feat(cells): fix PIC-to-PIC connection + add service-sharing permissions
Phase 1 — connection fixes:
- routing_manager.stop(): remove iptables -F / -t nat -F nuclear flush that
would wipe WireGuard MASQUERADE and all peer rules on any UI stop action
- wireguard_manager.add_cell_peer(): reject vpn_subnet that overlaps the local
WG network (routing blackhole — was the root cause of no handshake)
- wireguard_manager._syncconf(): pass Endpoint to 'wg set' so cell peers with
static endpoints are synced to the kernel (not just AllowedIPs)
Phase 2 — service-sharing permissions backend:
- firewall_manager: add _cell_tag(), clear_cell_rules(), apply_cell_rules(),
apply_all_cell_rules() — iptables FORWARD rules for cell-to-cell traffic
using 'pic-cell-<name>' comment tags, distinct from 'pic-peer-*'
- app.py startup enforcement: call apply_all_cell_rules(cell_links) so rules
survive API restarts
- cell_link_manager: permissions schema {inbound, outbound} per service;
lazy migration for existing entries; update_permissions(), get_permissions();
apply_cell_rules wired into add_connection/remove_connection
- routes/cells.py: GET /api/cells/services, GET+PUT /api/cells/<n>/permissions;
RuntimeError now returns 400 (not 500) from add_connection
Removed broken 'test' cell (subnet 10.0.0.0/24 collided with local WG network).
Second PIC must use a distinct subnet (e.g. 10.0.1.0/24) before reconnecting.
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -5,6 +5,7 @@ CellLinkManager — manages site-to-site connections between PIC cells.
|
||||
Each connection is stored in data/cell_links.json and manifests as:
|
||||
- A WireGuard [Peer] block (AllowedIPs = remote cell's VPN subnet)
|
||||
- A CoreDNS forwarding block (remote domain → remote cell's DNS IP)
|
||||
- An iptables FORWARD rule set (service-level access control)
|
||||
"""
|
||||
|
||||
import os
|
||||
@@ -15,6 +16,20 @@ from typing import Any, Dict, List, Optional
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
VALID_SERVICES = ('calendar', 'files', 'mail', 'webdav')
|
||||
|
||||
_DEFAULT_PERMISSIONS = {
|
||||
'inbound': {s: False for s in VALID_SERVICES},
|
||||
'outbound': {s: False for s in VALID_SERVICES},
|
||||
}
|
||||
|
||||
|
||||
def _default_perms() -> Dict[str, Any]:
|
||||
return {
|
||||
'inbound': {s: False for s in VALID_SERVICES},
|
||||
'outbound': {s: False for s in VALID_SERVICES},
|
||||
}
|
||||
|
||||
|
||||
class CellLinkManager:
|
||||
def __init__(self, data_dir: str, config_dir: str, wireguard_manager, network_manager):
|
||||
@@ -30,7 +45,16 @@ class CellLinkManager:
|
||||
if os.path.exists(self.links_file):
|
||||
try:
|
||||
with open(self.links_file) as f:
|
||||
return json.load(f)
|
||||
links = json.load(f)
|
||||
# Lazy migration: inject permissions field if missing
|
||||
changed = False
|
||||
for link in links:
|
||||
if 'permissions' not in link:
|
||||
link['permissions'] = _default_perms()
|
||||
changed = True
|
||||
if changed:
|
||||
self._save(links)
|
||||
return links
|
||||
except Exception:
|
||||
return []
|
||||
return []
|
||||
@@ -59,8 +83,13 @@ class CellLinkManager:
|
||||
def list_connections(self) -> List[Dict[str, Any]]:
|
||||
return self._load()
|
||||
|
||||
def add_connection(self, invite: Dict[str, Any]) -> Dict[str, Any]:
|
||||
"""Import a remote cell's invite and establish the connection."""
|
||||
def add_connection(self, invite: Dict[str, Any],
|
||||
inbound_services: Optional[List[str]] = None) -> Dict[str, Any]:
|
||||
"""Import a remote cell's invite and establish the connection.
|
||||
|
||||
inbound_services: which of THIS cell's services to share with the remote
|
||||
cell immediately. Defaults to none (all-deny).
|
||||
"""
|
||||
links = self._load()
|
||||
name = invite['cell_name']
|
||||
if any(l['cell_name'] == name for l in links):
|
||||
@@ -82,6 +111,11 @@ class CellLinkManager:
|
||||
if dns_result.get('warnings'):
|
||||
logger.warning('DNS forward warnings for %s: %s', name, dns_result['warnings'])
|
||||
|
||||
inbound = [s for s in (inbound_services or []) if s in VALID_SERVICES]
|
||||
perms = _default_perms()
|
||||
for s in inbound:
|
||||
perms['inbound'][s] = True
|
||||
|
||||
link = {
|
||||
'cell_name': name,
|
||||
'public_key': invite['public_key'],
|
||||
@@ -90,9 +124,18 @@ class CellLinkManager:
|
||||
'dns_ip': invite['dns_ip'],
|
||||
'domain': invite['domain'],
|
||||
'connected_at': datetime.utcnow().isoformat(),
|
||||
'permissions': perms,
|
||||
}
|
||||
links.append(link)
|
||||
self._save(links)
|
||||
|
||||
# Apply iptables rules for the new cell (non-fatal if it fails)
|
||||
try:
|
||||
import firewall_manager as _fm
|
||||
_fm.apply_cell_rules(name, invite['vpn_subnet'], inbound)
|
||||
except Exception as e:
|
||||
logger.warning(f"apply_cell_rules for {name} failed (non-fatal): {e}")
|
||||
|
||||
return link
|
||||
|
||||
def remove_connection(self, cell_name: str):
|
||||
@@ -102,12 +145,56 @@ class CellLinkManager:
|
||||
if not link:
|
||||
raise ValueError(f"Cell '{cell_name}' not found")
|
||||
|
||||
# Clear firewall rules first (non-fatal)
|
||||
try:
|
||||
import firewall_manager as _fm
|
||||
_fm.clear_cell_rules(cell_name)
|
||||
except Exception as e:
|
||||
logger.warning(f"clear_cell_rules for {cell_name} failed (non-fatal): {e}")
|
||||
|
||||
self.wireguard_manager.remove_peer(link['public_key'])
|
||||
self.network_manager.remove_cell_dns_forward(link['domain'])
|
||||
|
||||
links = [l for l in links if l['cell_name'] != cell_name]
|
||||
self._save(links)
|
||||
|
||||
def update_permissions(self, cell_name: str,
|
||||
inbound: Dict[str, bool],
|
||||
outbound: Dict[str, bool]) -> Dict[str, Any]:
|
||||
"""Update service sharing permissions for a cell connection.
|
||||
|
||||
Validates service names, persists, and re-applies iptables rules.
|
||||
Returns the updated link record.
|
||||
"""
|
||||
links = self._load()
|
||||
link = next((l for l in links if l['cell_name'] == cell_name), None)
|
||||
if not link:
|
||||
raise ValueError(f"Cell '{cell_name}' not found")
|
||||
|
||||
# Validate and normalise — only known services, boolean values
|
||||
clean_inbound = {s: bool(inbound.get(s, False)) for s in VALID_SERVICES}
|
||||
clean_outbound = {s: bool(outbound.get(s, False)) for s in VALID_SERVICES}
|
||||
link['permissions'] = {'inbound': clean_inbound, 'outbound': clean_outbound}
|
||||
self._save(links)
|
||||
|
||||
# Re-apply firewall rules
|
||||
inbound_list = [s for s, v in clean_inbound.items() if v]
|
||||
try:
|
||||
import firewall_manager as _fm
|
||||
_fm.apply_cell_rules(cell_name, link['vpn_subnet'], inbound_list)
|
||||
except Exception as e:
|
||||
logger.warning(f"apply_cell_rules for {cell_name} failed (non-fatal): {e}")
|
||||
|
||||
return link
|
||||
|
||||
def get_permissions(self, cell_name: str) -> Dict[str, Any]:
|
||||
"""Return the permissions dict for a connected cell."""
|
||||
links = self._load()
|
||||
link = next((l for l in links if l['cell_name'] == cell_name), None)
|
||||
if not link:
|
||||
raise ValueError(f"Cell '{cell_name}' not found")
|
||||
return link.get('permissions', _default_perms())
|
||||
|
||||
def get_connection_status(self, cell_name: str) -> Dict[str, Any]:
|
||||
"""Return link record enriched with live WireGuard handshake status."""
|
||||
links = self._load()
|
||||
|
||||
Reference in New Issue
Block a user