|
| 1 | +// Copyright 2022 the Kilo authors |
| 2 | +// |
| 3 | +// Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | +// you may not use this file except in compliance with the License. |
| 5 | +// You may obtain a copy of the License at |
| 6 | +// |
| 7 | +// http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | +// |
| 9 | +// Unless required by applicable law or agreed to in writing, software |
| 10 | +// distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | +// See the License for the specific language governing permissions and |
| 13 | +// limitations under the License. |
| 14 | + |
| 15 | +//go:build linux |
| 16 | +// +build linux |
| 17 | + |
| 18 | +package main |
| 19 | + |
| 20 | +import ( |
| 21 | + "context" |
| 22 | + "errors" |
| 23 | + "fmt" |
| 24 | + "net" |
| 25 | + "os" |
| 26 | + "sort" |
| 27 | + "strings" |
| 28 | + "syscall" |
| 29 | + "time" |
| 30 | + |
| 31 | + "github.com/go-kit/kit/log" |
| 32 | + "github.com/go-kit/kit/log/level" |
| 33 | + "github.com/oklog/run" |
| 34 | + "github.com/spf13/cobra" |
| 35 | + "golang.zx2c4.com/wireguard/wgctrl" |
| 36 | + "golang.zx2c4.com/wireguard/wgctrl/wgtypes" |
| 37 | + apierrors "k8s.io/apimachinery/pkg/api/errors" |
| 38 | + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" |
| 39 | + |
| 40 | + "github.com/squat/kilo/pkg/iproute" |
| 41 | + "github.com/squat/kilo/pkg/k8s/apis/kilo/v1alpha1" |
| 42 | + "github.com/squat/kilo/pkg/mesh" |
| 43 | + "github.com/squat/kilo/pkg/route" |
| 44 | + "github.com/squat/kilo/pkg/wireguard" |
| 45 | +) |
| 46 | + |
| 47 | +var ( |
| 48 | + logLevel string |
| 49 | + connectOpts struct { |
| 50 | + allowedIP net.IPNet |
| 51 | + allowedIPs []net.IPNet |
| 52 | + privateKey string |
| 53 | + cleanUp bool |
| 54 | + mtu uint |
| 55 | + resyncPeriod time.Duration |
| 56 | + interfaceName string |
| 57 | + persistentKeepalive int |
| 58 | + } |
| 59 | +) |
| 60 | + |
| 61 | +func takeIPNet(_ net.IP, i *net.IPNet, err error) *net.IPNet { |
| 62 | + if err != nil { |
| 63 | + panic(err) |
| 64 | + } |
| 65 | + return i |
| 66 | +} |
| 67 | + |
| 68 | +func connect() *cobra.Command { |
| 69 | + cmd := &cobra.Command{ |
| 70 | + Use: "connect", |
| 71 | + Args: cobra.ExactArgs(1), |
| 72 | + RunE: runConnect, |
| 73 | + Short: "connect to a Kilo cluster as a peer over WireGuard", |
| 74 | + SilenceUsage: true, |
| 75 | + } |
| 76 | + cmd.Flags().IPNetVarP(&connectOpts.allowedIP, "allowed-ip", "a", *takeIPNet(net.ParseCIDR("10.10.10.10/32")), "Allowed IP of the peer.") |
| 77 | + cmd.Flags().StringSliceVar(&allowedIPs, "allowed-ips", []string{}, "Additional allowed IPs of the cluster, e.g. the service CIDR.") |
| 78 | + cmd.Flags().StringVar(&logLevel, "log-level", logLevelInfo, fmt.Sprintf("Log level to use. Possible values: %s", availableLogLevels)) |
| 79 | + cmd.Flags().StringVar(&connectOpts.privateKey, "private-key", "", "Path to an existing WireGuard private key file.") |
| 80 | + cmd.Flags().BoolVar(&connectOpts.cleanUp, "clean-up", true, "Should Kilo clean up the routes and interface when it shuts down?") |
| 81 | + cmd.Flags().UintVar(&connectOpts.mtu, "mtu", uint(1420), "The MTU for the WireGuard interface.") |
| 82 | + cmd.Flags().DurationVar(&connectOpts.resyncPeriod, "resync-period", 30*time.Second, "How often should Kilo reconcile?") |
| 83 | + cmd.Flags().StringVarP(&connectOpts.interfaceName, "interface", "i", mesh.DefaultKiloInterface, "Name of the Kilo interface to use; if it does not exist, it will be created.") |
| 84 | + cmd.Flags().IntVar(&connectOpts.persistentKeepalive, "persistent-keepalive", 10, "How often should WireGuard send keepalives? Setting to 0 will disable sending keepalives.") |
| 85 | + |
| 86 | + availableLogLevels = strings.Join([]string{ |
| 87 | + logLevelAll, |
| 88 | + logLevelDebug, |
| 89 | + logLevelInfo, |
| 90 | + logLevelWarn, |
| 91 | + logLevelError, |
| 92 | + logLevelNone, |
| 93 | + }, ", ") |
| 94 | + |
| 95 | + return cmd |
| 96 | +} |
| 97 | + |
| 98 | +func runConnect(cmd *cobra.Command, args []string) error { |
| 99 | + ctx, cancel := context.WithCancel(context.Background()) |
| 100 | + defer cancel() |
| 101 | + |
| 102 | + logger := log.NewJSONLogger(log.NewSyncWriter(os.Stdout)) |
| 103 | + switch logLevel { |
| 104 | + case logLevelAll: |
| 105 | + logger = level.NewFilter(logger, level.AllowAll()) |
| 106 | + case logLevelDebug: |
| 107 | + logger = level.NewFilter(logger, level.AllowDebug()) |
| 108 | + case logLevelInfo: |
| 109 | + logger = level.NewFilter(logger, level.AllowInfo()) |
| 110 | + case logLevelWarn: |
| 111 | + logger = level.NewFilter(logger, level.AllowWarn()) |
| 112 | + case logLevelError: |
| 113 | + logger = level.NewFilter(logger, level.AllowError()) |
| 114 | + case logLevelNone: |
| 115 | + logger = level.NewFilter(logger, level.AllowNone()) |
| 116 | + default: |
| 117 | + return fmt.Errorf("log level %s unknown; possible values are: %s", logLevel, availableLogLevels) |
| 118 | + } |
| 119 | + logger = log.With(logger, "ts", log.DefaultTimestampUTC) |
| 120 | + logger = log.With(logger, "caller", log.DefaultCaller) |
| 121 | + peerName := args[0] |
| 122 | + |
| 123 | + for i := range allowedIPs { |
| 124 | + _, aip, err := net.ParseCIDR(allowedIPs[i]) |
| 125 | + if err != nil { |
| 126 | + return err |
| 127 | + } |
| 128 | + connectOpts.allowedIPs = append(connectOpts.allowedIPs, *aip) |
| 129 | + } |
| 130 | + |
| 131 | + var privateKey wgtypes.Key |
| 132 | + var err error |
| 133 | + if connectOpts.privateKey == "" { |
| 134 | + privateKey, err = wgtypes.GeneratePrivateKey() |
| 135 | + if err != nil { |
| 136 | + return fmt.Errorf("failed to generate private key: %w", err) |
| 137 | + } |
| 138 | + } else { |
| 139 | + raw, err := os.ReadFile(connectOpts.privateKey) |
| 140 | + if err != nil { |
| 141 | + return fmt.Errorf("failed to read private key: %w", err) |
| 142 | + } |
| 143 | + privateKey, err = wgtypes.ParseKey(string(raw)) |
| 144 | + if err != nil { |
| 145 | + return fmt.Errorf("failed to parse private key: %w", err) |
| 146 | + } |
| 147 | + } |
| 148 | + publicKey := privateKey.PublicKey() |
| 149 | + level.Info(logger).Log("msg", "generated public key", "key", publicKey) |
| 150 | + |
| 151 | + if _, err := opts.kc.KiloV1alpha1().Peers().Get(ctx, peerName, metav1.GetOptions{}); apierrors.IsNotFound(err) { |
| 152 | + peer := &v1alpha1.Peer{ |
| 153 | + ObjectMeta: metav1.ObjectMeta{ |
| 154 | + Name: peerName, |
| 155 | + }, |
| 156 | + Spec: v1alpha1.PeerSpec{ |
| 157 | + AllowedIPs: []string{connectOpts.allowedIP.String()}, |
| 158 | + PersistentKeepalive: connectOpts.persistentKeepalive, |
| 159 | + PublicKey: publicKey.String(), |
| 160 | + }, |
| 161 | + } |
| 162 | + if _, err := opts.kc.KiloV1alpha1().Peers().Create(ctx, peer, metav1.CreateOptions{}); err != nil { |
| 163 | + return fmt.Errorf("failed to create peer: %w", err) |
| 164 | + } |
| 165 | + level.Info(logger).Log("msg", "created peer", "peer", peerName) |
| 166 | + if connectOpts.cleanUp { |
| 167 | + defer func() { |
| 168 | + ctxWithTimeout, cancelWithTimeout := context.WithTimeout(context.Background(), 10*time.Second) |
| 169 | + defer cancelWithTimeout() |
| 170 | + if err := opts.kc.KiloV1alpha1().Peers().Delete(ctxWithTimeout, peerName, metav1.DeleteOptions{}); err != nil { |
| 171 | + level.Error(logger).Log("err", fmt.Sprintf("failed to delete peer: %v", err)) |
| 172 | + } else { |
| 173 | + level.Info(logger).Log("msg", "deleted peer", "peer", peerName) |
| 174 | + } |
| 175 | + }() |
| 176 | + } |
| 177 | + |
| 178 | + } else if err != nil { |
| 179 | + return fmt.Errorf("failed to get peer: %w", err) |
| 180 | + } |
| 181 | + |
| 182 | + iface, _, err := wireguard.New(connectOpts.interfaceName, connectOpts.mtu) |
| 183 | + if err != nil { |
| 184 | + return fmt.Errorf("failed to create wg interface: %w", err) |
| 185 | + } |
| 186 | + level.Info(logger).Log("msg", "created WireGuard interface", "name", connectOpts.interfaceName, "index", iface) |
| 187 | + |
| 188 | + table := route.NewTable() |
| 189 | + if connectOpts.cleanUp { |
| 190 | + defer cleanUp(iface, table, logger) |
| 191 | + } |
| 192 | + |
| 193 | + if err := iproute.SetAddress(iface, &connectOpts.allowedIP); err != nil { |
| 194 | + return err |
| 195 | + } |
| 196 | + level.Info(logger).Log("msg", "set IP address of WireGuard interface", "IP", connectOpts.allowedIP.String()) |
| 197 | + |
| 198 | + if err := iproute.Set(iface, true); err != nil { |
| 199 | + return err |
| 200 | + } |
| 201 | + |
| 202 | + var g run.Group |
| 203 | + g.Add(run.SignalHandler(ctx, syscall.SIGINT, syscall.SIGTERM)) |
| 204 | + |
| 205 | + { |
| 206 | + g.Add( |
| 207 | + func() error { |
| 208 | + errCh, err := table.Run(ctx.Done()) |
| 209 | + if err != nil { |
| 210 | + return fmt.Errorf("failed to watch for route table updates: %w", err) |
| 211 | + } |
| 212 | + for { |
| 213 | + select { |
| 214 | + case err, ok := <-errCh: |
| 215 | + if ok { |
| 216 | + level.Error(logger).Log("err", err.Error()) |
| 217 | + } else { |
| 218 | + return nil |
| 219 | + } |
| 220 | + case <-ctx.Done(): |
| 221 | + return nil |
| 222 | + } |
| 223 | + } |
| 224 | + }, |
| 225 | + func(err error) { |
| 226 | + cancel() |
| 227 | + var serr run.SignalError |
| 228 | + if ok := errors.As(err, &serr); ok { |
| 229 | + level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error()) |
| 230 | + } else { |
| 231 | + level.Error(logger).Log("msg", "received error", "err", err.Error()) |
| 232 | + } |
| 233 | + }, |
| 234 | + ) |
| 235 | + } |
| 236 | + { |
| 237 | + g.Add( |
| 238 | + func() error { |
| 239 | + level.Info(logger).Log("msg", "starting syncer") |
| 240 | + for { |
| 241 | + if err := sync(table, peerName, privateKey, iface, logger); err != nil { |
| 242 | + level.Error(logger).Log("msg", "failed to sync", "err", err.Error()) |
| 243 | + } |
| 244 | + select { |
| 245 | + case <-time.After(connectOpts.resyncPeriod): |
| 246 | + case <-ctx.Done(): |
| 247 | + return nil |
| 248 | + } |
| 249 | + } |
| 250 | + }, func(err error) { |
| 251 | + cancel() |
| 252 | + var serr run.SignalError |
| 253 | + if ok := errors.As(err, &serr); ok { |
| 254 | + level.Debug(logger).Log("msg", "received signal", "signal", serr.Signal.String(), "err", err.Error()) |
| 255 | + } else { |
| 256 | + level.Error(logger).Log("msg", "received error", "err", err.Error()) |
| 257 | + } |
| 258 | + }) |
| 259 | + } |
| 260 | + |
| 261 | + err = g.Run() |
| 262 | + var serr run.SignalError |
| 263 | + if ok := errors.As(err, &serr); ok { |
| 264 | + return nil |
| 265 | + } |
| 266 | + return err |
| 267 | +} |
| 268 | + |
| 269 | +func cleanUp(iface int, t *route.Table, logger log.Logger) { |
| 270 | + if err := iproute.Set(iface, false); err != nil { |
| 271 | + level.Error(logger).Log("err", fmt.Sprintf("failed to set WireGuard interface down: %v", err)) |
| 272 | + } |
| 273 | + if err := iproute.RemoveInterface(iface); err != nil { |
| 274 | + level.Error(logger).Log("err", fmt.Sprintf("failed to remove WireGuard interface: %v", err)) |
| 275 | + } |
| 276 | + if err := t.CleanUp(); err != nil { |
| 277 | + level.Error(logger).Log("failed to clean up routes: %v", err) |
| 278 | + } |
| 279 | + |
| 280 | + return |
| 281 | +} |
| 282 | + |
| 283 | +func sync(table *route.Table, peerName string, privateKey wgtypes.Key, iface int, logger log.Logger) error { |
| 284 | + ns, err := opts.backend.Nodes().List() |
| 285 | + if err != nil { |
| 286 | + return fmt.Errorf("failed to list nodes: %w", err) |
| 287 | + } |
| 288 | + for _, n := range ns { |
| 289 | + _, err := n.Endpoint.UDPAddr(true) |
| 290 | + if err != nil { |
| 291 | + return err |
| 292 | + } |
| 293 | + } |
| 294 | + ps, err := opts.backend.Peers().List() |
| 295 | + if err != nil { |
| 296 | + return fmt.Errorf("failed to list peers: %w", err) |
| 297 | + } |
| 298 | + // Obtain the Granularity by looking at the annotation of the first node. |
| 299 | + if opts.granularity, err = determineGranularity(opts.granularity, ns); err != nil { |
| 300 | + return fmt.Errorf("failed to determine granularity: %w", err) |
| 301 | + } |
| 302 | + var hostname string |
| 303 | + var subnet *net.IPNet |
| 304 | + nodes := make(map[string]*mesh.Node) |
| 305 | + var nodeNames []string |
| 306 | + for _, n := range ns { |
| 307 | + if n.Ready() { |
| 308 | + nodes[n.Name] = n |
| 309 | + hostname = n.Name |
| 310 | + nodeNames = append(nodeNames, n.Name) |
| 311 | + } |
| 312 | + if n.WireGuardIP != nil && subnet == nil { |
| 313 | + subnet = n.WireGuardIP |
| 314 | + } |
| 315 | + } |
| 316 | + if len(nodes) == 0 { |
| 317 | + return errors.New("did not find any valid Kilo nodes in the cluster") |
| 318 | + } |
| 319 | + if subnet == nil { |
| 320 | + return errors.New("did not find a valid Kilo subnet on any node") |
| 321 | + } |
| 322 | + subnet.IP = subnet.IP.Mask(subnet.Mask) |
| 323 | + sort.Strings(nodeNames) |
| 324 | + nodes[nodeNames[0]].AllowedLocationIPs = append(nodes[nodeNames[0]].AllowedLocationIPs, connectOpts.allowedIPs...) |
| 325 | + peers := make(map[string]*mesh.Peer) |
| 326 | + for _, p := range ps { |
| 327 | + if p.Ready() { |
| 328 | + peers[p.Name] = p |
| 329 | + } |
| 330 | + } |
| 331 | + if _, ok := peers[peerName]; !ok { |
| 332 | + return fmt.Errorf("did not find any peer named %q in the cluster", peerName) |
| 333 | + } |
| 334 | + |
| 335 | + t, err := mesh.NewTopology(nodes, peers, opts.granularity, hostname, opts.port, wgtypes.Key{}, subnet, *peers[peerName].PersistentKeepaliveInterval, logger) |
| 336 | + if err != nil { |
| 337 | + return fmt.Errorf("failed to create topology: %w", err) |
| 338 | + } |
| 339 | + conf := t.PeerConf(peerName) |
| 340 | + conf.PrivateKey = &privateKey |
| 341 | + conf.ListenPort = &opts.port |
| 342 | + |
| 343 | + wgClient, err := wgctrl.New() |
| 344 | + if err != nil { |
| 345 | + return err |
| 346 | + } |
| 347 | + defer wgClient.Close() |
| 348 | + |
| 349 | + current, err := wgClient.Device(connectOpts.interfaceName) |
| 350 | + if err != nil { |
| 351 | + return err |
| 352 | + } |
| 353 | + |
| 354 | + var equal bool |
| 355 | + var diff string |
| 356 | + equal, diff = conf.Equal(current) |
| 357 | + if !equal { |
| 358 | + // If the key is empty, then it's the first time we are running |
| 359 | + // so don't bother printing a diff. |
| 360 | + if current.PrivateKey != [wgtypes.KeyLen]byte{} { |
| 361 | + level.Info(logger).Log("msg", "WireGuard configurations are different", "diff", diff) |
| 362 | + } |
| 363 | + level.Debug(logger).Log("msg", "setting WireGuard config", "config", conf.WGConfig()) |
| 364 | + if err := wgClient.ConfigureDevice(connectOpts.interfaceName, conf.WGConfig()); err != nil { |
| 365 | + return err |
| 366 | + } |
| 367 | + } |
| 368 | + |
| 369 | + if err := table.Set(t.PeerRoutes(peerName, iface, connectOpts.allowedIPs)); err != nil { |
| 370 | + return fmt.Errorf("failed to update route table: %w", err) |
| 371 | + } |
| 372 | + |
| 373 | + return nil |
| 374 | +} |
0 commit comments