headscale/hscontrol/poll.go

475 lines
12 KiB
Go
Raw Normal View History

package hscontrol
import (
"context"
"fmt"
"net/http"
"time"
"github.com/juanfont/headscale/hscontrol/mapper"
"github.com/juanfont/headscale/hscontrol/types"
"github.com/juanfont/headscale/hscontrol/util"
"github.com/rs/zerolog/log"
"tailscale.com/tailcfg"
)
const (
keepAliveInterval = 60 * time.Second
)
2022-05-16 12:59:46 +00:00
type contextKey string
2023-09-24 11:42:05 +00:00
const nodeNameContextKey = contextKey("nodeName")
2022-05-16 12:59:46 +00:00
type UpdateNode func()
func logPollFunc(
mapRequest tailcfg.MapRequest,
2023-09-24 11:42:05 +00:00
node *types.Node,
isNoise bool,
) (func(string), func(error, string)) {
return func(msg string) {
log.Info().
Caller().
Bool("noise", isNoise).
Bool("readOnly", mapRequest.ReadOnly).
Bool("omitPeers", mapRequest.OmitPeers).
Bool("stream", mapRequest.Stream).
2023-09-24 11:42:05 +00:00
Str("node_key", node.NodeKey).
Str("node", node.Hostname).
Msg(msg)
},
func(err error, msg string) {
log.Error().
Caller().
Bool("noise", isNoise).
Bool("readOnly", mapRequest.ReadOnly).
Bool("omitPeers", mapRequest.OmitPeers).
Bool("stream", mapRequest.Stream).
2023-09-24 11:42:05 +00:00
Str("node_key", node.NodeKey).
Str("node", node.Hostname).
Err(err).
Msg(msg)
}
}
// handlePoll is the common code for the legacy and Noise protocols to
2022-08-15 08:43:39 +00:00
// managed the poll loop.
//
//nolint:gocyclo
func (h *Headscale) handlePoll(
2022-06-26 10:06:25 +00:00
writer http.ResponseWriter,
ctx context.Context,
2023-09-24 11:42:05 +00:00
node *types.Node,
mapRequest tailcfg.MapRequest,
isNoise bool,
2022-06-20 10:30:51 +00:00
) {
2023-09-24 11:42:05 +00:00
logInfo, logErr := logPollFunc(mapRequest, node, isNoise)
// This is the mechanism where the node gives us inforamtion about its
// current configuration.
//
// If OmitPeers is true, Stream is false, and ReadOnly is false,
// then te server will let clients update their endpoints without
// breaking existing long-polling (Stream == true) connections.
// In this case, the server can omit the entire response; the client
// only checks the HTTP response status code.
if mapRequest.OmitPeers && !mapRequest.Stream && !mapRequest.ReadOnly {
log.Info().
Caller().
Bool("noise", isNoise).
Bool("readOnly", mapRequest.ReadOnly).
Bool("omitPeers", mapRequest.OmitPeers).
Bool("stream", mapRequest.Stream).
2023-09-24 11:42:05 +00:00
Str("node_key", node.NodeKey).
Str("node", node.Hostname).
Strs("endpoints", node.Endpoints).
Msg("Received endpoint update")
now := time.Now().UTC()
2023-09-24 11:42:05 +00:00
node.LastSeen = &now
node.Hostname = mapRequest.Hostinfo.Hostname
node.HostInfo = types.HostInfo(*mapRequest.Hostinfo)
node.DiscoKey = util.DiscoPublicKeyStripPrefix(mapRequest.DiscoKey)
node.Endpoints = mapRequest.Endpoints
if err := h.db.NodeSave(node); err != nil {
logErr(err, "Failed to persist/update node in the database")
http.Error(writer, "", http.StatusInternalServerError)
return
}
2023-09-24 11:42:05 +00:00
err := h.db.SaveNodeRoutes(node)
if err != nil {
2023-09-24 11:42:05 +00:00
logErr(err, "Error processing node routes")
http.Error(writer, "", http.StatusInternalServerError)
return
}
h.nodeNotifier.NotifyWithIgnore(
types.StateUpdate{
Type: types.StatePeerChanged,
2023-09-24 11:42:05 +00:00
Changed: types.Nodes{node},
},
2023-09-24 11:42:05 +00:00
node.MachineKey)
writer.WriteHeader(http.StatusOK)
if f, ok := writer.(http.Flusher); ok {
f.Flush()
}
return
// ReadOnly is whether the client just wants to fetch the
// MapResponse, without updating their Endpoints. The
// Endpoints field will be ignored and LastSeen will not be
// updated and peers will not be notified of changes.
//
// The intended use is for clients to discover the DERP map at
// start-up before their first real endpoint update.
} else if mapRequest.OmitPeers && !mapRequest.Stream && mapRequest.ReadOnly {
2023-09-24 11:42:05 +00:00
h.handleLiteRequest(writer, node, mapRequest, isNoise)
return
} else if mapRequest.OmitPeers && mapRequest.Stream {
logErr(nil, "Ignoring request, don't know how to handle it")
return
}
// Handle requests not related to continouos updates immediately.
// TODO(kradalby): I am not sure if this has any function based on
// incoming requests from clients.
if mapRequest.ReadOnly && !mapRequest.Stream {
2023-09-24 11:42:05 +00:00
h.handleReadOnly(writer, node, mapRequest, isNoise)
return
}
now := time.Now().UTC()
2023-09-24 11:42:05 +00:00
node.LastSeen = &now
node.Hostname = mapRequest.Hostinfo.Hostname
node.HostInfo = types.HostInfo(*mapRequest.Hostinfo)
node.DiscoKey = util.DiscoPublicKeyStripPrefix(mapRequest.DiscoKey)
node.Endpoints = mapRequest.Endpoints
// When a node connects to control, list the peers it has at
// that given point, further updates are kept in memory in
// the Mapper, which lives for the duration of the polling
// session.
2023-09-24 11:42:05 +00:00
peers, err := h.db.ListPeers(node)
if err != nil {
logErr(err, "Failed to list peers when opening poller")
http.Error(writer, "", http.StatusInternalServerError)
return
}
mapp := mapper.NewMapper(
2023-09-24 11:42:05 +00:00
node,
peers,
h.privateKey2019,
isNoise,
h.DERPMap,
h.cfg.BaseDomain,
h.cfg.DNSConfig,
h.cfg.LogTail.Enabled,
h.cfg.RandomizeClientPort,
)
2023-09-24 11:42:05 +00:00
err = h.db.SaveNodeRoutes(node)
if err != nil {
2023-09-24 11:42:05 +00:00
logErr(err, "Error processing node routes")
}
// update ACLRules with peer informations (to update server tags if necessary)
if h.ACLPolicy != nil {
// update routes with peer information
2023-09-24 11:42:05 +00:00
err = h.db.EnableAutoApprovedRoutes(h.ACLPolicy, node)
if err != nil {
logErr(err, "Error running auto approved routes")
}
}
// TODO(kradalby): Save specific stuff, not whole object.
2023-09-24 11:42:05 +00:00
if err := h.db.NodeSave(node); err != nil {
logErr(err, "Failed to persist/update node in the database")
http.Error(writer, "", http.StatusInternalServerError)
2022-05-30 13:39:24 +00:00
return
2022-05-30 13:39:24 +00:00
}
logInfo("Sending initial map")
2023-09-24 11:42:05 +00:00
mapResp, err := mapp.FullMapResponse(mapRequest, node, h.ACLPolicy)
if err != nil {
logErr(err, "Failed to create MapResponse")
http.Error(writer, "", http.StatusInternalServerError)
return
}
// Send the client an update to make sure we send an initial mapresponse
_, err = writer.Write(mapResp)
if err != nil {
logErr(err, "Could not write the map response")
return
}
if flusher, ok := writer.(http.Flusher); ok {
flusher.Flush()
} else {
return
}
h.nodeNotifier.NotifyWithIgnore(
types.StateUpdate{
Type: types.StatePeerChanged,
2023-09-24 11:42:05 +00:00
Changed: types.Nodes{node},
},
2023-09-24 11:42:05 +00:00
node.MachineKey)
// Set up the client stream
h.pollNetMapStreamWG.Add(1)
defer h.pollNetMapStreamWG.Done()
updateChan := make(chan types.StateUpdate)
2023-09-24 11:42:05 +00:00
defer closeChanWithLog(updateChan, node.Hostname, "updateChan")
// Register the node's update channel
2023-09-24 11:42:05 +00:00
h.nodeNotifier.AddNode(node.MachineKey, updateChan)
defer h.nodeNotifier.RemoveNode(node.MachineKey)
keepAliveTicker := time.NewTicker(keepAliveInterval)
2023-09-24 11:42:05 +00:00
ctx = context.WithValue(ctx, nodeNameContextKey, node.Hostname)
2022-06-20 10:30:51 +00:00
ctx, cancel := context.WithCancel(ctx)
defer cancel()
2022-06-20 19:40:28 +00:00
for {
logInfo("Waiting for update on stream channel")
select {
case <-keepAliveTicker.C:
2023-09-24 11:42:05 +00:00
data, err := mapp.KeepAliveResponse(mapRequest, node)
if err != nil {
logErr(err, "Error generating the keep alive msg")
2021-11-14 15:46:09 +00:00
2022-06-20 19:40:28 +00:00
return
}
_, err = writer.Write(data)
if err != nil {
logErr(err, "Cannot write keep alive message")
2022-06-26 10:25:26 +00:00
return
2022-06-26 10:25:26 +00:00
}
if flusher, ok := writer.(http.Flusher); ok {
flusher.Flush()
} else {
log.Error().Msg("Failed to create http flusher")
2022-06-20 19:40:28 +00:00
return
}
// This goroutine is not ideal, but we have a potential issue here
// where it blocks too long and that holds up updates.
// One alternative is to split these different channels into
// goroutines, but then you might have a problem without a lock
// if a keepalive is written at the same time as an update.
go func() {
2023-09-24 11:42:05 +00:00
err = h.db.UpdateLastSeen(node)
if err != nil {
2023-09-24 11:42:05 +00:00
logErr(err, "Cannot update node LastSeen")
2022-06-20 19:40:28 +00:00
return
}
}()
2021-11-14 15:46:09 +00:00
case update := <-updateChan:
logInfo("Received update")
now := time.Now()
var data []byte
var err error
switch update.Type {
case types.StatePeerChanged:
logInfo("Sending PeerChanged MapResponse")
2023-09-24 11:42:05 +00:00
data, err = mapp.PeerChangedResponse(mapRequest, node, update.Changed, h.ACLPolicy)
case types.StatePeerRemoved:
logInfo("Sending PeerRemoved MapResponse")
2023-09-24 11:42:05 +00:00
data, err = mapp.PeerRemovedResponse(mapRequest, node, update.Removed)
case types.StateDERPUpdated:
logInfo("Sending DERPUpdate MapResponse")
2023-09-24 11:42:05 +00:00
data, err = mapp.DERPMapResponse(mapRequest, node, update.DERPMap)
case types.StateFullUpdate:
logInfo("Sending Full MapResponse")
2023-09-24 11:42:05 +00:00
data, err = mapp.FullMapResponse(mapRequest, node, h.ACLPolicy)
}
if err != nil {
logErr(err, "Could not get the create map update")
2021-11-14 15:46:09 +00:00
2022-06-20 19:40:28 +00:00
return
}
2022-06-20 19:40:28 +00:00
_, err = writer.Write(data)
if err != nil {
logErr(err, "Could not write the map response")
2023-09-24 11:42:05 +00:00
updateRequestsSentToNode.WithLabelValues(node.User.Name, node.Hostname, "failed").
Inc()
2022-06-20 19:40:28 +00:00
return
}
2021-11-14 15:46:09 +00:00
if flusher, ok := writer.(http.Flusher); ok {
flusher.Flush()
} else {
log.Error().Msg("Failed to create http flusher")
return
}
2021-11-14 15:46:09 +00:00
// See comment in keepAliveTicker
go func() {
2023-09-24 11:42:05 +00:00
err = h.db.UpdateLastSeen(node)
if err != nil {
2023-09-24 11:42:05 +00:00
logErr(err, "Cannot update node LastSeen")
return
}
}()
log.Info().
Caller().
Bool("noise", isNoise).
Bool("readOnly", mapRequest.ReadOnly).
Bool("omitPeers", mapRequest.OmitPeers).
Bool("stream", mapRequest.Stream).
2023-09-24 11:42:05 +00:00
Str("node_key", node.NodeKey).
Str("node", node.Hostname).
TimeDiff("timeSpent", time.Now(), now).
Msg("update sent")
case <-ctx.Done():
logInfo("The client has closed the connection")
go func() {
2023-09-24 11:42:05 +00:00
err = h.db.UpdateLastSeen(node)
if err != nil {
2023-09-24 11:42:05 +00:00
logErr(err, "Cannot update node LastSeen")
return
}
}()
2022-06-20 19:40:28 +00:00
// The connection has been closed, so we can stop polling.
return
case <-h.shutdownChan:
logInfo("The long-poll handler is shutting down")
2022-06-26 10:06:25 +00:00
return
}
2022-06-20 10:30:51 +00:00
}
}
2023-09-24 11:42:05 +00:00
func closeChanWithLog[C chan []byte | chan struct{} | chan types.StateUpdate](channel C, node, name string) {
log.Trace().
Str("handler", "PollNetMap").
2023-09-24 11:42:05 +00:00
Str("node", node).
Str("channel", "Done").
Msg(fmt.Sprintf("Closing %s channel", name))
close(channel)
}
// TODO(kradalby): This might not actually be used,
// observing incoming client requests indicates it
// is not.
func (h *Headscale) handleReadOnly(
writer http.ResponseWriter,
2023-09-24 11:42:05 +00:00
node *types.Node,
mapRequest tailcfg.MapRequest,
isNoise bool,
) {
2023-09-24 11:42:05 +00:00
logInfo, logErr := logPollFunc(mapRequest, node, isNoise)
mapp := mapper.NewMapper(
2023-09-24 11:42:05 +00:00
node,
// TODO(kradalby): It might not be acceptable to send
// an empty peer list here.
2023-09-24 11:42:05 +00:00
types.Nodes{},
h.privateKey2019,
isNoise,
h.DERPMap,
h.cfg.BaseDomain,
h.cfg.DNSConfig,
h.cfg.LogTail.Enabled,
h.cfg.RandomizeClientPort,
)
logInfo("Client is starting up. Probably interested in a DERP map")
2023-09-24 11:42:05 +00:00
mapResp, err := mapp.FullMapResponse(mapRequest, node, h.ACLPolicy)
if err != nil {
logErr(err, "Failed to create MapResponse")
http.Error(writer, "", http.StatusInternalServerError)
return
}
writer.Header().Set("Content-Type", "application/json; charset=utf-8")
writer.WriteHeader(http.StatusOK)
_, err = writer.Write(mapResp)
if err != nil {
logErr(err, "Failed to write response")
}
if f, ok := writer.(http.Flusher); ok {
f.Flush()
}
}
func (h *Headscale) handleLiteRequest(
writer http.ResponseWriter,
2023-09-24 11:42:05 +00:00
node *types.Node,
mapRequest tailcfg.MapRequest,
isNoise bool,
) {
2023-09-24 11:42:05 +00:00
logInfo, logErr := logPollFunc(mapRequest, node, isNoise)
mapp := mapper.NewMapper(
2023-09-24 11:42:05 +00:00
node,
// TODO(kradalby): It might not be acceptable to send
// an empty peer list here.
2023-09-24 11:42:05 +00:00
types.Nodes{},
h.privateKey2019,
isNoise,
h.DERPMap,
h.cfg.BaseDomain,
h.cfg.DNSConfig,
h.cfg.LogTail.Enabled,
h.cfg.RandomizeClientPort,
)
logInfo("Client asked for a lite update, responding without peers")
2023-09-24 11:42:05 +00:00
mapResp, err := mapp.LiteMapResponse(mapRequest, node, h.ACLPolicy)
if err != nil {
logErr(err, "Failed to create MapResponse")
http.Error(writer, "", http.StatusInternalServerError)
return
}
writer.Header().Set("Content-Type", "application/json; charset=utf-8")
writer.WriteHeader(http.StatusOK)
_, err = writer.Write(mapResp)
if err != nil {
logErr(err, "Failed to write response")
}
}