4 requests on") var log = teelogger.NewConsole() var nonExpiredLeases = promauto.NewGauge(prometheus.GaugeOpts{ Name: "non_expired_leases", Help: "Number of non-expired DHCP leases", }) func updateNonExpired(leases []*dhcp4d.Lease) { now := time.Now() nonExpired := 0 for _, l := range leases { if l.Expired(now) { continue } nonExpired++ } nonExpiredLeases.Set(float64(nonExpired)) } var ouiDB = oui.NewDB("/perm/dhcp4d/oui") var leases []*dhcp4d.Lease var ( timefmt = func(t time.Time) string { return t.Format("2006-01-02 15:04") } leasesTmpl = template.Must(template.New("").Funcs(template.FuncMap{ "timefmt": timefmt, "since": func(t time.Time) string { dur := time.Since(t) if dur.Hours() > 24 { return timefmt(t) } return dur.Truncate(1 * time.Second).String() }, }).Parse(` DHCPv4 status {{ define "table" }} IP address Hostname MAC address Vendor Expiry {{ range $idx, $l := . }} {{$l.Addr}} {{$l.Hostname}} {{$l.HardwareAddr}} {{$l.Vendor}} {{ if $l.Expired }} {{ since $l.Expiry }} expired {{ else }} {{ if $l.Static }} static {{ else }} {{ timefmt $l.Expiry }} active {{ end }} {{ end }} {{ end }} {{ end }} {{ template "table" .StaticLeases }} {{ template "table" .DynamicLeases }}
`)) ) func loadLeases(h *dhcp4d.Handler, fn string) error { b, err := ioutil.ReadFile(fn) if err != nil { if os.IsNotExist(err) { return nil } return err } if err := json.Unmarshal(b, &leases); err != nil { return err } h.SetLeases(leases) updateNonExpired(leases) http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) { host, _, err := net.SplitHostPort(r.RemoteAddr) if err != nil { http.Error(w, "bad request", http.StatusBadRequest) return } ip := net.ParseIP(host) if xff := r.Header.Get("X-Forwarded-For"); ip.IsLoopback() && xff != "" { ip = net.ParseIP(xff) } if !gokrazy.IsInPrivateNet(ip) { http.Error(w, fmt.Sprintf("access from %v forbidden", ip), http.StatusForbidden) return } type tmplLease struct { dhcp4d.Lease Vendor string Expired bool Static bool } static := make([]tmplLease, 0, len(leases)) dynamic := make([]tmplLease, 0, len(leases)) tl := func(l *dhcp4d.Lease) tmplLease { return tmplLease{ Lease: *l, Vendor: ouiDB.Lookup(l.HardwareAddr[:8]), Expired: l.Expired(time.Now()), Static: l.Expiry.IsZero(), } } for _, l := range leases { if l.Expiry.IsZero() { static = append(static, tl(l)) } else { dynamic = append(dynamic, tl(l)) } } sort.Slice(static, func(i, j int) bool { return static[i].Num < static[j].Num }) sort.Slice(dynamic, func(i, j int) bool { return !dynamic[i].Expiry.Before(dynamic[j].Expiry) }) if err := leasesTmpl.Execute(w, struct { StaticLeases []tmplLease DynamicLeases []tmplLease }{ StaticLeases: static, DynamicLeases: dynamic, }); err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } }) return nil } var httpListeners = multilisten.NewPool() func updateListeners() error { hosts, err := gokrazy.PrivateInterfaceAddrs() if err != nil { return err } if net1, err := multilisten.IPv6Net1("/perm"); err == nil { hosts = append(hosts, net1) } httpListeners.ListenAndServe(hosts, func(host string) multilisten.Listener { return &http.Server{Addr: net.JoinHostPort(host, "8067")} }) return nil } func logic() error { http.Handle("/metrics", promhttp.Handler()) if err := updateListeners(); err != nil { return err } go func() { ch := make(chan os.Signal, 1) signal.Notify(ch, syscall.SIGUSR1) for range ch { if err := updateListeners(); err != nil { log.Printf("updateListeners: %v", err) } } }() if err := os.MkdirAll("/perm/dhcp4d", 0755); err != nil { return err } errs := make(chan error) ifc, err := net.InterfaceByName(*iface) if err != nil { return err } handler, err := dhcp4d.NewHandler("/perm", ifc, *iface, nil) if err != nil { return err } if err := loadLeases(handler, "/perm/dhcp4d/leases.json"); err != nil { return err } handler.Leases = func(newLeases []*dhcp4d.Lease, latest *dhcp4d.Lease) { leases = newLeases log.Printf("DHCPACK %+v", latest) b, err := json.Marshal(leases) if err != nil { errs <- err return } var out bytes.Buffer if err := json.Indent(&out, b, "", "\t"); err == nil { b = out.Bytes() } if err := renameio.WriteFile("/perm/dhcp4d/leases.json", out.Bytes(), 0644); err != nil { errs <- err } updateNonExpired(leases) if err := notify.Process("/user/dnsd", syscall.SIGUSR1); err != nil { log.Printf("notifying dnsd: %v", err) } } conn, err := conn.NewUDP4BoundListener(*iface, ":67") if err != nil { return err } go func() { errs <- dhcp4.Serve(conn, handler) }() return <-errs } func main() { // TODO: drop privileges, run as separate uid? flag.Parse() if err := logic(); err != nil { log.Fatal(err) } }