2020-02-05 22:16:58 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package controlclient
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/rand"
|
|
|
|
"encoding/binary"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2020-10-14 22:01:33 +01:00
|
|
|
"flag"
|
2020-02-05 22:16:58 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2020-04-27 16:18:35 +01:00
|
|
|
"net/url"
|
2020-02-05 22:16:58 +00:00
|
|
|
"os"
|
2020-11-04 21:48:50 +00:00
|
|
|
"os/exec"
|
2021-02-15 21:23:11 +00:00
|
|
|
"path/filepath"
|
2020-04-02 01:18:39 +01:00
|
|
|
"reflect"
|
2020-07-28 05:14:28 +01:00
|
|
|
"runtime"
|
2020-08-08 04:44:04 +01:00
|
|
|
"sort"
|
2020-03-20 03:45:49 +00:00
|
|
|
"strconv"
|
2020-02-05 22:16:58 +00:00
|
|
|
"strings"
|
|
|
|
"sync"
|
2020-08-17 20:56:17 +01:00
|
|
|
"sync/atomic"
|
2020-02-05 22:16:58 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"golang.org/x/crypto/nacl/box"
|
2020-07-31 21:27:09 +01:00
|
|
|
"inet.af/netaddr"
|
2021-02-18 16:58:13 +00:00
|
|
|
"tailscale.com/health"
|
2020-04-08 06:24:06 +01:00
|
|
|
"tailscale.com/log/logheap"
|
2020-11-11 20:37:53 +00:00
|
|
|
"tailscale.com/net/dnscache"
|
2021-02-26 20:49:54 +00:00
|
|
|
"tailscale.com/net/dnsfallback"
|
2021-03-04 03:19:41 +00:00
|
|
|
"tailscale.com/net/interfaces"
|
2020-05-29 01:06:08 +01:00
|
|
|
"tailscale.com/net/netns"
|
2020-04-25 21:24:53 +01:00
|
|
|
"tailscale.com/net/tlsdial"
|
2020-08-13 23:25:54 +01:00
|
|
|
"tailscale.com/net/tshttpproxy"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/tailcfg"
|
2020-02-15 03:23:16 +00:00
|
|
|
"tailscale.com/types/logger"
|
2021-02-05 23:44:46 +00:00
|
|
|
"tailscale.com/types/netmap"
|
2020-08-17 20:56:17 +01:00
|
|
|
"tailscale.com/types/opt"
|
2021-02-05 23:23:01 +00:00
|
|
|
"tailscale.com/types/persist"
|
2020-12-30 01:22:56 +00:00
|
|
|
"tailscale.com/types/wgkey"
|
2021-04-16 01:08:24 +01:00
|
|
|
"tailscale.com/util/dnsname"
|
2020-11-24 23:35:04 +00:00
|
|
|
"tailscale.com/util/systemd"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/version"
|
2020-12-07 17:13:26 +00:00
|
|
|
"tailscale.com/wgengine/filter"
|
2021-03-05 04:11:55 +00:00
|
|
|
"tailscale.com/wgengine/monitor"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Direct is the client that connects to a tailcontrol server for a node.
|
|
|
|
type Direct struct {
|
2021-01-13 23:03:15 +00:00
|
|
|
httpc *http.Client // HTTP client used to talk to tailcontrol
|
|
|
|
serverURL string // URL of the tailcontrol server
|
|
|
|
timeNow func() time.Time
|
|
|
|
lastPrintMap time.Time
|
|
|
|
newDecompressor func() (Decompressor, error)
|
|
|
|
keepAlive bool
|
|
|
|
logf logger.Logf
|
2021-03-05 04:11:55 +00:00
|
|
|
linkMon *monitor.Mon // or nil
|
2021-01-13 23:03:15 +00:00
|
|
|
discoPubKey tailcfg.DiscoKey
|
2021-03-31 16:51:22 +01:00
|
|
|
getMachinePrivKey func() (wgkey.Private, error)
|
2021-01-13 23:03:15 +00:00
|
|
|
debugFlags []string
|
|
|
|
keepSharerAndUserSplit bool
|
2021-03-31 19:55:21 +01:00
|
|
|
skipIPForwardingCheck bool
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
mu sync.Mutex // mutex guards the following fields
|
2020-12-30 01:22:56 +00:00
|
|
|
serverKey wgkey.Key
|
2021-02-05 23:23:01 +00:00
|
|
|
persist persist.Persist
|
2020-04-09 08:16:36 +01:00
|
|
|
authKey string
|
2020-12-30 01:22:56 +00:00
|
|
|
tryingNewKey wgkey.Private
|
2020-02-05 22:16:58 +00:00
|
|
|
expiry *time.Time
|
2020-06-16 00:04:12 +01:00
|
|
|
// hostinfo is mutated in-place while mu is held.
|
2020-10-14 22:01:33 +01:00
|
|
|
hostinfo *tailcfg.Hostinfo // always non-nil
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
endpoints []tailcfg.Endpoint
|
2020-10-14 22:01:33 +01:00
|
|
|
everEndpoints bool // whether we've ever had non-empty endpoints
|
|
|
|
localPort uint16 // or zero to mean auto
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Options struct {
|
2021-03-31 16:51:22 +01:00
|
|
|
Persist persist.Persist // initial persistent data
|
|
|
|
GetMachinePrivateKey func() (wgkey.Private, error) // returns the machine key to use
|
|
|
|
ServerURL string // URL of the tailcontrol server
|
|
|
|
AuthKey string // optional node auth key for auto registration
|
|
|
|
TimeNow func() time.Time // time.Now implementation used by Client
|
|
|
|
Hostinfo *tailcfg.Hostinfo // non-nil passes ownership, nil means to use default using os.Hostname, etc
|
|
|
|
DiscoPublicKey tailcfg.DiscoKey
|
|
|
|
NewDecompressor func() (Decompressor, error)
|
|
|
|
KeepAlive bool
|
|
|
|
Logf logger.Logf
|
|
|
|
HTTPTestClient *http.Client // optional HTTP client to use (for tests only)
|
|
|
|
DebugFlags []string // debug settings to send to control
|
|
|
|
LinkMonitor *monitor.Mon // optional link monitor
|
2021-01-13 23:03:15 +00:00
|
|
|
|
|
|
|
// KeepSharerAndUserSplit controls whether the client
|
|
|
|
// understands Node.Sharer. If false, the Sharer is mapped to the User.
|
|
|
|
KeepSharerAndUserSplit bool
|
2021-03-31 19:55:21 +01:00
|
|
|
|
|
|
|
// SkipIPForwardingCheck declares that the host's IP
|
|
|
|
// forwarding works and should not be double-checked by the
|
|
|
|
// controlclient package.
|
|
|
|
SkipIPForwardingCheck bool
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Decompressor interface {
|
|
|
|
DecodeAll(input, dst []byte) ([]byte, error)
|
|
|
|
Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewDirect returns a new Direct client.
|
|
|
|
func NewDirect(opts Options) (*Direct, error) {
|
|
|
|
if opts.ServerURL == "" {
|
|
|
|
return nil, errors.New("controlclient.New: no server URL specified")
|
|
|
|
}
|
2021-03-31 16:51:22 +01:00
|
|
|
if opts.GetMachinePrivateKey == nil {
|
|
|
|
return nil, errors.New("controlclient.New: no GetMachinePrivateKey specified")
|
2020-09-28 23:28:26 +01:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
opts.ServerURL = strings.TrimRight(opts.ServerURL, "/")
|
2020-04-27 16:18:35 +01:00
|
|
|
serverURL, err := url.Parse(opts.ServerURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
if opts.TimeNow == nil {
|
|
|
|
opts.TimeNow = time.Now
|
|
|
|
}
|
|
|
|
if opts.Logf == nil {
|
|
|
|
// TODO(apenwarr): remove this default and fail instead.
|
2020-02-25 18:04:20 +00:00
|
|
|
// TODO(bradfitz): ... but then it shouldn't be in Options.
|
2020-02-05 22:16:58 +00:00
|
|
|
opts.Logf = log.Printf
|
|
|
|
}
|
2020-04-25 21:24:53 +01:00
|
|
|
|
2020-04-26 15:45:42 +01:00
|
|
|
httpc := opts.HTTPTestClient
|
|
|
|
if httpc == nil {
|
2020-11-11 20:37:53 +00:00
|
|
|
dnsCache := &dnscache.Resolver{
|
2021-02-26 20:49:54 +00:00
|
|
|
Forward: dnscache.Get().Forward, // use default cache's forwarder
|
|
|
|
UseLastGood: true,
|
|
|
|
LookupIPFallback: dnsfallback.Lookup,
|
2020-11-11 20:37:53 +00:00
|
|
|
}
|
2020-06-01 18:50:37 +01:00
|
|
|
dialer := netns.NewDialer()
|
2020-04-26 15:45:42 +01:00
|
|
|
tr := http.DefaultTransport.(*http.Transport).Clone()
|
2020-08-13 23:25:54 +01:00
|
|
|
tr.Proxy = tshttpproxy.ProxyFromEnvironment
|
2020-08-27 04:02:16 +01:00
|
|
|
tshttpproxy.SetTransportGetProxyConnectHeader(tr)
|
2021-04-10 03:09:22 +01:00
|
|
|
tr.TLSClientConfig = tlsdial.Config(serverURL.Hostname(), tr.TLSClientConfig)
|
2020-11-11 20:37:53 +00:00
|
|
|
tr.DialContext = dnscache.Dialer(dialer.DialContext, dnsCache)
|
2021-02-26 20:49:54 +00:00
|
|
|
tr.DialTLSContext = dnscache.TLSDialer(dialer.DialContext, dnsCache, tr.TLSClientConfig)
|
2020-04-26 15:45:42 +01:00
|
|
|
tr.ForceAttemptHTTP2 = true
|
|
|
|
httpc = &http.Client{Transport: tr}
|
|
|
|
}
|
2020-04-25 21:24:53 +01:00
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
c := &Direct{
|
2021-01-13 23:03:15 +00:00
|
|
|
httpc: httpc,
|
2021-03-31 16:51:22 +01:00
|
|
|
getMachinePrivKey: opts.GetMachinePrivateKey,
|
2021-01-13 23:03:15 +00:00
|
|
|
serverURL: opts.ServerURL,
|
|
|
|
timeNow: opts.TimeNow,
|
|
|
|
logf: opts.Logf,
|
|
|
|
newDecompressor: opts.NewDecompressor,
|
|
|
|
keepAlive: opts.KeepAlive,
|
|
|
|
persist: opts.Persist,
|
|
|
|
authKey: opts.AuthKey,
|
|
|
|
discoPubKey: opts.DiscoPublicKey,
|
|
|
|
debugFlags: opts.DebugFlags,
|
|
|
|
keepSharerAndUserSplit: opts.KeepSharerAndUserSplit,
|
2021-03-05 04:11:55 +00:00
|
|
|
linkMon: opts.LinkMonitor,
|
2021-03-31 19:55:21 +01:00
|
|
|
skipIPForwardingCheck: opts.SkipIPForwardingCheck,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
if opts.Hostinfo == nil {
|
|
|
|
c.SetHostinfo(NewHostinfo())
|
|
|
|
} else {
|
2020-02-25 18:04:20 +00:00
|
|
|
c.SetHostinfo(opts.Hostinfo)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
2020-07-28 05:14:28 +01:00
|
|
|
var osVersion func() string // non-nil on some platforms
|
|
|
|
|
2020-02-25 18:04:20 +00:00
|
|
|
func NewHostinfo() *tailcfg.Hostinfo {
|
2020-05-28 18:50:11 +01:00
|
|
|
hostname, _ := os.Hostname()
|
2021-04-16 01:08:24 +01:00
|
|
|
hostname = dnsname.FirstLabel(hostname)
|
2020-07-28 05:14:28 +01:00
|
|
|
var osv string
|
|
|
|
if osVersion != nil {
|
|
|
|
osv = osVersion()
|
|
|
|
}
|
2020-02-25 18:04:20 +00:00
|
|
|
return &tailcfg.Hostinfo{
|
2020-10-27 04:23:58 +00:00
|
|
|
IPNVersion: version.Long,
|
2020-02-05 22:16:58 +00:00
|
|
|
Hostname: hostname,
|
2020-04-01 16:49:25 +01:00
|
|
|
OS: version.OS(),
|
2020-07-28 05:14:28 +01:00
|
|
|
OSVersion: osv,
|
2021-02-15 21:23:11 +00:00
|
|
|
Package: packageType(),
|
2020-07-28 05:14:28 +01:00
|
|
|
GoArch: runtime.GOARCH,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-15 21:23:11 +00:00
|
|
|
func packageType() string {
|
|
|
|
switch runtime.GOOS {
|
|
|
|
case "windows":
|
|
|
|
if _, err := os.Stat(`C:\ProgramData\chocolatey\lib\tailscale`); err == nil {
|
|
|
|
return "choco"
|
|
|
|
}
|
|
|
|
case "darwin":
|
|
|
|
// Using tailscaled or IPNExtension?
|
|
|
|
exe, _ := os.Executable()
|
|
|
|
return filepath.Base(exe)
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2020-02-25 18:04:20 +00:00
|
|
|
// SetHostinfo clones the provided Hostinfo and remembers it for the
|
2020-04-02 01:18:39 +01:00
|
|
|
// next update. It reports whether the Hostinfo has changed.
|
|
|
|
func (c *Direct) SetHostinfo(hi *tailcfg.Hostinfo) bool {
|
2020-02-25 18:04:20 +00:00
|
|
|
if hi == nil {
|
|
|
|
panic("nil Hostinfo")
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
2020-04-02 01:18:39 +01:00
|
|
|
if hi.Equal(c.hostinfo) {
|
|
|
|
return false
|
|
|
|
}
|
2020-02-27 20:20:29 +00:00
|
|
|
c.hostinfo = hi.Clone()
|
2020-10-19 16:30:36 +01:00
|
|
|
j, _ := json.Marshal(c.hostinfo)
|
|
|
|
c.logf("HostInfo: %s", j)
|
2020-04-02 01:18:39 +01:00
|
|
|
return true
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-03-04 06:21:56 +00:00
|
|
|
// SetNetInfo clones the provided NetInfo and remembers it for the
|
2020-04-02 01:18:39 +01:00
|
|
|
// next update. It reports whether the NetInfo has changed.
|
|
|
|
func (c *Direct) SetNetInfo(ni *tailcfg.NetInfo) bool {
|
2020-03-04 06:21:56 +00:00
|
|
|
if ni == nil {
|
|
|
|
panic("nil NetInfo")
|
|
|
|
}
|
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
|
|
|
if c.hostinfo == nil {
|
|
|
|
c.logf("[unexpected] SetNetInfo called with no HostInfo; ignoring NetInfo update: %+v", ni)
|
2020-04-02 01:18:39 +01:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
if reflect.DeepEqual(ni, c.hostinfo.NetInfo) {
|
|
|
|
return false
|
2020-03-04 06:21:56 +00:00
|
|
|
}
|
|
|
|
c.hostinfo.NetInfo = ni.Clone()
|
2020-04-02 01:18:39 +01:00
|
|
|
return true
|
2020-03-04 06:21:56 +00:00
|
|
|
}
|
|
|
|
|
2021-02-05 23:23:01 +00:00
|
|
|
func (c *Direct) GetPersist() persist.Persist {
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
return c.persist
|
|
|
|
}
|
|
|
|
|
|
|
|
type LoginFlags int
|
|
|
|
|
|
|
|
const (
|
|
|
|
LoginDefault = LoginFlags(0)
|
|
|
|
LoginInteractive = LoginFlags(1 << iota) // force user login and key refresh
|
|
|
|
)
|
|
|
|
|
|
|
|
func (c *Direct) TryLogout(ctx context.Context) error {
|
2020-04-11 16:35:34 +01:00
|
|
|
c.logf("direct.TryLogout()")
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
mustRegen, newURL, err := c.doLogin(ctx, loginOpt{Logout: true})
|
|
|
|
c.logf("TryLogout control response: mustRegen=%v, newURL=%v, err=%v", mustRegen, newURL, err)
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
c.mu.Lock()
|
2021-02-05 23:23:01 +00:00
|
|
|
c.persist = persist.Persist{}
|
2021-04-08 05:06:31 +01:00
|
|
|
c.mu.Unlock()
|
|
|
|
|
|
|
|
return err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-03-19 17:21:33 +00:00
|
|
|
func (c *Direct) TryLogin(ctx context.Context, t *tailcfg.Oauth2Token, flags LoginFlags) (url string, err error) {
|
2020-09-28 23:28:26 +01:00
|
|
|
c.logf("direct.TryLogin(token=%v, flags=%v)", t != nil, flags)
|
2021-04-08 05:06:31 +01:00
|
|
|
return c.doLoginOrRegen(ctx, loginOpt{Token: t, Flags: flags})
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-03-31 16:25:39 +01:00
|
|
|
// WaitLoginURL sits in a long poll waiting for the user to authenticate at url.
|
|
|
|
//
|
|
|
|
// On success, newURL and err will both be nil.
|
|
|
|
func (c *Direct) WaitLoginURL(ctx context.Context, url string) (newURL string, err error) {
|
2020-04-11 16:35:34 +01:00
|
|
|
c.logf("direct.WaitLoginURL")
|
2021-04-08 05:06:31 +01:00
|
|
|
return c.doLoginOrRegen(ctx, loginOpt{URL: url})
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
func (c *Direct) doLoginOrRegen(ctx context.Context, opt loginOpt) (newURL string, err error) {
|
|
|
|
mustRegen, url, err := c.doLogin(ctx, opt)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return url, err
|
|
|
|
}
|
2021-04-08 05:06:31 +01:00
|
|
|
if mustRegen {
|
|
|
|
opt.Regen = true
|
|
|
|
_, url, err = c.doLogin(ctx, opt)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
return url, err
|
|
|
|
}
|
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
type loginOpt struct {
|
2021-04-08 05:06:31 +01:00
|
|
|
Token *tailcfg.Oauth2Token
|
|
|
|
Flags LoginFlags
|
|
|
|
Regen bool
|
|
|
|
URL string
|
|
|
|
Logout bool
|
2021-04-08 05:06:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Direct) doLogin(ctx context.Context, opt loginOpt) (mustRegen bool, newURL string, err error) {
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Lock()
|
|
|
|
persist := c.persist
|
|
|
|
tryingNewKey := c.tryingNewKey
|
|
|
|
serverKey := c.serverKey
|
2020-05-19 07:51:27 +01:00
|
|
|
authKey := c.authKey
|
2020-07-09 19:42:19 +01:00
|
|
|
hostinfo := c.hostinfo.Clone()
|
2020-06-16 00:04:12 +01:00
|
|
|
backendLogID := hostinfo.BackendLogID
|
2020-02-05 22:16:58 +00:00
|
|
|
expired := c.expiry != nil && !c.expiry.IsZero() && c.expiry.Before(c.timeNow())
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
machinePrivKey, err := c.getMachinePrivKey()
|
|
|
|
if err != nil {
|
|
|
|
return false, "", fmt.Errorf("getMachinePrivKey: %w", err)
|
|
|
|
}
|
|
|
|
if machinePrivKey.IsZero() {
|
|
|
|
return false, "", errors.New("getMachinePrivKey returned zero key")
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
regen := opt.Regen
|
2021-04-08 05:06:31 +01:00
|
|
|
if opt.Logout {
|
|
|
|
c.logf("logging out...")
|
|
|
|
} else {
|
|
|
|
if expired {
|
|
|
|
c.logf("Old key expired -> regen=true")
|
|
|
|
systemd.Status("key expired; run 'tailscale up' to authenticate")
|
|
|
|
regen = true
|
|
|
|
}
|
|
|
|
if (opt.Flags & LoginInteractive) != 0 {
|
|
|
|
c.logf("LoginInteractive -> regen=true")
|
|
|
|
regen = true
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
c.logf("doLogin(regen=%v, hasUrl=%v)", regen, opt.URL != "")
|
2020-12-30 01:22:56 +00:00
|
|
|
if serverKey.IsZero() {
|
2020-02-05 22:16:58 +00:00
|
|
|
var err error
|
|
|
|
serverKey, err = loadServerKey(ctx, c.httpc, c.serverURL)
|
|
|
|
if err != nil {
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c.mu.Lock()
|
|
|
|
c.serverKey = serverKey
|
|
|
|
c.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
2020-12-30 01:22:56 +00:00
|
|
|
var oldNodeKey wgkey.Key
|
2021-04-08 05:06:31 +01:00
|
|
|
switch {
|
|
|
|
case opt.Logout:
|
|
|
|
tryingNewKey = persist.PrivateNodeKey
|
|
|
|
case opt.URL != "":
|
|
|
|
// Nothing.
|
|
|
|
case regen || persist.PrivateNodeKey.IsZero():
|
2020-04-11 16:35:34 +01:00
|
|
|
c.logf("Generating a new nodekey.")
|
2020-02-05 22:16:58 +00:00
|
|
|
persist.OldPrivateNodeKey = persist.PrivateNodeKey
|
2020-12-30 01:22:56 +00:00
|
|
|
key, err := wgkey.NewPrivate()
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
c.logf("login keygen: %v", err)
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-02-11 03:04:52 +00:00
|
|
|
tryingNewKey = key
|
2021-04-08 05:06:31 +01:00
|
|
|
default:
|
2020-02-05 22:16:58 +00:00
|
|
|
// Try refreshing the current key first
|
|
|
|
tryingNewKey = persist.PrivateNodeKey
|
|
|
|
}
|
2020-10-01 01:13:41 +01:00
|
|
|
if !persist.OldPrivateNodeKey.IsZero() {
|
2020-02-11 03:04:52 +00:00
|
|
|
oldNodeKey = persist.OldPrivateNodeKey.Public()
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 01:50:40 +01:00
|
|
|
if tryingNewKey.IsZero() {
|
2021-04-08 05:06:31 +01:00
|
|
|
if opt.Logout {
|
|
|
|
return false, "", errors.New("no nodekey to log out")
|
|
|
|
}
|
2020-04-11 16:35:34 +01:00
|
|
|
log.Fatalf("tryingNewKey is empty, give up")
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-06-16 00:04:12 +01:00
|
|
|
if backendLogID == "" {
|
2020-02-05 22:16:58 +00:00
|
|
|
err = errors.New("hostinfo: BackendLogID missing")
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2021-03-26 14:01:08 +00:00
|
|
|
now := time.Now().Round(time.Second)
|
2020-02-05 22:16:58 +00:00
|
|
|
request := tailcfg.RegisterRequest{
|
|
|
|
Version: 1,
|
|
|
|
OldNodeKey: tailcfg.NodeKey(oldNodeKey),
|
2020-02-11 03:04:52 +00:00
|
|
|
NodeKey: tailcfg.NodeKey(tryingNewKey.Public()),
|
2020-06-16 00:04:12 +01:00
|
|
|
Hostinfo: hostinfo,
|
2021-04-08 05:06:31 +01:00
|
|
|
Followup: opt.URL,
|
2021-03-26 14:01:08 +00:00
|
|
|
Timestamp: &now,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2021-04-08 05:06:31 +01:00
|
|
|
if opt.Logout {
|
|
|
|
request.Expiry = time.Unix(123, 0) // far in the past
|
|
|
|
}
|
2020-04-11 16:35:34 +01:00
|
|
|
c.logf("RegisterReq: onode=%v node=%v fup=%v",
|
2020-03-18 22:10:46 +00:00
|
|
|
request.OldNodeKey.ShortString(),
|
2021-04-08 05:06:31 +01:00
|
|
|
request.NodeKey.ShortString(), opt.URL != "")
|
|
|
|
request.Auth.Oauth2Token = opt.Token
|
2020-02-05 22:16:58 +00:00
|
|
|
request.Auth.Provider = persist.Provider
|
|
|
|
request.Auth.LoginName = persist.LoginName
|
2020-05-19 07:51:27 +01:00
|
|
|
request.Auth.AuthKey = authKey
|
2021-03-31 16:51:22 +01:00
|
|
|
err = signRegisterRequest(&request, c.serverURL, c.serverKey, machinePrivKey.Public())
|
2021-03-26 14:01:08 +00:00
|
|
|
if err != nil {
|
|
|
|
// If signing failed, clear all related fields
|
|
|
|
request.SignatureType = tailcfg.SignatureNone
|
|
|
|
request.Timestamp = nil
|
|
|
|
request.DeviceCert = nil
|
|
|
|
request.Signature = nil
|
|
|
|
|
|
|
|
// Don't log the common error types. Signatures are not usually enabled,
|
|
|
|
// so these are expected.
|
|
|
|
if err != errCertificateNotConfigured && err != errNoCertStore {
|
|
|
|
c.logf("RegisterReq sign error: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2021-04-08 05:06:31 +01:00
|
|
|
if debugRegister {
|
|
|
|
j, _ := json.MarshalIndent(request, "", "\t")
|
|
|
|
c.logf("RegisterRequest: %s", j)
|
|
|
|
}
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
bodyData, err := encode(request, &serverKey, &machinePrivKey)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
body := bytes.NewReader(bodyData)
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
u := fmt.Sprintf("%s/machine/%s", c.serverURL, machinePrivKey.Public().HexString())
|
2020-02-05 22:16:58 +00:00
|
|
|
req, err := http.NewRequest("POST", u, body)
|
|
|
|
if err != nil {
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
|
|
|
|
res, err := c.httpc.Do(req)
|
|
|
|
if err != nil {
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, fmt.Errorf("register request: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-10-06 03:57:14 +01:00
|
|
|
if res.StatusCode != 200 {
|
|
|
|
msg, _ := ioutil.ReadAll(res.Body)
|
|
|
|
res.Body.Close()
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, fmt.Errorf("register request: http %d: %.200s",
|
2020-10-06 03:57:14 +01:00
|
|
|
res.StatusCode, strings.TrimSpace(string(msg)))
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
resp := tailcfg.RegisterResponse{}
|
2021-03-31 16:51:22 +01:00
|
|
|
if err := decode(res, &resp, &serverKey, &machinePrivKey); err != nil {
|
|
|
|
c.logf("error decoding RegisterResponse with server key %s and machine key %s: %v", serverKey, machinePrivKey.Public(), err)
|
2021-04-08 05:06:31 +01:00
|
|
|
return regen, opt.URL, fmt.Errorf("register request: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2021-04-08 05:06:31 +01:00
|
|
|
if debugRegister {
|
|
|
|
j, _ := json.MarshalIndent(resp, "", "\t")
|
|
|
|
c.logf("RegisterResponse: %s", j)
|
|
|
|
}
|
|
|
|
|
2020-09-28 23:28:26 +01:00
|
|
|
// Log without PII:
|
|
|
|
c.logf("RegisterReq: got response; nodeKeyExpired=%v, machineAuthorized=%v; authURL=%v",
|
|
|
|
resp.NodeKeyExpired, resp.MachineAuthorized, resp.AuthURL != "")
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
if resp.NodeKeyExpired {
|
|
|
|
if regen {
|
|
|
|
return true, "", fmt.Errorf("weird: regen=true but server says NodeKeyExpired: %v", request.NodeKey)
|
|
|
|
}
|
|
|
|
c.logf("server reports new node key %v has expired",
|
2020-03-18 22:10:46 +00:00
|
|
|
request.NodeKey.ShortString())
|
2020-02-05 22:16:58 +00:00
|
|
|
return true, "", nil
|
|
|
|
}
|
|
|
|
if persist.Provider == "" {
|
|
|
|
persist.Provider = resp.Login.Provider
|
|
|
|
}
|
|
|
|
if persist.LoginName == "" {
|
|
|
|
persist.LoginName = resp.Login.LoginName
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(crawshaw): RegisterResponse should be able to mechanically
|
|
|
|
// communicate some extra instructions from the server:
|
|
|
|
// - new node key required
|
|
|
|
// - machine key no longer supported
|
|
|
|
// - user is disabled
|
|
|
|
|
|
|
|
if resp.AuthURL != "" {
|
2020-07-02 17:45:08 +01:00
|
|
|
c.logf("AuthURL is %v", resp.AuthURL)
|
2020-02-05 22:16:58 +00:00
|
|
|
} else {
|
2020-04-11 16:35:34 +01:00
|
|
|
c.logf("No AuthURL")
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
c.mu.Lock()
|
|
|
|
if resp.AuthURL == "" {
|
|
|
|
// key rotation is complete
|
|
|
|
persist.PrivateNodeKey = tryingNewKey
|
|
|
|
} else {
|
|
|
|
// save it for the retry-with-URL
|
|
|
|
c.tryingNewKey = tryingNewKey
|
|
|
|
}
|
|
|
|
c.persist = persist
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return regen, "", err
|
|
|
|
}
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return regen, "", ctx.Err()
|
|
|
|
}
|
|
|
|
return false, resp.AuthURL, nil
|
|
|
|
}
|
|
|
|
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
func sameEndpoints(a, b []tailcfg.Endpoint) bool {
|
2020-02-05 22:16:58 +00:00
|
|
|
if len(a) != len(b) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i := range a {
|
|
|
|
if a[i] != b[i] {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-02-14 17:28:29 +00:00
|
|
|
// newEndpoints acquires c.mu and sets the local port and endpoints and reports
|
|
|
|
// whether they've changed.
|
|
|
|
//
|
|
|
|
// It does not retain the provided slice.
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
func (c *Direct) newEndpoints(localPort uint16, endpoints []tailcfg.Endpoint) (changed bool) {
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Lock()
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
|
|
|
// Nothing new?
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
if c.localPort == localPort && sameEndpoints(c.endpoints, endpoints) {
|
2020-02-05 22:16:58 +00:00
|
|
|
return false // unchanged
|
|
|
|
}
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
var epStrs []string
|
|
|
|
for _, ep := range endpoints {
|
|
|
|
epStrs = append(epStrs, ep.Addr.String())
|
|
|
|
}
|
|
|
|
c.logf("client.newEndpoints(%v, %v)", localPort, epStrs)
|
2020-02-05 22:16:58 +00:00
|
|
|
c.localPort = localPort
|
2020-02-14 17:28:29 +00:00
|
|
|
c.endpoints = append(c.endpoints[:0], endpoints...)
|
2020-10-14 22:01:33 +01:00
|
|
|
if len(endpoints) > 0 {
|
|
|
|
c.everEndpoints = true
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
return true // changed
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetEndpoints updates the list of locally advertised endpoints.
|
|
|
|
// It won't be replicated to the server until a *fresh* call to PollNetMap().
|
|
|
|
// You don't need to restart PollNetMap if we return changed==false.
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
func (c *Direct) SetEndpoints(localPort uint16, endpoints []tailcfg.Endpoint) (changed bool) {
|
2020-02-05 22:16:58 +00:00
|
|
|
// (no log message on function entry, because it clutters the logs
|
|
|
|
// if endpoints haven't changed. newEndpoints() will log it.)
|
2020-02-14 17:28:29 +00:00
|
|
|
return c.newEndpoints(localPort, endpoints)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 22:01:33 +01:00
|
|
|
func inTest() bool { return flag.Lookup("test.v") != nil }
|
|
|
|
|
|
|
|
// PollNetMap makes a /map request to download the network map, calling cb with
|
|
|
|
// each new netmap.
|
|
|
|
//
|
|
|
|
// maxPolls is how many network maps to download; common values are 1
|
|
|
|
// or -1 (to keep a long-poll query open to the server).
|
2021-02-05 23:44:46 +00:00
|
|
|
func (c *Direct) PollNetMap(ctx context.Context, maxPolls int, cb func(*netmap.NetworkMap)) error {
|
2020-12-23 21:03:16 +00:00
|
|
|
return c.sendMapRequest(ctx, maxPolls, cb)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SendLiteMapUpdate makes a /map request to update the server of our latest state,
|
|
|
|
// but does not fetch anything. It returns an error if the server did not return a
|
|
|
|
// successful 200 OK response.
|
|
|
|
func (c *Direct) SendLiteMapUpdate(ctx context.Context) error {
|
|
|
|
return c.sendMapRequest(ctx, 1, nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
// cb nil means to omit peers.
|
2021-02-05 23:44:46 +00:00
|
|
|
func (c *Direct) sendMapRequest(ctx context.Context, maxPolls int, cb func(*netmap.NetworkMap)) error {
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Lock()
|
|
|
|
persist := c.persist
|
|
|
|
serverURL := c.serverURL
|
|
|
|
serverKey := c.serverKey
|
2020-07-09 00:49:02 +01:00
|
|
|
hostinfo := c.hostinfo.Clone()
|
2020-06-16 00:04:12 +01:00
|
|
|
backendLogID := hostinfo.BackendLogID
|
2020-02-05 22:16:58 +00:00
|
|
|
localPort := c.localPort
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
var epStrs []string
|
|
|
|
var epTypes []tailcfg.EndpointType
|
|
|
|
for _, ep := range c.endpoints {
|
|
|
|
epStrs = append(epStrs, ep.Addr.String())
|
|
|
|
epTypes = append(epTypes, ep.Type)
|
|
|
|
}
|
2020-10-14 22:01:33 +01:00
|
|
|
everEndpoints := c.everEndpoints
|
2020-02-05 22:16:58 +00:00
|
|
|
c.mu.Unlock()
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
machinePrivKey, err := c.getMachinePrivKey()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("getMachinePrivKey: %w", err)
|
|
|
|
}
|
|
|
|
if machinePrivKey.IsZero() {
|
|
|
|
return errors.New("getMachinePrivKey returned zero key")
|
|
|
|
}
|
|
|
|
|
2021-02-05 00:23:16 +00:00
|
|
|
if persist.PrivateNodeKey.IsZero() {
|
|
|
|
return errors.New("privateNodeKey is zero")
|
|
|
|
}
|
2020-06-16 00:04:12 +01:00
|
|
|
if backendLogID == "" {
|
2020-02-05 22:16:58 +00:00
|
|
|
return errors.New("hostinfo: BackendLogID missing")
|
|
|
|
}
|
|
|
|
|
|
|
|
allowStream := maxPolls != 1
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
c.logf("[v1] PollNetMap: stream=%v :%v ep=%v", allowStream, localPort, epStrs)
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf := logger.Discard
|
2020-06-28 19:53:37 +01:00
|
|
|
if Debug.NetMap {
|
2020-12-21 18:58:06 +00:00
|
|
|
// TODO(bradfitz): update this to use "[v2]" prefix perhaps? but we don't
|
|
|
|
// want to upload it always.
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf = c.logf
|
|
|
|
}
|
|
|
|
|
2021-02-25 05:29:51 +00:00
|
|
|
request := &tailcfg.MapRequest{
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
Version: tailcfg.CurrentMapRequestVersion,
|
|
|
|
KeepAlive: c.keepAlive,
|
|
|
|
NodeKey: tailcfg.NodeKey(persist.PrivateNodeKey.Public()),
|
|
|
|
DiscoKey: c.discoPubKey,
|
|
|
|
Endpoints: epStrs,
|
|
|
|
EndpointTypes: epTypes,
|
|
|
|
Stream: allowStream,
|
|
|
|
Hostinfo: hostinfo,
|
|
|
|
DebugFlags: c.debugFlags,
|
|
|
|
OmitPeers: cb == nil,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2021-02-18 16:58:13 +00:00
|
|
|
var extraDebugFlags []string
|
2021-03-31 19:55:21 +01:00
|
|
|
if hostinfo != nil && c.linkMon != nil && !c.skipIPForwardingCheck &&
|
|
|
|
ipForwardingBroken(hostinfo.RoutableIPs, c.linkMon.InterfaceState()) {
|
2021-02-18 16:58:13 +00:00
|
|
|
extraDebugFlags = append(extraDebugFlags, "warn-ip-forwarding-off")
|
|
|
|
}
|
|
|
|
if health.RouterHealth() != nil {
|
|
|
|
extraDebugFlags = append(extraDebugFlags, "warn-router-unhealthy")
|
|
|
|
}
|
2021-03-15 22:39:37 +00:00
|
|
|
if health.NetworkCategoryHealth() != nil {
|
|
|
|
extraDebugFlags = append(extraDebugFlags, "warn-network-category-unhealthy")
|
|
|
|
}
|
2021-02-18 16:58:13 +00:00
|
|
|
if len(extraDebugFlags) > 0 {
|
2020-11-04 21:48:50 +00:00
|
|
|
old := request.DebugFlags
|
2021-02-18 16:58:13 +00:00
|
|
|
request.DebugFlags = append(old[:len(old):len(old)], extraDebugFlags...)
|
2020-11-04 21:48:50 +00:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
if c.newDecompressor != nil {
|
|
|
|
request.Compress = "zstd"
|
|
|
|
}
|
2020-10-14 22:01:33 +01:00
|
|
|
// On initial startup before we know our endpoints, set the ReadOnly flag
|
|
|
|
// to tell the control server not to distribute out our (empty) endpoints to peers.
|
|
|
|
// Presumably we'll learn our endpoints in a half second and do another post
|
|
|
|
// with useful results. The first POST just gets us the DERP map which we
|
|
|
|
// need to do the STUN queries to discover our endpoints.
|
|
|
|
// TODO(bradfitz): we skip this optimization in tests, though,
|
|
|
|
// because the e2e tests are currently hyperspecific about the
|
|
|
|
// ordering of things. The e2e tests need love.
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
if len(epStrs) == 0 && !everEndpoints && !inTest() {
|
2020-10-14 22:01:33 +01:00
|
|
|
request.ReadOnly = true
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
bodyData, err := encode(request, &serverKey, &machinePrivKey)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: encode: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-10-14 22:01:33 +01:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
machinePubKey := tailcfg.MachineKey(machinePrivKey.Public())
|
2020-04-11 17:22:33 +01:00
|
|
|
t0 := time.Now()
|
2020-09-28 23:28:26 +01:00
|
|
|
u := fmt.Sprintf("%s/machine/%s/map", serverURL, machinePubKey.HexString())
|
2020-10-14 22:01:33 +01:00
|
|
|
|
|
|
|
req, err := http.NewRequestWithContext(ctx, "POST", u, bytes.NewReader(bodyData))
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := c.httpc.Do(req)
|
|
|
|
if err != nil {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: Do: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: Do = %v after %v", res.StatusCode, time.Since(t0).Round(time.Millisecond))
|
2020-02-05 22:16:58 +00:00
|
|
|
if res.StatusCode != 200 {
|
|
|
|
msg, _ := ioutil.ReadAll(res.Body)
|
|
|
|
res.Body.Close()
|
2020-10-06 03:57:14 +01:00
|
|
|
return fmt.Errorf("initial fetch failed %d: %.200s",
|
2020-02-05 22:16:58 +00:00
|
|
|
res.StatusCode, strings.TrimSpace(string(msg)))
|
|
|
|
}
|
|
|
|
defer res.Body.Close()
|
|
|
|
|
2021-02-25 05:29:51 +00:00
|
|
|
health.NoteMapRequestHeard(request)
|
|
|
|
|
2020-12-23 21:03:16 +00:00
|
|
|
if cb == nil {
|
|
|
|
io.Copy(ioutil.Discard, res.Body)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
// If we go more than pollTimeout without hearing from the server,
|
|
|
|
// end the long poll. We should be receiving a keep alive ping
|
|
|
|
// every minute.
|
|
|
|
const pollTimeout = 120 * time.Second
|
|
|
|
timeout := time.NewTimer(pollTimeout)
|
|
|
|
timeoutReset := make(chan struct{})
|
2020-04-21 23:04:05 +01:00
|
|
|
pollDone := make(chan struct{})
|
|
|
|
defer close(pollDone)
|
2020-02-05 22:16:58 +00:00
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
select {
|
2020-04-21 23:04:05 +01:00
|
|
|
case <-pollDone:
|
|
|
|
vlogf("netmap: ending timeout goroutine")
|
|
|
|
return
|
2020-02-05 22:16:58 +00:00
|
|
|
case <-timeout.C:
|
|
|
|
c.logf("map response long-poll timed out!")
|
|
|
|
cancel()
|
|
|
|
return
|
2020-04-21 23:04:05 +01:00
|
|
|
case <-timeoutReset:
|
2020-02-05 22:16:58 +00:00
|
|
|
if !timeout.Stop() {
|
2020-04-21 23:04:05 +01:00
|
|
|
select {
|
|
|
|
case <-timeout.C:
|
|
|
|
case <-pollDone:
|
2020-04-21 23:35:37 +01:00
|
|
|
vlogf("netmap: ending timeout goroutine")
|
2020-04-21 23:04:05 +01:00
|
|
|
return
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: reset timeout timer")
|
2020-02-05 22:16:58 +00:00
|
|
|
timeout.Reset(pollTimeout)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2021-04-12 20:12:13 +01:00
|
|
|
var lastDNSConfig = new(tailcfg.DNSConfig)
|
2020-05-17 17:51:38 +01:00
|
|
|
var lastDERPMap *tailcfg.DERPMap
|
2020-10-15 02:35:55 +01:00
|
|
|
var lastUserProfile = map[tailcfg.UserID]tailcfg.UserProfile{}
|
2020-12-07 17:13:26 +00:00
|
|
|
var lastParsedPacketFilter []filter.Match
|
2021-01-12 15:54:34 +00:00
|
|
|
var collectServices bool
|
2020-05-17 17:51:38 +01:00
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
// If allowStream, then the server will use an HTTP long poll to
|
|
|
|
// return incremental results. There is always one response right
|
|
|
|
// away, followed by a delay, and eventually others.
|
|
|
|
// If !allowStream, it'll still send the first result in exactly
|
|
|
|
// the same format before just closing the connection.
|
|
|
|
// We can use this same read loop either way.
|
|
|
|
var msg []byte
|
2020-08-08 04:44:04 +01:00
|
|
|
var previousPeers []*tailcfg.Node // for delta-purposes
|
2020-02-05 22:16:58 +00:00
|
|
|
for i := 0; i < maxPolls || maxPolls < 0; i++ {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: starting size read after %v (poll %v)", time.Since(t0).Round(time.Millisecond), i)
|
2020-02-05 22:16:58 +00:00
|
|
|
var siz [4]byte
|
|
|
|
if _, err := io.ReadFull(res.Body, siz[:]); err != nil {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: size read error after %v: %v", time.Since(t0).Round(time.Millisecond), err)
|
2020-02-05 22:16:58 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
size := binary.LittleEndian.Uint32(siz[:])
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: read size %v after %v", size, time.Since(t0).Round(time.Millisecond))
|
2020-02-05 22:16:58 +00:00
|
|
|
msg = append(msg[:0], make([]byte, size)...)
|
|
|
|
if _, err := io.ReadFull(res.Body, msg); err != nil {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: body read error: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: read body after %v", time.Since(t0).Round(time.Millisecond))
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
var resp tailcfg.MapResponse
|
2021-03-31 16:51:22 +01:00
|
|
|
if err := c.decodeMsg(msg, &resp, &machinePrivKey); err != nil {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: decode error: %v")
|
2020-02-05 22:16:58 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
|
2021-02-25 05:29:51 +00:00
|
|
|
if allowStream {
|
|
|
|
health.GotStreamedMapResponse()
|
|
|
|
}
|
|
|
|
|
2021-03-05 04:54:44 +00:00
|
|
|
if pr := resp.PingRequest; pr != nil {
|
|
|
|
go answerPing(c.logf, c.httpc, pr)
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
if resp.KeepAlive {
|
2020-04-11 17:22:33 +01:00
|
|
|
vlogf("netmap: got keep-alive")
|
2020-08-07 05:24:31 +01:00
|
|
|
} else {
|
|
|
|
vlogf("netmap: got new map")
|
|
|
|
}
|
|
|
|
select {
|
|
|
|
case timeoutReset <- struct{}{}:
|
|
|
|
vlogf("netmap: sent timer reset")
|
|
|
|
case <-ctx.Done():
|
2020-12-21 18:58:06 +00:00
|
|
|
c.logf("[v1] netmap: not resetting timer; context done: %v", ctx.Err())
|
2020-08-07 05:24:31 +01:00
|
|
|
return ctx.Err()
|
|
|
|
}
|
|
|
|
if resp.KeepAlive {
|
2020-02-05 22:16:58 +00:00
|
|
|
continue
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
|
|
|
|
undeltaPeers(&resp, previousPeers)
|
|
|
|
previousPeers = cloneNodes(resp.Peers) // defensive/lazy clone, since this escapes to who knows where
|
2020-10-15 02:35:55 +01:00
|
|
|
for _, up := range resp.UserProfiles {
|
|
|
|
lastUserProfile[up.ID] = up
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
|
2020-05-17 17:51:38 +01:00
|
|
|
if resp.DERPMap != nil {
|
|
|
|
vlogf("netmap: new map contains DERP map")
|
|
|
|
lastDERPMap = resp.DERPMap
|
|
|
|
}
|
2020-08-17 20:56:17 +01:00
|
|
|
if resp.Debug != nil {
|
|
|
|
if resp.Debug.LogHeapPprof {
|
|
|
|
go logheap.LogHeap(resp.Debug.LogHeapURL)
|
|
|
|
}
|
2021-03-03 18:17:05 +00:00
|
|
|
if resp.Debug.GoroutineDumpURL != "" {
|
|
|
|
go dumpGoroutinesToURL(c.httpc, resp.Debug.GoroutineDumpURL)
|
|
|
|
}
|
2020-08-20 21:21:25 +01:00
|
|
|
setControlAtomic(&controlUseDERPRoute, resp.Debug.DERPRoute)
|
|
|
|
setControlAtomic(&controlTrimWGConfig, resp.Debug.TrimWGConfig)
|
2020-04-08 06:24:06 +01:00
|
|
|
}
|
2020-06-28 19:53:37 +01:00
|
|
|
// Temporarily (2020-06-29) support removing all but
|
|
|
|
// discovery-supporting nodes during development, for
|
|
|
|
// less noise.
|
|
|
|
if Debug.OnlyDisco {
|
|
|
|
filtered := resp.Peers[:0]
|
|
|
|
for _, p := range resp.Peers {
|
|
|
|
if !p.DiscoKey.IsZero() {
|
|
|
|
filtered = append(filtered, p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
resp.Peers = filtered
|
|
|
|
}
|
2021-01-21 05:30:04 +00:00
|
|
|
if Debug.StripEndpoints {
|
|
|
|
for _, p := range resp.Peers {
|
|
|
|
// We need at least one endpoint here for now else
|
|
|
|
// other code doesn't even create the discoEndpoint.
|
|
|
|
// TODO(bradfitz): fix that and then just nil this out.
|
|
|
|
p.Endpoints = []string{"127.9.9.9:456"}
|
|
|
|
}
|
|
|
|
}
|
2020-05-17 17:51:38 +01:00
|
|
|
|
2020-12-07 17:13:26 +00:00
|
|
|
if pf := resp.PacketFilter; pf != nil {
|
|
|
|
lastParsedPacketFilter = c.parsePacketFilter(pf)
|
|
|
|
}
|
2021-04-12 20:12:13 +01:00
|
|
|
if c := resp.DNSConfig; c != nil {
|
|
|
|
lastDNSConfig = c
|
|
|
|
}
|
2020-12-07 17:13:26 +00:00
|
|
|
|
2021-01-12 15:54:34 +00:00
|
|
|
if v, ok := resp.CollectServices.Get(); ok {
|
|
|
|
collectServices = v
|
|
|
|
}
|
|
|
|
|
2020-12-23 21:03:16 +00:00
|
|
|
// Get latest localPort. This might've changed if
|
|
|
|
// a lite map update occured meanwhile. This only affects
|
|
|
|
// the end-to-end test.
|
|
|
|
// TODO(bradfitz): remove the NetworkMap.LocalPort field entirely.
|
|
|
|
c.mu.Lock()
|
|
|
|
localPort = c.localPort
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
2021-02-05 23:44:46 +00:00
|
|
|
nm := &netmap.NetworkMap{
|
2021-01-27 16:50:31 +00:00
|
|
|
SelfNode: resp.Node,
|
2021-01-11 22:24:32 +00:00
|
|
|
NodeKey: tailcfg.NodeKey(persist.PrivateNodeKey.Public()),
|
|
|
|
PrivateKey: persist.PrivateNodeKey,
|
|
|
|
MachineKey: machinePubKey,
|
|
|
|
Expiry: resp.Node.KeyExpiry,
|
|
|
|
Name: resp.Node.Name,
|
|
|
|
Addresses: resp.Node.Addresses,
|
|
|
|
Peers: resp.Peers,
|
|
|
|
LocalPort: localPort,
|
|
|
|
User: resp.Node.User,
|
|
|
|
UserProfiles: make(map[tailcfg.UserID]tailcfg.UserProfile),
|
|
|
|
Domain: resp.Domain,
|
2021-04-12 20:12:13 +01:00
|
|
|
DNS: *lastDNSConfig,
|
2021-01-11 22:24:32 +00:00
|
|
|
Hostinfo: resp.Node.Hostinfo,
|
|
|
|
PacketFilter: lastParsedPacketFilter,
|
2021-01-12 15:54:34 +00:00
|
|
|
CollectServices: collectServices,
|
2021-01-11 22:24:32 +00:00
|
|
|
DERPMap: lastDERPMap,
|
|
|
|
Debug: resp.Debug,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-10-15 03:07:31 +01:00
|
|
|
addUserProfile := func(userID tailcfg.UserID) {
|
|
|
|
if _, dup := nm.UserProfiles[userID]; dup {
|
2020-10-15 02:35:55 +01:00
|
|
|
// Already populated it from a previous peer.
|
2020-10-15 03:07:31 +01:00
|
|
|
return
|
2020-10-15 02:35:55 +01:00
|
|
|
}
|
|
|
|
if up, ok := lastUserProfile[userID]; ok {
|
|
|
|
nm.UserProfiles[userID] = up
|
|
|
|
}
|
2020-09-30 05:39:43 +01:00
|
|
|
}
|
2020-10-15 03:07:31 +01:00
|
|
|
addUserProfile(nm.User)
|
2021-01-27 16:50:31 +00:00
|
|
|
magicDNSSuffix := nm.MagicDNSSuffix()
|
|
|
|
nm.SelfNode.InitDisplayNames(magicDNSSuffix)
|
2020-10-15 03:07:31 +01:00
|
|
|
for _, peer := range resp.Peers {
|
2021-01-27 16:50:31 +00:00
|
|
|
peer.InitDisplayNames(magicDNSSuffix)
|
2021-01-12 20:13:27 +00:00
|
|
|
if !peer.Sharer.IsZero() {
|
2021-01-13 23:03:15 +00:00
|
|
|
if c.keepSharerAndUserSplit {
|
|
|
|
addUserProfile(peer.Sharer)
|
|
|
|
} else {
|
|
|
|
peer.User = peer.Sharer
|
|
|
|
}
|
2021-01-12 20:13:27 +00:00
|
|
|
}
|
2020-10-15 03:07:31 +01:00
|
|
|
addUserProfile(peer.User)
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
if resp.Node.MachineAuthorized {
|
|
|
|
nm.MachineStatus = tailcfg.MachineAuthorized
|
|
|
|
} else {
|
|
|
|
nm.MachineStatus = tailcfg.MachineUnauthorized
|
|
|
|
}
|
2020-07-31 21:27:09 +01:00
|
|
|
if len(resp.DNS) > 0 {
|
2020-12-24 20:33:55 +00:00
|
|
|
nm.DNS.Nameservers = resp.DNS
|
2020-07-31 21:27:09 +01:00
|
|
|
}
|
|
|
|
if len(resp.SearchPaths) > 0 {
|
|
|
|
nm.DNS.Domains = resp.SearchPaths
|
|
|
|
}
|
|
|
|
if Debug.ProxyDNS {
|
|
|
|
nm.DNS.Proxied = true
|
|
|
|
}
|
2020-03-13 02:28:11 +00:00
|
|
|
|
|
|
|
// Printing the netmap can be extremely verbose, but is very
|
|
|
|
// handy for debugging. Let's limit how often we do it.
|
|
|
|
// Code elsewhere prints netmap diffs every time, so this
|
|
|
|
// occasional full dump, plus incremental diffs, should do
|
|
|
|
// the job.
|
|
|
|
now := c.timeNow()
|
|
|
|
if now.Sub(c.lastPrintMap) >= 5*time.Minute {
|
|
|
|
c.lastPrintMap = now
|
2020-12-21 18:58:06 +00:00
|
|
|
c.logf("[v1] new network map[%d]:\n%s", i, nm.Concise())
|
2020-03-13 02:28:11 +00:00
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
|
|
|
|
c.mu.Lock()
|
|
|
|
c.expiry = &nm.Expiry
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
|
|
|
cb(nm)
|
|
|
|
}
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return ctx.Err()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-30 01:22:56 +00:00
|
|
|
func decode(res *http.Response, v interface{}, serverKey *wgkey.Key, mkey *wgkey.Private) error {
|
2020-02-05 22:16:58 +00:00
|
|
|
defer res.Body.Close()
|
|
|
|
msg, err := ioutil.ReadAll(io.LimitReader(res.Body, 1<<20))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if res.StatusCode != 200 {
|
|
|
|
return fmt.Errorf("%d: %v", res.StatusCode, string(msg))
|
|
|
|
}
|
|
|
|
return decodeMsg(msg, v, serverKey, mkey)
|
|
|
|
}
|
|
|
|
|
2021-04-08 05:06:31 +01:00
|
|
|
var (
|
|
|
|
debugMap, _ = strconv.ParseBool(os.Getenv("TS_DEBUG_MAP"))
|
|
|
|
debugRegister, _ = strconv.ParseBool(os.Getenv("TS_DEBUG_REGISTER"))
|
|
|
|
)
|
2020-09-15 17:54:52 +01:00
|
|
|
|
2020-11-12 21:31:29 +00:00
|
|
|
var jsonEscapedZero = []byte(`\u0000`)
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
func (c *Direct) decodeMsg(msg []byte, v interface{}, machinePrivKey *wgkey.Private) error {
|
2020-07-09 19:42:19 +01:00
|
|
|
c.mu.Lock()
|
2020-02-05 22:16:58 +00:00
|
|
|
serverKey := c.serverKey
|
2020-07-09 19:42:19 +01:00
|
|
|
c.mu.Unlock()
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
decrypted, err := decryptMsg(msg, &serverKey, machinePrivKey)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
var b []byte
|
|
|
|
if c.newDecompressor == nil {
|
|
|
|
b = decrypted
|
|
|
|
} else {
|
|
|
|
decoder, err := c.newDecompressor()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer decoder.Close()
|
|
|
|
b, err = decoder.DecodeAll(decrypted, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2020-10-20 18:40:52 +01:00
|
|
|
if debugMap {
|
2020-09-15 17:54:52 +01:00
|
|
|
var buf bytes.Buffer
|
|
|
|
json.Indent(&buf, b, "", " ")
|
|
|
|
log.Printf("MapResponse: %s", buf.Bytes())
|
|
|
|
}
|
2020-11-12 21:31:29 +00:00
|
|
|
|
|
|
|
if bytes.Contains(b, jsonEscapedZero) {
|
|
|
|
log.Printf("[unexpected] zero byte in controlclient.Direct.decodeMsg into %T: %q", v, b)
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
if err := json.Unmarshal(b, v); err != nil {
|
|
|
|
return fmt.Errorf("response: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2021-03-31 16:51:22 +01:00
|
|
|
func decodeMsg(msg []byte, v interface{}, serverKey *wgkey.Key, machinePrivKey *wgkey.Private) error {
|
|
|
|
decrypted, err := decryptMsg(msg, serverKey, machinePrivKey)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-11-12 21:31:29 +00:00
|
|
|
if bytes.Contains(decrypted, jsonEscapedZero) {
|
|
|
|
log.Printf("[unexpected] zero byte in controlclient decodeMsg into %T: %q", v, decrypted)
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
if err := json.Unmarshal(decrypted, v); err != nil {
|
|
|
|
return fmt.Errorf("response: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-30 01:22:56 +00:00
|
|
|
func decryptMsg(msg []byte, serverKey *wgkey.Key, mkey *wgkey.Private) ([]byte, error) {
|
2020-02-05 22:16:58 +00:00
|
|
|
var nonce [24]byte
|
|
|
|
if len(msg) < len(nonce)+1 {
|
|
|
|
return nil, fmt.Errorf("response missing nonce, len=%d", len(msg))
|
|
|
|
}
|
|
|
|
copy(nonce[:], msg)
|
|
|
|
msg = msg[len(nonce):]
|
|
|
|
|
|
|
|
pub, pri := (*[32]byte)(serverKey), (*[32]byte)(mkey)
|
|
|
|
decrypted, ok := box.Open(nil, msg, &nonce, pub, pri)
|
|
|
|
if !ok {
|
2020-10-06 19:02:33 +01:00
|
|
|
return nil, fmt.Errorf("cannot decrypt response (len %d + nonce %d = %d)", len(msg), len(nonce), len(msg)+len(nonce))
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
return decrypted, nil
|
|
|
|
}
|
|
|
|
|
2020-12-30 01:22:56 +00:00
|
|
|
func encode(v interface{}, serverKey *wgkey.Key, mkey *wgkey.Private) ([]byte, error) {
|
2020-02-05 22:16:58 +00:00
|
|
|
b, err := json.Marshal(v)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-10-20 18:40:52 +01:00
|
|
|
if debugMap {
|
2021-03-29 20:42:43 +01:00
|
|
|
if _, ok := v.(*tailcfg.MapRequest); ok {
|
2020-03-04 06:21:56 +00:00
|
|
|
log.Printf("MapRequest: %s", b)
|
|
|
|
}
|
|
|
|
}
|
2020-02-05 22:16:58 +00:00
|
|
|
var nonce [24]byte
|
|
|
|
if _, err := io.ReadFull(rand.Reader, nonce[:]); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
pub, pri := (*[32]byte)(serverKey), (*[32]byte)(mkey)
|
|
|
|
msg := box.Seal(nonce[:], b, &nonce, pub, pri)
|
|
|
|
return msg, nil
|
|
|
|
}
|
|
|
|
|
2020-12-30 01:22:56 +00:00
|
|
|
func loadServerKey(ctx context.Context, httpc *http.Client, serverURL string) (wgkey.Key, error) {
|
2020-02-05 22:16:58 +00:00
|
|
|
req, err := http.NewRequest("GET", serverURL+"/key", nil)
|
|
|
|
if err != nil {
|
2020-12-30 01:22:56 +00:00
|
|
|
return wgkey.Key{}, fmt.Errorf("create control key request: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
res, err := httpc.Do(req)
|
|
|
|
if err != nil {
|
2020-12-30 01:22:56 +00:00
|
|
|
return wgkey.Key{}, fmt.Errorf("fetch control key: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
defer res.Body.Close()
|
|
|
|
b, err := ioutil.ReadAll(io.LimitReader(res.Body, 1<<16))
|
|
|
|
if err != nil {
|
2020-12-30 01:22:56 +00:00
|
|
|
return wgkey.Key{}, fmt.Errorf("fetch control key response: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
if res.StatusCode != 200 {
|
2020-12-30 01:22:56 +00:00
|
|
|
return wgkey.Key{}, fmt.Errorf("fetch control key: %d: %s", res.StatusCode, string(b))
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-12-30 01:22:56 +00:00
|
|
|
key, err := wgkey.ParseHex(string(b))
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
2020-12-30 01:22:56 +00:00
|
|
|
return wgkey.Key{}, fmt.Errorf("fetch control key: %v", err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-02-11 03:04:52 +00:00
|
|
|
return key, nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-06-28 19:53:37 +01:00
|
|
|
|
|
|
|
// Debug contains temporary internal-only debug knobs.
|
|
|
|
// They're unexported to not draw attention to them.
|
|
|
|
var Debug = initDebug()
|
|
|
|
|
|
|
|
type debug struct {
|
2021-01-21 05:30:04 +00:00
|
|
|
NetMap bool
|
|
|
|
ProxyDNS bool
|
|
|
|
OnlyDisco bool
|
|
|
|
Disco bool
|
|
|
|
StripEndpoints bool // strip endpoints from control (only use disco messages)
|
2020-06-28 19:53:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func initDebug() debug {
|
2020-09-17 19:28:09 +01:00
|
|
|
use := os.Getenv("TS_DEBUG_USE_DISCO")
|
|
|
|
return debug{
|
2021-01-21 05:30:04 +00:00
|
|
|
NetMap: envBool("TS_DEBUG_NETMAP"),
|
|
|
|
ProxyDNS: envBool("TS_DEBUG_PROXY_DNS"),
|
|
|
|
StripEndpoints: envBool("TS_DEBUG_STRIP_ENDPOINTS"),
|
|
|
|
OnlyDisco: use == "only",
|
|
|
|
Disco: use == "only" || use == "" || envBool("TS_DEBUG_USE_DISCO"),
|
2020-06-28 19:53:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func envBool(k string) bool {
|
|
|
|
e := os.Getenv(k)
|
|
|
|
if e == "" {
|
|
|
|
return false
|
|
|
|
}
|
2020-07-02 18:50:19 +01:00
|
|
|
v, err := strconv.ParseBool(e)
|
2020-06-28 19:53:37 +01:00
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("invalid non-bool %q for env var %q", e, k))
|
|
|
|
}
|
|
|
|
return v
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
|
2021-04-16 00:03:59 +01:00
|
|
|
var clockNow = time.Now
|
|
|
|
|
|
|
|
// undeltaPeers updates mapRes.Peers to be complete based on the
|
|
|
|
// provided previous peer list and the PeersRemoved and PeersChanged
|
|
|
|
// fields in mapRes, as well as the PeerSeenChange and OnlineChange
|
|
|
|
// maps.
|
|
|
|
//
|
2020-08-08 04:44:04 +01:00
|
|
|
// It then also nils out the delta fields.
|
|
|
|
func undeltaPeers(mapRes *tailcfg.MapResponse, prev []*tailcfg.Node) {
|
|
|
|
if len(mapRes.Peers) > 0 {
|
|
|
|
// Not delta encoded.
|
|
|
|
if !nodesSorted(mapRes.Peers) {
|
|
|
|
log.Printf("netmap: undeltaPeers: MapResponse.Peers not sorted; sorting")
|
|
|
|
sortNodes(mapRes.Peers)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var removed map[tailcfg.NodeID]bool
|
|
|
|
if pr := mapRes.PeersRemoved; len(pr) > 0 {
|
|
|
|
removed = make(map[tailcfg.NodeID]bool, len(pr))
|
|
|
|
for _, id := range pr {
|
|
|
|
removed[id] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
changed := mapRes.PeersChanged
|
|
|
|
|
|
|
|
if !nodesSorted(changed) {
|
|
|
|
log.Printf("netmap: undeltaPeers: MapResponse.PeersChanged not sorted; sorting")
|
|
|
|
sortNodes(changed)
|
|
|
|
}
|
|
|
|
if !nodesSorted(prev) {
|
|
|
|
// Internal error (unrelated to the network) if we get here.
|
|
|
|
log.Printf("netmap: undeltaPeers: [unexpected] prev not sorted; sorting")
|
|
|
|
sortNodes(prev)
|
|
|
|
}
|
|
|
|
|
2021-04-16 00:03:59 +01:00
|
|
|
newFull := prev
|
|
|
|
if len(removed) > 0 || len(changed) > 0 {
|
|
|
|
newFull = make([]*tailcfg.Node, 0, len(prev)-len(removed))
|
|
|
|
for len(prev) > 0 && len(changed) > 0 {
|
|
|
|
pID := prev[0].ID
|
|
|
|
cID := changed[0].ID
|
|
|
|
if removed[pID] {
|
|
|
|
prev = prev[1:]
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch {
|
|
|
|
case pID < cID:
|
|
|
|
newFull = append(newFull, prev[0])
|
|
|
|
prev = prev[1:]
|
|
|
|
case pID == cID:
|
|
|
|
newFull = append(newFull, changed[0])
|
|
|
|
prev, changed = prev[1:], changed[1:]
|
|
|
|
case cID < pID:
|
|
|
|
newFull = append(newFull, changed[0])
|
|
|
|
changed = changed[1:]
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
}
|
2021-04-16 00:03:59 +01:00
|
|
|
newFull = append(newFull, changed...)
|
|
|
|
for _, n := range prev {
|
|
|
|
if !removed[n.ID] {
|
|
|
|
newFull = append(newFull, n)
|
|
|
|
}
|
2020-08-08 04:44:04 +01:00
|
|
|
}
|
2021-04-16 00:03:59 +01:00
|
|
|
sortNodes(newFull)
|
2020-08-08 04:44:04 +01:00
|
|
|
}
|
2021-01-17 20:00:56 +00:00
|
|
|
|
2021-04-16 00:03:59 +01:00
|
|
|
if len(mapRes.PeerSeenChange) != 0 || len(mapRes.OnlineChange) != 0 {
|
2021-01-17 20:00:56 +00:00
|
|
|
peerByID := make(map[tailcfg.NodeID]*tailcfg.Node, len(newFull))
|
|
|
|
for _, n := range newFull {
|
|
|
|
peerByID[n.ID] = n
|
|
|
|
}
|
2021-04-16 00:03:59 +01:00
|
|
|
now := clockNow()
|
2021-01-17 20:00:56 +00:00
|
|
|
for nodeID, seen := range mapRes.PeerSeenChange {
|
|
|
|
if n, ok := peerByID[nodeID]; ok {
|
|
|
|
if seen {
|
|
|
|
n.LastSeen = &now
|
|
|
|
} else {
|
|
|
|
n.LastSeen = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-04-16 00:03:59 +01:00
|
|
|
for nodeID, online := range mapRes.OnlineChange {
|
|
|
|
if n, ok := peerByID[nodeID]; ok {
|
|
|
|
online := online
|
|
|
|
n.Online = &online
|
|
|
|
}
|
|
|
|
}
|
2021-01-17 20:00:56 +00:00
|
|
|
}
|
|
|
|
|
2020-08-08 04:44:04 +01:00
|
|
|
mapRes.Peers = newFull
|
|
|
|
mapRes.PeersChanged = nil
|
|
|
|
mapRes.PeersRemoved = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func nodesSorted(v []*tailcfg.Node) bool {
|
|
|
|
for i, n := range v {
|
|
|
|
if i > 0 && n.ID <= v[i-1].ID {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func sortNodes(v []*tailcfg.Node) {
|
|
|
|
sort.Slice(v, func(i, j int) bool { return v[i].ID < v[j].ID })
|
|
|
|
}
|
|
|
|
|
|
|
|
func cloneNodes(v1 []*tailcfg.Node) []*tailcfg.Node {
|
|
|
|
if v1 == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
v2 := make([]*tailcfg.Node, len(v1))
|
|
|
|
for i, n := range v1 {
|
|
|
|
v2[i] = n.Clone()
|
|
|
|
}
|
|
|
|
return v2
|
|
|
|
}
|
2020-08-17 20:56:17 +01:00
|
|
|
|
2020-08-20 21:21:25 +01:00
|
|
|
// opt.Bool configs from control.
|
|
|
|
var (
|
|
|
|
controlUseDERPRoute atomic.Value
|
|
|
|
controlTrimWGConfig atomic.Value
|
|
|
|
)
|
|
|
|
|
|
|
|
func setControlAtomic(dst *atomic.Value, v opt.Bool) {
|
|
|
|
old, ok := dst.Load().(opt.Bool)
|
|
|
|
if !ok || old != v {
|
|
|
|
dst.Store(v)
|
|
|
|
}
|
|
|
|
}
|
2020-08-17 20:56:17 +01:00
|
|
|
|
|
|
|
// DERPRouteFlag reports the last reported value from control for whether
|
|
|
|
// DERP route optimization (Issue 150) should be enabled.
|
|
|
|
func DERPRouteFlag() opt.Bool {
|
|
|
|
v, _ := controlUseDERPRoute.Load().(opt.Bool)
|
|
|
|
return v
|
|
|
|
}
|
2020-08-20 21:21:25 +01:00
|
|
|
|
|
|
|
// TrimWGConfig reports the last reported value from control for whether
|
|
|
|
// we should do lazy wireguard configuration.
|
|
|
|
func TrimWGConfig() opt.Bool {
|
|
|
|
v, _ := controlTrimWGConfig.Load().(opt.Bool)
|
|
|
|
return v
|
|
|
|
}
|
2020-11-04 21:48:50 +00:00
|
|
|
|
|
|
|
// ipForwardingBroken reports whether the system's IP forwarding is disabled
|
|
|
|
// and will definitely not work for the routes provided.
|
|
|
|
//
|
|
|
|
// It should not return false positives.
|
2021-03-31 19:55:21 +01:00
|
|
|
//
|
|
|
|
// TODO(bradfitz): merge this code into LocalBackend.CheckIPForwarding
|
|
|
|
// and change controlclient.Options.SkipIPForwardingCheck into a
|
|
|
|
// func([]netaddr.IPPrefix) error signature instead. Then we only have
|
|
|
|
// one copy of this code.
|
2021-03-04 03:19:41 +00:00
|
|
|
func ipForwardingBroken(routes []netaddr.IPPrefix, state *interfaces.State) bool {
|
2020-11-04 21:48:50 +00:00
|
|
|
if len(routes) == 0 {
|
|
|
|
// Nothing to route, so no need to warn.
|
|
|
|
return false
|
|
|
|
}
|
2020-12-16 03:37:32 +00:00
|
|
|
|
2020-11-04 21:48:50 +00:00
|
|
|
if runtime.GOOS != "linux" {
|
|
|
|
// We only do subnet routing on Linux for now.
|
|
|
|
// It might work on darwin/macOS when building from source, so
|
|
|
|
// don't return true for other OSes. We can OS-based warnings
|
|
|
|
// already in the admin panel.
|
|
|
|
return false
|
|
|
|
}
|
2020-12-16 03:37:32 +00:00
|
|
|
|
2021-03-04 03:19:41 +00:00
|
|
|
localIPs := map[netaddr.IP]bool{}
|
|
|
|
for _, addrs := range state.InterfaceIPs {
|
|
|
|
for _, pfx := range addrs {
|
|
|
|
localIPs[pfx.IP] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-16 03:37:32 +00:00
|
|
|
v4Routes, v6Routes := false, false
|
|
|
|
for _, r := range routes {
|
2021-03-04 03:19:41 +00:00
|
|
|
// It's possible to advertise a route to one of the local
|
|
|
|
// machine's local IPs. IP forwarding isn't required for this
|
|
|
|
// to work, so we shouldn't warn for such exports.
|
|
|
|
if r.IsSingleIP() && localIPs[r.IP] {
|
|
|
|
continue
|
|
|
|
}
|
2020-12-16 03:37:32 +00:00
|
|
|
if r.IP.Is4() {
|
|
|
|
v4Routes = true
|
|
|
|
} else {
|
|
|
|
v6Routes = true
|
|
|
|
}
|
2020-11-04 21:48:50 +00:00
|
|
|
}
|
2020-12-16 03:37:32 +00:00
|
|
|
|
|
|
|
if v4Routes {
|
|
|
|
out, err := ioutil.ReadFile("/proc/sys/net/ipv4/ip_forward")
|
|
|
|
if err != nil {
|
|
|
|
// Try another way.
|
|
|
|
out, err = exec.Command("sysctl", "-n", "net.ipv4.ip_forward").Output()
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
// Oh well, we tried. This is just for debugging.
|
|
|
|
// We don't want false positives.
|
|
|
|
// TODO: maybe we want a different warning for inability to check?
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if strings.TrimSpace(string(out)) == "0" {
|
|
|
|
return true
|
|
|
|
}
|
2020-11-04 21:48:50 +00:00
|
|
|
}
|
2020-12-16 03:37:32 +00:00
|
|
|
if v6Routes {
|
|
|
|
// Note: you might be wondering why we check only the state of
|
|
|
|
// conf.all.forwarding, rather than per-interface forwarding
|
|
|
|
// configuration. According to kernel documentation, it seems
|
|
|
|
// that to actually forward packets, you need to enable
|
|
|
|
// forwarding globally, and the per-interface forwarding
|
|
|
|
// setting only alters other things such as how router
|
|
|
|
// advertisements are handled. The kernel itself warns that
|
|
|
|
// enabling forwarding per-interface and not globally will
|
|
|
|
// probably not work, so I feel okay calling those configs
|
|
|
|
// broken until we have proof otherwise.
|
|
|
|
out, err := ioutil.ReadFile("/proc/sys/net/ipv6/conf/all/forwarding")
|
|
|
|
if err != nil {
|
|
|
|
out, err = exec.Command("sysctl", "-n", "net.ipv6.conf.all.forwarding").Output()
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
// Oh well, we tried. This is just for debugging.
|
|
|
|
// We don't want false positives.
|
|
|
|
// TODO: maybe we want a different warning for inability to check?
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if strings.TrimSpace(string(out)) == "0" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
2020-11-04 21:48:50 +00:00
|
|
|
}
|
2021-03-05 04:54:44 +00:00
|
|
|
|
|
|
|
func answerPing(logf logger.Logf, c *http.Client, pr *tailcfg.PingRequest) {
|
|
|
|
if pr.URL == "" {
|
|
|
|
logf("invalid PingRequest with no URL")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
req, err := http.NewRequestWithContext(ctx, "HEAD", pr.URL, nil)
|
|
|
|
if err != nil {
|
|
|
|
logf("http.NewRequestWithContext(%q): %v", pr.URL, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if pr.Log {
|
|
|
|
logf("answerPing: sending ping to %v ...", pr.URL)
|
|
|
|
}
|
|
|
|
t0 := time.Now()
|
|
|
|
_, err = c.Do(req)
|
|
|
|
d := time.Since(t0).Round(time.Millisecond)
|
|
|
|
if err != nil {
|
|
|
|
logf("answerPing error: %v to %v (after %v)", err, pr.URL, d)
|
|
|
|
} else if pr.Log {
|
|
|
|
logf("answerPing complete to %v (after %v)", pr.URL, d)
|
|
|
|
}
|
|
|
|
}
|