gateway.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "strings"
  6. "time"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/logger"
  9. "github.com/gravitl/netmaker/models"
  10. )
  11. // CreateEgressGateway - creates an egress gateway
  12. func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {
  13. node, err := GetNodeByID(gateway.NodeID)
  14. if err != nil {
  15. return models.Node{}, err
  16. }
  17. if node.OS != "linux" && node.OS != "freebsd" { // add in darwin later
  18. return models.Node{}, errors.New(node.OS + " is unsupported for egress gateways")
  19. }
  20. if gateway.NatEnabled == "" {
  21. gateway.NatEnabled = "yes"
  22. }
  23. err = ValidateEgressGateway(gateway)
  24. if err != nil {
  25. return models.Node{}, err
  26. }
  27. node.IsEgressGateway = "yes"
  28. node.EgressGatewayRanges = gateway.Ranges
  29. node.EgressGatewayNatEnabled = gateway.NatEnabled
  30. postUpCmd := ""
  31. postDownCmd := ""
  32. if node.OS == "linux" {
  33. // nftables only supported on Linux
  34. if IsNFTablesPresent() {
  35. // assumes chains eg FORWARD and POSTROUTING already exist
  36. logger.Log(3, "creating egress gateway using nftables")
  37. postUpCmd = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  38. postUpCmd += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  39. postDownCmd = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  40. postDownCmd += "nft delete rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  41. if node.EgressGatewayNatEnabled == "yes" {
  42. postUpCmd += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ;"
  43. postDownCmd += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ;"
  44. }
  45. } else {
  46. logger.Log(3, "creating egress gateway using iptables")
  47. postUpCmd = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; "
  48. postUpCmd += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT"
  49. postDownCmd = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; "
  50. postDownCmd += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT"
  51. if node.EgressGatewayNatEnabled == "yes" {
  52. postUpCmd += "; iptables -t nat -A POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  53. postDownCmd += "; iptables -t nat -D POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  54. }
  55. }
  56. }
  57. if node.OS == "freebsd" {
  58. postUpCmd = "kldload ipfw ipfw_nat ; "
  59. postUpCmd += "ipfw disable one_pass ; "
  60. postUpCmd += "ipfw nat 1 config if " + gateway.Interface + " same_ports unreg_only reset ; "
  61. postUpCmd += "ipfw add 64000 reass all from any to any in ; "
  62. postUpCmd += "ipfw add 64000 nat 1 ip from any to any in via " + gateway.Interface + " ; "
  63. postUpCmd += "ipfw add 64000 check-state ; "
  64. postUpCmd += "ipfw add 64000 nat 1 ip from any to any out via " + gateway.Interface + " ; "
  65. postUpCmd += "ipfw add 65534 allow ip from any to any ; "
  66. postDownCmd = "ipfw delete 64000 ; "
  67. postDownCmd += "ipfw delete 65534 ; "
  68. postDownCmd += "kldunload ipfw_nat ipfw"
  69. }
  70. if gateway.PostUp != "" {
  71. postUpCmd = gateway.PostUp
  72. }
  73. if gateway.PostDown != "" {
  74. postDownCmd = gateway.PostDown
  75. }
  76. if node.PostUp != "" {
  77. if !strings.Contains(node.PostUp, postUpCmd) {
  78. postUpCmd = node.PostUp + "; " + postUpCmd
  79. }
  80. }
  81. if node.PostDown != "" {
  82. if !strings.Contains(node.PostDown, postDownCmd) {
  83. postDownCmd = node.PostDown + "; " + postDownCmd
  84. }
  85. }
  86. node.PostUp = postUpCmd
  87. node.PostDown = postDownCmd
  88. node.SetLastModified()
  89. nodeData, err := json.Marshal(&node)
  90. if err != nil {
  91. return node, err
  92. }
  93. if err = database.Insert(node.ID, string(nodeData), database.NODES_TABLE_NAME); err != nil {
  94. return models.Node{}, err
  95. }
  96. if err = NetworkNodesUpdatePullChanges(node.Network); err != nil {
  97. return models.Node{}, err
  98. }
  99. return node, nil
  100. }
  101. // ValidateEgressGateway - validates the egress gateway model
  102. func ValidateEgressGateway(gateway models.EgressGatewayRequest) error {
  103. var err error
  104. empty := len(gateway.Ranges) == 0
  105. if empty {
  106. err = errors.New("IP Ranges Cannot Be Empty")
  107. }
  108. empty = gateway.Interface == ""
  109. if empty {
  110. err = errors.New("interface cannot be empty")
  111. }
  112. return err
  113. }
  114. // DeleteEgressGateway - deletes egress from node
  115. func DeleteEgressGateway(network, nodeid string) (models.Node, error) {
  116. node, err := GetNodeByID(nodeid)
  117. if err != nil {
  118. return models.Node{}, err
  119. }
  120. node.IsEgressGateway = "no"
  121. node.EgressGatewayRanges = []string{}
  122. node.PostUp = ""
  123. node.PostDown = ""
  124. if node.IsIngressGateway == "yes" { // check if node is still an ingress gateway before completely deleting postdown/up rules
  125. if node.OS == "linux" {
  126. // nftables only supported on Linux
  127. if IsNFTablesPresent() {
  128. // assumes chains eg FORWARD and POSTROUTING already exist
  129. logger.Log(3, "deleting egress gateway using nftables")
  130. node.PostUp = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  131. node.PostUp += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  132. node.PostUp += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ; "
  133. node.PostDown = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ;"
  134. node.PostDown += "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ;"
  135. node.PostDown += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade "
  136. } else {
  137. logger.Log(3, "deleting egress gateway using iptables")
  138. node.PostUp = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT ; "
  139. node.PostUp += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT ; "
  140. node.PostUp += "iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  141. node.PostDown = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT ; "
  142. node.PostDown += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT ; "
  143. node.PostDown += "iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  144. }
  145. }
  146. if node.OS == "freebsd" {
  147. node.PostUp = ""
  148. node.PostDown = "ipfw delete 64000 ; "
  149. node.PostDown += "ipfw delete 65534 ; "
  150. node.PostDown += "kldunload ipfw_nat ipfw"
  151. }
  152. }
  153. node.SetLastModified()
  154. data, err := json.Marshal(&node)
  155. if err != nil {
  156. return models.Node{}, err
  157. }
  158. if err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME); err != nil {
  159. return models.Node{}, err
  160. }
  161. if err = NetworkNodesUpdatePullChanges(network); err != nil {
  162. return models.Node{}, err
  163. }
  164. return node, nil
  165. }
  166. // CreateIngressGateway - creates an ingress gateway
  167. func CreateIngressGateway(netid string, nodeid string) (models.Node, error) {
  168. var postUpCmd, postDownCmd string
  169. node, err := GetNodeByID(nodeid)
  170. if node.OS != "linux" { // add in darwin later
  171. return models.Node{}, errors.New(node.OS + " is unsupported for ingress gateways")
  172. }
  173. if err != nil {
  174. return models.Node{}, err
  175. }
  176. network, err := GetParentNetwork(netid)
  177. if err != nil {
  178. return models.Node{}, err
  179. }
  180. node.IsIngressGateway = "yes"
  181. node.IngressGatewayRange = network.AddressRange
  182. if IsNFTablesPresent() {
  183. // assumes chains eg FORWARD and POSTROUTING already exist
  184. logger.Log(3, "creating ingress gateway using nftables")
  185. postUpCmd = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  186. postUpCmd += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  187. postUpCmd += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade"
  188. postDownCmd = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  189. postDownCmd += "nft delete rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  190. postDownCmd += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade"
  191. } else {
  192. logger.Log(3, "creating ingress gateway using iptables")
  193. postUpCmd = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT ; "
  194. postUpCmd += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT ; "
  195. postUpCmd += "iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  196. postDownCmd = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT ; "
  197. postDownCmd += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT ; "
  198. postDownCmd += "iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  199. }
  200. if node.PostUp != "" {
  201. if !strings.Contains(node.PostUp, postUpCmd) {
  202. postUpCmd = node.PostUp + "; " + postUpCmd
  203. }
  204. }
  205. if node.PostDown != "" {
  206. if !strings.Contains(node.PostDown, postDownCmd) {
  207. postDownCmd = node.PostDown + "; " + postDownCmd
  208. }
  209. }
  210. node.SetLastModified()
  211. node.PostUp = postUpCmd
  212. node.PostDown = postDownCmd
  213. node.UDPHolePunch = "no"
  214. data, err := json.Marshal(&node)
  215. if err != nil {
  216. return models.Node{}, err
  217. }
  218. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  219. if err != nil {
  220. return models.Node{}, err
  221. }
  222. err = SetNetworkNodesLastModified(netid)
  223. return node, err
  224. }
  225. // DeleteIngressGateway - deletes an ingress gateway
  226. func DeleteIngressGateway(networkName string, nodeid string) (models.Node, error) {
  227. node, err := GetNodeByID(nodeid)
  228. if err != nil {
  229. return models.Node{}, err
  230. }
  231. network, err := GetParentNetwork(networkName)
  232. if err != nil {
  233. return models.Node{}, err
  234. }
  235. // delete ext clients belonging to ingress gateway
  236. if err = DeleteGatewayExtClients(node.ID, networkName); err != nil {
  237. return models.Node{}, err
  238. }
  239. node.UDPHolePunch = network.DefaultUDPHolePunch
  240. node.LastModified = time.Now().Unix()
  241. node.IsIngressGateway = "no"
  242. node.IngressGatewayRange = ""
  243. data, err := json.Marshal(&node)
  244. if err != nil {
  245. return models.Node{}, err
  246. }
  247. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  248. if err != nil {
  249. return models.Node{}, err
  250. }
  251. err = SetNetworkNodesLastModified(networkName)
  252. return node, err
  253. }
  254. // DeleteGatewayExtClients - deletes ext clients based on gateway (mac) of ingress node and network
  255. func DeleteGatewayExtClients(gatewayID string, networkName string) error {
  256. currentExtClients, err := GetNetworkExtClients(networkName)
  257. if err != nil && !database.IsEmptyRecord(err) {
  258. return err
  259. }
  260. for _, extClient := range currentExtClients {
  261. if extClient.IngressGatewayID == gatewayID {
  262. if err = DeleteExtClient(networkName, extClient.ClientID); err != nil {
  263. logger.Log(1, "failed to remove ext client", extClient.ClientID)
  264. continue
  265. }
  266. }
  267. }
  268. return nil
  269. }