network.go 9.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "strings"
  7. "github.com/gorilla/mux"
  8. "github.com/gravitl/netmaker/database"
  9. "github.com/gravitl/netmaker/logger"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/servercfg"
  13. )
  14. const ALL_NETWORK_ACCESS = "THIS_USER_HAS_ALL"
  15. const NO_NETWORKS_PRESENT = "THIS_USER_HAS_NONE"
  16. func networkHandlers(r *mux.Router) {
  17. r.HandleFunc("/api/networks", securityCheck(false, http.HandlerFunc(getNetworks))).Methods("GET")
  18. r.HandleFunc("/api/networks", securityCheck(true, http.HandlerFunc(createNetwork))).Methods("POST")
  19. r.HandleFunc("/api/networks/{networkname}", securityCheck(false, http.HandlerFunc(getNetwork))).Methods("GET")
  20. r.HandleFunc("/api/networks/{networkname}", securityCheck(false, http.HandlerFunc(updateNetwork))).Methods("PUT")
  21. r.HandleFunc("/api/networks/{networkname}/nodelimit", securityCheck(true, http.HandlerFunc(updateNetworkNodeLimit))).Methods("PUT")
  22. r.HandleFunc("/api/networks/{networkname}", securityCheck(true, http.HandlerFunc(deleteNetwork))).Methods("DELETE")
  23. r.HandleFunc("/api/networks/{networkname}/keyupdate", securityCheck(false, http.HandlerFunc(keyUpdate))).Methods("POST")
  24. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(false, http.HandlerFunc(createAccessKey))).Methods("POST")
  25. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(false, http.HandlerFunc(getAccessKeys))).Methods("GET")
  26. r.HandleFunc("/api/networks/{networkname}/keys/{name}", securityCheck(false, http.HandlerFunc(deleteAccessKey))).Methods("DELETE")
  27. }
  28. //simple get all networks function
  29. func getNetworks(w http.ResponseWriter, r *http.Request) {
  30. headerNetworks := r.Header.Get("networks")
  31. networksSlice := []string{}
  32. marshalErr := json.Unmarshal([]byte(headerNetworks), &networksSlice)
  33. if marshalErr != nil {
  34. returnErrorResponse(w, r, formatError(marshalErr, "internal"))
  35. return
  36. }
  37. allnetworks := []models.Network{}
  38. err := errors.New("Networks Error")
  39. if networksSlice[0] == ALL_NETWORK_ACCESS {
  40. allnetworks, err = logic.GetNetworks()
  41. if err != nil && !database.IsEmptyRecord(err) {
  42. returnErrorResponse(w, r, formatError(err, "internal"))
  43. return
  44. }
  45. } else {
  46. for _, network := range networksSlice {
  47. netObject, parentErr := logic.GetParentNetwork(network)
  48. if parentErr == nil {
  49. allnetworks = append(allnetworks, netObject)
  50. }
  51. }
  52. }
  53. if !servercfg.IsDisplayKeys() {
  54. for i, net := range allnetworks {
  55. net.AccessKeys = logic.RemoveKeySensitiveInfo(net.AccessKeys)
  56. allnetworks[i] = net
  57. }
  58. }
  59. logger.Log(2, r.Header.Get("user"), "fetched networks.")
  60. w.WriteHeader(http.StatusOK)
  61. json.NewEncoder(w).Encode(allnetworks)
  62. }
  63. // Simple get network function
  64. func getNetwork(w http.ResponseWriter, r *http.Request) {
  65. // set header.
  66. w.Header().Set("Content-Type", "application/json")
  67. var params = mux.Vars(r)
  68. netname := params["networkname"]
  69. network, err := logic.GetNetwork(netname)
  70. if err != nil {
  71. returnErrorResponse(w, r, formatError(err, "internal"))
  72. return
  73. }
  74. if !servercfg.IsDisplayKeys() {
  75. network.AccessKeys = logic.RemoveKeySensitiveInfo(network.AccessKeys)
  76. }
  77. logger.Log(2, r.Header.Get("user"), "fetched network", netname)
  78. w.WriteHeader(http.StatusOK)
  79. json.NewEncoder(w).Encode(network)
  80. }
  81. func keyUpdate(w http.ResponseWriter, r *http.Request) {
  82. w.Header().Set("Content-Type", "application/json")
  83. var params = mux.Vars(r)
  84. netname := params["networkname"]
  85. network, err := logic.KeyUpdate(netname)
  86. if err != nil {
  87. returnErrorResponse(w, r, formatError(err, "internal"))
  88. return
  89. }
  90. logger.Log(2, r.Header.Get("user"), "updated key on network", netname)
  91. w.WriteHeader(http.StatusOK)
  92. json.NewEncoder(w).Encode(network)
  93. }
  94. // Update a network
  95. func updateNetwork(w http.ResponseWriter, r *http.Request) {
  96. w.Header().Set("Content-Type", "application/json")
  97. var params = mux.Vars(r)
  98. var network models.Network
  99. netname := params["networkname"]
  100. network, err := logic.GetParentNetwork(netname)
  101. if err != nil {
  102. returnErrorResponse(w, r, formatError(err, "internal"))
  103. return
  104. }
  105. var newNetwork models.Network
  106. err = json.NewDecoder(r.Body).Decode(&newNetwork)
  107. if err != nil {
  108. returnErrorResponse(w, r, formatError(err, "badrequest"))
  109. return
  110. }
  111. if !servercfg.GetRce() {
  112. newNetwork.DefaultPostDown = network.DefaultPostDown
  113. newNetwork.DefaultPostUp = network.DefaultPostUp
  114. }
  115. rangeupdate, localrangeupdate, holepunchupdate, err := logic.UpdateNetwork(&network, &newNetwork)
  116. if err != nil {
  117. returnErrorResponse(w, r, formatError(err, "badrequest"))
  118. return
  119. }
  120. // if newNetwork.IsDualStack != currentNetwork.IsDualStack && newNetwork.IsDualStack == "no" {
  121. // // Remove IPv6 address from network nodes
  122. // RemoveNetworkNodeIPv6Addresses(currentNetwork.NetID)
  123. // }
  124. if rangeupdate {
  125. err = logic.UpdateNetworkNodeAddresses(network.NetID)
  126. if err != nil {
  127. returnErrorResponse(w, r, formatError(err, "internal"))
  128. return
  129. }
  130. }
  131. if localrangeupdate {
  132. err = logic.UpdateNetworkLocalAddresses(network.NetID)
  133. if err != nil {
  134. returnErrorResponse(w, r, formatError(err, "internal"))
  135. return
  136. }
  137. }
  138. if holepunchupdate {
  139. err = logic.UpdateNetworkHolePunching(network.NetID, newNetwork.DefaultUDPHolePunch)
  140. if err != nil {
  141. returnErrorResponse(w, r, formatError(err, "internal"))
  142. return
  143. }
  144. }
  145. if rangeupdate || localrangeupdate || holepunchupdate {
  146. nodes, err := logic.GetNetworkNodes(network.NetID)
  147. if err != nil {
  148. returnErrorResponse(w, r, formatError(err, "internal"))
  149. return
  150. }
  151. for _, node := range nodes {
  152. runUpdates(&node, true)
  153. }
  154. }
  155. logger.Log(1, r.Header.Get("user"), "updated network", netname)
  156. w.WriteHeader(http.StatusOK)
  157. json.NewEncoder(w).Encode(newNetwork)
  158. }
  159. func updateNetworkNodeLimit(w http.ResponseWriter, r *http.Request) {
  160. w.Header().Set("Content-Type", "application/json")
  161. var params = mux.Vars(r)
  162. var network models.Network
  163. netname := params["networkname"]
  164. network, err := logic.GetParentNetwork(netname)
  165. if err != nil {
  166. returnErrorResponse(w, r, formatError(err, "internal"))
  167. return
  168. }
  169. var networkChange models.Network
  170. _ = json.NewDecoder(r.Body).Decode(&networkChange)
  171. if networkChange.NodeLimit != 0 {
  172. network.NodeLimit = networkChange.NodeLimit
  173. data, err := json.Marshal(&network)
  174. if err != nil {
  175. returnErrorResponse(w, r, formatError(err, "badrequest"))
  176. return
  177. }
  178. database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME)
  179. logger.Log(1, r.Header.Get("user"), "updated network node limit on", netname)
  180. }
  181. w.WriteHeader(http.StatusOK)
  182. json.NewEncoder(w).Encode(network)
  183. }
  184. // Delete a network
  185. // Will stop you if there's any nodes associated
  186. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  187. // Set header
  188. w.Header().Set("Content-Type", "application/json")
  189. var params = mux.Vars(r)
  190. network := params["networkname"]
  191. err := logic.DeleteNetwork(network)
  192. if err != nil {
  193. errtype := "badrequest"
  194. if strings.Contains(err.Error(), "Node check failed") {
  195. errtype = "forbidden"
  196. }
  197. returnErrorResponse(w, r, formatError(err, errtype))
  198. return
  199. }
  200. logger.Log(1, r.Header.Get("user"), "deleted network", network)
  201. w.WriteHeader(http.StatusOK)
  202. json.NewEncoder(w).Encode("success")
  203. }
  204. func createNetwork(w http.ResponseWriter, r *http.Request) {
  205. w.Header().Set("Content-Type", "application/json")
  206. var network models.Network
  207. // we decode our body request params
  208. err := json.NewDecoder(r.Body).Decode(&network)
  209. if err != nil {
  210. returnErrorResponse(w, r, formatError(err, "internal"))
  211. return
  212. }
  213. err = logic.CreateNetwork(network)
  214. if err != nil {
  215. returnErrorResponse(w, r, formatError(err, "badrequest"))
  216. return
  217. }
  218. if servercfg.IsClientMode() != "off" {
  219. var node models.Node
  220. node, err = logic.ServerJoin(&network)
  221. if err != nil {
  222. logic.DeleteNetwork(network.NetID)
  223. if err == nil {
  224. err = errors.New("Failed to add server to network " + network.DisplayName)
  225. }
  226. returnErrorResponse(w, r, formatError(err, "internal"))
  227. return
  228. }
  229. getServerAddrs(&node)
  230. }
  231. logger.Log(1, r.Header.Get("user"), "created network", network.NetID)
  232. w.WriteHeader(http.StatusOK)
  233. }
  234. // BEGIN KEY MANAGEMENT SECTION
  235. func createAccessKey(w http.ResponseWriter, r *http.Request) {
  236. w.Header().Set("Content-Type", "application/json")
  237. var params = mux.Vars(r)
  238. var accesskey models.AccessKey
  239. //start here
  240. netname := params["networkname"]
  241. network, err := logic.GetParentNetwork(netname)
  242. if err != nil {
  243. returnErrorResponse(w, r, formatError(err, "internal"))
  244. return
  245. }
  246. err = json.NewDecoder(r.Body).Decode(&accesskey)
  247. if err != nil {
  248. returnErrorResponse(w, r, formatError(err, "internal"))
  249. return
  250. }
  251. key, err := logic.CreateAccessKey(accesskey, network)
  252. if err != nil {
  253. returnErrorResponse(w, r, formatError(err, "badrequest"))
  254. return
  255. }
  256. logger.Log(1, r.Header.Get("user"), "created access key", accesskey.Name, "on", netname)
  257. w.WriteHeader(http.StatusOK)
  258. json.NewEncoder(w).Encode(key)
  259. }
  260. // pretty simple get
  261. func getAccessKeys(w http.ResponseWriter, r *http.Request) {
  262. w.Header().Set("Content-Type", "application/json")
  263. var params = mux.Vars(r)
  264. network := params["networkname"]
  265. keys, err := logic.GetKeys(network)
  266. if err != nil {
  267. returnErrorResponse(w, r, formatError(err, "internal"))
  268. return
  269. }
  270. if !servercfg.IsDisplayKeys() {
  271. keys = logic.RemoveKeySensitiveInfo(keys)
  272. }
  273. logger.Log(2, r.Header.Get("user"), "fetched access keys on network", network)
  274. w.WriteHeader(http.StatusOK)
  275. json.NewEncoder(w).Encode(keys)
  276. }
  277. // delete key. Has to do a little funky logic since it's not a collection item
  278. func deleteAccessKey(w http.ResponseWriter, r *http.Request) {
  279. w.Header().Set("Content-Type", "application/json")
  280. var params = mux.Vars(r)
  281. keyname := params["name"]
  282. netname := params["networkname"]
  283. err := logic.DeleteKey(keyname, netname)
  284. if err != nil {
  285. returnErrorResponse(w, r, formatError(err, "badrequest"))
  286. return
  287. }
  288. logger.Log(1, r.Header.Get("user"), "deleted access key", keyname, "on network,", netname)
  289. w.WriteHeader(http.StatusOK)
  290. }