2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2024-07-10 16:45:46 +01:00
|
|
|
// Package wgengine provides the Tailscale WireGuard engine interface.
|
2020-02-05 22:16:58 +00:00
|
|
|
package wgengine
|
|
|
|
|
|
|
|
import (
|
2020-04-10 16:42:34 +01:00
|
|
|
"errors"
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
"net/netip"
|
2022-03-27 04:12:12 +01:00
|
|
|
"time"
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2020-03-26 05:57:46 +00:00
|
|
|
"tailscale.com/ipn/ipnstate"
|
2021-04-02 08:34:32 +01:00
|
|
|
"tailscale.com/net/dns"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/tailcfg"
|
2024-02-28 15:33:15 +00:00
|
|
|
"tailscale.com/types/key"
|
2021-02-05 23:44:46 +00:00
|
|
|
"tailscale.com/types/netmap"
|
2023-01-19 22:28:49 +00:00
|
|
|
"tailscale.com/wgengine/capture"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/wgengine/filter"
|
2020-05-11 22:02:12 +01:00
|
|
|
"tailscale.com/wgengine/router"
|
2021-01-29 20:16:36 +00:00
|
|
|
"tailscale.com/wgengine/wgcfg"
|
2024-02-28 15:33:15 +00:00
|
|
|
"tailscale.com/wgengine/wgint"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// Status is the Engine status.
|
2020-03-26 05:57:46 +00:00
|
|
|
//
|
|
|
|
// TODO(bradfitz): remove this, subset of ipnstate? Need to migrate users.
|
2020-02-05 22:16:58 +00:00
|
|
|
type Status struct {
|
2022-03-27 04:12:12 +01:00
|
|
|
AsOf time.Time // the time at which the status was calculated
|
2021-02-04 21:12:42 +00:00
|
|
|
Peers []ipnstate.PeerStatusLite
|
tailcfg: add Endpoint, EndpointType, MapRequest.EndpointType
Track endpoints internally with a new tailcfg.Endpoint type that
includes a typed netaddr.IPPort (instead of just a string) and
includes a type for how that endpoint was discovered (STUN, local,
etc).
Use []tailcfg.Endpoint instead of []string internally.
At the last second, send it to the control server as the existing
[]string for endpoints, but also include a new parallel
MapRequest.EndpointType []tailcfg.EndpointType, so the control server
can start filtering out less-important endpoint changes from
new-enough clients. Notably, STUN-discovered endpoints can be filtered
out from 1.6+ clients, as they can discover them amongst each other
via CallMeMaybe disco exchanges started over DERP. And STUN endpoints
change a lot, causing a lot of MapResposne updates. But portmapped
endpoints are worth keeping for now, as they they work right away
without requiring the firewall traversal extra RTT dance.
End result will be less control->client bandwidth. (despite negligible
increase in client->control bandwidth)
Updates tailscale/corp#1543
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2021-04-12 21:24:29 +01:00
|
|
|
LocalAddrs []tailcfg.Endpoint // the set of possible endpoints for the magic conn
|
|
|
|
DERPs int // number of active DERP connections
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// StatusCallback is the type of status callbacks used by
|
|
|
|
// Engine.SetStatusCallback.
|
|
|
|
//
|
|
|
|
// Exactly one of Status or error is non-nil.
|
|
|
|
type StatusCallback func(*Status, error)
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2021-01-15 14:16:28 +00:00
|
|
|
// NetworkMapCallback is the type used by callbacks that hook
|
|
|
|
// into network map updates.
|
2021-02-05 23:44:46 +00:00
|
|
|
type NetworkMapCallback func(*netmap.NetworkMap)
|
2021-01-15 14:16:28 +00:00
|
|
|
|
2020-04-10 16:42:34 +01:00
|
|
|
// ErrNoChanges is returned by Engine.Reconfig if no changes were made.
|
|
|
|
var ErrNoChanges = errors.New("no changes made to Engine config")
|
|
|
|
|
2021-11-30 18:30:44 +00:00
|
|
|
// PeerForIP is the type returned by Engine.PeerForIP.
|
|
|
|
type PeerForIP struct {
|
2023-08-18 15:57:44 +01:00
|
|
|
// Node is the matched node. It's always a valid value when
|
2021-11-30 18:30:44 +00:00
|
|
|
// Engine.PeerForIP returns ok==true.
|
2023-08-18 15:57:44 +01:00
|
|
|
Node tailcfg.NodeView
|
2021-11-30 18:30:44 +00:00
|
|
|
|
|
|
|
// IsSelf is whether the Node is the local process.
|
|
|
|
IsSelf bool
|
|
|
|
|
|
|
|
// Route is the route that matched the IP provided
|
|
|
|
// to Engine.PeerForIP.
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
Route netip.Prefix
|
2021-11-30 18:30:44 +00:00
|
|
|
}
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// Engine is the Tailscale WireGuard engine interface.
|
2020-02-05 22:16:58 +00:00
|
|
|
type Engine interface {
|
2020-02-11 23:21:24 +00:00
|
|
|
// Reconfig reconfigures WireGuard and makes sure it's running.
|
2020-02-05 22:16:58 +00:00
|
|
|
// This also handles setting up any kernel routes.
|
2020-02-11 23:21:24 +00:00
|
|
|
//
|
2020-06-24 22:10:42 +01:00
|
|
|
// This is called whenever tailcontrol (the control plane)
|
2020-02-11 23:21:24 +00:00
|
|
|
// sends an updated network map.
|
2020-04-10 16:42:34 +01:00
|
|
|
//
|
|
|
|
// The returned error is ErrNoChanges if no changes were made.
|
2023-08-18 01:29:15 +01:00
|
|
|
Reconfig(*wgcfg.Config, *router.Config, *dns.Config) error
|
2020-02-11 23:21:24 +00:00
|
|
|
|
2021-11-30 18:30:44 +00:00
|
|
|
// PeerForIP returns the node to which the provided IP routes,
|
2022-10-12 22:14:22 +01:00
|
|
|
// if any. If none is found, (nil, false) is returned.
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
PeerForIP(netip.Addr) (_ PeerForIP, ok bool)
|
2021-11-30 18:30:44 +00:00
|
|
|
|
2020-03-25 15:40:36 +00:00
|
|
|
// GetFilter returns the current packet filter, if any.
|
2020-03-25 07:47:55 +00:00
|
|
|
GetFilter() *filter.Filter
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// SetFilter updates the packet filter.
|
|
|
|
SetFilter(*filter.Filter)
|
|
|
|
|
2024-05-06 19:09:10 +01:00
|
|
|
// GetJailedFilter returns the current packet filter for jailed nodes,
|
|
|
|
// if any.
|
|
|
|
GetJailedFilter() *filter.Filter
|
|
|
|
|
|
|
|
// SetJailedFilter updates the packet filter for jailed nodes.
|
|
|
|
SetJailedFilter(*filter.Filter)
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// SetStatusCallback sets the function to call when the
|
|
|
|
// WireGuard status changes.
|
|
|
|
SetStatusCallback(StatusCallback)
|
|
|
|
|
|
|
|
// RequestStatus requests a WireGuard status update right
|
|
|
|
// away, sent to the callback registered via SetStatusCallback.
|
2020-02-05 22:16:58 +00:00
|
|
|
RequestStatus()
|
2020-02-11 23:21:24 +00:00
|
|
|
|
2024-02-28 15:33:15 +00:00
|
|
|
// PeerByKey returns the WireGuard status of the provided peer.
|
|
|
|
// If the peer is not found, ok is false.
|
|
|
|
PeerByKey(key.NodePublic) (_ wgint.Peer, ok bool)
|
|
|
|
|
2020-02-11 23:21:24 +00:00
|
|
|
// Close shuts down this wireguard instance, remove any routes
|
|
|
|
// it added, etc. To bring it up again later, you'll need a
|
|
|
|
// new Engine.
|
2020-02-05 22:16:58 +00:00
|
|
|
Close()
|
2020-02-11 23:21:24 +00:00
|
|
|
|
2024-02-24 01:55:08 +00:00
|
|
|
// Done returns a channel that is closed when the Engine's
|
|
|
|
// Close method is called, the engine aborts with an error,
|
|
|
|
// or it shuts down due to the closure of the underlying device.
|
|
|
|
// You don't have to call this.
|
|
|
|
Done() <-chan struct{}
|
2020-02-11 23:21:24 +00:00
|
|
|
|
2020-06-25 19:04:52 +01:00
|
|
|
// SetNetworkMap informs the engine of the latest network map
|
|
|
|
// from the server. The network map's DERPMap field should be
|
|
|
|
// ignored as as it might be disabled; get it from SetDERPMap
|
|
|
|
// instead.
|
|
|
|
// The network map should only be read from.
|
2021-02-05 23:44:46 +00:00
|
|
|
SetNetworkMap(*netmap.NetworkMap)
|
2020-06-25 19:04:52 +01:00
|
|
|
|
2020-03-26 05:57:46 +00:00
|
|
|
// UpdateStatus populates the network state using the provided
|
|
|
|
// status builder.
|
|
|
|
UpdateStatus(*ipnstate.StatusBuilder)
|
2020-08-09 22:49:42 +01:00
|
|
|
|
2023-08-08 13:11:28 +01:00
|
|
|
// Ping is a request to start a ping of the given message size to the peer
|
|
|
|
// handling the given IP, then call cb with its ping latency & method.
|
|
|
|
//
|
|
|
|
// If size is zero too small, it is ignored. See tailscale.PingOpts for details.
|
|
|
|
Ping(ip netip.Addr, pingType tailcfg.PingType, size int, cb func(*ipnstate.PingResult))
|
2021-03-15 21:59:35 +00:00
|
|
|
|
2023-01-19 22:28:49 +00:00
|
|
|
// InstallCaptureHook registers a function to be called to capture
|
|
|
|
// packets traversing the data path. The hook can be uninstalled by
|
|
|
|
// calling this function with a nil value.
|
2023-02-08 23:48:27 +00:00
|
|
|
InstallCaptureHook(capture.Callback)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|