all: convert from []wgcfg.Endpoint to string

This eliminates a dependency on wgcfg.Endpoint,
as part of the effort to eliminate our wireguard-go fork.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
josh/debug-TestLikelyHomeRouterIPSyscallExec
Josh Bleecher Snyder 3 years ago committed by Josh Bleecher Snyder
parent 9abcb18061
commit 654b5f1570

@ -27,7 +27,7 @@ tailscale.com/cmd/tailscale dependencies: (generated by github.com/tailscale/dep
github.com/tailscale/wireguard-go/tai64n from github.com/tailscale/wireguard-go/device+ github.com/tailscale/wireguard-go/tai64n from github.com/tailscale/wireguard-go/device+
💣 github.com/tailscale/wireguard-go/tun from github.com/tailscale/wireguard-go/device+ 💣 github.com/tailscale/wireguard-go/tun from github.com/tailscale/wireguard-go/device+
W 💣 github.com/tailscale/wireguard-go/tun/wintun from github.com/tailscale/wireguard-go/tun+ W 💣 github.com/tailscale/wireguard-go/tun/wintun from github.com/tailscale/wireguard-go/tun+
github.com/tailscale/wireguard-go/wgcfg from github.com/tailscale/wireguard-go/conn+ github.com/tailscale/wireguard-go/wgcfg from github.com/tailscale/wireguard-go/device+
github.com/tcnksm/go-httpstat from tailscale.com/net/netcheck github.com/tcnksm/go-httpstat from tailscale.com/net/netcheck
github.com/toqueteos/webbrowser from tailscale.com/cmd/tailscale/cli github.com/toqueteos/webbrowser from tailscale.com/cmd/tailscale/cli
💣 go4.org/intern from inet.af/netaddr 💣 go4.org/intern from inet.af/netaddr

@ -31,7 +31,7 @@ tailscale.com/cmd/tailscaled dependencies: (generated by github.com/tailscale/de
github.com/tailscale/wireguard-go/tai64n from github.com/tailscale/wireguard-go/device+ github.com/tailscale/wireguard-go/tai64n from github.com/tailscale/wireguard-go/device+
💣 github.com/tailscale/wireguard-go/tun from github.com/tailscale/wireguard-go/device+ 💣 github.com/tailscale/wireguard-go/tun from github.com/tailscale/wireguard-go/device+
W 💣 github.com/tailscale/wireguard-go/tun/wintun from github.com/tailscale/wireguard-go/tun+ W 💣 github.com/tailscale/wireguard-go/tun/wintun from github.com/tailscale/wireguard-go/tun+
github.com/tailscale/wireguard-go/wgcfg from github.com/tailscale/wireguard-go/conn+ github.com/tailscale/wireguard-go/wgcfg from github.com/tailscale/wireguard-go/device+
github.com/tcnksm/go-httpstat from tailscale.com/net/netcheck github.com/tcnksm/go-httpstat from tailscale.com/net/netcheck
💣 go4.org/intern from inet.af/netaddr 💣 go4.org/intern from inet.af/netaddr
💣 go4.org/mem from tailscale.com/control/controlclient+ 💣 go4.org/mem from tailscale.com/control/controlclient+

@ -298,7 +298,7 @@ func (nm *NetworkMap) WGCfg(logf logger.Logf, flags WGConfigFlags) (*wgcfg.Confi
if err := appendEndpoint(cpeer, fmt.Sprintf("%x%s", peer.DiscoKey[:], EndpointDiscoSuffix)); err != nil { if err := appendEndpoint(cpeer, fmt.Sprintf("%x%s", peer.DiscoKey[:], EndpointDiscoSuffix)); err != nil {
return nil, err return nil, err
} }
cpeer.Endpoints = []wgcfg.Endpoint{{Host: fmt.Sprintf("%x.disco.tailscale", peer.DiscoKey[:]), Port: 12345}} cpeer.Endpoints = fmt.Sprintf("%x.disco.tailscale:12345", peer.DiscoKey[:])
} else { } else {
if err := appendEndpoint(cpeer, peer.DERP); err != nil { if err := appendEndpoint(cpeer, peer.DERP); err != nil {
return nil, err return nil, err
@ -349,15 +349,18 @@ func appendEndpoint(peer *wgcfg.Peer, epStr string) error {
if epStr == "" { if epStr == "" {
return nil return nil
} }
host, port, err := net.SplitHostPort(epStr) _, port, err := net.SplitHostPort(epStr)
if err != nil { if err != nil {
return fmt.Errorf("malformed endpoint %q for peer %v", epStr, peer.PublicKey.ShortString()) return fmt.Errorf("malformed endpoint %q for peer %v", epStr, peer.PublicKey.ShortString())
} }
port16, err := strconv.ParseUint(port, 10, 16) _, err = strconv.ParseUint(port, 10, 16)
if err != nil { if err != nil {
return fmt.Errorf("invalid port in endpoint %q for peer %v", epStr, peer.PublicKey.ShortString()) return fmt.Errorf("invalid port in endpoint %q for peer %v", epStr, peer.PublicKey.ShortString())
} }
peer.Endpoints = append(peer.Endpoints, wgcfg.Endpoint{Host: host, Port: uint16(port16)}) if peer.Endpoints != "" {
peer.Endpoints += ","
}
peer.Endpoints += epStr
return nil return nil
} }

@ -24,7 +24,7 @@ require (
github.com/pborman/getopt v0.0.0-20190409184431-ee0cd42419d3 github.com/pborman/getopt v0.0.0-20190409184431-ee0cd42419d3
github.com/peterbourgon/ff/v2 v2.0.0 github.com/peterbourgon/ff/v2 v2.0.0
github.com/tailscale/depaware v0.0.0-20201214215404-77d1e9757027 github.com/tailscale/depaware v0.0.0-20201214215404-77d1e9757027
github.com/tailscale/wireguard-go v0.0.0-20210113223737-a6213b5eaf98 github.com/tailscale/wireguard-go v0.0.0-20210114205708-a1377e83f551
github.com/tcnksm/go-httpstat v0.2.0 github.com/tcnksm/go-httpstat v0.2.0
github.com/toqueteos/webbrowser v1.2.0 github.com/toqueteos/webbrowser v1.2.0
go4.org/mem v0.0.0-20201119185036-c04c5a6ff174 go4.org/mem v0.0.0-20201119185036-c04c5a6ff174

@ -41,12 +41,7 @@ func getVal() []interface{} {
ListenPort: 5, ListenPort: 5,
Peers: []wgcfg.Peer{ Peers: []wgcfg.Peer{
{ {
Endpoints: []wgcfg.Endpoint{ Endpoints: "foo:5",
{
Host: "foo",
Port: 5,
},
},
}, },
}, },
}, },

@ -567,24 +567,18 @@ func (as *addrSet) populatePeerStatus(ps *ipnstate.PeerStatus) {
} }
} }
func (a *addrSet) Addrs() []wgcfg.Endpoint { func (a *addrSet) Addrs() string {
var eps []wgcfg.Endpoint var addrs []string
for _, addr := range a.addrs { for _, addr := range a.addrs {
eps = append(eps, wgcfg.Endpoint{ addrs = append(addrs, addr.String())
Host: addr.IP.String(),
Port: uint16(addr.Port),
})
} }
a.mu.Lock() a.mu.Lock()
defer a.mu.Unlock() defer a.mu.Unlock()
if a.roamAddr != nil { if a.roamAddr != nil {
eps = append(eps, wgcfg.Endpoint{ addrs = append(addrs, a.roamAddr.String())
Host: a.roamAddr.IP.String(),
Port: uint16(a.roamAddr.Port),
})
} }
return eps return strings.Join(addrs, ",")
} }
// Message types copied from wireguard-go/device/noise-protocol.go // Message types copied from wireguard-go/device/noise-protocol.go

@ -28,7 +28,6 @@ import (
"time" "time"
"github.com/tailscale/wireguard-go/conn" "github.com/tailscale/wireguard-go/conn"
"github.com/tailscale/wireguard-go/wgcfg"
"go4.org/mem" "go4.org/mem"
"golang.org/x/crypto/nacl/box" "golang.org/x/crypto/nacl/box"
"golang.org/x/time/rate" "golang.org/x/time/rate"
@ -2977,19 +2976,11 @@ func (de *discoEndpoint) String() string {
return fmt.Sprintf("magicsock.discoEndpoint{%v, %v}", de.publicKey.ShortString(), de.discoShort) return fmt.Sprintf("magicsock.discoEndpoint{%v, %v}", de.publicKey.ShortString(), de.discoShort)
} }
func (de *discoEndpoint) Addrs() []wgcfg.Endpoint { func (de *discoEndpoint) Addrs() string {
// This has to be the same string that was passed to // This has to be the same string that was passed to
// CreateEndpoint, otherwise Reconfig will end up recreating // CreateEndpoint, otherwise Reconfig will end up recreating
// Endpoints and losing state over time. // Endpoints and losing state over time.
host, portStr, err := net.SplitHostPort(de.wgEndpointHostPort) return de.wgEndpointHostPort
if err != nil {
panic(err)
}
port, err := strconv.ParseUint(portStr, 10, 16)
if err != nil {
panic(err)
}
return []wgcfg.Endpoint{{Host: host, Port: uint16(port)}}
} }
func (de *discoEndpoint) ClearSrc() {} func (de *discoEndpoint) ClearSrc() {}

@ -483,12 +483,9 @@ func makeConfigs(t *testing.T, addrs []netaddr.IPPort) []wgcfg.Config {
continue continue
} }
peer := wgcfg.Peer{ peer := wgcfg.Peer{
PublicKey: privKeys[peerNum].Public(), PublicKey: privKeys[peerNum].Public(),
AllowedIPs: addresses[peerNum], AllowedIPs: addresses[peerNum],
Endpoints: []wgcfg.Endpoint{{ Endpoints: addr.String(),
Host: addr.IP.String(),
Port: addr.Port,
}},
PersistentKeepalive: 25, PersistentKeepalive: 25,
} }
cfg.Peers = append(cfg.Peers, peer) cfg.Peers = append(cfg.Peers, peer)
@ -1140,12 +1137,12 @@ func testTwoDevicePing(t *testing.T, d *devices) {
}) })
// Add DERP relay. // Add DERP relay.
derpEp := wgcfg.Endpoint{Host: "127.3.3.40", Port: 1} derpEp := "127.3.3.40:1"
ep0 := cfgs[0].Peers[0].Endpoints ep0 := cfgs[0].Peers[0].Endpoints
ep0 = append([]wgcfg.Endpoint{derpEp}, ep0...) ep0 = derpEp + "," + ep0
cfgs[0].Peers[0].Endpoints = ep0 cfgs[0].Peers[0].Endpoints = ep0
ep1 := cfgs[1].Peers[0].Endpoints ep1 := cfgs[1].Peers[0].Endpoints
ep1 = append([]wgcfg.Endpoint{derpEp}, ep1...) ep1 = derpEp + "," + ep1
cfgs[1].Peers[0].Endpoints = ep1 cfgs[1].Peers[0].Endpoints = ep1
if err := m1.dev.Reconfig(&cfgs[0]); err != nil { if err := m1.dev.Reconfig(&cfgs[0]); err != nil {
t.Fatal(err) t.Fatal(err)
@ -1161,8 +1158,8 @@ func testTwoDevicePing(t *testing.T, d *devices) {
}) })
// Disable real route. // Disable real route.
cfgs[0].Peers[0].Endpoints = []wgcfg.Endpoint{derpEp} cfgs[0].Peers[0].Endpoints = derpEp
cfgs[1].Peers[0].Endpoints = []wgcfg.Endpoint{derpEp} cfgs[1].Peers[0].Endpoints = derpEp
if err := m1.dev.Reconfig(&cfgs[0]); err != nil { if err := m1.dev.Reconfig(&cfgs[0]); err != nil {
t.Fatal(err) t.Fatal(err)
} }

@ -674,10 +674,15 @@ func isTrimmablePeer(p *wgcfg.Peer, numPeers int) bool {
if forceFullWireguardConfig(numPeers) { if forceFullWireguardConfig(numPeers) {
return false return false
} }
if len(p.Endpoints) != 1 { if !isSingleEndpoint(p.Endpoints) {
return false return false
} }
if !strings.HasSuffix(p.Endpoints[0].Host, ".disco.tailscale") {
host, _, err := net.SplitHostPort(p.Endpoints)
if err != nil {
return false
}
if !strings.HasSuffix(host, ".disco.tailscale") {
return false return false
} }
@ -741,11 +746,14 @@ func (e *userspaceEngine) isActiveSince(dk tailcfg.DiscoKey, ip netaddr.IP, t ti
// Host of form "<64-hex-digits>.disco.tailscale". If invariant is violated, // Host of form "<64-hex-digits>.disco.tailscale". If invariant is violated,
// we return the zero value. // we return the zero value.
func discoKeyFromPeer(p *wgcfg.Peer) tailcfg.DiscoKey { func discoKeyFromPeer(p *wgcfg.Peer) tailcfg.DiscoKey {
host := p.Endpoints[0].Host if len(p.Endpoints) < 64 {
if len(host) < 64 {
return tailcfg.DiscoKey{} return tailcfg.DiscoKey{}
} }
k, err := key.NewPublicFromHexMem(mem.S(host[:64])) host, rest := p.Endpoints[:64], p.Endpoints[64:]
if !strings.HasPrefix(rest, ".disco.tailscale") {
return tailcfg.DiscoKey{}
}
k, err := key.NewPublicFromHexMem(mem.S(host))
if err != nil { if err != nil {
return tailcfg.DiscoKey{} return tailcfg.DiscoKey{}
} }
@ -946,21 +954,21 @@ func (e *userspaceEngine) Reconfig(cfg *wgcfg.Config, routerCfg *router.Config)
// and a second time with it. // and a second time with it.
discoChanged := make(map[key.Public]bool) discoChanged := make(map[key.Public]bool)
{ {
prevEP := make(map[key.Public]wgcfg.Endpoint) prevEP := make(map[key.Public]string)
for i := range e.lastCfgFull.Peers { for i := range e.lastCfgFull.Peers {
if p := &e.lastCfgFull.Peers[i]; len(p.Endpoints) == 1 { if p := &e.lastCfgFull.Peers[i]; isSingleEndpoint(p.Endpoints) {
prevEP[key.Public(p.PublicKey)] = p.Endpoints[0] prevEP[key.Public(p.PublicKey)] = p.Endpoints
} }
} }
for i := range cfg.Peers { for i := range cfg.Peers {
p := &cfg.Peers[i] p := &cfg.Peers[i]
if len(p.Endpoints) != 1 { if !isSingleEndpoint(p.Endpoints) {
continue continue
} }
pub := key.Public(p.PublicKey) pub := key.Public(p.PublicKey)
if old, ok := prevEP[pub]; ok && old != p.Endpoints[0] { if old, ok := prevEP[pub]; ok && old != p.Endpoints {
discoChanged[pub] = true discoChanged[pub] = true
e.logf("wgengine: Reconfig: %s changed from %s to %s", pub.ShortString(), &old, &p.Endpoints[0]) e.logf("wgengine: Reconfig: %s changed from %q to %q", pub.ShortString(), old, p.Endpoints)
} }
} }
} }
@ -1005,6 +1013,11 @@ func (e *userspaceEngine) Reconfig(cfg *wgcfg.Config, routerCfg *router.Config)
return nil return nil
} }
// isSingleEndpoint reports whether endpoints contains exactly one host:port pair.
func isSingleEndpoint(s string) bool {
return s != "" && !strings.Contains(s, ",")
}
func (e *userspaceEngine) GetFilter() *filter.Filter { func (e *userspaceEngine) GetFilter() *filter.Filter {
return e.tundev.GetFilter() return e.tundev.GetFilter()
} }

@ -103,12 +103,7 @@ func TestUserspaceEngineReconfig(t *testing.T) {
AllowedIPs: []netaddr.IPPrefix{ AllowedIPs: []netaddr.IPPrefix{
{IP: netaddr.IPv4(100, 100, 99, 1), Bits: 32}, {IP: netaddr.IPv4(100, 100, 99, 1), Bits: 32},
}, },
Endpoints: []wgcfg.Endpoint{ Endpoints: discoHex + ".disco.tailscale:12345",
{
Host: discoHex + ".disco.tailscale",
Port: 12345,
},
},
}, },
}, },
} }

@ -36,7 +36,7 @@ type PeerStatus struct {
// TODO(bradfitz): remove this, subset of ipnstate? Need to migrate users. // TODO(bradfitz): remove this, subset of ipnstate? Need to migrate users.
type Status struct { type Status struct {
Peers []PeerStatus Peers []PeerStatus
LocalAddrs []string // TODO(crawshaw): []wgcfg.Endpoint? LocalAddrs []string // the set of possible endpoints for the magic conn
DERPs int // number of active DERP connections DERPs int // number of active DERP connections
} }

Loading…
Cancel
Save