gateway.go 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "strings"
  6. "time"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/logger"
  9. "github.com/gravitl/netmaker/models"
  10. )
  11. // CreateEgressGateway - creates an egress gateway
  12. func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {
  13. node, err := GetNodeByID(gateway.NodeID)
  14. if err != nil {
  15. return models.Node{}, err
  16. }
  17. if node.OS != "linux" && node.OS != "freebsd" { // add in darwin later
  18. return models.Node{}, errors.New(node.OS + " is unsupported for egress gateways")
  19. }
  20. if gateway.NatEnabled == "" {
  21. gateway.NatEnabled = "yes"
  22. }
  23. err = ValidateEgressGateway(gateway)
  24. if err != nil {
  25. return models.Node{}, err
  26. }
  27. node.IsEgressGateway = "yes"
  28. node.EgressGatewayRanges = gateway.Ranges
  29. node.EgressGatewayNatEnabled = gateway.NatEnabled
  30. postUpCmd := ""
  31. postDownCmd := ""
  32. if node.OS == "linux" {
  33. // nftables only supported on Linux
  34. if IsNFTablesPresent() {
  35. // assumes chains eg FORWARD and POSTROUTING already exist
  36. postUpCmd = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  37. postUpCmd += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  38. postDownCmd = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  39. postDownCmd += "nft delete rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  40. if node.EgressGatewayNatEnabled == "yes" {
  41. postUpCmd += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ;"
  42. postDownCmd += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ;"
  43. }
  44. } else {
  45. postUpCmd = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; "
  46. postUpCmd += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT"
  47. postDownCmd = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; "
  48. postDownCmd += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT"
  49. if node.EgressGatewayNatEnabled == "yes" {
  50. postUpCmd += "; iptables -t nat -A POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  51. postDownCmd += "; iptables -t nat -D POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  52. }
  53. }
  54. }
  55. if node.OS == "freebsd" {
  56. postUpCmd = "kldload ipfw ipfw_nat ; "
  57. postUpCmd += "ipfw disable one_pass ; "
  58. postUpCmd += "ipfw nat 1 config if " + gateway.Interface + " same_ports unreg_only reset ; "
  59. postUpCmd += "ipfw add 64000 reass all from any to any in ; "
  60. postUpCmd += "ipfw add 64000 nat 1 ip from any to any in via " + gateway.Interface + " ; "
  61. postUpCmd += "ipfw add 64000 check-state ; "
  62. postUpCmd += "ipfw add 64000 nat 1 ip from any to any out via " + gateway.Interface + " ; "
  63. postUpCmd += "ipfw add 65534 allow ip from any to any ; "
  64. postDownCmd = "ipfw delete 64000 ; "
  65. postDownCmd += "ipfw delete 65534 ; "
  66. postDownCmd += "kldunload ipfw_nat ipfw"
  67. }
  68. if gateway.PostUp != "" {
  69. postUpCmd = gateway.PostUp
  70. }
  71. if gateway.PostDown != "" {
  72. postDownCmd = gateway.PostDown
  73. }
  74. if node.PostUp != "" {
  75. if !strings.Contains(node.PostUp, postUpCmd) {
  76. postUpCmd = node.PostUp + "; " + postUpCmd
  77. }
  78. }
  79. if node.PostDown != "" {
  80. if !strings.Contains(node.PostDown, postDownCmd) {
  81. postDownCmd = node.PostDown + "; " + postDownCmd
  82. }
  83. }
  84. node.PostUp = postUpCmd
  85. node.PostDown = postDownCmd
  86. node.SetLastModified()
  87. nodeData, err := json.Marshal(&node)
  88. if err != nil {
  89. return node, err
  90. }
  91. if err = database.Insert(node.ID, string(nodeData), database.NODES_TABLE_NAME); err != nil {
  92. return models.Node{}, err
  93. }
  94. if err = NetworkNodesUpdatePullChanges(node.Network); err != nil {
  95. return models.Node{}, err
  96. }
  97. return node, nil
  98. }
  99. // ValidateEgressGateway - validates the egress gateway model
  100. func ValidateEgressGateway(gateway models.EgressGatewayRequest) error {
  101. var err error
  102. empty := len(gateway.Ranges) == 0
  103. if empty {
  104. err = errors.New("IP Ranges Cannot Be Empty")
  105. }
  106. empty = gateway.Interface == ""
  107. if empty {
  108. err = errors.New("interface cannot be empty")
  109. }
  110. return err
  111. }
  112. // DeleteEgressGateway - deletes egress from node
  113. func DeleteEgressGateway(network, nodeid string) (models.Node, error) {
  114. node, err := GetNodeByID(nodeid)
  115. if err != nil {
  116. return models.Node{}, err
  117. }
  118. node.IsEgressGateway = "no"
  119. node.EgressGatewayRanges = []string{}
  120. node.PostUp = ""
  121. node.PostDown = ""
  122. if node.IsIngressGateway == "yes" { // check if node is still an ingress gateway before completely deleting postdown/up rules
  123. if node.OS == "linux" {
  124. // nftables only supported on Linux
  125. if IsNFTablesPresent() {
  126. // assumes chains eg FORWARD and POSTROUTING already exist
  127. node.PostUp = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  128. node.PostUp += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  129. node.PostUp += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade ; "
  130. node.PostDown = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ;"
  131. node.PostDown += "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ;"
  132. node.PostDown += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade "
  133. } else {
  134. node.PostUp = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT ; "
  135. node.PostUp += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT ; "
  136. node.PostUp += "iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  137. node.PostDown = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT ; "
  138. node.PostDown += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT ; "
  139. node.PostDown += "iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  140. }
  141. }
  142. if node.OS == "freebsd" {
  143. node.PostUp = ""
  144. node.PostDown = "ipfw delete 64000 ; "
  145. node.PostDown += "ipfw delete 65534 ; "
  146. node.PostDown += "kldunload ipfw_nat ipfw"
  147. }
  148. }
  149. node.SetLastModified()
  150. data, err := json.Marshal(&node)
  151. if err != nil {
  152. return models.Node{}, err
  153. }
  154. if err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME); err != nil {
  155. return models.Node{}, err
  156. }
  157. if err = NetworkNodesUpdatePullChanges(network); err != nil {
  158. return models.Node{}, err
  159. }
  160. return node, nil
  161. }
  162. // CreateIngressGateway - creates an ingress gateway
  163. func CreateIngressGateway(netid string, nodeid string) (models.Node, error) {
  164. var postUpCmd, postDownCmd string
  165. node, err := GetNodeByID(nodeid)
  166. if node.OS != "linux" { // add in darwin later
  167. return models.Node{}, errors.New(node.OS + " is unsupported for ingress gateways")
  168. }
  169. if err != nil {
  170. return models.Node{}, err
  171. }
  172. network, err := GetParentNetwork(netid)
  173. if err != nil {
  174. return models.Node{}, err
  175. }
  176. node.IsIngressGateway = "yes"
  177. node.IngressGatewayRange = network.AddressRange
  178. if IsNFTablesPresent() {
  179. // assumes chains eg FORWARD and POSTROUTING already exist
  180. postUpCmd = "nft add rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  181. postUpCmd += "nft add rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  182. postUpCmd += "nft add rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade"
  183. postDownCmd = "nft delete rule ip filter FORWARD iifname " + node.Interface + " counter accept ; "
  184. postDownCmd += "nft delete rule ip filter FORWARD oifname " + node.Interface + " counter accept ; "
  185. postDownCmd += "nft delete rule ip nat POSTROUTING oifname " + node.Interface + " counter masquerade"
  186. } else {
  187. postUpCmd = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT ; "
  188. postUpCmd += "iptables -A FORWARD -o " + node.Interface + " -j ACCEPT ; "
  189. postUpCmd += "iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  190. postDownCmd = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT ; "
  191. postDownCmd += "iptables -D FORWARD -o " + node.Interface + " -j ACCEPT ; "
  192. postDownCmd += "iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  193. }
  194. if node.PostUp != "" {
  195. if !strings.Contains(node.PostUp, postUpCmd) {
  196. postUpCmd = node.PostUp + "; " + postUpCmd
  197. }
  198. }
  199. if node.PostDown != "" {
  200. if !strings.Contains(node.PostDown, postDownCmd) {
  201. postDownCmd = node.PostDown + "; " + postDownCmd
  202. }
  203. }
  204. node.SetLastModified()
  205. node.PostUp = postUpCmd
  206. node.PostDown = postDownCmd
  207. node.UDPHolePunch = "no"
  208. data, err := json.Marshal(&node)
  209. if err != nil {
  210. return models.Node{}, err
  211. }
  212. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  213. if err != nil {
  214. return models.Node{}, err
  215. }
  216. err = SetNetworkNodesLastModified(netid)
  217. return node, err
  218. }
  219. // DeleteIngressGateway - deletes an ingress gateway
  220. func DeleteIngressGateway(networkName string, nodeid string) (models.Node, error) {
  221. node, err := GetNodeByID(nodeid)
  222. if err != nil {
  223. return models.Node{}, err
  224. }
  225. network, err := GetParentNetwork(networkName)
  226. if err != nil {
  227. return models.Node{}, err
  228. }
  229. // delete ext clients belonging to ingress gateway
  230. if err = DeleteGatewayExtClients(node.ID, networkName); err != nil {
  231. return models.Node{}, err
  232. }
  233. node.UDPHolePunch = network.DefaultUDPHolePunch
  234. node.LastModified = time.Now().Unix()
  235. node.IsIngressGateway = "no"
  236. node.IngressGatewayRange = ""
  237. data, err := json.Marshal(&node)
  238. if err != nil {
  239. return models.Node{}, err
  240. }
  241. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  242. if err != nil {
  243. return models.Node{}, err
  244. }
  245. err = SetNetworkNodesLastModified(networkName)
  246. return node, err
  247. }
  248. // DeleteGatewayExtClients - deletes ext clients based on gateway (mac) of ingress node and network
  249. func DeleteGatewayExtClients(gatewayID string, networkName string) error {
  250. currentExtClients, err := GetNetworkExtClients(networkName)
  251. if err != nil && !database.IsEmptyRecord(err) {
  252. return err
  253. }
  254. for _, extClient := range currentExtClients {
  255. if extClient.IngressGatewayID == gatewayID {
  256. if err = DeleteExtClient(networkName, extClient.ClientID); err != nil {
  257. logger.Log(1, "failed to remove ext client", extClient.ClientID)
  258. continue
  259. }
  260. }
  261. }
  262. return nil
  263. }