|
|
|
@@ -2,6 +2,7 @@ package zones
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"fmt"
|
|
|
|
|
"io/fs"
|
|
|
|
|
"net/netip"
|
|
|
|
|
|
|
|
|
|
"git.jpi.io/amery/jpictl/pkg/wireguard"
|
|
|
|
@@ -179,3 +180,168 @@ func RingOneAddress(zoneID, nodeID int) (netip.Addr, bool) {
|
|
|
|
|
return netip.AddrFrom4(a4), true
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var (
|
|
|
|
|
_ MachineIterator = (*Ring)(nil)
|
|
|
|
|
_ ZoneIterator = (*Ring)(nil)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// A Ring describes all peers on a ring
|
|
|
|
|
type Ring struct {
|
|
|
|
|
RingAddressEncoder
|
|
|
|
|
ZoneIterator
|
|
|
|
|
|
|
|
|
|
Peers []*RingPeer
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// AddPeer adds a [Machine] to the ring
|
|
|
|
|
func (r *Ring) AddPeer(p *Machine) bool {
|
|
|
|
|
ri, ok := p.getRingInfo(r.ID)
|
|
|
|
|
if !ok {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nodeID := p.ID
|
|
|
|
|
zoneID := p.Zone()
|
|
|
|
|
addr, _ := r.Encode(zoneID, nodeID)
|
|
|
|
|
|
|
|
|
|
rp := &RingPeer{
|
|
|
|
|
Node: p,
|
|
|
|
|
Address: addr,
|
|
|
|
|
PrivateKey: ri.Keys.PrivateKey,
|
|
|
|
|
PeerConfig: wireguard.PeerConfig{
|
|
|
|
|
PublicKey: ri.Keys.PublicKey,
|
|
|
|
|
Endpoint: wireguard.EndpointAddress{
|
|
|
|
|
Host: p.FullName(),
|
|
|
|
|
Port: r.Port,
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch {
|
|
|
|
|
case r.ID == 0:
|
|
|
|
|
r.setRingZeroAllowedIPs(rp)
|
|
|
|
|
case p.IsGateway():
|
|
|
|
|
r.setRingOneGatewayAllowedIPs(rp)
|
|
|
|
|
default:
|
|
|
|
|
r.setRingOneNodeAllowedIPs(rp)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
r.Peers = append(r.Peers, rp)
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (r *Ring) setRingZeroAllowedIPs(rp *RingPeer) {
|
|
|
|
|
zoneID, _, _ := r.Decode(rp.Address)
|
|
|
|
|
|
|
|
|
|
// everyone on ring0 is a gateway to ring1
|
|
|
|
|
addr, _ := RingOneAddress(zoneID, 0)
|
|
|
|
|
rp.AllowCIDR(addr, 12)
|
|
|
|
|
|
|
|
|
|
// peer
|
|
|
|
|
rp.AllowCIDR(rp.Address, 32)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (r *Ring) setRingOneGatewayAllowedIPs(rp *RingPeer) {
|
|
|
|
|
zoneID, _, _ := r.Decode(rp.Address)
|
|
|
|
|
|
|
|
|
|
// peer
|
|
|
|
|
rp.AllowCIDR(rp.Address, 32)
|
|
|
|
|
|
|
|
|
|
// ring1 gateways connect to all other ring1 networks
|
|
|
|
|
r.ForEachZone(func(z *Zone) bool {
|
|
|
|
|
if z.ID != zoneID {
|
|
|
|
|
addr, _ := r.Encode(z.ID, 0)
|
|
|
|
|
rp.AllowCIDR(addr, 12)
|
|
|
|
|
}
|
|
|
|
|
return false
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
// ring1 gateways also connect to all ring0 addresses
|
|
|
|
|
r.ForEachZone(func(z *Zone) bool {
|
|
|
|
|
z.ForEachMachine(func(p *Machine) bool {
|
|
|
|
|
if p.IsGateway() {
|
|
|
|
|
addr, _ := RingZeroAddress(z.ID, p.ID)
|
|
|
|
|
rp.AllowCIDR(addr, 32)
|
|
|
|
|
}
|
|
|
|
|
return false
|
|
|
|
|
})
|
|
|
|
|
return false
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (*Ring) setRingOneNodeAllowedIPs(rp *RingPeer) {
|
|
|
|
|
// only to the peer itself
|
|
|
|
|
rp.AllowCIDR(rp.Address, 32)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ForEachMachine calls a function for each Machine in the ring
|
|
|
|
|
// until instructed to terminate the loop
|
|
|
|
|
func (r *Ring) ForEachMachine(fn func(*Machine) bool) {
|
|
|
|
|
for _, pp := range r.Peers {
|
|
|
|
|
if fn(pp.Node) {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ExportConfig builds a wgN.conf for the specified machine on the ring
|
|
|
|
|
func (r *Ring) ExportConfig(p *Machine) (*wireguard.Config, error) {
|
|
|
|
|
var found bool
|
|
|
|
|
|
|
|
|
|
out := &wireguard.Config{
|
|
|
|
|
Interface: wireguard.InterfaceConfig{
|
|
|
|
|
ListenPort: r.Port,
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, pp := range r.Peers {
|
|
|
|
|
switch {
|
|
|
|
|
case pp.Node == p:
|
|
|
|
|
// current
|
|
|
|
|
found = true
|
|
|
|
|
out.Interface.Address = pp.Address
|
|
|
|
|
out.Interface.PrivateKey = pp.PrivateKey
|
|
|
|
|
default:
|
|
|
|
|
// peer
|
|
|
|
|
pc := pp.PeerConfig
|
|
|
|
|
out.Peer = append(out.Peer, pc)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !found {
|
|
|
|
|
return nil, fs.ErrNotExist
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return out, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// A RingPeer is a node on a [Ring]
|
|
|
|
|
type RingPeer struct {
|
|
|
|
|
Node *Machine
|
|
|
|
|
|
|
|
|
|
Address netip.Addr
|
|
|
|
|
PrivateKey wireguard.PrivateKey
|
|
|
|
|
PeerConfig wireguard.PeerConfig
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// AllowCIDR allows an IP range via this peer
|
|
|
|
|
func (rp *RingPeer) AllowCIDR(addr netip.Addr, bits int) {
|
|
|
|
|
cidr := netip.PrefixFrom(addr, bits)
|
|
|
|
|
rp.PeerConfig.AllowedIPs = append(rp.PeerConfig.AllowedIPs, cidr)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// NewRing composes a new Ring for Wireguard setup
|
|
|
|
|
func NewRing(z ZoneIterator, m MachineIterator, ring int) (*Ring, error) {
|
|
|
|
|
r := &Ring{
|
|
|
|
|
RingAddressEncoder: Rings[ring],
|
|
|
|
|
ZoneIterator: z,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
m.ForEachMachine(func(p *Machine) bool {
|
|
|
|
|
r.AddPeer(p)
|
|
|
|
|
return false
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
return r, nil
|
|
|
|
|
}
|
|
|
|
|