1
0
mirror of https://github.com/tonarino/innernet.git synced 2024-11-28 08:58:37 +02:00
innernet/shared/src/types.rs
Ryo Kawaguchi 3c69de4e4e
Add a new client / server command to rename CIDR (#310)
* Add a new client / server command to rename CIDR.

* Add a docker test case

* Apply suggestions from code review

Co-authored-by: Matěj Laitl <matej@laitl.cz>
Co-authored-by: Jake McGinty <me@jakebot.org>

---------

Co-authored-by: Matěj Laitl <matej@laitl.cz>
Co-authored-by: Jake McGinty <me@jakebot.org>
2024-04-23 06:12:36 +09:00

996 lines
27 KiB
Rust

use anyhow::{anyhow, Error};
use clap::{
builder::{PossibleValuesParser, TypedValueParser},
Args,
};
use ipnet::IpNet;
use once_cell::sync::Lazy;
use regex::Regex;
use serde::{Deserialize, Serialize};
use std::{
fmt::{self, Display, Formatter},
io,
net::{IpAddr, SocketAddr, ToSocketAddrs},
ops::{Deref, DerefMut},
path::Path,
str::FromStr,
time::{Duration, SystemTime},
vec,
};
use url::Host;
use wireguard_control::{
AllowedIp, Backend, InterfaceName, InvalidInterfaceName, Key, PeerConfig, PeerConfigBuilder,
PeerInfo,
};
use crate::wg::PeerInfoExt;
#[derive(Debug, Clone, PartialEq, Eq)]
pub struct Interface {
name: InterfaceName,
}
impl FromStr for Interface {
type Err = InvalidInterfaceName;
fn from_str(name: &str) -> Result<Self, Self::Err> {
if !Hostname::is_valid(name) {
Err(InvalidInterfaceName::InvalidChars)
} else {
Ok(Self {
name: name.parse()?,
})
}
}
}
impl Deref for Interface {
type Target = InterfaceName;
fn deref(&self) -> &Self::Target {
&self.name
}
}
impl Display for Interface {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
f.write_str(&self.name.to_string())
}
}
#[derive(Clone, Debug, PartialEq, Eq)]
/// An external endpoint that supports both IP and domain name hosts.
pub struct Endpoint {
host: Host,
port: u16,
}
impl From<SocketAddr> for Endpoint {
fn from(addr: SocketAddr) -> Self {
match addr {
SocketAddr::V4(v4addr) => Self {
host: Host::Ipv4(*v4addr.ip()),
port: v4addr.port(),
},
SocketAddr::V6(v6addr) => Self {
host: Host::Ipv6(*v6addr.ip()),
port: v6addr.port(),
},
}
}
}
impl FromStr for Endpoint {
type Err = &'static str;
fn from_str(s: &str) -> Result<Self, Self::Err> {
match s.rsplitn(2, ':').collect::<Vec<&str>>().as_slice() {
[port, host] => {
let port = port.parse().map_err(|_| "couldn't parse port")?;
let host = Host::parse(host).map_err(|_| "couldn't parse host")?;
Ok(Endpoint { host, port })
},
_ => Err("couldn't parse in form of 'host:port'"),
}
}
}
impl Serialize for Endpoint {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
where
S: serde::Serializer,
{
serializer.serialize_str(&self.to_string())
}
}
impl<'de> Deserialize<'de> for Endpoint {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: serde::Deserializer<'de>,
{
struct EndpointVisitor;
impl<'de> serde::de::Visitor<'de> for EndpointVisitor {
type Value = Endpoint;
fn expecting(&self, formatter: &mut fmt::Formatter) -> fmt::Result {
formatter.write_str("a valid host:port endpoint")
}
fn visit_str<E>(self, s: &str) -> Result<Self::Value, E>
where
E: serde::de::Error,
{
s.parse().map_err(serde::de::Error::custom)
}
}
deserializer.deserialize_str(EndpointVisitor)
}
}
impl Display for Endpoint {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
self.host.fmt(f)?;
f.write_str(":")?;
self.port.fmt(f)
}
}
impl Endpoint {
pub fn resolve(&self) -> Result<SocketAddr, io::Error> {
let mut addrs = self.to_string().to_socket_addrs()?;
addrs.next().ok_or_else(|| {
io::Error::new(
io::ErrorKind::AddrNotAvailable,
"failed to resolve address".to_string(),
)
})
}
}
#[derive(Deserialize, Serialize, Debug)]
#[serde(tag = "option", content = "content")]
pub enum EndpointContents {
Set(Endpoint),
Unset,
}
impl From<EndpointContents> for Option<Endpoint> {
fn from(endpoint: EndpointContents) -> Self {
match endpoint {
EndpointContents::Set(addr) => Some(addr),
EndpointContents::Unset => None,
}
}
}
impl From<Option<Endpoint>> for EndpointContents {
fn from(option: Option<Endpoint>) -> Self {
match option {
Some(addr) => Self::Set(addr),
None => Self::Unset,
}
}
}
#[derive(Deserialize, Serialize, Debug)]
pub struct AssociationContents {
pub cidr_id_1: i64,
pub cidr_id_2: i64,
}
#[derive(Deserialize, Serialize, Debug)]
pub struct Association {
pub id: i64,
#[serde(flatten)]
pub contents: AssociationContents,
}
impl Deref for Association {
type Target = AssociationContents;
fn deref(&self) -> &Self::Target {
&self.contents
}
}
#[derive(Clone, Debug, Deserialize, Serialize, PartialEq, PartialOrd, Eq, Ord)]
pub struct CidrContents {
pub name: String,
pub cidr: IpNet,
pub parent: Option<i64>,
}
impl Deref for CidrContents {
type Target = IpNet;
fn deref(&self) -> &Self::Target {
&self.cidr
}
}
#[derive(Clone, Debug, Deserialize, Serialize, PartialEq, PartialOrd, Eq, Ord)]
pub struct Cidr {
pub id: i64,
#[serde(flatten)]
pub contents: CidrContents,
}
impl Display for Cidr {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
write!(f, "{} ({})", self.name, self.cidr)
}
}
impl Deref for Cidr {
type Target = CidrContents;
fn deref(&self) -> &Self::Target {
&self.contents
}
}
#[derive(Clone, PartialEq, PartialOrd, Eq, Ord)]
pub struct CidrTree<'a> {
cidrs: &'a [Cidr],
contents: &'a Cidr,
}
impl<'a> std::ops::Deref for CidrTree<'a> {
type Target = Cidr;
fn deref(&self) -> &Self::Target {
self.contents
}
}
impl<'a> CidrTree<'a> {
pub fn new(cidrs: &'a [Cidr]) -> Self {
let root = cidrs
.iter()
.min_by_key(|c| c.cidr.prefix_len())
.expect("failed to find root CIDR");
Self::with_root(cidrs, root)
}
pub fn with_root(cidrs: &'a [Cidr], root: &'a Cidr) -> Self {
Self {
cidrs,
contents: root,
}
}
pub fn children(&self) -> impl Iterator<Item = CidrTree<'_>> {
self.cidrs
.iter()
.filter(move |c| c.parent == Some(self.contents.id))
.map(move |c| CidrTree {
cidrs: self.cidrs,
contents: c,
})
}
pub fn leaves(&self) -> Vec<Cidr> {
if !self.cidrs.iter().any(|cidr| cidr.parent == Some(self.id)) {
vec![self.contents.clone()]
} else {
self.children().flat_map(|child| child.leaves()).collect()
}
}
}
#[derive(Debug, Clone, Deserialize, Serialize, PartialEq, Eq)]
pub struct RedeemContents {
pub public_key: String,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct InstallOpts {
/// Set a specific interface name
#[clap(long, conflicts_with = "default_name")]
pub name: Option<String>,
/// Use the network name inside the invitation as the interface name
#[clap(long = "default-name")]
pub default_name: bool,
/// Delete the invitation after a successful install
#[clap(short, long)]
pub delete_invite: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct AddPeerOpts {
/// Name of new peer
#[clap(long)]
pub name: Option<Hostname>,
/// Specify desired IP of new peer (within parent CIDR)
#[clap(long, conflicts_with = "auto_ip")]
pub ip: Option<IpAddr>,
/// Auto-assign the peer the first available IP within the CIDR
#[clap(long = "auto-ip")]
pub auto_ip: bool,
/// Name of CIDR to add new peer under
#[clap(long)]
pub cidr: Option<String>,
/// Make new peer an admin?
#[clap(long)]
pub admin: Option<bool>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
/// Save the config to the given location
#[clap(long)]
pub save_config: Option<String>,
/// Invite expiration period (eg. '30d', '7w', '2h', '60m', '1000s')
#[clap(long)]
pub invite_expires: Option<Timestring>,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct RenamePeerOpts {
/// Name of peer to rename
#[clap(long)]
pub name: Option<Hostname>,
/// The new name of the peer
#[clap(long)]
pub new_name: Option<Hostname>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct EnableDisablePeerOpts {
/// Name of peer to enable/disable
#[clap(long)]
pub name: Option<Hostname>,
/// Bypass confirmation
#[clap(long, requires("name"))]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct AddCidrOpts {
/// The CIDR name (eg. 'engineers')
#[clap(long)]
pub name: Option<Hostname>,
/// The CIDR network (eg. '10.42.5.0/24')
#[clap(long)]
pub cidr: Option<IpNet>,
/// The CIDR parent name
#[clap(long)]
pub parent: Option<String>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct RenameCidrOpts {
/// Name of CIDR to rename
#[clap(long)]
pub name: Option<String>,
/// The new name of the CIDR
#[clap(long)]
pub new_name: Option<String>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct DeleteCidrOpts {
/// The CIDR name (eg. 'engineers')
#[clap(long)]
pub name: Option<String>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct AddDeleteAssociationOpts {
/// The first cidr to associate
pub cidr1: Option<String>,
/// The second cidr to associate
pub cidr2: Option<String>,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct ListenPortOpts {
/// The listen port you'd like to set for the interface
#[clap(short, long)]
pub listen_port: Option<u16>,
/// Unset the local listen port to use a randomized port
#[clap(short, long, conflicts_with = "listen_port")]
pub unset: bool,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, PartialEq, Eq, Args)]
pub struct OverrideEndpointOpts {
/// The listen port you'd like to set for the interface
#[clap(short, long)]
pub endpoint: Option<Endpoint>,
/// Unset an existing override to use the automatic endpoint discovery
#[clap(short, long, conflicts_with = "endpoint")]
pub unset: bool,
/// Bypass confirmation
#[clap(long)]
pub yes: bool,
}
#[derive(Debug, Clone, Args)]
pub struct NatOpts {
#[clap(long)]
/// Don't attempt NAT traversal. Note that this still will report candidates
/// unless you also specify to exclude all NAT candidates.
pub no_nat_traversal: bool,
#[clap(long)]
/// Exclude one or more CIDRs from NAT candidate reporting.
/// ex. --exclude-nat-candidates '0.0.0.0/0' would report no candidates.
pub exclude_nat_candidates: Vec<IpNet>,
#[clap(long, conflicts_with = "exclude_nat_candidates")]
/// Don't report any candidates to coordinating server.
/// Shorthand for --exclude-nat-candidates '0.0.0.0/0'.
pub no_nat_candidates: bool,
}
impl NatOpts {
pub fn all_disabled() -> Self {
Self {
no_nat_traversal: true,
exclude_nat_candidates: vec![],
no_nat_candidates: true,
}
}
/// Check if an IP is allowed to be reported as a candidate.
pub fn is_excluded(&self, ip: IpAddr) -> bool {
self.no_nat_candidates
|| self
.exclude_nat_candidates
.iter()
.any(|network| network.contains(&ip))
}
}
#[derive(Debug, Clone, Copy, Args)]
pub struct NetworkOpts {
#[clap(long)]
/// Whether the routing should be done by innernet or is done by an
/// external tool like e.g. babeld.
pub no_routing: bool,
#[clap(long, default_value_t, value_parser = PossibleValuesParser::new(Backend::variants()).map(|s| s.parse::<Backend>().unwrap()))]
/// Specify a WireGuard backend to use.
/// If not set, innernet will auto-select based on availability.
pub backend: Backend,
#[clap(long)]
/// Specify the desired MTU for your interface (default: 1280).
pub mtu: Option<u32>,
}
#[derive(Debug, Clone, Deserialize, Serialize, PartialEq, Eq)]
pub struct PeerContents {
pub name: Hostname,
pub ip: IpAddr,
pub cidr_id: i64,
pub public_key: String,
pub endpoint: Option<Endpoint>,
pub persistent_keepalive_interval: Option<u16>,
pub is_admin: bool,
pub is_disabled: bool,
pub is_redeemed: bool,
pub invite_expires: Option<SystemTime>,
#[serde(default)]
pub candidates: Vec<Endpoint>,
}
#[derive(Debug, Clone, Deserialize, Serialize, PartialEq, Eq)]
pub struct Peer {
pub id: i64,
#[serde(flatten)]
pub contents: PeerContents,
}
impl Deref for Peer {
type Target = PeerContents;
fn deref(&self) -> &Self::Target {
&self.contents
}
}
impl DerefMut for Peer {
fn deref_mut(&mut self) -> &mut Self::Target {
&mut self.contents
}
}
impl Display for Peer {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "{} ({})", &self.name, &self.public_key)
}
}
#[derive(Debug, Clone, PartialEq, Eq)]
pub enum PeerChange {
AllowedIPs {
old: Vec<AllowedIp>,
new: Vec<AllowedIp>,
},
PersistentKeepalive {
old: Option<u16>,
new: Option<u16>,
},
Endpoint {
old: Option<SocketAddr>,
new: Option<SocketAddr>,
},
NatTraverseReattempt,
}
impl Display for PeerChange {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
match self {
Self::AllowedIPs { old, new } => write!(f, "Allowed IPs: {:?} => {:?}", old, new),
Self::PersistentKeepalive { old, new } => write!(
f,
"Persistent Keepalive: {} => {}",
old.display_string(),
new.display_string()
),
Self::Endpoint { old, new } => write!(
f,
"Endpoint: {} => {}",
old.display_string(),
new.display_string()
),
Self::NatTraverseReattempt => write!(f, "NAT Traversal Reattempt"),
}
}
}
trait OptionExt {
fn display_string(&self) -> String;
}
impl<T: std::fmt::Debug> OptionExt for Option<T> {
fn display_string(&self) -> String {
match self {
Some(x) => {
format!("{:?}", x)
},
None => "[none]".to_string(),
}
}
}
/// Encompasses the logic for comparing the peer configuration currently on the WireGuard interface
/// to a (potentially) more current peer configuration from the innernet server.
#[derive(Clone, Debug, PartialEq, Eq)]
pub struct PeerDiff<'a> {
pub old: Option<&'a PeerConfig>,
pub new: Option<&'a Peer>,
builder: PeerConfigBuilder,
changes: Vec<PeerChange>,
}
impl<'a> PeerDiff<'a> {
pub fn new(
old_info: Option<&'a PeerInfo>,
new: Option<&'a Peer>,
) -> Result<Option<Self>, Error> {
let old = old_info.map(|p| &p.config);
match (old_info, new) {
(Some(old), Some(new)) if old.config.public_key.to_base64() != new.public_key => Err(
anyhow!("old and new peer configs have different public keys"),
),
(None, None) => Ok(None),
_ => Ok(
Self::peer_config_builder(old_info, new).map(|(builder, changes)| Self {
old,
new,
builder,
changes,
}),
),
}
}
pub fn public_key(&self) -> &Key {
self.builder.public_key()
}
pub fn changes(&self) -> &[PeerChange] {
&self.changes
}
fn peer_config_builder(
old_info: Option<&PeerInfo>,
new: Option<&Peer>,
) -> Option<(PeerConfigBuilder, Vec<PeerChange>)> {
let old = old_info.map(|p| &p.config);
let public_key = match (old, new) {
(Some(old), _) => old.public_key.clone(),
(_, Some(new)) => Key::from_base64(&new.public_key).unwrap(),
_ => return None,
};
let mut builder = PeerConfigBuilder::new(&public_key);
let mut changes = vec![];
// Remove peer from interface if they're deleted or disabled, and we can return early.
if new.is_none() || matches!(new, Some(new) if new.is_disabled) {
return Some((builder.remove(), changes));
}
// diff.new is now guaranteed to be a Some(_) variant.
let new = new.unwrap();
let new_allowed_ips = &[AllowedIp {
address: new.ip,
cidr: if new.ip.is_ipv4() { 32 } else { 128 },
}];
if old.is_none() || matches!(old, Some(old) if old.allowed_ips != new_allowed_ips) {
builder = builder
.replace_allowed_ips()
.add_allowed_ips(new_allowed_ips);
changes.push(PeerChange::AllowedIPs {
old: old.map(|o| o.allowed_ips.clone()).unwrap_or_default(),
new: new_allowed_ips.to_vec(),
});
}
if old.is_none()
|| matches!(old, Some(old) if old.persistent_keepalive_interval != new.persistent_keepalive_interval)
{
builder = match new.persistent_keepalive_interval {
Some(interval) => builder.set_persistent_keepalive_interval(interval),
None => builder.unset_persistent_keepalive(),
};
changes.push(PeerChange::PersistentKeepalive {
old: old.and_then(|p| p.persistent_keepalive_interval),
new: new.persistent_keepalive_interval,
});
}
// We won't update the endpoint if there's already a stable connection.
if !old_info
.map(|info| info.is_recently_connected())
.unwrap_or_default()
{
let mut endpoint_changed = false;
let resolved = new.endpoint.as_ref().and_then(|e| e.resolve().ok());
if let Some(addr) = resolved {
if old.is_none() || matches!(old, Some(old) if old.endpoint != resolved) {
builder = builder.set_endpoint(addr);
changes.push(PeerChange::Endpoint {
old: old.and_then(|p| p.endpoint),
new: Some(addr),
});
endpoint_changed = true;
}
}
if !endpoint_changed && !new.candidates.is_empty() {
changes.push(PeerChange::NatTraverseReattempt)
}
}
if !changes.is_empty() {
Some((builder, changes))
} else {
None
}
}
}
impl<'a> From<&'a Peer> for PeerConfigBuilder {
fn from(peer: &Peer) -> Self {
PeerDiff::new(None, Some(peer))
.expect("No Err on explicitly set peer data")
.expect("None -> Some(peer) will always create a PeerDiff")
.into()
}
}
impl<'a> From<PeerDiff<'a>> for PeerConfigBuilder {
/// Turn a PeerDiff into a minimal set of instructions to update the WireGuard interface,
/// hopefully minimizing dropped packets and other interruptions.
fn from(diff: PeerDiff) -> Self {
diff.builder
}
}
/// This model is sent as a response to the /state endpoint, and is meant
/// to include all the data a client needs to update its WireGuard interface.
#[derive(Debug, Clone, Deserialize, Serialize)]
pub struct State {
/// This list will be only the peers visible to the user requesting this
/// information, not including disabled peers or peers from other CIDRs
/// that the user's CIDR is not authorized to communicate with.
pub peers: Vec<Peer>,
/// At the moment, this is all CIDRs, regardless of whether the peer is
/// eligible to communicate with them or not.
pub cidrs: Vec<Cidr>,
}
#[derive(Clone, Debug, PartialEq, Eq)]
pub struct Timestring {
timestring: String,
seconds: u64,
}
impl Display for Timestring {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.write_str(&self.timestring)
}
}
impl FromStr for Timestring {
type Err = &'static str;
fn from_str(timestring: &str) -> Result<Self, Self::Err> {
if timestring.len() < 2 {
Err("timestring isn't long enough!")
} else {
let (n, suffix) = timestring.split_at(timestring.len() - 1);
let n: u64 = n.parse().map_err(|_| {
"invalid timestring (a number followed by a time unit character, eg. '15m')"
})?;
let multiplier = match suffix {
"s" => Ok(1),
"m" => Ok(60),
"h" => Ok(60 * 60),
"d" => Ok(60 * 60 * 24),
"w" => Ok(60 * 60 * 24 * 7),
_ => Err("invalid timestring suffix (must be one of 's', 'm', 'h', 'd', or 'w')"),
}?;
Ok(Self {
timestring: timestring.to_string(),
seconds: n * multiplier,
})
}
}
}
impl From<Timestring> for Duration {
fn from(timestring: Timestring) -> Self {
Duration::from_secs(timestring.seconds)
}
}
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
pub struct Hostname(String);
/// Regex to match the requirements of hostname(7), needed to have peers also be reachable hostnames.
/// Note that the full length also must be maximum 63 characters, which this regex does not check.
static HOSTNAME_REGEX: Lazy<Regex> = Lazy::new(|| Regex::new(r"^([a-z0-9]-?)*[a-z0-9]$").unwrap());
impl Hostname {
pub fn is_valid(name: &str) -> bool {
name.len() < 64 && HOSTNAME_REGEX.is_match(name)
}
}
impl FromStr for Hostname {
type Err = &'static str;
fn from_str(name: &str) -> Result<Self, Self::Err> {
if Self::is_valid(name) {
Ok(Self(name.to_string()))
} else {
Err("invalid hostname string (only alphanumeric with dashes)")
}
}
}
impl Deref for Hostname {
type Target = str;
fn deref(&self) -> &Self::Target {
&self.0
}
}
impl Display for Hostname {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
f.write_str(&self.0)
}
}
pub trait IoErrorContext<T> {
fn with_path<P: AsRef<Path>>(self, path: P) -> Result<T, WrappedIoError>;
fn with_str<S: Into<String>>(self, context: S) -> Result<T, WrappedIoError>;
}
impl<T> IoErrorContext<T> for Result<T, std::io::Error> {
fn with_path<P: AsRef<Path>>(self, path: P) -> Result<T, WrappedIoError> {
self.with_str(path.as_ref().to_string_lossy())
}
fn with_str<S: Into<String>>(self, context: S) -> Result<T, WrappedIoError> {
self.map_err(|e| WrappedIoError {
io_error: e,
context: context.into(),
})
}
}
#[derive(Debug)]
pub struct WrappedIoError {
io_error: std::io::Error,
context: String,
}
impl Display for WrappedIoError {
fn fmt(&self, f: &mut Formatter<'_>) -> std::result::Result<(), std::fmt::Error> {
write!(f, "{} - {}", self.context, self.io_error)
}
}
impl Deref for WrappedIoError {
type Target = std::io::Error;
fn deref(&self) -> &Self::Target {
&self.io_error
}
}
impl std::error::Error for WrappedIoError {}
#[cfg(test)]
mod tests {
use super::*;
use std::net::IpAddr;
use wireguard_control::{Key, PeerConfigBuilder, PeerStats};
#[test]
fn test_peer_no_diff() {
const PUBKEY: &str = "4CNZorWVtohO64n6AAaH/JyFjIIgBFrfJK2SGtKjzEE=";
let ip: IpAddr = "10.0.0.1".parse().unwrap();
let peer = Peer {
id: 1,
contents: PeerContents {
name: "peer1".parse().unwrap(),
ip,
cidr_id: 1,
public_key: PUBKEY.to_owned(),
endpoint: None,
persistent_keepalive_interval: None,
is_admin: false,
is_disabled: false,
is_redeemed: true,
invite_expires: None,
candidates: vec![],
},
};
let builder =
PeerConfigBuilder::new(&Key::from_base64(PUBKEY).unwrap()).add_allowed_ip(ip, 32);
let config = builder.into_peer_config();
let info = PeerInfo {
config,
stats: Default::default(),
};
let diff = PeerDiff::new(Some(&info), Some(&peer)).unwrap();
println!("{diff:?}");
assert_eq!(diff, None);
}
#[test]
fn test_peer_diff() {
const PUBKEY: &str = "4CNZorWVtohO64n6AAaH/JyFjIIgBFrfJK2SGtKjzEE=";
let ip: IpAddr = "10.0.0.1".parse().unwrap();
let peer = Peer {
id: 1,
contents: PeerContents {
name: "peer1".parse().unwrap(),
ip,
cidr_id: 1,
public_key: PUBKEY.to_owned(),
endpoint: None,
persistent_keepalive_interval: Some(15),
is_admin: false,
is_disabled: false,
is_redeemed: true,
invite_expires: None,
candidates: vec![],
},
};
let builder =
PeerConfigBuilder::new(&Key::from_base64(PUBKEY).unwrap()).add_allowed_ip(ip, 32);
let config = builder.into_peer_config();
let info = PeerInfo {
config,
stats: Default::default(),
};
let diff = PeerDiff::new(Some(&info), Some(&peer)).unwrap();
println!("{peer:?}");
println!("{:?}", info.config);
assert!(diff.is_some());
}
#[test]
fn test_peer_diff_handshake_time() {
const PUBKEY: &str = "4CNZorWVtohO64n6AAaH/JyFjIIgBFrfJK2SGtKjzEE=";
let ip: IpAddr = "10.0.0.1".parse().unwrap();
let peer = Peer {
id: 1,
contents: PeerContents {
name: "peer1".parse().unwrap(),
ip,
cidr_id: 1,
public_key: PUBKEY.to_owned(),
endpoint: Some("1.1.1.1:1111".parse().unwrap()),
persistent_keepalive_interval: None,
is_admin: false,
is_disabled: false,
is_redeemed: true,
invite_expires: None,
candidates: vec![],
},
};
let builder =
PeerConfigBuilder::new(&Key::from_base64(PUBKEY).unwrap()).add_allowed_ip(ip, 32);
let config = builder.into_peer_config();
let mut info = PeerInfo {
config,
stats: PeerStats {
last_handshake_time: Some(SystemTime::now() - Duration::from_secs(200)),
..Default::default()
},
};
// If there hasn't been a recent handshake, endpoint should be being set.
assert!(matches!(
PeerDiff::new(Some(&info), Some(&peer)),
Ok(Some(_))
));
// If there *has* been a recent handshake, endpoint should *not* be being set.
info.stats.last_handshake_time = Some(SystemTime::now());
assert!(matches!(PeerDiff::new(Some(&info), Some(&peer)), Ok(None)));
}
}