|
14 | 14 | // You should have received a copy of the GNU Affero General Public License
|
15 | 15 | // along with this program. If not, see <http://www.gnu.org/licenses/>.
|
16 | 16 |
|
17 |
| -package service |
| 17 | +package vnet |
18 | 18 |
|
19 | 19 | import (
|
20 | 20 | "context"
|
21 |
| - "math/rand" |
22 |
| - "time" |
| 21 | + "crypto/tls" |
| 22 | + "errors" |
| 23 | + "sync" |
23 | 24 |
|
| 25 | + "github.com/gravitational/trace" |
| 26 | + |
| 27 | + "github.com/gravitational/teleport" |
| 28 | + vnetproto "github.com/gravitational/teleport/api/gen/proto/go/teleport/vnet/v1" |
| 29 | + "github.com/gravitational/teleport/api/types" |
24 | 30 | api "github.com/gravitational/teleport/gen/proto/go/teleport/lib/teleterm/vnet/v1"
|
| 31 | + "github.com/gravitational/teleport/lib/client" |
| 32 | + "github.com/gravitational/teleport/lib/teleterm/api/uri" |
| 33 | + "github.com/gravitational/teleport/lib/teleterm/daemon" |
| 34 | + logutils "github.com/gravitational/teleport/lib/utils/log" |
| 35 | + "github.com/gravitational/teleport/lib/vnet" |
| 36 | +) |
| 37 | + |
| 38 | +var log = logutils.NewPackageLogger(teleport.ComponentKey, "term:vnet") |
| 39 | + |
| 40 | +type status int |
| 41 | + |
| 42 | +const ( |
| 43 | + statusNotRunning status = iota |
| 44 | + statusRunning |
| 45 | + statusClosed |
25 | 46 | )
|
26 | 47 |
|
27 | 48 | // Service implements gRPC service for VNet.
|
28 | 49 | type Service struct {
|
29 | 50 | api.UnimplementedVnetServiceServer
|
| 51 | + |
| 52 | + cfg Config |
| 53 | + mu sync.Mutex |
| 54 | + status status |
| 55 | + processManager *vnet.ProcessManager |
| 56 | +} |
| 57 | + |
| 58 | +// New creates an instance of Service. |
| 59 | +func New(cfg Config) (*Service, error) { |
| 60 | + if err := cfg.CheckAndSetDefaults(); err != nil { |
| 61 | + return nil, trace.Wrap(err) |
| 62 | + } |
| 63 | + |
| 64 | + return &Service{ |
| 65 | + cfg: cfg, |
| 66 | + }, nil |
| 67 | +} |
| 68 | + |
| 69 | +type Config struct { |
| 70 | + DaemonService *daemon.Service |
| 71 | + InsecureSkipVerify bool |
| 72 | +} |
| 73 | + |
| 74 | +// CheckAndSetDefaults checks and sets the defaults |
| 75 | +func (c *Config) CheckAndSetDefaults() error { |
| 76 | + if c.DaemonService == nil { |
| 77 | + return trace.BadParameter("missing DaemonService") |
| 78 | + } |
| 79 | + |
| 80 | + return nil |
30 | 81 | }
|
31 | 82 |
|
32 | 83 | func (s *Service) Start(ctx context.Context, req *api.StartRequest) (*api.StartResponse, error) {
|
33 |
| - n := rand.Intn(10) |
34 |
| - randomDelay := time.Duration(n) * 100 * time.Millisecond |
35 |
| - time.Sleep(randomDelay + 400*time.Millisecond) |
| 84 | + s.mu.Lock() |
| 85 | + defer s.mu.Unlock() |
| 86 | + |
| 87 | + if s.status == statusClosed { |
| 88 | + return nil, trace.CompareFailed("VNet service has been closed") |
| 89 | + } |
| 90 | + |
| 91 | + if s.status == statusRunning { |
| 92 | + return &api.StartResponse{}, nil |
| 93 | + } |
| 94 | + |
| 95 | + appProvider := &appProvider{ |
| 96 | + daemonService: s.cfg.DaemonService, |
| 97 | + insecureSkipVerify: s.cfg.InsecureSkipVerify, |
| 98 | + } |
| 99 | + |
| 100 | + processManager, err := vnet.SetupAndRun(ctx, appProvider) |
| 101 | + if err != nil { |
| 102 | + return nil, trace.Wrap(err) |
| 103 | + } |
| 104 | + |
| 105 | + go func() { |
| 106 | + err := processManager.Wait() |
| 107 | + if err != nil && !errors.Is(err, context.Canceled) { |
| 108 | + log.ErrorContext(ctx, "VNet closed with an error", "error", err) |
| 109 | + } else { |
| 110 | + log.DebugContext(ctx, "VNet closed") |
| 111 | + } |
| 112 | + |
| 113 | + // TODO(ravicious): Notify the Electron app about change of VNet state, but only if it's |
| 114 | + // running. If it's not running, then the Start RPC has already failed and forwarded the error |
| 115 | + // to the user. |
| 116 | + |
| 117 | + s.mu.Lock() |
| 118 | + defer s.mu.Unlock() |
| 119 | + |
| 120 | + if s.status == statusRunning { |
| 121 | + s.status = statusNotRunning |
| 122 | + } |
| 123 | + }() |
| 124 | + |
| 125 | + s.processManager = processManager |
| 126 | + s.status = statusRunning |
36 | 127 | return &api.StartResponse{}, nil
|
37 | 128 | }
|
38 | 129 |
|
| 130 | +// Stop stops VNet and cleans up used resources. Blocks until VNet stops or ctx is canceled. |
39 | 131 | func (s *Service) Stop(ctx context.Context, req *api.StopRequest) (*api.StopResponse, error) {
|
| 132 | + s.mu.Lock() |
| 133 | + defer s.mu.Unlock() |
| 134 | + |
| 135 | + err := s.stopLocked() |
| 136 | + if err != nil { |
| 137 | + return nil, trace.Wrap(err) |
| 138 | + } |
| 139 | + |
40 | 140 | return &api.StopResponse{}, nil
|
41 | 141 | }
|
42 | 142 |
|
43 |
| -// Close stops the current VNet instance and prevents new instances from being started. |
44 |
| -// |
| 143 | +func (s *Service) stopLocked() error { |
| 144 | + if s.status == statusClosed { |
| 145 | + return trace.CompareFailed("VNet service has been closed") |
| 146 | + } |
| 147 | + |
| 148 | + if s.status == statusNotRunning { |
| 149 | + return nil |
| 150 | + } |
| 151 | + |
| 152 | + s.processManager.Close() |
| 153 | + err := s.processManager.Wait() |
| 154 | + if err != nil && !errors.Is(err, context.Canceled) { |
| 155 | + return trace.Wrap(err) |
| 156 | + } |
| 157 | + |
| 158 | + s.status = statusNotRunning |
| 159 | + return nil |
| 160 | +} |
| 161 | + |
| 162 | +// Close stops VNet service and prevents it from being started again. Blocks until VNet stops. |
45 | 163 | // Intended for cleanup code when tsh daemon gets terminated.
|
46 | 164 | func (s *Service) Close() error {
|
| 165 | + s.mu.Lock() |
| 166 | + defer s.mu.Unlock() |
| 167 | + |
| 168 | + err := s.stopLocked() |
| 169 | + if err != nil { |
| 170 | + return trace.Wrap(err) |
| 171 | + } |
| 172 | + |
| 173 | + s.status = statusClosed |
47 | 174 | return nil
|
48 | 175 | }
|
| 176 | + |
| 177 | +type appProvider struct { |
| 178 | + daemonService *daemon.Service |
| 179 | + insecureSkipVerify bool |
| 180 | +} |
| 181 | + |
| 182 | +func (p *appProvider) ListProfiles() ([]string, error) { |
| 183 | + profiles, err := p.daemonService.ListProfileNames() |
| 184 | + return profiles, trace.Wrap(err) |
| 185 | +} |
| 186 | + |
| 187 | +func (p *appProvider) GetCachedClient(ctx context.Context, profileName, leafClusterName string) (*client.ClusterClient, error) { |
| 188 | + uri := uri.NewClusterURI(profileName).AppendLeafCluster(leafClusterName) |
| 189 | + client, err := p.daemonService.GetCachedClient(ctx, uri) |
| 190 | + return client, trace.Wrap(err) |
| 191 | +} |
| 192 | + |
| 193 | +func (p *appProvider) ReissueAppCert(ctx context.Context, profileName, leafClusterName string, app types.Application) (tls.Certificate, error) { |
| 194 | + clusterURI := uri.NewClusterURI(profileName).AppendLeafCluster(leafClusterName) |
| 195 | + cluster, _, err := p.daemonService.ResolveClusterURI(clusterURI) |
| 196 | + if err != nil { |
| 197 | + return tls.Certificate{}, trace.Wrap(err) |
| 198 | + } |
| 199 | + |
| 200 | + client, err := p.daemonService.GetCachedClient(ctx, clusterURI) |
| 201 | + if err != nil { |
| 202 | + return tls.Certificate{}, trace.Wrap(err) |
| 203 | + } |
| 204 | + |
| 205 | + // TODO(ravicious): Copy stuff from DaemonService.reissueGatewayCerts in order to handle expired certs. |
| 206 | + cert, err := cluster.ReissueAppCert(ctx, client, app) |
| 207 | + return cert, trace.Wrap(err) |
| 208 | +} |
| 209 | + |
| 210 | +// GetDialOptions returns ALPN dial options for the profile. |
| 211 | +func (p *appProvider) GetDialOptions(ctx context.Context, profileName string) (*vnet.DialOptions, error) { |
| 212 | + cluster, tc, err := p.daemonService.ResolveClusterURI(uri.NewClusterURI(profileName)) |
| 213 | + if err != nil { |
| 214 | + return nil, trace.Wrap(err, "resolving cluster by URI") |
| 215 | + } |
| 216 | + |
| 217 | + dialOpts := &vnet.DialOptions{ |
| 218 | + WebProxyAddr: cluster.GetProxyHost(), |
| 219 | + ALPNConnUpgradeRequired: tc.TLSRoutingConnUpgradeRequired, |
| 220 | + InsecureSkipVerify: p.insecureSkipVerify, |
| 221 | + } |
| 222 | + if dialOpts.ALPNConnUpgradeRequired { |
| 223 | + dialOpts.RootClusterCACertPool, err = tc.RootClusterCACertPool(ctx) |
| 224 | + if err != nil { |
| 225 | + return nil, trace.Wrap(err, "loading root cluster CA cert pool") |
| 226 | + } |
| 227 | + } |
| 228 | + return dialOpts, nil |
| 229 | +} |
| 230 | + |
| 231 | +func (p *appProvider) GetVnetConfig(ctx context.Context, profileName, leafClusterName string) (*vnetproto.VnetConfig, error) { |
| 232 | + clusterClient, err := p.GetCachedClient(ctx, profileName, leafClusterName) |
| 233 | + if err != nil { |
| 234 | + return nil, trace.Wrap(err) |
| 235 | + } |
| 236 | + vnetConfigClient := clusterClient.AuthClient.VnetConfigServiceClient() |
| 237 | + vnetConfig, err := vnetConfigClient.GetVnetConfig(ctx, &vnetproto.GetVnetConfigRequest{}) |
| 238 | + return vnetConfig, trace.Wrap(err) |
| 239 | +} |
0 commit comments