network.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "time"
  9. "github.com/gorilla/mux"
  10. "github.com/gravitl/netmaker/database"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/logic"
  13. "github.com/gravitl/netmaker/logic/acls"
  14. "github.com/gravitl/netmaker/models"
  15. "github.com/gravitl/netmaker/mq"
  16. "github.com/gravitl/netmaker/servercfg"
  17. "github.com/gravitl/netmaker/serverctl"
  18. )
  19. // ALL_NETWORK_ACCESS - represents all networks
  20. const ALL_NETWORK_ACCESS = "THIS_USER_HAS_ALL"
  21. // NO_NETWORKS_PRESENT - represents no networks
  22. const NO_NETWORKS_PRESENT = "THIS_USER_HAS_NONE"
  23. func networkHandlers(r *mux.Router) {
  24. r.HandleFunc("/api/networks", securityCheck(false, http.HandlerFunc(getNetworks))).Methods("GET")
  25. r.HandleFunc("/api/networks", securityCheck(true, http.HandlerFunc(createNetwork))).Methods("POST")
  26. r.HandleFunc("/api/networks/{networkname}", securityCheck(false, http.HandlerFunc(getNetwork))).Methods("GET")
  27. r.HandleFunc("/api/networks/{networkname}", securityCheck(false, http.HandlerFunc(updateNetwork))).Methods("PUT")
  28. r.HandleFunc("/api/networks/{networkname}/nodelimit", securityCheck(true, http.HandlerFunc(updateNetworkNodeLimit))).Methods("PUT")
  29. r.HandleFunc("/api/networks/{networkname}", securityCheck(true, http.HandlerFunc(deleteNetwork))).Methods("DELETE")
  30. r.HandleFunc("/api/networks/{networkname}/keyupdate", securityCheck(true, http.HandlerFunc(keyUpdate))).Methods("POST")
  31. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(false, http.HandlerFunc(createAccessKey))).Methods("POST")
  32. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(false, http.HandlerFunc(getAccessKeys))).Methods("GET")
  33. r.HandleFunc("/api/networks/{networkname}/keys/{name}", securityCheck(false, http.HandlerFunc(deleteAccessKey))).Methods("DELETE")
  34. // ACLs
  35. r.HandleFunc("/api/networks/{networkname}/acls", securityCheck(true, http.HandlerFunc(updateNetworkACL))).Methods("PUT")
  36. r.HandleFunc("/api/networks/{networkname}/acls", securityCheck(true, http.HandlerFunc(getNetworkACL))).Methods("GET")
  37. }
  38. //simple get all networks function
  39. func getNetworks(w http.ResponseWriter, r *http.Request) {
  40. headerNetworks := r.Header.Get("networks")
  41. networksSlice := []string{}
  42. marshalErr := json.Unmarshal([]byte(headerNetworks), &networksSlice)
  43. if marshalErr != nil {
  44. returnErrorResponse(w, r, formatError(marshalErr, "internal"))
  45. return
  46. }
  47. allnetworks := []models.Network{}
  48. var err error
  49. if networksSlice[0] == ALL_NETWORK_ACCESS {
  50. allnetworks, err = logic.GetNetworks()
  51. if err != nil && !database.IsEmptyRecord(err) {
  52. returnErrorResponse(w, r, formatError(err, "internal"))
  53. return
  54. }
  55. } else {
  56. for _, network := range networksSlice {
  57. netObject, parentErr := logic.GetParentNetwork(network)
  58. if parentErr == nil {
  59. allnetworks = append(allnetworks, netObject)
  60. }
  61. }
  62. }
  63. if !servercfg.IsDisplayKeys() {
  64. for i, net := range allnetworks {
  65. net.AccessKeys = logic.RemoveKeySensitiveInfo(net.AccessKeys)
  66. allnetworks[i] = net
  67. }
  68. }
  69. logger.Log(2, r.Header.Get("user"), "fetched networks.")
  70. w.WriteHeader(http.StatusOK)
  71. json.NewEncoder(w).Encode(allnetworks)
  72. }
  73. // Simple get network function
  74. func getNetwork(w http.ResponseWriter, r *http.Request) {
  75. // set header.
  76. w.Header().Set("Content-Type", "application/json")
  77. var params = mux.Vars(r)
  78. netname := params["networkname"]
  79. if isCommsEdit(w, r, netname) {
  80. return
  81. }
  82. network, err := logic.GetNetwork(netname)
  83. if err != nil {
  84. returnErrorResponse(w, r, formatError(err, "internal"))
  85. return
  86. }
  87. if !servercfg.IsDisplayKeys() {
  88. network.AccessKeys = logic.RemoveKeySensitiveInfo(network.AccessKeys)
  89. }
  90. logger.Log(2, r.Header.Get("user"), "fetched network", netname)
  91. w.WriteHeader(http.StatusOK)
  92. json.NewEncoder(w).Encode(network)
  93. }
  94. func keyUpdate(w http.ResponseWriter, r *http.Request) {
  95. w.Header().Set("Content-Type", "application/json")
  96. var params = mux.Vars(r)
  97. netname := params["networkname"]
  98. if isCommsEdit(w, r, netname) {
  99. return
  100. }
  101. network, err := logic.KeyUpdate(netname)
  102. if err != nil {
  103. returnErrorResponse(w, r, formatError(err, "internal"))
  104. return
  105. }
  106. logger.Log(2, r.Header.Get("user"), "updated key on network", netname)
  107. w.WriteHeader(http.StatusOK)
  108. json.NewEncoder(w).Encode(network)
  109. nodes, err := logic.GetNetworkNodes(netname)
  110. if err != nil {
  111. logger.Log(2, "failed to retrieve network nodes for network", netname, err.Error())
  112. return
  113. }
  114. for _, node := range nodes {
  115. logger.Log(2, "updating node ", node.Name, " for a key update")
  116. if node.IsServer != "yes" {
  117. if err = mq.NodeUpdate(&node); err != nil {
  118. logger.Log(1, "failed to send update to node during a network wide key update", node.Name, node.ID, err.Error())
  119. }
  120. }
  121. }
  122. }
  123. // Update a network
  124. func updateNetwork(w http.ResponseWriter, r *http.Request) {
  125. w.Header().Set("Content-Type", "application/json")
  126. var params = mux.Vars(r)
  127. var network models.Network
  128. netname := params["networkname"]
  129. network, err := logic.GetParentNetwork(netname)
  130. if err != nil {
  131. returnErrorResponse(w, r, formatError(err, "internal"))
  132. return
  133. }
  134. var newNetwork models.Network
  135. err = json.NewDecoder(r.Body).Decode(&newNetwork)
  136. if err != nil {
  137. returnErrorResponse(w, r, formatError(err, "badrequest"))
  138. return
  139. }
  140. if !servercfg.GetRce() {
  141. newNetwork.DefaultPostDown = network.DefaultPostDown
  142. newNetwork.DefaultPostUp = network.DefaultPostUp
  143. }
  144. rangeupdate, localrangeupdate, holepunchupdate, err := logic.UpdateNetwork(&network, &newNetwork)
  145. if err != nil {
  146. returnErrorResponse(w, r, formatError(err, "badrequest"))
  147. return
  148. }
  149. // if newNetwork.IsDualStack != currentNetwork.IsDualStack && newNetwork.IsDualStack == "no" {
  150. // // Remove IPv6 address from network nodes
  151. // RemoveNetworkNodeIPv6Addresses(currentNetwork.NetID)
  152. // }
  153. if rangeupdate {
  154. err = logic.UpdateNetworkNodeAddresses(network.NetID)
  155. if err != nil {
  156. returnErrorResponse(w, r, formatError(err, "internal"))
  157. return
  158. }
  159. }
  160. if localrangeupdate {
  161. err = logic.UpdateNetworkLocalAddresses(network.NetID)
  162. if err != nil {
  163. returnErrorResponse(w, r, formatError(err, "internal"))
  164. return
  165. }
  166. }
  167. if holepunchupdate {
  168. err = logic.UpdateNetworkHolePunching(network.NetID, newNetwork.DefaultUDPHolePunch)
  169. if err != nil {
  170. returnErrorResponse(w, r, formatError(err, "internal"))
  171. return
  172. }
  173. }
  174. if rangeupdate || localrangeupdate || holepunchupdate {
  175. nodes, err := logic.GetNetworkNodes(network.NetID)
  176. if err != nil {
  177. returnErrorResponse(w, r, formatError(err, "internal"))
  178. return
  179. }
  180. for _, node := range nodes {
  181. if err = mq.NodeUpdate(&node); err != nil {
  182. logger.Log(1, "failed to send update to node during a network wide update", node.Name, node.ID, err.Error())
  183. }
  184. }
  185. }
  186. logger.Log(1, r.Header.Get("user"), "updated network", netname)
  187. w.WriteHeader(http.StatusOK)
  188. json.NewEncoder(w).Encode(newNetwork)
  189. }
  190. func updateNetworkNodeLimit(w http.ResponseWriter, r *http.Request) {
  191. w.Header().Set("Content-Type", "application/json")
  192. var params = mux.Vars(r)
  193. var network models.Network
  194. netname := params["networkname"]
  195. network, err := logic.GetParentNetwork(netname)
  196. if err != nil {
  197. returnErrorResponse(w, r, formatError(err, "internal"))
  198. return
  199. }
  200. var networkChange models.Network
  201. _ = json.NewDecoder(r.Body).Decode(&networkChange)
  202. if networkChange.NodeLimit != 0 {
  203. network.NodeLimit = networkChange.NodeLimit
  204. data, err := json.Marshal(&network)
  205. if err != nil {
  206. returnErrorResponse(w, r, formatError(err, "badrequest"))
  207. return
  208. }
  209. database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME)
  210. logger.Log(1, r.Header.Get("user"), "updated network node limit on", netname)
  211. }
  212. w.WriteHeader(http.StatusOK)
  213. json.NewEncoder(w).Encode(network)
  214. }
  215. func updateNetworkACL(w http.ResponseWriter, r *http.Request) {
  216. w.Header().Set("Content-Type", "application/json")
  217. var params = mux.Vars(r)
  218. netname := params["networkname"]
  219. var networkACLChange acls.ACLContainer
  220. networkACLChange, err := networkACLChange.Get(acls.ContainerID(netname))
  221. if err != nil {
  222. returnErrorResponse(w, r, formatError(err, "internal"))
  223. return
  224. }
  225. _ = json.NewDecoder(r.Body).Decode(&networkACLChange)
  226. newNetACL, err := networkACLChange.Save(acls.ContainerID(netname))
  227. if err != nil {
  228. returnErrorResponse(w, r, formatError(err, "badrequest"))
  229. return
  230. }
  231. logger.Log(1, r.Header.Get("user"), "updated ACLs for network", netname)
  232. // send peer updates
  233. if servercfg.IsMessageQueueBackend() {
  234. serverNode, err := logic.GetNetworkServerLocal(netname)
  235. if err != nil {
  236. logger.Log(1, "failed to find server node after ACL update on", netname)
  237. } else {
  238. if err = logic.ServerUpdate(&serverNode, false); err != nil {
  239. logger.Log(1, "failed to update server node after ACL update on", netname)
  240. }
  241. if err = mq.PublishPeerUpdate(&serverNode); err != nil {
  242. logger.Log(0, "failed to publish peer update after ACL update on", netname)
  243. }
  244. }
  245. }
  246. w.WriteHeader(http.StatusOK)
  247. json.NewEncoder(w).Encode(newNetACL)
  248. }
  249. func getNetworkACL(w http.ResponseWriter, r *http.Request) {
  250. w.Header().Set("Content-Type", "application/json")
  251. var params = mux.Vars(r)
  252. netname := params["networkname"]
  253. var networkACL acls.ACLContainer
  254. networkACL, err := networkACL.Get(acls.ContainerID(netname))
  255. if err != nil {
  256. returnErrorResponse(w, r, formatError(err, "internal"))
  257. return
  258. }
  259. logger.Log(2, r.Header.Get("user"), "fetched acl for network", netname)
  260. w.WriteHeader(http.StatusOK)
  261. json.NewEncoder(w).Encode(networkACL)
  262. }
  263. // Delete a network
  264. // Will stop you if there's any nodes associated
  265. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  266. // Set header
  267. w.Header().Set("Content-Type", "application/json")
  268. var params = mux.Vars(r)
  269. network := params["networkname"]
  270. if isCommsEdit(w, r, network) {
  271. return
  272. }
  273. err := logic.DeleteNetwork(network)
  274. if err != nil {
  275. errtype := "badrequest"
  276. if strings.Contains(err.Error(), "Node check failed") {
  277. errtype = "forbidden"
  278. }
  279. returnErrorResponse(w, r, formatError(err, errtype))
  280. return
  281. }
  282. logger.Log(1, r.Header.Get("user"), "deleted network", network)
  283. w.WriteHeader(http.StatusOK)
  284. json.NewEncoder(w).Encode("success")
  285. }
  286. func createNetwork(w http.ResponseWriter, r *http.Request) {
  287. w.Header().Set("Content-Type", "application/json")
  288. var network models.Network
  289. // we decode our body request params
  290. err := json.NewDecoder(r.Body).Decode(&network)
  291. if err != nil {
  292. returnErrorResponse(w, r, formatError(err, "internal"))
  293. return
  294. }
  295. network, err = logic.CreateNetwork(network)
  296. if err != nil {
  297. returnErrorResponse(w, r, formatError(err, "badrequest"))
  298. return
  299. }
  300. if servercfg.IsClientMode() != "off" {
  301. var node models.Node
  302. node, err = logic.ServerJoin(&network)
  303. if err != nil {
  304. logic.DeleteNetwork(network.NetID)
  305. if err == nil {
  306. err = errors.New("Failed to add server to network " + network.NetID)
  307. }
  308. returnErrorResponse(w, r, formatError(err, "internal"))
  309. return
  310. }
  311. getServerAddrs(&node)
  312. }
  313. logger.Log(1, r.Header.Get("user"), "created network", network.NetID)
  314. w.WriteHeader(http.StatusOK)
  315. json.NewEncoder(w).Encode(network)
  316. }
  317. // BEGIN KEY MANAGEMENT SECTION
  318. func createAccessKey(w http.ResponseWriter, r *http.Request) {
  319. w.Header().Set("Content-Type", "application/json")
  320. var params = mux.Vars(r)
  321. var accesskey models.AccessKey
  322. //start here
  323. netname := params["networkname"]
  324. if isCommsEdit(w, r, netname) {
  325. return
  326. }
  327. network, err := logic.GetParentNetwork(netname)
  328. if err != nil {
  329. returnErrorResponse(w, r, formatError(err, "internal"))
  330. return
  331. }
  332. err = json.NewDecoder(r.Body).Decode(&accesskey)
  333. if err != nil {
  334. returnErrorResponse(w, r, formatError(err, "internal"))
  335. return
  336. }
  337. key, err := logic.CreateAccessKey(accesskey, network)
  338. if err != nil {
  339. returnErrorResponse(w, r, formatError(err, "badrequest"))
  340. return
  341. }
  342. logger.Log(1, r.Header.Get("user"), "created access key", accesskey.Name, "on", netname)
  343. w.WriteHeader(http.StatusOK)
  344. json.NewEncoder(w).Encode(key)
  345. }
  346. // pretty simple get
  347. func getAccessKeys(w http.ResponseWriter, r *http.Request) {
  348. w.Header().Set("Content-Type", "application/json")
  349. var params = mux.Vars(r)
  350. network := params["networkname"]
  351. keys, err := logic.GetKeys(network)
  352. if err != nil {
  353. returnErrorResponse(w, r, formatError(err, "internal"))
  354. return
  355. }
  356. if !servercfg.IsDisplayKeys() {
  357. keys = logic.RemoveKeySensitiveInfo(keys)
  358. }
  359. logger.Log(2, r.Header.Get("user"), "fetched access keys on network", network)
  360. w.WriteHeader(http.StatusOK)
  361. json.NewEncoder(w).Encode(keys)
  362. }
  363. // delete key. Has to do a little funky logic since it's not a collection item
  364. func deleteAccessKey(w http.ResponseWriter, r *http.Request) {
  365. w.Header().Set("Content-Type", "application/json")
  366. var params = mux.Vars(r)
  367. keyname := params["name"]
  368. netname := params["networkname"]
  369. err := logic.DeleteKey(keyname, netname)
  370. if err != nil {
  371. returnErrorResponse(w, r, formatError(err, "badrequest"))
  372. return
  373. }
  374. logger.Log(1, r.Header.Get("user"), "deleted access key", keyname, "on network,", netname)
  375. w.WriteHeader(http.StatusOK)
  376. }
  377. func isCommsEdit(w http.ResponseWriter, r *http.Request, netname string) bool {
  378. if netname == serverctl.COMMS_NETID {
  379. returnErrorResponse(w, r, formatError(fmt.Errorf("cannot access comms network"), "internal"))
  380. return true
  381. }
  382. return false
  383. }
  384. func filterCommsNetwork(networks []models.Network) []models.Network {
  385. var filterdNets []models.Network
  386. for i := range networks {
  387. if networks[i].IsComms != "yes" && networks[i].NetID != servercfg.GetCommsID() {
  388. filterdNets = append(filterdNets, networks[i])
  389. }
  390. }
  391. return filterdNets
  392. }
  393. func getServerAddrs(node *models.Node) {
  394. serverNodes := logic.GetServerNodes(serverctl.COMMS_NETID)
  395. //pubIP, _ := servercfg.GetPublicIP()
  396. if len(serverNodes) == 0 {
  397. if err := serverctl.SyncServerNetwork(serverctl.COMMS_NETID); err != nil {
  398. return
  399. }
  400. }
  401. var serverAddrs = make([]models.ServerAddr, 0)
  402. for _, node := range serverNodes {
  403. if node.Address != "" {
  404. serverAddrs = append(serverAddrs, models.ServerAddr{
  405. IsLeader: logic.IsLeader(&node),
  406. Address: node.Address,
  407. })
  408. }
  409. }
  410. networkSettings, _ := logic.GetParentNetwork(node.Network)
  411. // TODO consolidate functionality around files
  412. networkSettings.NodesLastModified = time.Now().Unix()
  413. networkSettings.DefaultServerAddrs = serverAddrs
  414. if err := logic.SaveNetwork(&networkSettings); err != nil {
  415. logger.Log(1, "unable to save network on serverAddr update", err.Error())
  416. }
  417. node.NetworkSettings.DefaultServerAddrs = networkSettings.DefaultServerAddrs
  418. }