peers.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. package functions
  2. import (
  3. "fmt"
  4. "time"
  5. "context"
  6. "io"
  7. "strings"
  8. "log"
  9. "net"
  10. "strconv"
  11. "github.com/gravitl/netmaker/netclient/config"
  12. nodepb "github.com/gravitl/netmaker/grpc"
  13. "google.golang.org/grpc"
  14. "google.golang.org/grpc/metadata"
  15. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  16. //homedir "github.com/mitchellh/go-homedir"
  17. )
  18. func getPeers(macaddress string, network string, server string, dualstack bool, isIngressGateway bool) ([]wgtypes.PeerConfig, bool, []string, error) {
  19. //need to implement checkin on server side
  20. hasGateway := false
  21. var gateways []string
  22. var peers []wgtypes.PeerConfig
  23. var wcclient nodepb.NodeServiceClient
  24. cfg, err := config.ReadConfig(network)
  25. if err != nil {
  26. log.Fatalf("Issue retrieving config for network: " + network + ". Please investigate: %v", err)
  27. }
  28. nodecfg := cfg.Node
  29. keepalive := nodecfg.KeepAlive
  30. keepalivedur, err := time.ParseDuration(strconv.FormatInt(int64(keepalive), 10) + "s")
  31. if err != nil {
  32. log.Fatalf("Issue with format of keepalive value. Please update netconfig: %v", err)
  33. }
  34. fmt.Println("Registering with GRPC Server")
  35. requestOpts := grpc.WithInsecure()
  36. conn, err := grpc.Dial(server, requestOpts)
  37. if err != nil {
  38. log.Fatalf("Unable to establish client connection to localhost:50051: %v", err)
  39. }
  40. // Instantiate the BlogServiceClient with our client connection to the server
  41. wcclient = nodepb.NewNodeServiceClient(conn)
  42. req := &nodepb.GetPeersReq{
  43. Macaddress: macaddress,
  44. Network: network,
  45. }
  46. ctx := context.Background()
  47. fmt.Println("Authenticating with GRPC Server")
  48. ctx, err = SetJWT(wcclient, network)
  49. if err != nil {
  50. fmt.Println("Failed to authenticate.")
  51. return peers, hasGateway, gateways, err
  52. }
  53. var header metadata.MD
  54. stream, err := wcclient.GetPeers(ctx, req, grpc.Header(&header))
  55. if err != nil {
  56. fmt.Println("Error retrieving peers")
  57. fmt.Println(err)
  58. return nil, hasGateway, gateways, err
  59. }
  60. fmt.Println("Parsing peers response")
  61. for {
  62. res, err := stream.Recv()
  63. // If end of stream, break the loop
  64. if err == io.EOF {
  65. break
  66. }
  67. // if err, return an error
  68. if err != nil {
  69. if strings.Contains(err.Error(), "mongo: no documents in result") {
  70. continue
  71. } else {
  72. fmt.Println("ERROR ENCOUNTERED WITH RESPONSE")
  73. fmt.Println(res)
  74. return peers, hasGateway, gateways, err
  75. }
  76. }
  77. pubkey, err := wgtypes.ParseKey(res.Peers.Publickey)
  78. if err != nil {
  79. fmt.Println("error parsing key")
  80. return peers, hasGateway, gateways, err
  81. }
  82. if nodecfg.PublicKey == res.Peers.Publickey {
  83. fmt.Println("Peer is self. Skipping")
  84. continue
  85. }
  86. if nodecfg.Endpoint == res.Peers.Endpoint {
  87. fmt.Println("Peer is self. Skipping")
  88. continue
  89. }
  90. var peer wgtypes.PeerConfig
  91. var peeraddr = net.IPNet{
  92. IP: net.ParseIP(res.Peers.Address),
  93. Mask: net.CIDRMask(32, 32),
  94. }
  95. var allowedips []net.IPNet
  96. allowedips = append(allowedips, peeraddr)
  97. if res.Peers.Isegressgateway {
  98. hasGateway = true
  99. gateways = append(gateways,res.Peers.Egressgatewayrange)
  100. _, ipnet, err := net.ParseCIDR(res.Peers.Egressgatewayrange)
  101. if err != nil {
  102. fmt.Println("ERROR ENCOUNTERED SETTING GATEWAY")
  103. fmt.Println("NOT SETTING GATEWAY")
  104. fmt.Println(err)
  105. } else {
  106. fmt.Println(" Gateway Range: " + res.Peers.Egressgatewayrange)
  107. allowedips = append(allowedips, *ipnet)
  108. }
  109. }
  110. if res.Peers.Address6 != "" && dualstack {
  111. var addr6 = net.IPNet{
  112. IP: net.ParseIP(res.Peers.Address6),
  113. Mask: net.CIDRMask(128, 128),
  114. }
  115. allowedips = append(allowedips, addr6)
  116. }
  117. if keepalive != 0 {
  118. peer = wgtypes.PeerConfig{
  119. PublicKey: pubkey,
  120. PersistentKeepaliveInterval: &keepalivedur,
  121. Endpoint: &net.UDPAddr{
  122. IP: net.ParseIP(res.Peers.Endpoint),
  123. Port: int(res.Peers.Listenport),
  124. },
  125. ReplaceAllowedIPs: true,
  126. AllowedIPs: allowedips,
  127. }
  128. } else {
  129. peer = wgtypes.PeerConfig{
  130. PublicKey: pubkey,
  131. Endpoint: &net.UDPAddr{
  132. IP: net.ParseIP(res.Peers.Endpoint),
  133. Port: int(res.Peers.Listenport),
  134. },
  135. ReplaceAllowedIPs: true,
  136. AllowedIPs: allowedips,
  137. }
  138. }
  139. peers = append(peers, peer)
  140. }
  141. if isIngressGateway {
  142. fmt.Println("Adding external peers...")
  143. extPeers, err := getExtPeers(macaddress, network, server, dualstack)
  144. if err == nil {
  145. peers = append(peers, extPeers...)
  146. fmt.Println("Added " + strconv.Itoa(len(extPeers)) + " external clients.")
  147. } else {
  148. fmt.Println("ERROR RETRIEVING EXTERNAL PEERS")
  149. fmt.Println(err)
  150. }
  151. }
  152. fmt.Println("Finished parsing peers response")
  153. return peers, hasGateway, gateways, err
  154. }
  155. func getExtPeers(macaddress string, network string, server string, dualstack bool) ([]wgtypes.PeerConfig, error) {
  156. var peers []wgtypes.PeerConfig
  157. var wcclient nodepb.NodeServiceClient
  158. cfg, err := config.ReadConfig(network)
  159. if err != nil {
  160. log.Fatalf("Issue retrieving config for network: " + network + ". Please investigate: %v", err)
  161. }
  162. nodecfg := cfg.Node
  163. keepalive := nodecfg.KeepAlive
  164. keepalivedur, err := time.ParseDuration(strconv.FormatInt(int64(keepalive), 10) + "s")
  165. if err != nil {
  166. log.Fatalf("Issue with format of keepalive value. Please update netconfig: %v", err)
  167. }
  168. fmt.Println("Registering with GRPC Server")
  169. requestOpts := grpc.WithInsecure()
  170. conn, err := grpc.Dial(server, requestOpts)
  171. if err != nil {
  172. log.Fatalf("Unable to establish client connection to localhost:50051: %v", err)
  173. }
  174. // Instantiate the BlogServiceClient with our client connection to the server
  175. wcclient = nodepb.NewNodeServiceClient(conn)
  176. req := &nodepb.GetExtPeersReq{
  177. Macaddress: macaddress,
  178. Network: network,
  179. }
  180. ctx := context.Background()
  181. fmt.Println("Authenticating with GRPC Server")
  182. ctx, err = SetJWT(wcclient, network)
  183. if err != nil {
  184. fmt.Println("Failed to authenticate.")
  185. return peers, err
  186. }
  187. var header metadata.MD
  188. stream, err := wcclient.GetExtPeers(ctx, req, grpc.Header(&header))
  189. if err != nil {
  190. fmt.Println("Error retrieving peers")
  191. fmt.Println(err)
  192. return nil, err
  193. }
  194. fmt.Println("Parsing peers response")
  195. for {
  196. res, err := stream.Recv()
  197. // If end of stream, break the loop
  198. if err == io.EOF {
  199. break
  200. }
  201. // if err, return an error
  202. if err != nil {
  203. if strings.Contains(err.Error(), "mongo: no documents in result") {
  204. continue
  205. } else {
  206. fmt.Println("ERROR ENCOUNTERED WITH RESPONSE")
  207. fmt.Println(res)
  208. return peers, err
  209. }
  210. }
  211. pubkey, err := wgtypes.ParseKey(res.Extpeers.Publickey)
  212. if err != nil {
  213. fmt.Println("error parsing key")
  214. return peers, err
  215. }
  216. if nodecfg.PublicKey == res.Extpeers.Publickey {
  217. fmt.Println("Peer is self. Skipping")
  218. continue
  219. }
  220. if nodecfg.Endpoint == res.Extpeers.Endpoint {
  221. fmt.Println("Peer is self. Skipping")
  222. continue
  223. }
  224. var peer wgtypes.PeerConfig
  225. var peeraddr = net.IPNet{
  226. IP: net.ParseIP(res.Extpeers.Address),
  227. Mask: net.CIDRMask(32, 32),
  228. }
  229. var allowedips []net.IPNet
  230. allowedips = append(allowedips, peeraddr)
  231. if res.Extpeers.Address6 != "" && dualstack {
  232. var addr6 = net.IPNet{
  233. IP: net.ParseIP(res.Extpeers.Address6),
  234. Mask: net.CIDRMask(128, 128),
  235. }
  236. allowedips = append(allowedips, addr6)
  237. }
  238. if keepalive != 0 {
  239. peer = wgtypes.PeerConfig{
  240. PublicKey: pubkey,
  241. PersistentKeepaliveInterval: &keepalivedur,
  242. Endpoint: &net.UDPAddr{
  243. IP: net.ParseIP(res.Extpeers.Endpoint),
  244. Port: int(res.Extpeers.Listenport),
  245. },
  246. ReplaceAllowedIPs: true,
  247. AllowedIPs: allowedips,
  248. }
  249. } else {
  250. peer = wgtypes.PeerConfig{
  251. PublicKey: pubkey,
  252. Endpoint: &net.UDPAddr{
  253. IP: net.ParseIP(res.Extpeers.Endpoint),
  254. Port: int(res.Extpeers.Listenport),
  255. },
  256. ReplaceAllowedIPs: true,
  257. AllowedIPs: allowedips,
  258. }
  259. }
  260. peers = append(peers, peer)
  261. }
  262. return peers, err
  263. }