| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300 |
- // Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package controlclient
- import (
- "bytes"
- "encoding/base64"
- "encoding/json"
- "fmt"
- "log"
- "reflect"
- "strings"
- "time"
- "github.com/tailscale/wireguard-go/wgcfg"
- "tailscale.com/tailcfg"
- "tailscale.com/types/logger"
- "tailscale.com/wgengine/filter"
- )
- type NetworkMap struct {
- // Core networking
- NodeKey tailcfg.NodeKey
- PrivateKey wgcfg.PrivateKey
- Expiry time.Time
- Addresses []wgcfg.CIDR
- LocalPort uint16 // used for debugging
- MachineStatus tailcfg.MachineStatus
- Peers []*tailcfg.Node
- DNS []wgcfg.IP
- DNSDomains []string
- Hostinfo tailcfg.Hostinfo
- PacketFilter filter.Matches
- // DERPMap is the last DERP server map received. It's reused
- // between updates and should not be modified.
- DERPMap *tailcfg.DERPMap
- // Debug knobs from control server for debug or feature gating.
- Debug *tailcfg.Debug
- // ACLs
- User tailcfg.UserID
- Domain string
- // TODO(crawshaw): reduce UserProfiles to []tailcfg.UserProfile?
- // There are lots of ways to slice this data, leave it up to users.
- UserProfiles map[tailcfg.UserID]tailcfg.UserProfile
- Roles []tailcfg.Role
- // TODO(crawshaw): Groups []tailcfg.Group
- // TODO(crawshaw): Capabilities []tailcfg.Capability
- }
- func (n *NetworkMap) Equal(n2 *NetworkMap) bool {
- // TODO(crawshaw): this is crude, but is an easy way to avoid bugs.
- b, err := json.Marshal(n)
- if err != nil {
- panic(err)
- }
- b2, err := json.Marshal(n2)
- if err != nil {
- panic(err)
- }
- return bytes.Equal(b, b2)
- }
- func (nm NetworkMap) String() string {
- return nm.Concise()
- }
- func (nm *NetworkMap) Concise() string {
- buf := new(strings.Builder)
- fmt.Fprintf(buf, "netmap: self: %v auth=%v",
- nm.NodeKey.ShortString(), nm.MachineStatus)
- if nm.LocalPort != 0 {
- fmt.Fprintf(buf, " port=%v", nm.LocalPort)
- }
- if nm.Debug != nil {
- j, _ := json.Marshal(nm.Debug)
- fmt.Fprintf(buf, " debug=%s", j)
- }
- fmt.Fprintf(buf, " %v", nm.Addresses)
- buf.WriteByte('\n')
- for _, p := range nm.Peers {
- aip := make([]string, len(p.AllowedIPs))
- for i, a := range p.AllowedIPs {
- s := strings.TrimSuffix(fmt.Sprint(a), "/32")
- aip[i] = s
- }
- ep := make([]string, len(p.Endpoints))
- for i, e := range p.Endpoints {
- // Align vertically on the ':' between IP and port
- colon := strings.IndexByte(e, ':')
- spaces := 0
- for colon > 0 && len(e)+spaces-colon < 6 {
- spaces++
- colon--
- }
- ep[i] = fmt.Sprintf("%21v", e+strings.Repeat(" ", spaces))
- }
- derp := p.DERP
- const derpPrefix = "127.3.3.40:"
- if strings.HasPrefix(derp, derpPrefix) {
- derp = "D" + derp[len(derpPrefix):]
- }
- // Most of the time, aip is just one element, so format the
- // table to look good in that case. This will also make multi-
- // subnet nodes stand out visually.
- fmt.Fprintf(buf, " %v %-2v %-15v : %v\n",
- p.Key.ShortString(), derp,
- strings.Join(aip, " "),
- strings.Join(ep, " "))
- }
- return buf.String()
- }
- func (b *NetworkMap) ConciseDiffFrom(a *NetworkMap) string {
- if reflect.DeepEqual(a, b) {
- // Fast path that only does one allocation.
- return ""
- }
- out := []string{}
- ra := strings.Split(a.Concise(), "\n")
- rb := strings.Split(b.Concise(), "\n")
- ma := map[string]struct{}{}
- for _, s := range ra {
- ma[s] = struct{}{}
- }
- mb := map[string]struct{}{}
- for _, s := range rb {
- mb[s] = struct{}{}
- }
- for _, s := range ra {
- if _, ok := mb[s]; !ok {
- out = append(out, "-"+s)
- }
- }
- for _, s := range rb {
- if _, ok := ma[s]; !ok {
- out = append(out, "+"+s)
- }
- }
- return strings.Join(out, "\n")
- }
- func (nm *NetworkMap) JSON() string {
- b, err := json.MarshalIndent(*nm, "", " ")
- if err != nil {
- return fmt.Sprintf("[json error: %v]", err)
- }
- return string(b)
- }
- const (
- UAllowSingleHosts = 1 << iota
- UAllowSubnetRoutes
- UAllowDefaultRoute
- UHackDefaultRoute
- UDefault = 0
- )
- // Several programs need to parse these arguments into uflags, so let's
- // centralize it here.
- func UFlagsHelper(uroutes, rroutes, droutes bool) int {
- uflags := 0
- if uroutes {
- uflags |= UAllowSingleHosts
- }
- if rroutes {
- uflags |= UAllowSubnetRoutes
- }
- if droutes {
- uflags |= UAllowDefaultRoute
- }
- return uflags
- }
- // TODO(bradfitz): UAPI seems to only be used by the old confnode and
- // pingnode; delete this when those are deleted/rewritten?
- func (nm *NetworkMap) UAPI(uflags int, dnsOverride []wgcfg.IP) string {
- wgcfg, err := nm.WGCfg(log.Printf, uflags, dnsOverride)
- if err != nil {
- log.Fatalf("WGCfg() failed unexpectedly: %v\n", err)
- }
- s, err := wgcfg.ToUAPI()
- if err != nil {
- log.Fatalf("ToUAPI() failed unexpectedly: %v\n", err)
- }
- return s
- }
- func (nm *NetworkMap) WGCfg(logf logger.Logf, uflags int, dnsOverride []wgcfg.IP) (*wgcfg.Config, error) {
- s := nm._WireGuardConfig(logf, uflags, dnsOverride, true)
- return wgcfg.FromWgQuick(s, "tailscale")
- }
- // EndpointDiscoSuffix is appended to the hex representation of a peer's discovery key
- // and is then the sole wireguard endpoint for peers with a non-zero discovery key.
- // This form is then recognize by magicsock's CreateEndpoint.
- const EndpointDiscoSuffix = ".disco.tailscale:12345"
- func (nm *NetworkMap) _WireGuardConfig(logf logger.Logf, uflags int, dnsOverride []wgcfg.IP, allEndpoints bool) string {
- buf := new(strings.Builder)
- fmt.Fprintf(buf, "[Interface]\n")
- fmt.Fprintf(buf, "PrivateKey = %s\n", base64.StdEncoding.EncodeToString(nm.PrivateKey[:]))
- if len(nm.Addresses) > 0 {
- fmt.Fprintf(buf, "Address = ")
- for i, cidr := range nm.Addresses {
- if i > 0 {
- fmt.Fprintf(buf, ", ")
- }
- fmt.Fprintf(buf, "%s", cidr)
- }
- fmt.Fprintf(buf, "\n")
- }
- fmt.Fprintf(buf, "ListenPort = %d\n", nm.LocalPort)
- if len(dnsOverride) > 0 {
- dnss := []string{}
- for _, ip := range dnsOverride {
- dnss = append(dnss, ip.String())
- }
- fmt.Fprintf(buf, "DNS = %s\n", strings.Join(dnss, ","))
- }
- fmt.Fprintf(buf, "\n")
- for i, peer := range nm.Peers {
- if Debug.OnlyDisco && peer.DiscoKey.IsZero() {
- continue
- }
- if (uflags&UAllowSingleHosts) == 0 && len(peer.AllowedIPs) < 2 {
- logf("wgcfg: %v skipping a single-host peer.\n", peer.Key.ShortString())
- continue
- }
- if i > 0 {
- fmt.Fprintf(buf, "\n")
- }
- fmt.Fprintf(buf, "[Peer]\n")
- fmt.Fprintf(buf, "PublicKey = %s\n", base64.StdEncoding.EncodeToString(peer.Key[:]))
- var endpoints []string
- if !peer.DiscoKey.IsZero() {
- fmt.Fprintf(buf, "Endpoint = %x%s\n", peer.DiscoKey[:], EndpointDiscoSuffix)
- } else {
- if peer.DERP != "" {
- endpoints = append(endpoints, peer.DERP)
- }
- endpoints = append(endpoints, peer.Endpoints...)
- if len(endpoints) > 0 {
- if len(endpoints) == 1 {
- fmt.Fprintf(buf, "Endpoint = %s", endpoints[0])
- } else if allEndpoints {
- // TODO(apenwarr): This mode is incompatible.
- // Normal wireguard clients don't know how to
- // parse it (yet?)
- fmt.Fprintf(buf, "Endpoint = %s", strings.Join(endpoints, ","))
- } else {
- fmt.Fprintf(buf, "Endpoint = %s # other endpoints: %s",
- endpoints[0],
- strings.Join(endpoints[1:], ", "))
- }
- buf.WriteByte('\n')
- }
- }
- var aips []string
- for _, allowedIP := range peer.AllowedIPs {
- aip := allowedIP.String()
- if allowedIP.Mask == 0 {
- if (uflags & UAllowDefaultRoute) == 0 {
- logf("wgcfg: %v skipping default route\n", peer.Key.ShortString())
- continue
- }
- if (uflags & UHackDefaultRoute) != 0 {
- aip = "10.0.0.0/8"
- logf("wgcfg: %v converting default route => %v\n", peer.Key.ShortString(), aip)
- }
- } else if allowedIP.Mask < 32 {
- if (uflags & UAllowSubnetRoutes) == 0 {
- logf("wgcfg: %v skipping subnet route\n", peer.Key.ShortString())
- continue
- }
- }
- aips = append(aips, aip)
- }
- fmt.Fprintf(buf, "AllowedIPs = %s\n", strings.Join(aips, ", "))
- if peer.KeepAlive {
- fmt.Fprintf(buf, "PersistentKeepalive = 25\n")
- }
- }
- return buf.String()
- }
|