| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185 | package logicimport (	"errors"	"net"	"github.com/google/uuid"	"github.com/gravitl/netmaker/logger"	"github.com/gravitl/netmaker/logic"	"github.com/gravitl/netmaker/models"	"golang.org/x/exp/slog")func SetFailOverCtx(failOverNode, victimNode, peerNode models.Node) error {	if peerNode.FailOverPeers == nil {		peerNode.FailOverPeers = make(map[string]struct{})	}	if victimNode.FailOverPeers == nil {		victimNode.FailOverPeers = make(map[string]struct{})	}	peerNode.FailOverPeers[victimNode.ID.String()] = struct{}{}	victimNode.FailOverPeers[peerNode.ID.String()] = struct{}{}	victimNode.FailedOverBy = failOverNode.ID	peerNode.FailedOverBy = failOverNode.ID	if err := logic.UpsertNode(&failOverNode); err != nil {		return err	}	if err := logic.UpsertNode(&victimNode); err != nil {		return err	}	if err := logic.UpsertNode(&peerNode); err != nil {		return err	}	return nil}// GetFailOverNode - gets the host acting as failOverfunc GetFailOverNode(network string, allNodes []models.Node) (models.Node, error) {	nodes := logic.GetNetworkNodesMemory(allNodes, network)	for _, node := range nodes {		if node.IsFailOver {			return node, nil		}	}	return models.Node{}, errors.New("auto relay not found")}// FailOverExists - checks if failOver exists already in the networkfunc FailOverExists(network string) (failOverNode models.Node, exists bool) {	nodes, err := logic.GetNetworkNodes(network)	if err != nil {		return	}	for _, node := range nodes {		if node.IsFailOver {			exists = true			failOverNode = node			return		}	}	return}// ResetFailedOverPeer - removes failed over node from network peersfunc ResetFailedOverPeer(failedOveredNode *models.Node) error {	nodes, err := logic.GetNetworkNodes(failedOveredNode.Network)	if err != nil {		return err	}	failedOveredNode.FailedOverBy = uuid.Nil	failedOveredNode.FailOverPeers = make(map[string]struct{})	err = logic.UpsertNode(failedOveredNode)	if err != nil {		return err	}	for _, node := range nodes {		if node.FailOverPeers == nil || node.ID == failedOveredNode.ID {			continue		}		delete(node.FailOverPeers, failedOveredNode.ID.String())		logic.UpsertNode(&node)	}	return nil}// ResetFailOver - reset failovered peersfunc ResetFailOver(failOverNode *models.Node) error {	// Unset FailedOverPeers	nodes, err := logic.GetNetworkNodes(failOverNode.Network)	if err != nil {		return err	}	for _, node := range nodes {		if node.FailedOverBy == failOverNode.ID {			node.FailedOverBy = uuid.Nil			node.FailOverPeers = make(map[string]struct{})			logic.UpsertNode(&node)		}	}	return nil}// GetFailOverPeerIps - adds the failedOvered peerIps by the peerfunc GetFailOverPeerIps(peer, node *models.Node) []net.IPNet {	allowedips := []net.IPNet{}	for failOverpeerID := range node.FailOverPeers {		failOverpeer, err := logic.GetNodeByID(failOverpeerID)		if err == nil && failOverpeer.FailedOverBy == peer.ID {			if failOverpeer.Address.IP != nil {				allowed := net.IPNet{					IP:   failOverpeer.Address.IP,					Mask: net.CIDRMask(32, 32),				}				allowedips = append(allowedips, allowed)			}			if failOverpeer.Address6.IP != nil {				allowed := net.IPNet{					IP:   failOverpeer.Address6.IP,					Mask: net.CIDRMask(128, 128),				}				allowedips = append(allowedips, allowed)			}			if failOverpeer.IsEgressGateway {				allowedips = append(allowedips, logic.GetEgressIPs(&failOverpeer)...)			}			if failOverpeer.IsRelay {				for _, id := range failOverpeer.RelayedNodes {					rNode, _ := logic.GetNodeByID(id)					if rNode.Address.IP != nil {						allowed := net.IPNet{							IP:   rNode.Address.IP,							Mask: net.CIDRMask(32, 32),						}						allowedips = append(allowedips, allowed)					}					if rNode.Address6.IP != nil {						allowed := net.IPNet{							IP:   rNode.Address6.IP,							Mask: net.CIDRMask(128, 128),						}						allowedips = append(allowedips, allowed)					}					if rNode.IsEgressGateway {						allowedips = append(allowedips, logic.GetEgressIPs(&rNode)...)					}				}			}			// handle ingress gateway peers			if failOverpeer.IsIngressGateway {				extPeers, _, _, err := logic.GetExtPeers(&failOverpeer, node)				if err != nil {					logger.Log(2, "could not retrieve ext peers for ", peer.ID.String(), err.Error())				}				for _, extPeer := range extPeers {					allowedips = append(allowedips, extPeer.AllowedIPs...)				}			}		}	}	return allowedips}func CreateFailOver(node models.Node) error {	if _, exists := FailOverExists(node.Network); exists {		return errors.New("failover already exists in the network")	}	host, err := logic.GetHost(node.HostID.String())	if err != nil {		return err	}	if host.OS != models.OS_Types.Linux {		return errors.New("only linux nodes are allowed to be set as failover")	}	if node.IsRelayed {		return errors.New("relayed node cannot be set as failover")	}	node.IsFailOver = true	err = logic.UpsertNode(&node)	if err != nil {		slog.Error("failed to upsert node", "node", node.ID.String(), "error", err)		return err	}	return nil}
 |