mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 18:31:52 +00:00
Compare commits
2 Commits
claude
...
feat/rando
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
04196df976 | ||
|
|
30b1654666 |
@@ -160,6 +160,16 @@ pub async fn add_subnet(
|
||||
.db
|
||||
.mutate(|db| {
|
||||
let map = db.as_wg_mut().as_subnets_mut();
|
||||
if let Some(s) = map
|
||||
.keys()?
|
||||
.into_iter()
|
||||
.find(|s| s != &subnet && (s.contains(&subnet) || subnet.contains(s)))
|
||||
{
|
||||
return Err(Error::new(
|
||||
eyre!("{subnet} overlaps with existing subnet {s}"),
|
||||
ErrorKind::InvalidRequest,
|
||||
));
|
||||
}
|
||||
map.upsert(&subnet, || {
|
||||
Ok(WgSubnetConfig::new(InternedString::default()))
|
||||
})?
|
||||
|
||||
@@ -1,8 +1,11 @@
|
||||
export class IpAddress {
|
||||
private renderedOctets: number[]
|
||||
protected constructor(
|
||||
readonly octets: number[],
|
||||
readonly address: string,
|
||||
) {}
|
||||
public octets: number[],
|
||||
private renderedAddress: string,
|
||||
) {
|
||||
this.renderedOctets = [...octets]
|
||||
}
|
||||
static parse(address: string): IpAddress {
|
||||
let octets
|
||||
if (address.includes(":")) {
|
||||
@@ -120,14 +123,48 @@ export class IpAddress {
|
||||
}
|
||||
return 0
|
||||
}
|
||||
get address(): string {
|
||||
if (
|
||||
this.renderedOctets.length === this.octets.length &&
|
||||
this.renderedOctets.every((o, idx) => o === this.octets[idx])
|
||||
) {
|
||||
// already rendered
|
||||
} else if (this.octets.length === 4) {
|
||||
this.renderedAddress = this.octets.join(".")
|
||||
this.renderedOctets = [...this.octets]
|
||||
} else if (this.octets.length === 16) {
|
||||
const contigZeros = this.octets.reduce(
|
||||
(acc, x, idx) => {
|
||||
if (x === 0) {
|
||||
acc.current++
|
||||
} else {
|
||||
acc.current = 0
|
||||
}
|
||||
if (acc.current > acc.end - acc.start) {
|
||||
acc.end = idx + 1
|
||||
acc.start = acc.end - acc.current
|
||||
}
|
||||
return acc
|
||||
},
|
||||
{ start: 0, end: 0, current: 0 },
|
||||
)
|
||||
if (contigZeros.end - contigZeros.start >= 2) {
|
||||
return `${this.octets.slice(0, contigZeros.start).join(":")}::${this.octets.slice(contigZeros.end).join(":")}`
|
||||
}
|
||||
this.renderedAddress = this.octets.join(":")
|
||||
this.renderedOctets = [...this.octets]
|
||||
} else {
|
||||
console.warn("invalid octet length for IpAddress", this.octets)
|
||||
}
|
||||
return this.renderedAddress
|
||||
}
|
||||
}
|
||||
|
||||
export class IpNet extends IpAddress {
|
||||
private constructor(
|
||||
octets: number[],
|
||||
readonly prefix: number,
|
||||
public prefix: number,
|
||||
address: string,
|
||||
readonly ipnet: string,
|
||||
) {
|
||||
super(octets, address)
|
||||
}
|
||||
@@ -135,7 +172,7 @@ export class IpNet extends IpAddress {
|
||||
if (prefix > ip.octets.length * 8) {
|
||||
throw new Error("invalid prefix")
|
||||
}
|
||||
return new IpNet(ip.octets, prefix, ip.address, `${ip.address}/${prefix}`)
|
||||
return new IpNet(ip.octets, prefix, ip.address)
|
||||
}
|
||||
static parse(ipnet: string): IpNet {
|
||||
const [address, prefixStr] = ipnet.split("/", 2)
|
||||
@@ -143,8 +180,9 @@ export class IpNet extends IpAddress {
|
||||
const prefix = Number(prefixStr)
|
||||
return IpNet.fromIpPrefix(ip, prefix)
|
||||
}
|
||||
contains(address: string | IpAddress): boolean {
|
||||
contains(address: string | IpAddress | IpNet): boolean {
|
||||
if (typeof address === "string") address = IpAddress.parse(address)
|
||||
if (address instanceof IpNet && address.prefix < this.prefix) return false
|
||||
if (this.octets.length !== address.octets.length) return false
|
||||
let prefix = this.prefix
|
||||
let idx = 0
|
||||
@@ -191,6 +229,9 @@ export class IpNet extends IpAddress {
|
||||
|
||||
return IpAddress.fromOctets(octets)
|
||||
}
|
||||
get ipnet() {
|
||||
return `${this.address}/${this.prefix}`
|
||||
}
|
||||
}
|
||||
|
||||
export const PRIVATE_IPV4_RANGES = [
|
||||
|
||||
@@ -9,6 +9,7 @@ import { ErrorService, LoadingService } from '@start9labs/shared'
|
||||
import {
|
||||
TUI_IS_MOBILE,
|
||||
tuiMarkControlAsTouchedAndValidate,
|
||||
TuiValueChanges,
|
||||
} from '@taiga-ui/cdk'
|
||||
import {
|
||||
TuiButton,
|
||||
@@ -18,11 +19,13 @@ import {
|
||||
TuiTextfield,
|
||||
} from '@taiga-ui/core'
|
||||
import {
|
||||
TuiCheckbox,
|
||||
TuiChevron,
|
||||
TuiDataListWrapper,
|
||||
TuiFieldErrorPipe,
|
||||
TuiInputNumber,
|
||||
TuiSelect,
|
||||
TuiElasticContainer,
|
||||
} from '@taiga-ui/kit'
|
||||
import { TuiForm } from '@taiga-ui/layout'
|
||||
import { injectContext, PolymorpheusComponent } from '@taiga-ui/polymorpheus'
|
||||
@@ -65,6 +68,7 @@ import { MappedDevice, PortForwardsData } from './utils'
|
||||
[min]="0"
|
||||
[max]="65535"
|
||||
[tuiNumberFormat]="{ thousandSeparator: '' }"
|
||||
(tuiValueChanges)="checkShow80()"
|
||||
/>
|
||||
</tui-textfield>
|
||||
<tui-error
|
||||
@@ -103,12 +107,22 @@ import { MappedDevice, PortForwardsData } from './utils'
|
||||
[min]="0"
|
||||
[max]="65535"
|
||||
[tuiNumberFormat]="{ thousandSeparator: '' }"
|
||||
(tuiValueChanges)="checkShow80()"
|
||||
/>
|
||||
</tui-textfield>
|
||||
<tui-error
|
||||
formControlName="internalport"
|
||||
[error]="[] | tuiFieldError | async"
|
||||
/>
|
||||
<tui-elastic-container>
|
||||
@if (show80) {
|
||||
<label tuiLabel>
|
||||
<input tuiCheckbox type="checkbox" formControlName="also80" />
|
||||
Also forward port 80 to port 5443? This is needed for HTTP to HTTPS
|
||||
redirects (recommended)
|
||||
</label>
|
||||
}
|
||||
</tui-elastic-container>
|
||||
<footer>
|
||||
<button tuiButton [disabled]="form.invalid" (click)="onSave()">
|
||||
Save
|
||||
@@ -130,6 +144,9 @@ import { MappedDevice, PortForwardsData } from './utils'
|
||||
TuiTextfield,
|
||||
TuiSelect,
|
||||
TuiForm,
|
||||
TuiCheckbox,
|
||||
TuiValueChanges,
|
||||
TuiElasticContainer,
|
||||
],
|
||||
})
|
||||
export class PortForwardsAdd {
|
||||
@@ -137,6 +154,8 @@ export class PortForwardsAdd {
|
||||
private readonly loading = inject(LoadingService)
|
||||
private readonly errorService = inject(ErrorService)
|
||||
|
||||
show80 = false
|
||||
|
||||
protected readonly mobile = inject(TUI_IS_MOBILE)
|
||||
protected readonly context =
|
||||
injectContext<TuiDialogContext<void, PortForwardsData>>()
|
||||
@@ -146,11 +165,17 @@ export class PortForwardsAdd {
|
||||
externalport: [null as number | null, Validators.required],
|
||||
device: [null as MappedDevice | null, Validators.required],
|
||||
internalport: [null as number | null, Validators.required],
|
||||
also80: [true],
|
||||
})
|
||||
|
||||
protected readonly stringify = ({ ip, name }: MappedDevice) =>
|
||||
ip ? `${name} (${ip})` : ''
|
||||
|
||||
protected checkShow80() {
|
||||
const { externalport, internalport } = this.form.getRawValue()
|
||||
this.show80 = externalport === 443 && internalport === 5443
|
||||
}
|
||||
|
||||
protected async onSave() {
|
||||
if (this.form.invalid) {
|
||||
tuiMarkControlAsTouchedAndValidate(this.form)
|
||||
@@ -159,14 +184,22 @@ export class PortForwardsAdd {
|
||||
}
|
||||
|
||||
const loader = this.loading.open().subscribe()
|
||||
const { externalip, externalport, device, internalport } =
|
||||
|
||||
const { externalip, externalport, device, internalport, also80 } =
|
||||
this.form.getRawValue()
|
||||
|
||||
try {
|
||||
await this.api.addForward({
|
||||
source: `${externalip}:${externalport}`,
|
||||
target: `${device?.ip}:${internalport}`,
|
||||
target: `${device!.ip}:${internalport}`,
|
||||
})
|
||||
|
||||
if (externalport === 443 && internalport === 5443 && also80) {
|
||||
await this.api.addForward({
|
||||
source: `${externalip}:80`,
|
||||
target: `${device!.ip}:5443`,
|
||||
})
|
||||
}
|
||||
} catch (e: any) {
|
||||
console.error(e)
|
||||
this.errorService.handleError(e)
|
||||
|
||||
@@ -133,16 +133,21 @@ export default class Subnets {
|
||||
}
|
||||
|
||||
private getNext(): string {
|
||||
const last =
|
||||
this.subnets()
|
||||
.map(s => utils.IpNet.parse(s.range))
|
||||
.sort((a, b) => -1 * a.cmp(b))[0] ?? utils.IpNet.parse('10.58.255.0/24')
|
||||
const next = utils.IpNet.fromIpPrefix(last.broadcast().add(2), 24)
|
||||
if (!next.isPublic()) {
|
||||
return next.ipnet
|
||||
const current = this.subnets().map(s => utils.IpNet.parse(s.range))
|
||||
const suggestion = utils.IpNet.parse('10.59.0.1/24')
|
||||
|
||||
for (let i = 0; i < 256; i++) {
|
||||
suggestion.octets[2] = Math.floor(Math.random() * 256)
|
||||
if (
|
||||
!current.some(
|
||||
s => s.contains(suggestion), // inverse check unnecessary since we don't allow subnets smaller than /24
|
||||
)
|
||||
) {
|
||||
return suggestion.ipnet
|
||||
}
|
||||
}
|
||||
|
||||
// No recommendation if /24 subnets are used
|
||||
// No recommendation if can't find a /24 from 10.59 in 256 random tries
|
||||
return ''
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user