ext_client.go 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "net/http"
  8. "reflect"
  9. "strconv"
  10. "strings"
  11. "github.com/go-playground/validator/v10"
  12. "github.com/gorilla/mux"
  13. "github.com/gravitl/netmaker/database"
  14. "github.com/gravitl/netmaker/logger"
  15. "github.com/gravitl/netmaker/logic"
  16. "github.com/gravitl/netmaker/servercfg"
  17. "github.com/gravitl/netmaker/models"
  18. "github.com/gravitl/netmaker/mq"
  19. "github.com/skip2/go-qrcode"
  20. "golang.org/x/exp/slices"
  21. "golang.org/x/exp/slog"
  22. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  23. )
  24. func extClientHandlers(r *mux.Router) {
  25. r.HandleFunc("/api/extclients", logic.SecurityCheck(true, http.HandlerFunc(getAllExtClients))).
  26. Methods(http.MethodGet)
  27. r.HandleFunc("/api/extclients/{network}", logic.SecurityCheck(true, http.HandlerFunc(getNetworkExtClients))).
  28. Methods(http.MethodGet)
  29. r.HandleFunc("/api/extclients/{network}/{clientid}", logic.SecurityCheck(false, http.HandlerFunc(getExtClient))).
  30. Methods(http.MethodGet)
  31. r.HandleFunc("/api/extclients/{network}/{clientid}/{type}", logic.SecurityCheck(false, http.HandlerFunc(getExtClientConf))).
  32. Methods(http.MethodGet)
  33. r.HandleFunc("/api/extclients/{network}/{clientid}", logic.SecurityCheck(false, http.HandlerFunc(updateExtClient))).
  34. Methods(http.MethodPut)
  35. r.HandleFunc("/api/extclients/{network}/{clientid}", logic.SecurityCheck(false, http.HandlerFunc(deleteExtClient))).
  36. Methods(http.MethodDelete)
  37. r.HandleFunc("/api/extclients/{network}/{nodeid}", logic.SecurityCheck(false, checkFreeTierLimits(limitChoiceMachines, http.HandlerFunc(createExtClient)))).
  38. Methods(http.MethodPost)
  39. r.HandleFunc("/api/v1/client_conf/{network}", logic.SecurityCheck(false, http.HandlerFunc(getExtClientHAConf))).Methods(http.MethodGet)
  40. }
  41. func checkIngressExists(nodeID string) bool {
  42. node, err := logic.GetNodeByID(nodeID)
  43. if err != nil {
  44. return false
  45. }
  46. return node.IsIngressGateway
  47. }
  48. // @Summary Get all remote access client associated with network
  49. // @Router /api/extclients/{network} [get]
  50. // @Tags Remote Access Client
  51. // @Security oauth2
  52. // @Success 200 {object} models.ExtClient
  53. // @Failure 500 {object} models.ErrorResponse
  54. func getNetworkExtClients(w http.ResponseWriter, r *http.Request) {
  55. w.Header().Set("Content-Type", "application/json")
  56. var extclients []models.ExtClient
  57. var params = mux.Vars(r)
  58. network := params["network"]
  59. extclients, err := logic.GetNetworkExtClients(network)
  60. if err != nil {
  61. logger.Log(0, r.Header.Get("user"),
  62. fmt.Sprintf("failed to get ext clients for network [%s]: %v", network, err))
  63. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  64. return
  65. }
  66. //Returns all the extclients in JSON format
  67. w.WriteHeader(http.StatusOK)
  68. json.NewEncoder(w).Encode(extclients)
  69. }
  70. // @Summary Fetches All Remote Access Clients across all networks
  71. // @Router /api/extclients [get]
  72. // @Tags Remote Access Client
  73. // @Security oauth2
  74. // @Success 200 {object} models.ExtClient
  75. // @Failure 500 {object} models.ErrorResponse
  76. // Not quite sure if this is necessary. Probably necessary based on front end but may
  77. // want to review after iteration 1 if it's being used or not
  78. func getAllExtClients(w http.ResponseWriter, r *http.Request) {
  79. w.Header().Set("Content-Type", "application/json")
  80. clients, err := logic.GetAllExtClients()
  81. if err != nil && !database.IsEmptyRecord(err) {
  82. logger.Log(0, "failed to get all extclients: ", err.Error())
  83. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  84. return
  85. }
  86. //Return all the extclients in JSON format
  87. logic.SortExtClient(clients[:])
  88. w.WriteHeader(http.StatusOK)
  89. json.NewEncoder(w).Encode(clients)
  90. }
  91. // @Summary Get an individual remote access client
  92. // @Router /api/extclients/{network}/{clientid} [get]
  93. // @Tags Remote Access Client
  94. // @Security oauth2
  95. // @Success 200 {object} models.ExtClient
  96. // @Failure 500 {object} models.ErrorResponse
  97. // @Failure 403 {object} models.ErrorResponse
  98. func getExtClient(w http.ResponseWriter, r *http.Request) {
  99. // set header.
  100. w.Header().Set("Content-Type", "application/json")
  101. var params = mux.Vars(r)
  102. clientid := params["clientid"]
  103. network := params["network"]
  104. client, err := logic.GetExtClient(clientid, network)
  105. if err != nil {
  106. logger.Log(
  107. 0,
  108. r.Header.Get("user"),
  109. fmt.Sprintf("failed to get extclient for [%s] on network [%s]: %v",
  110. clientid, network, err),
  111. )
  112. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  113. return
  114. }
  115. w.WriteHeader(http.StatusOK)
  116. json.NewEncoder(w).Encode(client)
  117. }
  118. // @Summary Get an individual remote access client
  119. // @Router /api/extclients/{network}/{clientid}/{type} [get]
  120. // @Tags Remote Access Client
  121. // @Security oauth2
  122. // @Success 200 {object} models.ExtClient
  123. // @Failure 500 {object} models.ErrorResponse
  124. // @Failure 403 {object} models.ErrorResponse
  125. func getExtClientConf(w http.ResponseWriter, r *http.Request) {
  126. // set header.
  127. w.Header().Set("Content-Type", "application/json")
  128. var params = mux.Vars(r)
  129. clientid := params["clientid"]
  130. networkid := params["network"]
  131. client, err := logic.GetExtClient(clientid, networkid)
  132. if err != nil {
  133. logger.Log(
  134. 0,
  135. r.Header.Get("user"),
  136. fmt.Sprintf("failed to get extclient for [%s] on network [%s]: %v",
  137. clientid, networkid, err),
  138. )
  139. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  140. return
  141. }
  142. gwnode, err := logic.GetNodeByID(client.IngressGatewayID)
  143. if err != nil {
  144. logger.Log(
  145. 0,
  146. r.Header.Get("user"),
  147. fmt.Sprintf(
  148. "failed to get ingress gateway node [%s] info: %v",
  149. client.IngressGatewayID,
  150. err,
  151. ),
  152. )
  153. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  154. return
  155. }
  156. host, err := logic.GetHost(gwnode.HostID.String())
  157. if err != nil {
  158. logger.Log(
  159. 0,
  160. r.Header.Get("user"),
  161. fmt.Sprintf(
  162. "failed to get host for ingress gateway node [%s] info: %v",
  163. client.IngressGatewayID,
  164. err,
  165. ),
  166. )
  167. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  168. return
  169. }
  170. network, err := logic.GetParentNetwork(client.Network)
  171. if err != nil {
  172. logger.Log(
  173. 1,
  174. r.Header.Get("user"),
  175. "Could not retrieve Ingress Gateway Network",
  176. client.Network,
  177. )
  178. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  179. return
  180. }
  181. preferredIp := strings.TrimSpace(r.URL.Query().Get("preferredip"))
  182. if preferredIp != "" {
  183. allowedPreferredIps := []string{}
  184. for i := range gwnode.AdditionalRagIps {
  185. allowedPreferredIps = append(allowedPreferredIps, gwnode.AdditionalRagIps[i].String())
  186. }
  187. allowedPreferredIps = append(allowedPreferredIps, host.EndpointIP.String())
  188. allowedPreferredIps = append(allowedPreferredIps, host.EndpointIPv6.String())
  189. if !slices.Contains(allowedPreferredIps, preferredIp) {
  190. slog.Warn(
  191. "preferred endpoint ip is not associated with the RAG. proceeding with preferred ip",
  192. "preferred ip",
  193. preferredIp,
  194. )
  195. logic.ReturnErrorResponse(
  196. w,
  197. r,
  198. logic.FormatError(
  199. errors.New("preferred endpoint ip is not associated with the RAG"),
  200. "badrequest",
  201. ),
  202. )
  203. return
  204. }
  205. if net.ParseIP(preferredIp).To4() == nil {
  206. preferredIp = fmt.Sprintf("[%s]", preferredIp)
  207. }
  208. }
  209. addrString := client.Address
  210. if addrString != "" {
  211. addrString += "/32"
  212. }
  213. if client.Address6 != "" {
  214. if addrString != "" {
  215. addrString += ","
  216. }
  217. addrString += client.Address6 + "/128"
  218. }
  219. keepalive := ""
  220. if network.DefaultKeepalive != 0 {
  221. keepalive = "PersistentKeepalive = " + strconv.Itoa(int(network.DefaultKeepalive))
  222. }
  223. if gwnode.IngressPersistentKeepalive != 0 {
  224. keepalive = "PersistentKeepalive = " + strconv.Itoa(int(gwnode.IngressPersistentKeepalive))
  225. }
  226. gwendpoint := ""
  227. if preferredIp == "" {
  228. if host.EndpointIP.To4() == nil {
  229. gwendpoint = fmt.Sprintf("[%s]:%d", host.EndpointIPv6.String(), host.ListenPort)
  230. } else {
  231. gwendpoint = fmt.Sprintf("%s:%d", host.EndpointIP.String(), host.ListenPort)
  232. }
  233. } else {
  234. gwendpoint = fmt.Sprintf("%s:%d", preferredIp, host.ListenPort)
  235. }
  236. var newAllowedIPs string
  237. if logic.IsInternetGw(gwnode) || gwnode.InternetGwID != "" {
  238. egressrange := "0.0.0.0/0"
  239. if gwnode.Address6.IP != nil && client.Address6 != "" {
  240. egressrange += "," + "::/0"
  241. }
  242. newAllowedIPs = egressrange
  243. } else {
  244. newAllowedIPs = network.AddressRange
  245. if newAllowedIPs != "" && network.AddressRange6 != "" {
  246. newAllowedIPs += ","
  247. }
  248. if network.AddressRange6 != "" {
  249. newAllowedIPs += network.AddressRange6
  250. }
  251. if egressGatewayRanges, err := logic.GetEgressRangesOnNetwork(&client); err == nil {
  252. for _, egressGatewayRange := range egressGatewayRanges {
  253. newAllowedIPs += "," + egressGatewayRange
  254. }
  255. }
  256. }
  257. defaultDNS := ""
  258. if client.DNS != "" {
  259. defaultDNS = "DNS = " + client.DNS
  260. } else if gwnode.IngressDNS != "" {
  261. defaultDNS = "DNS = " + gwnode.IngressDNS
  262. }
  263. // if servercfg.GetManageDNS() {
  264. // if gwnode.Address6.IP != nil {
  265. // if defaultDNS == "" {
  266. // defaultDNS = "DNS = " + gwnode.Address6.IP.String()
  267. // } else {
  268. // defaultDNS = defaultDNS + ", " + gwnode.Address6.IP.String()
  269. // }
  270. // }
  271. // if gwnode.Address.IP != nil {
  272. // if defaultDNS == "" {
  273. // defaultDNS = "DNS = " + gwnode.Address.IP.String()
  274. // } else {
  275. // defaultDNS = defaultDNS + ", " + gwnode.Address.IP.String()
  276. // }
  277. // }
  278. // }
  279. defaultMTU := 1420
  280. if host.MTU != 0 {
  281. defaultMTU = host.MTU
  282. }
  283. if gwnode.IngressMTU != 0 {
  284. defaultMTU = int(gwnode.IngressMTU)
  285. }
  286. postUp := strings.Builder{}
  287. if client.PostUp != "" && params["type"] != "qr" {
  288. for _, loc := range strings.Split(client.PostUp, "\n") {
  289. postUp.WriteString(fmt.Sprintf("PostUp = %s\n", loc))
  290. }
  291. }
  292. postDown := strings.Builder{}
  293. if client.PostDown != "" && params["type"] != "qr" {
  294. for _, loc := range strings.Split(client.PostDown, "\n") {
  295. postDown.WriteString(fmt.Sprintf("PostDown = %s\n", loc))
  296. }
  297. }
  298. config := fmt.Sprintf(`[Interface]
  299. Address = %s
  300. PrivateKey = %s
  301. MTU = %d
  302. %s
  303. %s
  304. %s
  305. [Peer]
  306. PublicKey = %s
  307. AllowedIPs = %s
  308. Endpoint = %s
  309. %s
  310. `, addrString,
  311. client.PrivateKey,
  312. defaultMTU,
  313. defaultDNS,
  314. postUp.String(),
  315. postDown.String(),
  316. host.PublicKey,
  317. newAllowedIPs,
  318. gwendpoint,
  319. keepalive,
  320. )
  321. if params["type"] == "qr" {
  322. bytes, err := qrcode.Encode(config, qrcode.Medium, 220)
  323. if err != nil {
  324. logger.Log(1, r.Header.Get("user"), "failed to encode qr code: ", err.Error())
  325. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  326. return
  327. }
  328. w.Header().Set("Content-Type", "image/png")
  329. w.WriteHeader(http.StatusOK)
  330. _, err = w.Write(bytes)
  331. if err != nil {
  332. logger.Log(1, r.Header.Get("user"), "response writer error (qr) ", err.Error())
  333. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  334. return
  335. }
  336. return
  337. }
  338. if params["type"] == "file" {
  339. name := client.ClientID + ".conf"
  340. w.Header().Set("Content-Type", "application/config")
  341. w.Header().Set("Content-Disposition", "attachment; filename=\""+name+"\"")
  342. w.WriteHeader(http.StatusOK)
  343. _, err := fmt.Fprint(w, config)
  344. if err != nil {
  345. logger.Log(1, r.Header.Get("user"), "response writer error (file) ", err.Error())
  346. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  347. }
  348. return
  349. }
  350. logger.Log(2, r.Header.Get("user"), "retrieved ext client config")
  351. w.WriteHeader(http.StatusOK)
  352. json.NewEncoder(w).Encode(client)
  353. }
  354. // @Summary Get an individual remote access client
  355. // @Router /api/extclients/{network}/{clientid}/{type} [get]
  356. // @Tags Remote Access Client
  357. // @Security oauth2
  358. // @Success 200 {object} models.ExtClient
  359. // @Failure 500 {object} models.ErrorResponse
  360. // @Failure 403 {object} models.ErrorResponse
  361. func getExtClientHAConf(w http.ResponseWriter, r *http.Request) {
  362. var params = mux.Vars(r)
  363. networkid := params["network"]
  364. network, err := logic.GetParentNetwork(networkid)
  365. if err != nil {
  366. logger.Log(
  367. 1,
  368. r.Header.Get("user"),
  369. "Could not retrieve Ingress Gateway Network",
  370. networkid,
  371. )
  372. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  373. return
  374. }
  375. // fetch client based on availability
  376. nodes, _ := logic.GetNetworkNodes(networkid)
  377. defaultPolicy, _ := logic.GetDefaultPolicy(models.NetworkID(networkid), models.DevicePolicy)
  378. var targetGwID string
  379. var connectionCnt int = -1
  380. for _, nodeI := range nodes {
  381. if nodeI.IsGw {
  382. // check health status
  383. logic.GetNodeStatus(&nodeI, defaultPolicy.Enabled)
  384. if nodeI.Status != models.OnlineSt {
  385. continue
  386. }
  387. // Get Total connections on the gw
  388. clients := logic.GetGwExtclients(nodeI.ID.String(), networkid)
  389. if connectionCnt == -1 || len(clients) < connectionCnt {
  390. connectionCnt = len(clients)
  391. targetGwID = nodeI.ID.String()
  392. }
  393. }
  394. }
  395. gwnode, err := logic.GetNodeByID(targetGwID)
  396. if err != nil {
  397. logger.Log(
  398. 0,
  399. r.Header.Get("user"),
  400. fmt.Sprintf(
  401. "failed to get ingress gateway node [%s] info: %v",
  402. gwnode.ID,
  403. err,
  404. ),
  405. )
  406. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  407. return
  408. }
  409. host, err := logic.GetHost(gwnode.HostID.String())
  410. if err != nil {
  411. logger.Log(0, r.Header.Get("user"),
  412. fmt.Sprintf("failed to get ingress gateway host for node [%s] info: %v", gwnode.ID, err))
  413. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  414. return
  415. }
  416. var userName string
  417. if r.Header.Get("ismaster") == "yes" {
  418. userName = logic.MasterUser
  419. } else {
  420. caller, err := logic.GetUser(r.Header.Get("user"))
  421. if err != nil {
  422. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  423. return
  424. }
  425. userName = caller.UserName
  426. }
  427. // create client
  428. var extclient models.ExtClient
  429. extclient.OwnerID = userName
  430. extclient.IngressGatewayID = targetGwID
  431. extclient.Network = networkid
  432. extclient.Tags = make(map[models.TagID]struct{})
  433. // extclient.Tags[models.TagID(fmt.Sprintf("%s.%s", extclient.Network,
  434. // models.RemoteAccessTagName))] = struct{}{}
  435. // set extclient dns to ingressdns if extclient dns is not explicitly set
  436. if (extclient.DNS == "") && (gwnode.IngressDNS != "") {
  437. extclient.DNS = gwnode.IngressDNS
  438. }
  439. listenPort := logic.GetPeerListenPort(host)
  440. extclient.IngressGatewayEndpoint = fmt.Sprintf("%s:%d", host.EndpointIP.String(), listenPort)
  441. extclient.Enabled = true
  442. if err = logic.CreateExtClient(&extclient); err != nil {
  443. slog.Error(
  444. "failed to create extclient",
  445. "user",
  446. r.Header.Get("user"),
  447. "network",
  448. networkid,
  449. "error",
  450. err,
  451. )
  452. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  453. return
  454. }
  455. client, err := logic.GetExtClient(extclient.ClientID, networkid)
  456. if err != nil {
  457. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  458. return
  459. }
  460. addrString := client.Address
  461. if addrString != "" {
  462. addrString += "/32"
  463. }
  464. if client.Address6 != "" {
  465. if addrString != "" {
  466. addrString += ","
  467. }
  468. addrString += client.Address6 + "/128"
  469. }
  470. keepalive := ""
  471. if network.DefaultKeepalive != 0 {
  472. keepalive = "PersistentKeepalive = " + strconv.Itoa(int(network.DefaultKeepalive))
  473. }
  474. if gwnode.IngressPersistentKeepalive != 0 {
  475. keepalive = "PersistentKeepalive = " + strconv.Itoa(int(gwnode.IngressPersistentKeepalive))
  476. }
  477. var newAllowedIPs string
  478. if logic.IsInternetGw(gwnode) || gwnode.InternetGwID != "" {
  479. egressrange := "0.0.0.0/0"
  480. if gwnode.Address6.IP != nil && client.Address6 != "" {
  481. egressrange += "," + "::/0"
  482. }
  483. newAllowedIPs = egressrange
  484. } else {
  485. newAllowedIPs = network.AddressRange
  486. if newAllowedIPs != "" && network.AddressRange6 != "" {
  487. newAllowedIPs += ","
  488. }
  489. if network.AddressRange6 != "" {
  490. newAllowedIPs += network.AddressRange6
  491. }
  492. if egressGatewayRanges, err := logic.GetEgressRangesOnNetwork(&client); err == nil {
  493. for _, egressGatewayRange := range egressGatewayRanges {
  494. newAllowedIPs += "," + egressGatewayRange
  495. }
  496. }
  497. }
  498. gwendpoint := ""
  499. if host.EndpointIP.To4() == nil {
  500. gwendpoint = fmt.Sprintf("[%s]:%d", host.EndpointIPv6.String(), host.ListenPort)
  501. } else {
  502. gwendpoint = fmt.Sprintf("%s:%d", host.EndpointIP.String(), host.ListenPort)
  503. }
  504. defaultDNS := ""
  505. if client.DNS != "" {
  506. defaultDNS = "DNS = " + client.DNS
  507. } else if gwnode.IngressDNS != "" {
  508. defaultDNS = "DNS = " + gwnode.IngressDNS
  509. }
  510. defaultMTU := 1420
  511. if host.MTU != 0 {
  512. defaultMTU = host.MTU
  513. }
  514. if gwnode.IngressMTU != 0 {
  515. defaultMTU = int(gwnode.IngressMTU)
  516. }
  517. postUp := strings.Builder{}
  518. if client.PostUp != "" && params["type"] != "qr" {
  519. for _, loc := range strings.Split(client.PostUp, "\n") {
  520. postUp.WriteString(fmt.Sprintf("PostUp = %s\n", loc))
  521. }
  522. }
  523. postDown := strings.Builder{}
  524. if client.PostDown != "" && params["type"] != "qr" {
  525. for _, loc := range strings.Split(client.PostDown, "\n") {
  526. postDown.WriteString(fmt.Sprintf("PostDown = %s\n", loc))
  527. }
  528. }
  529. config := fmt.Sprintf(`[Interface]
  530. Address = %s
  531. PrivateKey = %s
  532. MTU = %d
  533. %s
  534. %s
  535. %s
  536. [Peer]
  537. PublicKey = %s
  538. AllowedIPs = %s
  539. Endpoint = %s
  540. %s
  541. `, addrString,
  542. client.PrivateKey,
  543. defaultMTU,
  544. defaultDNS,
  545. postUp.String(),
  546. postDown.String(),
  547. host.PublicKey,
  548. newAllowedIPs,
  549. gwendpoint,
  550. keepalive,
  551. )
  552. go func() {
  553. if err := logic.SetClientDefaultACLs(&extclient); err != nil {
  554. slog.Error(
  555. "failed to set default acls for extclient",
  556. "user",
  557. r.Header.Get("user"),
  558. "network",
  559. networkid,
  560. "error",
  561. err,
  562. )
  563. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  564. return
  565. }
  566. if err := mq.PublishPeerUpdate(false); err != nil {
  567. logger.Log(1, "error publishing peer update ", err.Error())
  568. }
  569. if servercfg.IsDNSMode() {
  570. logic.SetDNS()
  571. }
  572. }()
  573. name := client.ClientID + ".conf"
  574. w.Header().Set("Content-Type", "application/config")
  575. w.Header().Set("Content-Disposition", "attachment; filename=\""+name+"\"")
  576. w.WriteHeader(http.StatusOK)
  577. _, err = fmt.Fprint(w, config)
  578. if err != nil {
  579. logger.Log(1, r.Header.Get("user"), "response writer error (file) ", err.Error())
  580. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  581. }
  582. }
  583. // @Summary Create an individual remote access client
  584. // @Router /api/extclients/{network}/{nodeid} [post]
  585. // @Tags Remote Access Client
  586. // @Security oauth2
  587. // @Success 200 {string} string "OK"
  588. // @Failure 500 {object} models.ErrorResponse
  589. // @Failure 400 {object} models.ErrorResponse
  590. // @Failure 403 {object} models.ErrorResponse
  591. func createExtClient(w http.ResponseWriter, r *http.Request) {
  592. w.Header().Set("Content-Type", "application/json")
  593. var params = mux.Vars(r)
  594. nodeid := params["nodeid"]
  595. ingressExists := checkIngressExists(nodeid)
  596. if !ingressExists {
  597. err := errors.New("ingress does not exist")
  598. slog.Error("failed to create extclient", "user", r.Header.Get("user"), "error", err)
  599. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  600. return
  601. }
  602. var customExtClient models.CustomExtClient
  603. if err := json.NewDecoder(r.Body).Decode(&customExtClient); err != nil {
  604. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  605. return
  606. }
  607. if err := validateCustomExtClient(&customExtClient, true); err != nil {
  608. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  609. return
  610. }
  611. var gateway models.EgressGatewayRequest
  612. gateway.NetID = params["network"]
  613. gateway.Ranges = customExtClient.ExtraAllowedIPs
  614. err := logic.ValidateEgressRange(gateway)
  615. if err != nil {
  616. logger.Log(0, r.Header.Get("user"), "error validating egress range: ", err.Error())
  617. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  618. return
  619. }
  620. node, err := logic.GetNodeByID(nodeid)
  621. if err != nil {
  622. logger.Log(0, r.Header.Get("user"),
  623. fmt.Sprintf("failed to get ingress gateway node [%s] info: %v", nodeid, err))
  624. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  625. return
  626. }
  627. var userName string
  628. if r.Header.Get("ismaster") == "yes" {
  629. userName = logic.MasterUser
  630. } else {
  631. caller, err := logic.GetUser(r.Header.Get("user"))
  632. if err != nil {
  633. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  634. return
  635. }
  636. userName = caller.UserName
  637. // check if user has a config already for remote access client
  638. extclients, err := logic.GetNetworkExtClients(node.Network)
  639. if err != nil {
  640. slog.Error("failed to get extclients", "error", err)
  641. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  642. return
  643. }
  644. for _, extclient := range extclients {
  645. if extclient.RemoteAccessClientID != "" &&
  646. extclient.RemoteAccessClientID == customExtClient.RemoteAccessClientID && extclient.OwnerID == caller.UserName && nodeid == extclient.IngressGatewayID {
  647. // extclient on the gw already exists for the remote access client
  648. err = errors.New("remote client config already exists on the gateway")
  649. slog.Error("failed to create extclient", "user", userName, "error", err)
  650. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  651. return
  652. }
  653. }
  654. }
  655. extclient := logic.UpdateExtClient(&models.ExtClient{}, &customExtClient)
  656. extclient.OwnerID = userName
  657. extclient.RemoteAccessClientID = customExtClient.RemoteAccessClientID
  658. extclient.IngressGatewayID = nodeid
  659. extclient.Network = node.Network
  660. extclient.Tags = make(map[models.TagID]struct{})
  661. // extclient.Tags[models.TagID(fmt.Sprintf("%s.%s", extclient.Network,
  662. // models.RemoteAccessTagName))] = struct{}{}
  663. // set extclient dns to ingressdns if extclient dns is not explicitly set
  664. if (extclient.DNS == "") && (node.IngressDNS != "") {
  665. extclient.DNS = node.IngressDNS
  666. }
  667. host, err := logic.GetHost(node.HostID.String())
  668. if err != nil {
  669. logger.Log(0, r.Header.Get("user"),
  670. fmt.Sprintf("failed to get ingress gateway host for node [%s] info: %v", nodeid, err))
  671. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  672. return
  673. }
  674. listenPort := logic.GetPeerListenPort(host)
  675. extclient.IngressGatewayEndpoint = fmt.Sprintf("%s:%d", host.EndpointIP.String(), listenPort)
  676. extclient.Enabled = true
  677. parentNetwork, err := logic.GetNetwork(node.Network)
  678. if err == nil { // check if parent network default ACL is enabled (yes) or not (no)
  679. extclient.Enabled = parentNetwork.DefaultACL == "yes"
  680. }
  681. extclient.Os = customExtClient.Os
  682. extclient.DeviceName = customExtClient.DeviceName
  683. if customExtClient.IsAlreadyConnectedToInetGw {
  684. slog.Warn("RAC/Client is already connected to internet gateway. this may mask their real IP address", "client IP", customExtClient.PublicEndpoint)
  685. }
  686. extclient.PublicEndpoint = customExtClient.PublicEndpoint
  687. extclient.Country = customExtClient.Country
  688. if err = logic.CreateExtClient(&extclient); err != nil {
  689. slog.Error(
  690. "failed to create extclient",
  691. "user",
  692. r.Header.Get("user"),
  693. "network",
  694. node.Network,
  695. "error",
  696. err,
  697. )
  698. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  699. return
  700. }
  701. slog.Info(
  702. "created extclient",
  703. "user",
  704. r.Header.Get("user"),
  705. "network",
  706. node.Network,
  707. "clientid",
  708. extclient.ClientID,
  709. )
  710. w.WriteHeader(http.StatusOK)
  711. go func() {
  712. if err := logic.SetClientDefaultACLs(&extclient); err != nil {
  713. slog.Error(
  714. "failed to set default acls for extclient",
  715. "user",
  716. r.Header.Get("user"),
  717. "network",
  718. node.Network,
  719. "error",
  720. err,
  721. )
  722. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  723. return
  724. }
  725. if err := mq.PublishPeerUpdate(false); err != nil {
  726. logger.Log(1, "error setting ext peers on "+nodeid+": "+err.Error())
  727. }
  728. if servercfg.IsDNSMode() {
  729. logic.SetDNS()
  730. }
  731. }()
  732. }
  733. // @Summary Update an individual remote access client
  734. // @Router /api/extclients/{network}/{clientid} [put]
  735. // @Tags Remote Access Client
  736. // @Security oauth2
  737. // @Success 200 {object} models.ExtClient
  738. // @Failure 500 {object} models.ErrorResponse
  739. // @Failure 400 {object} models.ErrorResponse
  740. // @Failure 403 {object} models.ErrorResponse
  741. func updateExtClient(w http.ResponseWriter, r *http.Request) {
  742. w.Header().Set("Content-Type", "application/json")
  743. var params = mux.Vars(r)
  744. var update models.CustomExtClient
  745. //var oldExtClient models.ExtClient
  746. var sendPeerUpdate bool
  747. var replacePeers bool
  748. err := json.NewDecoder(r.Body).Decode(&update)
  749. if err != nil {
  750. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  751. err.Error())
  752. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  753. return
  754. }
  755. clientid := params["clientid"]
  756. oldExtClient, err := logic.GetExtClientByName(clientid)
  757. if err != nil {
  758. slog.Error(
  759. "failed to retrieve extclient",
  760. "user",
  761. r.Header.Get("user"),
  762. "id",
  763. clientid,
  764. "error",
  765. err,
  766. )
  767. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  768. return
  769. }
  770. if oldExtClient.ClientID == update.ClientID {
  771. if err := validateCustomExtClient(&update, false); err != nil {
  772. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  773. return
  774. }
  775. } else {
  776. if err := validateCustomExtClient(&update, true); err != nil {
  777. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  778. return
  779. }
  780. }
  781. var gateway models.EgressGatewayRequest
  782. gateway.NetID = params["network"]
  783. gateway.Ranges = update.ExtraAllowedIPs
  784. err = logic.ValidateEgressRange(gateway)
  785. if err != nil {
  786. logger.Log(0, r.Header.Get("user"), "error validating egress range: ", err.Error())
  787. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  788. return
  789. }
  790. var changedID = update.ClientID != oldExtClient.ClientID
  791. if !reflect.DeepEqual(update.DeniedACLs, oldExtClient.DeniedACLs) {
  792. sendPeerUpdate = true
  793. logic.SetClientACLs(&oldExtClient, update.DeniedACLs)
  794. }
  795. if !logic.IsSlicesEqual(update.ExtraAllowedIPs, oldExtClient.ExtraAllowedIPs) {
  796. sendPeerUpdate = true
  797. }
  798. if update.Enabled != oldExtClient.Enabled {
  799. sendPeerUpdate = true
  800. }
  801. if update.PublicKey != oldExtClient.PublicKey {
  802. //remove old peer entry
  803. sendPeerUpdate = true
  804. replacePeers = true
  805. }
  806. newclient := logic.UpdateExtClient(&oldExtClient, &update)
  807. if err := logic.DeleteExtClient(oldExtClient.Network, oldExtClient.ClientID); err != nil {
  808. slog.Error(
  809. "failed to delete ext client",
  810. "user",
  811. r.Header.Get("user"),
  812. "id",
  813. oldExtClient.ClientID,
  814. "network",
  815. oldExtClient.Network,
  816. "error",
  817. err,
  818. )
  819. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  820. return
  821. }
  822. if err := logic.SaveExtClient(&newclient); err != nil {
  823. slog.Error(
  824. "failed to save ext client",
  825. "user",
  826. r.Header.Get("user"),
  827. "id",
  828. newclient.ClientID,
  829. "network",
  830. newclient.Network,
  831. "error",
  832. err,
  833. )
  834. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  835. return
  836. }
  837. logger.Log(0, r.Header.Get("user"), "updated ext client", update.ClientID)
  838. w.WriteHeader(http.StatusOK)
  839. json.NewEncoder(w).Encode(newclient)
  840. go func() {
  841. if changedID && servercfg.IsDNSMode() {
  842. logic.SetDNS()
  843. }
  844. if replacePeers {
  845. if err := mq.PublishDeletedClientPeerUpdate(&oldExtClient); err != nil {
  846. slog.Error("error deleting old ext peers", "error", err.Error())
  847. }
  848. }
  849. if sendPeerUpdate { // need to send a peer update to the ingress node as enablement of one of it's clients has changed
  850. ingressNode, err := logic.GetNodeByID(newclient.IngressGatewayID)
  851. if err == nil {
  852. if err = mq.PublishPeerUpdate(false); err != nil {
  853. logger.Log(
  854. 1,
  855. "error setting ext peers on",
  856. ingressNode.ID.String(),
  857. ":",
  858. err.Error(),
  859. )
  860. }
  861. }
  862. if !update.Enabled {
  863. ingressHost, err := logic.GetHost(ingressNode.HostID.String())
  864. if err != nil {
  865. slog.Error(
  866. "Failed to get ingress host",
  867. "node",
  868. ingressNode.ID.String(),
  869. "error",
  870. err,
  871. )
  872. return
  873. }
  874. nodes, err := logic.GetAllNodes()
  875. if err != nil {
  876. slog.Error("Failed to get nodes", "error", err)
  877. return
  878. }
  879. go mq.PublishSingleHostPeerUpdate(ingressHost, nodes, nil, []models.ExtClient{oldExtClient}, false, nil)
  880. }
  881. }
  882. }()
  883. }
  884. // @Summary Delete an individual remote access client
  885. // @Router /api/extclients/{network}/{clientid} [delete]
  886. // @Tags Remote Access Client
  887. // @Security oauth2
  888. // @Success 200
  889. // @Failure 500 {object} models.ErrorResponse
  890. // @Failure 403 {object} models.ErrorResponse
  891. func deleteExtClient(w http.ResponseWriter, r *http.Request) {
  892. // Set header
  893. w.Header().Set("Content-Type", "application/json")
  894. // get params
  895. var params = mux.Vars(r)
  896. clientid := params["clientid"]
  897. network := params["network"]
  898. extclient, err := logic.GetExtClient(clientid, network)
  899. if err != nil {
  900. err = errors.New("Could not delete extclient " + params["clientid"])
  901. logger.Log(0, r.Header.Get("user"),
  902. fmt.Sprintf("failed to get extclient [%s],network [%s]: %v", clientid, network, err))
  903. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  904. return
  905. }
  906. ingressnode, err := logic.GetNodeByID(extclient.IngressGatewayID)
  907. if err != nil {
  908. logger.Log(
  909. 0,
  910. r.Header.Get("user"),
  911. fmt.Sprintf(
  912. "failed to get ingress gateway node [%s] info: %v",
  913. extclient.IngressGatewayID,
  914. err,
  915. ),
  916. )
  917. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  918. return
  919. }
  920. err = logic.DeleteExtClientAndCleanup(extclient)
  921. if err != nil {
  922. slog.Error("deleteExtClient: ", "Error", err.Error())
  923. err = errors.New("Could not delete extclient " + params["clientid"])
  924. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  925. return
  926. }
  927. go func() {
  928. if err := mq.PublishDeletedClientPeerUpdate(&extclient); err != nil {
  929. slog.Error("error setting ext peers on " + ingressnode.ID.String() + ": " + err.Error())
  930. }
  931. if servercfg.IsDNSMode() {
  932. logic.SetDNS()
  933. }
  934. }()
  935. logger.Log(0, r.Header.Get("user"),
  936. "Deleted extclient client", params["clientid"], "from network", params["network"])
  937. logic.ReturnSuccessResponse(w, r, params["clientid"]+" deleted.")
  938. }
  939. // validateCustomExtClient Validates the extclient object
  940. func validateCustomExtClient(customExtClient *models.CustomExtClient, checkID bool) error {
  941. v := validator.New()
  942. err := v.Struct(customExtClient)
  943. if err != nil {
  944. return err
  945. }
  946. //validate clientid
  947. if customExtClient.ClientID != "" {
  948. if err := isValid(customExtClient.ClientID, checkID); err != nil {
  949. return fmt.Errorf("client validation: %v", err)
  950. }
  951. }
  952. //extclient.ClientID = customExtClient.ClientID
  953. if len(customExtClient.PublicKey) > 0 {
  954. if _, err := wgtypes.ParseKey(customExtClient.PublicKey); err != nil {
  955. return errInvalidExtClientPubKey
  956. }
  957. //extclient.PublicKey = customExtClient.PublicKey
  958. }
  959. //validate extra ips
  960. if len(customExtClient.ExtraAllowedIPs) > 0 {
  961. for _, ip := range customExtClient.ExtraAllowedIPs {
  962. if _, _, err := net.ParseCIDR(ip); err != nil {
  963. return errInvalidExtClientExtraIP
  964. }
  965. }
  966. //extclient.ExtraAllowedIPs = customExtClient.ExtraAllowedIPs
  967. }
  968. //validate DNS
  969. if customExtClient.DNS != "" {
  970. if ip := net.ParseIP(customExtClient.DNS); ip == nil {
  971. return errInvalidExtClientDNS
  972. }
  973. //extclient.DNS = customExtClient.DNS
  974. }
  975. return nil
  976. }
  977. // isValid Checks if the clientid is valid
  978. func isValid(clientid string, checkID bool) error {
  979. if !validName(clientid) {
  980. return errInvalidExtClientID
  981. }
  982. if checkID {
  983. extclients, err := logic.GetAllExtClients()
  984. if err != nil {
  985. return fmt.Errorf("extclients isValid: %v", err)
  986. }
  987. for _, extclient := range extclients {
  988. if clientid == extclient.ClientID {
  989. return errDuplicateExtClientName
  990. }
  991. }
  992. }
  993. return nil
  994. }