netmaker/controllers/migrate.go
2023-03-13 16:02:44 -04:00

94 lines
3.6 KiB
Go

package controller
import (
"net/http"
)
// swagger:route PUT /api/nodes/{network}/{nodeid}/migrate nodes migrateNode
//
// Used to migrate a legacy node.
//
// Schemes: https
//
// Security:
// oauth
//
// Responses:
// 200: nodeJoinResponse
func migrate(w http.ResponseWriter, r *http.Request) {
// TODO adapt with enrollment-keys or re-think how this works
// we decode our body request params
// data := models.MigrationData{}
// err := json.NewDecoder(r.Body).Decode(&data)
// if err != nil {
// logger.Log(0, r.Header.Get("user"), "error decoding request body: ", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// params := mux.Vars(r)
// //check authorization
// record, err := database.FetchRecord(database.NODES_TABLE_NAME, data.LegacyNodeID)
// if err != nil {
// logger.Log(0, "no record for legacy node", data.LegacyNodeID, err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// var legacyNode models.LegacyNode
// if err = json.Unmarshal([]byte(record), &legacyNode); err != nil {
// logger.Log(0, "error decoding legacy node", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// if err := bcrypt.CompareHashAndPassword([]byte(legacyNode.Password), []byte(data.Password)); err != nil {
// logger.Log(0, "error decoding legacy password", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "unauthorized"))
// return
// }
// network, err := logic.GetNetwork(params["network"])
// if err != nil {
// logger.Log(0, "error retrieving network: ", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// key, err := logic.CreateAccessKey(models.AccessKey{}, network)
// if err != nil {
// logger.Log(0, "error creating key: ", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// data.JoinData.Key = key.Value
// payload, err := json.Marshal(data.JoinData)
// if err != nil {
// logger.Log(0, "error encoding data: ", err.Error())
// logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
// return
// }
// r.Body = io.NopCloser(strings.NewReader(string(payload)))
// r.ContentLength = int64(len(string(payload)))
// logger.Log(3, "deleteing legacy node", data.LegacyNodeID, legacyNode.ID, legacyNode.Name)
// if err := database.DeleteRecord(database.NODES_TABLE_NAME, data.LegacyNodeID); err != nil {
// logger.Log(0, "error deleting legacy node", legacyNode.Name, err.Error())
// }
// // createNode(w, r) should not have been tied to another handler func
// //newly created node has same node id as legacy node allowing using legacyNode.ID in gateway creation
// logger.Log(3, "re-creating legacy gateways")
// if legacyNode.IsIngressGateway == "yes" {
// if _, err := logic.CreateIngressGateway(legacyNode.Network, legacyNode.ID, false); err != nil {
// logger.Log(0, "error creating ingress gateway during migration", err.Error())
// }
// }
// if legacyNode.IsEgressGateway == "yes" {
// if _, err := logic.CreateEgressGateway(legacyNode.EgressGatewayRequest); err != nil {
// logger.Log(0, "error creating egress gateway during migration", err.Error())
// }
// }
// if legacyNode.IsRelay == "yes" {
// if _, _, err := logic.CreateRelay(models.RelayRequest{
// NodeID: legacyNode.ID,
// NetID: legacyNode.Network,
// RelayAddrs: legacyNode.RelayAddrs,
// }); err != nil {
// logger.Log(0, "error creating relay during migration", err.Error())
// }
// }
}