proxy_helper.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. package proxy
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "log"
  7. "net"
  8. "runtime"
  9. "strings"
  10. "sync"
  11. "time"
  12. "github.com/c-robinson/iplib"
  13. "github.com/google/uuid"
  14. "github.com/gravitl/netmaker/nm-proxy/common"
  15. "github.com/gravitl/netmaker/nm-proxy/metrics"
  16. "github.com/gravitl/netmaker/nm-proxy/models"
  17. "github.com/gravitl/netmaker/nm-proxy/packet"
  18. "github.com/gravitl/netmaker/nm-proxy/server"
  19. "github.com/gravitl/netmaker/nm-proxy/stun"
  20. "github.com/gravitl/netmaker/nm-proxy/wg"
  21. )
  22. func NewProxy(config models.ProxyConfig) *Proxy {
  23. p := &Proxy{Config: config}
  24. p.Ctx, p.Cancel = context.WithCancel(context.Background())
  25. return p
  26. }
  27. func (p *Proxy) proxyToRemote(wg *sync.WaitGroup) {
  28. ticker := time.NewTicker(time.Minute)
  29. defer ticker.Stop()
  30. buf := make([]byte, 65000)
  31. defer wg.Done()
  32. for {
  33. select {
  34. case <-p.Ctx.Done():
  35. return
  36. default:
  37. n, err := p.LocalConn.Read(buf)
  38. if err != nil {
  39. log.Println("ERRR READ: ", err)
  40. continue
  41. }
  42. // if _, found := common.GetPeer(p.Config.RemoteKey); !found {
  43. // log.Printf("Peer: %s not found in config\n", p.Config.RemoteKey)
  44. // p.Close()
  45. // return
  46. // }
  47. go func(n int, peerKey string) {
  48. metrics.MetricsMapLock.Lock()
  49. metric := metrics.MetricsMap[peerKey]
  50. metric.TrafficSent += float64(n) / (1 << 20)
  51. metrics.MetricsMap[peerKey] = metric
  52. metrics.MetricsMapLock.Unlock()
  53. }(n, p.Config.RemoteKey.String())
  54. //var srcPeerKeyHash, dstPeerKeyHash string
  55. if !p.Config.IsExtClient {
  56. buf, n, _, _ = packet.ProcessPacketBeforeSending(buf, n, p.Config.WgInterface.Device.PublicKey.String(), p.Config.RemoteKey.String())
  57. if err != nil {
  58. log.Println("failed to process pkt before sending: ", err)
  59. }
  60. }
  61. // log.Printf("PROXING TO REMOTE!!!---> %s >>>>> %s >>>>> %s [[ SrcPeerHash: %s, DstPeerHash: %s ]]\n",
  62. // p.LocalConn.LocalAddr(), server.NmProxyServer.Server.LocalAddr().String(), p.RemoteConn.String(), srcPeerKeyHash, dstPeerKeyHash)
  63. _, err = server.NmProxyServer.Server.WriteToUDP(buf[:n], p.RemoteConn)
  64. if err != nil {
  65. log.Println("Failed to send to remote: ", err)
  66. }
  67. }
  68. }
  69. }
  70. func (p *Proxy) Reset() {
  71. p.Close()
  72. if err := p.pullLatestConfig(); err != nil {
  73. log.Println("couldn't perform reset: ", err)
  74. return
  75. }
  76. p.Start()
  77. }
  78. func (p *Proxy) pullLatestConfig() error {
  79. peer, found := common.GetPeer(p.Config.RemoteKey)
  80. if found {
  81. p.Config.PeerEndpoint.Port = peer.Config.PeerEndpoint.Port
  82. } else {
  83. return errors.New("peer not found")
  84. }
  85. return nil
  86. }
  87. func (p *Proxy) startMetricsThread(wg *sync.WaitGroup, rTicker *time.Ticker) {
  88. ticker := time.NewTicker(time.Minute)
  89. defer ticker.Stop()
  90. defer wg.Done()
  91. for {
  92. select {
  93. case <-p.Ctx.Done():
  94. return
  95. case <-ticker.C:
  96. metrics.MetricsMapLock.Lock()
  97. metric := metrics.MetricsMap[p.Config.RemoteKey.String()]
  98. if metric.ConnectionStatus {
  99. rTicker.Reset(*p.Config.PersistentKeepalive)
  100. }
  101. metric.ConnectionStatus = false
  102. metrics.MetricsMap[p.Config.RemoteKey.String()] = metric
  103. metrics.MetricsMapLock.Unlock()
  104. pkt, err := packet.CreateMetricPacket(uuid.New().ID(), p.Config.LocalKey, p.Config.RemoteKey)
  105. if err == nil {
  106. log.Printf("-----------> ##### $$$$$ SENDING METRIC PACKET TO: %s\n", p.RemoteConn.String())
  107. _, err = server.NmProxyServer.Server.WriteToUDP(pkt, p.RemoteConn)
  108. if err != nil {
  109. log.Println("Failed to send to metric pkt: ", err)
  110. }
  111. }
  112. }
  113. }
  114. }
  115. func (p *Proxy) peerUpdates(wg *sync.WaitGroup, ticker *time.Ticker) {
  116. defer wg.Done()
  117. for {
  118. select {
  119. case <-p.Ctx.Done():
  120. return
  121. case <-ticker.C:
  122. // send listen port packet
  123. m := &packet.ProxyUpdateMessage{
  124. Type: packet.MessageProxyType,
  125. Action: packet.UpdateListenPort,
  126. Sender: p.Config.LocalKey,
  127. Reciever: p.Config.RemoteKey,
  128. ListenPort: uint32(stun.Host.PrivPort),
  129. }
  130. pkt, err := packet.CreateProxyUpdatePacket(m)
  131. if err == nil {
  132. log.Printf("-----------> ##### $$$$$ SENDING Proxy Update PACKET TO: %s\n", p.RemoteConn.String())
  133. _, err = server.NmProxyServer.Server.WriteToUDP(pkt, p.RemoteConn)
  134. if err != nil {
  135. log.Println("Failed to send to metric pkt: ", err)
  136. }
  137. }
  138. }
  139. }
  140. }
  141. // ProxyPeer proxies everything from Wireguard to the RemoteKey peer and vice-versa
  142. func (p *Proxy) ProxyPeer() {
  143. ticker := time.NewTicker(*p.Config.PersistentKeepalive)
  144. defer ticker.Stop()
  145. wg := &sync.WaitGroup{}
  146. wg.Add(1)
  147. go p.proxyToRemote(wg)
  148. // if common.BehindNAT {
  149. wg.Add(1)
  150. go p.startMetricsThread(wg, ticker)
  151. wg.Add(1)
  152. go p.peerUpdates(wg, ticker)
  153. // }
  154. wg.Wait()
  155. }
  156. func test(n int, buffer []byte) {
  157. data := buffer[:n]
  158. srcKeyHash := data[n-32 : n-16]
  159. dstKeyHash := data[n-16:]
  160. log.Printf("--------> TEST PACKET [ SRCKEYHASH: %x ], [ DSTKEYHASH: %x ] \n", srcKeyHash, dstKeyHash)
  161. }
  162. func (p *Proxy) updateEndpoint() error {
  163. udpAddr, err := net.ResolveUDPAddr("udp", p.LocalConn.LocalAddr().String())
  164. if err != nil {
  165. return err
  166. }
  167. // add local proxy connection as a Wireguard peer
  168. log.Printf("---> ####### Updating Peer: %+v\n", p.Config.PeerConf)
  169. err = p.Config.WgInterface.UpdatePeer(p.Config.RemoteKey.String(), p.Config.PeerConf.AllowedIPs, wg.DefaultWgKeepAlive,
  170. udpAddr, p.Config.PeerConf.PresharedKey)
  171. if err != nil {
  172. return err
  173. }
  174. return nil
  175. }
  176. func GetFreeIp(cidrAddr string, dstPort int) (string, error) {
  177. //ensure AddressRange is valid
  178. if dstPort == 0 {
  179. return "", errors.New("dst port should be set")
  180. }
  181. if _, _, err := net.ParseCIDR(cidrAddr); err != nil {
  182. log.Println("UniqueAddress encountered an error")
  183. return "", err
  184. }
  185. net4 := iplib.Net4FromStr(cidrAddr)
  186. newAddrs := net4.FirstAddress()
  187. for {
  188. if runtime.GOOS == "darwin" {
  189. _, err := common.RunCmd(fmt.Sprintf("ifconfig lo0 alias %s 255.255.255.255", newAddrs.String()), true)
  190. if err != nil {
  191. log.Println("Failed to add alias: ", err)
  192. }
  193. }
  194. conn, err := net.DialUDP("udp", &net.UDPAddr{
  195. IP: net.ParseIP(newAddrs.String()),
  196. Port: models.NmProxyPort,
  197. }, &net.UDPAddr{
  198. IP: net.ParseIP("127.0.0.1"),
  199. Port: dstPort,
  200. })
  201. if err != nil {
  202. log.Println("----> GetFreeIP ERR: ", err)
  203. if strings.Contains(err.Error(), "can't assign requested address") ||
  204. strings.Contains(err.Error(), "address already in use") || strings.Contains(err.Error(), "cannot assign requested address") {
  205. var nErr error
  206. newAddrs, nErr = net4.NextIP(newAddrs)
  207. if nErr != nil {
  208. return "", nErr
  209. }
  210. } else {
  211. return "", err
  212. }
  213. }
  214. if err == nil {
  215. conn.Close()
  216. return newAddrs.String(), nil
  217. }
  218. }
  219. }