util.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344
  1. // package for logicing client and server code
  2. package logic
  3. import (
  4. crand "crypto/rand"
  5. "encoding/base64"
  6. "encoding/json"
  7. "fmt"
  8. "math/big"
  9. "math/rand"
  10. "net"
  11. "os"
  12. "strconv"
  13. "strings"
  14. "time"
  15. "github.com/gravitl/netmaker/database"
  16. "github.com/gravitl/netmaker/logger"
  17. "github.com/gravitl/netmaker/models"
  18. "github.com/gravitl/netmaker/netclient/ncutils"
  19. "github.com/gravitl/netmaker/servercfg"
  20. )
  21. // IsBase64 - checks if a string is in base64 format
  22. // This is used to validate public keys (make sure they're base64 encoded like all public keys should be).
  23. func IsBase64(s string) bool {
  24. _, err := base64.StdEncoding.DecodeString(s)
  25. return err == nil
  26. }
  27. // CheckEndpoint - checks if an endpoint is valid
  28. func CheckEndpoint(endpoint string) bool {
  29. endpointarr := strings.Split(endpoint, ":")
  30. return len(endpointarr) == 2
  31. }
  32. // FileExists - checks if local file exists
  33. func FileExists(f string) bool {
  34. info, err := os.Stat(f)
  35. if os.IsNotExist(err) {
  36. return false
  37. }
  38. return !info.IsDir()
  39. }
  40. // IsAddressInCIDR - util to see if an address is in a cidr or not
  41. func IsAddressInCIDR(address, cidr string) bool {
  42. var _, currentCIDR, cidrErr = net.ParseCIDR(cidr)
  43. if cidrErr != nil {
  44. return false
  45. }
  46. var addrParts = strings.Split(address, ".")
  47. var addrPartLength = len(addrParts)
  48. if addrPartLength != 4 {
  49. return false
  50. } else {
  51. if addrParts[addrPartLength-1] == "0" ||
  52. addrParts[addrPartLength-1] == "255" {
  53. return false
  54. }
  55. }
  56. ip, _, err := net.ParseCIDR(fmt.Sprintf("%s/32", address))
  57. if err != nil {
  58. return false
  59. }
  60. return currentCIDR.Contains(ip)
  61. }
  62. // SetNetworkNodesLastModified - sets the network nodes last modified
  63. func SetNetworkNodesLastModified(networkName string) error {
  64. timestamp := time.Now().Unix()
  65. network, err := GetParentNetwork(networkName)
  66. if err != nil {
  67. return err
  68. }
  69. network.NodesLastModified = timestamp
  70. data, err := json.Marshal(&network)
  71. if err != nil {
  72. return err
  73. }
  74. err = database.Insert(networkName, string(data), database.NETWORKS_TABLE_NAME)
  75. if err != nil {
  76. return err
  77. }
  78. return nil
  79. }
  80. // GenerateCryptoString - generates random string of n length
  81. func GenerateCryptoString(n int) (string, error) {
  82. const chars = "123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-"
  83. ret := make([]byte, n)
  84. for i := range ret {
  85. num, err := crand.Int(crand.Reader, big.NewInt(int64(len(chars))))
  86. if err != nil {
  87. return "", err
  88. }
  89. ret[i] = chars[num.Int64()]
  90. }
  91. return string(ret), nil
  92. }
  93. // DeleteNodeByID - deletes a node from database or moves into delete nodes table
  94. func DeleteNodeByID(node *models.Node, exterminate bool) error {
  95. var err error
  96. var key = node.ID
  97. if !exterminate {
  98. node.Action = models.NODE_DELETE
  99. nodedata, err := json.Marshal(&node)
  100. if err != nil {
  101. return err
  102. }
  103. err = database.Insert(key, string(nodedata), database.DELETED_NODES_TABLE_NAME)
  104. if err != nil {
  105. return err
  106. }
  107. } else {
  108. if err := database.DeleteRecord(database.DELETED_NODES_TABLE_NAME, key); err != nil {
  109. logger.Log(2, err.Error())
  110. }
  111. }
  112. if err = database.DeleteRecord(database.NODES_TABLE_NAME, key); err != nil {
  113. return err
  114. }
  115. if servercfg.IsDNSMode() {
  116. SetDNS()
  117. }
  118. return removeLocalServer(node)
  119. }
  120. // GetNodePeers - fetches peers for a given node
  121. func GetNodePeers(networkName string, excludeRelayed bool) ([]models.Node, error) {
  122. var peers []models.Node
  123. var networkNodes, egressNetworkNodes, err = getNetworkEgressAndNodes(networkName)
  124. if err != nil {
  125. return peers, nil
  126. }
  127. udppeers, errN := database.GetPeers(networkName)
  128. if errN != nil {
  129. logger.Log(2, errN.Error())
  130. }
  131. for _, node := range networkNodes {
  132. var peer = models.Node{}
  133. if node.IsEgressGateway == "yes" { // handle egress stuff
  134. peer.EgressGatewayRanges = node.EgressGatewayRanges
  135. peer.IsEgressGateway = node.IsEgressGateway
  136. }
  137. allow := node.IsRelayed != "yes" || !excludeRelayed
  138. if node.Network == networkName && node.IsPending != "yes" && allow {
  139. peer = setPeerInfo(&node)
  140. if node.UDPHolePunch == "yes" && errN == nil && CheckEndpoint(udppeers[node.PublicKey]) {
  141. endpointstring := udppeers[node.PublicKey]
  142. endpointarr := strings.Split(endpointstring, ":")
  143. if len(endpointarr) == 2 {
  144. port, err := strconv.Atoi(endpointarr[1])
  145. if err == nil {
  146. // peer.Endpoint = endpointarr[0]
  147. peer.ListenPort = int32(port)
  148. }
  149. }
  150. }
  151. if node.IsRelay == "yes" {
  152. network, err := GetNetwork(networkName)
  153. if err == nil {
  154. peer.AllowedIPs = append(peer.AllowedIPs, network.AddressRange)
  155. } else {
  156. peer.AllowedIPs = append(peer.AllowedIPs, node.RelayAddrs...)
  157. }
  158. for _, egressNode := range egressNetworkNodes {
  159. if egressNode.IsRelayed == "yes" && StringSliceContains(node.RelayAddrs, egressNode.Address) {
  160. peer.AllowedIPs = append(peer.AllowedIPs, egressNode.EgressGatewayRanges...)
  161. }
  162. }
  163. }
  164. peers = append(peers, peer)
  165. }
  166. }
  167. return peers, err
  168. }
  169. // GetPeersList - gets the peers of a given network
  170. func GetPeersList(networkName string, excludeRelayed bool, relayedNodeAddr string) ([]models.Node, error) {
  171. var peers []models.Node
  172. var err error
  173. if relayedNodeAddr == "" {
  174. peers, err = GetNodePeers(networkName, excludeRelayed)
  175. } else {
  176. var relayNode models.Node
  177. relayNode, err = GetNodeRelay(networkName, relayedNodeAddr)
  178. if relayNode.Address != "" {
  179. var peerNode = setPeerInfo(&relayNode)
  180. network, err := GetNetwork(networkName)
  181. if err == nil {
  182. peerNode.AllowedIPs = append(peerNode.AllowedIPs, network.AddressRange)
  183. var _, egressNetworkNodes, err = getNetworkEgressAndNodes(networkName)
  184. if err == nil {
  185. for _, egress := range egressNetworkNodes {
  186. if egress.Address != relayedNodeAddr {
  187. peerNode.AllowedIPs = append(peerNode.AllowedIPs, egress.EgressGatewayRanges...)
  188. }
  189. }
  190. }
  191. } else {
  192. peerNode.AllowedIPs = append(peerNode.AllowedIPs, peerNode.RelayAddrs...)
  193. }
  194. nodepeers, err := GetNodePeers(networkName, false)
  195. if err == nil && peerNode.UDPHolePunch == "yes" {
  196. for _, nodepeer := range nodepeers {
  197. if nodepeer.Address == peerNode.Address {
  198. // peerNode.Endpoint = nodepeer.Endpoint
  199. peerNode.ListenPort = nodepeer.ListenPort
  200. }
  201. }
  202. }
  203. peers = append(peers, peerNode)
  204. }
  205. }
  206. return peers, err
  207. }
  208. // RandomString - returns a random string in a charset
  209. func RandomString(length int) string {
  210. const charset = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  211. var seededRand *rand.Rand = rand.New(rand.NewSource(time.Now().UnixNano()))
  212. b := make([]byte, length)
  213. for i := range b {
  214. b[i] = charset[seededRand.Intn(len(charset))]
  215. }
  216. return string(b)
  217. }
  218. // == Private Methods ==
  219. func getNetworkEgressAndNodes(networkName string) ([]models.Node, []models.Node, error) {
  220. var networkNodes, egressNetworkNodes []models.Node
  221. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  222. if err != nil {
  223. if database.IsEmptyRecord(err) {
  224. return networkNodes, egressNetworkNodes, nil
  225. }
  226. logger.Log(2, err.Error())
  227. return nil, nil, err
  228. }
  229. for _, value := range collection {
  230. var node = models.Node{}
  231. err := json.Unmarshal([]byte(value), &node)
  232. if err != nil {
  233. logger.Log(2, err.Error())
  234. continue
  235. }
  236. if node.Network == networkName {
  237. networkNodes = append(networkNodes, node)
  238. if node.IsEgressGateway == "yes" {
  239. egressNetworkNodes = append(egressNetworkNodes, node)
  240. }
  241. }
  242. }
  243. return networkNodes, egressNetworkNodes, nil
  244. }
  245. func setPeerInfo(node *models.Node) models.Node {
  246. var peer models.Node
  247. peer.RelayAddrs = node.RelayAddrs
  248. peer.IsRelay = node.IsRelay
  249. peer.IsServer = node.IsServer
  250. peer.IsRelayed = node.IsRelayed
  251. peer.PublicKey = node.PublicKey
  252. peer.Endpoint = node.Endpoint
  253. peer.Name = node.Name
  254. peer.LocalAddress = node.LocalAddress
  255. peer.ListenPort = node.ListenPort
  256. peer.AllowedIPs = node.AllowedIPs
  257. peer.UDPHolePunch = node.UDPHolePunch
  258. peer.Address = node.Address
  259. peer.Address6 = node.Address6
  260. peer.EgressGatewayRanges = node.EgressGatewayRanges
  261. peer.IsEgressGateway = node.IsEgressGateway
  262. peer.IngressGatewayRange = node.IngressGatewayRange
  263. peer.IsIngressGateway = node.IsIngressGateway
  264. peer.IsPending = node.IsPending
  265. return peer
  266. }
  267. func setIPForwardingLinux() error {
  268. out, err := ncutils.RunCmd("sysctl net.ipv4.ip_forward", true)
  269. if err != nil {
  270. logger.Log(0, "WARNING: Error encountered setting ip forwarding. This can break functionality.")
  271. return err
  272. } else {
  273. s := strings.Fields(string(out))
  274. if s[2] != "1" {
  275. _, err = ncutils.RunCmd("sysctl -w net.ipv4.ip_forward=1", true)
  276. if err != nil {
  277. logger.Log(0, "WARNING: Error encountered setting ip forwarding. You may want to investigate this.")
  278. return err
  279. }
  280. }
  281. }
  282. return nil
  283. }
  284. // StringSliceContains - sees if a string slice contains a string element
  285. func StringSliceContains(slice []string, item string) bool {
  286. for _, s := range slice {
  287. if s == item {
  288. return true
  289. }
  290. }
  291. return false
  292. }
  293. // == private ==
  294. // sets the network server peers of a given node
  295. func setNetworkServerPeers(serverNode *models.Node) {
  296. if currentPeersList, err := getSystemPeers(serverNode); err == nil {
  297. if database.SetPeers(currentPeersList, serverNode.Network) {
  298. logger.Log(1, "set new peers on network", serverNode.Network)
  299. }
  300. } else {
  301. logger.Log(1, "could not set peers on network", serverNode.Network, ":", err.Error())
  302. }
  303. }
  304. // ShouldPublishPeerPorts - Gets ports from iface, sets, and returns true if they are different
  305. func ShouldPublishPeerPorts(serverNode *models.Node) bool {
  306. if currentPeersList, err := getSystemPeers(serverNode); err == nil {
  307. if database.SetPeers(currentPeersList, serverNode.Network) {
  308. logger.Log(1, "set new peers on network", serverNode.Network)
  309. return true
  310. }
  311. }
  312. return false
  313. }