modify.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. package nodeacls
  2. import (
  3. "github.com/gravitl/netmaker/database"
  4. "github.com/gravitl/netmaker/logic/acls"
  5. )
  6. // CreateNodeACL - inserts or updates a node ACL on given network and adds to state
  7. func CreateNodeACL(networkID NetworkID, nodeID NodeID, defaultVal byte) (acls.ACL, error) {
  8. if defaultVal != acls.NotAllowed && defaultVal != acls.Allowed {
  9. defaultVal = acls.NotAllowed
  10. }
  11. var currentNetworkACL, err = FetchAllACLs(networkID)
  12. if err != nil {
  13. if database.IsEmptyRecord(err) {
  14. currentNetworkACL, err = currentNetworkACL.New(acls.ContainerID(networkID))
  15. if err != nil {
  16. return nil, err
  17. }
  18. } else {
  19. return nil, err
  20. }
  21. }
  22. var newNodeACL = make(acls.ACL)
  23. for existingNodeID := range currentNetworkACL {
  24. currentNetworkACL[existingNodeID][acls.AclID(nodeID)] = defaultVal // set the old nodes to default value for new node
  25. newNodeACL[existingNodeID] = defaultVal // set the old nodes in new node ACL to default value
  26. }
  27. currentNetworkACL[acls.AclID(nodeID)] = newNodeACL // append the new node's ACL
  28. retNetworkACL, err := currentNetworkACL.Save(acls.ContainerID(networkID)) // insert into db
  29. if err != nil {
  30. return nil, err
  31. }
  32. return retNetworkACL[acls.AclID(nodeID)], nil
  33. }
  34. // AllowNode - allow access between two nodes in memory
  35. func AllowNodes(networkID NetworkID, node1, node2 NodeID) (acls.ACLContainer, error) {
  36. container, err := FetchAllACLs(networkID)
  37. if err != nil {
  38. return nil, err
  39. }
  40. container[acls.AclID(node1)].Allow(acls.AclID(node2))
  41. container[acls.AclID(node2)].Allow(acls.AclID(node1))
  42. return container, nil
  43. }
  44. // DisallowNodes - deny access between two nodes
  45. func DisallowNodes(networkID NetworkID, node1, node2 NodeID) (acls.ACLContainer, error) {
  46. container, err := FetchAllACLs(networkID)
  47. if err != nil {
  48. return nil, err
  49. }
  50. container[acls.AclID(node1)].Disallow(acls.AclID(node2))
  51. container[acls.AclID(node2)].Disallow(acls.AclID(node1))
  52. return container, nil
  53. }
  54. // UpdateNodeACL - updates a node's ACL in state
  55. func UpdateNodeACL(networkID NetworkID, nodeID NodeID, acl acls.ACL) (acls.ACL, error) {
  56. var currentNetworkACL, err = FetchAllACLs(networkID)
  57. if err != nil {
  58. return nil, err
  59. }
  60. currentNetworkACL[acls.AclID(nodeID)] = acl
  61. return currentNetworkACL[acls.AclID(nodeID)].Save(acls.ContainerID(networkID), acls.AclID(nodeID))
  62. }
  63. // RemoveNodeACL - removes a specific Node's ACL, returns the NetworkACL and error
  64. func RemoveNodeACL(networkID NetworkID, nodeID NodeID) (acls.ACLContainer, error) {
  65. var currentNetworkACL, err = FetchAllACLs(networkID)
  66. if err != nil {
  67. return nil, err
  68. }
  69. for currentNodeID := range currentNetworkACL {
  70. if NodeID(currentNodeID) != nodeID {
  71. currentNetworkACL[currentNodeID].Remove(acls.AclID(nodeID))
  72. }
  73. }
  74. delete(currentNetworkACL, acls.AclID(nodeID))
  75. return currentNetworkACL.Save(acls.ContainerID(networkID))
  76. }
  77. // DeleteACLContainer - removes an ACLContainer state from db
  78. func DeleteACLContainer(network NetworkID) error {
  79. return database.DeleteRecord(database.NODE_ACLS_TABLE_NAME, string(network))
  80. }