deprecated ability to edit networks

This commit is contained in:
Matthew R Kasun 2023-04-14 10:39:36 -04:00
parent d604667057
commit 34eb699752
3 changed files with 2 additions and 183 deletions

View file

@ -1,72 +0,0 @@
package network
import (
"encoding/json"
"log"
"os"
"github.com/gravitl/netmaker/cli/functions"
"github.com/gravitl/netmaker/models"
"github.com/spf13/cobra"
)
var networkUpdateCmd = &cobra.Command{
Use: "update [NETWORK NAME]",
Short: "Update a Network",
Long: `Update a Network`,
Args: cobra.ExactArgs(1),
Run: func(cmd *cobra.Command, args []string) {
var (
networkName = args[0]
network = &models.Network{}
)
if networkDefinitionFilePath != "" {
content, err := os.ReadFile(networkDefinitionFilePath)
if err != nil {
log.Fatal("Error when opening file: ", err)
}
if err := json.Unmarshal(content, network); err != nil {
log.Fatal(err)
}
} else {
network.NetID = networkName
network.AddressRange = address
if address6 != "" {
network.AddressRange6 = address6
network.IsIPv6 = "yes"
}
if udpHolePunch {
network.DefaultUDPHolePunch = "yes"
}
if defaultACL {
network.DefaultACL = "yes"
}
network.DefaultInterface = defaultInterface
network.DefaultListenPort = int32(defaultListenPort)
network.NodeLimit = int32(nodeLimit)
network.DefaultKeepalive = int32(defaultKeepalive)
if allowManualSignUp {
network.AllowManualSignUp = "yes"
}
network.DefaultExtClientDNS = defaultExtClientDNS
network.DefaultMTU = int32(defaultMTU)
}
functions.PrettyPrint(functions.UpdateNetwork(networkName, network))
},
}
func init() {
networkUpdateCmd.Flags().StringVar(&networkDefinitionFilePath, "file", "", "Path to network_definition.json")
networkUpdateCmd.Flags().StringVar(&address, "ipv4_addr", "", "IPv4 address of the network")
networkUpdateCmd.Flags().StringVar(&address6, "ipv6_addr", "", "IPv6 address of the network")
networkUpdateCmd.Flags().BoolVar(&udpHolePunch, "udp_hole_punch", false, "Enable UDP Hole Punching ?")
networkUpdateCmd.Flags().BoolVar(&defaultACL, "default_acl", false, "Enable default Access Control List ?")
networkUpdateCmd.Flags().StringVar(&defaultInterface, "interface", "", "Name of the network interface")
networkUpdateCmd.Flags().StringVar(&defaultExtClientDNS, "ext_client_dns", "", "IPv4 address of DNS server to be used by external clients")
networkUpdateCmd.Flags().IntVar(&defaultListenPort, "listen_port", 0, "Default wireguard port each node will attempt to use")
networkUpdateCmd.Flags().IntVar(&nodeLimit, "node_limit", 0, "Maximum number of nodes that can be associated with this network")
networkUpdateCmd.Flags().IntVar(&defaultKeepalive, "keep_alive", 0, "Keep Alive in seconds")
networkUpdateCmd.Flags().IntVar(&defaultMTU, "mtu", 0, "MTU size")
networkUpdateCmd.Flags().BoolVar(&allowManualSignUp, "manual_signup", false, "Allow manual signup ?")
rootCmd.AddCommand(networkUpdateCmd)
}

View file

@ -22,7 +22,6 @@ func networkHandlers(r *mux.Router) {
r.HandleFunc("/api/networks", logic.SecurityCheck(false, http.HandlerFunc(getNetworks))).Methods(http.MethodGet)
r.HandleFunc("/api/networks", logic.SecurityCheck(true, checkFreeTierLimits(networks_l, http.HandlerFunc(createNetwork)))).Methods(http.MethodPost)
r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(getNetwork))).Methods(http.MethodGet)
r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(updateNetwork))).Methods(http.MethodPut)
r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(true, http.HandlerFunc(deleteNetwork))).Methods(http.MethodDelete)
r.HandleFunc("/api/networks/{networkname}/keyupdate", logic.SecurityCheck(true, http.HandlerFunc(keyUpdate))).Methods(http.MethodPost)
// ACLs
@ -142,103 +141,6 @@ func keyUpdate(w http.ResponseWriter, r *http.Request) {
}
}
// swagger:route PUT /api/networks/{networkname} networks updateNetwork
//
// Update a network.
//
// Schemes: https
//
// Security:
// oauth
//
// Responses:
// 200: networkBodyResponse
func updateNetwork(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
var params = mux.Vars(r)
var network models.Network
netname := params["networkname"]
network, err := logic.GetParentNetwork(netname)
if err != nil {
logger.Log(0, r.Header.Get("user"), "failed to get network info: ",
err.Error())
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
}
var newNetwork models.Network
err = json.NewDecoder(r.Body).Decode(&newNetwork)
if err != nil {
logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
err.Error())
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
return
}
rangeupdate4, rangeupdate6, holepunchupdate, groupsDelta, userDelta, err := logic.UpdateNetwork(&network, &newNetwork)
if err != nil {
logger.Log(0, r.Header.Get("user"), "failed to update network: ",
err.Error())
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
return
}
if len(groupsDelta) > 0 {
for _, g := range groupsDelta {
users, err := logic.GetGroupUsers(g)
if err == nil {
for _, user := range users {
logic.AdjustNetworkUserPermissions(&user, &newNetwork)
}
}
}
}
if len(userDelta) > 0 {
for _, uname := range userDelta {
user, err := logic.GetReturnUser(uname)
if err == nil {
logic.AdjustNetworkUserPermissions(&user, &newNetwork)
}
}
}
if rangeupdate4 {
err = logic.UpdateNetworkNodeAddresses(network.NetID)
if err != nil {
logger.Log(0, r.Header.Get("user"),
fmt.Sprintf("failed to update network [%s] ipv4 addresses: %v",
network.NetID, err.Error()))
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
}
}
if rangeupdate6 {
err = logic.UpdateNetworkNodeAddresses6(network.NetID)
if err != nil {
logger.Log(0, r.Header.Get("user"),
fmt.Sprintf("failed to update network [%s] ipv6 addresses: %v",
network.NetID, err.Error()))
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
}
}
if rangeupdate4 || rangeupdate6 || holepunchupdate {
nodes, err := logic.GetNetworkNodes(network.NetID)
if err != nil {
logger.Log(0, r.Header.Get("user"),
fmt.Sprintf("failed to get network [%s] nodes: %v",
network.NetID, err.Error()))
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
}
for _, node := range nodes {
runUpdates(&node, true)
}
}
logger.Log(1, r.Header.Get("user"), "updated network", netname)
w.WriteHeader(http.StatusOK)
json.NewEncoder(w).Encode(newNetwork)
}
// swagger:route PUT /api/networks/{networkname}/acls networks updateNetworkACL
//
// Update a network ACL (Access Control List).

View file

@ -1,20 +1,9 @@
# Netmaker v0.18.6
# Netmaker v0.18.7
## whats new
- no new features
- deprecated editing of network parameters
## whats fixed
- a few ext client/ingress issues
- viewing addresses (UI)
- when deleting an ingress gateway, ext clients are now removed from peers immediately
- ext client peers should be populated immediately after creation
- ext clients no longer reset public key when disabled/enabled
- can delete an ingress without clients
- removed unnecessary host update
- host nat type is now collected from clients
- fix peer update issue where caclulation was happening to frequently
- nm-quick && nm-upgrade
- EMQX image change && api routes
## known issues
- Caddy does not handle netmaker exporter well for EE