| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364 |
- // Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package controlclient
- import (
- "encoding/json"
- "fmt"
- "net"
- "reflect"
- "strconv"
- "strings"
- "time"
- "github.com/tailscale/wireguard-go/wgcfg"
- "tailscale.com/tailcfg"
- "tailscale.com/types/logger"
- "tailscale.com/wgengine/filter"
- )
- type NetworkMap struct {
- // Core networking
- NodeKey tailcfg.NodeKey
- PrivateKey wgcfg.PrivateKey
- Expiry time.Time
- // Name is the DNS name assigned to this node.
- Name string
- Addresses []wgcfg.CIDR
- LocalPort uint16 // used for debugging
- MachineStatus tailcfg.MachineStatus
- MachineKey tailcfg.MachineKey
- Peers []*tailcfg.Node // sorted by Node.ID
- DNS tailcfg.DNSConfig
- Hostinfo tailcfg.Hostinfo
- PacketFilter []filter.Match
- // DERPMap is the last DERP server map received. It's reused
- // between updates and should not be modified.
- DERPMap *tailcfg.DERPMap
- // Debug knobs from control server for debug or feature gating.
- Debug *tailcfg.Debug
- // ACLs
- User tailcfg.UserID
- Domain string
- // TODO(crawshaw): reduce UserProfiles to []tailcfg.UserProfile?
- // There are lots of ways to slice this data, leave it up to users.
- UserProfiles map[tailcfg.UserID]tailcfg.UserProfile
- // TODO(crawshaw): Groups []tailcfg.Group
- // TODO(crawshaw): Capabilities []tailcfg.Capability
- }
- func (nm NetworkMap) String() string {
- return nm.Concise()
- }
- func (nm *NetworkMap) Concise() string {
- buf := new(strings.Builder)
- nm.printConciseHeader(buf)
- for _, p := range nm.Peers {
- printPeerConcise(buf, p)
- }
- return buf.String()
- }
- // printConciseHeader prints a concise header line representing nm to buf.
- //
- // If this function is changed to access different fields of nm, keep
- // in equalConciseHeader in sync.
- func (nm *NetworkMap) printConciseHeader(buf *strings.Builder) {
- fmt.Fprintf(buf, "netmap: self: %v auth=%v",
- nm.NodeKey.ShortString(), nm.MachineStatus)
- login := nm.UserProfiles[nm.User].LoginName
- if login == "" {
- if nm.User.IsZero() {
- login = "?"
- } else {
- login = fmt.Sprint(nm.User)
- }
- }
- fmt.Fprintf(buf, " u=%s", login)
- if nm.LocalPort != 0 {
- fmt.Fprintf(buf, " port=%v", nm.LocalPort)
- }
- if nm.Debug != nil {
- j, _ := json.Marshal(nm.Debug)
- fmt.Fprintf(buf, " debug=%s", j)
- }
- fmt.Fprintf(buf, " %v", nm.Addresses)
- buf.WriteByte('\n')
- }
- // equalConciseHeader reports whether a and b are equal for the fields
- // used by printConciseHeader.
- func (a *NetworkMap) equalConciseHeader(b *NetworkMap) bool {
- if a.NodeKey != b.NodeKey ||
- a.MachineStatus != b.MachineStatus ||
- a.LocalPort != b.LocalPort ||
- a.User != b.User ||
- len(a.Addresses) != len(b.Addresses) {
- return false
- }
- for i, a := range a.Addresses {
- if b.Addresses[i] != a {
- return false
- }
- }
- return (a.Debug == nil && b.Debug == nil) || reflect.DeepEqual(a.Debug, b.Debug)
- }
- // printPeerConcise appends to buf a line repsenting the peer p.
- //
- // If this function is changed to access different fields of p, keep
- // in nodeConciseEqual in sync.
- func printPeerConcise(buf *strings.Builder, p *tailcfg.Node) {
- aip := make([]string, len(p.AllowedIPs))
- for i, a := range p.AllowedIPs {
- s := strings.TrimSuffix(fmt.Sprint(a), "/32")
- aip[i] = s
- }
- ep := make([]string, len(p.Endpoints))
- for i, e := range p.Endpoints {
- // Align vertically on the ':' between IP and port
- colon := strings.IndexByte(e, ':')
- spaces := 0
- for colon > 0 && len(e)+spaces-colon < 6 {
- spaces++
- colon--
- }
- ep[i] = fmt.Sprintf("%21v", e+strings.Repeat(" ", spaces))
- }
- derp := p.DERP
- const derpPrefix = "127.3.3.40:"
- if strings.HasPrefix(derp, derpPrefix) {
- derp = "D" + derp[len(derpPrefix):]
- }
- var discoShort string
- if !p.DiscoKey.IsZero() {
- discoShort = p.DiscoKey.ShortString() + " "
- }
- // Most of the time, aip is just one element, so format the
- // table to look good in that case. This will also make multi-
- // subnet nodes stand out visually.
- fmt.Fprintf(buf, " %v %s%-2v %-15v : %v\n",
- p.Key.ShortString(),
- discoShort,
- derp,
- strings.Join(aip, " "),
- strings.Join(ep, " "))
- }
- // nodeConciseEqual reports whether a and b are equal for the fields accessed by printPeerConcise.
- func nodeConciseEqual(a, b *tailcfg.Node) bool {
- return a.Key == b.Key &&
- a.DERP == b.DERP &&
- a.DiscoKey == b.DiscoKey &&
- eqCIDRsIgnoreNil(a.AllowedIPs, b.AllowedIPs) &&
- eqStringsIgnoreNil(a.Endpoints, b.Endpoints)
- }
- func (b *NetworkMap) ConciseDiffFrom(a *NetworkMap) string {
- var diff strings.Builder
- // See if header (non-peers, "bare") part of the network map changed.
- // If so, print its diff lines first.
- if !a.equalConciseHeader(b) {
- diff.WriteByte('-')
- a.printConciseHeader(&diff)
- diff.WriteByte('+')
- b.printConciseHeader(&diff)
- }
- aps, bps := a.Peers, b.Peers
- for len(aps) > 0 && len(bps) > 0 {
- pa, pb := aps[0], bps[0]
- switch {
- case pa.ID == pb.ID:
- if !nodeConciseEqual(pa, pb) {
- diff.WriteByte('-')
- printPeerConcise(&diff, pa)
- diff.WriteByte('+')
- printPeerConcise(&diff, pb)
- }
- aps, bps = aps[1:], bps[1:]
- case pa.ID > pb.ID:
- // New peer in b.
- diff.WriteByte('+')
- printPeerConcise(&diff, pb)
- bps = bps[1:]
- case pb.ID > pa.ID:
- // Deleted peer in b.
- diff.WriteByte('-')
- printPeerConcise(&diff, pa)
- aps = aps[1:]
- }
- }
- for _, pa := range aps {
- diff.WriteByte('-')
- printPeerConcise(&diff, pa)
- }
- for _, pb := range bps {
- diff.WriteByte('+')
- printPeerConcise(&diff, pb)
- }
- return diff.String()
- }
- func (nm *NetworkMap) JSON() string {
- b, err := json.MarshalIndent(*nm, "", " ")
- if err != nil {
- return fmt.Sprintf("[json error: %v]", err)
- }
- return string(b)
- }
- // WGConfigFlags is a bitmask of flags to control the behavior of the
- // wireguard configuration generation done by NetMap.WGCfg.
- type WGConfigFlags int
- const (
- AllowSingleHosts WGConfigFlags = 1 << iota
- AllowSubnetRoutes
- AllowDefaultRoute
- )
- // EndpointDiscoSuffix is appended to the hex representation of a peer's discovery key
- // and is then the sole wireguard endpoint for peers with a non-zero discovery key.
- // This form is then recognize by magicsock's CreateEndpoint.
- const EndpointDiscoSuffix = ".disco.tailscale:12345"
- // WGCfg returns the NetworkMaps's Wireguard configuration.
- func (nm *NetworkMap) WGCfg(logf logger.Logf, flags WGConfigFlags) (*wgcfg.Config, error) {
- cfg := &wgcfg.Config{
- Name: "tailscale",
- PrivateKey: nm.PrivateKey,
- Addresses: nm.Addresses,
- ListenPort: nm.LocalPort,
- Peers: make([]wgcfg.Peer, 0, len(nm.Peers)),
- }
- for _, peer := range nm.Peers {
- if Debug.OnlyDisco && peer.DiscoKey.IsZero() {
- continue
- }
- if (flags&AllowSingleHosts) == 0 && len(peer.AllowedIPs) < 2 {
- logf("wgcfg: %v skipping a single-host peer.", peer.Key.ShortString())
- continue
- }
- cfg.Peers = append(cfg.Peers, wgcfg.Peer{
- PublicKey: wgcfg.Key(peer.Key),
- })
- cpeer := &cfg.Peers[len(cfg.Peers)-1]
- if peer.KeepAlive {
- cpeer.PersistentKeepalive = 25 // seconds
- }
- if !peer.DiscoKey.IsZero() {
- if err := appendEndpoint(cpeer, fmt.Sprintf("%x%s", peer.DiscoKey[:], EndpointDiscoSuffix)); err != nil {
- return nil, err
- }
- cpeer.Endpoints = []wgcfg.Endpoint{{Host: fmt.Sprintf("%x.disco.tailscale", peer.DiscoKey[:]), Port: 12345}}
- } else {
- if err := appendEndpoint(cpeer, peer.DERP); err != nil {
- return nil, err
- }
- for _, ep := range peer.Endpoints {
- if err := appendEndpoint(cpeer, ep); err != nil {
- return nil, err
- }
- }
- }
- for _, allowedIP := range peer.AllowedIPs {
- if allowedIP.Mask == 0 {
- if (flags & AllowDefaultRoute) == 0 {
- logf("wgcfg: %v skipping default route", peer.Key.ShortString())
- continue
- }
- } else if cidrIsSubnet(peer, allowedIP) {
- if (flags & AllowSubnetRoutes) == 0 {
- logf("wgcfg: %v skipping subnet route", peer.Key.ShortString())
- continue
- }
- }
- cpeer.AllowedIPs = append(cpeer.AllowedIPs, allowedIP)
- }
- }
- return cfg, nil
- }
- // cidrIsSubnet reports whether cidr is a non-default-route subnet
- // exported by node that is not one of its own self addresses.
- func cidrIsSubnet(node *tailcfg.Node, cidr wgcfg.CIDR) bool {
- if cidr.Mask == 0 {
- return false
- }
- if cidr.Mask < 32 {
- // Fast path for IPv4, to avoid loop below.
- //
- // TODO: if cidr.IP is an IPv6 address, we could do "< 128"
- // to avoid the range over node.Addresses. Or we could
- // just remove this fast path and unconditionally do the range
- // loop.
- return true
- }
- for _, selfCIDR := range node.Addresses {
- if cidr == selfCIDR {
- return false
- }
- }
- return true
- }
- func appendEndpoint(peer *wgcfg.Peer, epStr string) error {
- if epStr == "" {
- return nil
- }
- host, port, err := net.SplitHostPort(epStr)
- if err != nil {
- return fmt.Errorf("malformed endpoint %q for peer %v", epStr, peer.PublicKey.ShortString())
- }
- port16, err := strconv.ParseUint(port, 10, 16)
- if err != nil {
- return fmt.Errorf("invalid port in endpoint %q for peer %v", epStr, peer.PublicKey.ShortString())
- }
- peer.Endpoints = append(peer.Endpoints, wgcfg.Endpoint{Host: host, Port: uint16(port16)})
- return nil
- }
- // eqStringsIgnoreNil reports whether a and b have the same length and
- // contents, but ignore whether a or b are nil.
- func eqStringsIgnoreNil(a, b []string) bool {
- if len(a) != len(b) {
- return false
- }
- for i, v := range a {
- if v != b[i] {
- return false
- }
- }
- return true
- }
- // eqCIDRsIgnoreNil reports whether a and b have the same length and
- // contents, but ignore whether a or b are nil.
- func eqCIDRsIgnoreNil(a, b []wgcfg.CIDR) bool {
- if len(a) != len(b) {
- return false
- }
- for i, v := range a {
- if v != b[i] {
- return false
- }
- }
- return true
- }
|