route.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233
  1. package overlay
  2. import (
  3. "fmt"
  4. "math"
  5. "net"
  6. "runtime"
  7. "strconv"
  8. "github.com/slackhq/nebula/cidr"
  9. "github.com/slackhq/nebula/config"
  10. )
  11. type Route struct {
  12. MTU int
  13. Metric int
  14. Cidr *net.IPNet
  15. Via *net.IP
  16. }
  17. func makeRouteTree(routes []Route, allowMTU bool) (*cidr.Tree4, error) {
  18. routeTree := cidr.NewTree4()
  19. for _, r := range routes {
  20. if !allowMTU && r.MTU > 0 {
  21. return nil, fmt.Errorf("route MTU is not supported in %s", runtime.GOOS)
  22. }
  23. if r.Via != nil {
  24. routeTree.AddCIDR(r.Cidr, r.Via)
  25. }
  26. }
  27. return routeTree, nil
  28. }
  29. func parseRoutes(c *config.C, network *net.IPNet) ([]Route, error) {
  30. var err error
  31. r := c.Get("tun.routes")
  32. if r == nil {
  33. return []Route{}, nil
  34. }
  35. rawRoutes, ok := r.([]interface{})
  36. if !ok {
  37. return nil, fmt.Errorf("tun.routes is not an array")
  38. }
  39. if len(rawRoutes) < 1 {
  40. return []Route{}, nil
  41. }
  42. routes := make([]Route, len(rawRoutes))
  43. for i, r := range rawRoutes {
  44. m, ok := r.(map[interface{}]interface{})
  45. if !ok {
  46. return nil, fmt.Errorf("entry %v in tun.routes is invalid", i+1)
  47. }
  48. rMtu, ok := m["mtu"]
  49. if !ok {
  50. return nil, fmt.Errorf("entry %v.mtu in tun.routes is not present", i+1)
  51. }
  52. mtu, ok := rMtu.(int)
  53. if !ok {
  54. mtu, err = strconv.Atoi(rMtu.(string))
  55. if err != nil {
  56. return nil, fmt.Errorf("entry %v.mtu in tun.routes is not an integer: %v", i+1, err)
  57. }
  58. }
  59. if mtu < 500 {
  60. return nil, fmt.Errorf("entry %v.mtu in tun.routes is below 500: %v", i+1, mtu)
  61. }
  62. rRoute, ok := m["route"]
  63. if !ok {
  64. return nil, fmt.Errorf("entry %v.route in tun.routes is not present", i+1)
  65. }
  66. r := Route{
  67. MTU: mtu,
  68. }
  69. _, r.Cidr, err = net.ParseCIDR(fmt.Sprintf("%v", rRoute))
  70. if err != nil {
  71. return nil, fmt.Errorf("entry %v.route in tun.routes failed to parse: %v", i+1, err)
  72. }
  73. if !ipWithin(network, r.Cidr) {
  74. return nil, fmt.Errorf(
  75. "entry %v.route in tun.routes is not contained within the network attached to the certificate; route: %v, network: %v",
  76. i+1,
  77. r.Cidr.String(),
  78. network.String(),
  79. )
  80. }
  81. routes[i] = r
  82. }
  83. return routes, nil
  84. }
  85. func parseUnsafeRoutes(c *config.C, network *net.IPNet) ([]Route, error) {
  86. var err error
  87. r := c.Get("tun.unsafe_routes")
  88. if r == nil {
  89. return []Route{}, nil
  90. }
  91. rawRoutes, ok := r.([]interface{})
  92. if !ok {
  93. return nil, fmt.Errorf("tun.unsafe_routes is not an array")
  94. }
  95. if len(rawRoutes) < 1 {
  96. return []Route{}, nil
  97. }
  98. routes := make([]Route, len(rawRoutes))
  99. for i, r := range rawRoutes {
  100. m, ok := r.(map[interface{}]interface{})
  101. if !ok {
  102. return nil, fmt.Errorf("entry %v in tun.unsafe_routes is invalid", i+1)
  103. }
  104. rMtu, ok := m["mtu"]
  105. if !ok {
  106. rMtu = c.GetInt("tun.mtu", DefaultMTU)
  107. }
  108. mtu, ok := rMtu.(int)
  109. if !ok {
  110. mtu, err = strconv.Atoi(rMtu.(string))
  111. if err != nil {
  112. return nil, fmt.Errorf("entry %v.mtu in tun.unsafe_routes is not an integer: %v", i+1, err)
  113. }
  114. }
  115. if mtu < 500 {
  116. return nil, fmt.Errorf("entry %v.mtu in tun.unsafe_routes is below 500: %v", i+1, mtu)
  117. }
  118. rMetric, ok := m["metric"]
  119. if !ok {
  120. rMetric = 0
  121. }
  122. metric, ok := rMetric.(int)
  123. if !ok {
  124. _, err = strconv.ParseInt(rMetric.(string), 10, 32)
  125. if err != nil {
  126. return nil, fmt.Errorf("entry %v.metric in tun.unsafe_routes is not an integer: %v", i+1, err)
  127. }
  128. }
  129. if metric < 0 || metric > math.MaxInt32 {
  130. return nil, fmt.Errorf("entry %v.metric in tun.unsafe_routes is not in range (0-%d) : %v", i+1, math.MaxInt32, metric)
  131. }
  132. rVia, ok := m["via"]
  133. if !ok {
  134. return nil, fmt.Errorf("entry %v.via in tun.unsafe_routes is not present", i+1)
  135. }
  136. via, ok := rVia.(string)
  137. if !ok {
  138. return nil, fmt.Errorf("entry %v.via in tun.unsafe_routes is not a string: found %T", i+1, rVia)
  139. }
  140. nVia := net.ParseIP(via)
  141. if nVia == nil {
  142. return nil, fmt.Errorf("entry %v.via in tun.unsafe_routes failed to parse address: %v", i+1, via)
  143. }
  144. rRoute, ok := m["route"]
  145. if !ok {
  146. return nil, fmt.Errorf("entry %v.route in tun.unsafe_routes is not present", i+1)
  147. }
  148. r := Route{
  149. Via: &nVia,
  150. MTU: mtu,
  151. Metric: metric,
  152. }
  153. _, r.Cidr, err = net.ParseCIDR(fmt.Sprintf("%v", rRoute))
  154. if err != nil {
  155. return nil, fmt.Errorf("entry %v.route in tun.unsafe_routes failed to parse: %v", i+1, err)
  156. }
  157. if ipWithin(network, r.Cidr) {
  158. return nil, fmt.Errorf(
  159. "entry %v.route in tun.unsafe_routes is contained within the network attached to the certificate; route: %v, network: %v",
  160. i+1,
  161. r.Cidr.String(),
  162. network.String(),
  163. )
  164. }
  165. routes[i] = r
  166. }
  167. return routes, nil
  168. }
  169. func ipWithin(o *net.IPNet, i *net.IPNet) bool {
  170. // Make sure o contains the lowest form of i
  171. if !o.Contains(i.IP.Mask(i.Mask)) {
  172. return false
  173. }
  174. // Find the max ip in i
  175. ip4 := i.IP.To4()
  176. if ip4 == nil {
  177. return false
  178. }
  179. last := make(net.IP, len(ip4))
  180. copy(last, ip4)
  181. for x := range ip4 {
  182. last[x] |= ^i.Mask[x]
  183. }
  184. // Make sure o contains the max
  185. if !o.Contains(last) {
  186. return false
  187. }
  188. return true
  189. }