2
0

connect_linux.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372
  1. // Copyright 2022 the Kilo authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. //go:build linux
  15. // +build linux
  16. package main
  17. import (
  18. "context"
  19. "errors"
  20. "fmt"
  21. "net"
  22. "os"
  23. "sort"
  24. "strings"
  25. "syscall"
  26. "time"
  27. "github.com/go-kit/kit/log"
  28. "github.com/go-kit/kit/log/level"
  29. "github.com/oklog/run"
  30. "github.com/spf13/cobra"
  31. "golang.zx2c4.com/wireguard/wgctrl"
  32. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  33. apierrors "k8s.io/apimachinery/pkg/api/errors"
  34. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  35. "github.com/squat/kilo/pkg/iproute"
  36. "github.com/squat/kilo/pkg/k8s/apis/kilo/v1alpha1"
  37. "github.com/squat/kilo/pkg/mesh"
  38. "github.com/squat/kilo/pkg/route"
  39. "github.com/squat/kilo/pkg/wireguard"
  40. )
  41. var (
  42. logLevel string
  43. connectOpts struct {
  44. allowedIP net.IPNet
  45. allowedIPs []net.IPNet
  46. privateKey string
  47. cleanUp bool
  48. mtu uint
  49. resyncPeriod time.Duration
  50. interfaceName string
  51. persistentKeepalive int
  52. }
  53. )
  54. func takeIPNet(_ net.IP, i *net.IPNet, err error) *net.IPNet {
  55. if err != nil {
  56. panic(err)
  57. }
  58. return i
  59. }
  60. func connect() *cobra.Command {
  61. cmd := &cobra.Command{
  62. Use: "connect",
  63. Args: cobra.MaximumNArgs(1),
  64. RunE: runConnect,
  65. Short: "connect to a Kilo cluster as a peer over WireGuard",
  66. SilenceUsage: true,
  67. }
  68. cmd.Flags().IPNetVarP(&connectOpts.allowedIP, "allowed-ip", "a", *takeIPNet(net.ParseCIDR("10.10.10.10/32")), "Allowed IP of the peer.")
  69. cmd.Flags().StringSliceVar(&allowedIPs, "allowed-ips", []string{}, "Additional allowed IPs of the cluster, e.g. the service CIDR.")
  70. cmd.Flags().StringVar(&logLevel, "log-level", logLevelInfo, fmt.Sprintf("Log level to use. Possible values: %s", strings.Join(availableLogLevels, ", ")))
  71. _ = cmd.RegisterFlagCompletionFunc("log-level", cobra.FixedCompletions(availableLogLevels, cobra.ShellCompDirectiveNoFileComp))
  72. cmd.Flags().StringVar(&connectOpts.privateKey, "private-key", "", "Path to an existing WireGuard private key file.")
  73. cmd.Flags().BoolVar(&connectOpts.cleanUp, "clean-up", true, "Should Kilo clean up the routes and interface when it shuts down?")
  74. cmd.Flags().UintVar(&connectOpts.mtu, "mtu", uint(1420), "The MTU for the WireGuard interface.")
  75. cmd.Flags().DurationVar(&connectOpts.resyncPeriod, "resync-period", 30*time.Second, "How often should Kilo reconcile?")
  76. cmd.Flags().StringVarP(&connectOpts.interfaceName, "interface", "i", mesh.DefaultKiloInterface, "Name of the Kilo interface to use; if it does not exist, it will be created.")
  77. cmd.Flags().IntVar(&connectOpts.persistentKeepalive, "persistent-keepalive", 10, "How often should WireGuard send keepalives? Setting to 0 will disable sending keepalives.")
  78. return cmd
  79. }
  80. func runConnect(cmd *cobra.Command, args []string) error {
  81. ctx, cancel := context.WithCancel(context.Background())
  82. defer cancel()
  83. logger := log.NewJSONLogger(log.NewSyncWriter(os.Stdout))
  84. switch logLevel {
  85. case logLevelAll:
  86. logger = level.NewFilter(logger, level.AllowAll())
  87. case logLevelDebug:
  88. logger = level.NewFilter(logger, level.AllowDebug())
  89. case logLevelInfo:
  90. logger = level.NewFilter(logger, level.AllowInfo())
  91. case logLevelWarn:
  92. logger = level.NewFilter(logger, level.AllowWarn())
  93. case logLevelError:
  94. logger = level.NewFilter(logger, level.AllowError())
  95. case logLevelNone:
  96. logger = level.NewFilter(logger, level.AllowNone())
  97. default:
  98. return fmt.Errorf("log level %s unknown; possible values are: %s", logLevel, strings.Join(availableLogLevels, ", "))
  99. }
  100. logger = log.With(logger, "ts", log.DefaultTimestampUTC)
  101. logger = log.With(logger, "caller", log.DefaultCaller)
  102. var peerName string
  103. var err error
  104. if len(args) > 0 {
  105. peerName = args[0]
  106. } else {
  107. _ = level.Debug(logger).Log("msg", "no peer name provided; using hostname")
  108. if peerName, err = os.Hostname(); err != nil {
  109. return fmt.Errorf("could not determine hostname: %w", err)
  110. }
  111. }
  112. for i := range allowedIPs {
  113. _, aip, err := net.ParseCIDR(allowedIPs[i])
  114. if err != nil {
  115. return err
  116. }
  117. connectOpts.allowedIPs = append(connectOpts.allowedIPs, *aip)
  118. }
  119. var privateKey wgtypes.Key
  120. if connectOpts.privateKey == "" {
  121. privateKey, err = wgtypes.GeneratePrivateKey()
  122. if err != nil {
  123. return fmt.Errorf("failed to generate private key: %w", err)
  124. }
  125. } else {
  126. raw, err := os.ReadFile(connectOpts.privateKey)
  127. if err != nil {
  128. return fmt.Errorf("failed to read private key: %w", err)
  129. }
  130. privateKey, err = wgtypes.ParseKey(string(raw))
  131. if err != nil {
  132. return fmt.Errorf("failed to parse private key: %w", err)
  133. }
  134. }
  135. publicKey := privateKey.PublicKey()
  136. _ = level.Info(logger).Log("msg", "generated public key", "key", publicKey)
  137. if _, err := opts.kc.KiloV1alpha1().Peers().Get(ctx, peerName, metav1.GetOptions{}); apierrors.IsNotFound(err) {
  138. peer := &v1alpha1.Peer{
  139. ObjectMeta: metav1.ObjectMeta{
  140. Name: peerName,
  141. },
  142. Spec: v1alpha1.PeerSpec{
  143. AllowedIPs: []string{connectOpts.allowedIP.String()},
  144. PersistentKeepalive: connectOpts.persistentKeepalive,
  145. PublicKey: publicKey.String(),
  146. },
  147. }
  148. if _, err := opts.kc.KiloV1alpha1().Peers().Create(ctx, peer, metav1.CreateOptions{}); err != nil {
  149. return fmt.Errorf("failed to create peer: %w", err)
  150. }
  151. _ = level.Info(logger).Log("msg", "created peer", "peer", peerName)
  152. if connectOpts.cleanUp {
  153. defer func() {
  154. ctxWithTimeout, cancelWithTimeout := context.WithTimeout(context.Background(), 10*time.Second)
  155. defer cancelWithTimeout()
  156. if err := opts.kc.KiloV1alpha1().Peers().Delete(ctxWithTimeout, peerName, metav1.DeleteOptions{}); err != nil {
  157. _ = level.Error(logger).Log("err", fmt.Sprintf("failed to delete peer: %v", err))
  158. } else {
  159. _ = level.Info(logger).Log("msg", "deleted peer", "peer", peerName)
  160. }
  161. }()
  162. }
  163. } else if err != nil {
  164. return fmt.Errorf("failed to get peer: %w", err)
  165. }
  166. iface, _, err := wireguard.New(connectOpts.interfaceName, connectOpts.mtu)
  167. if err != nil {
  168. return fmt.Errorf("failed to create wg interface: %w", err)
  169. }
  170. _ = level.Info(logger).Log("msg", "created WireGuard interface", "name", connectOpts.interfaceName, "index", iface)
  171. table := route.NewTable()
  172. if connectOpts.cleanUp {
  173. defer cleanUp(iface, table, logger)
  174. }
  175. if err := iproute.SetAddress(iface, &connectOpts.allowedIP); err != nil {
  176. return err
  177. }
  178. _ = level.Info(logger).Log("msg", "set IP address of WireGuard interface", "IP", connectOpts.allowedIP.String())
  179. if err := iproute.Set(iface, true); err != nil {
  180. return err
  181. }
  182. var g run.Group
  183. g.Add(run.SignalHandler(ctx, syscall.SIGINT, syscall.SIGTERM))
  184. {
  185. g.Add(
  186. func() error {
  187. errCh, err := table.Run(ctx.Done())
  188. if err != nil {
  189. return fmt.Errorf("failed to watch for route table updates: %w", err)
  190. }
  191. for {
  192. select {
  193. case err, ok := <-errCh:
  194. if ok {
  195. _ = level.Error(logger).Log("err", err.Error())
  196. } else {
  197. return nil
  198. }
  199. case <-ctx.Done():
  200. return nil
  201. }
  202. }
  203. },
  204. func(err error) {
  205. cancel()
  206. var serr run.SignalError
  207. if ok := errors.As(err, &serr); ok {
  208. _ = level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error())
  209. } else {
  210. _ = level.Error(logger).Log("msg", "received error", "err", err.Error())
  211. }
  212. },
  213. )
  214. }
  215. {
  216. g.Add(
  217. func() error {
  218. _ = level.Info(logger).Log("msg", "starting syncer")
  219. for {
  220. if err := sync(table, peerName, privateKey, iface, logger); err != nil {
  221. _ = level.Error(logger).Log("msg", "failed to sync", "err", err.Error())
  222. }
  223. select {
  224. case <-time.After(connectOpts.resyncPeriod):
  225. case <-ctx.Done():
  226. return nil
  227. }
  228. }
  229. }, func(err error) {
  230. cancel()
  231. var serr run.SignalError
  232. if ok := errors.As(err, &serr); ok {
  233. _ = level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error())
  234. } else {
  235. _ = level.Error(logger).Log("msg", "received error", "err", err.Error())
  236. }
  237. })
  238. }
  239. err = g.Run()
  240. var serr run.SignalError
  241. if ok := errors.As(err, &serr); ok {
  242. return nil
  243. }
  244. return err
  245. }
  246. func cleanUp(iface int, t *route.Table, logger log.Logger) {
  247. if err := iproute.Set(iface, false); err != nil {
  248. _ = level.Error(logger).Log("err", fmt.Sprintf("failed to set WireGuard interface down: %v", err))
  249. }
  250. if err := iproute.RemoveInterface(iface); err != nil {
  251. _ = level.Error(logger).Log("err", fmt.Sprintf("failed to remove WireGuard interface: %v", err))
  252. }
  253. if err := t.CleanUp(); err != nil {
  254. _ = level.Error(logger).Log("failed to clean up routes: %v", err)
  255. }
  256. }
  257. func sync(table *route.Table, peerName string, privateKey wgtypes.Key, iface int, logger log.Logger) error {
  258. ns, err := opts.backend.Nodes().List()
  259. if err != nil {
  260. return fmt.Errorf("failed to list nodes: %w", err)
  261. }
  262. for _, n := range ns {
  263. _, err := n.Endpoint.UDPAddr(true)
  264. if err != nil {
  265. return err
  266. }
  267. }
  268. ps, err := opts.backend.Peers().List()
  269. if err != nil {
  270. return fmt.Errorf("failed to list peers: %w", err)
  271. }
  272. // Obtain the Granularity by looking at the annotation of the first node.
  273. if opts.granularity, err = determineGranularity(opts.granularity, ns); err != nil {
  274. return fmt.Errorf("failed to determine granularity: %w", err)
  275. }
  276. var hostname string
  277. var subnet *net.IPNet
  278. nodes := make(map[string]*mesh.Node)
  279. var nodeNames []string
  280. for _, n := range ns {
  281. if n.Ready() {
  282. nodes[n.Name] = n
  283. hostname = n.Name
  284. nodeNames = append(nodeNames, n.Name)
  285. }
  286. if n.WireGuardIP != nil && subnet == nil {
  287. subnet = n.WireGuardIP
  288. }
  289. }
  290. if len(nodes) == 0 {
  291. return errors.New("did not find any valid Kilo nodes in the cluster")
  292. }
  293. if subnet == nil {
  294. return errors.New("did not find a valid Kilo subnet on any node")
  295. }
  296. subnet.IP = subnet.IP.Mask(subnet.Mask)
  297. sort.Strings(nodeNames)
  298. nodes[nodeNames[0]].AllowedLocationIPs = append(nodes[nodeNames[0]].AllowedLocationIPs, connectOpts.allowedIPs...)
  299. peers := make(map[string]*mesh.Peer)
  300. for _, p := range ps {
  301. if p.Ready() {
  302. peers[p.Name] = p
  303. }
  304. }
  305. if _, ok := peers[peerName]; !ok {
  306. return fmt.Errorf("did not find any peer named %q in the cluster", peerName)
  307. }
  308. t, err := mesh.NewTopology(nodes, peers, opts.granularity, hostname, opts.port, wgtypes.Key{}, subnet, nil, *peers[peerName].PersistentKeepaliveInterval, logger)
  309. if err != nil {
  310. return fmt.Errorf("failed to create topology: %w", err)
  311. }
  312. conf := t.PeerConf(peerName)
  313. conf.PrivateKey = &privateKey
  314. conf.ListenPort = &opts.port
  315. wgClient, err := wgctrl.New()
  316. if err != nil {
  317. return err
  318. }
  319. defer func() { _ = wgClient.Close() }()
  320. current, err := wgClient.Device(connectOpts.interfaceName)
  321. if err != nil {
  322. return err
  323. }
  324. var equal bool
  325. var diff string
  326. equal, diff = conf.Equal(current)
  327. if !equal {
  328. // If the key is empty, then it's the first time we are running
  329. // so don't bother printing a diff.
  330. if current.PrivateKey != [wgtypes.KeyLen]byte{} {
  331. _ = level.Info(logger).Log("msg", "WireGuard configurations are different", "diff", diff)
  332. }
  333. _ = level.Debug(logger).Log("msg", "setting WireGuard config", "config", conf.WGConfig())
  334. if err := wgClient.ConfigureDevice(connectOpts.interfaceName, conf.WGConfig()); err != nil {
  335. return err
  336. }
  337. }
  338. if err := table.Set(t.PeerRoutes(peerName, iface, connectOpts.allowedIPs)); err != nil {
  339. return fmt.Errorf("failed to update route table: %w", err)
  340. }
  341. return nil
  342. }