util.go 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. // package for logicing client and server code
  2. package logic
  3. import (
  4. "encoding/base64"
  5. "encoding/json"
  6. "log"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "github.com/gravitl/netmaker/database"
  11. "github.com/gravitl/netmaker/dnslogic"
  12. "github.com/gravitl/netmaker/functions"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/relay"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "golang.org/x/crypto/bcrypt"
  17. )
  18. // IsBase64 - checks if a string is in base64 format
  19. // This is used to validate public keys (make sure they're base64 encoded like all public keys should be).
  20. func IsBase64(s string) bool {
  21. _, err := base64.StdEncoding.DecodeString(s)
  22. return err == nil
  23. }
  24. // CheckEndpoint - checks if an endpoint is valid
  25. func CheckEndpoint(endpoint string) bool {
  26. endpointarr := strings.Split(endpoint, ":")
  27. return len(endpointarr) == 2
  28. }
  29. // SetNetworkServerPeers - sets the network server peers of a given node
  30. func SetNetworkServerPeers(node *models.Node) {
  31. if currentPeersList, err := GetSystemPeers(node); err == nil {
  32. if database.SetPeers(currentPeersList, node.Network) {
  33. functions.PrintUserLog(models.NODE_SERVER_NAME, "set new peers on network "+node.Network, 1)
  34. }
  35. } else {
  36. functions.PrintUserLog(models.NODE_SERVER_NAME, "could not set peers on network "+node.Network, 1)
  37. functions.PrintUserLog(models.NODE_SERVER_NAME, err.Error(), 1)
  38. }
  39. }
  40. // DeleteNode - deletes a node from database or moves into delete nodes table
  41. func DeleteNode(key string, exterminate bool) error {
  42. var err error
  43. if !exterminate {
  44. args := strings.Split(key, "###")
  45. node, err := GetNode(args[0], args[1])
  46. if err != nil {
  47. return err
  48. }
  49. node.Action = models.NODE_DELETE
  50. nodedata, err := json.Marshal(&node)
  51. if err != nil {
  52. return err
  53. }
  54. err = database.Insert(key, string(nodedata), database.DELETED_NODES_TABLE_NAME)
  55. if err != nil {
  56. return err
  57. }
  58. } else {
  59. if err := database.DeleteRecord(database.DELETED_NODES_TABLE_NAME, key); err != nil {
  60. functions.PrintUserLog("", err.Error(), 2)
  61. }
  62. }
  63. if err := database.DeleteRecord(database.NODES_TABLE_NAME, key); err != nil {
  64. return err
  65. }
  66. if servercfg.IsDNSMode() {
  67. err = dnslogic.SetDNS()
  68. }
  69. return err
  70. }
  71. // CreateNode - creates a node in database
  72. func CreateNode(node models.Node, networkName string) (models.Node, error) {
  73. //encrypt that password so we never see it
  74. hash, err := bcrypt.GenerateFromPassword([]byte(node.Password), 5)
  75. if err != nil {
  76. return node, err
  77. }
  78. //set password to encrypted password
  79. node.Password = string(hash)
  80. node.Network = networkName
  81. if node.Name == models.NODE_SERVER_NAME {
  82. node.IsServer = "yes"
  83. }
  84. if servercfg.IsDNSMode() && node.DNSOn == "" {
  85. node.DNSOn = "yes"
  86. }
  87. node.SetDefaults()
  88. node.Address, err = functions.UniqueAddress(networkName)
  89. if err != nil {
  90. return node, err
  91. }
  92. node.Address6, err = functions.UniqueAddress6(networkName)
  93. if err != nil {
  94. return node, err
  95. }
  96. //Create a JWT for the node
  97. tokenString, _ := functions.CreateJWT(node.MacAddress, networkName)
  98. if tokenString == "" {
  99. //returnErrorResponse(w, r, errorResponse)
  100. return node, err
  101. }
  102. err = node.Validate(false)
  103. if err != nil {
  104. return node, err
  105. }
  106. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  107. if err != nil {
  108. return node, err
  109. }
  110. nodebytes, err := json.Marshal(&node)
  111. if err != nil {
  112. return node, err
  113. }
  114. err = database.Insert(key, string(nodebytes), database.NODES_TABLE_NAME)
  115. if err != nil {
  116. return node, err
  117. }
  118. if node.IsPending != "yes" {
  119. functions.DecrimentKey(node.Network, node.AccessKey)
  120. }
  121. SetNetworkNodesLastModified(node.Network)
  122. if servercfg.IsDNSMode() {
  123. err = dnslogic.SetDNS()
  124. }
  125. return node, err
  126. }
  127. // SetNetworkNodesLastModified - sets the network nodes last modified
  128. func SetNetworkNodesLastModified(networkName string) error {
  129. timestamp := time.Now().Unix()
  130. network, err := functions.GetParentNetwork(networkName)
  131. if err != nil {
  132. return err
  133. }
  134. network.NodesLastModified = timestamp
  135. data, err := json.Marshal(&network)
  136. if err != nil {
  137. return err
  138. }
  139. err = database.Insert(networkName, string(data), database.NETWORKS_TABLE_NAME)
  140. if err != nil {
  141. return err
  142. }
  143. return nil
  144. }
  145. // GetNode - fetches a node from database
  146. func GetNode(macaddress string, network string) (models.Node, error) {
  147. var node models.Node
  148. key, err := functions.GetRecordKey(macaddress, network)
  149. if err != nil {
  150. return node, err
  151. }
  152. data, err := database.FetchRecord(database.NODES_TABLE_NAME, key)
  153. if err != nil {
  154. if data == "" {
  155. data, err = database.FetchRecord(database.DELETED_NODES_TABLE_NAME, key)
  156. err = json.Unmarshal([]byte(data), &node)
  157. }
  158. return node, err
  159. }
  160. if err = json.Unmarshal([]byte(data), &node); err != nil {
  161. return node, err
  162. }
  163. node.SetDefaults()
  164. return node, err
  165. }
  166. // GetNodePeers - fetches peers for a given node
  167. func GetNodePeers(networkName string, excludeRelayed bool) ([]models.Node, error) {
  168. var peers []models.Node
  169. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  170. if err != nil {
  171. if database.IsEmptyRecord(err) {
  172. return peers, nil
  173. }
  174. functions.PrintUserLog("", err.Error(), 2)
  175. return nil, err
  176. }
  177. udppeers, errN := database.GetPeers(networkName)
  178. if errN != nil {
  179. functions.PrintUserLog("", errN.Error(), 2)
  180. }
  181. for _, value := range collection {
  182. var node models.Node
  183. var peer models.Node
  184. err := json.Unmarshal([]byte(value), &node)
  185. if err != nil {
  186. functions.PrintUserLog("", err.Error(), 2)
  187. continue
  188. }
  189. if node.IsEgressGateway == "yes" { // handle egress stuff
  190. peer.EgressGatewayRanges = node.EgressGatewayRanges
  191. peer.IsEgressGateway = node.IsEgressGateway
  192. }
  193. allow := node.IsRelayed != "yes" || !excludeRelayed
  194. if node.Network == networkName && node.IsPending != "yes" && allow {
  195. peer = setPeerInfo(node)
  196. if node.UDPHolePunch == "yes" && errN == nil && CheckEndpoint(udppeers[node.PublicKey]) {
  197. endpointstring := udppeers[node.PublicKey]
  198. endpointarr := strings.Split(endpointstring, ":")
  199. if len(endpointarr) == 2 {
  200. port, err := strconv.Atoi(endpointarr[1])
  201. if err == nil {
  202. peer.Endpoint = endpointarr[0]
  203. peer.ListenPort = int32(port)
  204. }
  205. }
  206. }
  207. if node.IsRelay == "yes" {
  208. network, err := models.GetNetwork(networkName)
  209. if err == nil {
  210. peer.AllowedIPs = append(peer.AllowedIPs, network.AddressRange)
  211. } else {
  212. peer.AllowedIPs = append(peer.AllowedIPs, node.RelayAddrs...)
  213. }
  214. }
  215. peers = append(peers, peer)
  216. }
  217. }
  218. return peers, err
  219. }
  220. // GetPeersList - gets the peers of a given network
  221. func GetPeersList(networkName string, excludeRelayed bool, relayedNodeAddr string) ([]models.Node, error) {
  222. var peers []models.Node
  223. var relayNode models.Node
  224. var err error
  225. if relayedNodeAddr == "" {
  226. peers, err = GetNodePeers(networkName, excludeRelayed)
  227. } else {
  228. relayNode, err = relay.GetNodeRelay(networkName, relayedNodeAddr)
  229. if relayNode.Address != "" {
  230. relayNode = setPeerInfo(relayNode)
  231. network, err := models.GetNetwork(networkName)
  232. if err == nil {
  233. relayNode.AllowedIPs = append(relayNode.AllowedIPs, network.AddressRange)
  234. } else {
  235. relayNode.AllowedIPs = append(relayNode.AllowedIPs, relayNode.RelayAddrs...)
  236. }
  237. nodepeers, err := GetNodePeers(networkName, false)
  238. if err == nil && relayNode.UDPHolePunch == "yes" {
  239. for _, nodepeer := range nodepeers {
  240. if nodepeer.Address == relayNode.Address {
  241. relayNode.Endpoint = nodepeer.Endpoint
  242. relayNode.ListenPort = nodepeer.ListenPort
  243. }
  244. }
  245. }
  246. peers = append(peers, relayNode)
  247. }
  248. }
  249. return peers, err
  250. }
  251. func setPeerInfo(node models.Node) models.Node {
  252. var peer models.Node
  253. peer.RelayAddrs = node.RelayAddrs
  254. peer.IsRelay = node.IsRelay
  255. peer.IsServer = node.IsServer
  256. peer.IsRelayed = node.IsRelayed
  257. peer.PublicKey = node.PublicKey
  258. peer.Endpoint = node.Endpoint
  259. peer.LocalAddress = node.LocalAddress
  260. peer.ListenPort = node.ListenPort
  261. peer.AllowedIPs = node.AllowedIPs
  262. peer.UDPHolePunch = node.UDPHolePunch
  263. peer.Address = node.Address
  264. peer.Address6 = node.Address6
  265. peer.EgressGatewayRanges = node.EgressGatewayRanges
  266. peer.IsEgressGateway = node.IsEgressGateway
  267. peer.IngressGatewayRange = node.IngressGatewayRange
  268. peer.IsIngressGateway = node.IsIngressGateway
  269. peer.IsPending = node.IsPending
  270. return peer
  271. }
  272. func Log(message string, loglevel int) {
  273. log.SetFlags(log.Flags() &^ (log.Llongfile | log.Lshortfile))
  274. if int32(loglevel) <= servercfg.GetVerbose() && servercfg.GetVerbose() != 0 {
  275. log.Println(message)
  276. }
  277. }