network.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/logic/acls"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/mq"
  15. "github.com/gravitl/netmaker/servercfg"
  16. )
  17. func networkHandlers(r *mux.Router) {
  18. r.HandleFunc("/api/networks", logic.SecurityCheck(false, http.HandlerFunc(getNetworks))).Methods(http.MethodGet)
  19. r.HandleFunc("/api/networks", logic.SecurityCheck(true, checkFreeTierLimits(networks_l, http.HandlerFunc(createNetwork)))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(getNetwork))).Methods(http.MethodGet)
  21. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(updateNetwork))).Methods(http.MethodPut)
  22. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(true, http.HandlerFunc(deleteNetwork))).Methods(http.MethodDelete)
  23. r.HandleFunc("/api/networks/{networkname}/keyupdate", logic.SecurityCheck(true, http.HandlerFunc(keyUpdate))).Methods(http.MethodPost)
  24. // ACLs
  25. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(updateNetworkACL))).Methods(http.MethodPut)
  26. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(getNetworkACL))).Methods(http.MethodGet)
  27. }
  28. // swagger:route GET /api/networks networks getNetworks
  29. //
  30. // Lists all networks.
  31. //
  32. // Schemes: https
  33. //
  34. // Security:
  35. // oauth
  36. //
  37. // Responses:
  38. // 200: getNetworksSliceResponse
  39. func getNetworks(w http.ResponseWriter, r *http.Request) {
  40. headerNetworks := r.Header.Get("networks")
  41. networksSlice := []string{}
  42. marshalErr := json.Unmarshal([]byte(headerNetworks), &networksSlice)
  43. if marshalErr != nil {
  44. logger.Log(0, r.Header.Get("user"), "error unmarshalling networks: ",
  45. marshalErr.Error())
  46. logic.ReturnErrorResponse(w, r, logic.FormatError(marshalErr, "badrequest"))
  47. return
  48. }
  49. allnetworks := []models.Network{}
  50. var err error
  51. if len(networksSlice) > 0 && networksSlice[0] == logic.ALL_NETWORK_ACCESS {
  52. allnetworks, err = logic.GetNetworks()
  53. if err != nil && !database.IsEmptyRecord(err) {
  54. logger.Log(0, r.Header.Get("user"), "failed to fetch networks: ", err.Error())
  55. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  56. return
  57. }
  58. } else {
  59. for _, network := range networksSlice {
  60. netObject, parentErr := logic.GetParentNetwork(network)
  61. if parentErr == nil {
  62. allnetworks = append(allnetworks, netObject)
  63. }
  64. }
  65. }
  66. logger.Log(2, r.Header.Get("user"), "fetched networks.")
  67. w.WriteHeader(http.StatusOK)
  68. json.NewEncoder(w).Encode(allnetworks)
  69. }
  70. // swagger:route GET /api/networks/{networkname} networks getNetwork
  71. //
  72. // Get a network.
  73. //
  74. // Schemes: https
  75. //
  76. // Security:
  77. // oauth
  78. //
  79. // Responses:
  80. // 200: networkBodyResponse
  81. func getNetwork(w http.ResponseWriter, r *http.Request) {
  82. // set header.
  83. w.Header().Set("Content-Type", "application/json")
  84. var params = mux.Vars(r)
  85. netname := params["networkname"]
  86. network, err := logic.GetNetwork(netname)
  87. if err != nil {
  88. logger.Log(0, r.Header.Get("user"), fmt.Sprintf("failed to fetch network [%s] info: %v",
  89. netname, err))
  90. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  91. return
  92. }
  93. logger.Log(2, r.Header.Get("user"), "fetched network", netname)
  94. w.WriteHeader(http.StatusOK)
  95. json.NewEncoder(w).Encode(network)
  96. }
  97. // swagger:route POST /api/networks/{networkname}/keyupdate networks keyUpdate
  98. //
  99. // Update keys for a network.
  100. //
  101. // Schemes: https
  102. //
  103. // Security:
  104. // oauth
  105. //
  106. // Responses:
  107. // 200: networkBodyResponse
  108. func keyUpdate(w http.ResponseWriter, r *http.Request) {
  109. w.Header().Set("Content-Type", "application/json")
  110. var params = mux.Vars(r)
  111. netname := params["networkname"]
  112. network, err := logic.KeyUpdate(netname)
  113. if err != nil {
  114. logger.Log(0, r.Header.Get("user"), fmt.Sprintf("failed to update keys for network [%s]: %v",
  115. netname, err))
  116. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  117. return
  118. }
  119. logger.Log(2, r.Header.Get("user"), "updated key on network", netname)
  120. w.WriteHeader(http.StatusOK)
  121. json.NewEncoder(w).Encode(network)
  122. nodes, err := logic.GetNetworkNodes(netname)
  123. if err != nil {
  124. logger.Log(0, "failed to retrieve network nodes for network", netname, err.Error())
  125. return
  126. }
  127. for _, node := range nodes {
  128. logger.Log(2, "updating node ", node.ID.String(), " for a key update")
  129. if err = mq.NodeUpdate(&node); err != nil {
  130. logger.Log(1, "failed to send update to node during a network wide key update", node.ID.String(), err.Error())
  131. }
  132. }
  133. }
  134. // swagger:route PUT /api/networks/{networkname} networks updateNetwork
  135. //
  136. // Update a network.
  137. //
  138. // Schemes: https
  139. //
  140. // Security:
  141. // oauth
  142. //
  143. // Responses:
  144. // 200: networkBodyResponse
  145. func updateNetwork(w http.ResponseWriter, r *http.Request) {
  146. w.Header().Set("Content-Type", "application/json")
  147. var params = mux.Vars(r)
  148. var network models.Network
  149. netname := params["networkname"]
  150. network, err := logic.GetParentNetwork(netname)
  151. if err != nil {
  152. logger.Log(0, r.Header.Get("user"), "failed to get network info: ",
  153. err.Error())
  154. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  155. return
  156. }
  157. var newNetwork models.Network
  158. err = json.NewDecoder(r.Body).Decode(&newNetwork)
  159. if err != nil {
  160. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  161. err.Error())
  162. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  163. return
  164. }
  165. rangeupdate4, rangeupdate6, holepunchupdate, groupsDelta, userDelta, err := logic.UpdateNetwork(&network, &newNetwork)
  166. if err != nil {
  167. logger.Log(0, r.Header.Get("user"), "failed to update network: ",
  168. err.Error())
  169. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  170. return
  171. }
  172. if len(groupsDelta) > 0 {
  173. for _, g := range groupsDelta {
  174. users, err := logic.GetGroupUsers(g)
  175. if err == nil {
  176. for _, user := range users {
  177. logic.AdjustNetworkUserPermissions(&user, &newNetwork)
  178. }
  179. }
  180. }
  181. }
  182. if len(userDelta) > 0 {
  183. for _, uname := range userDelta {
  184. user, err := logic.GetReturnUser(uname)
  185. if err == nil {
  186. logic.AdjustNetworkUserPermissions(&user, &newNetwork)
  187. }
  188. }
  189. }
  190. if rangeupdate4 {
  191. err = logic.UpdateNetworkNodeAddresses(network.NetID)
  192. if err != nil {
  193. logger.Log(0, r.Header.Get("user"),
  194. fmt.Sprintf("failed to update network [%s] ipv4 addresses: %v",
  195. network.NetID, err.Error()))
  196. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  197. return
  198. }
  199. }
  200. if rangeupdate6 {
  201. err = logic.UpdateNetworkNodeAddresses6(network.NetID)
  202. if err != nil {
  203. logger.Log(0, r.Header.Get("user"),
  204. fmt.Sprintf("failed to update network [%s] ipv6 addresses: %v",
  205. network.NetID, err.Error()))
  206. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  207. return
  208. }
  209. }
  210. if rangeupdate4 || rangeupdate6 || holepunchupdate {
  211. nodes, err := logic.GetNetworkNodes(network.NetID)
  212. if err != nil {
  213. logger.Log(0, r.Header.Get("user"),
  214. fmt.Sprintf("failed to get network [%s] nodes: %v",
  215. network.NetID, err.Error()))
  216. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  217. return
  218. }
  219. for _, node := range nodes {
  220. node := node
  221. runUpdates(&node, false, false)
  222. }
  223. }
  224. logger.Log(1, r.Header.Get("user"), "updated network", netname)
  225. w.WriteHeader(http.StatusOK)
  226. json.NewEncoder(w).Encode(newNetwork)
  227. }
  228. // swagger:route PUT /api/networks/{networkname}/acls networks updateNetworkACL
  229. //
  230. // Update a network ACL (Access Control List).
  231. //
  232. // Schemes: https
  233. //
  234. // Security:
  235. // oauth
  236. //
  237. // Responses:
  238. // 200: aclContainerResponse
  239. func updateNetworkACL(w http.ResponseWriter, r *http.Request) {
  240. w.Header().Set("Content-Type", "application/json")
  241. var params = mux.Vars(r)
  242. netname := params["networkname"]
  243. var networkACLChange acls.ACLContainer
  244. networkACLChange, err := networkACLChange.Get(acls.ContainerID(netname))
  245. if err != nil {
  246. logger.Log(0, r.Header.Get("user"),
  247. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  248. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  249. return
  250. }
  251. err = json.NewDecoder(r.Body).Decode(&networkACLChange)
  252. if err != nil {
  253. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  254. err.Error())
  255. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  256. return
  257. }
  258. newNetACL, err := networkACLChange.Save(acls.ContainerID(netname))
  259. if err != nil {
  260. logger.Log(0, r.Header.Get("user"),
  261. fmt.Sprintf("failed to update ACLs for network [%s]: %v", netname, err))
  262. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  263. return
  264. }
  265. logger.Log(1, r.Header.Get("user"), "updated ACLs for network", netname)
  266. if servercfg.IsMessageQueueBackend() {
  267. netNodes, err := logic.GetNetworkNodes(netname)
  268. if err == nil && len(netNodes) > 0 {
  269. if err = mq.PublishPeerUpdateForNode("", &netNodes[0], false); err != nil { // send peer updates
  270. logger.Log(0, "failed to publish peer update after ACL update on", netname)
  271. }
  272. }
  273. }
  274. w.WriteHeader(http.StatusOK)
  275. json.NewEncoder(w).Encode(newNetACL)
  276. }
  277. // swagger:route GET /api/networks/{networkname}/acls networks getNetworkACL
  278. //
  279. // Get a network ACL (Access Control List).
  280. //
  281. // Schemes: https
  282. //
  283. // Security:
  284. // oauth
  285. //
  286. // Responses:
  287. // 200: aclContainerResponse
  288. func getNetworkACL(w http.ResponseWriter, r *http.Request) {
  289. w.Header().Set("Content-Type", "application/json")
  290. var params = mux.Vars(r)
  291. netname := params["networkname"]
  292. var networkACL acls.ACLContainer
  293. networkACL, err := networkACL.Get(acls.ContainerID(netname))
  294. if err != nil {
  295. logger.Log(0, r.Header.Get("user"),
  296. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  297. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  298. return
  299. }
  300. logger.Log(2, r.Header.Get("user"), "fetched acl for network", netname)
  301. w.WriteHeader(http.StatusOK)
  302. json.NewEncoder(w).Encode(networkACL)
  303. }
  304. // swagger:route DELETE /api/networks/{networkname} networks deleteNetwork
  305. //
  306. // Delete a network. Will not delete if there are any nodes that belong to the network.
  307. //
  308. // Schemes: https
  309. //
  310. // Security:
  311. // oauth
  312. //
  313. // Responses:
  314. // 200: stringJSONResponse
  315. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  316. // Set header
  317. w.Header().Set("Content-Type", "application/json")
  318. var params = mux.Vars(r)
  319. network := params["networkname"]
  320. err := logic.DeleteNetwork(network)
  321. if err != nil {
  322. errtype := "badrequest"
  323. if strings.Contains(err.Error(), "Node check failed") {
  324. errtype = "forbidden"
  325. }
  326. logger.Log(0, r.Header.Get("user"),
  327. fmt.Sprintf("failed to delete network [%s]: %v", network, err))
  328. logic.ReturnErrorResponse(w, r, logic.FormatError(err, errtype))
  329. return
  330. }
  331. logger.Log(1, r.Header.Get("user"), "deleted network", network)
  332. w.WriteHeader(http.StatusOK)
  333. json.NewEncoder(w).Encode("success")
  334. }
  335. // swagger:route POST /api/networks networks createNetwork
  336. //
  337. // Create a network.
  338. //
  339. // Schemes: https
  340. //
  341. // Security:
  342. // oauth
  343. //
  344. // Responses:
  345. // 200: networkBodyResponse
  346. func createNetwork(w http.ResponseWriter, r *http.Request) {
  347. w.Header().Set("Content-Type", "application/json")
  348. var network models.Network
  349. // we decode our body request params
  350. err := json.NewDecoder(r.Body).Decode(&network)
  351. if err != nil {
  352. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  353. err.Error())
  354. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  355. return
  356. }
  357. if network.AddressRange == "" && network.AddressRange6 == "" {
  358. err := errors.New("IPv4 or IPv6 CIDR required")
  359. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  360. err.Error())
  361. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  362. return
  363. }
  364. network, err = logic.CreateNetwork(network)
  365. if err != nil {
  366. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  367. err.Error())
  368. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  369. return
  370. }
  371. defaultHosts := logic.GetDefaultHosts()
  372. for i := range defaultHosts {
  373. currHost := &defaultHosts[i]
  374. newNode, err := logic.UpdateHostNetwork(currHost, network.NetID, true)
  375. if err != nil {
  376. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  377. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  378. return
  379. }
  380. logger.Log(1, "added new node", newNode.ID.String(), "to host", currHost.Name)
  381. if err = mq.HostUpdate(&models.HostUpdate{
  382. Action: models.JoinHostToNetwork,
  383. Host: *currHost,
  384. Node: *newNode,
  385. }); err != nil {
  386. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  387. }
  388. }
  389. logger.Log(1, r.Header.Get("user"), "created network", network.NetID)
  390. w.WriteHeader(http.StatusOK)
  391. json.NewEncoder(w).Encode(network)
  392. }