mirror of
https://github.com/gravitl/netmaker.git
synced 2025-11-21 17:48:57 +08:00
94 lines
3.6 KiB
Go
94 lines
3.6 KiB
Go
package controller
|
|
|
|
import (
|
|
"net/http"
|
|
)
|
|
|
|
// swagger:route PUT /api/nodes/{network}/{nodeid}/migrate nodes migrateNode
|
|
//
|
|
// Used to migrate a legacy node.
|
|
//
|
|
// Schemes: https
|
|
//
|
|
// Security:
|
|
// oauth
|
|
//
|
|
// Responses:
|
|
// 200: nodeJoinResponse
|
|
func migrate(w http.ResponseWriter, r *http.Request) {
|
|
// TODO adapt with enrollment-keys or re-think how this works
|
|
// we decode our body request params
|
|
// data := models.MigrationData{}
|
|
// err := json.NewDecoder(r.Body).Decode(&data)
|
|
// if err != nil {
|
|
// logger.Log(0, r.Header.Get("user"), "error decoding request body: ", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// params := mux.Vars(r)
|
|
// //check authorization
|
|
// record, err := database.FetchRecord(database.NODES_TABLE_NAME, data.LegacyNodeID)
|
|
// if err != nil {
|
|
// logger.Log(0, "no record for legacy node", data.LegacyNodeID, err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// var legacyNode models.LegacyNode
|
|
// if err = json.Unmarshal([]byte(record), &legacyNode); err != nil {
|
|
// logger.Log(0, "error decoding legacy node", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// if err := bcrypt.CompareHashAndPassword([]byte(legacyNode.Password), []byte(data.Password)); err != nil {
|
|
// logger.Log(0, "error decoding legacy password", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "unauthorized"))
|
|
// return
|
|
// }
|
|
// network, err := logic.GetNetwork(params["network"])
|
|
// if err != nil {
|
|
// logger.Log(0, "error retrieving network: ", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// key, err := logic.CreateAccessKey(models.AccessKey{}, network)
|
|
// if err != nil {
|
|
// logger.Log(0, "error creating key: ", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// data.JoinData.Key = key.Value
|
|
// payload, err := json.Marshal(data.JoinData)
|
|
// if err != nil {
|
|
// logger.Log(0, "error encoding data: ", err.Error())
|
|
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
// return
|
|
// }
|
|
// r.Body = io.NopCloser(strings.NewReader(string(payload)))
|
|
// r.ContentLength = int64(len(string(payload)))
|
|
// logger.Log(3, "deleteing legacy node", data.LegacyNodeID, legacyNode.ID, legacyNode.Name)
|
|
// if err := database.DeleteRecord(database.NODES_TABLE_NAME, data.LegacyNodeID); err != nil {
|
|
// logger.Log(0, "error deleting legacy node", legacyNode.Name, err.Error())
|
|
// }
|
|
// // createNode(w, r) should not have been tied to another handler func
|
|
// //newly created node has same node id as legacy node allowing using legacyNode.ID in gateway creation
|
|
// logger.Log(3, "re-creating legacy gateways")
|
|
// if legacyNode.IsIngressGateway == "yes" {
|
|
// if _, err := logic.CreateIngressGateway(legacyNode.Network, legacyNode.ID, false); err != nil {
|
|
// logger.Log(0, "error creating ingress gateway during migration", err.Error())
|
|
// }
|
|
// }
|
|
// if legacyNode.IsEgressGateway == "yes" {
|
|
// if _, err := logic.CreateEgressGateway(legacyNode.EgressGatewayRequest); err != nil {
|
|
// logger.Log(0, "error creating egress gateway during migration", err.Error())
|
|
// }
|
|
// }
|
|
// if legacyNode.IsRelay == "yes" {
|
|
// if _, _, err := logic.CreateRelay(models.RelayRequest{
|
|
// NodeID: legacyNode.ID,
|
|
// NetID: legacyNode.Network,
|
|
// RelayAddrs: legacyNode.RelayAddrs,
|
|
// }); err != nil {
|
|
// logger.Log(0, "error creating relay during migration", err.Error())
|
|
// }
|
|
// }
|
|
}
|