mirror of
https://github.com/gravitl/netmaker.git
synced 2025-09-04 04:04:17 +08:00
* move relevant acl and tag code to CE and Pro pkgs * intialise pro acl funcs * list gateways by user access * check user gw access by policies * filter out user policies on CE * filter out tagged policies on CE * fix ce acl comms * allow gateways tag * allow gateway tag on CE, remove failover and gw check on acl policy * add gw rules func to pro * add inet gw support on CE * add egress acl API * add egress acl API * fix(go): set is_gw when converting api node to server node; * fix(go): set is_gw when converting api node to server node; * fix policy validity checker for inet gws * move dns option to host model * fix node removal from egress policy on delete * add migration logic for ManageDNS * fix dns json field * fix nil error on node tags * add egress info to relayed nodes --------- Co-authored-by: Vishal Dalwadi <dalwadivishal26@gmail.com>
982 lines
28 KiB
Go
982 lines
28 KiB
Go
package logic
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"maps"
|
|
"net"
|
|
"slices"
|
|
"sort"
|
|
"sync"
|
|
"time"
|
|
|
|
validator "github.com/go-playground/validator/v10"
|
|
"github.com/google/uuid"
|
|
"github.com/gravitl/netmaker/database"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic/acls"
|
|
"github.com/gravitl/netmaker/logic/acls/nodeacls"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"github.com/gravitl/netmaker/validation"
|
|
"github.com/seancfoley/ipaddress-go/ipaddr"
|
|
"golang.org/x/exp/slog"
|
|
)
|
|
|
|
var (
|
|
nodeCacheMutex = &sync.RWMutex{}
|
|
nodeNetworkCacheMutex = &sync.RWMutex{}
|
|
nodesCacheMap = make(map[string]models.Node)
|
|
nodesNetworkCacheMap = make(map[string]map[string]models.Node)
|
|
IPv4Network = "0.0.0.0/0"
|
|
IPv6Network = "::/0"
|
|
)
|
|
|
|
func getNodeFromCache(nodeID string) (node models.Node, ok bool) {
|
|
nodeCacheMutex.RLock()
|
|
node, ok = nodesCacheMap[nodeID]
|
|
if node.Mutex == nil {
|
|
node.Mutex = &sync.Mutex{}
|
|
}
|
|
nodeCacheMutex.RUnlock()
|
|
return
|
|
}
|
|
func getNodesFromCache() (nodes []models.Node) {
|
|
nodeCacheMutex.RLock()
|
|
for _, node := range nodesCacheMap {
|
|
if node.Mutex == nil {
|
|
node.Mutex = &sync.Mutex{}
|
|
}
|
|
nodes = append(nodes, node)
|
|
}
|
|
nodeCacheMutex.RUnlock()
|
|
return
|
|
}
|
|
|
|
func deleteNodeFromCache(nodeID string) {
|
|
nodeCacheMutex.Lock()
|
|
delete(nodesCacheMap, nodeID)
|
|
nodeCacheMutex.Unlock()
|
|
}
|
|
func deleteNodeFromNetworkCache(nodeID string, network string) {
|
|
nodeNetworkCacheMutex.Lock()
|
|
delete(nodesNetworkCacheMap[network], nodeID)
|
|
nodeNetworkCacheMutex.Unlock()
|
|
}
|
|
|
|
func storeNodeInNetworkCache(node models.Node, network string) {
|
|
nodeNetworkCacheMutex.Lock()
|
|
if nodesNetworkCacheMap[network] == nil {
|
|
nodesNetworkCacheMap[network] = make(map[string]models.Node)
|
|
}
|
|
nodesNetworkCacheMap[network][node.ID.String()] = node
|
|
nodeNetworkCacheMutex.Unlock()
|
|
}
|
|
|
|
func storeNodeInCache(node models.Node) {
|
|
nodeCacheMutex.Lock()
|
|
nodesCacheMap[node.ID.String()] = node
|
|
nodeCacheMutex.Unlock()
|
|
}
|
|
func loadNodesIntoNetworkCache(nMap map[string]models.Node) {
|
|
nodeNetworkCacheMutex.Lock()
|
|
for _, v := range nMap {
|
|
network := v.Network
|
|
if nodesNetworkCacheMap[network] == nil {
|
|
nodesNetworkCacheMap[network] = make(map[string]models.Node)
|
|
}
|
|
nodesNetworkCacheMap[network][v.ID.String()] = v
|
|
}
|
|
nodeNetworkCacheMutex.Unlock()
|
|
}
|
|
|
|
func loadNodesIntoCache(nMap map[string]models.Node) {
|
|
nodeCacheMutex.Lock()
|
|
nodesCacheMap = nMap
|
|
nodeCacheMutex.Unlock()
|
|
}
|
|
func ClearNodeCache() {
|
|
nodeCacheMutex.Lock()
|
|
nodesCacheMap = make(map[string]models.Node)
|
|
nodesNetworkCacheMap = make(map[string]map[string]models.Node)
|
|
nodeCacheMutex.Unlock()
|
|
}
|
|
|
|
const (
|
|
// RELAY_NODE_ERR - error to return if relay node is unfound
|
|
RELAY_NODE_ERR = "could not find relay for node"
|
|
// NodePurgeTime time to wait for node to response to a NODE_DELETE actions
|
|
NodePurgeTime = time.Second * 10
|
|
// NodePurgeCheckTime is how often to check nodes for Pending Delete
|
|
NodePurgeCheckTime = time.Second * 30
|
|
)
|
|
|
|
// GetNetworkNodes - gets the nodes of a network
|
|
func GetNetworkNodes(network string) ([]models.Node, error) {
|
|
|
|
if networkNodes, ok := nodesNetworkCacheMap[network]; ok {
|
|
nodeNetworkCacheMutex.Lock()
|
|
defer nodeNetworkCacheMutex.Unlock()
|
|
return slices.Collect(maps.Values(networkNodes)), nil
|
|
}
|
|
allnodes, err := GetAllNodes()
|
|
if err != nil {
|
|
return []models.Node{}, err
|
|
}
|
|
|
|
return GetNetworkNodesMemory(allnodes, network), nil
|
|
}
|
|
|
|
// GetHostNodes - fetches all nodes part of the host
|
|
func GetHostNodes(host *models.Host) []models.Node {
|
|
nodes := []models.Node{}
|
|
for _, nodeID := range host.Nodes {
|
|
node, err := GetNodeByID(nodeID)
|
|
if err == nil {
|
|
nodes = append(nodes, node)
|
|
}
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
// GetNetworkNodesMemory - gets all nodes belonging to a network from list in memory
|
|
func GetNetworkNodesMemory(allNodes []models.Node, network string) []models.Node {
|
|
|
|
if networkNodes, ok := nodesNetworkCacheMap[network]; ok {
|
|
nodeNetworkCacheMutex.Lock()
|
|
defer nodeNetworkCacheMutex.Unlock()
|
|
return slices.Collect(maps.Values(networkNodes))
|
|
}
|
|
var nodes = make([]models.Node, 0, len(allNodes))
|
|
for i := range allNodes {
|
|
node := allNodes[i]
|
|
if node.Network == network {
|
|
nodes = append(nodes, node)
|
|
}
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
// UpdateNodeCheckin - updates the checkin time of a node
|
|
func UpdateNodeCheckin(node *models.Node) error {
|
|
node.SetLastCheckIn()
|
|
data, err := json.Marshal(node)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
node.EgressDetails = models.EgressDetails{}
|
|
err = database.Insert(node.ID.String(), string(data), database.NODES_TABLE_NAME)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNodeInCache(*node)
|
|
storeNodeInNetworkCache(*node, node.Network)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// UpsertNode - updates node in the DB
|
|
func UpsertNode(newNode *models.Node) error {
|
|
newNode.SetLastModified()
|
|
data, err := json.Marshal(newNode)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
newNode.EgressDetails = models.EgressDetails{}
|
|
err = database.Insert(newNode.ID.String(), string(data), database.NODES_TABLE_NAME)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNodeInCache(*newNode)
|
|
storeNodeInNetworkCache(*newNode, newNode.Network)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// UpdateNode - takes a node and updates another node with it's values
|
|
func UpdateNode(currentNode *models.Node, newNode *models.Node) error {
|
|
if newNode.Address.IP.String() != currentNode.Address.IP.String() {
|
|
if network, err := GetParentNetwork(newNode.Network); err == nil {
|
|
if !IsAddressInCIDR(newNode.Address.IP, network.AddressRange) {
|
|
return fmt.Errorf("invalid address provided; out of network range for node %s", newNode.ID)
|
|
}
|
|
}
|
|
}
|
|
nodeACLDelta := currentNode.DefaultACL != newNode.DefaultACL
|
|
newNode.Fill(currentNode, servercfg.IsPro)
|
|
|
|
// check for un-settable server values
|
|
if err := ValidateNode(newNode, true); err != nil {
|
|
return err
|
|
}
|
|
|
|
if newNode.ID == currentNode.ID {
|
|
if nodeACLDelta {
|
|
if err := UpdateProNodeACLs(newNode); err != nil {
|
|
logger.Log(1, "failed to apply node level ACLs during creation of node", newNode.ID.String(), "-", err.Error())
|
|
return err
|
|
}
|
|
}
|
|
newNode.EgressDetails = models.EgressDetails{}
|
|
newNode.SetLastModified()
|
|
if data, err := json.Marshal(newNode); err != nil {
|
|
return err
|
|
} else {
|
|
err = database.Insert(newNode.ID.String(), string(data), database.NODES_TABLE_NAME)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNodeInCache(*newNode)
|
|
storeNodeInNetworkCache(*newNode, newNode.Network)
|
|
if _, ok := allocatedIpMap[newNode.Network]; ok {
|
|
if newNode.Address.IP != nil && !newNode.Address.IP.Equal(currentNode.Address.IP) {
|
|
AddIpToAllocatedIpMap(newNode.Network, newNode.Address.IP)
|
|
RemoveIpFromAllocatedIpMap(currentNode.Network, currentNode.Address.IP.String())
|
|
}
|
|
if newNode.Address6.IP != nil && !newNode.Address6.IP.Equal(currentNode.Address6.IP) {
|
|
AddIpToAllocatedIpMap(newNode.Network, newNode.Address6.IP)
|
|
RemoveIpFromAllocatedIpMap(currentNode.Network, currentNode.Address6.IP.String())
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
return fmt.Errorf("failed to update node %s, cannot change ID", currentNode.ID.String())
|
|
}
|
|
|
|
// DeleteNode - marks node for deletion (and adds to zombie list) if called by UI or deletes node if called by node
|
|
func DeleteNode(node *models.Node, purge bool) error {
|
|
alreadyDeleted := node.PendingDelete || node.Action == models.NODE_DELETE
|
|
node.Action = models.NODE_DELETE
|
|
//delete ext clients if node is ingress gw
|
|
if node.IsIngressGateway {
|
|
if err := DeleteGatewayExtClients(node.ID.String(), node.Network); err != nil {
|
|
slog.Error("failed to delete ext clients", "nodeid", node.ID.String(), "error", err.Error())
|
|
}
|
|
}
|
|
if node.IsRelayed {
|
|
// cleanup node from relayednodes on relay node
|
|
relayNode, err := GetNodeByID(node.RelayedBy)
|
|
if err == nil {
|
|
relayedNodes := []string{}
|
|
for _, relayedNodeID := range relayNode.RelayedNodes {
|
|
if relayedNodeID == node.ID.String() {
|
|
continue
|
|
}
|
|
relayedNodes = append(relayedNodes, relayedNodeID)
|
|
}
|
|
relayNode.RelayedNodes = relayedNodes
|
|
UpsertNode(&relayNode)
|
|
}
|
|
}
|
|
if node.FailedOverBy != uuid.Nil {
|
|
ResetFailedOverPeer(node)
|
|
}
|
|
if node.IsRelay {
|
|
// unset all the relayed nodes
|
|
SetRelayedNodes(false, node.ID.String(), node.RelayedNodes)
|
|
}
|
|
if node.EgressDetails.InternetGwID != "" {
|
|
inetNode, err := GetNodeByID(node.EgressDetails.InternetGwID)
|
|
if err == nil {
|
|
clientNodeIDs := []string{}
|
|
for _, inetNodeClientID := range inetNode.EgressDetails.InetNodeReq.InetNodeClientIDs {
|
|
if inetNodeClientID == node.ID.String() {
|
|
continue
|
|
}
|
|
clientNodeIDs = append(clientNodeIDs, inetNodeClientID)
|
|
}
|
|
inetNode.EgressDetails.InetNodeReq.InetNodeClientIDs = clientNodeIDs
|
|
UpsertNode(&inetNode)
|
|
}
|
|
}
|
|
if node.EgressDetails.IsInternetGateway {
|
|
UnsetInternetGw(node)
|
|
}
|
|
if !purge && !alreadyDeleted {
|
|
newnode := *node
|
|
newnode.PendingDelete = true
|
|
if err := UpdateNode(node, &newnode); err != nil {
|
|
return err
|
|
}
|
|
newZombie <- node.ID
|
|
return nil
|
|
}
|
|
if alreadyDeleted {
|
|
logger.Log(1, "forcibly deleting node", node.ID.String())
|
|
}
|
|
host, err := GetHost(node.HostID.String())
|
|
if err != nil {
|
|
logger.Log(1, "no host found for node", node.ID.String(), "deleting..")
|
|
if delErr := DeleteNodeByID(node); delErr != nil {
|
|
logger.Log(0, "failed to delete node", node.ID.String(), delErr.Error())
|
|
}
|
|
return err
|
|
}
|
|
if err := DissasociateNodeFromHost(node, host); err != nil {
|
|
return err
|
|
}
|
|
|
|
go RemoveNodeFromAclPolicy(*node)
|
|
go RemoveNodeFromEgress(*node)
|
|
return nil
|
|
}
|
|
|
|
// GetNodeByHostRef - gets the node by host id and network
|
|
func GetNodeByHostRef(hostid, network string) (node models.Node, err error) {
|
|
nodes, err := GetNetworkNodes(network)
|
|
if err != nil {
|
|
return models.Node{}, err
|
|
}
|
|
for _, node := range nodes {
|
|
if node.HostID.String() == hostid && node.Network == network {
|
|
return node, nil
|
|
}
|
|
}
|
|
return models.Node{}, errors.New("node not found")
|
|
}
|
|
|
|
// DeleteNodeByID - deletes a node from database
|
|
func DeleteNodeByID(node *models.Node) error {
|
|
var err error
|
|
var key = node.ID.String()
|
|
if err = database.DeleteRecord(database.NODES_TABLE_NAME, key); err != nil {
|
|
if !database.IsEmptyRecord(err) {
|
|
return err
|
|
}
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
deleteNodeFromCache(node.ID.String())
|
|
deleteNodeFromNetworkCache(node.ID.String(), node.Network)
|
|
}
|
|
if servercfg.IsDNSMode() {
|
|
SetDNS()
|
|
}
|
|
_, err = nodeacls.RemoveNodeACL(nodeacls.NetworkID(node.Network), nodeacls.NodeID(node.ID.String()))
|
|
if err != nil {
|
|
// ignoring for now, could hit a nil pointer if delete called twice
|
|
logger.Log(2, "attempted to remove node ACL for node", node.ID.String())
|
|
}
|
|
// removeZombie <- node.ID
|
|
if err = DeleteMetrics(node.ID.String()); err != nil {
|
|
logger.Log(1, "unable to remove metrics from DB for node", node.ID.String(), err.Error())
|
|
}
|
|
//recycle ip address
|
|
if servercfg.CacheEnabled() {
|
|
if node.Address.IP != nil {
|
|
RemoveIpFromAllocatedIpMap(node.Network, node.Address.IP.String())
|
|
}
|
|
if node.Address6.IP != nil {
|
|
RemoveIpFromAllocatedIpMap(node.Network, node.Address6.IP.String())
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// IsNodeIDUnique - checks if node id is unique
|
|
func IsNodeIDUnique(node *models.Node) (bool, error) {
|
|
_, err := database.FetchRecord(database.NODES_TABLE_NAME, node.ID.String())
|
|
return database.IsEmptyRecord(err), err
|
|
}
|
|
|
|
// ValidateNode - validates node values
|
|
func ValidateNode(node *models.Node, isUpdate bool) error {
|
|
v := validator.New()
|
|
_ = v.RegisterValidation("id_unique", func(fl validator.FieldLevel) bool {
|
|
if isUpdate {
|
|
return true
|
|
}
|
|
isFieldUnique, _ := IsNodeIDUnique(node)
|
|
return isFieldUnique
|
|
})
|
|
_ = v.RegisterValidation("network_exists", func(fl validator.FieldLevel) bool {
|
|
_, err := GetNetworkByNode(node)
|
|
return err == nil
|
|
})
|
|
_ = v.RegisterValidation("checkyesornoorunset", func(f1 validator.FieldLevel) bool {
|
|
return validation.CheckYesOrNoOrUnset(f1)
|
|
})
|
|
err := v.Struct(node)
|
|
return err
|
|
}
|
|
|
|
// GetAllNodes - returns all nodes in the DB
|
|
func GetAllNodes() ([]models.Node, error) {
|
|
var nodes []models.Node
|
|
if servercfg.CacheEnabled() {
|
|
nodes = getNodesFromCache()
|
|
if len(nodes) != 0 {
|
|
return nodes, nil
|
|
}
|
|
}
|
|
nodesMap := make(map[string]models.Node)
|
|
if servercfg.CacheEnabled() {
|
|
defer loadNodesIntoCache(nodesMap)
|
|
defer loadNodesIntoNetworkCache(nodesMap)
|
|
}
|
|
collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
|
|
if err != nil {
|
|
if database.IsEmptyRecord(err) {
|
|
return []models.Node{}, nil
|
|
}
|
|
return []models.Node{}, err
|
|
}
|
|
|
|
for _, value := range collection {
|
|
var node models.Node
|
|
// ignore legacy nodes in database
|
|
if err := json.Unmarshal([]byte(value), &node); err != nil {
|
|
logger.Log(3, "legacy node detected: ", err.Error())
|
|
continue
|
|
}
|
|
// add node to our array
|
|
nodes = append(nodes, node)
|
|
if node.Mutex == nil {
|
|
node.Mutex = &sync.Mutex{}
|
|
}
|
|
nodesMap[node.ID.String()] = node
|
|
}
|
|
|
|
return nodes, nil
|
|
}
|
|
|
|
func AddStaticNodestoList(nodes []models.Node) []models.Node {
|
|
netMap := make(map[string]struct{})
|
|
for _, node := range nodes {
|
|
if _, ok := netMap[node.Network]; ok {
|
|
continue
|
|
}
|
|
if node.IsIngressGateway {
|
|
nodes = append(nodes, GetStaticNodesByNetwork(models.NetworkID(node.Network), false)...)
|
|
netMap[node.Network] = struct{}{}
|
|
}
|
|
}
|
|
return nodes
|
|
}
|
|
|
|
func AddStatusToNodes(nodes []models.Node, statusCall bool) (nodesWithStatus []models.Node) {
|
|
aclDefaultPolicyStatusMap := make(map[string]bool)
|
|
for _, node := range nodes {
|
|
if _, ok := aclDefaultPolicyStatusMap[node.Network]; !ok {
|
|
// check default policy if all allowed return true
|
|
defaultPolicy, _ := GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)
|
|
aclDefaultPolicyStatusMap[node.Network] = defaultPolicy.Enabled
|
|
}
|
|
if statusCall {
|
|
GetNodeStatus(&node, aclDefaultPolicyStatusMap[node.Network])
|
|
} else {
|
|
GetNodeCheckInStatus(&node, true)
|
|
}
|
|
|
|
nodesWithStatus = append(nodesWithStatus, node)
|
|
}
|
|
return
|
|
}
|
|
|
|
// GetNetworkByNode - gets the network model from a node
|
|
func GetNetworkByNode(node *models.Node) (models.Network, error) {
|
|
|
|
var network = models.Network{}
|
|
networkData, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, node.Network)
|
|
if err != nil {
|
|
return network, err
|
|
}
|
|
if err = json.Unmarshal([]byte(networkData), &network); err != nil {
|
|
return models.Network{}, err
|
|
}
|
|
return network, nil
|
|
}
|
|
|
|
// SetNodeDefaults - sets the defaults of a node to avoid empty fields
|
|
func SetNodeDefaults(node *models.Node, resetConnected bool) {
|
|
|
|
parentNetwork, _ := GetNetworkByNode(node)
|
|
_, cidr, err := net.ParseCIDR(parentNetwork.AddressRange)
|
|
if err == nil {
|
|
node.NetworkRange = *cidr
|
|
}
|
|
_, cidr, err = net.ParseCIDR(parentNetwork.AddressRange6)
|
|
if err == nil {
|
|
node.NetworkRange6 = *cidr
|
|
}
|
|
|
|
if node.DefaultACL == "" {
|
|
node.DefaultACL = parentNetwork.DefaultACL
|
|
}
|
|
if node.FailOverPeers == nil {
|
|
node.FailOverPeers = make(map[string]struct{})
|
|
}
|
|
|
|
node.SetLastModified()
|
|
//node.SetLastCheckIn()
|
|
|
|
if resetConnected {
|
|
node.SetDefaultConnected()
|
|
}
|
|
node.SetExpirationDateTime()
|
|
if node.Tags == nil {
|
|
node.Tags = make(map[models.TagID]struct{})
|
|
}
|
|
}
|
|
|
|
// GetRecordKey - get record key
|
|
// depricated
|
|
func GetRecordKey(id string, network string) (string, error) {
|
|
if id == "" || network == "" {
|
|
return "", errors.New("unable to get record key")
|
|
}
|
|
return id + "###" + network, nil
|
|
}
|
|
|
|
func GetNodeByID(uuid string) (models.Node, error) {
|
|
if servercfg.CacheEnabled() {
|
|
if node, ok := getNodeFromCache(uuid); ok {
|
|
return node, nil
|
|
}
|
|
}
|
|
var record, err = database.FetchRecord(database.NODES_TABLE_NAME, uuid)
|
|
if err != nil {
|
|
return models.Node{}, err
|
|
}
|
|
var node models.Node
|
|
if err = json.Unmarshal([]byte(record), &node); err != nil {
|
|
return models.Node{}, err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNodeInCache(node)
|
|
storeNodeInNetworkCache(node, node.Network)
|
|
}
|
|
return node, nil
|
|
}
|
|
|
|
// GetDeletedNodeByID - get a deleted node
|
|
func GetDeletedNodeByID(uuid string) (models.Node, error) {
|
|
|
|
var node models.Node
|
|
|
|
record, err := database.FetchRecord(database.DELETED_NODES_TABLE_NAME, uuid)
|
|
if err != nil {
|
|
return models.Node{}, err
|
|
}
|
|
|
|
if err = json.Unmarshal([]byte(record), &node); err != nil {
|
|
return models.Node{}, err
|
|
}
|
|
|
|
SetNodeDefaults(&node, true)
|
|
|
|
return node, nil
|
|
}
|
|
|
|
// FindRelay - returns the node that is the relay for a relayed node
|
|
func FindRelay(node *models.Node) *models.Node {
|
|
relay, err := GetNodeByID(node.RelayedBy)
|
|
if err != nil {
|
|
logger.Log(0, "FindRelay: "+err.Error())
|
|
return nil
|
|
}
|
|
return &relay
|
|
}
|
|
|
|
// GetAllNodesAPI - get all nodes for api usage
|
|
func GetAllNodesAPI(nodes []models.Node) []models.ApiNode {
|
|
apiNodes := []models.ApiNode{}
|
|
for i := range nodes {
|
|
newApiNode := nodes[i].ConvertToAPINode()
|
|
apiNodes = append(apiNodes, *newApiNode)
|
|
}
|
|
return apiNodes[:]
|
|
}
|
|
|
|
// GetNodesStatusAPI - gets nodes status
|
|
func GetNodesStatusAPI(nodes []models.Node) map[string]models.ApiNodeStatus {
|
|
apiStatusNodesMap := make(map[string]models.ApiNodeStatus)
|
|
for i := range nodes {
|
|
newApiNode := nodes[i].ConvertToStatusNode()
|
|
apiStatusNodesMap[newApiNode.ID] = *newApiNode
|
|
}
|
|
return apiStatusNodesMap
|
|
}
|
|
|
|
// DeleteExpiredNodes - goroutine which deletes nodes which are expired
|
|
func DeleteExpiredNodes(ctx context.Context, peerUpdate chan *models.Node) {
|
|
// Delete Expired Nodes Every Hour
|
|
ticker := time.NewTicker(time.Hour)
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
ticker.Stop()
|
|
return
|
|
case <-ticker.C:
|
|
allnodes, err := GetAllNodes()
|
|
if err != nil {
|
|
slog.Error("failed to retrieve all nodes", "error", err.Error())
|
|
return
|
|
}
|
|
for _, node := range allnodes {
|
|
node := node
|
|
if time.Now().After(node.ExpirationDateTime) {
|
|
peerUpdate <- &node
|
|
slog.Info("deleting expired node", "nodeid", node.ID.String())
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// createNode - creates a node in database
|
|
func createNode(node *models.Node) error {
|
|
// lock because we need unique IPs and having it concurrent makes parallel calls result in same "unique" IPs
|
|
addressLock.Lock()
|
|
defer addressLock.Unlock()
|
|
|
|
host, err := GetHost(node.HostID.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
SetNodeDefaults(node, true)
|
|
|
|
defaultACLVal := acls.Allowed
|
|
parentNetwork, err := GetNetwork(node.Network)
|
|
if err == nil {
|
|
if parentNetwork.DefaultACL != "yes" {
|
|
defaultACLVal = acls.NotAllowed
|
|
}
|
|
}
|
|
|
|
if node.DefaultACL == "" {
|
|
node.DefaultACL = "unset"
|
|
}
|
|
|
|
if node.Address.IP == nil {
|
|
if parentNetwork.IsIPv4 == "yes" {
|
|
if node.Address.IP, err = UniqueAddress(node.Network, false); err != nil {
|
|
return err
|
|
}
|
|
_, cidr, err := net.ParseCIDR(parentNetwork.AddressRange)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
node.Address.Mask = net.CIDRMask(cidr.Mask.Size())
|
|
}
|
|
} else if !IsIPUnique(node.Network, node.Address.String(), database.NODES_TABLE_NAME, false) {
|
|
return fmt.Errorf("invalid address: ipv4 " + node.Address.String() + " is not unique")
|
|
}
|
|
if node.Address6.IP == nil {
|
|
if parentNetwork.IsIPv6 == "yes" {
|
|
if node.Address6.IP, err = UniqueAddress6(node.Network, false); err != nil {
|
|
return err
|
|
}
|
|
_, cidr, err := net.ParseCIDR(parentNetwork.AddressRange6)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
node.Address6.Mask = net.CIDRMask(cidr.Mask.Size())
|
|
}
|
|
} else if !IsIPUnique(node.Network, node.Address6.String(), database.NODES_TABLE_NAME, true) {
|
|
return fmt.Errorf("invalid address: ipv6 " + node.Address6.String() + " is not unique")
|
|
}
|
|
node.ID = uuid.New()
|
|
//Create a JWT for the node
|
|
tokenString, _ := CreateJWT(node.ID.String(), host.MacAddress.String(), node.Network)
|
|
if tokenString == "" {
|
|
//logic.ReturnErrorResponse(w, r, errorResponse)
|
|
return err
|
|
}
|
|
err = ValidateNode(node, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
CheckZombies(node)
|
|
node.SetLastCheckIn()
|
|
nodebytes, err := json.Marshal(&node)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = database.Insert(node.ID.String(), string(nodebytes), database.NODES_TABLE_NAME)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if servercfg.CacheEnabled() {
|
|
storeNodeInCache(*node)
|
|
storeNodeInNetworkCache(*node, node.Network)
|
|
if _, ok := allocatedIpMap[node.Network]; ok {
|
|
if node.Address.IP != nil {
|
|
AddIpToAllocatedIpMap(node.Network, node.Address.IP)
|
|
}
|
|
if node.Address6.IP != nil {
|
|
AddIpToAllocatedIpMap(node.Network, node.Address6.IP)
|
|
}
|
|
}
|
|
}
|
|
|
|
_, err = nodeacls.CreateNodeACL(nodeacls.NetworkID(node.Network), nodeacls.NodeID(node.ID.String()), defaultACLVal)
|
|
if err != nil {
|
|
logger.Log(1, "failed to create node ACL for node,", node.ID.String(), "err:", err.Error())
|
|
return err
|
|
}
|
|
|
|
if err = UpdateProNodeACLs(node); err != nil {
|
|
logger.Log(1, "failed to apply node level ACLs during creation of node", node.ID.String(), "-", err.Error())
|
|
return err
|
|
}
|
|
|
|
if err = UpdateMetrics(node.ID.String(), &models.Metrics{Connectivity: make(map[string]models.Metric)}); err != nil {
|
|
logger.Log(1, "failed to initialize metrics for node", node.ID.String(), err.Error())
|
|
}
|
|
|
|
SetNetworkNodesLastModified(node.Network)
|
|
if servercfg.IsDNSMode() {
|
|
err = SetDNS()
|
|
}
|
|
return err
|
|
}
|
|
|
|
// SortApiNodes - Sorts slice of ApiNodes by their ID alphabetically with numbers first
|
|
func SortApiNodes(unsortedNodes []models.ApiNode) {
|
|
sort.Slice(unsortedNodes, func(i, j int) bool {
|
|
return unsortedNodes[i].ID < unsortedNodes[j].ID
|
|
})
|
|
}
|
|
|
|
func ValidateParams(nodeid, netid string) (models.Node, error) {
|
|
node, err := GetNodeByID(nodeid)
|
|
if err != nil {
|
|
slog.Error("error fetching node", "node", nodeid, "error", err.Error())
|
|
return node, fmt.Errorf("error fetching node during parameter validation: %v", err)
|
|
}
|
|
if node.Network != netid {
|
|
slog.Error("network url param does not match node id", "url nodeid", netid, "node", node.Network)
|
|
return node, fmt.Errorf("network url param does not match node network")
|
|
}
|
|
return node, nil
|
|
}
|
|
|
|
func ValidateNodeIp(currentNode *models.Node, newNode *models.ApiNode) error {
|
|
|
|
if currentNode.Address.IP != nil && currentNode.Address.String() != newNode.Address {
|
|
if !IsIPUnique(newNode.Network, newNode.Address, database.NODES_TABLE_NAME, false) ||
|
|
!IsIPUnique(newNode.Network, newNode.Address, database.EXT_CLIENT_TABLE_NAME, false) {
|
|
return errors.New("ip specified is already allocated: " + newNode.Address)
|
|
}
|
|
}
|
|
if currentNode.Address6.IP != nil && currentNode.Address6.String() != newNode.Address6 {
|
|
if !IsIPUnique(newNode.Network, newNode.Address6, database.NODES_TABLE_NAME, false) ||
|
|
!IsIPUnique(newNode.Network, newNode.Address6, database.EXT_CLIENT_TABLE_NAME, false) {
|
|
return errors.New("ip specified is already allocated: " + newNode.Address6)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func ValidateEgressRange(netID string, ranges []string) error {
|
|
network, err := GetNetworkSettings(netID)
|
|
if err != nil {
|
|
slog.Error("error getting network with netid", "error", netID, err.Error)
|
|
return errors.New("error getting network with netid: " + netID + " " + err.Error())
|
|
}
|
|
ipv4Net := network.AddressRange
|
|
ipv6Net := network.AddressRange6
|
|
|
|
for _, v := range ranges {
|
|
if ipv4Net != "" {
|
|
if ContainsCIDR(ipv4Net, v) {
|
|
slog.Error("egress range should not be the same as or contained in the netmaker network address", "error", v, ipv4Net)
|
|
return errors.New("egress range should not be the same as or contained in the netmaker network address" + v + " " + ipv4Net)
|
|
}
|
|
}
|
|
if ipv6Net != "" {
|
|
if ContainsCIDR(ipv6Net, v) {
|
|
slog.Error("egress range should not be the same as or contained in the netmaker network address", "error", v, ipv6Net)
|
|
return errors.New("egress range should not be the same as or contained in the netmaker network address" + v + " " + ipv6Net)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func ContainsCIDR(net1, net2 string) bool {
|
|
one, two := ipaddr.NewIPAddressString(net1),
|
|
ipaddr.NewIPAddressString(net2)
|
|
return one.Contains(two) || two.Contains(one)
|
|
}
|
|
|
|
// GetAllFailOvers - gets all the nodes that are failovers
|
|
func GetAllFailOvers() ([]models.Node, error) {
|
|
nodes, err := GetAllNodes()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
igs := make([]models.Node, 0)
|
|
for _, node := range nodes {
|
|
if node.IsFailOver {
|
|
igs = append(igs, node)
|
|
}
|
|
}
|
|
return igs, nil
|
|
}
|
|
|
|
func ValidateInetGwReq(inetNode models.Node, req models.InetNodeReq, update bool) error {
|
|
inetHost, err := GetHost(inetNode.HostID.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if inetHost.FirewallInUse == models.FIREWALL_NONE {
|
|
return errors.New("iptables or nftables needs to be installed")
|
|
}
|
|
if inetNode.EgressDetails.InternetGwID != "" {
|
|
return fmt.Errorf("node %s is using a internet gateway already", inetHost.Name)
|
|
}
|
|
if inetNode.IsRelayed {
|
|
return fmt.Errorf("node %s is being relayed", inetHost.Name)
|
|
}
|
|
|
|
for _, clientNodeID := range req.InetNodeClientIDs {
|
|
clientNode, err := GetNodeByID(clientNodeID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if clientNode.IsFailOver {
|
|
return errors.New("failover node cannot be set to use internet gateway")
|
|
}
|
|
clientHost, err := GetHost(clientNode.HostID.String())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if clientHost.IsDefault {
|
|
return errors.New("default host cannot be set to use internet gateway")
|
|
}
|
|
if clientHost.OS != models.OS_Types.Linux && clientHost.OS != models.OS_Types.Windows {
|
|
return errors.New("can only attach linux or windows machine to a internet gateway")
|
|
}
|
|
if clientNode.EgressDetails.IsInternetGateway {
|
|
return fmt.Errorf("node %s acting as internet gateway cannot use another internet gateway", clientHost.Name)
|
|
}
|
|
if update {
|
|
if clientNode.EgressDetails.InternetGwID != "" && clientNode.EgressDetails.InternetGwID != inetNode.ID.String() {
|
|
return fmt.Errorf("node %s is already using a internet gateway", clientHost.Name)
|
|
}
|
|
} else {
|
|
if clientNode.EgressDetails.InternetGwID != "" {
|
|
return fmt.Errorf("node %s is already using a internet gateway", clientHost.Name)
|
|
}
|
|
}
|
|
if clientNode.FailedOverBy != uuid.Nil {
|
|
ResetFailedOverPeer(&clientNode)
|
|
}
|
|
|
|
if clientNode.IsRelayed && clientNode.RelayedBy != inetNode.ID.String() {
|
|
return fmt.Errorf("node %s is being relayed", clientHost.Name)
|
|
}
|
|
|
|
for _, nodeID := range clientHost.Nodes {
|
|
node, err := GetNodeByID(nodeID)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if node.EgressDetails.InternetGwID != "" && node.EgressDetails.InternetGwID != inetNode.ID.String() {
|
|
return errors.New("nodes on same host cannot use different internet gateway")
|
|
}
|
|
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// SetInternetGw - sets the node as internet gw based on flag bool
|
|
func SetInternetGw(node *models.Node, req models.InetNodeReq) {
|
|
node.EgressDetails.IsInternetGateway = true
|
|
node.EgressDetails.InetNodeReq = req
|
|
for _, clientNodeID := range req.InetNodeClientIDs {
|
|
clientNode, err := GetNodeByID(clientNodeID)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
clientNode.EgressDetails.InternetGwID = node.ID.String()
|
|
UpsertNode(&clientNode)
|
|
}
|
|
|
|
}
|
|
|
|
func UnsetInternetGw(node *models.Node) {
|
|
nodes, err := GetNetworkNodes(node.Network)
|
|
if err != nil {
|
|
slog.Error("failed to get network nodes", "network", node.Network, "error", err)
|
|
return
|
|
}
|
|
for _, clientNode := range nodes {
|
|
if node.ID.String() == clientNode.EgressDetails.InternetGwID {
|
|
clientNode.EgressDetails.InternetGwID = ""
|
|
UpsertNode(&clientNode)
|
|
}
|
|
|
|
}
|
|
node.EgressDetails.IsInternetGateway = false
|
|
node.EgressDetails.InetNodeReq = models.InetNodeReq{}
|
|
|
|
}
|
|
|
|
func SetDefaultGwForRelayedUpdate(relayed, relay models.Node, peerUpdate models.HostPeerUpdate) models.HostPeerUpdate {
|
|
if relay.EgressDetails.InternetGwID != "" {
|
|
relayedHost, err := GetHost(relayed.HostID.String())
|
|
if err != nil {
|
|
return peerUpdate
|
|
}
|
|
peerUpdate.ChangeDefaultGw = true
|
|
peerUpdate.DefaultGwIp = relay.Address.IP
|
|
if peerUpdate.DefaultGwIp == nil || relayedHost.EndpointIP == nil {
|
|
peerUpdate.DefaultGwIp = relay.Address6.IP
|
|
}
|
|
|
|
}
|
|
return peerUpdate
|
|
}
|
|
|
|
func SetDefaultGw(node models.Node, peerUpdate models.HostPeerUpdate) models.HostPeerUpdate {
|
|
if node.EgressDetails.InternetGwID != "" {
|
|
|
|
inetNode, err := GetNodeByID(node.EgressDetails.InternetGwID)
|
|
if err != nil {
|
|
return peerUpdate
|
|
}
|
|
host, err := GetHost(node.HostID.String())
|
|
if err != nil {
|
|
return peerUpdate
|
|
}
|
|
|
|
peerUpdate.ChangeDefaultGw = true
|
|
peerUpdate.DefaultGwIp = inetNode.Address.IP
|
|
if peerUpdate.DefaultGwIp == nil || host.EndpointIP == nil {
|
|
peerUpdate.DefaultGwIp = inetNode.Address6.IP
|
|
}
|
|
}
|
|
return peerUpdate
|
|
}
|
|
|
|
// GetAllowedIpForInetNodeClient - get inet cidr for node using a inet gw
|
|
func GetAllowedIpForInetNodeClient(node, peer *models.Node) []net.IPNet {
|
|
var allowedips = []net.IPNet{}
|
|
|
|
if peer.Address.IP != nil {
|
|
_, ipnet, _ := net.ParseCIDR(IPv4Network)
|
|
allowedips = append(allowedips, *ipnet)
|
|
}
|
|
|
|
if peer.Address6.IP != nil {
|
|
_, ipnet, _ := net.ParseCIDR(IPv6Network)
|
|
allowedips = append(allowedips, *ipnet)
|
|
}
|
|
|
|
return allowedips
|
|
}
|