calculated_remote.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. package nebula
  2. import (
  3. "encoding/binary"
  4. "fmt"
  5. "math"
  6. "net"
  7. "net/netip"
  8. "strconv"
  9. "github.com/gaissmai/bart"
  10. "github.com/slackhq/nebula/config"
  11. )
  12. // This allows us to "guess" what the remote might be for a host while we wait
  13. // for the lighthouse response. See "lighthouse.calculated_remotes" in the
  14. // example config file.
  15. type calculatedRemote struct {
  16. ipNet netip.Prefix
  17. mask netip.Prefix
  18. port uint32
  19. }
  20. func newCalculatedRemote(cidr, maskCidr netip.Prefix, port int) (*calculatedRemote, error) {
  21. if maskCidr.Addr().BitLen() != cidr.Addr().BitLen() {
  22. return nil, fmt.Errorf("invalid mask: %s for cidr: %s", maskCidr, cidr)
  23. }
  24. masked := maskCidr.Masked()
  25. if port < 0 || port > math.MaxUint16 {
  26. return nil, fmt.Errorf("invalid port: %d", port)
  27. }
  28. return &calculatedRemote{
  29. ipNet: maskCidr,
  30. mask: masked,
  31. port: uint32(port),
  32. }, nil
  33. }
  34. func (c *calculatedRemote) String() string {
  35. return fmt.Sprintf("CalculatedRemote(mask=%v port=%d)", c.ipNet, c.port)
  36. }
  37. func (c *calculatedRemote) ApplyV4(addr netip.Addr) *V4AddrPort {
  38. // Combine the masked bytes of the "mask" IP with the unmasked bytes of the overlay IP
  39. maskb := net.CIDRMask(c.mask.Bits(), c.mask.Addr().BitLen())
  40. mask := binary.BigEndian.Uint32(maskb[:])
  41. b := c.mask.Addr().As4()
  42. maskAddr := binary.BigEndian.Uint32(b[:])
  43. b = addr.As4()
  44. intAddr := binary.BigEndian.Uint32(b[:])
  45. return &V4AddrPort{(maskAddr & mask) | (intAddr & ^mask), c.port}
  46. }
  47. func (c *calculatedRemote) ApplyV6(addr netip.Addr) *V6AddrPort {
  48. mask := net.CIDRMask(c.mask.Bits(), c.mask.Addr().BitLen())
  49. maskAddr := c.mask.Addr().As16()
  50. calcAddr := addr.As16()
  51. ap := V6AddrPort{Port: c.port}
  52. maskb := binary.BigEndian.Uint64(mask[:8])
  53. maskAddrb := binary.BigEndian.Uint64(maskAddr[:8])
  54. calcAddrb := binary.BigEndian.Uint64(calcAddr[:8])
  55. ap.Hi = (maskAddrb & maskb) | (calcAddrb & ^maskb)
  56. maskb = binary.BigEndian.Uint64(mask[8:])
  57. maskAddrb = binary.BigEndian.Uint64(maskAddr[8:])
  58. calcAddrb = binary.BigEndian.Uint64(calcAddr[8:])
  59. ap.Lo = (maskAddrb & maskb) | (calcAddrb & ^maskb)
  60. return &ap
  61. }
  62. func NewCalculatedRemotesFromConfig(c *config.C, k string) (*bart.Table[[]*calculatedRemote], error) {
  63. value := c.Get(k)
  64. if value == nil {
  65. return nil, nil
  66. }
  67. calculatedRemotes := new(bart.Table[[]*calculatedRemote])
  68. rawMap, ok := value.(map[string]any)
  69. if !ok {
  70. return nil, fmt.Errorf("config `%s` has invalid type: %T", k, value)
  71. }
  72. for rawCIDR, rawValue := range rawMap {
  73. cidr, err := netip.ParsePrefix(rawCIDR)
  74. if err != nil {
  75. return nil, fmt.Errorf("config `%s` has invalid CIDR: %s", k, rawCIDR)
  76. }
  77. entry, err := newCalculatedRemotesListFromConfig(cidr, rawValue)
  78. if err != nil {
  79. return nil, fmt.Errorf("config '%s.%s': %w", k, rawCIDR, err)
  80. }
  81. calculatedRemotes.Insert(cidr, entry)
  82. }
  83. return calculatedRemotes, nil
  84. }
  85. func newCalculatedRemotesListFromConfig(cidr netip.Prefix, raw any) ([]*calculatedRemote, error) {
  86. rawList, ok := raw.([]any)
  87. if !ok {
  88. return nil, fmt.Errorf("calculated_remotes entry has invalid type: %T", raw)
  89. }
  90. var l []*calculatedRemote
  91. for _, e := range rawList {
  92. c, err := newCalculatedRemotesEntryFromConfig(cidr, e)
  93. if err != nil {
  94. return nil, fmt.Errorf("calculated_remotes entry: %w", err)
  95. }
  96. l = append(l, c)
  97. }
  98. return l, nil
  99. }
  100. func newCalculatedRemotesEntryFromConfig(cidr netip.Prefix, raw any) (*calculatedRemote, error) {
  101. rawMap, ok := raw.(map[string]any)
  102. if !ok {
  103. return nil, fmt.Errorf("invalid type: %T", raw)
  104. }
  105. rawValue := rawMap["mask"]
  106. if rawValue == nil {
  107. return nil, fmt.Errorf("missing mask: %v", rawMap)
  108. }
  109. rawMask, ok := rawValue.(string)
  110. if !ok {
  111. return nil, fmt.Errorf("invalid mask (type %T): %v", rawValue, rawValue)
  112. }
  113. maskCidr, err := netip.ParsePrefix(rawMask)
  114. if err != nil {
  115. return nil, fmt.Errorf("invalid mask: %s", rawMask)
  116. }
  117. var port int
  118. rawValue = rawMap["port"]
  119. if rawValue == nil {
  120. return nil, fmt.Errorf("missing port: %v", rawMap)
  121. }
  122. switch v := rawValue.(type) {
  123. case int:
  124. port = v
  125. case string:
  126. port, err = strconv.Atoi(v)
  127. if err != nil {
  128. return nil, fmt.Errorf("invalid port: %s: %w", v, err)
  129. }
  130. default:
  131. return nil, fmt.Errorf("invalid port (type %T): %v", rawValue, rawValue)
  132. }
  133. return newCalculatedRemote(cidr, maskCidr, port)
  134. }