migrate.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. package logic
  2. import (
  3. "encoding/json"
  4. "github.com/google/uuid"
  5. "github.com/gravitl/netmaker/database"
  6. "github.com/gravitl/netmaker/logic"
  7. "github.com/gravitl/netmaker/models"
  8. )
  9. func MigrateToUUIDs() {
  10. roles, err := ListNetworkRoles()
  11. if err != nil {
  12. return
  13. }
  14. rolesMapping := make(map[models.UserRoleID]models.UserRoleID)
  15. for _, role := range roles {
  16. if role.Default {
  17. continue
  18. }
  19. _, err := uuid.Parse(string(role.ID))
  20. if err == nil {
  21. // role id is already an uuid, so no need to update
  22. continue
  23. }
  24. oldRoleID := role.ID
  25. role.ID = models.UserRoleID(uuid.NewString())
  26. rolesMapping[oldRoleID] = role.ID
  27. roleBytes, err := json.Marshal(role)
  28. if err != nil {
  29. continue
  30. }
  31. err = database.Insert(role.ID.String(), string(roleBytes), database.USER_PERMISSIONS_TABLE_NAME)
  32. if err != nil {
  33. continue
  34. }
  35. err = database.DeleteRecord(database.USER_PERMISSIONS_TABLE_NAME, oldRoleID.String())
  36. if err != nil {
  37. continue
  38. }
  39. }
  40. groups, err := ListUserGroups()
  41. if err != nil {
  42. return
  43. }
  44. groupsMapping := make(map[models.UserGroupID]models.UserGroupID)
  45. for _, group := range groups {
  46. if group.Default {
  47. continue
  48. }
  49. _, err := uuid.Parse(string(group.ID))
  50. if err == nil {
  51. // group id is already an uuid, so no need to update
  52. continue
  53. }
  54. oldGroupID := group.ID
  55. group.ID = models.UserGroupID(uuid.NewString())
  56. groupsMapping[oldGroupID] = group.ID
  57. var groupPermissions = make(map[models.NetworkID]map[models.UserRoleID]struct{})
  58. for networkID, networkRoles := range group.NetworkRoles {
  59. groupPermissions[networkID] = make(map[models.UserRoleID]struct{})
  60. for roleID := range networkRoles {
  61. newRoleID, ok := rolesMapping[roleID]
  62. if !ok {
  63. groupPermissions[networkID][roleID] = struct{}{}
  64. } else {
  65. groupPermissions[networkID][newRoleID] = struct{}{}
  66. }
  67. }
  68. }
  69. group.NetworkRoles = groupPermissions
  70. groupBytes, err := json.Marshal(group)
  71. if err != nil {
  72. continue
  73. }
  74. err = database.Insert(group.ID.String(), string(groupBytes), database.USER_GROUPS_TABLE_NAME)
  75. if err != nil {
  76. continue
  77. }
  78. err = database.DeleteRecord(database.USER_GROUPS_TABLE_NAME, oldGroupID.String())
  79. if err != nil {
  80. continue
  81. }
  82. }
  83. // if no changes were made, there are no references to be updated.
  84. if len(rolesMapping) == 0 && len(groupsMapping) == 0 {
  85. return
  86. }
  87. users, err := logic.GetUsersDB()
  88. if err != nil {
  89. return
  90. }
  91. for _, user := range users {
  92. userGroups := make(map[models.UserGroupID]struct{})
  93. for groupID := range user.UserGroups {
  94. newGroupID, ok := groupsMapping[groupID]
  95. if !ok {
  96. userGroups[groupID] = struct{}{}
  97. } else {
  98. userGroups[newGroupID] = struct{}{}
  99. }
  100. }
  101. user.UserGroups = userGroups
  102. err = logic.UpsertUser(user)
  103. if err != nil {
  104. continue
  105. }
  106. }
  107. for _, acl := range logic.ListAcls() {
  108. srcList := make([]models.AclPolicyTag, len(acl.Src))
  109. for i, src := range acl.Src {
  110. if src.ID == models.UserGroupAclID {
  111. newGroupID, ok := groupsMapping[models.UserGroupID(src.Value)]
  112. if ok {
  113. src.Value = newGroupID.String()
  114. }
  115. }
  116. srcList[i] = src
  117. }
  118. dstList := make([]models.AclPolicyTag, len(acl.Dst))
  119. for i, dst := range acl.Dst {
  120. if dst.ID == models.UserGroupAclID {
  121. newGroupID, ok := groupsMapping[models.UserGroupID(dst.Value)]
  122. if ok {
  123. dst.Value = newGroupID.String()
  124. }
  125. }
  126. dstList[i] = dst
  127. }
  128. err = logic.UpsertAcl(acl)
  129. if err != nil {
  130. continue
  131. }
  132. }
  133. invites, err := logic.ListUserInvites()
  134. if err != nil {
  135. return
  136. }
  137. for _, invite := range invites {
  138. userGroups := make(map[models.UserGroupID]struct{})
  139. for groupID := range invite.UserGroups {
  140. newGroupID, ok := groupsMapping[groupID]
  141. if !ok {
  142. invite.UserGroups[groupID] = struct{}{}
  143. } else {
  144. invite.UserGroups[newGroupID] = struct{}{}
  145. }
  146. }
  147. invite.UserGroups = userGroups
  148. userPermissions := make(map[models.NetworkID]map[models.UserRoleID]struct{})
  149. for networkID, networkRoles := range invite.NetworkRoles {
  150. userPermissions[networkID] = make(map[models.UserRoleID]struct{})
  151. for roleID := range networkRoles {
  152. newRoleID, ok := rolesMapping[roleID]
  153. if !ok {
  154. userPermissions[networkID][roleID] = struct{}{}
  155. } else {
  156. userPermissions[networkID][newRoleID] = struct{}{}
  157. }
  158. }
  159. }
  160. invite.NetworkRoles = userPermissions
  161. err = logic.InsertUserInvite(invite)
  162. if err != nil {
  163. continue
  164. }
  165. }
  166. }
  167. func MigrateUserRoleAndGroups(user models.User) {
  168. if user.PlatformRoleID == models.AdminRole || user.PlatformRoleID == models.SuperAdminRole {
  169. return
  170. }
  171. if len(user.RemoteGwIDs) > 0 {
  172. // define user roles for network
  173. // assign relevant network role to user
  174. for remoteGwID := range user.RemoteGwIDs {
  175. gwNode, err := logic.GetNodeByID(remoteGwID)
  176. if err != nil {
  177. continue
  178. }
  179. var groupID models.UserGroupID
  180. if user.PlatformRoleID == models.ServiceUser {
  181. groupID = GetDefaultNetworkUserGroupID(models.NetworkID(gwNode.Network))
  182. } else {
  183. groupID = GetDefaultNetworkAdminGroupID(models.NetworkID(gwNode.Network))
  184. }
  185. if err != nil {
  186. continue
  187. }
  188. user.UserGroups[groupID] = struct{}{}
  189. }
  190. }
  191. if len(user.NetworkRoles) > 0 {
  192. for netID, netRoles := range user.NetworkRoles {
  193. var groupID models.UserGroupID
  194. adminAccess := false
  195. for netRoleID := range netRoles {
  196. permTemplate, err := logic.GetRole(netRoleID)
  197. if err == nil {
  198. if permTemplate.FullAccess {
  199. adminAccess = true
  200. }
  201. }
  202. }
  203. if user.PlatformRoleID == models.ServiceUser {
  204. groupID = GetDefaultNetworkUserGroupID(netID)
  205. } else {
  206. if adminAccess {
  207. groupID = GetDefaultNetworkAdminGroupID(netID)
  208. } else {
  209. groupID = GetDefaultNetworkUserGroupID(netID)
  210. }
  211. }
  212. user.UserGroups[groupID] = struct{}{}
  213. user.NetworkRoles = make(map[models.NetworkID]map[models.UserRoleID]struct{})
  214. }
  215. }
  216. logic.UpsertUser(user)
  217. }