mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-21 23:53:14 +01:00
0c039274a4
This update adds new relay integration for NetBird clients. The new relay is based on web sockets and listens on a single port. - Adds new relay implementation with websocket with single port relaying mechanism - refactor peer connection logic, allowing upgrade and downgrade from/to P2P connection - peer connections are faster since it connects first to relay and then upgrades to P2P - maintains compatibility with old clients by not using the new relay - updates infrastructure scripts with new relay service
215 lines
7.0 KiB
Go
215 lines
7.0 KiB
Go
package cmd
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"os/signal"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/hashicorp/go-multierror"
|
|
log "github.com/sirupsen/logrus"
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/netbirdio/netbird/encryption"
|
|
auth "github.com/netbirdio/netbird/relay/auth/hmac"
|
|
"github.com/netbirdio/netbird/relay/server"
|
|
"github.com/netbirdio/netbird/signal/metrics"
|
|
"github.com/netbirdio/netbird/util"
|
|
)
|
|
|
|
const (
|
|
metricsPort = 9090
|
|
)
|
|
|
|
type Config struct {
|
|
ListenAddress string
|
|
// in HA every peer connect to a common domain, the instance domain has been distributed during the p2p connection
|
|
// it is a domain:port or ip:port
|
|
ExposedAddress string
|
|
LetsencryptEmail string
|
|
LetsencryptDataDir string
|
|
LetsencryptDomains []string
|
|
// in case of using Route 53 for DNS challenge the credentials should be provided in the environment variables or
|
|
// in the AWS credentials file
|
|
LetsencryptAWSRoute53 bool
|
|
TlsCertFile string
|
|
TlsKeyFile string
|
|
AuthSecret string
|
|
LogLevel string
|
|
LogFile string
|
|
}
|
|
|
|
func (c Config) Validate() error {
|
|
if c.ExposedAddress == "" {
|
|
return fmt.Errorf("exposed address is required")
|
|
}
|
|
if c.AuthSecret == "" {
|
|
return fmt.Errorf("auth secret is required")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c Config) HasCertConfig() bool {
|
|
return c.TlsCertFile != "" && c.TlsKeyFile != ""
|
|
}
|
|
|
|
func (c Config) HasLetsEncrypt() bool {
|
|
return c.LetsencryptDataDir != "" && c.LetsencryptDomains != nil && len(c.LetsencryptDomains) > 0
|
|
}
|
|
|
|
var (
|
|
cobraConfig *Config
|
|
rootCmd = &cobra.Command{
|
|
Use: "relay",
|
|
Short: "Relay service",
|
|
Long: "Relay service for Netbird agents",
|
|
SilenceUsage: true,
|
|
SilenceErrors: true,
|
|
RunE: execute,
|
|
}
|
|
)
|
|
|
|
func init() {
|
|
_ = util.InitLog("trace", "console")
|
|
cobraConfig = &Config{}
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.ListenAddress, "listen-address", "l", ":443", "listen address")
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.ExposedAddress, "exposed-address", "e", "", "instance domain address (or ip) and port, it will be distributes between peers")
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.LetsencryptDataDir, "letsencrypt-data-dir", "d", "", "a directory to store Let's Encrypt data. Required if Let's Encrypt is enabled.")
|
|
rootCmd.PersistentFlags().StringSliceVarP(&cobraConfig.LetsencryptDomains, "letsencrypt-domains", "a", nil, "list of domains to issue Let's Encrypt certificate for. Enables TLS using Let's Encrypt. Will fetch and renew certificate, and run the server with TLS")
|
|
rootCmd.PersistentFlags().StringVar(&cobraConfig.LetsencryptEmail, "letsencrypt-email", "", "email address to use for Let's Encrypt certificate registration")
|
|
rootCmd.PersistentFlags().BoolVar(&cobraConfig.LetsencryptAWSRoute53, "letsencrypt-aws-route53", false, "use AWS Route 53 for Let's Encrypt DNS challenge")
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.TlsCertFile, "tls-cert-file", "c", "", "")
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.TlsKeyFile, "tls-key-file", "k", "", "")
|
|
rootCmd.PersistentFlags().StringVarP(&cobraConfig.AuthSecret, "auth-secret", "s", "", "auth secret")
|
|
rootCmd.PersistentFlags().StringVar(&cobraConfig.LogLevel, "log-level", "info", "log level")
|
|
rootCmd.PersistentFlags().StringVar(&cobraConfig.LogFile, "log-file", "console", "log file")
|
|
|
|
setFlagsFromEnvVars(rootCmd)
|
|
}
|
|
|
|
func Execute() error {
|
|
return rootCmd.Execute()
|
|
}
|
|
|
|
func waitForExitSignal() {
|
|
osSigs := make(chan os.Signal, 1)
|
|
signal.Notify(osSigs, syscall.SIGINT, syscall.SIGTERM)
|
|
<-osSigs
|
|
}
|
|
|
|
func execute(cmd *cobra.Command, args []string) error {
|
|
err := cobraConfig.Validate()
|
|
if err != nil {
|
|
log.Debugf("invalid config: %s", err)
|
|
return fmt.Errorf("invalid config: %s", err)
|
|
}
|
|
|
|
err = util.InitLog(cobraConfig.LogLevel, cobraConfig.LogFile)
|
|
if err != nil {
|
|
log.Debugf("failed to initialize log: %s", err)
|
|
return fmt.Errorf("failed to initialize log: %s", err)
|
|
}
|
|
|
|
metricsServer, err := metrics.NewServer(metricsPort, "")
|
|
if err != nil {
|
|
log.Debugf("setup metrics: %v", err)
|
|
return fmt.Errorf("setup metrics: %v", err)
|
|
}
|
|
|
|
go func() {
|
|
log.Infof("running metrics server: %s%s", metricsServer.Addr, metricsServer.Endpoint)
|
|
if err := metricsServer.ListenAndServe(); !errors.Is(err, http.ErrServerClosed) {
|
|
log.Fatalf("Failed to start metrics server: %v", err)
|
|
}
|
|
}()
|
|
|
|
srvListenerCfg := server.ListenerConfig{
|
|
Address: cobraConfig.ListenAddress,
|
|
}
|
|
|
|
tlsConfig, tlsSupport, err := handleTLSConfig(cobraConfig)
|
|
if err != nil {
|
|
log.Debugf("failed to setup TLS config: %s", err)
|
|
return fmt.Errorf("failed to setup TLS config: %s", err)
|
|
}
|
|
srvListenerCfg.TLSConfig = tlsConfig
|
|
|
|
authenticator := auth.NewTimedHMACValidator(cobraConfig.AuthSecret, 24*time.Hour)
|
|
srv, err := server.NewServer(metricsServer.Meter, cobraConfig.ExposedAddress, tlsSupport, authenticator)
|
|
if err != nil {
|
|
log.Debugf("failed to create relay server: %v", err)
|
|
return fmt.Errorf("failed to create relay server: %v", err)
|
|
}
|
|
log.Infof("server will be available on: %s", srv.InstanceURL())
|
|
go func() {
|
|
if err := srv.Listen(srvListenerCfg); err != nil {
|
|
log.Fatalf("failed to bind server: %s", err)
|
|
}
|
|
}()
|
|
|
|
// it will block until exit signal
|
|
waitForExitSignal()
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
defer cancel()
|
|
|
|
var shutDownErrors error
|
|
if err := srv.Shutdown(ctx); err != nil {
|
|
shutDownErrors = multierror.Append(shutDownErrors, fmt.Errorf("failed to close server: %s", err))
|
|
}
|
|
|
|
log.Infof("shutting down metrics server")
|
|
if err := metricsServer.Shutdown(ctx); err != nil {
|
|
shutDownErrors = multierror.Append(shutDownErrors, fmt.Errorf("failed to close metrics server: %v", err))
|
|
}
|
|
return shutDownErrors
|
|
}
|
|
|
|
func handleTLSConfig(cfg *Config) (*tls.Config, bool, error) {
|
|
if cfg.LetsencryptAWSRoute53 {
|
|
log.Debugf("using Let's Encrypt DNS resolver with Route 53 support")
|
|
r53 := encryption.Route53TLS{
|
|
DataDir: cfg.LetsencryptDataDir,
|
|
Email: cfg.LetsencryptEmail,
|
|
Domains: cfg.LetsencryptDomains,
|
|
}
|
|
tlsCfg, err := r53.GetCertificate()
|
|
if err != nil {
|
|
return nil, false, fmt.Errorf("%s", err)
|
|
}
|
|
return tlsCfg, true, nil
|
|
}
|
|
|
|
if cfg.HasLetsEncrypt() {
|
|
log.Infof("setting up TLS with Let's Encrypt.")
|
|
tlsCfg, err := setupTLSCertManager(cfg.LetsencryptDataDir, cfg.LetsencryptDomains...)
|
|
if err != nil {
|
|
return nil, false, fmt.Errorf("%s", err)
|
|
}
|
|
return tlsCfg, true, nil
|
|
}
|
|
|
|
if cfg.HasCertConfig() {
|
|
log.Debugf("using file based TLS config")
|
|
tlsCfg, err := encryption.LoadTLSConfig(cfg.TlsCertFile, cfg.TlsKeyFile)
|
|
if err != nil {
|
|
return nil, false, fmt.Errorf("%s", err)
|
|
}
|
|
return tlsCfg, true, nil
|
|
}
|
|
return nil, false, nil
|
|
}
|
|
|
|
func setupTLSCertManager(letsencryptDataDir string, letsencryptDomains ...string) (*tls.Config, error) {
|
|
certManager, err := encryption.CreateCertManager(letsencryptDataDir, letsencryptDomains...)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed creating LetsEncrypt cert manager: %v", err)
|
|
}
|
|
return certManager.TLSConfig(), nil
|
|
}
|