manager.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. package manager
  2. import (
  3. "context"
  4. "crypto/md5"
  5. "errors"
  6. "fmt"
  7. "log"
  8. "net"
  9. "reflect"
  10. "runtime"
  11. "github.com/gravitl/netmaker/nm-proxy/common"
  12. "github.com/gravitl/netmaker/nm-proxy/models"
  13. peerpkg "github.com/gravitl/netmaker/nm-proxy/peer"
  14. "github.com/gravitl/netmaker/nm-proxy/wg"
  15. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  16. )
  17. /*
  18. TODO:-
  19. 1. ON Ingress node
  20. --> for attached ext clients
  21. -> start sniffer (will recieve pkts from ext clients (add ebf filter to listen on only ext traffic) if not intended to the interface forward it.)
  22. -> start remote conn after endpoint is updated
  23. -->
  24. */
  25. var sent bool
  26. type ProxyAction string
  27. type ManagerPayload struct {
  28. InterfaceName string `json:"interface_name"`
  29. WgAddr string `json:"wg_addr"`
  30. Peers []wgtypes.PeerConfig `json:"peers"`
  31. PeerMap map[string]PeerConf `json:"peer_map"`
  32. IsRelayed bool `json:"is_relayed"`
  33. IsIngress bool `json:"is_ingress"`
  34. RelayedTo *net.UDPAddr `json:"relayed_to"`
  35. IsRelay bool `json:"is_relay"`
  36. RelayedPeerConf map[string]RelayedConf `json:"relayed_conf"`
  37. }
  38. type RelayedConf struct {
  39. RelayedPeerEndpoint *net.UDPAddr `json:"relayed_peer_endpoint"`
  40. RelayedPeerPubKey string `json:"relayed_peer_pub_key"`
  41. Peers []wgtypes.PeerConfig `json:"relayed_peers"`
  42. }
  43. type PeerConf struct {
  44. IsExtClient bool `json:"is_ext_client"`
  45. Address string `json:"address"`
  46. IsAttachedExtClient bool `json:"is_attached_ext_client"`
  47. IngressGatewayEndPoint *net.UDPAddr `json:"ingress_gateway_endpoint"`
  48. IsRelayed bool `json:"is_relayed"`
  49. RelayedTo *net.UDPAddr `json:"relayed_to"`
  50. Proxy bool `json:"proxy"`
  51. }
  52. const (
  53. AddInterface ProxyAction = "ADD_INTERFACE"
  54. DeleteInterface ProxyAction = "DELETE_INTERFACE"
  55. )
  56. type ManagerAction struct {
  57. Action ProxyAction
  58. Payload ManagerPayload
  59. }
  60. func StartProxyManager(manageChan chan *ManagerAction) {
  61. for {
  62. select {
  63. case mI := <-manageChan:
  64. log.Printf("-------> PROXY-MANAGER: %+v\n", mI)
  65. switch mI.Action {
  66. case AddInterface:
  67. mI.SetIngressGateway()
  68. err := mI.AddInterfaceToProxy()
  69. if err != nil {
  70. log.Printf("failed to add interface: [%s] to proxy: %v\n ", mI.Payload.InterfaceName, err)
  71. }
  72. case DeleteInterface:
  73. mI.DeleteInterface()
  74. }
  75. }
  76. }
  77. }
  78. func (m *ManagerAction) DeleteInterface() {
  79. var err error
  80. if runtime.GOOS == "darwin" {
  81. m.Payload.InterfaceName, err = wg.GetRealIface(m.Payload.InterfaceName)
  82. if err != nil {
  83. log.Println("failed to get real iface: ", err)
  84. return
  85. }
  86. }
  87. if common.WgIfaceMap.Iface.Name == m.Payload.InterfaceName {
  88. cleanUpInterface()
  89. }
  90. }
  91. func (m *ManagerAction) RelayUpdate() {
  92. common.IsRelay = m.Payload.IsRelay
  93. }
  94. func (m *ManagerAction) SetIngressGateway() {
  95. common.IsIngressGateway = m.Payload.IsIngress
  96. }
  97. func (m *ManagerAction) RelayPeers() {
  98. common.IsRelay = true
  99. for relayedNodePubKey, relayedNodeConf := range m.Payload.RelayedPeerConf {
  100. relayedNodePubKeyHash := fmt.Sprintf("%x", md5.Sum([]byte(relayedNodePubKey)))
  101. if _, ok := common.RelayPeerMap[relayedNodePubKeyHash]; !ok {
  102. common.RelayPeerMap[relayedNodePubKeyHash] = make(map[string]models.RemotePeer)
  103. }
  104. for _, peer := range relayedNodeConf.Peers {
  105. if peer.Endpoint != nil {
  106. peer.Endpoint.Port = models.NmProxyPort
  107. remotePeerKeyHash := fmt.Sprintf("%x", md5.Sum([]byte(peer.PublicKey.String())))
  108. common.RelayPeerMap[relayedNodePubKeyHash][remotePeerKeyHash] = models.RemotePeer{
  109. Endpoint: peer.Endpoint,
  110. }
  111. }
  112. }
  113. relayedNodeConf.RelayedPeerEndpoint.Port = models.NmProxyPort
  114. common.RelayPeerMap[relayedNodePubKeyHash][relayedNodePubKeyHash] = models.RemotePeer{
  115. Endpoint: relayedNodeConf.RelayedPeerEndpoint,
  116. }
  117. }
  118. }
  119. func cleanUpInterface() {
  120. log.Println("########------------> CLEANING UP: ", common.WgIfaceMap.Iface.Name)
  121. for _, peerI := range common.WgIfaceMap.PeerMap {
  122. peerI.Mutex.Lock()
  123. peerI.StopConn()
  124. peerI.Mutex.Unlock()
  125. delete(common.WgIfaceMap.PeerMap, peerI.Key.String())
  126. }
  127. common.WgIfaceMap.PeerMap = make(map[string]*models.Conn)
  128. }
  129. func (m *ManagerAction) processPayload() (*wg.WGIface, error) {
  130. var err error
  131. var wgIface *wg.WGIface
  132. if m.Payload.InterfaceName == "" {
  133. return nil, errors.New("interface cannot be empty")
  134. }
  135. if len(m.Payload.Peers) == 0 {
  136. return nil, errors.New("no peers to add")
  137. }
  138. if runtime.GOOS == "darwin" {
  139. m.Payload.InterfaceName, err = wg.GetRealIface(m.Payload.InterfaceName)
  140. if err != nil {
  141. log.Println("failed to get real iface: ", err)
  142. }
  143. }
  144. common.InterfaceName = m.Payload.InterfaceName
  145. wgIface, err = wg.NewWGIFace(m.Payload.InterfaceName, "127.0.0.1/32", wg.DefaultMTU)
  146. if err != nil {
  147. log.Println("Failed init new interface: ", err)
  148. return nil, err
  149. }
  150. if common.WgIfaceMap.Iface == nil {
  151. for i := len(m.Payload.Peers) - 1; i >= 0; i-- {
  152. if !m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].Proxy {
  153. log.Println("-----------> skipping peer, proxy is off: ", m.Payload.Peers[i].PublicKey)
  154. if err := wgIface.Update(m.Payload.Peers[i], false); err != nil {
  155. log.Println("falied to update peer: ", err)
  156. }
  157. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  158. continue
  159. }
  160. }
  161. common.WgIfaceMap.Iface = wgIface.Device
  162. common.WgIfaceMap.IfaceKeyHash = fmt.Sprintf("%x", md5.Sum([]byte(wgIface.Device.PublicKey.String())))
  163. return wgIface, nil
  164. }
  165. wgProxyConf := common.WgIfaceMap
  166. if m.Payload.IsRelay {
  167. m.RelayPeers()
  168. }
  169. common.IsRelay = m.Payload.IsRelay
  170. // check if node is getting relayed
  171. if common.IsRelayed != m.Payload.IsRelayed {
  172. common.IsRelayed = m.Payload.IsRelayed
  173. cleanUpInterface()
  174. return wgIface, nil
  175. }
  176. // sync map with wg device config
  177. // check if listen port has changed
  178. if wgIface.Device.ListenPort != wgProxyConf.Iface.ListenPort {
  179. // reset proxy for this interface
  180. cleanUpInterface()
  181. return wgIface, nil
  182. }
  183. // check device conf different from proxy
  184. wgProxyConf.Iface = wgIface.Device
  185. // sync peer map with new update
  186. for _, currPeerI := range wgProxyConf.Iface.Peers {
  187. if _, ok := m.Payload.PeerMap[currPeerI.PublicKey.String()]; !ok {
  188. if val, ok := wgProxyConf.PeerMap[currPeerI.PublicKey.String()]; ok {
  189. val.Mutex.Lock()
  190. if val.IsAttachedExtClient {
  191. log.Println("------> Deleting ExtClient Watch Thread: ", currPeerI.PublicKey.String())
  192. if val, ok := common.ExtClientsWaitTh[currPeerI.PublicKey.String()]; ok {
  193. val.CancelFunc()
  194. delete(common.ExtClientsWaitTh, currPeerI.PublicKey.String())
  195. }
  196. log.Println("-----> Deleting Ext Client from Src Ip Map: ", currPeerI.PublicKey.String())
  197. delete(common.ExtSourceIpMap, val.Config.PeerConf.Endpoint.String())
  198. }
  199. val.StopConn()
  200. val.Mutex.Unlock()
  201. delete(wgProxyConf.PeerMap, currPeerI.PublicKey.String())
  202. }
  203. // delete peer from interface
  204. log.Println("CurrPeer Not Found, Deleting Peer from Interface: ", currPeerI.PublicKey.String())
  205. if err := wgIface.RemovePeer(currPeerI.PublicKey.String()); err != nil {
  206. log.Println("failed to remove peer: ", currPeerI.PublicKey.String(), err)
  207. }
  208. delete(common.PeerKeyHashMap, fmt.Sprintf("%x", md5.Sum([]byte(currPeerI.PublicKey.String()))))
  209. }
  210. }
  211. for i := len(m.Payload.Peers) - 1; i >= 0; i-- {
  212. if currentPeer, ok := wgProxyConf.PeerMap[m.Payload.Peers[i].PublicKey.String()]; ok {
  213. currentPeer.Mutex.Lock()
  214. if currentPeer.IsAttachedExtClient {
  215. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  216. continue
  217. }
  218. // check if proxy is off for the peer
  219. if !m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].Proxy {
  220. // cleanup proxy connections for the peer
  221. currentPeer.StopConn()
  222. delete(wgProxyConf.PeerMap, currentPeer.Key.String())
  223. // update the peer with actual endpoint
  224. if err := wgIface.Update(m.Payload.Peers[i], false); err != nil {
  225. log.Println("falied to update peer: ", err)
  226. }
  227. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  228. continue
  229. }
  230. // check if peer is not connected to proxy
  231. devPeer, err := wg.GetPeer(m.Payload.InterfaceName, currentPeer.Key.String())
  232. if err == nil {
  233. log.Printf("---------> COMAPRING ENDPOINT: DEV: %s, Proxy: %s", devPeer.Endpoint.String(), currentPeer.Config.LocalConnAddr.String())
  234. if devPeer.Endpoint.String() != currentPeer.Config.LocalConnAddr.String() {
  235. log.Println("---------> endpoint is not set to proxy: ", currentPeer.Key)
  236. currentPeer.StopConn()
  237. delete(wgProxyConf.PeerMap, currentPeer.Key.String())
  238. continue
  239. }
  240. }
  241. //check if peer is being relayed
  242. if currentPeer.IsRelayed != m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].IsRelayed {
  243. log.Println("---------> peer relay status has been changed: ", currentPeer.Key)
  244. currentPeer.StopConn()
  245. delete(wgProxyConf.PeerMap, currentPeer.Key.String())
  246. continue
  247. }
  248. // check if relay endpoint has been changed
  249. if currentPeer.RelayedEndpoint != nil &&
  250. m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].RelayedTo != nil &&
  251. currentPeer.RelayedEndpoint.String() != m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].RelayedTo.String() {
  252. log.Println("---------> peer relay endpoint has been changed: ", currentPeer.Key)
  253. currentPeer.StopConn()
  254. delete(wgProxyConf.PeerMap, currentPeer.Key.String())
  255. continue
  256. }
  257. if !reflect.DeepEqual(m.Payload.Peers[i], *currentPeer.Config.PeerConf) {
  258. if currentPeer.Config.RemoteConnAddr.IP.String() != m.Payload.Peers[i].Endpoint.IP.String() {
  259. log.Println("----------> Resetting proxy for Peer: ", currentPeer.Key, m.Payload.InterfaceName)
  260. currentPeer.StopConn()
  261. currentPeer.Mutex.Unlock()
  262. delete(wgProxyConf.PeerMap, currentPeer.Key.String())
  263. continue
  264. } else {
  265. log.Println("----->##### Updating Peer on Interface: ", m.Payload.InterfaceName, currentPeer.Key)
  266. updatePeerConf := m.Payload.Peers[i]
  267. localUdpAddr, err := net.ResolveUDPAddr("udp", currentPeer.Config.LocalConnAddr.String())
  268. if err == nil {
  269. updatePeerConf.Endpoint = localUdpAddr
  270. }
  271. if err := wgIface.Update(updatePeerConf, true); err != nil {
  272. log.Println("failed to update peer: ", currentPeer.Key, err)
  273. }
  274. currentPeer.Config.PeerConf = &m.Payload.Peers[i]
  275. wgProxyConf.PeerMap[currentPeer.Key.String()] = currentPeer
  276. // delete the peer from the list
  277. log.Println("-----------> deleting peer from list: ", m.Payload.Peers[i].PublicKey)
  278. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  279. }
  280. } else {
  281. // delete the peer from the list
  282. log.Println("-----------> No updates observed so deleting peer: ", m.Payload.Peers[i].PublicKey)
  283. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  284. }
  285. currentPeer.Mutex.Unlock()
  286. } else if !m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].Proxy && !m.Payload.PeerMap[m.Payload.Peers[i].PublicKey.String()].IsAttachedExtClient {
  287. log.Println("-----------> skipping peer, proxy is off: ", m.Payload.Peers[i].PublicKey)
  288. if err := wgIface.Update(m.Payload.Peers[i], false); err != nil {
  289. log.Println("falied to update peer: ", err)
  290. }
  291. m.Payload.Peers = append(m.Payload.Peers[:i], m.Payload.Peers[i+1:]...)
  292. }
  293. }
  294. // sync dev peers with new update
  295. common.WgIfaceMap = wgProxyConf
  296. log.Println("CLEANED UP..........")
  297. return wgIface, nil
  298. }
  299. func (m *ManagerAction) AddInterfaceToProxy() error {
  300. var err error
  301. wgInterface, err := m.processPayload()
  302. if err != nil {
  303. return err
  304. }
  305. log.Printf("wg: %+v\n", wgInterface)
  306. for _, peerI := range m.Payload.Peers {
  307. peerConf := m.Payload.PeerMap[peerI.PublicKey.String()]
  308. if peerI.Endpoint == nil && !(peerConf.IsAttachedExtClient || peerConf.IsExtClient) {
  309. log.Println("Endpoint nil for peer: ", peerI.PublicKey.String())
  310. continue
  311. }
  312. if peerConf.IsExtClient && !peerConf.IsAttachedExtClient {
  313. peerI.Endpoint = peerConf.IngressGatewayEndPoint
  314. }
  315. var isRelayed bool
  316. var relayedTo *net.UDPAddr
  317. if m.Payload.IsRelayed {
  318. isRelayed = true
  319. relayedTo = m.Payload.RelayedTo
  320. } else {
  321. isRelayed = peerConf.IsRelayed
  322. relayedTo = peerConf.RelayedTo
  323. }
  324. if peerConf.IsAttachedExtClient {
  325. log.Println("Extclient Thread...")
  326. go func(wgInterface *wg.WGIface, peer *wgtypes.PeerConfig,
  327. isRelayed bool, relayTo *net.UDPAddr, peerConf PeerConf, ingGwAddr string) {
  328. addExtClient := false
  329. commChan := make(chan *net.UDPAddr, 100)
  330. ctx, cancel := context.WithCancel(context.Background())
  331. common.ExtClientsWaitTh[peerI.PublicKey.String()] = models.ExtClientPeer{
  332. CancelFunc: cancel,
  333. CommChan: commChan,
  334. }
  335. defer func() {
  336. if addExtClient {
  337. log.Println("GOT ENDPOINT for Extclient adding peer...")
  338. common.ExtSourceIpMap[peer.Endpoint.String()] = models.RemotePeer{
  339. Interface: wgInterface.Name,
  340. PeerKey: peer.PublicKey.String(),
  341. IsExtClient: peerConf.IsExtClient,
  342. IsAttachedExtClient: peerConf.IsAttachedExtClient,
  343. Endpoint: peer.Endpoint,
  344. }
  345. peerpkg.AddNewPeer(wgInterface, peer, peerConf.Address, isRelayed,
  346. peerConf.IsExtClient, peerConf.IsAttachedExtClient, relayedTo)
  347. }
  348. log.Println("Exiting extclient watch Thread for: ", peer.PublicKey.String())
  349. }()
  350. for {
  351. select {
  352. case <-ctx.Done():
  353. return
  354. case endpoint := <-commChan:
  355. if endpoint != nil {
  356. addExtClient = true
  357. peer.Endpoint = endpoint
  358. delete(common.ExtClientsWaitTh, peer.PublicKey.String())
  359. return
  360. }
  361. }
  362. }
  363. }(wgInterface, &peerI, isRelayed, relayedTo, peerConf, m.Payload.WgAddr)
  364. continue
  365. }
  366. peerpkg.AddNewPeer(wgInterface, &peerI, peerConf.Address, isRelayed,
  367. peerConf.IsExtClient, peerConf.IsAttachedExtClient, relayedTo)
  368. }
  369. return nil
  370. }