netmaker/logic/acls/node-acls/modify.go

101 lines
3.6 KiB
Go
Raw Normal View History

2022-02-24 08:36:48 +08:00
package nodeacls
import (
"encoding/json"
"github.com/gravitl/netmaker/database"
2022-02-25 02:48:35 +08:00
"github.com/gravitl/netmaker/logic/acls"
2022-02-24 08:36:48 +08:00
)
2022-02-25 02:48:35 +08:00
// ChangeNodeACL - takes in two node IDs of a given network and changes them to specified allowed or not value
// returns the total network's ACL and error
func ChangeNodeACL(networkID acls.NetworkID, node1, node2 acls.NodeID, value byte) (acls.NetworkACL, error) {
if value != acls.NotAllowed && value != acls.Allowed { // if invalid option make not allowed
value = acls.NotAllowed
}
currentACL, err := FetchCurrentACL(networkID)
if err != nil {
return nil, err
}
// == make the access control change ==
currentACL[node1][node2] = value
currentACL[node2][node1] = value
return UpsertNetworkACL(networkID, currentACL)
}
// CreateNodeACL - inserts or updates a node ACL on given network
func CreateNodeACL(networkID acls.NetworkID, nodeID acls.NodeID, defaultVal byte) (acls.NodeACL, error) {
if defaultVal != acls.NotAllowed && defaultVal != acls.Allowed {
defaultVal = acls.NotAllowed
2022-02-24 08:36:48 +08:00
}
var currentNetworkACL, err = FetchCurrentACL(networkID)
if err != nil {
return nil, err
}
2022-02-25 02:48:35 +08:00
var newNodeACL = make(acls.NodeACL)
for existingNodeID := range currentNetworkACL {
currentNetworkACL[existingNodeID][nodeID] = defaultVal // set the old nodes to default value for new node
newNodeACL[existingNodeID] = defaultVal // set the old nodes in new node ACL to default value
}
currentNetworkACL[nodeID] = newNodeACL // append the new node's ACL
retNetworkACL, err := UpsertNetworkACL(networkID, currentNetworkACL) // insert into db, return result
if err != nil {
return nil, err
}
return retNetworkACL[nodeID], nil
}
// CreateNetworkACL - creates an empty ACL list in a given network
func CreateNetworkACL(networkID acls.NetworkID) (acls.NetworkACL, error) {
var networkACL = make(acls.NetworkACL)
return networkACL, database.Insert(string(networkID), string(convertNetworkACLtoACLJson(&networkACL)), database.NODE_ACLS_TABLE_NAME)
}
// UpsertNodeACL - applies a NodeACL to the db, overwrites or creates
func UpsertNodeACL(networkID acls.NetworkID, nodeID acls.NodeID, nodeACL acls.NodeACL) (acls.NodeACL, error) {
currentNetACL, err := FetchCurrentACL(networkID)
if err != nil {
return nodeACL, err
2022-02-24 08:36:48 +08:00
}
2022-02-25 02:48:35 +08:00
currentNetACL[nodeID] = nodeACL
_, err = UpsertNetworkACL(networkID, currentNetACL)
return nodeACL, err
2022-02-24 08:36:48 +08:00
}
// UpsertNetworkACL - Inserts or updates a network ACL given the json string of the ACL and the network name
// if nil, create it
2022-02-25 02:48:35 +08:00
func UpsertNetworkACL(networkID acls.NetworkID, networkACL acls.NetworkACL) (acls.NetworkACL, error) {
2022-02-24 08:36:48 +08:00
if networkACL == nil {
2022-02-25 02:48:35 +08:00
networkACL = make(acls.NetworkACL)
2022-02-24 08:36:48 +08:00
}
return networkACL, database.Insert(string(networkID), string(convertNetworkACLtoACLJson(&networkACL)), database.NODE_ACLS_TABLE_NAME)
}
// RemoveNodeACL - removes a specific Node's ACL, returns the NetworkACL and error
2022-02-25 02:48:35 +08:00
func RemoveNodeACL(networkID acls.NetworkID, nodeID acls.NodeID) (acls.NetworkACL, error) {
2022-02-24 08:36:48 +08:00
var currentNeworkACL, err = FetchCurrentACL(networkID)
if err != nil {
return nil, err
}
for currentNodeID := range currentNeworkACL {
2022-02-25 02:48:35 +08:00
if currentNodeID != nodeID {
delete(currentNeworkACL[currentNodeID], nodeID)
}
2022-02-24 08:36:48 +08:00
}
delete(currentNeworkACL, nodeID)
return UpsertNetworkACL(networkID, currentNeworkACL)
}
// RemoveNetworkACL - just delete the network ACL
2022-02-25 02:48:35 +08:00
func RemoveNetworkACL(networkID acls.NetworkID) error {
2022-02-24 08:36:48 +08:00
return database.DeleteRecord(database.NODE_ACLS_TABLE_NAME, string(networkID))
}
2022-02-25 02:48:35 +08:00
func convertNetworkACLtoACLJson(networkACL *acls.NetworkACL) acls.ACLJson {
2022-02-24 08:36:48 +08:00
data, err := json.Marshal(networkACL)
if err != nil {
return ""
}
2022-02-25 02:48:35 +08:00
return acls.ACLJson(data)
2022-02-24 08:36:48 +08:00
}