2023-05-10 07:24:05 +00:00
|
|
|
package hscontrol
|
2021-08-13 09:33:50 +00:00
|
|
|
|
|
|
|
import (
|
2021-12-31 19:51:20 +00:00
|
|
|
"context"
|
|
|
|
"fmt"
|
2021-08-18 22:24:22 +00:00
|
|
|
"net/http"
|
2021-08-13 09:33:50 +00:00
|
|
|
"time"
|
|
|
|
|
2023-05-26 10:26:34 +00:00
|
|
|
"github.com/juanfont/headscale/hscontrol/mapper"
|
2023-05-21 16:37:59 +00:00
|
|
|
"github.com/juanfont/headscale/hscontrol/types"
|
2023-05-11 07:09:18 +00:00
|
|
|
"github.com/juanfont/headscale/hscontrol/util"
|
2021-08-13 09:33:50 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
|
|
|
"tailscale.com/tailcfg"
|
|
|
|
)
|
|
|
|
|
2021-11-14 17:31:51 +00:00
|
|
|
const (
|
2022-07-12 10:27:28 +00:00
|
|
|
keepAliveInterval = 60 * time.Second
|
2021-11-14 17:31:51 +00:00
|
|
|
)
|
|
|
|
|
2022-05-16 12:59:46 +00:00
|
|
|
type contextKey string
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
const nodeNameContextKey = contextKey("nodeName")
|
2022-05-16 12:59:46 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
type UpdateNode func()
|
|
|
|
|
|
|
|
func logPollFunc(
|
|
|
|
mapRequest tailcfg.MapRequest,
|
2023-09-24 11:42:05 +00:00
|
|
|
node *types.Node,
|
2023-06-21 09:29:52 +00:00
|
|
|
isNoise bool,
|
|
|
|
) (func(string), func(error, string)) {
|
|
|
|
return func(msg string) {
|
|
|
|
log.Info().
|
|
|
|
Caller().
|
|
|
|
Bool("noise", isNoise).
|
|
|
|
Bool("readOnly", mapRequest.ReadOnly).
|
|
|
|
Bool("omitPeers", mapRequest.OmitPeers).
|
|
|
|
Bool("stream", mapRequest.Stream).
|
2023-09-24 11:42:05 +00:00
|
|
|
Str("node_key", node.NodeKey).
|
|
|
|
Str("node", node.Hostname).
|
2023-06-21 09:29:52 +00:00
|
|
|
Msg(msg)
|
|
|
|
},
|
|
|
|
func(err error, msg string) {
|
|
|
|
log.Error().
|
|
|
|
Caller().
|
|
|
|
Bool("noise", isNoise).
|
|
|
|
Bool("readOnly", mapRequest.ReadOnly).
|
|
|
|
Bool("omitPeers", mapRequest.OmitPeers).
|
|
|
|
Bool("stream", mapRequest.Stream).
|
2023-09-24 11:42:05 +00:00
|
|
|
Str("node_key", node.NodeKey).
|
|
|
|
Str("node", node.Hostname).
|
2023-06-21 09:29:52 +00:00
|
|
|
Err(err).
|
|
|
|
Msg(msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-06 15:14:56 +00:00
|
|
|
// handlePoll is the common code for the legacy and Noise protocols to
|
2022-08-15 08:43:39 +00:00
|
|
|
// managed the poll loop.
|
2023-08-09 20:56:21 +00:00
|
|
|
//
|
|
|
|
//nolint:gocyclo
|
2023-06-06 15:14:56 +00:00
|
|
|
func (h *Headscale) handlePoll(
|
2022-06-26 10:06:25 +00:00
|
|
|
writer http.ResponseWriter,
|
2022-09-04 13:14:12 +00:00
|
|
|
ctx context.Context,
|
2023-09-24 11:42:05 +00:00
|
|
|
node *types.Node,
|
2022-08-14 20:57:03 +00:00
|
|
|
mapRequest tailcfg.MapRequest,
|
|
|
|
isNoise bool,
|
2022-06-20 10:30:51 +00:00
|
|
|
) {
|
2023-09-24 11:42:05 +00:00
|
|
|
logInfo, logErr := logPollFunc(mapRequest, node, isNoise)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
2023-09-11 16:45:46 +00:00
|
|
|
// This is the mechanism where the node gives us inforamtion about its
|
|
|
|
// current configuration.
|
|
|
|
//
|
2023-09-11 11:18:31 +00:00
|
|
|
// If OmitPeers is true, Stream is false, and ReadOnly is false,
|
|
|
|
// then te server will let clients update their endpoints without
|
|
|
|
// breaking existing long-polling (Stream == true) connections.
|
|
|
|
// In this case, the server can omit the entire response; the client
|
|
|
|
// only checks the HTTP response status code.
|
|
|
|
if mapRequest.OmitPeers && !mapRequest.Stream && !mapRequest.ReadOnly {
|
|
|
|
log.Info().
|
|
|
|
Caller().
|
|
|
|
Bool("noise", isNoise).
|
|
|
|
Bool("readOnly", mapRequest.ReadOnly).
|
|
|
|
Bool("omitPeers", mapRequest.OmitPeers).
|
|
|
|
Bool("stream", mapRequest.Stream).
|
2023-09-24 11:42:05 +00:00
|
|
|
Str("node_key", node.NodeKey).
|
|
|
|
Str("node", node.Hostname).
|
|
|
|
Strs("endpoints", node.Endpoints).
|
2023-09-11 11:18:31 +00:00
|
|
|
Msg("Received endpoint update")
|
|
|
|
|
|
|
|
now := time.Now().UTC()
|
2023-09-24 11:42:05 +00:00
|
|
|
node.LastSeen = &now
|
|
|
|
node.Hostname = mapRequest.Hostinfo.Hostname
|
|
|
|
node.HostInfo = types.HostInfo(*mapRequest.Hostinfo)
|
|
|
|
node.DiscoKey = util.DiscoPublicKeyStripPrefix(mapRequest.DiscoKey)
|
|
|
|
node.Endpoints = mapRequest.Endpoints
|
|
|
|
|
|
|
|
if err := h.db.NodeSave(node); err != nil {
|
|
|
|
logErr(err, "Failed to persist/update node in the database")
|
2023-09-11 11:18:31 +00:00
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
err := h.db.SaveNodeRoutes(node)
|
2023-09-11 16:45:46 +00:00
|
|
|
if err != nil {
|
2023-09-24 11:42:05 +00:00
|
|
|
logErr(err, "Error processing node routes")
|
2023-09-11 16:45:46 +00:00
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
h.nodeNotifier.NotifyWithIgnore(
|
|
|
|
types.StateUpdate{
|
|
|
|
Type: types.StatePeerChanged,
|
2023-09-24 11:42:05 +00:00
|
|
|
Changed: types.Nodes{node},
|
2023-09-11 11:18:31 +00:00
|
|
|
},
|
2023-09-24 11:42:05 +00:00
|
|
|
node.MachineKey)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
writer.WriteHeader(http.StatusOK)
|
|
|
|
if f, ok := writer.(http.Flusher); ok {
|
|
|
|
f.Flush()
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
// ReadOnly is whether the client just wants to fetch the
|
|
|
|
// MapResponse, without updating their Endpoints. The
|
|
|
|
// Endpoints field will be ignored and LastSeen will not be
|
|
|
|
// updated and peers will not be notified of changes.
|
|
|
|
//
|
|
|
|
// The intended use is for clients to discover the DERP map at
|
|
|
|
// start-up before their first real endpoint update.
|
|
|
|
} else if mapRequest.OmitPeers && !mapRequest.Stream && mapRequest.ReadOnly {
|
2023-09-24 11:42:05 +00:00
|
|
|
h.handleLiteRequest(writer, node, mapRequest, isNoise)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
} else if mapRequest.OmitPeers && mapRequest.Stream {
|
|
|
|
logErr(nil, "Ignoring request, don't know how to handle it")
|
|
|
|
|
|
|
|
return
|
2023-07-26 15:54:19 +00:00
|
|
|
}
|
|
|
|
|
2023-09-11 16:45:46 +00:00
|
|
|
now := time.Now().UTC()
|
2023-09-24 11:42:05 +00:00
|
|
|
node.LastSeen = &now
|
|
|
|
node.Hostname = mapRequest.Hostinfo.Hostname
|
|
|
|
node.HostInfo = types.HostInfo(*mapRequest.Hostinfo)
|
|
|
|
node.DiscoKey = util.DiscoPublicKeyStripPrefix(mapRequest.DiscoKey)
|
|
|
|
node.Endpoints = mapRequest.Endpoints
|
2023-06-21 09:29:52 +00:00
|
|
|
|
2023-08-09 20:20:05 +00:00
|
|
|
// When a node connects to control, list the peers it has at
|
|
|
|
// that given point, further updates are kept in memory in
|
|
|
|
// the Mapper, which lives for the duration of the polling
|
|
|
|
// session.
|
2023-09-24 11:42:05 +00:00
|
|
|
peers, err := h.db.ListPeers(node)
|
2023-08-09 20:20:05 +00:00
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Failed to list peers when opening poller")
|
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-22 08:01:17 +00:00
|
|
|
mapp := mapper.NewMapper(
|
2023-09-24 11:42:05 +00:00
|
|
|
node,
|
2023-08-09 20:20:05 +00:00
|
|
|
peers,
|
2023-05-26 10:26:34 +00:00
|
|
|
h.privateKey2019,
|
|
|
|
isNoise,
|
|
|
|
h.DERPMap,
|
|
|
|
h.cfg.BaseDomain,
|
|
|
|
h.cfg.DNSConfig,
|
|
|
|
h.cfg.LogTail.Enabled,
|
|
|
|
h.cfg.RandomizeClientPort,
|
|
|
|
)
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
err = h.db.SaveNodeRoutes(node)
|
2022-11-24 15:59:37 +00:00
|
|
|
if err != nil {
|
2023-09-24 11:42:05 +00:00
|
|
|
logErr(err, "Error processing node routes")
|
2022-11-24 15:59:37 +00:00
|
|
|
}
|
|
|
|
|
2022-02-06 16:55:12 +00:00
|
|
|
// update ACLRules with peer informations (to update server tags if necessary)
|
2023-05-21 16:37:59 +00:00
|
|
|
if h.ACLPolicy != nil {
|
2022-08-24 10:53:55 +00:00
|
|
|
// update routes with peer information
|
2023-09-24 11:42:05 +00:00
|
|
|
err = h.db.EnableAutoApprovedRoutes(h.ACLPolicy, node)
|
2022-11-25 15:29:45 +00:00
|
|
|
if err != nil {
|
2023-06-21 09:29:52 +00:00
|
|
|
logErr(err, "Error running auto approved routes")
|
2022-11-25 15:29:45 +00:00
|
|
|
}
|
2022-02-06 16:55:12 +00:00
|
|
|
}
|
2022-08-24 10:53:55 +00:00
|
|
|
|
2023-07-17 11:35:05 +00:00
|
|
|
// TODO(kradalby): Save specific stuff, not whole object.
|
2023-09-24 11:42:05 +00:00
|
|
|
if err := h.db.NodeSave(node); err != nil {
|
|
|
|
logErr(err, "Failed to persist/update node in the database")
|
2023-05-21 16:37:59 +00:00
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
2022-05-30 13:39:24 +00:00
|
|
|
|
2023-05-21 16:37:59 +00:00
|
|
|
return
|
2022-05-30 13:39:24 +00:00
|
|
|
}
|
2021-08-18 22:24:22 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
logInfo("Sending initial map")
|
2021-08-18 22:24:22 +00:00
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
mapResp, err := mapp.FullMapResponse(mapRequest, node, h.ACLPolicy)
|
2023-07-26 11:55:03 +00:00
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Failed to create MapResponse")
|
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
// Send the client an update to make sure we send an initial mapresponse
|
|
|
|
_, err = writer.Write(mapResp)
|
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Could not write the map response")
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if flusher, ok := writer.(http.Flusher); ok {
|
|
|
|
flusher.Flush()
|
|
|
|
} else {
|
|
|
|
return
|
|
|
|
}
|
2021-08-18 22:24:22 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
h.nodeNotifier.NotifyWithIgnore(
|
|
|
|
types.StateUpdate{
|
|
|
|
Type: types.StatePeerChanged,
|
2023-09-24 11:42:05 +00:00
|
|
|
Changed: types.Nodes{node},
|
2023-09-11 11:18:31 +00:00
|
|
|
},
|
2023-09-24 11:42:05 +00:00
|
|
|
node.MachineKey)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
// Set up the client stream
|
|
|
|
h.pollNetMapStreamWG.Add(1)
|
|
|
|
defer h.pollNetMapStreamWG.Done()
|
|
|
|
|
|
|
|
updateChan := make(chan types.StateUpdate)
|
2023-09-24 11:42:05 +00:00
|
|
|
defer closeChanWithLog(updateChan, node.Hostname, "updateChan")
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
// Register the node's update channel
|
2023-09-24 11:42:05 +00:00
|
|
|
h.nodeNotifier.AddNode(node.MachineKey, updateChan)
|
|
|
|
defer h.nodeNotifier.RemoveNode(node.MachineKey)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
keepAliveTicker := time.NewTicker(keepAliveInterval)
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
ctx = context.WithValue(ctx, nodeNameContextKey, node.Hostname)
|
2022-04-09 22:37:13 +00:00
|
|
|
|
2022-06-20 10:30:51 +00:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
2022-04-09 22:37:13 +00:00
|
|
|
|
2022-06-20 19:40:28 +00:00
|
|
|
for {
|
2023-07-24 06:58:51 +00:00
|
|
|
logInfo("Waiting for update on stream channel")
|
2021-08-18 22:24:22 +00:00
|
|
|
select {
|
2023-06-21 09:29:52 +00:00
|
|
|
case <-keepAliveTicker.C:
|
2023-09-24 11:42:05 +00:00
|
|
|
data, err := mapp.KeepAliveResponse(mapRequest, node)
|
2021-08-13 09:33:50 +00:00
|
|
|
if err != nil {
|
2023-06-21 09:29:52 +00:00
|
|
|
logErr(err, "Error generating the keep alive msg")
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2022-06-20 19:40:28 +00:00
|
|
|
return
|
2021-08-13 09:33:50 +00:00
|
|
|
}
|
2023-06-21 09:29:52 +00:00
|
|
|
_, err = writer.Write(data)
|
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Cannot write keep alive message")
|
2022-06-26 10:25:26 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
return
|
2022-06-26 10:25:26 +00:00
|
|
|
}
|
2023-06-21 09:29:52 +00:00
|
|
|
if flusher, ok := writer.(http.Flusher); ok {
|
|
|
|
flusher.Flush()
|
|
|
|
} else {
|
2023-07-24 06:58:51 +00:00
|
|
|
log.Error().Msg("Failed to create http flusher")
|
|
|
|
|
2022-06-20 19:40:28 +00:00
|
|
|
return
|
2021-08-21 15:52:19 +00:00
|
|
|
}
|
2021-10-04 16:28:07 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
// This goroutine is not ideal, but we have a potential issue here
|
|
|
|
// where it blocks too long and that holds up updates.
|
|
|
|
// One alternative is to split these different channels into
|
|
|
|
// goroutines, but then you might have a problem without a lock
|
|
|
|
// if a keepalive is written at the same time as an update.
|
|
|
|
go func() {
|
2023-09-24 11:42:05 +00:00
|
|
|
err = h.db.UpdateLastSeen(node)
|
2023-09-11 11:18:31 +00:00
|
|
|
if err != nil {
|
2023-09-24 11:42:05 +00:00
|
|
|
logErr(err, "Cannot update node LastSeen")
|
2022-06-20 19:40:28 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2023-06-29 10:20:22 +00:00
|
|
|
case update := <-updateChan:
|
2023-07-24 06:58:51 +00:00
|
|
|
logInfo("Received update")
|
2023-09-11 11:18:31 +00:00
|
|
|
now := time.Now()
|
2023-07-24 06:58:51 +00:00
|
|
|
|
2023-06-29 10:20:22 +00:00
|
|
|
var data []byte
|
|
|
|
var err error
|
|
|
|
|
|
|
|
switch update.Type {
|
|
|
|
case types.StatePeerChanged:
|
2023-07-17 09:13:48 +00:00
|
|
|
logInfo("Sending PeerChanged MapResponse")
|
2023-09-24 11:42:05 +00:00
|
|
|
data, err = mapp.PeerChangedResponse(mapRequest, node, update.Changed, h.ACLPolicy)
|
2023-06-29 10:20:22 +00:00
|
|
|
case types.StatePeerRemoved:
|
2023-07-17 09:13:48 +00:00
|
|
|
logInfo("Sending PeerRemoved MapResponse")
|
2023-09-24 11:42:05 +00:00
|
|
|
data, err = mapp.PeerRemovedResponse(mapRequest, node, update.Removed)
|
2023-06-29 10:20:22 +00:00
|
|
|
case types.StateDERPUpdated:
|
2023-07-17 09:13:48 +00:00
|
|
|
logInfo("Sending DERPUpdate MapResponse")
|
2023-09-24 11:42:05 +00:00
|
|
|
data, err = mapp.DERPMapResponse(mapRequest, node, update.DERPMap)
|
2023-07-17 09:13:48 +00:00
|
|
|
case types.StateFullUpdate:
|
|
|
|
logInfo("Sending Full MapResponse")
|
2023-09-24 11:42:05 +00:00
|
|
|
data, err = mapp.FullMapResponse(mapRequest, node, h.ACLPolicy)
|
2023-06-29 10:20:22 +00:00
|
|
|
}
|
|
|
|
|
2021-08-13 09:33:50 +00:00
|
|
|
if err != nil {
|
2023-06-29 10:20:22 +00:00
|
|
|
logErr(err, "Could not get the create map update")
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2022-06-20 19:40:28 +00:00
|
|
|
return
|
2021-08-13 09:33:50 +00:00
|
|
|
}
|
2022-06-20 19:40:28 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
_, err = writer.Write(data)
|
2022-01-16 10:59:03 +00:00
|
|
|
if err != nil {
|
2023-06-21 09:29:52 +00:00
|
|
|
logErr(err, "Could not write the map response")
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
updateRequestsSentToNode.WithLabelValues(node.User.Name, node.Hostname, "failed").
|
2023-06-21 09:29:52 +00:00
|
|
|
Inc()
|
2022-06-20 19:40:28 +00:00
|
|
|
|
|
|
|
return
|
2022-01-16 10:59:03 +00:00
|
|
|
}
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
if flusher, ok := writer.(http.Flusher); ok {
|
|
|
|
flusher.Flush()
|
2021-08-19 17:05:33 +00:00
|
|
|
} else {
|
2023-07-24 06:58:51 +00:00
|
|
|
log.Error().Msg("Failed to create http flusher")
|
|
|
|
|
2023-06-21 09:29:52 +00:00
|
|
|
return
|
2021-08-13 09:33:50 +00:00
|
|
|
}
|
2021-11-14 15:46:09 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
// See comment in keepAliveTicker
|
|
|
|
go func() {
|
2023-09-24 11:42:05 +00:00
|
|
|
err = h.db.UpdateLastSeen(node)
|
2023-09-11 11:18:31 +00:00
|
|
|
if err != nil {
|
2023-09-24 11:42:05 +00:00
|
|
|
logErr(err, "Cannot update node LastSeen")
|
2023-06-21 09:29:52 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
2023-06-21 09:29:52 +00:00
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
log.Info().
|
|
|
|
Caller().
|
|
|
|
Bool("noise", isNoise).
|
|
|
|
Bool("readOnly", mapRequest.ReadOnly).
|
|
|
|
Bool("omitPeers", mapRequest.OmitPeers).
|
|
|
|
Bool("stream", mapRequest.Stream).
|
2023-09-24 11:42:05 +00:00
|
|
|
Str("node_key", node.NodeKey).
|
|
|
|
Str("node", node.Hostname).
|
2023-09-11 11:18:31 +00:00
|
|
|
TimeDiff("timeSpent", time.Now(), now).
|
|
|
|
Msg("update sent")
|
2023-06-21 09:29:52 +00:00
|
|
|
case <-ctx.Done():
|
|
|
|
logInfo("The client has closed the connection")
|
|
|
|
|
2023-09-11 11:18:31 +00:00
|
|
|
go func() {
|
2023-09-24 11:42:05 +00:00
|
|
|
err = h.db.UpdateLastSeen(node)
|
2023-09-11 11:18:31 +00:00
|
|
|
if err != nil {
|
2023-09-24 11:42:05 +00:00
|
|
|
logErr(err, "Cannot update node LastSeen")
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
2021-08-18 22:24:22 +00:00
|
|
|
|
2022-06-20 19:40:28 +00:00
|
|
|
// The connection has been closed, so we can stop polling.
|
|
|
|
return
|
2022-06-23 17:40:07 +00:00
|
|
|
|
|
|
|
case <-h.shutdownChan:
|
2023-06-21 09:29:52 +00:00
|
|
|
logInfo("The long-poll handler is shutting down")
|
2022-06-26 10:06:25 +00:00
|
|
|
|
2022-06-23 17:40:07 +00:00
|
|
|
return
|
2021-08-13 09:33:50 +00:00
|
|
|
}
|
2022-06-20 10:30:51 +00:00
|
|
|
}
|
2021-08-13 09:33:50 +00:00
|
|
|
}
|
2021-08-18 22:24:22 +00:00
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
func closeChanWithLog[C chan []byte | chan struct{} | chan types.StateUpdate](channel C, node, name string) {
|
2022-04-09 22:37:13 +00:00
|
|
|
log.Trace().
|
|
|
|
Str("handler", "PollNetMap").
|
2023-09-24 11:42:05 +00:00
|
|
|
Str("node", node).
|
2022-04-09 22:37:13 +00:00
|
|
|
Str("channel", "Done").
|
|
|
|
Msg(fmt.Sprintf("Closing %s channel", name))
|
|
|
|
|
|
|
|
close(channel)
|
|
|
|
}
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
func (h *Headscale) handleLiteRequest(
|
|
|
|
writer http.ResponseWriter,
|
2023-09-24 11:42:05 +00:00
|
|
|
node *types.Node,
|
2023-09-11 11:18:31 +00:00
|
|
|
mapRequest tailcfg.MapRequest,
|
|
|
|
isNoise bool,
|
|
|
|
) {
|
2023-09-24 11:42:05 +00:00
|
|
|
logInfo, logErr := logPollFunc(mapRequest, node, isNoise)
|
2023-09-11 11:18:31 +00:00
|
|
|
|
|
|
|
mapp := mapper.NewMapper(
|
2023-09-24 11:42:05 +00:00
|
|
|
node,
|
2023-09-11 11:18:31 +00:00
|
|
|
// TODO(kradalby): It might not be acceptable to send
|
|
|
|
// an empty peer list here.
|
2023-09-24 11:42:05 +00:00
|
|
|
types.Nodes{},
|
2023-09-11 11:18:31 +00:00
|
|
|
h.privateKey2019,
|
|
|
|
isNoise,
|
|
|
|
h.DERPMap,
|
|
|
|
h.cfg.BaseDomain,
|
|
|
|
h.cfg.DNSConfig,
|
|
|
|
h.cfg.LogTail.Enabled,
|
|
|
|
h.cfg.RandomizeClientPort,
|
|
|
|
)
|
|
|
|
|
|
|
|
logInfo("Client asked for a lite update, responding without peers")
|
|
|
|
|
2023-09-24 11:42:05 +00:00
|
|
|
mapResp, err := mapp.LiteMapResponse(mapRequest, node, h.ACLPolicy)
|
2023-09-11 11:18:31 +00:00
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Failed to create MapResponse")
|
|
|
|
http.Error(writer, "", http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
writer.Header().Set("Content-Type", "application/json; charset=utf-8")
|
|
|
|
writer.WriteHeader(http.StatusOK)
|
|
|
|
_, err = writer.Write(mapResp)
|
|
|
|
if err != nil {
|
|
|
|
logErr(err, "Failed to write response")
|
|
|
|
}
|
|
|
|
}
|