peers.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696
  1. package logic
  2. import (
  3. "errors"
  4. "net"
  5. "net/netip"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic/acls/nodeacls"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/servercfg"
  11. "golang.org/x/exp/slices"
  12. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  13. )
  14. // NodePeersInfo - fetches node's peers with their ids and addrs.
  15. func NodePeersInfo(client *models.Client) (models.NodePeersInfo, error) {
  16. nodePeersInfo := models.NodePeersInfo{
  17. PeerIDs: make(models.PeerMap),
  18. Peers: []wgtypes.PeerConfig{},
  19. }
  20. nodes, err := GetNetworkNodes(client.Node.Network)
  21. if err != nil {
  22. return models.NodePeersInfo{}, err
  23. }
  24. for _, peer := range nodes {
  25. if peer.ID == client.Node.ID {
  26. continue
  27. }
  28. if (client.Node.IsRelayed && client.Node.RelayedBy != peer.ID.String()) ||
  29. (peer.IsRelayed && peer.RelayedBy != client.Node.ID.String()) ||
  30. ShouldRemovePeer(client.Node, peer) {
  31. continue
  32. }
  33. peerHost, err := GetHost(peer.HostID.String())
  34. if err != nil {
  35. continue
  36. }
  37. var peerConfig wgtypes.PeerConfig
  38. peerConfig.PublicKey = peerHost.PublicKey
  39. peerConfig.PersistentKeepaliveInterval = &peer.PersistentKeepalive
  40. peerConfig.ReplaceAllowedIPs = true
  41. uselocal := false
  42. if client.Host.EndpointIP.String() == peerHost.EndpointIP.String() {
  43. // peer is on same network
  44. // set to localaddress
  45. uselocal = true
  46. if client.Node.LocalAddress.IP == nil {
  47. // use public endpint
  48. uselocal = false
  49. }
  50. if client.Node.LocalAddress.String() == peer.LocalAddress.String() {
  51. uselocal = false
  52. }
  53. }
  54. peerConfig.Endpoint = &net.UDPAddr{
  55. IP: peerHost.EndpointIP,
  56. Port: getPeerWgListenPort(peerHost),
  57. }
  58. if uselocal {
  59. peerConfig.Endpoint.IP = peer.LocalAddress.IP
  60. peerConfig.Endpoint.Port = peerHost.ListenPort
  61. }
  62. allowedips := GetNetworkAllowedIPs(*client, models.Client{Host: *peerHost, Node: peer})
  63. peerConfig.AllowedIPs = allowedips
  64. nodePeersInfo.Peers = append(nodePeersInfo.Peers, peerConfig)
  65. nodePeersInfo.PeerIDs[peerHost.PublicKey.String()] = models.IDandAddr{
  66. ID: peer.ID.String(),
  67. Address: peer.Address.IP.String(),
  68. Name: peerHost.Name,
  69. Network: peer.Network,
  70. ListenPort: GetPeerListenPort(peerHost),
  71. }
  72. }
  73. if client.Node.IsIngressGateway {
  74. extPeers, extPeerIDAndAddrs, err := GetExtPeers(&client.Node)
  75. if err == nil {
  76. nodePeersInfo.Peers = append(nodePeersInfo.Peers, extPeers...)
  77. for _, extPeerIdAndAddr := range extPeerIDAndAddrs {
  78. extPeerIdAndAddr := extPeerIdAndAddr
  79. nodePeersInfo.PeerIDs[extPeerIdAndAddr.ID] = extPeerIdAndAddr
  80. }
  81. } else if !database.IsEmptyRecord(err) {
  82. logger.Log(1, "error retrieving external clients:", err.Error())
  83. }
  84. }
  85. return nodePeersInfo, nil
  86. }
  87. // GetPeerUpdateForHost - gets the consolidated peer update for the host from all networks
  88. func GetPeerUpdateForHost(host *models.Host, allNodes []models.Node) (models.HostPeerUpdate, error) {
  89. if host == nil {
  90. return models.HostPeerUpdate{}, errors.New("host is nil")
  91. }
  92. // track which nodes are deleted
  93. // after peer calculation, if peer not in list, add delete config of peer
  94. hostPeerUpdate := models.HostPeerUpdate{
  95. Host: *host,
  96. Server: servercfg.GetServer(),
  97. ServerVersion: servercfg.GetVersion(),
  98. Peers: []wgtypes.PeerConfig{},
  99. HostNetworkInfo: models.HostInfoMap{},
  100. }
  101. logger.Log(1, "peer update for host", host.ID.String())
  102. peerIndexMap := make(map[string]int)
  103. for _, nodeID := range host.Nodes {
  104. nodeID := nodeID
  105. node, err := GetNodeByID(nodeID)
  106. if err != nil {
  107. continue
  108. }
  109. if !node.Connected || node.PendingDelete || node.Action == models.NODE_DELETE {
  110. continue
  111. }
  112. currentPeers := GetNetworkNodesMemory(allNodes, node.Network)
  113. for _, peer := range currentPeers {
  114. peer := peer
  115. if peer.ID.String() == node.ID.String() {
  116. logger.Log(2, "peer update, skipping self")
  117. //skip yourself
  118. continue
  119. }
  120. peerHost, err := GetHost(peer.HostID.String())
  121. if err != nil {
  122. logger.Log(1, "no peer host", peer.HostID.String(), err.Error())
  123. return models.HostPeerUpdate{}, err
  124. }
  125. peerConfig := wgtypes.PeerConfig{
  126. PublicKey: peerHost.PublicKey,
  127. PersistentKeepaliveInterval: &peer.PersistentKeepalive,
  128. ReplaceAllowedIPs: true,
  129. }
  130. if (node.IsRelayed && node.RelayedBy != peer.ID.String()) ||
  131. (peer.IsRelayed && peer.RelayedBy != node.ID.String()) ||
  132. ShouldRemovePeer(node, peer) {
  133. // if node is relayed and peer is not the relay, set remove to true
  134. peerConfig.Remove = true
  135. hostPeerUpdate.Peers = append(hostPeerUpdate.Peers, peerConfig)
  136. peerIndexMap[peerHost.PublicKey.String()] = len(hostPeerUpdate.Peers) - 1
  137. continue
  138. }
  139. uselocal := false
  140. if host.EndpointIP.String() == peerHost.EndpointIP.String() {
  141. // peer is on same network
  142. // set to localaddress
  143. uselocal = true
  144. if node.LocalAddress.IP == nil {
  145. // use public endpint
  146. uselocal = false
  147. }
  148. if node.LocalAddress.String() == peer.LocalAddress.String() {
  149. uselocal = false
  150. }
  151. }
  152. peerConfig.Endpoint = &net.UDPAddr{
  153. IP: peerHost.EndpointIP,
  154. Port: getPeerWgListenPort(peerHost),
  155. }
  156. if uselocal {
  157. peerConfig.Endpoint.IP = peer.LocalAddress.IP
  158. peerConfig.Endpoint.Port = peerHost.ListenPort
  159. }
  160. peerConfig.AllowedIPs = GetNetworkAllowedIPs(models.Client{Host: *host, Node: node}, models.Client{Host: *peerHost, Node: peer})
  161. if _, ok := peerIndexMap[peerHost.PublicKey.String()]; !ok {
  162. hostPeerUpdate.Peers = append(hostPeerUpdate.Peers, peerConfig)
  163. peerIndexMap[peerHost.PublicKey.String()] = len(hostPeerUpdate.Peers) - 1
  164. hostPeerUpdate.HostNetworkInfo[peerHost.PublicKey.String()] = models.HostNetworkInfo{
  165. Interfaces: peerHost.Interfaces,
  166. }
  167. } else {
  168. peerAllowedIPs := hostPeerUpdate.Peers[peerIndexMap[peerHost.PublicKey.String()]].AllowedIPs
  169. peerAllowedIPs = append(peerAllowedIPs, peerConfig.AllowedIPs...)
  170. hostPeerUpdate.Peers[peerIndexMap[peerHost.PublicKey.String()]].Remove = false
  171. hostPeerUpdate.Peers[peerIndexMap[peerHost.PublicKey.String()]].AllowedIPs = peerAllowedIPs
  172. }
  173. }
  174. if node.IsIngressGateway {
  175. extPeers, _, err := GetExtPeers(&node)
  176. if err == nil {
  177. hostPeerUpdate.Peers = append(hostPeerUpdate.Peers, extPeers...)
  178. } else if !database.IsEmptyRecord(err) {
  179. logger.Log(1, "error retrieving external clients:", err.Error())
  180. }
  181. }
  182. }
  183. return hostPeerUpdate, nil
  184. }
  185. func ShouldRemovePeer(node, peer models.Node) (remove bool) {
  186. if peer.Action == models.NODE_DELETE || peer.PendingDelete || !peer.Connected ||
  187. !nodeacls.AreNodesAllowed(nodeacls.NetworkID(node.Network), nodeacls.NodeID(node.ID.String()), nodeacls.NodeID(peer.ID.String())) {
  188. remove = true
  189. }
  190. return
  191. }
  192. // checks if host has a node that is acrting as a gateway
  193. func IsHostActingAsGw(host *models.Host) bool {
  194. for _, nodeID := range host.Nodes {
  195. nodeID := nodeID
  196. node, err := GetNodeByID(nodeID)
  197. if err != nil {
  198. continue
  199. }
  200. if node.IsEgressGateway || node.IsIngressGateway {
  201. return true
  202. }
  203. }
  204. return false
  205. }
  206. // GetFwUpdate - fetches the firewall update for the gateway nodes on the host
  207. func GetFwUpdate(host *models.Host) (models.FwUpdate, error) {
  208. fwUpdate := models.FwUpdate{
  209. IngressInfo: models.IngressInfo{
  210. ExtPeers: make(map[string]models.ExtClientInfo),
  211. },
  212. EgressInfo: make(map[string]models.EgressInfo),
  213. }
  214. allNodes, err := GetAllNodes()
  215. if err != nil {
  216. return fwUpdate, err
  217. }
  218. for _, nodeID := range host.Nodes {
  219. nodeID := nodeID
  220. node, err := GetNodeByID(nodeID)
  221. if err != nil {
  222. continue
  223. }
  224. if !(node.IsEgressGateway || node.IsIngressGateway) {
  225. continue
  226. }
  227. if !node.Connected || node.PendingDelete || node.Action == models.NODE_DELETE {
  228. continue
  229. }
  230. currentPeers := GetNetworkNodesMemory(allNodes, node.Network)
  231. var nodePeerMap map[string]models.PeerRouteInfo
  232. if node.IsIngressGateway || node.IsEgressGateway {
  233. nodePeerMap = make(map[string]models.PeerRouteInfo)
  234. }
  235. for _, peer := range currentPeers {
  236. peer := peer
  237. if peer.ID.String() == node.ID.String() {
  238. logger.Log(2, "fw update, skipping self")
  239. //skip yourself
  240. continue
  241. }
  242. peerHost, err := GetHost(peer.HostID.String())
  243. if err != nil {
  244. logger.Log(1, "no peer host", peer.HostID.String(), err.Error())
  245. continue
  246. }
  247. if node.IsIngressGateway || node.IsEgressGateway {
  248. if peer.IsIngressGateway {
  249. _, extPeerIDAndAddrs, err := GetExtPeers(&peer)
  250. if err == nil {
  251. for _, extPeerIdAndAddr := range extPeerIDAndAddrs {
  252. extPeerIdAndAddr := extPeerIdAndAddr
  253. nodePeerMap[extPeerIdAndAddr.ID] = models.PeerRouteInfo{
  254. PeerAddr: net.IPNet{
  255. IP: net.ParseIP(extPeerIdAndAddr.Address),
  256. Mask: getCIDRMaskFromAddr(extPeerIdAndAddr.Address),
  257. },
  258. PeerKey: extPeerIdAndAddr.ID,
  259. Allow: true,
  260. ID: extPeerIdAndAddr.ID,
  261. }
  262. }
  263. }
  264. }
  265. if node.IsIngressGateway && peer.IsEgressGateway {
  266. fwUpdate.IngressInfo.EgressRanges = append(fwUpdate.IngressInfo.EgressRanges,
  267. peer.EgressGatewayRanges...)
  268. }
  269. nodePeerMap[peerHost.PublicKey.String()] = models.PeerRouteInfo{
  270. PeerAddr: net.IPNet{
  271. IP: net.ParseIP(peer.PrimaryAddress()),
  272. Mask: getCIDRMaskFromAddr(peer.PrimaryAddress()),
  273. },
  274. PeerKey: peerHost.PublicKey.String(),
  275. Allow: true,
  276. ID: peer.ID.String(),
  277. }
  278. }
  279. }
  280. var extPeerIDAndAddrs []models.IDandAddr
  281. if node.IsIngressGateway {
  282. fwUpdate.IsIngressGw = true
  283. _, extPeerIDAndAddrs, err = GetExtPeers(&node)
  284. if err == nil {
  285. for _, extPeerIdAndAddr := range extPeerIDAndAddrs {
  286. extPeerIdAndAddr := extPeerIdAndAddr
  287. nodePeerMap[extPeerIdAndAddr.ID] = models.PeerRouteInfo{
  288. PeerAddr: net.IPNet{
  289. IP: net.ParseIP(extPeerIdAndAddr.Address),
  290. Mask: getCIDRMaskFromAddr(extPeerIdAndAddr.Address),
  291. },
  292. PeerKey: extPeerIdAndAddr.ID,
  293. Allow: true,
  294. ID: extPeerIdAndAddr.ID,
  295. }
  296. }
  297. for _, extPeerIdAndAddr := range extPeerIDAndAddrs {
  298. extPeerIdAndAddr := extPeerIdAndAddr
  299. fwUpdate.IngressInfo.ExtPeers[extPeerIdAndAddr.ID] = models.ExtClientInfo{
  300. Masquerade: true,
  301. IngGwAddr: net.IPNet{
  302. IP: net.ParseIP(node.PrimaryAddress()),
  303. Mask: getCIDRMaskFromAddr(node.PrimaryAddress()),
  304. },
  305. Network: node.PrimaryNetworkRange(),
  306. ExtPeerAddr: net.IPNet{
  307. IP: net.ParseIP(extPeerIdAndAddr.Address),
  308. Mask: getCIDRMaskFromAddr(extPeerIdAndAddr.Address),
  309. },
  310. ExtPeerKey: extPeerIdAndAddr.ID,
  311. Peers: filterNodeMapForClientACLs(extPeerIdAndAddr.ID, node.Network, nodePeerMap),
  312. }
  313. }
  314. } else if !database.IsEmptyRecord(err) {
  315. logger.Log(1, "error retrieving external clients:", err.Error())
  316. }
  317. }
  318. if node.IsEgressGateway {
  319. fwUpdate.IsEgressGw = true
  320. fwUpdate.EgressInfo[node.ID.String()] = models.EgressInfo{
  321. EgressID: node.ID.String(),
  322. Network: node.PrimaryNetworkRange(),
  323. EgressGwAddr: net.IPNet{
  324. IP: net.ParseIP(node.PrimaryAddress()),
  325. Mask: getCIDRMaskFromAddr(node.PrimaryAddress()),
  326. },
  327. GwPeers: nodePeerMap,
  328. EgressGWCfg: node.EgressGatewayRequest,
  329. }
  330. }
  331. }
  332. return fwUpdate, nil
  333. }
  334. // getPeerWgListenPort - fetches the wg listen port for the host
  335. func getPeerWgListenPort(host *models.Host) int {
  336. peerPort := host.ListenPort
  337. if host.WgPublicListenPort != 0 {
  338. peerPort = host.WgPublicListenPort
  339. }
  340. return peerPort
  341. }
  342. // GetPeerListenPort - given a host, retrieve it's appropriate listening port
  343. func GetPeerListenPort(host *models.Host) int {
  344. peerPort := host.ListenPort
  345. if host.WgPublicListenPort != 0 {
  346. peerPort = host.WgPublicListenPort
  347. }
  348. return peerPort
  349. }
  350. func GetExtPeers(node *models.Node) ([]wgtypes.PeerConfig, []models.IDandAddr, error) {
  351. var peers []wgtypes.PeerConfig
  352. var idsAndAddr []models.IDandAddr
  353. extPeers, err := GetNetworkExtClients(node.Network)
  354. if err != nil {
  355. return peers, idsAndAddr, err
  356. }
  357. host, err := GetHost(node.HostID.String())
  358. if err != nil {
  359. return peers, idsAndAddr, err
  360. }
  361. for _, extPeer := range extPeers {
  362. extPeer := extPeer
  363. pubkey, err := wgtypes.ParseKey(extPeer.PublicKey)
  364. if err != nil {
  365. logger.Log(1, "error parsing ext pub key:", err.Error())
  366. continue
  367. }
  368. if host.PublicKey.String() == extPeer.PublicKey ||
  369. extPeer.IngressGatewayID != node.ID.String() || !extPeer.Enabled {
  370. continue
  371. }
  372. var allowedips []net.IPNet
  373. var peer wgtypes.PeerConfig
  374. if extPeer.Address != "" {
  375. var peeraddr = net.IPNet{
  376. IP: net.ParseIP(extPeer.Address),
  377. Mask: net.CIDRMask(32, 32),
  378. }
  379. if peeraddr.IP != nil && peeraddr.Mask != nil {
  380. allowedips = append(allowedips, peeraddr)
  381. }
  382. }
  383. if extPeer.Address6 != "" {
  384. var addr6 = net.IPNet{
  385. IP: net.ParseIP(extPeer.Address6),
  386. Mask: net.CIDRMask(128, 128),
  387. }
  388. if addr6.IP != nil && addr6.Mask != nil {
  389. allowedips = append(allowedips, addr6)
  390. }
  391. }
  392. primaryAddr := extPeer.Address
  393. if primaryAddr == "" {
  394. primaryAddr = extPeer.Address6
  395. }
  396. peer = wgtypes.PeerConfig{
  397. PublicKey: pubkey,
  398. ReplaceAllowedIPs: true,
  399. AllowedIPs: allowedips,
  400. }
  401. peers = append(peers, peer)
  402. idsAndAddr = append(idsAndAddr, models.IDandAddr{
  403. ID: peer.PublicKey.String(),
  404. Name: extPeer.ClientID,
  405. Address: primaryAddr,
  406. IsExtclient: true,
  407. })
  408. }
  409. return peers, idsAndAddr, nil
  410. }
  411. func getNodeByNetworkFromHost(h *models.Host, network string) *models.Node {
  412. for _, nodeID := range h.Nodes {
  413. node, err := GetNodeByID(nodeID)
  414. if err == nil && node.Network == network {
  415. return &node
  416. }
  417. }
  418. return nil
  419. }
  420. // GetAllowedIPs - calculates the wireguard allowedip field for a peer of a node based on the peer and node settings
  421. func GetAllowedIPs(client, peer models.Client) []net.IPNet {
  422. var allowedips []net.IPNet
  423. for _, nodeID := range peer.Host.Nodes {
  424. node, err := GetNodeByID(nodeID)
  425. if err != nil {
  426. continue
  427. }
  428. clientNode := getNodeByNetworkFromHost(&client.Host, node.Network)
  429. if clientNode == nil {
  430. continue
  431. }
  432. client.Node = *clientNode
  433. peer.Node = node
  434. if ShouldRemovePeer(*clientNode, peer.Node) {
  435. continue
  436. }
  437. if peer.Node.Address.IP != nil {
  438. allowed := net.IPNet{
  439. IP: peer.Node.Address.IP,
  440. Mask: net.CIDRMask(32, 32),
  441. }
  442. allowedips = append(allowedips, allowed)
  443. }
  444. if peer.Node.Address6.IP != nil {
  445. allowed := net.IPNet{
  446. IP: peer.Node.Address6.IP,
  447. Mask: net.CIDRMask(128, 128),
  448. }
  449. allowedips = append(allowedips, allowed)
  450. }
  451. // handle egress gateway peers
  452. if peer.Node.IsEgressGateway {
  453. allowedips = append(allowedips, getEgressIPs(peer)...)
  454. }
  455. if peer.Node.IsRelay {
  456. allowedips = append(allowedips, getRelayAllowedIPs(client, peer)...)
  457. }
  458. // handle ingress gateway peers
  459. if peer.Node.IsIngressGateway {
  460. allowedips = append(allowedips, getIngressIPs(peer)...)
  461. }
  462. }
  463. return allowedips
  464. }
  465. // GetNetworkAllowedIPs - calculates the wireguard allowedip field for a peer of a node based on the peer and node settings
  466. func GetNetworkAllowedIPs(client, peer models.Client) []net.IPNet {
  467. var allowedips []net.IPNet
  468. if peer.Node.Address.IP != nil {
  469. allowed := net.IPNet{
  470. IP: peer.Node.Address.IP,
  471. Mask: net.CIDRMask(32, 32),
  472. }
  473. allowedips = append(allowedips, allowed)
  474. }
  475. if peer.Node.Address6.IP != nil {
  476. allowed := net.IPNet{
  477. IP: peer.Node.Address6.IP,
  478. Mask: net.CIDRMask(128, 128),
  479. }
  480. allowedips = append(allowedips, allowed)
  481. }
  482. // handle egress gateway peers
  483. if peer.Node.IsEgressGateway {
  484. egressIPs := getEgressIPs(peer)
  485. allowedips = append(allowedips, egressIPs...)
  486. }
  487. if peer.Node.IsRelay {
  488. allowedips = append(allowedips, getRelayAllowedIPs(client, peer)...)
  489. }
  490. // handle ingress gateway peers
  491. if peer.Node.IsIngressGateway {
  492. allowedips = append(allowedips, getIngressIPs(peer)...)
  493. }
  494. return allowedips
  495. }
  496. // getEgressIPs - gets the egress IPs for a client
  497. func getEgressIPs(client models.Client) []net.IPNet {
  498. //check for internet gateway
  499. internetGateway := false
  500. if slices.Contains(client.Node.EgressGatewayRanges, "0.0.0.0/0") || slices.Contains(client.Node.EgressGatewayRanges, "::/0") {
  501. internetGateway = true
  502. }
  503. allowedips := []net.IPNet{}
  504. for _, iprange := range client.Node.EgressGatewayRanges { // go through each cidr for egress gateway
  505. ip, cidr, err := net.ParseCIDR(iprange) // confirming it's valid cidr
  506. if err != nil {
  507. logger.Log(1, "could not parse gateway IP range. Not adding ", iprange)
  508. continue // if can't parse CIDR
  509. }
  510. cidr.IP = ip
  511. // getting the public ip of node
  512. if cidr.Contains(client.Host.EndpointIP) && !internetGateway { // ensuring egress gateway range does not contain endpoint of node
  513. logger.Log(2, "egress IP range of ", iprange, " overlaps with ", client.Host.EndpointIP.String(), ", omitting")
  514. continue // skip adding egress range if overlaps with node's ip
  515. }
  516. // TODO: Could put in a lot of great logic to avoid conflicts / bad routes
  517. if cidr.Contains(client.Node.LocalAddress.IP) && !internetGateway { // ensuring egress gateway range does not contain public ip of node
  518. logger.Log(2, "egress IP range of ", iprange, " overlaps with ", client.Node.LocalAddress.String(), ", omitting")
  519. continue // skip adding egress range if overlaps with node's local ip
  520. }
  521. if err != nil {
  522. logger.Log(1, "error encountered when setting egress range", err.Error())
  523. } else {
  524. allowedips = append(allowedips, *cidr)
  525. }
  526. }
  527. return allowedips
  528. }
  529. func getCIDRMaskFromAddr(addr string) net.IPMask {
  530. cidr := net.CIDRMask(32, 32)
  531. ipAddr, err := netip.ParseAddr(addr)
  532. if err != nil {
  533. return cidr
  534. }
  535. if ipAddr.Is6() {
  536. cidr = net.CIDRMask(128, 128)
  537. }
  538. return cidr
  539. }
  540. // accounts for ext client ACLs
  541. func filterNodeMapForClientACLs(publicKey, network string, nodePeerMap map[string]models.PeerRouteInfo) map[string]models.PeerRouteInfo {
  542. if !isEE {
  543. return nodePeerMap
  544. }
  545. if nodePeerMap == nil {
  546. return map[string]models.PeerRouteInfo{}
  547. }
  548. if len(publicKey) == 0 || len(network) == 0 {
  549. return nodePeerMap
  550. }
  551. client, err := GetExtClientByPubKey(publicKey, network)
  552. if err != nil {
  553. return nodePeerMap
  554. }
  555. for k := range nodePeerMap {
  556. currNodePeer := nodePeerMap[k]
  557. if _, ok := client.ACLs[currNodePeer.ID]; ok {
  558. delete(nodePeerMap, k)
  559. }
  560. }
  561. return nodePeerMap
  562. }
  563. // getRelayAllowedIPs returns the list of allowedips for a peer that is a relay
  564. func getRelayAllowedIPs(client, relayPeer models.Client) []net.IPNet {
  565. var relayIPs []net.IPNet
  566. if !relayPeer.Node.IsRelay {
  567. logger.Log(0, "getRelayAllowedIPs called for a non-relay node", relayPeer.Host.Name)
  568. return relayIPs
  569. }
  570. for _, relayed := range relayPeer.Node.RelayedNodes {
  571. relayedNode, err := GetNodeByID(relayed)
  572. if err != nil {
  573. logger.Log(0, "retrieve relayed node", err.Error())
  574. continue
  575. }
  576. if relayedNode.ID == client.Node.ID {
  577. relayIPs = append(relayIPs, getAllowedIpsForRelayed(client, relayPeer)...)
  578. continue
  579. }
  580. if relayedNode.Address.IP != nil {
  581. relayedNode.Address.Mask = net.CIDRMask(32, 32)
  582. relayIPs = append(relayIPs, relayedNode.Address)
  583. }
  584. if relayedNode.Address6.IP != nil {
  585. relayedNode.Address.Mask = net.CIDRMask(128, 128)
  586. relayIPs = append(relayIPs, relayedNode.Address6)
  587. }
  588. if relayedNode.IsEgressGateway {
  589. relayedHost, err := GetHost(relayedNode.HostID.String())
  590. if err == nil {
  591. relayIPs = append(relayIPs, getEgressIPs(models.Client{
  592. Host: *relayedHost,
  593. Node: relayedNode,
  594. })...)
  595. }
  596. }
  597. }
  598. return relayIPs
  599. }
  600. // getAllowedIpsForRelayed - returns the peerConfig for a node relayed by relay
  601. func getAllowedIpsForRelayed(relayed, relay models.Client) (allowedIPs []net.IPNet) {
  602. if relayed.Node.RelayedBy != relay.Node.ID.String() {
  603. logger.Log(0, "RelayedByRelay called with invalid parameters")
  604. return
  605. }
  606. peers, err := GetNetworkClients(relay.Node.Network)
  607. if err != nil {
  608. logger.Log(0, "error getting network clients", err.Error())
  609. return
  610. }
  611. for _, peer := range peers {
  612. if peer.Node.ID == relayed.Node.ID || peer.Node.ID == relay.Node.ID {
  613. continue
  614. }
  615. if nodeacls.AreNodesAllowed(nodeacls.NetworkID(relayed.Node.Network), nodeacls.NodeID(relayed.Node.ID.String()), nodeacls.NodeID(peer.Node.ID.String())) {
  616. allowedIPs = append(allowedIPs, GetAllowedIPs(relayed, peer)...)
  617. }
  618. }
  619. return
  620. }
  621. // getIngressIPs returns the additional allowedips (ext client addresses) that need
  622. // to be included for an ingress gateway peer
  623. // TODO: add ExtraAllowedIPs
  624. func getIngressIPs(peer models.Client) []net.IPNet {
  625. var ingressIPs []net.IPNet
  626. extclients, err := GetNetworkExtClients(peer.Node.Network)
  627. if err != nil {
  628. return ingressIPs
  629. }
  630. for _, ec := range extclients {
  631. if ec.IngressGatewayID == peer.Node.ID.String() {
  632. if ec.Address != "" {
  633. var peeraddr = net.IPNet{
  634. IP: net.ParseIP(ec.Address),
  635. Mask: net.CIDRMask(32, 32),
  636. }
  637. if peeraddr.IP != nil && peeraddr.Mask != nil {
  638. ingressIPs = append(ingressIPs, peeraddr)
  639. }
  640. }
  641. if ec.Address6 != "" {
  642. var addr6 = net.IPNet{
  643. IP: net.ParseIP(ec.Address6),
  644. Mask: net.CIDRMask(128, 128),
  645. }
  646. if addr6.IP != nil && addr6.Mask != nil {
  647. ingressIPs = append(ingressIPs, addr6)
  648. }
  649. }
  650. }
  651. }
  652. return ingressIPs
  653. }