mirror of
https://github.com/gravitl/netmaker.git
synced 2025-09-04 04:04:17 +08:00
* feat: api access tokens
* revoke all user tokens
* redefine access token api routes, add auto egress option to enrollment keys
* add server settings apis, add db table for settigs
* handle server settings updates
* switch to using settings from DB
* fix sever settings migration
* revet force migration for settings
* fix server settings database write
* egress model
* fix revoked tokens to be unauthorized
* update egress model
* remove unused functions
* convert access token to sql schema
* switch access token to sql schema
* fix merge conflicts
* fix server settings types
* bypass basic auth setting for super admin
* add TODO comment
* setup api handlers for egress revamp
* use single DB, fix update nat boolean field
* extend validaiton checks for egress ranges
* add migration to convert to new egress model
* fix panic interface conversion
* publish peer update on settings update
* revoke token generated by an user
* add user token creation restriction by user role
* add forbidden check for access token creation
* revoke user token when group or role is changed
* add default group to admin users on update
* chore(go): import style changes from migration branch;
1. Singular file names for table schema.
2. No table name method.
3. Use .Model instead of .Table.
4. No unnecessary tagging.
* remove nat check on egress gateway request
* Revert "remove nat check on egress gateway request"
This reverts commit 0aff12a189
.
* remove nat check on egress gateway request
* feat(go): add db middleware;
* feat(go): restore method;
* feat(go): add user access token schema;
* add inet gw status to egress model
* fetch node ids in the tag, add inet gw info clients
* add inet gw info to node from egress list
* add migration logic internet gws
* create default acl policies
* add egress info
* add egress TODO
* add egress TODO
* fix user auth api:
* add reference id to acl policy
* add egress response from DB
* publish peer update on egress changes
* re initalise oauth and email config
* set verbosity
* normalise cidr on egress req
* add egress id to acl group
* change acls to use egress id
* resolve merge conflicts
* fix egress reference errors
* move egress model to schema
* add api context to DB
* sync auto update settings with hosts
* sync auto update settings with hosts
* check acl for egress node
* check for egress policy in the acl dst groups
* fix acl rules for egress policies with new models
* add status to egress model
* fix inet node func
* mask secret and convert jwt duration to minutes
* enable egress policies on creation
* convert jwt duration to minutes
* add relevant ranges to inet egress
* skip non active egress routes
* resolve merge conflicts
* fix static check
* update gorm tag for primary key on egress model
* create user policies for egress resources
* resolve merge conflicts
* get egress info on failover apis, add egress src validation for inet gws
* add additional validation checks on egress req
* add additional validation checks on egress req
* skip all resources for inet policy
* delete associated egress acl policies
* fix failover of inetclient
* avoid setting inet client asd inet gw
* fix all resource egress policy
* fix inet gw egress rule
* check for node egress on relay req
* fix egress acl rules comms
* add new field for egress info on node
* check acl policy in failover ctx
* avoid default host to be set as inet client
* fix relayed egress node
* add valid error messaging for egress validate func
* return if inet default host
* jump port detection to 51821
* check host ports on pull
* check user access gws via acls
* add validation check for default host and failover for inet clients
* add error messaging for acl policy check
* fix inet gw status
* ignore failover req for peer using inet gw
* check for allowed egress ranges for a peer
* add egress routes to static nodes by access
* avoid setting failvoer as inet client
* fix egress error messaging
* fix extclients egress comms
* fix inet gw acting as inet client
* return formatted error on update acl validation
* add default route for static nodes on inetclient
* check relay node acting as inetclient
* move inet node info to separate field, fix all resouces policy
* remove debug logs
---------
Co-authored-by: Vishal Dalwadi <dalwadivishal26@gmail.com>
758 lines
19 KiB
Go
758 lines
19 KiB
Go
package logic
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"sort"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/c-robinson/iplib"
|
|
validator "github.com/go-playground/validator/v10"
|
|
"github.com/google/uuid"
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic/acls/nodeacls"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"github.com/gravitl/netmaker/validation"
|
|
"golang.org/x/exp/slog"
|
|
)
|
|
|
|
var (
|
|
networkCacheMutex = &sync.RWMutex{}
|
|
networkCacheMap = make(map[string]models.Network)
|
|
allocatedIpMap = make(map[string]map[string]net.IP)
|
|
)
|
|
|
|
// SetAllocatedIpMap - set allocated ip map for networks
|
|
func SetAllocatedIpMap() error {
|
|
if !servercfg.CacheEnabled() {
|
|
return nil
|
|
}
|
|
logger.Log(0, "start setting up allocated ip map")
|
|
if allocatedIpMap == nil {
|
|
allocatedIpMap = map[string]map[string]net.IP{}
|
|
}
|
|
|
|
currentNetworks, err := GetNetworks()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, v := range currentNetworks {
|
|
pMap := map[string]net.IP{}
|
|
netName := v.NetID
|
|
|
|
//nodes
|
|
nodes, err := GetNetworkNodes(netName)
|
|
if err != nil {
|
|
slog.Error("could not load node for network", netName, "error", err.Error())
|
|
} else {
|
|
for _, n := range nodes {
|
|
|
|
if n.Address.IP != nil {
|
|
pMap[n.Address.IP.String()] = n.Address.IP
|
|
}
|
|
if n.Address6.IP != nil {
|
|
pMap[n.Address6.IP.String()] = n.Address6.IP
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
//extClients
|
|
extClients, err := GetNetworkExtClients(netName)
|
|
if err != nil {
|
|
slog.Error("could not load extClient for network", netName, "error", err.Error())
|
|
} else {
|
|
for _, extClient := range extClients {
|
|
if extClient.Address != "" {
|
|
pMap[extClient.Address] = net.ParseIP(extClient.Address)
|
|
}
|
|
if extClient.Address6 != "" {
|
|
pMap[extClient.Address6] = net.ParseIP(extClient.Address6)
|
|
}
|
|
}
|
|
}
|
|
|
|
allocatedIpMap[netName] = pMap
|
|
}
|
|
logger.Log(0, "setting up allocated ip map done")
|
|
return nil
|
|
}
|
|
|
|
// ClearAllocatedIpMap - set allocatedIpMap to nil
|
|
func ClearAllocatedIpMap() {
|
|
if !servercfg.CacheEnabled() {
|
|
return
|
|
}
|
|
allocatedIpMap = nil
|
|
}
|
|
|
|
func AddIpToAllocatedIpMap(networkName string, ip net.IP) {
|
|
if !servercfg.CacheEnabled() {
|
|
return
|
|
}
|
|
networkCacheMutex.Lock()
|
|
allocatedIpMap[networkName][ip.String()] = ip
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
func RemoveIpFromAllocatedIpMap(networkName string, ip string) {
|
|
if !servercfg.CacheEnabled() {
|
|
return
|
|
}
|
|
networkCacheMutex.Lock()
|
|
delete(allocatedIpMap[networkName], ip)
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
// AddNetworkToAllocatedIpMap - add network to allocated ip map when network is added
|
|
func AddNetworkToAllocatedIpMap(networkName string) {
|
|
//add new network to allocated ip map
|
|
if !servercfg.CacheEnabled() {
|
|
return
|
|
}
|
|
networkCacheMutex.Lock()
|
|
allocatedIpMap[networkName] = make(map[string]net.IP)
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
// RemoveNetworkFromAllocatedIpMap - remove network from allocated ip map when network is deleted
|
|
func RemoveNetworkFromAllocatedIpMap(networkName string) {
|
|
if !servercfg.CacheEnabled() {
|
|
return
|
|
}
|
|
networkCacheMutex.Lock()
|
|
delete(allocatedIpMap, networkName)
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
func getNetworksFromCache() (networks []models.Network) {
|
|
networkCacheMutex.RLock()
|
|
for _, network := range networkCacheMap {
|
|
networks = append(networks, network)
|
|
}
|
|
networkCacheMutex.RUnlock()
|
|
return
|
|
}
|
|
|
|
func deleteNetworkFromCache(key string) {
|
|
networkCacheMutex.Lock()
|
|
delete(networkCacheMap, key)
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
func getNetworkFromCache(key string) (network models.Network, ok bool) {
|
|
networkCacheMutex.RLock()
|
|
network, ok = networkCacheMap[key]
|
|
networkCacheMutex.RUnlock()
|
|
return
|
|
}
|
|
|
|
func storeNetworkInCache(key string, network models.Network) {
|
|
networkCacheMutex.Lock()
|
|
networkCacheMap[key] = network
|
|
networkCacheMutex.Unlock()
|
|
}
|
|
|
|
// GetNetworks - returns all networks from database
|
|
func GetNetworks() ([]models.Network, error) {
|
|
var networks []models.Network
|
|
if servercfg.CacheEnabled() {
|
|
networks := getNetworksFromCache()
|
|
if len(networks) != 0 {
|
|
return networks, nil
|
|
}
|
|
}
|
|
collection, err := database.FetchRecords(database.NETWORKS_TABLE_NAME)
|
|
if err != nil {
|
|
return networks, err
|
|
}
|
|
|
|
for _, value := range collection {
|
|
var network models.Network
|
|
if err := json.Unmarshal([]byte(value), &network); err != nil {
|
|
return networks, err
|
|
}
|
|
// add network our array
|
|
networks = append(networks, network)
|
|
if servercfg.CacheEnabled() {
|
|
storeNetworkInCache(network.NetID, network)
|
|
}
|
|
}
|
|
|
|
return networks, err
|
|
}
|
|
|
|
// DeleteNetwork - deletes a network
|
|
func DeleteNetwork(network string, force bool, done chan struct{}) error {
|
|
|
|
nodeCount, err := GetNetworkNonServerNodeCount(network)
|
|
if nodeCount == 0 || database.IsEmptyRecord(err) {
|
|
// delete server nodes first then db records
|
|
err = database.DeleteRecord(database.NETWORKS_TABLE_NAME, network)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
deleteNetworkFromCache(network)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Remove All Nodes
|
|
go func() {
|
|
nodes, err := GetNetworkNodes(network)
|
|
if err == nil {
|
|
for _, node := range nodes {
|
|
node := node
|
|
host, err := GetHost(node.HostID.String())
|
|
if err != nil {
|
|
continue
|
|
}
|
|
DissasociateNodeFromHost(&node, host)
|
|
}
|
|
}
|
|
// remove ACL for network
|
|
err = nodeacls.DeleteACLContainer(nodeacls.NetworkID(network))
|
|
if err != nil {
|
|
logger.Log(1, "failed to remove the node acls during network delete for network,", network)
|
|
}
|
|
// delete server nodes first then db records
|
|
err = database.DeleteRecord(database.NETWORKS_TABLE_NAME, network)
|
|
if err != nil {
|
|
return
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
deleteNetworkFromCache(network)
|
|
}
|
|
done <- struct{}{}
|
|
close(done)
|
|
}()
|
|
|
|
// Delete default network enrollment key
|
|
keys, _ := GetAllEnrollmentKeys()
|
|
for _, key := range keys {
|
|
if key.Tags[0] == network {
|
|
if key.Default {
|
|
DeleteEnrollmentKey(key.Value, true)
|
|
break
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateNetwork - creates a network in database
|
|
func CreateNetwork(network models.Network) (models.Network, error) {
|
|
|
|
if network.AddressRange != "" {
|
|
normalizedRange, err := NormalizeCIDR(network.AddressRange)
|
|
if err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
network.AddressRange = normalizedRange
|
|
}
|
|
if network.AddressRange6 != "" {
|
|
normalizedRange, err := NormalizeCIDR(network.AddressRange6)
|
|
if err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
network.AddressRange6 = normalizedRange
|
|
}
|
|
if !IsNetworkCIDRUnique(network.GetNetworkNetworkCIDR4(), network.GetNetworkNetworkCIDR6()) {
|
|
return models.Network{}, errors.New("network cidr already in use")
|
|
}
|
|
|
|
network.SetDefaults()
|
|
network.SetNodesLastModified()
|
|
network.SetNetworkLastModified()
|
|
|
|
err := ValidateNetwork(&network, false)
|
|
if err != nil {
|
|
//logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
|
|
return models.Network{}, err
|
|
}
|
|
|
|
data, err := json.Marshal(&network)
|
|
if err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
|
|
if err = database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNetworkInCache(network.NetID, network)
|
|
}
|
|
|
|
_, _ = CreateEnrollmentKey(
|
|
0,
|
|
time.Time{},
|
|
[]string{network.NetID},
|
|
[]string{network.NetID},
|
|
[]models.TagID{},
|
|
true,
|
|
uuid.Nil,
|
|
true,
|
|
false,
|
|
)
|
|
|
|
return network, nil
|
|
}
|
|
|
|
// GetNetworkNonServerNodeCount - get number of network non server nodes
|
|
func GetNetworkNonServerNodeCount(networkName string) (int, error) {
|
|
nodes, err := GetNetworkNodes(networkName)
|
|
return len(nodes), err
|
|
}
|
|
|
|
func IsNetworkCIDRUnique(cidr4 *net.IPNet, cidr6 *net.IPNet) bool {
|
|
networks, err := GetNetworks()
|
|
if err != nil {
|
|
return database.IsEmptyRecord(err)
|
|
}
|
|
for _, network := range networks {
|
|
if intersect(network.GetNetworkNetworkCIDR4(), cidr4) ||
|
|
intersect(network.GetNetworkNetworkCIDR6(), cidr6) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func intersect(n1, n2 *net.IPNet) bool {
|
|
if n1 == nil || n2 == nil {
|
|
return false
|
|
}
|
|
return n2.Contains(n1.IP) || n1.Contains(n2.IP)
|
|
}
|
|
|
|
// GetParentNetwork - get parent network
|
|
func GetParentNetwork(networkname string) (models.Network, error) {
|
|
|
|
var network models.Network
|
|
if servercfg.CacheEnabled() {
|
|
if network, ok := getNetworkFromCache(networkname); ok {
|
|
return network, nil
|
|
}
|
|
}
|
|
networkData, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, networkname)
|
|
if err != nil {
|
|
return network, err
|
|
}
|
|
if err = json.Unmarshal([]byte(networkData), &network); err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
return network, nil
|
|
}
|
|
|
|
// GetNetworkSettings - get parent network
|
|
func GetNetworkSettings(networkname string) (models.Network, error) {
|
|
|
|
var network models.Network
|
|
if servercfg.CacheEnabled() {
|
|
if network, ok := getNetworkFromCache(networkname); ok {
|
|
return network, nil
|
|
}
|
|
}
|
|
networkData, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, networkname)
|
|
if err != nil {
|
|
return network, err
|
|
}
|
|
if err = json.Unmarshal([]byte(networkData), &network); err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
return network, nil
|
|
}
|
|
|
|
// UniqueAddress - get a unique ipv4 address
|
|
func UniqueAddressCache(networkName string, reverse bool) (net.IP, error) {
|
|
add := net.IP{}
|
|
var network models.Network
|
|
network, err := GetParentNetwork(networkName)
|
|
if err != nil {
|
|
logger.Log(0, "UniqueAddressServer encountered an error")
|
|
return add, err
|
|
}
|
|
|
|
if network.IsIPv4 == "no" {
|
|
return add, fmt.Errorf("IPv4 not active on network " + networkName)
|
|
}
|
|
//ensure AddressRange is valid
|
|
if _, _, err := net.ParseCIDR(network.AddressRange); err != nil {
|
|
logger.Log(0, "UniqueAddress encountered an error")
|
|
return add, err
|
|
}
|
|
net4 := iplib.Net4FromStr(network.AddressRange)
|
|
newAddrs := net4.FirstAddress()
|
|
|
|
if reverse {
|
|
newAddrs = net4.LastAddress()
|
|
}
|
|
|
|
ipAllocated := allocatedIpMap[networkName]
|
|
for {
|
|
if _, ok := ipAllocated[newAddrs.String()]; !ok {
|
|
return newAddrs, nil
|
|
}
|
|
if reverse {
|
|
newAddrs, err = net4.PreviousIP(newAddrs)
|
|
} else {
|
|
newAddrs, err = net4.NextIP(newAddrs)
|
|
}
|
|
if err != nil {
|
|
break
|
|
}
|
|
}
|
|
|
|
return add, errors.New("ERROR: No unique addresses available. Check network subnet")
|
|
}
|
|
|
|
// UniqueAddress - get a unique ipv4 address
|
|
func UniqueAddressDB(networkName string, reverse bool) (net.IP, error) {
|
|
add := net.IP{}
|
|
var network models.Network
|
|
network, err := GetParentNetwork(networkName)
|
|
if err != nil {
|
|
logger.Log(0, "UniqueAddressServer encountered an error")
|
|
return add, err
|
|
}
|
|
|
|
if network.IsIPv4 == "no" {
|
|
return add, fmt.Errorf("IPv4 not active on network " + networkName)
|
|
}
|
|
//ensure AddressRange is valid
|
|
if _, _, err := net.ParseCIDR(network.AddressRange); err != nil {
|
|
logger.Log(0, "UniqueAddress encountered an error")
|
|
return add, err
|
|
}
|
|
net4 := iplib.Net4FromStr(network.AddressRange)
|
|
newAddrs := net4.FirstAddress()
|
|
|
|
if reverse {
|
|
newAddrs = net4.LastAddress()
|
|
}
|
|
|
|
for {
|
|
if IsIPUnique(networkName, newAddrs.String(), database.NODES_TABLE_NAME, false) &&
|
|
IsIPUnique(networkName, newAddrs.String(), database.EXT_CLIENT_TABLE_NAME, false) {
|
|
return newAddrs, nil
|
|
}
|
|
if reverse {
|
|
newAddrs, err = net4.PreviousIP(newAddrs)
|
|
} else {
|
|
newAddrs, err = net4.NextIP(newAddrs)
|
|
}
|
|
if err != nil {
|
|
break
|
|
}
|
|
}
|
|
|
|
return add, errors.New("ERROR: No unique addresses available. Check network subnet")
|
|
}
|
|
|
|
// IsIPUnique - checks if an IP is unique
|
|
func IsIPUnique(network string, ip string, tableName string, isIpv6 bool) bool {
|
|
|
|
isunique := true
|
|
if tableName == database.NODES_TABLE_NAME {
|
|
nodes, err := GetNetworkNodes(network)
|
|
if err != nil {
|
|
return isunique
|
|
}
|
|
for _, node := range nodes {
|
|
if isIpv6 {
|
|
if node.Address6.IP.String() == ip && node.Network == network {
|
|
return false
|
|
}
|
|
} else {
|
|
if node.Address.IP.String() == ip && node.Network == network {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
|
|
} else if tableName == database.EXT_CLIENT_TABLE_NAME {
|
|
|
|
extClients, err := GetNetworkExtClients(network)
|
|
if err != nil {
|
|
return isunique
|
|
}
|
|
for _, extClient := range extClients { // filter
|
|
if isIpv6 {
|
|
if (extClient.Address6 == ip) && extClient.Network == network {
|
|
return false
|
|
}
|
|
|
|
} else {
|
|
if (extClient.Address == ip) && extClient.Network == network {
|
|
return false
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return isunique
|
|
}
|
|
func UniqueAddress(networkName string, reverse bool) (net.IP, error) {
|
|
if servercfg.CacheEnabled() {
|
|
return UniqueAddressCache(networkName, reverse)
|
|
}
|
|
return UniqueAddressDB(networkName, reverse)
|
|
}
|
|
|
|
func UniqueAddress6(networkName string, reverse bool) (net.IP, error) {
|
|
if servercfg.CacheEnabled() {
|
|
return UniqueAddress6Cache(networkName, reverse)
|
|
}
|
|
return UniqueAddress6DB(networkName, reverse)
|
|
}
|
|
|
|
// UniqueAddress6DB - see if ipv6 address is unique
|
|
func UniqueAddress6DB(networkName string, reverse bool) (net.IP, error) {
|
|
add := net.IP{}
|
|
var network models.Network
|
|
network, err := GetParentNetwork(networkName)
|
|
if err != nil {
|
|
return add, err
|
|
}
|
|
if network.IsIPv6 == "no" {
|
|
return add, fmt.Errorf("IPv6 not active on network " + networkName)
|
|
}
|
|
|
|
//ensure AddressRange is valid
|
|
if _, _, err := net.ParseCIDR(network.AddressRange6); err != nil {
|
|
return add, err
|
|
}
|
|
net6 := iplib.Net6FromStr(network.AddressRange6)
|
|
|
|
newAddrs, err := net6.NextIP(net6.FirstAddress())
|
|
if reverse {
|
|
newAddrs, err = net6.PreviousIP(net6.LastAddress())
|
|
}
|
|
if err != nil {
|
|
return add, err
|
|
}
|
|
|
|
for {
|
|
if IsIPUnique(networkName, newAddrs.String(), database.NODES_TABLE_NAME, true) &&
|
|
IsIPUnique(networkName, newAddrs.String(), database.EXT_CLIENT_TABLE_NAME, true) {
|
|
return newAddrs, nil
|
|
}
|
|
if reverse {
|
|
newAddrs, err = net6.PreviousIP(newAddrs)
|
|
} else {
|
|
newAddrs, err = net6.NextIP(newAddrs)
|
|
}
|
|
if err != nil {
|
|
break
|
|
}
|
|
}
|
|
|
|
return add, errors.New("ERROR: No unique IPv6 addresses available. Check network subnet")
|
|
}
|
|
|
|
// UniqueAddress6Cache - see if ipv6 address is unique using cache
|
|
func UniqueAddress6Cache(networkName string, reverse bool) (net.IP, error) {
|
|
add := net.IP{}
|
|
var network models.Network
|
|
network, err := GetParentNetwork(networkName)
|
|
if err != nil {
|
|
return add, err
|
|
}
|
|
if network.IsIPv6 == "no" {
|
|
return add, fmt.Errorf("IPv6 not active on network " + networkName)
|
|
}
|
|
|
|
//ensure AddressRange is valid
|
|
if _, _, err := net.ParseCIDR(network.AddressRange6); err != nil {
|
|
return add, err
|
|
}
|
|
net6 := iplib.Net6FromStr(network.AddressRange6)
|
|
|
|
newAddrs, err := net6.NextIP(net6.FirstAddress())
|
|
if reverse {
|
|
newAddrs, err = net6.PreviousIP(net6.LastAddress())
|
|
}
|
|
if err != nil {
|
|
return add, err
|
|
}
|
|
|
|
ipAllocated := allocatedIpMap[networkName]
|
|
for {
|
|
if _, ok := ipAllocated[newAddrs.String()]; !ok {
|
|
return newAddrs, nil
|
|
}
|
|
if reverse {
|
|
newAddrs, err = net6.PreviousIP(newAddrs)
|
|
} else {
|
|
newAddrs, err = net6.NextIP(newAddrs)
|
|
}
|
|
if err != nil {
|
|
break
|
|
}
|
|
}
|
|
|
|
return add, errors.New("ERROR: No unique IPv6 addresses available. Check network subnet")
|
|
}
|
|
|
|
// IsNetworkNameUnique - checks to see if any other networks have the same name (id)
|
|
func IsNetworkNameUnique(network *models.Network) (bool, error) {
|
|
|
|
isunique := true
|
|
|
|
dbs, err := GetNetworks()
|
|
|
|
if err != nil && !database.IsEmptyRecord(err) {
|
|
return false, err
|
|
}
|
|
|
|
for i := 0; i < len(dbs); i++ {
|
|
|
|
if network.NetID == dbs[i].NetID {
|
|
isunique = false
|
|
}
|
|
}
|
|
|
|
return isunique, nil
|
|
}
|
|
|
|
// UpdateNetwork - updates a network with another network's fields
|
|
func UpdateNetwork(currentNetwork *models.Network, newNetwork *models.Network) (bool, bool, bool, error) {
|
|
if err := ValidateNetwork(newNetwork, true); err != nil {
|
|
return false, false, false, err
|
|
}
|
|
if newNetwork.NetID == currentNetwork.NetID {
|
|
hasrangeupdate4 := newNetwork.AddressRange != currentNetwork.AddressRange
|
|
hasrangeupdate6 := newNetwork.AddressRange6 != currentNetwork.AddressRange6
|
|
hasholepunchupdate := newNetwork.DefaultUDPHolePunch != currentNetwork.DefaultUDPHolePunch
|
|
data, err := json.Marshal(newNetwork)
|
|
if err != nil {
|
|
return false, false, false, err
|
|
}
|
|
newNetwork.SetNetworkLastModified()
|
|
err = database.Insert(newNetwork.NetID, string(data), database.NETWORKS_TABLE_NAME)
|
|
if err == nil {
|
|
if servercfg.CacheEnabled() {
|
|
storeNetworkInCache(newNetwork.NetID, *newNetwork)
|
|
}
|
|
}
|
|
return hasrangeupdate4, hasrangeupdate6, hasholepunchupdate, err
|
|
}
|
|
// copy values
|
|
return false, false, false, errors.New("failed to update network " + newNetwork.NetID + ", cannot change netid.")
|
|
}
|
|
|
|
// GetNetwork - gets a network from database
|
|
func GetNetwork(networkname string) (models.Network, error) {
|
|
|
|
var network models.Network
|
|
if servercfg.CacheEnabled() {
|
|
if network, ok := getNetworkFromCache(networkname); ok {
|
|
return network, nil
|
|
}
|
|
}
|
|
networkData, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, networkname)
|
|
if err != nil {
|
|
return network, err
|
|
}
|
|
if err = json.Unmarshal([]byte(networkData), &network); err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
return network, nil
|
|
}
|
|
|
|
// NetIDInNetworkCharSet - checks if a netid of a network uses valid characters
|
|
func NetIDInNetworkCharSet(network *models.Network) bool {
|
|
|
|
charset := "abcdefghijklmnopqrstuvwxyz1234567890-_"
|
|
|
|
for _, char := range network.NetID {
|
|
if !strings.Contains(charset, string(char)) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
// Validate - validates fields of an network struct
|
|
func ValidateNetwork(network *models.Network, isUpdate bool) error {
|
|
v := validator.New()
|
|
_ = v.RegisterValidation("netid_valid", func(fl validator.FieldLevel) bool {
|
|
inCharSet := NetIDInNetworkCharSet(network)
|
|
if isUpdate {
|
|
return inCharSet
|
|
}
|
|
isFieldUnique, _ := IsNetworkNameUnique(network)
|
|
return isFieldUnique && inCharSet
|
|
})
|
|
//
|
|
_ = v.RegisterValidation("checkyesorno", func(fl validator.FieldLevel) bool {
|
|
return validation.CheckYesOrNo(fl)
|
|
})
|
|
err := v.Struct(network)
|
|
if err != nil {
|
|
for _, e := range err.(validator.ValidationErrors) {
|
|
fmt.Println(e)
|
|
}
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// ParseNetwork - parses a network into a model
|
|
func ParseNetwork(value string) (models.Network, error) {
|
|
var network models.Network
|
|
err := json.Unmarshal([]byte(value), &network)
|
|
return network, err
|
|
}
|
|
|
|
// SaveNetwork - save network struct to database
|
|
func SaveNetwork(network *models.Network) error {
|
|
data, err := json.Marshal(network)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNetworkInCache(network.NetID, *network)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// NetworkExists - check if network exists
|
|
func NetworkExists(name string) (bool, error) {
|
|
|
|
var network string
|
|
var err error
|
|
if servercfg.CacheEnabled() {
|
|
if _, ok := getNetworkFromCache(name); ok {
|
|
return ok, nil
|
|
}
|
|
}
|
|
if network, err = database.FetchRecord(database.NETWORKS_TABLE_NAME, name); err != nil {
|
|
return false, err
|
|
}
|
|
return len(network) > 0, nil
|
|
}
|
|
|
|
// SortNetworks - Sorts slice of Networks by their NetID alphabetically with numbers first
|
|
func SortNetworks(unsortedNetworks []models.Network) {
|
|
sort.Slice(unsortedNetworks, func(i, j int) bool {
|
|
return unsortedNetworks[i].NetID < unsortedNetworks[j].NetID
|
|
})
|
|
}
|
|
|
|
// == Private ==
|
|
|
|
var addressLock = &sync.Mutex{}
|