Hey all!

Dropping my Webmesh project (https://github.com/webmeshproj/webmesh) again as I’ve just reached a major milestone in my development towards making it a viable product. Webmesh is yet another pass at creating a distributed service/application mesh/VPN using WireGuard. More infoz is on the project website: https://webmeshproj.github.io/

With the new “mesh bridge” capabilities, you can run a bridge node between two or more meshes that serves to forward appropriate traffic between them. It also offers DNS forwarding capabilities to lookup internal names across meshes. This is accomplished by running two or more IPv6 only wireguard interfaces connected to each mesh and sharing routes between them. IPv4 support is planned, but honestly may not even be necessary. You can see a reference example/playground here: https://github.com/webmeshproj/webmesh/tree/main/examples/mesh-to-mesh

Excited for your feedback :)

    • @tinyzimmerOP
      link
      11
      edit-2
      10 months ago

      It’s extremely similar to Tailscale, and they are a major source of inspiration for a lot of the functionality.

      The main difference is I am using a controller-less setup where each node maintains the state of their mesh via raft consensus. If a controller server goes down, another node will pick up the leader responsibilities. When requests come in that need to mutate network state, nodes will automatically forward the request to the leader node for you.

      So kinda like a Tailscale - where you can disconnect and branch off at any time. Think…federated networks.

    • @tinyzimmerOP
      link
      110 months ago

      Maybe? Quite possibly it seems. I’m not famiilar with it too much.

  • @[email protected]
    link
    fedilink
    110 months ago

    Very neat! Definitely a project I’d like to follow.

    Makes me wonder if something similar could be implemented using frr, ospf, and ansible.

    • @tinyzimmerOP
      link
      110 months ago

      Almost certainly. At its core - everything happening could be accomplished with just regular configuration files. It’s just a suite around maintaining the state basically.

      I was considering adding FRR or BGP to the mix at some point - but it hasn’t proven necessary yet.