Compare commits

...

2 Commits

Author SHA1 Message Date
Aiden McClelland
04196df976 fix getNext 2025-12-19 12:35:06 -07:00
Matt Hill
30b1654666 random subnet and also 80 to 5443 2025-12-19 09:59:12 -07:00
4 changed files with 106 additions and 17 deletions

View File

@@ -160,6 +160,16 @@ pub async fn add_subnet(
.db
.mutate(|db| {
let map = db.as_wg_mut().as_subnets_mut();
if let Some(s) = map
.keys()?
.into_iter()
.find(|s| s != &subnet && (s.contains(&subnet) || subnet.contains(s)))
{
return Err(Error::new(
eyre!("{subnet} overlaps with existing subnet {s}"),
ErrorKind::InvalidRequest,
));
}
map.upsert(&subnet, || {
Ok(WgSubnetConfig::new(InternedString::default()))
})?

View File

@@ -1,8 +1,11 @@
export class IpAddress {
private renderedOctets: number[]
protected constructor(
readonly octets: number[],
readonly address: string,
) {}
public octets: number[],
private renderedAddress: string,
) {
this.renderedOctets = [...octets]
}
static parse(address: string): IpAddress {
let octets
if (address.includes(":")) {
@@ -120,14 +123,48 @@ export class IpAddress {
}
return 0
}
get address(): string {
if (
this.renderedOctets.length === this.octets.length &&
this.renderedOctets.every((o, idx) => o === this.octets[idx])
) {
// already rendered
} else if (this.octets.length === 4) {
this.renderedAddress = this.octets.join(".")
this.renderedOctets = [...this.octets]
} else if (this.octets.length === 16) {
const contigZeros = this.octets.reduce(
(acc, x, idx) => {
if (x === 0) {
acc.current++
} else {
acc.current = 0
}
if (acc.current > acc.end - acc.start) {
acc.end = idx + 1
acc.start = acc.end - acc.current
}
return acc
},
{ start: 0, end: 0, current: 0 },
)
if (contigZeros.end - contigZeros.start >= 2) {
return `${this.octets.slice(0, contigZeros.start).join(":")}::${this.octets.slice(contigZeros.end).join(":")}`
}
this.renderedAddress = this.octets.join(":")
this.renderedOctets = [...this.octets]
} else {
console.warn("invalid octet length for IpAddress", this.octets)
}
return this.renderedAddress
}
}
export class IpNet extends IpAddress {
private constructor(
octets: number[],
readonly prefix: number,
public prefix: number,
address: string,
readonly ipnet: string,
) {
super(octets, address)
}
@@ -135,7 +172,7 @@ export class IpNet extends IpAddress {
if (prefix > ip.octets.length * 8) {
throw new Error("invalid prefix")
}
return new IpNet(ip.octets, prefix, ip.address, `${ip.address}/${prefix}`)
return new IpNet(ip.octets, prefix, ip.address)
}
static parse(ipnet: string): IpNet {
const [address, prefixStr] = ipnet.split("/", 2)
@@ -143,8 +180,9 @@ export class IpNet extends IpAddress {
const prefix = Number(prefixStr)
return IpNet.fromIpPrefix(ip, prefix)
}
contains(address: string | IpAddress): boolean {
contains(address: string | IpAddress | IpNet): boolean {
if (typeof address === "string") address = IpAddress.parse(address)
if (address instanceof IpNet && address.prefix < this.prefix) return false
if (this.octets.length !== address.octets.length) return false
let prefix = this.prefix
let idx = 0
@@ -191,6 +229,9 @@ export class IpNet extends IpAddress {
return IpAddress.fromOctets(octets)
}
get ipnet() {
return `${this.address}/${this.prefix}`
}
}
export const PRIVATE_IPV4_RANGES = [

View File

@@ -9,6 +9,7 @@ import { ErrorService, LoadingService } from '@start9labs/shared'
import {
TUI_IS_MOBILE,
tuiMarkControlAsTouchedAndValidate,
TuiValueChanges,
} from '@taiga-ui/cdk'
import {
TuiButton,
@@ -18,11 +19,13 @@ import {
TuiTextfield,
} from '@taiga-ui/core'
import {
TuiCheckbox,
TuiChevron,
TuiDataListWrapper,
TuiFieldErrorPipe,
TuiInputNumber,
TuiSelect,
TuiElasticContainer,
} from '@taiga-ui/kit'
import { TuiForm } from '@taiga-ui/layout'
import { injectContext, PolymorpheusComponent } from '@taiga-ui/polymorpheus'
@@ -65,6 +68,7 @@ import { MappedDevice, PortForwardsData } from './utils'
[min]="0"
[max]="65535"
[tuiNumberFormat]="{ thousandSeparator: '' }"
(tuiValueChanges)="checkShow80()"
/>
</tui-textfield>
<tui-error
@@ -103,12 +107,22 @@ import { MappedDevice, PortForwardsData } from './utils'
[min]="0"
[max]="65535"
[tuiNumberFormat]="{ thousandSeparator: '' }"
(tuiValueChanges)="checkShow80()"
/>
</tui-textfield>
<tui-error
formControlName="internalport"
[error]="[] | tuiFieldError | async"
/>
<tui-elastic-container>
@if (show80) {
<label tuiLabel>
<input tuiCheckbox type="checkbox" formControlName="also80" />
Also forward port 80 to port 5443? This is needed for HTTP to HTTPS
redirects (recommended)
</label>
}
</tui-elastic-container>
<footer>
<button tuiButton [disabled]="form.invalid" (click)="onSave()">
Save
@@ -130,6 +144,9 @@ import { MappedDevice, PortForwardsData } from './utils'
TuiTextfield,
TuiSelect,
TuiForm,
TuiCheckbox,
TuiValueChanges,
TuiElasticContainer,
],
})
export class PortForwardsAdd {
@@ -137,6 +154,8 @@ export class PortForwardsAdd {
private readonly loading = inject(LoadingService)
private readonly errorService = inject(ErrorService)
show80 = false
protected readonly mobile = inject(TUI_IS_MOBILE)
protected readonly context =
injectContext<TuiDialogContext<void, PortForwardsData>>()
@@ -146,11 +165,17 @@ export class PortForwardsAdd {
externalport: [null as number | null, Validators.required],
device: [null as MappedDevice | null, Validators.required],
internalport: [null as number | null, Validators.required],
also80: [true],
})
protected readonly stringify = ({ ip, name }: MappedDevice) =>
ip ? `${name} (${ip})` : ''
protected checkShow80() {
const { externalport, internalport } = this.form.getRawValue()
this.show80 = externalport === 443 && internalport === 5443
}
protected async onSave() {
if (this.form.invalid) {
tuiMarkControlAsTouchedAndValidate(this.form)
@@ -159,14 +184,22 @@ export class PortForwardsAdd {
}
const loader = this.loading.open().subscribe()
const { externalip, externalport, device, internalport } =
const { externalip, externalport, device, internalport, also80 } =
this.form.getRawValue()
try {
await this.api.addForward({
source: `${externalip}:${externalport}`,
target: `${device?.ip}:${internalport}`,
target: `${device!.ip}:${internalport}`,
})
if (externalport === 443 && internalport === 5443 && also80) {
await this.api.addForward({
source: `${externalip}:80`,
target: `${device!.ip}:5443`,
})
}
} catch (e: any) {
console.error(e)
this.errorService.handleError(e)

View File

@@ -133,16 +133,21 @@ export default class Subnets {
}
private getNext(): string {
const last =
this.subnets()
.map(s => utils.IpNet.parse(s.range))
.sort((a, b) => -1 * a.cmp(b))[0] ?? utils.IpNet.parse('10.58.255.0/24')
const next = utils.IpNet.fromIpPrefix(last.broadcast().add(2), 24)
if (!next.isPublic()) {
return next.ipnet
const current = this.subnets().map(s => utils.IpNet.parse(s.range))
const suggestion = utils.IpNet.parse('10.59.0.1/24')
for (let i = 0; i < 256; i++) {
suggestion.octets[2] = Math.floor(Math.random() * 256)
if (
!current.some(
s => s.contains(suggestion), // inverse check unnecessary since we don't allow subnets smaller than /24
)
) {
return suggestion.ipnet
}
}
// No recommendation if /24 subnets are used
// No recommendation if can't find a /24 from 10.59 in 256 random tries
return ''
}
}