Skip to content

Commit 0dfb744

Browse files
leonnicolassquat
andauthored
kgctl connect (#269)
* kgctl connect Use kgctl connect to connect your laptop to a cluster. Signed-off-by: leonnicolas <leonloechner@gmx.de> * cmd/kgctl: finish connect command This commit fixes some bugs and finishes the implementation of the `kgctl connect` command. Signed-off-by: Lucas Servén Marín <lserven@gmail.com> * e2e: add tests for kgctl connect Signed-off-by: Lucas Servén Marín <lserven@gmail.com> * docs: add documentation for `kgctl connect` Signed-off-by: Lucas Servén Marín <lserven@gmail.com> * pkg/mesh: move peer route generation to mesh Signed-off-by: Lucas Servén Marín <lserven@gmail.com> Co-authored-by: Lucas Servén Marín <lserven@gmail.com>
1 parent d95e590 commit 0dfb744

File tree

10 files changed

+569
-34
lines changed

10 files changed

+569
-34
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ $(BASH_UNIT):
209209
chmod +x $@
210210

211211
e2e: container $(KIND_BINARY) $(KUBECTL_BINARY) $(BASH_UNIT) bin/$(OS)/$(ARCH)/kgctl
212-
KILO_IMAGE=$(IMAGE):$(ARCH)-$(VERSION) KIND_BINARY=$(KIND_BINARY) KUBECTL_BINARY=$(KUBECTL_BINARY) KGCTL_BINARY=$(shell pwd)/bin/$(OS)/$(ARCH)/kgctl $(BASH_UNIT) $(BASH_UNIT_FLAGS) ./e2e/setup.sh ./e2e/full-mesh.sh ./e2e/location-mesh.sh ./e2e/multi-cluster.sh ./e2e/handlers.sh ./e2e/teardown.sh
212+
KILO_IMAGE=$(IMAGE):$(ARCH)-$(VERSION) KIND_BINARY=$(KIND_BINARY) KUBECTL_BINARY=$(KUBECTL_BINARY) KGCTL_BINARY=$(shell pwd)/bin/$(OS)/$(ARCH)/kgctl $(BASH_UNIT) $(BASH_UNIT_FLAGS) ./e2e/setup.sh ./e2e/full-mesh.sh ./e2e/location-mesh.sh ./e2e/multi-cluster.sh ./e2e/handlers.sh ./e2e/kgctl.sh ./e2e/teardown.sh
213213

214214
header: .header
215215
@HEADER=$$(cat .header); \

cmd/kgctl/connect_linux.go

Lines changed: 374 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,374 @@
1+
// Copyright 2022 the Kilo authors
2+
//
3+
// Licensed under the Apache License, Version 2.0 (the "License");
4+
// you may not use this file except in compliance with the License.
5+
// You may obtain a copy of the License at
6+
//
7+
// http://www.apache.org/licenses/LICENSE-2.0
8+
//
9+
// Unless required by applicable law or agreed to in writing, software
10+
// distributed under the License is distributed on an "AS IS" BASIS,
11+
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
// See the License for the specific language governing permissions and
13+
// limitations under the License.
14+
15+
//go:build linux
16+
// +build linux
17+
18+
package main
19+
20+
import (
21+
"context"
22+
"errors"
23+
"fmt"
24+
"net"
25+
"os"
26+
"sort"
27+
"strings"
28+
"syscall"
29+
"time"
30+
31+
"github.com/go-kit/kit/log"
32+
"github.com/go-kit/kit/log/level"
33+
"github.com/oklog/run"
34+
"github.com/spf13/cobra"
35+
"golang.zx2c4.com/wireguard/wgctrl"
36+
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
37+
apierrors "k8s.io/apimachinery/pkg/api/errors"
38+
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
39+
40+
"github.com/squat/kilo/pkg/iproute"
41+
"github.com/squat/kilo/pkg/k8s/apis/kilo/v1alpha1"
42+
"github.com/squat/kilo/pkg/mesh"
43+
"github.com/squat/kilo/pkg/route"
44+
"github.com/squat/kilo/pkg/wireguard"
45+
)
46+
47+
var (
48+
logLevel string
49+
connectOpts struct {
50+
allowedIP net.IPNet
51+
allowedIPs []net.IPNet
52+
privateKey string
53+
cleanUp bool
54+
mtu uint
55+
resyncPeriod time.Duration
56+
interfaceName string
57+
persistentKeepalive int
58+
}
59+
)
60+
61+
func takeIPNet(_ net.IP, i *net.IPNet, err error) *net.IPNet {
62+
if err != nil {
63+
panic(err)
64+
}
65+
return i
66+
}
67+
68+
func connect() *cobra.Command {
69+
cmd := &cobra.Command{
70+
Use: "connect",
71+
Args: cobra.ExactArgs(1),
72+
RunE: runConnect,
73+
Short: "connect to a Kilo cluster as a peer over WireGuard",
74+
SilenceUsage: true,
75+
}
76+
cmd.Flags().IPNetVarP(&connectOpts.allowedIP, "allowed-ip", "a", *takeIPNet(net.ParseCIDR("10.10.10.10/32")), "Allowed IP of the peer.")
77+
cmd.Flags().StringSliceVar(&allowedIPs, "allowed-ips", []string{}, "Additional allowed IPs of the cluster, e.g. the service CIDR.")
78+
cmd.Flags().StringVar(&logLevel, "log-level", logLevelInfo, fmt.Sprintf("Log level to use. Possible values: %s", availableLogLevels))
79+
cmd.Flags().StringVar(&connectOpts.privateKey, "private-key", "", "Path to an existing WireGuard private key file.")
80+
cmd.Flags().BoolVar(&connectOpts.cleanUp, "clean-up", true, "Should Kilo clean up the routes and interface when it shuts down?")
81+
cmd.Flags().UintVar(&connectOpts.mtu, "mtu", uint(1420), "The MTU for the WireGuard interface.")
82+
cmd.Flags().DurationVar(&connectOpts.resyncPeriod, "resync-period", 30*time.Second, "How often should Kilo reconcile?")
83+
cmd.Flags().StringVarP(&connectOpts.interfaceName, "interface", "i", mesh.DefaultKiloInterface, "Name of the Kilo interface to use; if it does not exist, it will be created.")
84+
cmd.Flags().IntVar(&connectOpts.persistentKeepalive, "persistent-keepalive", 10, "How often should WireGuard send keepalives? Setting to 0 will disable sending keepalives.")
85+
86+
availableLogLevels = strings.Join([]string{
87+
logLevelAll,
88+
logLevelDebug,
89+
logLevelInfo,
90+
logLevelWarn,
91+
logLevelError,
92+
logLevelNone,
93+
}, ", ")
94+
95+
return cmd
96+
}
97+
98+
func runConnect(cmd *cobra.Command, args []string) error {
99+
ctx, cancel := context.WithCancel(context.Background())
100+
defer cancel()
101+
102+
logger := log.NewJSONLogger(log.NewSyncWriter(os.Stdout))
103+
switch logLevel {
104+
case logLevelAll:
105+
logger = level.NewFilter(logger, level.AllowAll())
106+
case logLevelDebug:
107+
logger = level.NewFilter(logger, level.AllowDebug())
108+
case logLevelInfo:
109+
logger = level.NewFilter(logger, level.AllowInfo())
110+
case logLevelWarn:
111+
logger = level.NewFilter(logger, level.AllowWarn())
112+
case logLevelError:
113+
logger = level.NewFilter(logger, level.AllowError())
114+
case logLevelNone:
115+
logger = level.NewFilter(logger, level.AllowNone())
116+
default:
117+
return fmt.Errorf("log level %s unknown; possible values are: %s", logLevel, availableLogLevels)
118+
}
119+
logger = log.With(logger, "ts", log.DefaultTimestampUTC)
120+
logger = log.With(logger, "caller", log.DefaultCaller)
121+
peerName := args[0]
122+
123+
for i := range allowedIPs {
124+
_, aip, err := net.ParseCIDR(allowedIPs[i])
125+
if err != nil {
126+
return err
127+
}
128+
connectOpts.allowedIPs = append(connectOpts.allowedIPs, *aip)
129+
}
130+
131+
var privateKey wgtypes.Key
132+
var err error
133+
if connectOpts.privateKey == "" {
134+
privateKey, err = wgtypes.GeneratePrivateKey()
135+
if err != nil {
136+
return fmt.Errorf("failed to generate private key: %w", err)
137+
}
138+
} else {
139+
raw, err := os.ReadFile(connectOpts.privateKey)
140+
if err != nil {
141+
return fmt.Errorf("failed to read private key: %w", err)
142+
}
143+
privateKey, err = wgtypes.ParseKey(string(raw))
144+
if err != nil {
145+
return fmt.Errorf("failed to parse private key: %w", err)
146+
}
147+
}
148+
publicKey := privateKey.PublicKey()
149+
level.Info(logger).Log("msg", "generated public key", "key", publicKey)
150+
151+
if _, err := opts.kc.KiloV1alpha1().Peers().Get(ctx, peerName, metav1.GetOptions{}); apierrors.IsNotFound(err) {
152+
peer := &v1alpha1.Peer{
153+
ObjectMeta: metav1.ObjectMeta{
154+
Name: peerName,
155+
},
156+
Spec: v1alpha1.PeerSpec{
157+
AllowedIPs: []string{connectOpts.allowedIP.String()},
158+
PersistentKeepalive: connectOpts.persistentKeepalive,
159+
PublicKey: publicKey.String(),
160+
},
161+
}
162+
if _, err := opts.kc.KiloV1alpha1().Peers().Create(ctx, peer, metav1.CreateOptions{}); err != nil {
163+
return fmt.Errorf("failed to create peer: %w", err)
164+
}
165+
level.Info(logger).Log("msg", "created peer", "peer", peerName)
166+
if connectOpts.cleanUp {
167+
defer func() {
168+
ctxWithTimeout, cancelWithTimeout := context.WithTimeout(context.Background(), 10*time.Second)
169+
defer cancelWithTimeout()
170+
if err := opts.kc.KiloV1alpha1().Peers().Delete(ctxWithTimeout, peerName, metav1.DeleteOptions{}); err != nil {
171+
level.Error(logger).Log("err", fmt.Sprintf("failed to delete peer: %v", err))
172+
} else {
173+
level.Info(logger).Log("msg", "deleted peer", "peer", peerName)
174+
}
175+
}()
176+
}
177+
178+
} else if err != nil {
179+
return fmt.Errorf("failed to get peer: %w", err)
180+
}
181+
182+
iface, _, err := wireguard.New(connectOpts.interfaceName, connectOpts.mtu)
183+
if err != nil {
184+
return fmt.Errorf("failed to create wg interface: %w", err)
185+
}
186+
level.Info(logger).Log("msg", "created WireGuard interface", "name", connectOpts.interfaceName, "index", iface)
187+
188+
table := route.NewTable()
189+
if connectOpts.cleanUp {
190+
defer cleanUp(iface, table, logger)
191+
}
192+
193+
if err := iproute.SetAddress(iface, &connectOpts.allowedIP); err != nil {
194+
return err
195+
}
196+
level.Info(logger).Log("msg", "set IP address of WireGuard interface", "IP", connectOpts.allowedIP.String())
197+
198+
if err := iproute.Set(iface, true); err != nil {
199+
return err
200+
}
201+
202+
var g run.Group
203+
g.Add(run.SignalHandler(ctx, syscall.SIGINT, syscall.SIGTERM))
204+
205+
{
206+
g.Add(
207+
func() error {
208+
errCh, err := table.Run(ctx.Done())
209+
if err != nil {
210+
return fmt.Errorf("failed to watch for route table updates: %w", err)
211+
}
212+
for {
213+
select {
214+
case err, ok := <-errCh:
215+
if ok {
216+
level.Error(logger).Log("err", err.Error())
217+
} else {
218+
return nil
219+
}
220+
case <-ctx.Done():
221+
return nil
222+
}
223+
}
224+
},
225+
func(err error) {
226+
cancel()
227+
var serr run.SignalError
228+
if ok := errors.As(err, &serr); ok {
229+
level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error())
230+
} else {
231+
level.Error(logger).Log("msg", "received error", "err", err.Error())
232+
}
233+
},
234+
)
235+
}
236+
{
237+
g.Add(
238+
func() error {
239+
level.Info(logger).Log("msg", "starting syncer")
240+
for {
241+
if err := sync(table, peerName, privateKey, iface, logger); err != nil {
242+
level.Error(logger).Log("msg", "failed to sync", "err", err.Error())
243+
}
244+
select {
245+
case <-time.After(connectOpts.resyncPeriod):
246+
case <-ctx.Done():
247+
return nil
248+
}
249+
}
250+
}, func(err error) {
251+
cancel()
252+
var serr run.SignalError
253+
if ok := errors.As(err, &serr); ok {
254+
level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error())
255+
} else {
256+
level.Error(logger).Log("msg", "received error", "err", err.Error())
257+
}
258+
})
259+
}
260+
261+
err = g.Run()
262+
var serr run.SignalError
263+
if ok := errors.As(err, &serr); ok {
264+
return nil
265+
}
266+
return err
267+
}
268+
269+
func cleanUp(iface int, t *route.Table, logger log.Logger) {
270+
if err := iproute.Set(iface, false); err != nil {
271+
level.Error(logger).Log("err", fmt.Sprintf("failed to set WireGuard interface down: %v", err))
272+
}
273+
if err := iproute.RemoveInterface(iface); err != nil {
274+
level.Error(logger).Log("err", fmt.Sprintf("failed to remove WireGuard interface: %v", err))
275+
}
276+
if err := t.CleanUp(); err != nil {
277+
level.Error(logger).Log("failed to clean up routes: %v", err)
278+
}
279+
280+
return
281+
}
282+
283+
func sync(table *route.Table, peerName string, privateKey wgtypes.Key, iface int, logger log.Logger) error {
284+
ns, err := opts.backend.Nodes().List()
285+
if err != nil {
286+
return fmt.Errorf("failed to list nodes: %w", err)
287+
}
288+
for _, n := range ns {
289+
_, err := n.Endpoint.UDPAddr(true)
290+
if err != nil {
291+
return err
292+
}
293+
}
294+
ps, err := opts.backend.Peers().List()
295+
if err != nil {
296+
return fmt.Errorf("failed to list peers: %w", err)
297+
}
298+
// Obtain the Granularity by looking at the annotation of the first node.
299+
if opts.granularity, err = determineGranularity(opts.granularity, ns); err != nil {
300+
return fmt.Errorf("failed to determine granularity: %w", err)
301+
}
302+
var hostname string
303+
var subnet *net.IPNet
304+
nodes := make(map[string]*mesh.Node)
305+
var nodeNames []string
306+
for _, n := range ns {
307+
if n.Ready() {
308+
nodes[n.Name] = n
309+
hostname = n.Name
310+
nodeNames = append(nodeNames, n.Name)
311+
}
312+
if n.WireGuardIP != nil && subnet == nil {
313+
subnet = n.WireGuardIP
314+
}
315+
}
316+
if len(nodes) == 0 {
317+
return errors.New("did not find any valid Kilo nodes in the cluster")
318+
}
319+
if subnet == nil {
320+
return errors.New("did not find a valid Kilo subnet on any node")
321+
}
322+
subnet.IP = subnet.IP.Mask(subnet.Mask)
323+
sort.Strings(nodeNames)
324+
nodes[nodeNames[0]].AllowedLocationIPs = append(nodes[nodeNames[0]].AllowedLocationIPs, connectOpts.allowedIPs...)
325+
peers := make(map[string]*mesh.Peer)
326+
for _, p := range ps {
327+
if p.Ready() {
328+
peers[p.Name] = p
329+
}
330+
}
331+
if _, ok := peers[peerName]; !ok {
332+
return fmt.Errorf("did not find any peer named %q in the cluster", peerName)
333+
}
334+
335+
t, err := mesh.NewTopology(nodes, peers, opts.granularity, hostname, opts.port, wgtypes.Key{}, subnet, *peers[peerName].PersistentKeepaliveInterval, logger)
336+
if err != nil {
337+
return fmt.Errorf("failed to create topology: %w", err)
338+
}
339+
conf := t.PeerConf(peerName)
340+
conf.PrivateKey = &privateKey
341+
conf.ListenPort = &opts.port
342+
343+
wgClient, err := wgctrl.New()
344+
if err != nil {
345+
return err
346+
}
347+
defer wgClient.Close()
348+
349+
current, err := wgClient.Device(connectOpts.interfaceName)
350+
if err != nil {
351+
return err
352+
}
353+
354+
var equal bool
355+
var diff string
356+
equal, diff = conf.Equal(current)
357+
if !equal {
358+
// If the key is empty, then it's the first time we are running
359+
// so don't bother printing a diff.
360+
if current.PrivateKey != [wgtypes.KeyLen]byte{} {
361+
level.Info(logger).Log("msg", "WireGuard configurations are different", "diff", diff)
362+
}
363+
level.Debug(logger).Log("msg", "setting WireGuard config", "config", conf.WGConfig())
364+
if err := wgClient.ConfigureDevice(connectOpts.interfaceName, conf.WGConfig()); err != nil {
365+
return err
366+
}
367+
}
368+
369+
if err := table.Set(t.PeerRoutes(peerName, iface, connectOpts.allowedIPs)); err != nil {
370+
return fmt.Errorf("failed to update route table: %w", err)
371+
}
372+
373+
return nil
374+
}

0 commit comments

Comments
 (0)