mirror of
				https://github.com/gravitl/netmaker.git
				synced 2025-10-31 08:26:23 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			199 lines
		
	
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			199 lines
		
	
	
	
		
			5.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package logic
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/gravitl/netmaker/database"
 | |
| 	"github.com/gravitl/netmaker/logger"
 | |
| 	"github.com/gravitl/netmaker/models"
 | |
| 	"github.com/gravitl/netmaker/servercfg"
 | |
| )
 | |
| 
 | |
| // CreateEgressGateway - creates an egress gateway
 | |
| func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {
 | |
| 	node, err := GetNodeByID(gateway.NodeID)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	host, err := GetHost(node.HostID.String())
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	for i, cidr := range gateway.Ranges {
 | |
| 		normalized, err := NormalizeCIDR(cidr)
 | |
| 		if err != nil {
 | |
| 			return models.Node{}, err
 | |
| 		}
 | |
| 		gateway.Ranges[i] = normalized
 | |
| 
 | |
| 	}
 | |
| 	if host.OS != "linux" && host.OS != "freebsd" { // add in darwin later
 | |
| 		return models.Node{}, errors.New(host.OS + " is unsupported for egress gateways")
 | |
| 	}
 | |
| 	if host.OS == "linux" && host.FirewallInUse == models.FIREWALL_NONE {
 | |
| 		return models.Node{}, errors.New("firewall is not supported for egress gateways")
 | |
| 	}
 | |
| 	if gateway.NatEnabled == "" {
 | |
| 		gateway.NatEnabled = "yes"
 | |
| 	}
 | |
| 	err = ValidateEgressGateway(gateway)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	node.IsEgressGateway = true
 | |
| 	node.EgressGatewayRanges = gateway.Ranges
 | |
| 	node.EgressGatewayNatEnabled = models.ParseBool(gateway.NatEnabled)
 | |
| 	node.EgressGatewayRequest = gateway // store entire request for use when preserving the egress gateway
 | |
| 	node.SetLastModified()
 | |
| 	nodeData, err := json.Marshal(&node)
 | |
| 	if err != nil {
 | |
| 		return node, err
 | |
| 	}
 | |
| 	if err = database.Insert(node.ID.String(), string(nodeData), database.NODES_TABLE_NAME); err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	return node, nil
 | |
| }
 | |
| 
 | |
| // ValidateEgressGateway - validates the egress gateway model
 | |
| func ValidateEgressGateway(gateway models.EgressGatewayRequest) error {
 | |
| 	var err error
 | |
| 
 | |
| 	empty := len(gateway.Ranges) == 0
 | |
| 	if empty {
 | |
| 		err = errors.New("IP Ranges Cannot Be Empty")
 | |
| 	}
 | |
| 	empty = gateway.Interface == ""
 | |
| 	if empty {
 | |
| 		err = errors.New("interface cannot be empty")
 | |
| 	}
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // DeleteEgressGateway - deletes egress from node
 | |
| func DeleteEgressGateway(network, nodeid string) (models.Node, error) {
 | |
| 	node, err := GetNodeByID(nodeid)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	node.IsEgressGateway = false
 | |
| 	node.EgressGatewayRanges = []string{}
 | |
| 	node.EgressGatewayRequest = models.EgressGatewayRequest{} // remove preserved request as the egress gateway is gone
 | |
| 	node.SetLastModified()
 | |
| 
 | |
| 	data, err := json.Marshal(&node)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	if err = database.Insert(node.ID.String(), string(data), database.NODES_TABLE_NAME); err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	return node, nil
 | |
| }
 | |
| 
 | |
| // CreateIngressGateway - creates an ingress gateway
 | |
| func CreateIngressGateway(netid string, nodeid string, failover bool) (models.Node, error) {
 | |
| 
 | |
| 	node, err := GetNodeByID(nodeid)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	host, err := GetHost(node.HostID.String())
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	if host.OS != "linux" {
 | |
| 		return models.Node{}, errors.New("ingress can only be created on linux based node")
 | |
| 	}
 | |
| 	if host.FirewallInUse == models.FIREWALL_NONE {
 | |
| 		return models.Node{}, errors.New("firewall is not supported for ingress gateways")
 | |
| 	}
 | |
| 
 | |
| 	network, err := GetParentNetwork(netid)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	node.IsIngressGateway = true
 | |
| 	node.IngressGatewayRange = network.AddressRange
 | |
| 	node.IngressGatewayRange6 = network.AddressRange6
 | |
| 	node.SetLastModified()
 | |
| 	if failover && servercfg.Is_EE {
 | |
| 		node.Failover = true
 | |
| 	}
 | |
| 	data, err := json.Marshal(&node)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	err = database.Insert(node.ID.String(), string(data), database.NODES_TABLE_NAME)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, err
 | |
| 	}
 | |
| 	err = SetNetworkNodesLastModified(netid)
 | |
| 	return node, err
 | |
| }
 | |
| 
 | |
| // DeleteIngressGateway - deletes an ingress gateway
 | |
| func DeleteIngressGateway(networkName string, nodeid string) (models.Node, bool, error) {
 | |
| 	node, err := GetNodeByID(nodeid)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, false, err
 | |
| 	}
 | |
| 	//host, err := GetHost(node.ID.String())
 | |
| 	//if err != nil {
 | |
| 	//return models.Node{}, false, err
 | |
| 	//}
 | |
| 	//network, err := GetParentNetwork(networkName)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, false, err
 | |
| 	}
 | |
| 	// delete ext clients belonging to ingress gateway
 | |
| 	if err = DeleteGatewayExtClients(node.ID.String(), networkName); err != nil {
 | |
| 		return models.Node{}, false, err
 | |
| 	}
 | |
| 	logger.Log(3, "deleting ingress gateway")
 | |
| 	wasFailover := node.Failover
 | |
| 	node.LastModified = time.Now()
 | |
| 	node.IsIngressGateway = false
 | |
| 	node.IngressGatewayRange = ""
 | |
| 	node.Failover = false
 | |
| 
 | |
| 	//logger.Log(3, "deleting ingress gateway firewall in use is '", host.FirewallInUse, "' and isEgressGateway is", node.IsEgressGateway)
 | |
| 	if node.EgressGatewayRequest.NodeID != "" {
 | |
| 		_, err := CreateEgressGateway(node.EgressGatewayRequest)
 | |
| 		if err != nil {
 | |
| 			logger.Log(0, fmt.Sprintf("failed to create egress gateway on node [%s] on network [%s]: %v",
 | |
| 				node.EgressGatewayRequest.NodeID, node.EgressGatewayRequest.NetID, err))
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	data, err := json.Marshal(&node)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, false, err
 | |
| 	}
 | |
| 	err = database.Insert(node.ID.String(), string(data), database.NODES_TABLE_NAME)
 | |
| 	if err != nil {
 | |
| 		return models.Node{}, wasFailover, err
 | |
| 	}
 | |
| 	err = SetNetworkNodesLastModified(networkName)
 | |
| 	return node, wasFailover, err
 | |
| }
 | |
| 
 | |
| // DeleteGatewayExtClients - deletes ext clients based on gateway (mac) of ingress node and network
 | |
| func DeleteGatewayExtClients(gatewayID string, networkName string) error {
 | |
| 	currentExtClients, err := GetNetworkExtClients(networkName)
 | |
| 	if err != nil && !database.IsEmptyRecord(err) {
 | |
| 		return err
 | |
| 	}
 | |
| 	for _, extClient := range currentExtClients {
 | |
| 		if extClient.IngressGatewayID == gatewayID {
 | |
| 			if err = DeleteExtClient(networkName, extClient.ClientID); err != nil {
 | |
| 				logger.Log(1, "failed to remove ext client", extClient.ClientID)
 | |
| 				continue
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |