network: cleanup NAT code and start on IPv6 support

This commit is contained in:
Alex Zenla
2024-02-11 06:43:09 +00:00
parent efe425b346
commit 102cab32c3
10 changed files with 197 additions and 167 deletions

View File

@ -89,6 +89,7 @@ impl Controller {
address: format!("{}/24", ipv4), address: format!("{}/24", ipv4),
gateway: "192.168.42.1".to_string(), gateway: "192.168.42.1".to_string(),
}, },
ipv6: None,
}), }),
env, env,
run, run,

View File

@ -5,15 +5,18 @@ use hyphanet::NetworkService;
#[derive(Parser, Debug)] #[derive(Parser, Debug)]
struct NetworkArgs { struct NetworkArgs {
#[arg(short, long, default_value = "192.168.42.1/24")] #[arg(long, default_value = "192.168.42.1/24")]
network: String, ipv4_network: String,
#[arg(long, default_value = "fe80::1/10")]
ipv6_network: String,
} }
#[tokio::main] #[tokio::main]
async fn main() -> Result<()> { async fn main() -> Result<()> {
env_logger::Builder::from_env(Env::default().default_filter_or("warn")).init(); env_logger::Builder::from_env(Env::default().default_filter_or("warn")).init();
let args = NetworkArgs::parse(); let args = NetworkArgs::parse();
let mut service = NetworkService::new(args.network)?; let mut service = NetworkService::new(args.ipv4_network, args.ipv6_network)?;
service.watch().await?; service.watch().await?;
Ok(()) Ok(())
} }

View File

@ -17,7 +17,8 @@ use tokio::sync::mpsc::{channel, Receiver};
#[derive(Clone)] #[derive(Clone)]
pub struct NetworkBackend { pub struct NetworkBackend {
network: String, ipv4: String,
ipv6: String,
interface: String, interface: String,
} }
@ -71,9 +72,10 @@ impl NetworkStack<'_> {
} }
impl NetworkBackend { impl NetworkBackend {
pub fn new(network: &str, interface: &str) -> Result<Self> { pub fn new(ipv4: &str, ipv6: &str, interface: &str) -> Result<Self> {
Ok(Self { Ok(Self {
network: network.to_string(), ipv4: ipv4.to_string(),
ipv6: ipv6.to_string(),
interface: interface.to_string(), interface: interface.to_string(),
}) })
} }
@ -110,9 +112,11 @@ impl NetworkBackend {
fn create_network_stack(&self) -> Result<NetworkStack> { fn create_network_stack(&self) -> Result<NetworkStack> {
let proxy = Box::new(ProxyNatHandlerFactory::new()); let proxy = Box::new(ProxyNatHandlerFactory::new());
let address = IpCidr::from_str(&self.network) let ipv4 = IpCidr::from_str(&self.ipv4)
.map_err(|_| anyhow!("failed to parse cidr: {}", self.network))?; .map_err(|_| anyhow!("failed to parse ipv4 cidr: {}", self.ipv4))?;
let addresses: Vec<IpCidr> = vec![address]; let ipv6 = IpCidr::from_str(&self.ipv4)
.map_err(|_| anyhow!("failed to parse ipv6 cidr: {}", self.ipv6))?;
let addresses: Vec<IpCidr> = vec![ipv4, ipv6];
let mut kdev = let mut kdev =
AsyncRawSocket::bound_to_interface(&self.interface, RawSocketProtocol::Ethernet)?; AsyncRawSocket::bound_to_interface(&self.interface, RawSocketProtocol::Ethernet)?;
let mtu = kdev.mtu_of_interface(&self.interface)?; let mtu = kdev.mtu_of_interface(&self.interface)?;

View File

@ -1,5 +1,5 @@
use log::warn;
// Referenced https://github.com/vi/wgslirpy/blob/master/crates/libwgslirpy/src/channelized_smoltcp_device.rs // Referenced https://github.com/vi/wgslirpy/blob/master/crates/libwgslirpy/src/channelized_smoltcp_device.rs
use log::warn;
use smoltcp::phy::{Checksum, Device}; use smoltcp::phy::{Checksum, Device};
use tokio::sync::mpsc::Sender; use tokio::sync::mpsc::Sender;

View File

@ -16,12 +16,13 @@ pub mod proxynat;
pub mod raw_socket; pub mod raw_socket;
pub struct NetworkService { pub struct NetworkService {
pub network: String, pub ipv4: String,
pub ipv6: String,
} }
impl NetworkService { impl NetworkService {
pub fn new(network: String) -> Result<NetworkService> { pub fn new(ipv4: String, ipv6: String) -> Result<NetworkService> {
Ok(NetworkService { network }) Ok(NetworkService { ipv4, ipv6 })
} }
} }
@ -77,7 +78,7 @@ impl NetworkService {
spawned: Arc<Mutex<Vec<String>>>, spawned: Arc<Mutex<Vec<String>>>,
) -> Result<()> { ) -> Result<()> {
let interface = interface.to_string(); let interface = interface.to_string();
let mut network = NetworkBackend::new(&self.network, &interface)?; let mut network = NetworkBackend::new(&self.ipv4, &self.ipv6, &interface)?;
info!("initializing network backend for interface {}", interface); info!("initializing network backend for interface {}", interface);
network.init().await?; network.init().await?;
tokio::time::sleep(Duration::from_secs(1)).await; tokio::time::sleep(Duration::from_secs(1)).await;

View File

@ -12,6 +12,7 @@ use etherparse::NetSlice;
use etherparse::SlicedPacket; use etherparse::SlicedPacket;
use etherparse::TcpHeaderSlice; use etherparse::TcpHeaderSlice;
use etherparse::UdpHeaderSlice; use etherparse::UdpHeaderSlice;
use log::warn;
use log::{debug, trace}; use log::{debug, trace};
use smoltcp::wire::EthernetAddress; use smoltcp::wire::EthernetAddress;
use smoltcp::wire::IpAddress; use smoltcp::wire::IpAddress;
@ -50,6 +51,27 @@ impl Display for NatKey {
} }
} }
pub struct NatHandlerContext {
pub key: NatKey,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
}
impl NatHandlerContext {
pub fn try_send(&self, buffer: Vec<u8>) -> Result<()> {
self.tx_sender.try_send(buffer)?;
Ok(())
}
}
impl Drop for NatHandlerContext {
fn drop(&mut self) {
if let Err(error) = self.reclaim_sender.try_send(self.key) {
warn!("failed to reclaim nat key: {}", error);
}
}
}
#[async_trait] #[async_trait]
pub trait NatHandler: Send { pub trait NatHandler: Send {
async fn receive(&self, packet: &[u8]) -> Result<()>; async fn receive(&self, packet: &[u8]) -> Result<()>;
@ -57,12 +79,7 @@ pub trait NatHandler: Send {
#[async_trait] #[async_trait]
pub trait NatHandlerFactory: Send { pub trait NatHandlerFactory: Send {
async fn nat( async fn nat(&self, context: NatHandlerContext) -> Option<Box<dyn NatHandler>>;
&self,
key: NatKey,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
) -> Option<Box<dyn NatHandler>>;
} }
pub struct NatTable { pub struct NatTable {
@ -285,14 +302,15 @@ impl NatRouter {
} }
} }
let context = NatHandlerContext {
key,
tx_sender: self.tx_sender.clone(),
reclaim_sender: self.reclaim_sender.clone(),
};
let handler: Option<&mut Box<dyn NatHandler>> = match self.table.inner.entry(key) { let handler: Option<&mut Box<dyn NatHandler>> = match self.table.inner.entry(key) {
Entry::Occupied(entry) => Some(entry.into_mut()), Entry::Occupied(entry) => Some(entry.into_mut()),
Entry::Vacant(entry) => { Entry::Vacant(entry) => {
if let Some(handler) = self if let Some(handler) = self.factory.nat(context).await {
.factory
.nat(key, self.tx_sender.clone(), self.reclaim_sender.clone())
.await
{
debug!("creating nat entry for key: {}", key); debug!("creating nat entry for key: {}", key);
Some(entry.insert(handler)) Some(entry.insert(handler))
} else { } else {

View File

@ -3,8 +3,8 @@ use std::{net::IpAddr, time::Duration};
use anyhow::{anyhow, Result}; use anyhow::{anyhow, Result};
use async_trait::async_trait; use async_trait::async_trait;
use etherparse::{ use etherparse::{
Icmpv4Header, Icmpv4Type, Icmpv6Header, Icmpv6Type, IpNumber, NetSlice, PacketBuilder, Icmpv4Header, Icmpv4Type, Icmpv6Header, Icmpv6Type, IpNumber, Ipv4Slice, Ipv6Slice, NetSlice,
SlicedPacket, PacketBuilder, SlicedPacket,
}; };
use log::{debug, warn}; use log::{debug, warn};
use smoltcp::wire::IpAddress; use smoltcp::wire::IpAddress;
@ -15,14 +15,13 @@ use tokio::{
use crate::{ use crate::{
icmp::{IcmpClient, IcmpProtocol, IcmpReply}, icmp::{IcmpClient, IcmpProtocol, IcmpReply},
nat::{NatHandler, NatKey}, nat::{NatHandler, NatHandlerContext},
}; };
const ICMP_PING_TIMEOUT_SECS: u64 = 20; const ICMP_PING_TIMEOUT_SECS: u64 = 20;
const ICMP_TIMEOUT_SECS: u64 = 30; const ICMP_TIMEOUT_SECS: u64 = 30;
pub struct ProxyIcmpHandler { pub struct ProxyIcmpHandler {
key: NatKey,
rx_sender: Sender<Vec<u8>>, rx_sender: Sender<Vec<u8>>,
} }
@ -40,22 +39,18 @@ enum ProxyIcmpSelect {
} }
impl ProxyIcmpHandler { impl ProxyIcmpHandler {
pub fn new(key: NatKey, rx_sender: Sender<Vec<u8>>) -> Self { pub fn new(rx_sender: Sender<Vec<u8>>) -> Self {
ProxyIcmpHandler { key, rx_sender } ProxyIcmpHandler { rx_sender }
} }
pub async fn spawn( pub async fn spawn(
&mut self, &mut self,
context: NatHandlerContext,
rx_receiver: Receiver<Vec<u8>>, rx_receiver: Receiver<Vec<u8>>,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
) -> Result<()> { ) -> Result<()> {
let client = IcmpClient::new(IcmpProtocol::Icmp4)?; let client = IcmpClient::new(IcmpProtocol::Icmp4)?;
let key = self.key;
tokio::spawn(async move { tokio::spawn(async move {
if let Err(error) = if let Err(error) = ProxyIcmpHandler::process(client, rx_receiver, context).await {
ProxyIcmpHandler::process(client, key, rx_receiver, tx_sender, reclaim_sender).await
{
warn!("processing of icmp proxy failed: {}", error); warn!("processing of icmp proxy failed: {}", error);
} }
}); });
@ -64,10 +59,8 @@ impl ProxyIcmpHandler {
async fn process( async fn process(
client: IcmpClient, client: IcmpClient,
key: NatKey,
mut rx_receiver: Receiver<Vec<u8>>, mut rx_receiver: Receiver<Vec<u8>>,
tx_sender: Sender<Vec<u8>>, context: NatHandlerContext,
reclaim_sender: Sender<NatKey>,
) -> Result<()> { ) -> Result<()> {
loop { loop {
let deadline = tokio::time::sleep(Duration::from_secs(ICMP_TIMEOUT_SECS)); let deadline = tokio::time::sleep(Duration::from_secs(ICMP_TIMEOUT_SECS));
@ -89,15 +82,37 @@ impl ProxyIcmpHandler {
match net { match net {
NetSlice::Ipv4(ipv4) => { NetSlice::Ipv4(ipv4) => {
if ipv4.header().protocol() != IpNumber::ICMP { ProxyIcmpHandler::process_ipv4(&context, ipv4, &client).await?
continue;
} }
let (header, payload) = NetSlice::Ipv6(ipv6) => {
Icmpv4Header::from_slice(ipv4.payload().payload)?; ProxyIcmpHandler::process_ipv6(&context, ipv6, &client).await?
}
}
}
ProxyIcmpSelect::Close => {
break;
}
}
}
Ok(())
}
async fn process_ipv4(
context: &NatHandlerContext,
ipv4: &Ipv4Slice<'_>,
client: &IcmpClient,
) -> Result<()> {
if ipv4.header().protocol() != IpNumber::ICMP {
return Ok(());
}
let (header, payload) = Icmpv4Header::from_slice(ipv4.payload().payload)?;
if let Icmpv4Type::EchoRequest(echo) = header.icmp_type { if let Icmpv4Type::EchoRequest(echo) = header.icmp_type {
let IpAddr::V4(external_ipv4) = key.external_ip.addr.into() else { let IpAddr::V4(external_ipv4) = context.key.external_ip.addr.into() else {
continue; return Ok(());
}; };
let Some(IcmpReply::Icmp4 { let Some(IcmpReply::Icmp4 {
@ -114,16 +129,15 @@ impl ProxyIcmpHandler {
) )
.await? .await?
else { else {
continue; return Ok(());
}; };
let packet = let packet =
PacketBuilder::ethernet2(key.local_mac.0, key.client_mac.0); PacketBuilder::ethernet2(context.key.local_mac.0, context.key.client_mac.0);
let packet = match (key.external_ip.addr, key.client_ip.addr) { let packet = match (context.key.external_ip.addr, context.key.client_ip.addr) {
( (IpAddress::Ipv4(external_addr), IpAddress::Ipv4(client_addr)) => {
IpAddress::Ipv4(external_addr), packet.ipv4(external_addr.0, client_addr.0, 20)
IpAddress::Ipv4(client_addr), }
) => packet.ipv4(external_addr.0, client_addr.0, 20),
_ => { _ => {
return Err(anyhow!("IP endpoint mismatch")); return Err(anyhow!("IP endpoint mismatch"));
} }
@ -131,22 +145,26 @@ impl ProxyIcmpHandler {
let packet = packet.icmpv4_echo_reply(echo.id, echo.seq); let packet = packet.icmpv4_echo_reply(echo.id, echo.seq);
let mut buffer: Vec<u8> = Vec::new(); let mut buffer: Vec<u8> = Vec::new();
packet.write(&mut buffer, &payload)?; packet.write(&mut buffer, &payload)?;
if let Err(error) = tx_sender.try_send(buffer) { if let Err(error) = context.try_send(buffer) {
debug!("failed to transmit icmp packet: {}", error); debug!("failed to transmit icmp packet: {}", error);
} }
} }
Ok(())
} }
NetSlice::Ipv6(ipv6) => { async fn process_ipv6(
context: &NatHandlerContext,
ipv6: &Ipv6Slice<'_>,
client: &IcmpClient,
) -> Result<()> {
if ipv6.header().next_header() != IpNumber::ICMP { if ipv6.header().next_header() != IpNumber::ICMP {
continue; return Ok(());
} }
let (header, payload) = let (header, payload) = Icmpv6Header::from_slice(ipv6.payload().payload)?;
Icmpv6Header::from_slice(ipv6.payload().payload)?;
if let Icmpv6Type::EchoRequest(echo) = header.icmp_type { if let Icmpv6Type::EchoRequest(echo) = header.icmp_type {
let IpAddr::V6(external_ipv6) = key.external_ip.addr.into() else { let IpAddr::V6(external_ipv6) = context.key.external_ip.addr.into() else {
continue; return Ok(());
}; };
let Some(IcmpReply::Icmp6 { let Some(IcmpReply::Icmp6 {
@ -163,16 +181,15 @@ impl ProxyIcmpHandler {
) )
.await? .await?
else { else {
continue; return Ok(());
}; };
let packet = let packet =
PacketBuilder::ethernet2(key.local_mac.0, key.client_mac.0); PacketBuilder::ethernet2(context.key.local_mac.0, context.key.client_mac.0);
let packet = match (key.external_ip.addr, key.client_ip.addr) { let packet = match (context.key.external_ip.addr, context.key.client_ip.addr) {
( (IpAddress::Ipv6(external_addr), IpAddress::Ipv6(client_addr)) => {
IpAddress::Ipv6(external_addr), packet.ipv6(external_addr.0, client_addr.0, 20)
IpAddress::Ipv6(client_addr), }
) => packet.ipv6(external_addr.0, client_addr.0, 20),
_ => { _ => {
return Err(anyhow!("IP endpoint mismatch")); return Err(anyhow!("IP endpoint mismatch"));
} }
@ -180,20 +197,10 @@ impl ProxyIcmpHandler {
let packet = packet.icmpv6_echo_reply(echo.id, echo.seq); let packet = packet.icmpv6_echo_reply(echo.id, echo.seq);
let mut buffer: Vec<u8> = Vec::new(); let mut buffer: Vec<u8> = Vec::new();
packet.write(&mut buffer, &payload)?; packet.write(&mut buffer, &payload)?;
if let Err(error) = tx_sender.try_send(buffer) { if let Err(error) = context.try_send(buffer) {
debug!("failed to transmit icmp packet: {}", error); debug!("failed to transmit icmp packet: {}", error);
} }
} }
}
}
}
ProxyIcmpSelect::Close => {
reclaim_sender.send(key).await?;
break;
}
}
}
Ok(()) Ok(())
} }

View File

@ -3,11 +3,11 @@ use async_trait::async_trait;
use log::warn; use log::warn;
use tokio::sync::mpsc::channel; use tokio::sync::mpsc::channel;
use tokio::sync::mpsc::Sender;
use crate::nat::NatHandlerContext;
use crate::proxynat::udp::ProxyUdpHandler; use crate::proxynat::udp::ProxyUdpHandler;
use crate::nat::{NatHandler, NatHandlerFactory, NatKey, NatKeyProtocol}; use crate::nat::{NatHandler, NatHandlerFactory, NatKeyProtocol};
use self::icmp::ProxyIcmpHandler; use self::icmp::ProxyIcmpHandler;
@ -30,18 +30,13 @@ impl ProxyNatHandlerFactory {
#[async_trait] #[async_trait]
impl NatHandlerFactory for ProxyNatHandlerFactory { impl NatHandlerFactory for ProxyNatHandlerFactory {
async fn nat( async fn nat(&self, context: NatHandlerContext) -> Option<Box<dyn NatHandler>> {
&self, match context.key.protocol {
key: NatKey,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
) -> Option<Box<dyn NatHandler>> {
match key.protocol {
NatKeyProtocol::Udp => { NatKeyProtocol::Udp => {
let (rx_sender, rx_receiver) = channel::<Vec<u8>>(4); let (rx_sender, rx_receiver) = channel::<Vec<u8>>(4);
let mut handler = ProxyUdpHandler::new(key, rx_sender); let mut handler = ProxyUdpHandler::new(rx_sender);
if let Err(error) = handler.spawn(rx_receiver, tx_sender, reclaim_sender).await { if let Err(error) = handler.spawn(context, rx_receiver).await {
warn!("unable to spawn udp proxy handler: {}", error); warn!("unable to spawn udp proxy handler: {}", error);
None None
} else { } else {
@ -51,9 +46,9 @@ impl NatHandlerFactory for ProxyNatHandlerFactory {
NatKeyProtocol::Icmp => { NatKeyProtocol::Icmp => {
let (rx_sender, rx_receiver) = channel::<Vec<u8>>(4); let (rx_sender, rx_receiver) = channel::<Vec<u8>>(4);
let mut handler = ProxyIcmpHandler::new(key, rx_sender); let mut handler = ProxyIcmpHandler::new(rx_sender);
if let Err(error) = handler.spawn(rx_receiver, tx_sender, reclaim_sender).await { if let Err(error) = handler.spawn(context, rx_receiver).await {
warn!("unable to spawn icmp proxy handler: {}", error); warn!("unable to spawn icmp proxy handler: {}", error);
None None
} else { } else {

View File

@ -15,12 +15,11 @@ use tokio::{
use tokio::{sync::mpsc::Receiver, sync::mpsc::Sender}; use tokio::{sync::mpsc::Receiver, sync::mpsc::Sender};
use udp_stream::UdpStream; use udp_stream::UdpStream;
use crate::nat::{NatHandler, NatKey}; use crate::nat::{NatHandler, NatHandlerContext};
const UDP_TIMEOUT_SECS: u64 = 60; const UDP_TIMEOUT_SECS: u64 = 60;
pub struct ProxyUdpHandler { pub struct ProxyUdpHandler {
key: NatKey,
rx_sender: Sender<Vec<u8>>, rx_sender: Sender<Vec<u8>>,
} }
@ -39,31 +38,27 @@ enum ProxyUdpSelect {
} }
impl ProxyUdpHandler { impl ProxyUdpHandler {
pub fn new(key: NatKey, rx_sender: Sender<Vec<u8>>) -> Self { pub fn new(rx_sender: Sender<Vec<u8>>) -> Self {
ProxyUdpHandler { key, rx_sender } ProxyUdpHandler { rx_sender }
} }
pub async fn spawn( pub async fn spawn(
&mut self, &mut self,
context: NatHandlerContext,
rx_receiver: Receiver<Vec<u8>>, rx_receiver: Receiver<Vec<u8>>,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
) -> Result<()> { ) -> Result<()> {
let external_addr = match self.key.external_ip.addr { let external_addr = match context.key.external_ip.addr {
IpAddress::Ipv4(addr) => { IpAddress::Ipv4(addr) => {
SocketAddr::new(IpAddr::V4(addr.0.into()), self.key.external_ip.port) SocketAddr::new(IpAddr::V4(addr.0.into()), context.key.external_ip.port)
} }
IpAddress::Ipv6(addr) => { IpAddress::Ipv6(addr) => {
SocketAddr::new(IpAddr::V6(addr.0.into()), self.key.external_ip.port) SocketAddr::new(IpAddr::V6(addr.0.into()), context.key.external_ip.port)
} }
}; };
let socket = UdpStream::connect(external_addr).await?; let socket = UdpStream::connect(external_addr).await?;
let key = self.key;
tokio::spawn(async move { tokio::spawn(async move {
if let Err(error) = if let Err(error) = ProxyUdpHandler::process(context, socket, rx_receiver).await {
ProxyUdpHandler::process(key, socket, rx_receiver, tx_sender, reclaim_sender).await
{
warn!("processing of udp proxy failed: {}", error); warn!("processing of udp proxy failed: {}", error);
} }
}); });
@ -71,11 +66,9 @@ impl ProxyUdpHandler {
} }
async fn process( async fn process(
key: NatKey, context: NatHandlerContext,
mut socket: UdpStream, mut socket: UdpStream,
mut rx_receiver: Receiver<Vec<u8>>, mut rx_receiver: Receiver<Vec<u8>>,
tx_sender: Sender<Vec<u8>>,
reclaim_sender: Sender<NatKey>,
) -> Result<()> { ) -> Result<()> {
let mut external_buffer = vec![0u8; 2048]; let mut external_buffer = vec![0u8; 2048];
@ -94,8 +87,9 @@ impl ProxyUdpHandler {
match selection { match selection {
ProxyUdpSelect::External(size) => { ProxyUdpSelect::External(size) => {
let data = &external_buffer[0..size]; let data = &external_buffer[0..size];
let packet = PacketBuilder::ethernet2(key.local_mac.0, key.client_mac.0); let packet =
let packet = match (key.external_ip.addr, key.client_ip.addr) { PacketBuilder::ethernet2(context.key.local_mac.0, context.key.client_mac.0);
let packet = match (context.key.external_ip.addr, context.key.client_ip.addr) {
(IpAddress::Ipv4(external_addr), IpAddress::Ipv4(client_addr)) => { (IpAddress::Ipv4(external_addr), IpAddress::Ipv4(client_addr)) => {
packet.ipv4(external_addr.0, client_addr.0, 20) packet.ipv4(external_addr.0, client_addr.0, 20)
} }
@ -106,10 +100,11 @@ impl ProxyUdpHandler {
return Err(anyhow!("IP endpoint mismatch")); return Err(anyhow!("IP endpoint mismatch"));
} }
}; };
let packet = packet.udp(key.external_ip.port, key.client_ip.port); let packet =
packet.udp(context.key.external_ip.port, context.key.client_ip.port);
let mut buffer: Vec<u8> = Vec::new(); let mut buffer: Vec<u8> = Vec::new();
packet.write(&mut buffer, data)?; packet.write(&mut buffer, data)?;
if let Err(error) = tx_sender.try_send(buffer) { if let Err(error) = context.try_send(buffer) {
debug!("failed to transmit udp packet: {}", error); debug!("failed to transmit udp packet: {}", error);
} }
} }
@ -128,7 +123,6 @@ impl ProxyUdpHandler {
} }
ProxyUdpSelect::Close => { ProxyUdpSelect::Close => {
drop(socket); drop(socket);
reclaim_sender.send(key).await?;
break; break;
} }
} }

View File

@ -6,10 +6,17 @@ pub struct LaunchNetworkIpv4 {
pub gateway: String, pub gateway: String,
} }
#[derive(Serialize, Deserialize, Debug)]
pub struct LaunchNetworkIpv6 {
pub address: String,
pub gateway: String,
}
#[derive(Serialize, Deserialize, Debug)] #[derive(Serialize, Deserialize, Debug)]
pub struct LaunchNetwork { pub struct LaunchNetwork {
pub link: String, pub link: String,
pub ipv4: LaunchNetworkIpv4, pub ipv4: LaunchNetworkIpv4,
pub ipv6: Option<LaunchNetworkIpv6>,
} }
#[derive(Serialize, Deserialize, Debug)] #[derive(Serialize, Deserialize, Debug)]