package ipv4 import ( "fmt" "net" "time" "git.loafle.net/commons/logging-go" "git.loafle.net/commons/util-go/net/cidr" "github.com/google/gopacket" "github.com/google/gopacket/layers" ocdm "git.loafle.net/overflow/commons-go/discovery/model" "git.loafle.net/overflow/container_discovery/internal/pcap" ) func ScanHost(zone *ocdm.Zone, dh *ocdm.DiscoveryHost, resultChan chan interface{}, errChan chan error, stopChan chan struct{}) { ps, err := pcap.RetainScanner(zone) if nil != err { errChan <- fmt.Errorf("Discovery: Cannot retain pcap instance %v", err) return } defer func() { pcap.ReleaseScanner(zone) }() cr, err := cidr.NewCIDRRanger(zone.Network) if nil != err { errChan <- err return } hostRanges, err := getTargetHostRange(dh, cr) if nil != err { errChan <- err return } arpChan := ps.OpenARP() defer func() { ps.CloseARP(arpChan) }() go func() { hosts := make(map[string]*ocdm.Host) for { select { case packet, ok := <-arpChan: if !ok { logging.Logger().Debugf("Discovery: arp channel is closed") return } if h := handlePacketARP(zone, hostRanges, hosts, packet); nil != h { resultChan <- h } case <-stopChan: return } } }() if err := sendARP(ps, zone, hostRanges, stopChan); nil != err { errChan <- err return } timer := time.NewTimer(10 * time.Second) select { case <-stopChan: return case <-timer.C: return } } func sendARP(ps pcap.PCapScanner, zone *ocdm.Zone, hostRanges []net.IP, stopChan chan struct{}) error { hwAddr, err := net.ParseMAC(zone.Mac) if nil != err { return err } ip := net.ParseIP(zone.IP) if nil == ip { return fmt.Errorf("Discovery: IP(%s) of zone is not valid", zone.IP) } ethPacket := makePacketEthernet(hwAddr) arpPacket := makePacketARP(hwAddr, ip.To4()) opts := gopacket.SerializeOptions{FixLengths: true, ComputeChecksums: true} buf := gopacket.NewSerializeBuffer() for _, targetHost := range hostRanges { arpPacket.DstProtAddress = []byte(targetHost) // log.Printf("ARP:%v", arpPacket) gopacket.SerializeLayers(buf, opts, ðPacket, &arpPacket) if err := ps.WritePacketData(buf.Bytes()); err != nil { return err } timer := time.NewTimer(time.Microsecond * 100) select { case <-stopChan: return nil case <-timer.C: } } return nil } func handlePacketARP(zone *ocdm.Zone, hostRanges []net.IP, hosts map[string]*ocdm.Host, packet *layers.ARP) *ocdm.Host { if packet.Operation != layers.ARPReply { return nil } ip := net.IP(packet.SourceProtAddress) if _, ok := hosts[ip.String()]; ok { return nil } inRange := false for _, h := range hostRanges { if h.Equal(ip) { inRange = true break } } if !inRange { return nil } h := &ocdm.Host{} h.IP = ip.String() h.Mac = net.HardwareAddr(packet.SourceHwAddress).String() h.Zone = zone hosts[ip.String()] = h return h } func getTargetHostRange(dh *ocdm.DiscoveryHost, cr cidr.CIDRRanger) ([]net.IP, error) { var firstIP net.IP if "" != dh.FirstScanRange { firstIP = net.ParseIP(dh.FirstScanRange) if nil == firstIP { return nil, fmt.Errorf("Discovery: IP(%v) of FirstScanRange host is not valid", firstIP) } } var lastIP net.IP if "" != dh.LastScanRange { lastIP = net.ParseIP(dh.LastScanRange) if nil == lastIP { return nil, fmt.Errorf("Discovery: IP(%v) of LastScanRange host is not valid", lastIP) } } includeIPs := make([]net.IP, 0) for _, iHost := range dh.IncludeHosts { iIP := net.ParseIP(iHost) if nil == iIP { return nil, fmt.Errorf("Discovery: IP(%v) of include host is not valid", iHost) } includeIPs = append(includeIPs, iIP) } excludeIPs := make([]net.IP, 0) for _, eHost := range dh.ExcludeHosts { eIP := net.ParseIP(eHost) if nil == eIP { return nil, fmt.Errorf("Discovery: IP(%v) of exclude host is not valid", eHost) } excludeIPs = append(excludeIPs, eIP) } ranges, err := cr.Ranges(firstIP, lastIP, includeIPs, excludeIPs) if nil != err { return nil, err } return ranges, nil } func makePacketEthernet(hw net.HardwareAddr) layers.Ethernet { return layers.Ethernet{ SrcMAC: hw, DstMAC: net.HardwareAddr{0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, EthernetType: layers.EthernetTypeARP, } } func makePacketARP(hw net.HardwareAddr, ip net.IP) layers.ARP { return layers.ARP{ AddrType: layers.LinkTypeEthernet, Protocol: layers.EthernetTypeIPv4, HwAddressSize: 6, ProtAddressSize: 4, Operation: layers.ARPRequest, SourceHwAddress: []byte(hw), SourceProtAddress: []byte(ip), DstHwAddress: []byte{0, 0, 0, 0, 0, 0}, } }