|
@@ -10,6 +10,7 @@ import (
|
|
|
|
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logger"
|
|
"github.com/gravitl/netmaker/logic"
|
|
"github.com/gravitl/netmaker/logic"
|
|
|
|
+ "github.com/gravitl/netmaker/logic/acls/nodeacls"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/models"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"github.com/gravitl/netmaker/servercfg"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
@@ -110,17 +111,18 @@ func PublishSingleHostPeerUpdate(ctx context.Context, host *models.Host, deleted
|
|
return publish(host, fmt.Sprintf("peers/host/%s/%s", host.ID.String(), servercfg.GetServer()), data)
|
|
return publish(host, fmt.Sprintf("peers/host/%s/%s", host.ID.String(), servercfg.GetServer()), data)
|
|
}
|
|
}
|
|
|
|
|
|
-func FlushNetworkPeersToHost(host *models.Host, hNode *models.Node) error {
|
|
|
|
|
|
+// FlushNetworkPeersToHost - sends all the peers in the network to the host.
|
|
|
|
+func FlushNetworkPeersToHost(host *models.Host, hNode *models.Node, networkNodes []models.Node) error {
|
|
logger.Log(0, "flushing network peers to host: ", host.ID.String(), hNode.Network)
|
|
logger.Log(0, "flushing network peers to host: ", host.ID.String(), hNode.Network)
|
|
- nodes, err := logic.GetNetworkNodes(hNode.Network)
|
|
|
|
- if err != nil {
|
|
|
|
- return err
|
|
|
|
- }
|
|
|
|
- p := models.PeerAction{
|
|
|
|
|
|
+ addPeerAction := models.PeerAction{
|
|
Action: models.AddPeer,
|
|
Action: models.AddPeer,
|
|
Peers: []wgtypes.PeerConfig{},
|
|
Peers: []wgtypes.PeerConfig{},
|
|
}
|
|
}
|
|
- for _, nodeI := range nodes {
|
|
|
|
|
|
+ rmPeerAction := models.PeerAction{
|
|
|
|
+ Action: models.RemovePeer,
|
|
|
|
+ Peers: []wgtypes.PeerConfig{},
|
|
|
|
+ }
|
|
|
|
+ for _, nodeI := range networkNodes {
|
|
if nodeI.ID == hNode.ID {
|
|
if nodeI.ID == hNode.ID {
|
|
// skip self
|
|
// skip self
|
|
continue
|
|
continue
|
|
@@ -129,7 +131,17 @@ func FlushNetworkPeersToHost(host *models.Host, hNode *models.Node) error {
|
|
if err != nil {
|
|
if err != nil {
|
|
continue
|
|
continue
|
|
}
|
|
}
|
|
- p.Peers = append(p.Peers, wgtypes.PeerConfig{
|
|
|
|
|
|
+
|
|
|
|
+ if !nodeacls.AreNodesAllowed(nodeacls.NetworkID(nodeI.Network), nodeacls.NodeID(nodeI.ID.String()), nodeacls.NodeID(hNode.ID.String())) {
|
|
|
|
+ // remove peer if not allowed
|
|
|
|
+ rmPeerAction.Peers = append(rmPeerAction.Peers, wgtypes.PeerConfig{
|
|
|
|
+ PublicKey: peerHost.PublicKey,
|
|
|
|
+ Remove: true,
|
|
|
|
+ })
|
|
|
|
+ continue
|
|
|
|
+
|
|
|
|
+ }
|
|
|
|
+ peerCfg := wgtypes.PeerConfig{
|
|
PublicKey: peerHost.PublicKey,
|
|
PublicKey: peerHost.PublicKey,
|
|
Endpoint: &net.UDPAddr{
|
|
Endpoint: &net.UDPAddr{
|
|
IP: peerHost.EndpointIP,
|
|
IP: peerHost.EndpointIP,
|
|
@@ -138,14 +150,23 @@ func FlushNetworkPeersToHost(host *models.Host, hNode *models.Node) error {
|
|
PersistentKeepaliveInterval: &nodeI.PersistentKeepalive,
|
|
PersistentKeepaliveInterval: &nodeI.PersistentKeepalive,
|
|
ReplaceAllowedIPs: true,
|
|
ReplaceAllowedIPs: true,
|
|
AllowedIPs: logic.GetAllowedIPs(hNode, &nodeI, nil),
|
|
AllowedIPs: logic.GetAllowedIPs(hNode, &nodeI, nil),
|
|
- })
|
|
|
|
-
|
|
|
|
|
|
+ }
|
|
|
|
+ addPeerAction.Peers = append(addPeerAction.Peers, peerCfg)
|
|
}
|
|
}
|
|
- data, err := json.Marshal(p)
|
|
|
|
- if err != nil {
|
|
|
|
- return err
|
|
|
|
|
|
+ if len(rmPeerAction.Peers) > 0 {
|
|
|
|
+ data, err := json.Marshal(rmPeerAction)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+ publish(host, fmt.Sprintf("peer/host/%s/%s", host.ID.String(), servercfg.GetServer()), data)
|
|
|
|
+ }
|
|
|
|
+ if len(addPeerAction.Peers) > 0 {
|
|
|
|
+ data, err := json.Marshal(addPeerAction)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+ publish(host, fmt.Sprintf("peer/host/%s/%s", host.ID.String(), servercfg.GetServer()), data)
|
|
}
|
|
}
|
|
- publish(host, fmt.Sprintf("peer/host/%s/%s", host.ID.String(), servercfg.GetServer()), data)
|
|
|
|
return nil
|
|
return nil
|
|
}
|
|
}
|
|
|
|
|
|
@@ -181,6 +202,21 @@ func BroadCastDelPeer(host *models.Host, network string) error {
|
|
return nil
|
|
return nil
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+func BroadCastAclUpdate(network string) error {
|
|
|
|
+ nodes, err := logic.GetNetworkNodes(network)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+ for _, nodeI := range nodes {
|
|
|
|
+ nodeI := nodeI
|
|
|
|
+ h, err := logic.GetHost(nodeI.HostID.String())
|
|
|
|
+ if err == nil {
|
|
|
|
+ go FlushNetworkPeersToHost(h, &nodeI, nodes)
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ return err
|
|
|
|
+}
|
|
|
|
+
|
|
// BroadCastAddOrUpdatePeer - notifys the hosts in the network to add or update peer.
|
|
// BroadCastAddOrUpdatePeer - notifys the hosts in the network to add or update peer.
|
|
func BroadCastAddOrUpdatePeer(host *models.Host, node *models.Node, update bool) error {
|
|
func BroadCastAddOrUpdatePeer(host *models.Host, node *models.Node, update bool) error {
|
|
// TODO: ACLs
|
|
// TODO: ACLs
|
|
@@ -213,6 +249,10 @@ func BroadCastAddOrUpdatePeer(host *models.Host, node *models.Node, update bool)
|
|
}
|
|
}
|
|
// update allowed ips, according to the peer node
|
|
// update allowed ips, according to the peer node
|
|
p.Peers[0].AllowedIPs = logic.GetAllowedIPs(&nodeI, node, nil)
|
|
p.Peers[0].AllowedIPs = logic.GetAllowedIPs(&nodeI, node, nil)
|
|
|
|
+ if update && !nodeacls.AreNodesAllowed(nodeacls.NetworkID(node.Network), nodeacls.NodeID(node.ID.String()), nodeacls.NodeID(nodeI.ID.String())) {
|
|
|
|
+ // remove peer if not allowed
|
|
|
|
+ p.Action = models.RemovePeer
|
|
|
|
+ }
|
|
data, err := json.Marshal(p)
|
|
data, err := json.Marshal(p)
|
|
if err != nil {
|
|
if err != nil {
|
|
continue
|
|
continue
|