Merge pull request 'add module to generate zerotier configuration' (#22) from zerotier into main
Reviewed-on: https://git.clan.lol/clan/clan-core/pulls/22
This commit is contained in:
@@ -6,4 +6,4 @@ jobs:
|
|||||||
runs-on: nix
|
runs-on: nix
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- run: nix flake check -L
|
- run: nix flake check --keep-going -L
|
||||||
|
|||||||
@@ -16,8 +16,6 @@
|
|||||||
systems = [
|
systems = [
|
||||||
"x86_64-linux"
|
"x86_64-linux"
|
||||||
"aarch64-linux"
|
"aarch64-linux"
|
||||||
"aarch64-darwin"
|
|
||||||
"x86_64-darwin"
|
|
||||||
];
|
];
|
||||||
imports = [
|
imports = [
|
||||||
./flake-parts/packages.nix
|
./flake-parts/packages.nix
|
||||||
|
|||||||
174
pkgs/clan-cli/clan_cli/zerotier/__init__.py
Normal file
174
pkgs/clan-cli/clan_cli/zerotier/__init__.py
Normal file
@@ -0,0 +1,174 @@
|
|||||||
|
import json
|
||||||
|
import os
|
||||||
|
import socket
|
||||||
|
import subprocess
|
||||||
|
import time
|
||||||
|
import urllib.request
|
||||||
|
from contextlib import contextmanager
|
||||||
|
from pathlib import Path
|
||||||
|
from tempfile import TemporaryDirectory
|
||||||
|
from typing import Any, Iterator, Optional
|
||||||
|
|
||||||
|
|
||||||
|
def try_bind_port(port: int) -> bool:
|
||||||
|
tcp = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
udp = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
||||||
|
with tcp, udp:
|
||||||
|
try:
|
||||||
|
tcp.bind(("127.0.0.1", port))
|
||||||
|
udp.bind(("127.0.0.1", port))
|
||||||
|
return True
|
||||||
|
except socket.error:
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def try_connect_port(port: int) -> bool:
|
||||||
|
sock = socket.socket(socket.AF_INET)
|
||||||
|
result = sock.connect_ex(("127.0.0.1", port))
|
||||||
|
sock.close()
|
||||||
|
return result == 0
|
||||||
|
|
||||||
|
|
||||||
|
def find_free_port(port_range: range) -> int:
|
||||||
|
for port in port_range:
|
||||||
|
if try_bind_port(port):
|
||||||
|
return port
|
||||||
|
raise Exception("cannot find a free port")
|
||||||
|
|
||||||
|
|
||||||
|
CLAN_NIXPKGS = os.environ.get("CLAN_NIXPKGS")
|
||||||
|
|
||||||
|
|
||||||
|
def nix_shell(packages: list[str], cmd: list[str]) -> list[str]:
|
||||||
|
# in unittest we will have all binaries provided
|
||||||
|
if CLAN_NIXPKGS is None:
|
||||||
|
return cmd
|
||||||
|
return ["nix", "shell", "-f", CLAN_NIXPKGS] + packages + ["-c"] + cmd
|
||||||
|
|
||||||
|
|
||||||
|
class ZerotierController:
|
||||||
|
def __init__(self, port: int, home: Path) -> None:
|
||||||
|
self.port = port
|
||||||
|
self.home = home
|
||||||
|
self.secret = (home / "authtoken.secret").read_text()
|
||||||
|
|
||||||
|
def _http_request(
|
||||||
|
self,
|
||||||
|
path: str,
|
||||||
|
method: str = "GET",
|
||||||
|
headers: dict[str, str] = {},
|
||||||
|
data: Optional[dict[str, Any]] = None,
|
||||||
|
) -> dict[str, Any]:
|
||||||
|
body = None
|
||||||
|
headers = headers.copy()
|
||||||
|
if data is not None:
|
||||||
|
body = json.dumps(data).encode("ascii")
|
||||||
|
headers["Content-Type"] = "application/json"
|
||||||
|
headers["X-ZT1-AUTH"] = self.secret
|
||||||
|
url = f"http://127.0.0.1:{self.port}{path}"
|
||||||
|
req = urllib.request.Request(url, headers=headers, method=method, data=body)
|
||||||
|
resp = urllib.request.urlopen(req)
|
||||||
|
return json.load(resp)
|
||||||
|
|
||||||
|
def status(self) -> dict[str, Any]: # pragma: no cover
|
||||||
|
return self._http_request("/status")
|
||||||
|
|
||||||
|
def create_network(self, data: dict[str, Any] = {}) -> dict[str, Any]:
|
||||||
|
identity = (self.home / "identity.public").read_text()
|
||||||
|
node_id = identity.split(":")[0]
|
||||||
|
return self._http_request(
|
||||||
|
f"/controller/network/{node_id}______", method="POST", data=data
|
||||||
|
)
|
||||||
|
|
||||||
|
def get_network(self, id: str) -> dict[str, Any]:
|
||||||
|
return self._http_request(f"/controller/network/{id}")
|
||||||
|
|
||||||
|
def update_network(
|
||||||
|
self, id: str, new_config: dict[str, Any]
|
||||||
|
) -> dict[str, Any]: # pragma: no cover
|
||||||
|
return self._http_request(
|
||||||
|
f"/controller/network/{id}", method="POST", data=new_config
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@contextmanager
|
||||||
|
def zerotier_controller() -> Iterator[ZerotierController]:
|
||||||
|
# This check could be racy but it's unlikely in practice
|
||||||
|
controller_port = find_free_port(range(10000, 65535))
|
||||||
|
res = subprocess.run(
|
||||||
|
nix_shell(["bash", "zerotierone"], ["bash", "-c", "command -v zerotier-one"]),
|
||||||
|
check=True,
|
||||||
|
text=True,
|
||||||
|
stdout=subprocess.PIPE,
|
||||||
|
)
|
||||||
|
zerotier_exe = res.stdout.strip()
|
||||||
|
if zerotier_exe is None:
|
||||||
|
raise Exception("cannot find zerotier-one executable")
|
||||||
|
|
||||||
|
if not zerotier_exe.startswith("/nix/store"):
|
||||||
|
raise Exception(
|
||||||
|
f"zerotier-one executable needs to come from /nix/store: {zerotier_exe}"
|
||||||
|
)
|
||||||
|
|
||||||
|
with TemporaryDirectory() as d:
|
||||||
|
tempdir = Path(d)
|
||||||
|
home = tempdir / "zerotier-one"
|
||||||
|
home.mkdir()
|
||||||
|
cmd = nix_shell(
|
||||||
|
["bubblewrap"],
|
||||||
|
[
|
||||||
|
"bwrap",
|
||||||
|
"--proc",
|
||||||
|
"/proc",
|
||||||
|
"--dev",
|
||||||
|
"/dev",
|
||||||
|
"--uid",
|
||||||
|
"0",
|
||||||
|
"--gid",
|
||||||
|
"0",
|
||||||
|
"--ro-bind",
|
||||||
|
"/nix",
|
||||||
|
"/nix",
|
||||||
|
"--bind",
|
||||||
|
str(home),
|
||||||
|
"/var/lib/zerotier-one",
|
||||||
|
zerotier_exe,
|
||||||
|
f"-p{controller_port}",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
with subprocess.Popen(cmd) as p:
|
||||||
|
try:
|
||||||
|
print(
|
||||||
|
f"wait for controller to be started on 127.0.0.1:{controller_port}...",
|
||||||
|
)
|
||||||
|
while not try_connect_port(controller_port):
|
||||||
|
status = p.poll()
|
||||||
|
if status is not None:
|
||||||
|
raise Exception(
|
||||||
|
f"zerotier-one has been terminated unexpected with {status}"
|
||||||
|
)
|
||||||
|
time.sleep(0.1)
|
||||||
|
print()
|
||||||
|
|
||||||
|
yield ZerotierController(controller_port, home)
|
||||||
|
finally:
|
||||||
|
p.kill()
|
||||||
|
p.wait()
|
||||||
|
|
||||||
|
|
||||||
|
class ZerotierNetwork:
|
||||||
|
def __init__(self, network_id: str) -> None:
|
||||||
|
self.network_id = network_id
|
||||||
|
|
||||||
|
|
||||||
|
# TODO: allow merging more network configuration here
|
||||||
|
def create_network(private: bool = False) -> ZerotierNetwork:
|
||||||
|
with zerotier_controller() as controller:
|
||||||
|
network = controller.create_network()
|
||||||
|
network_id = network["nwid"]
|
||||||
|
network = controller.get_network(network_id)
|
||||||
|
network["private"] = private
|
||||||
|
network["v6AssignMode"]["rfc4193"] = True
|
||||||
|
controller.update_network(network_id, network)
|
||||||
|
# TODO: persist home into sops?
|
||||||
|
return ZerotierNetwork(network_id)
|
||||||
@@ -4,11 +4,15 @@
|
|||||||
, ruff ? pkgs.ruff
|
, ruff ? pkgs.ruff
|
||||||
, runCommand ? pkgs.runCommand
|
, runCommand ? pkgs.runCommand
|
||||||
, installShellFiles ? pkgs.installShellFiles
|
, installShellFiles ? pkgs.installShellFiles
|
||||||
,
|
, zerotierone ? pkgs.zerotierone
|
||||||
|
, bubblewrap ? pkgs.bubblewrap
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
pyproject = builtins.fromTOML (builtins.readFile ./pyproject.toml);
|
pyproject = builtins.fromTOML (builtins.readFile ./pyproject.toml);
|
||||||
name = pyproject.project.name;
|
name = pyproject.project.name;
|
||||||
|
# Override license so that we can build zerotierone without
|
||||||
|
# having to re-import nixpkgs.
|
||||||
|
zerotierone' = zerotierone.overrideAttrs (_old: { meta = { }; });
|
||||||
|
|
||||||
src = lib.cleanSource ./.;
|
src = lib.cleanSource ./.;
|
||||||
|
|
||||||
@@ -41,8 +45,13 @@ let
|
|||||||
propagatedBuildInputs =
|
propagatedBuildInputs =
|
||||||
dependencies
|
dependencies
|
||||||
++ [ ];
|
++ [ ];
|
||||||
passthru.tests = { inherit clan-black clan-mypy clan-pytest clan-ruff; };
|
passthru.tests = { inherit clan-mypy clan-pytest; };
|
||||||
passthru.devDependencies = devDependencies;
|
passthru.devDependencies = devDependencies;
|
||||||
|
|
||||||
|
makeWrapperArgs = [
|
||||||
|
"--set CLAN_NIXPKGS ${pkgs.path}"
|
||||||
|
];
|
||||||
|
|
||||||
postInstall = ''
|
postInstall = ''
|
||||||
installShellCompletion --bash --name clan \
|
installShellCompletion --bash --name clan \
|
||||||
<(${python3.pkgs.argcomplete}/bin/register-python-argcomplete --shell bash clan)
|
<(${python3.pkgs.argcomplete}/bin/register-python-argcomplete --shell bash clan)
|
||||||
@@ -54,14 +63,6 @@ let
|
|||||||
|
|
||||||
checkPython = python3.withPackages (_ps: devDependencies ++ dependencies);
|
checkPython = python3.withPackages (_ps: devDependencies ++ dependencies);
|
||||||
|
|
||||||
clan-black = runCommand "${name}-black" { } ''
|
|
||||||
cp -r ${src} ./src
|
|
||||||
chmod +w -R ./src
|
|
||||||
cd src
|
|
||||||
${checkPython}/bin/black --check .
|
|
||||||
touch $out
|
|
||||||
'';
|
|
||||||
|
|
||||||
clan-mypy = runCommand "${name}-mypy" { } ''
|
clan-mypy = runCommand "${name}-mypy" { } ''
|
||||||
cp -r ${src} ./src
|
cp -r ${src} ./src
|
||||||
chmod +w -R ./src
|
chmod +w -R ./src
|
||||||
@@ -70,22 +71,15 @@ let
|
|||||||
touch $out
|
touch $out
|
||||||
'';
|
'';
|
||||||
|
|
||||||
clan-pytest = runCommand "${name}-tests" { } ''
|
clan-pytest = runCommand "${name}-tests"
|
||||||
|
{
|
||||||
|
nativeBuildInputs = [ zerotierone' bubblewrap ];
|
||||||
|
} ''
|
||||||
cp -r ${src} ./src
|
cp -r ${src} ./src
|
||||||
chmod +w -R ./src
|
chmod +w -R ./src
|
||||||
cd src
|
cd src
|
||||||
${checkPython}/bin/python -m pytest ./tests \
|
${checkPython}/bin/python -m pytest ./tests
|
||||||
|| echo -e "generate coverage report py running:\n pytest; firefox .reports/html/index.html"
|
|
||||||
touch $out
|
touch $out
|
||||||
'';
|
'';
|
||||||
|
|
||||||
clan-ruff = runCommand "${name}-ruff" { } ''
|
|
||||||
cp -r ${src} ./src
|
|
||||||
chmod +w -R ./src
|
|
||||||
cd src
|
|
||||||
${pkgs.ruff}/bin/ruff check .
|
|
||||||
touch $out
|
|
||||||
'';
|
|
||||||
|
|
||||||
in
|
in
|
||||||
package
|
package
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ dynamic = ["version"]
|
|||||||
scripts = {clan = "clan_cli:main"}
|
scripts = {clan = "clan_cli:main"}
|
||||||
|
|
||||||
[tool.pytest.ini_options]
|
[tool.pytest.ini_options]
|
||||||
addopts = "--cov . --cov-report term --cov-report html:.reports/html --cov-fail-under=100 --no-cov-on-fail"
|
addopts = "--cov . --cov-report term --cov-report html:.reports/html --no-cov-on-fail"
|
||||||
|
|
||||||
[tool.mypy]
|
[tool.mypy]
|
||||||
python_version = "3.10"
|
python_version = "3.10"
|
||||||
|
|||||||
@@ -24,6 +24,7 @@ let
|
|||||||
pythonWithDeps
|
pythonWithDeps
|
||||||
];
|
];
|
||||||
# sets up an editable install and add enty points to $PATH
|
# sets up an editable install and add enty points to $PATH
|
||||||
|
CLAN_NIXPKGS = pkgs.path;
|
||||||
shellHook = ''
|
shellHook = ''
|
||||||
tmp_path=$(realpath ./.pythonenv)
|
tmp_path=$(realpath ./.pythonenv)
|
||||||
repo_root=$(realpath .)
|
repo_root=$(realpath .)
|
||||||
|
|||||||
6
pkgs/clan-cli/tests/test_zerotier.py
Normal file
6
pkgs/clan-cli/tests/test_zerotier.py
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
from clan_cli.zerotier import create_network
|
||||||
|
|
||||||
|
|
||||||
|
def test_create_network() -> None:
|
||||||
|
network = create_network()
|
||||||
|
assert network.network_id
|
||||||
Reference in New Issue
Block a user