network.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/logic/acls"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/mq"
  15. "github.com/gravitl/netmaker/servercfg"
  16. )
  17. func networkHandlers(r *mux.Router) {
  18. r.HandleFunc("/api/networks", logic.SecurityCheck(false, http.HandlerFunc(getNetworks))).Methods(http.MethodGet)
  19. r.HandleFunc("/api/networks", logic.SecurityCheck(true, checkFreeTierLimits(networks_l, http.HandlerFunc(createNetwork)))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(getNetwork))).Methods(http.MethodGet)
  21. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(updateNetwork))).Methods(http.MethodPut)
  22. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(true, http.HandlerFunc(deleteNetwork))).Methods(http.MethodDelete)
  23. r.HandleFunc("/api/networks/{networkname}/keyupdate", logic.SecurityCheck(true, http.HandlerFunc(keyUpdate))).Methods(http.MethodPost)
  24. // ACLs
  25. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(updateNetworkACL))).Methods(http.MethodPut)
  26. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(getNetworkACL))).Methods(http.MethodGet)
  27. }
  28. // swagger:route GET /api/networks networks getNetworks
  29. //
  30. // Lists all networks.
  31. //
  32. // Schemes: https
  33. //
  34. // Security:
  35. // oauth
  36. //
  37. // Responses:
  38. // 200: getNetworksSliceResponse
  39. func getNetworks(w http.ResponseWriter, r *http.Request) {
  40. headerNetworks := r.Header.Get("networks")
  41. networksSlice := []string{}
  42. marshalErr := json.Unmarshal([]byte(headerNetworks), &networksSlice)
  43. if marshalErr != nil {
  44. logger.Log(0, r.Header.Get("user"), "error unmarshalling networks: ",
  45. marshalErr.Error())
  46. logic.ReturnErrorResponse(w, r, logic.FormatError(marshalErr, "badrequest"))
  47. return
  48. }
  49. allnetworks := []models.Network{}
  50. var err error
  51. if len(networksSlice) > 0 && networksSlice[0] == logic.ALL_NETWORK_ACCESS {
  52. allnetworks, err = logic.GetNetworks()
  53. if err != nil && !database.IsEmptyRecord(err) {
  54. logger.Log(0, r.Header.Get("user"), "failed to fetch networks: ", err.Error())
  55. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  56. return
  57. }
  58. } else {
  59. for _, network := range networksSlice {
  60. netObject, parentErr := logic.GetParentNetwork(network)
  61. if parentErr == nil {
  62. allnetworks = append(allnetworks, netObject)
  63. }
  64. }
  65. }
  66. logger.Log(2, r.Header.Get("user"), "fetched networks.")
  67. w.WriteHeader(http.StatusOK)
  68. json.NewEncoder(w).Encode(allnetworks)
  69. }
  70. // swagger:route GET /api/networks/{networkname} networks getNetwork
  71. //
  72. // Get a network.
  73. //
  74. // Schemes: https
  75. //
  76. // Security:
  77. // oauth
  78. //
  79. // Responses:
  80. // 200: networkBodyResponse
  81. func getNetwork(w http.ResponseWriter, r *http.Request) {
  82. // set header.
  83. w.Header().Set("Content-Type", "application/json")
  84. var params = mux.Vars(r)
  85. netname := params["networkname"]
  86. network, err := logic.GetNetwork(netname)
  87. if err != nil {
  88. logger.Log(0, r.Header.Get("user"), fmt.Sprintf("failed to fetch network [%s] info: %v",
  89. netname, err))
  90. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  91. return
  92. }
  93. logger.Log(2, r.Header.Get("user"), "fetched network", netname)
  94. w.WriteHeader(http.StatusOK)
  95. json.NewEncoder(w).Encode(network)
  96. }
  97. // swagger:route POST /api/networks/{networkname}/keyupdate networks keyUpdate
  98. //
  99. // Update keys for a network.
  100. //
  101. // Schemes: https
  102. //
  103. // Security:
  104. // oauth
  105. //
  106. // Responses:
  107. // 200: networkBodyResponse
  108. func keyUpdate(w http.ResponseWriter, r *http.Request) {
  109. w.Header().Set("Content-Type", "application/json")
  110. var params = mux.Vars(r)
  111. netname := params["networkname"]
  112. network, err := logic.KeyUpdate(netname)
  113. if err != nil {
  114. logger.Log(0, r.Header.Get("user"), fmt.Sprintf("failed to update keys for network [%s]: %v",
  115. netname, err))
  116. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  117. return
  118. }
  119. logger.Log(2, r.Header.Get("user"), "updated key on network", netname)
  120. w.WriteHeader(http.StatusOK)
  121. json.NewEncoder(w).Encode(network)
  122. nodes, err := logic.GetNetworkNodes(netname)
  123. if err != nil {
  124. logger.Log(0, "failed to retrieve network nodes for network", netname, err.Error())
  125. return
  126. }
  127. for _, node := range nodes {
  128. logger.Log(2, "updating node ", node.ID.String(), " for a key update")
  129. if err = mq.NodeUpdate(&node); err != nil {
  130. logger.Log(1, "failed to send update to node during a network wide key update", node.ID.String(), err.Error())
  131. }
  132. }
  133. }
  134. // swagger:route PUT /api/networks/{networkname} networks updateNetwork
  135. //
  136. // Update a network.
  137. //
  138. // Schemes: https
  139. //
  140. // Security:
  141. // oauth
  142. //
  143. // Responses:
  144. // 200: networkBodyResponse
  145. func updateNetwork(w http.ResponseWriter, r *http.Request) {
  146. w.Header().Set("Content-Type", "application/json")
  147. var params = mux.Vars(r)
  148. var network models.Network
  149. netname := params["networkname"]
  150. network, err := logic.GetParentNetwork(netname)
  151. if err != nil {
  152. logger.Log(0, r.Header.Get("user"), "failed to get network info: ",
  153. err.Error())
  154. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  155. return
  156. }
  157. var newNetwork models.Network
  158. err = json.NewDecoder(r.Body).Decode(&newNetwork)
  159. if err != nil {
  160. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  161. err.Error())
  162. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  163. return
  164. }
  165. rangeupdate4, rangeupdate6, holepunchupdate, groupsDelta, userDelta, err := logic.UpdateNetwork(&network, &newNetwork)
  166. if err != nil {
  167. logger.Log(0, r.Header.Get("user"), "failed to update network: ",
  168. err.Error())
  169. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  170. return
  171. }
  172. if len(groupsDelta) > 0 {
  173. for _, g := range groupsDelta {
  174. users, err := logic.GetGroupUsers(g)
  175. if err == nil {
  176. for _, user := range users {
  177. logic.AdjustNetworkUserPermissions(&user, &newNetwork)
  178. }
  179. }
  180. }
  181. }
  182. if len(userDelta) > 0 {
  183. for _, uname := range userDelta {
  184. user, err := logic.GetReturnUser(uname)
  185. if err == nil {
  186. logic.AdjustNetworkUserPermissions(&user, &newNetwork)
  187. }
  188. }
  189. }
  190. if rangeupdate4 {
  191. err = logic.UpdateNetworkNodeAddresses(network.NetID)
  192. if err != nil {
  193. logger.Log(0, r.Header.Get("user"),
  194. fmt.Sprintf("failed to update network [%s] ipv4 addresses: %v",
  195. network.NetID, err.Error()))
  196. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  197. return
  198. }
  199. }
  200. if rangeupdate6 {
  201. err = logic.UpdateNetworkNodeAddresses6(network.NetID)
  202. if err != nil {
  203. logger.Log(0, r.Header.Get("user"),
  204. fmt.Sprintf("failed to update network [%s] ipv6 addresses: %v",
  205. network.NetID, err.Error()))
  206. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  207. return
  208. }
  209. }
  210. if rangeupdate4 || rangeupdate6 || holepunchupdate {
  211. nodes, err := logic.GetNetworkNodes(network.NetID)
  212. if err != nil {
  213. logger.Log(0, r.Header.Get("user"),
  214. fmt.Sprintf("failed to get network [%s] nodes: %v",
  215. network.NetID, err.Error()))
  216. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  217. return
  218. }
  219. for _, node := range nodes {
  220. runUpdates(&node, true)
  221. }
  222. }
  223. logger.Log(1, r.Header.Get("user"), "updated network", netname)
  224. w.WriteHeader(http.StatusOK)
  225. json.NewEncoder(w).Encode(newNetwork)
  226. }
  227. // swagger:route PUT /api/networks/{networkname}/acls networks updateNetworkACL
  228. //
  229. // Update a network ACL (Access Control List).
  230. //
  231. // Schemes: https
  232. //
  233. // Security:
  234. // oauth
  235. //
  236. // Responses:
  237. // 200: aclContainerResponse
  238. func updateNetworkACL(w http.ResponseWriter, r *http.Request) {
  239. w.Header().Set("Content-Type", "application/json")
  240. var params = mux.Vars(r)
  241. netname := params["networkname"]
  242. var networkACLChange acls.ACLContainer
  243. networkACLChange, err := networkACLChange.Get(acls.ContainerID(netname))
  244. if err != nil {
  245. logger.Log(0, r.Header.Get("user"),
  246. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  247. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  248. return
  249. }
  250. err = json.NewDecoder(r.Body).Decode(&networkACLChange)
  251. if err != nil {
  252. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  253. err.Error())
  254. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  255. return
  256. }
  257. newNetACL, err := networkACLChange.Save(acls.ContainerID(netname))
  258. if err != nil {
  259. logger.Log(0, r.Header.Get("user"),
  260. fmt.Sprintf("failed to update ACLs for network [%s]: %v", netname, err))
  261. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  262. return
  263. }
  264. logger.Log(1, r.Header.Get("user"), "updated ACLs for network", netname)
  265. // send peer updates
  266. if servercfg.IsMessageQueueBackend() {
  267. if err = mq.PublishPeerUpdate(); err != nil {
  268. logger.Log(0, "failed to publish peer update after ACL update on", netname)
  269. }
  270. }
  271. w.WriteHeader(http.StatusOK)
  272. json.NewEncoder(w).Encode(newNetACL)
  273. }
  274. // swagger:route GET /api/networks/{networkname}/acls networks getNetworkACL
  275. //
  276. // Get a network ACL (Access Control List).
  277. //
  278. // Schemes: https
  279. //
  280. // Security:
  281. // oauth
  282. //
  283. // Responses:
  284. // 200: aclContainerResponse
  285. func getNetworkACL(w http.ResponseWriter, r *http.Request) {
  286. w.Header().Set("Content-Type", "application/json")
  287. var params = mux.Vars(r)
  288. netname := params["networkname"]
  289. var networkACL acls.ACLContainer
  290. networkACL, err := networkACL.Get(acls.ContainerID(netname))
  291. if err != nil {
  292. logger.Log(0, r.Header.Get("user"),
  293. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  294. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  295. return
  296. }
  297. logger.Log(2, r.Header.Get("user"), "fetched acl for network", netname)
  298. w.WriteHeader(http.StatusOK)
  299. json.NewEncoder(w).Encode(networkACL)
  300. }
  301. // swagger:route DELETE /api/networks/{networkname} networks deleteNetwork
  302. //
  303. // Delete a network. Will not delete if there are any nodes that belong to the network.
  304. //
  305. // Schemes: https
  306. //
  307. // Security:
  308. // oauth
  309. //
  310. // Responses:
  311. // 200: stringJSONResponse
  312. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  313. // Set header
  314. w.Header().Set("Content-Type", "application/json")
  315. var params = mux.Vars(r)
  316. network := params["networkname"]
  317. err := logic.DeleteNetwork(network)
  318. if err != nil {
  319. errtype := "badrequest"
  320. if strings.Contains(err.Error(), "Node check failed") {
  321. errtype = "forbidden"
  322. }
  323. logger.Log(0, r.Header.Get("user"),
  324. fmt.Sprintf("failed to delete network [%s]: %v", network, err))
  325. logic.ReturnErrorResponse(w, r, logic.FormatError(err, errtype))
  326. return
  327. }
  328. logger.Log(1, r.Header.Get("user"), "deleted network", network)
  329. w.WriteHeader(http.StatusOK)
  330. json.NewEncoder(w).Encode("success")
  331. }
  332. // swagger:route POST /api/networks networks createNetwork
  333. //
  334. // Create a network.
  335. //
  336. // Schemes: https
  337. //
  338. // Security:
  339. // oauth
  340. //
  341. // Responses:
  342. // 200: networkBodyResponse
  343. func createNetwork(w http.ResponseWriter, r *http.Request) {
  344. w.Header().Set("Content-Type", "application/json")
  345. var network models.Network
  346. // we decode our body request params
  347. err := json.NewDecoder(r.Body).Decode(&network)
  348. if err != nil {
  349. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  350. err.Error())
  351. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  352. return
  353. }
  354. if network.AddressRange == "" && network.AddressRange6 == "" {
  355. err := errors.New("IPv4 or IPv6 CIDR required")
  356. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  357. err.Error())
  358. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  359. return
  360. }
  361. network, err = logic.CreateNetwork(network)
  362. if err != nil {
  363. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  364. err.Error())
  365. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  366. return
  367. }
  368. defaultHosts := logic.GetDefaultHosts()
  369. for i := range defaultHosts {
  370. currHost := &defaultHosts[i]
  371. newNode, err := logic.UpdateHostNetwork(currHost, network.NetID, true)
  372. if err != nil {
  373. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  374. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  375. return
  376. }
  377. logger.Log(1, "added new node", newNode.ID.String(), "to host", currHost.Name)
  378. if err = mq.HostUpdate(&models.HostUpdate{
  379. Action: models.JoinHostToNetwork,
  380. Host: *currHost,
  381. Node: *newNode,
  382. }); err != nil {
  383. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  384. }
  385. }
  386. logger.Log(1, r.Header.Get("user"), "created network", network.NetID)
  387. w.WriteHeader(http.StatusOK)
  388. json.NewEncoder(w).Encode(network)
  389. }