| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759 | package logicimport (	"context"	"errors"	"fmt"	"maps"	"net"	"github.com/gravitl/netmaker/db"	"github.com/gravitl/netmaker/logic"	"github.com/gravitl/netmaker/models"	"github.com/gravitl/netmaker/schema")func GetFwRulesForUserNodesOnGw(node models.Node, nodes []models.Node) (rules []models.FwRule) {	defaultUserPolicy, _ := logic.GetDefaultPolicy(models.NetworkID(node.Network), models.UserPolicy)	userNodes := logic.GetStaticUserNodesByNetwork(models.NetworkID(node.Network))	for _, userNodeI := range userNodes {		for _, peer := range nodes {			if peer.IsUserNode {				continue			}			if ok, allowedPolicies := IsUserAllowedToCommunicate(userNodeI.StaticNode.OwnerID, peer); ok {				if peer.IsStatic {					peer = peer.StaticNode.ConvertToStaticNode()				}				if !defaultUserPolicy.Enabled {					for _, policy := range allowedPolicies {						if userNodeI.StaticNode.Address != "" {							rules = append(rules, models.FwRule{								SrcIP: userNodeI.StaticNode.AddressIPNet4(),								DstIP: net.IPNet{									IP:   peer.Address.IP,									Mask: net.CIDRMask(32, 32),								},								AllowedProtocol: policy.Proto,								AllowedPorts:    policy.Port,								Allow:           true,							})						}						if userNodeI.StaticNode.Address6 != "" {							rules = append(rules, models.FwRule{								SrcIP: userNodeI.StaticNode.AddressIPNet6(),								DstIP: net.IPNet{									IP:   peer.Address6.IP,									Mask: net.CIDRMask(128, 128),								},								AllowedProtocol: policy.Proto,								AllowedPorts:    policy.Port,								Allow:           true,							})						}						// add egress ranges						for _, dstI := range policy.Dst {							if dstI.ID == models.EgressID {								e := schema.Egress{ID: dstI.Value}								err := e.Get(db.WithContext(context.TODO()))								if err != nil {									continue								}								dstI.Value = e.Range								ip, cidr, err := net.ParseCIDR(dstI.Value)								if err == nil {									if ip.To4() != nil && userNodeI.StaticNode.Address != "" {										rules = append(rules, models.FwRule{											SrcIP:           userNodeI.StaticNode.AddressIPNet4(),											DstIP:           *cidr,											AllowedProtocol: policy.Proto,											AllowedPorts:    policy.Port,											Allow:           true,										})									} else if ip.To16() != nil && userNodeI.StaticNode.Address6 != "" {										rules = append(rules, models.FwRule{											SrcIP:           userNodeI.StaticNode.AddressIPNet6(),											DstIP:           *cidr,											AllowedProtocol: policy.Proto,											AllowedPorts:    policy.Port,											Allow:           true,										})									}								}							}						}					}				}			}		}	}	return}func GetFwRulesForNodeAndPeerOnGw(node, peer models.Node, allowedPolicies []models.Acl) (rules []models.FwRule) {	for _, policy := range allowedPolicies {		// if static peer dst rule not for ingress node -> skip		if node.Address.IP != nil {			rules = append(rules, models.FwRule{				SrcIP: net.IPNet{					IP:   node.Address.IP,					Mask: net.CIDRMask(32, 32),				},				DstIP: net.IPNet{					IP:   peer.Address.IP,					Mask: net.CIDRMask(32, 32),				},				AllowedProtocol: policy.Proto,				AllowedPorts:    policy.Port,				Allow:           true,			})		}		if node.Address6.IP != nil {			rules = append(rules, models.FwRule{				SrcIP: net.IPNet{					IP:   node.Address6.IP,					Mask: net.CIDRMask(128, 128),				},				DstIP: net.IPNet{					IP:   peer.Address6.IP,					Mask: net.CIDRMask(128, 128),				},				AllowedProtocol: policy.Proto,				AllowedPorts:    policy.Port,				Allow:           true,			})		}		if policy.AllowedDirection == models.TrafficDirectionBi {			if node.Address.IP != nil {				rules = append(rules, models.FwRule{					SrcIP: net.IPNet{						IP:   peer.Address.IP,						Mask: net.CIDRMask(32, 32),					},					DstIP: net.IPNet{						IP:   node.Address.IP,						Mask: net.CIDRMask(32, 32),					},					AllowedProtocol: policy.Proto,					AllowedPorts:    policy.Port,					Allow:           true,				})			}			if node.Address6.IP != nil {				rules = append(rules, models.FwRule{					SrcIP: net.IPNet{						IP:   peer.Address6.IP,						Mask: net.CIDRMask(128, 128),					},					DstIP: net.IPNet{						IP:   node.Address6.IP,						Mask: net.CIDRMask(128, 128),					},					AllowedProtocol: policy.Proto,					AllowedPorts:    policy.Port,					Allow:           true,				})			}		}		if len(node.StaticNode.ExtraAllowedIPs) > 0 {			for _, additionalAllowedIPNet := range node.StaticNode.ExtraAllowedIPs {				_, ipNet, err := net.ParseCIDR(additionalAllowedIPNet)				if err != nil {					continue				}				if ipNet.IP.To4() != nil && peer.Address.IP != nil {					rules = append(rules, models.FwRule{						SrcIP: net.IPNet{							IP:   peer.Address.IP,							Mask: net.CIDRMask(32, 32),						},						DstIP: *ipNet,						Allow: true,					})				} else if peer.Address6.IP != nil {					rules = append(rules, models.FwRule{						SrcIP: net.IPNet{							IP:   peer.Address6.IP,							Mask: net.CIDRMask(128, 128),						},						DstIP: *ipNet,						Allow: true,					})				}			}		}		if len(peer.StaticNode.ExtraAllowedIPs) > 0 {			for _, additionalAllowedIPNet := range peer.StaticNode.ExtraAllowedIPs {				_, ipNet, err := net.ParseCIDR(additionalAllowedIPNet)				if err != nil {					continue				}				if ipNet.IP.To4() != nil && node.Address.IP != nil {					rules = append(rules, models.FwRule{						SrcIP: net.IPNet{							IP:   node.Address.IP,							Mask: net.CIDRMask(32, 32),						},						DstIP: *ipNet,						Allow: true,					})				} else if node.Address6.IP != nil {					rules = append(rules, models.FwRule{						SrcIP: net.IPNet{							IP:   node.Address6.IP,							Mask: net.CIDRMask(128, 128),						},						DstIP: *ipNet,						Allow: true,					})				}			}		}		// add egress range rules		for _, dstI := range policy.Dst {			if dstI.ID == models.EgressID {				e := schema.Egress{ID: dstI.Value}				err := e.Get(db.WithContext(context.TODO()))				if err != nil {					continue				}				dstI.Value = e.Range				ip, cidr, err := net.ParseCIDR(dstI.Value)				if err == nil {					if ip.To4() != nil {						if node.Address.IP != nil {							rules = append(rules, models.FwRule{								SrcIP: net.IPNet{									IP:   node.Address.IP,									Mask: net.CIDRMask(32, 32),								},								DstIP:           *cidr,								AllowedProtocol: policy.Proto,								AllowedPorts:    policy.Port,								Allow:           true,							})						}					} else {						if node.Address6.IP != nil {							rules = append(rules, models.FwRule{								SrcIP: net.IPNet{									IP:   node.Address6.IP,									Mask: net.CIDRMask(128, 128),								},								DstIP:           *cidr,								AllowedProtocol: policy.Proto,								AllowedPorts:    policy.Port,								Allow:           true,							})						}					}				}			}		}	}	return}func checkIfAclTagisValid(a models.Acl, t models.AclPolicyTag, isSrc bool) (err error) {	switch t.ID {	case models.NodeTagID:		if a.RuleType == models.UserPolicy && isSrc {			return errors.New("user policy source mismatch")		}		// check if tag is valid		_, err := GetTag(models.TagID(t.Value))		if err != nil {			return errors.New("invalid tag " + t.Value)		}	case models.NodeID:		if a.RuleType == models.UserPolicy && isSrc {			return errors.New("user policy source mismatch")		}		_, nodeErr := logic.GetNodeByID(t.Value)		if nodeErr != nil {			_, staticNodeErr := logic.GetExtClient(t.Value, a.NetworkID.String())			if staticNodeErr != nil {				return errors.New("invalid node " + t.Value)			}		}	case models.EgressID, models.EgressRange:		e := schema.Egress{			ID: t.Value,		}		err := e.Get(db.WithContext(context.TODO()))		if err != nil {			return errors.New("invalid egress")		}	case models.UserAclID:		if a.RuleType == models.DevicePolicy {			return errors.New("device policy source mismatch")		}		if !isSrc {			return errors.New("user cannot be added to destination")		}		_, err := logic.GetUser(t.Value)		if err != nil {			return errors.New("invalid user " + t.Value)		}	case models.UserGroupAclID:		if a.RuleType == models.DevicePolicy {			return errors.New("device policy source mismatch")		}		if !isSrc {			return errors.New("user cannot be added to destination")		}		err := IsGroupValid(models.UserGroupID(t.Value))		if err != nil {			return errors.New("invalid user group " + t.Value)		}		// check if group belongs to this network		netGrps := GetUserGroupsInNetwork(a.NetworkID)		if _, ok := netGrps[models.UserGroupID(t.Value)]; !ok {			return errors.New("invalid user group " + t.Value)		}	default:		return errors.New("invalid policy")	}	return nil}// IsAclPolicyValid - validates if acl policy is validfunc IsAclPolicyValid(acl models.Acl) (err error) {	//check if src and dst are valid	if acl.AllowedDirection != models.TrafficDirectionBi &&		acl.AllowedDirection != models.TrafficDirectionUni {		return errors.New("invalid traffic direction")	}	switch acl.RuleType {	case models.UserPolicy:		// src list should only contain users		for _, srcI := range acl.Src {			if srcI.Value == "*" {				continue			}			// check if user group is valid			if err = checkIfAclTagisValid(acl, srcI, true); err != nil {				return			}		}		for _, dstI := range acl.Dst {			if dstI.Value == "*" {				continue			}			// check if user group is valid			if err = checkIfAclTagisValid(acl, dstI, false); err != nil {				return			}		}	case models.DevicePolicy:		for _, srcI := range acl.Src {			if srcI.Value == "*" {				continue			}			// check if user group is valid			if err = checkIfAclTagisValid(acl, srcI, true); err != nil {				return err			}		}		for _, dstI := range acl.Dst {			if dstI.Value == "*" {				continue			}			// check if user group is valid			if err = checkIfAclTagisValid(acl, dstI, false); err != nil {				return			}		}	}	return nil}// ListUserPolicies - lists all acl policies enforced on an userfunc ListUserPolicies(u models.User) []models.Acl {	allAcls := logic.ListAcls()	userAcls := []models.Acl{}	for _, acl := range allAcls {		if acl.RuleType == models.UserPolicy {			srcMap := logic.ConvAclTagToValueMap(acl.Src)			if _, ok := srcMap[u.UserName]; ok {				userAcls = append(userAcls, acl)			} else {				// check for user groups				for gID := range u.UserGroups {					if _, ok := srcMap[gID.String()]; ok {						userAcls = append(userAcls, acl)						break					}				}			}		}	}	return userAcls}// listPoliciesOfUser - lists all user acl policies applied to user in an networkfunc listPoliciesOfUser(user models.User, netID models.NetworkID) []models.Acl {	allAcls := logic.ListAcls()	userAcls := []models.Acl{}	for _, acl := range allAcls {		if acl.NetworkID == netID && acl.RuleType == models.UserPolicy {			srcMap := logic.ConvAclTagToValueMap(acl.Src)			if _, ok := srcMap[user.UserName]; ok {				userAcls = append(userAcls, acl)				continue			}			for netRole := range user.NetworkRoles {				if _, ok := srcMap[netRole.String()]; ok {					userAcls = append(userAcls, acl)					continue				}			}			for userG := range user.UserGroups {				if _, ok := srcMap[userG.String()]; ok {					userAcls = append(userAcls, acl)					continue				}			}		}	}	return userAcls}// listUserPolicies - lists all user policies in a networkfunc listUserPolicies(netID models.NetworkID) []models.Acl {	allAcls := logic.ListAcls()	deviceAcls := []models.Acl{}	for _, acl := range allAcls {		if acl.NetworkID == netID && acl.RuleType == models.UserPolicy {			deviceAcls = append(deviceAcls, acl)		}	}	return deviceAcls}// IsUserAllowedToCommunicate - check if user is allowed to communicate with peerfunc IsUserAllowedToCommunicate(userName string, peer models.Node) (bool, []models.Acl) {	var peerId string	if peer.IsStatic {		peerId = peer.StaticNode.ClientID		peer = peer.StaticNode.ConvertToStaticNode()	} else {		peerId = peer.ID.String()	}	var peerTags map[models.TagID]struct{}	if peer.Mutex != nil {		peer.Mutex.Lock()		peerTags = maps.Clone(peer.Tags)		peer.Mutex.Unlock()	} else {		peerTags = peer.Tags	}	if peerTags == nil {		peerTags = make(map[models.TagID]struct{})	}	peerTags[models.TagID(peerId)] = struct{}{}	peerTags[models.TagID("*")] = struct{}{}	acl, _ := logic.GetDefaultPolicy(models.NetworkID(peer.Network), models.UserPolicy)	if acl.Enabled {		return true, []models.Acl{acl}	}	user, err := logic.GetUser(userName)	if err != nil {		return false, []models.Acl{}	}	allowedPolicies := []models.Acl{}	policies := listPoliciesOfUser(*user, models.NetworkID(peer.Network))	for _, policy := range policies {		if !policy.Enabled {			continue		}		dstMap := logic.ConvAclTagToValueMap(policy.Dst)		for _, dst := range policy.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeID := range e.Nodes {						dstMap[nodeID] = struct{}{}					}				}			}		}		if _, ok := dstMap["*"]; ok {			allowedPolicies = append(allowedPolicies, policy)			continue		}		if _, ok := dstMap[peer.ID.String()]; ok {			allowedPolicies = append(allowedPolicies, policy)			continue		}		for tagID := range peerTags {			if _, ok := dstMap[tagID.String()]; ok {				allowedPolicies = append(allowedPolicies, policy)				break			}		}	}	if len(allowedPolicies) > 0 {		return true, allowedPolicies	}	return false, []models.Acl{}}// IsPeerAllowed - checks if peer needs to be added to the interfacefunc IsPeerAllowed(node, peer models.Node, checkDefaultPolicy bool) bool {	var nodeId, peerId string	// if peer.IsFailOver && node.FailedOverBy != uuid.Nil && node.FailedOverBy == peer.ID {	// 	return true	// }	// if node.IsFailOver && peer.FailedOverBy != uuid.Nil && peer.FailedOverBy == node.ID {	// 	return true	// }	// if node.IsGw && peer.IsRelayed && peer.RelayedBy == node.ID.String() {	// 	return true	// }	// if peer.IsGw && node.IsRelayed && node.RelayedBy == peer.ID.String() {	// 	return true	// }	if node.IsStatic {		nodeId = node.StaticNode.ClientID		node = node.StaticNode.ConvertToStaticNode()	} else {		nodeId = node.ID.String()	}	if peer.IsStatic {		peerId = peer.StaticNode.ClientID		peer = peer.StaticNode.ConvertToStaticNode()	} else {		peerId = peer.ID.String()	}	var nodeTags, peerTags map[models.TagID]struct{}	if node.Mutex != nil {		node.Mutex.Lock()		nodeTags = maps.Clone(node.Tags)		node.Mutex.Unlock()	} else {		nodeTags = node.Tags	}	if peer.Mutex != nil {		peer.Mutex.Lock()		peerTags = maps.Clone(peer.Tags)		peer.Mutex.Unlock()	} else {		peerTags = peer.Tags	}	if nodeTags == nil {		nodeTags = make(map[models.TagID]struct{})	}	if peerTags == nil {		peerTags = make(map[models.TagID]struct{})	}	nodeTags[models.TagID(nodeId)] = struct{}{}	peerTags[models.TagID(peerId)] = struct{}{}	if checkDefaultPolicy {		// check default policy if all allowed return true		defaultPolicy, err := logic.GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)		if err == nil {			if defaultPolicy.Enabled {				return true			}		}	}	// list device policies	policies := logic.ListDevicePolicies(models.NetworkID(peer.Network))	srcMap := make(map[string]struct{})	dstMap := make(map[string]struct{})	defer func() {		srcMap = nil		dstMap = nil	}()	for _, policy := range policies {		if !policy.Enabled {			continue		}		srcMap = logic.ConvAclTagToValueMap(policy.Src)		dstMap = logic.ConvAclTagToValueMap(policy.Dst)		for _, dst := range policy.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeID := range e.Nodes {						dstMap[nodeID] = struct{}{}					}				}			}		}		if logic.CheckTagGroupPolicy(srcMap, dstMap, node, peer, nodeTags, peerTags) {			return true		}	}	return false}func RemoveUserFromAclPolicy(userName string) {	acls := logic.ListAcls()	for _, acl := range acls {		delete := false		update := false		if acl.RuleType == models.UserPolicy {			for i := len(acl.Src) - 1; i >= 0; i-- {				if acl.Src[i].ID == models.UserAclID && acl.Src[i].Value == userName {					if len(acl.Src) == 1 {						// delete policy						delete = true						break					} else {						acl.Src = append(acl.Src[:i], acl.Src[i+1:]...)						update = true					}				}			}			if delete {				logic.DeleteAcl(acl)				continue			}			if update {				logic.UpsertAcl(acl)			}		}	}}// IsNodeAllowedToCommunicate - check node is allowed to communicate with the peer // ADD ALLOWED DIRECTION - 0 => node -> peer, 1 => peer-> node,func IsNodeAllowedToCommunicate(node, peer models.Node, checkDefaultPolicy bool) (bool, []models.Acl) {	var nodeId, peerId string	// if peer.IsFailOver && node.FailedOverBy != uuid.Nil && node.FailedOverBy == peer.ID {	// 	return true, []models.Acl{}	// }	// if node.IsFailOver && peer.FailedOverBy != uuid.Nil && peer.FailedOverBy == node.ID {	// 	return true, []models.Acl{}	// }	// if node.IsGw && peer.IsRelayed && peer.RelayedBy == node.ID.String() {	// 	return true, []models.Acl{}	// }	// if peer.IsGw && node.IsRelayed && node.RelayedBy == peer.ID.String() {	// 	return true, []models.Acl{}	// }	if node.IsStatic {		nodeId = node.StaticNode.ClientID		node = node.StaticNode.ConvertToStaticNode()	} else {		nodeId = node.ID.String()	}	if peer.IsStatic {		peerId = peer.StaticNode.ClientID		peer = peer.StaticNode.ConvertToStaticNode()	} else {		peerId = peer.ID.String()	}	var nodeTags, peerTags map[models.TagID]struct{}	if node.Mutex != nil {		node.Mutex.Lock()		nodeTags = maps.Clone(node.Tags)		node.Mutex.Unlock()	} else {		nodeTags = node.Tags	}	if peer.Mutex != nil {		peer.Mutex.Lock()		peerTags = maps.Clone(peer.Tags)		peer.Mutex.Unlock()	} else {		peerTags = peer.Tags	}	if nodeTags == nil {		nodeTags = make(map[models.TagID]struct{})	}	if peerTags == nil {		peerTags = make(map[models.TagID]struct{})	}	nodeTags[models.TagID(nodeId)] = struct{}{}	peerTags[models.TagID(peerId)] = struct{}{}	if checkDefaultPolicy {		// check default policy if all allowed return true		defaultPolicy, err := logic.GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)		if err == nil {			if defaultPolicy.Enabled {				return true, []models.Acl{defaultPolicy}			}		}	}	allowedPolicies := []models.Acl{}	defer func() {		allowedPolicies = logic.UniquePolicies(allowedPolicies)	}()	// list device policies	policies := logic.ListDevicePolicies(models.NetworkID(peer.Network))	srcMap := make(map[string]struct{})	dstMap := make(map[string]struct{})	defer func() {		srcMap = nil		dstMap = nil	}()	for _, policy := range policies {		if !policy.Enabled {			continue		}		allowed := false		srcMap = logic.ConvAclTagToValueMap(policy.Src)		dstMap = logic.ConvAclTagToValueMap(policy.Dst)		for _, dst := range policy.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeID := range e.Nodes {						dstMap[nodeID] = struct{}{}					}				}			}		}		_, srcAll := srcMap["*"]		_, dstAll := dstMap["*"]		if policy.AllowedDirection == models.TrafficDirectionBi {			if _, ok := srcMap[nodeId]; ok || srcAll {				if _, ok := dstMap[peerId]; ok || dstAll {					allowedPolicies = append(allowedPolicies, policy)					continue				}			}			if _, ok := dstMap[nodeId]; ok || dstAll {				if _, ok := srcMap[peerId]; ok || srcAll {					allowedPolicies = append(allowedPolicies, policy)					continue				}			}		}		if _, ok := dstMap[peerId]; ok || dstAll {			if _, ok := srcMap[nodeId]; ok || srcAll {				allowedPolicies = append(allowedPolicies, policy)				continue			}		}		if policy.AllowedDirection == models.TrafficDirectionBi {			for tagID := range nodeTags {				if _, ok := dstMap[tagID.String()]; ok || dstAll {					if srcAll {						allowed = true						break					}					for tagID := range peerTags {						if _, ok := srcMap[tagID.String()]; ok {							allowed = true							break						}					}				}				if allowed {					allowedPolicies = append(allowedPolicies, policy)					break				}				if _, ok := srcMap[tagID.String()]; ok || srcAll {					if dstAll {						allowed = true						break					}					for tagID := range peerTags {						if _, ok := dstMap[tagID.String()]; ok {							allowed = true							break						}					}				}				if allowed {					break				}			}			if allowed {				allowedPolicies = append(allowedPolicies, policy)				continue			}		}		for tagID := range peerTags {			if _, ok := dstMap[tagID.String()]; ok || dstAll {				if srcAll {					allowed = true					break				}				for tagID := range nodeTags {					if _, ok := srcMap[tagID.String()]; ok {						allowed = true						break					}				}			}			if allowed {				break			}		}		if allowed {			allowedPolicies = append(allowedPolicies, policy)		}	}	if len(allowedPolicies) > 0 {		return true, allowedPolicies	}	return false, allowedPolicies}// UpdateDeviceTag - updates device tag on acl policiesfunc UpdateDeviceTag(OldID, newID models.TagID, netID models.NetworkID) {	acls := logic.ListDevicePolicies(netID)	update := false	for _, acl := range acls {		for i, srcTagI := range acl.Src {			if srcTagI.ID == models.NodeTagID {				if OldID.String() == srcTagI.Value {					acl.Src[i].Value = newID.String()					update = true				}			}		}		for i, dstTagI := range acl.Dst {			if dstTagI.ID == models.NodeTagID {				if OldID.String() == dstTagI.Value {					acl.Dst[i].Value = newID.String()					update = true				}			}		}		if update {			logic.UpsertAcl(acl)		}	}}func CheckIfTagAsActivePolicy(tagID models.TagID, netID models.NetworkID) bool {	acls := logic.ListDevicePolicies(netID)	for _, acl := range acls {		for _, srcTagI := range acl.Src {			if srcTagI.ID == models.NodeTagID {				if tagID.String() == srcTagI.Value {					return true				}			}		}		for _, dstTagI := range acl.Dst {			if dstTagI.ID == models.NodeTagID {				if tagID.String() == dstTagI.Value {					return true				}			}		}	}	return false}// RemoveDeviceTagFromAclPolicies - remove device tag from acl policiesfunc RemoveDeviceTagFromAclPolicies(tagID models.TagID, netID models.NetworkID) error {	acls := logic.ListDevicePolicies(netID)	update := false	for _, acl := range acls {		for i := len(acl.Src) - 1; i >= 0; i-- {			if acl.Src[i].ID == models.NodeTagID {				if tagID.String() == acl.Src[i].Value {					acl.Src = append(acl.Src[:i], acl.Src[i+1:]...)					update = true				}			}		}		for i := len(acl.Dst) - 1; i >= 0; i-- {			if acl.Dst[i].ID == models.NodeTagID {				if tagID.String() == acl.Dst[i].Value {					acl.Dst = append(acl.Dst[:i], acl.Dst[i+1:]...)					update = true				}			}		}		if update {			logic.UpsertAcl(acl)		}	}	return nil}func getEgressUserRulesForNode(targetnode *models.Node,	rules map[string]models.AclRule) map[string]models.AclRule {	userNodes := logic.GetStaticUserNodesByNetwork(models.NetworkID(targetnode.Network))	userGrpMap := GetUserGrpMap()	allowedUsers := make(map[string][]models.Acl)	acls := listUserPolicies(models.NetworkID(targetnode.Network))	var targetNodeTags = make(map[models.TagID]struct{})	targetNodeTags["*"] = struct{}{}	egs, _ := (&schema.Egress{Network: targetnode.Network}).ListByNetwork(db.WithContext(context.TODO()))	if len(egs) == 0 {		return rules	}	for _, egI := range egs {		if !egI.Status {			continue		}		if _, ok := egI.Nodes[targetnode.ID.String()]; ok {			targetNodeTags[models.TagID(egI.Range)] = struct{}{}			targetNodeTags[models.TagID(egI.ID)] = struct{}{}		}	}	for _, acl := range acls {		if !acl.Enabled {			continue		}		dstTags := logic.ConvAclTagToValueMap(acl.Dst)		for _, dst := range acl.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeID := range e.Nodes {						dstTags[nodeID] = struct{}{}					}					dstTags[e.Range] = struct{}{}				}			}		}		_, all := dstTags["*"]		addUsers := false		if !all {			for nodeTag := range targetNodeTags {				if _, ok := dstTags[nodeTag.String()]; ok {					addUsers = true					break				}			}		} else {			addUsers = true		}		if addUsers {			// get all src tags			for _, srcAcl := range acl.Src {				if srcAcl.ID == models.UserAclID {					allowedUsers[srcAcl.Value] = append(allowedUsers[srcAcl.Value], acl)				} else if srcAcl.ID == models.UserGroupAclID {					// fetch all users in the group					if usersMap, ok := userGrpMap[models.UserGroupID(srcAcl.Value)]; ok {						for userName := range usersMap {							allowedUsers[userName] = append(allowedUsers[userName], acl)						}					}				}			}		}	}	for _, userNode := range userNodes {		if !userNode.StaticNode.Enabled {			continue		}		acls, ok := allowedUsers[userNode.StaticNode.OwnerID]		if !ok {			continue		}		for _, acl := range acls {			if !acl.Enabled {				continue			}			r := models.AclRule{				ID:              acl.ID,				AllowedProtocol: acl.Proto,				AllowedPorts:    acl.Port,				Direction:       acl.AllowedDirection,				Allowed:         true,			}			// Get peers in the tags and add allowed rules			if userNode.StaticNode.Address != "" {				r.IPList = append(r.IPList, userNode.StaticNode.AddressIPNet4())			}			if userNode.StaticNode.Address6 != "" {				r.IP6List = append(r.IP6List, userNode.StaticNode.AddressIPNet6())			}			for _, dstI := range acl.Dst {				if dstI.ID == models.EgressID {					e := schema.Egress{ID: dstI.Value}					err := e.Get(db.WithContext(context.TODO()))					if err != nil {						continue					}					ip, cidr, err := net.ParseCIDR(e.Range)					if err == nil {						if ip.To4() != nil {							r.Dst = append(r.Dst, *cidr)						} else {							r.Dst6 = append(r.Dst6, *cidr)						}					}				}			}			if aclRule, ok := rules[acl.ID]; ok {				aclRule.IPList = append(aclRule.IPList, r.IPList...)				aclRule.IP6List = append(aclRule.IP6List, r.IP6List...)				rules[acl.ID] = aclRule			} else {				rules[acl.ID] = r			}		}	}	return rules}func getUserAclRulesForNode(targetnode *models.Node,	rules map[string]models.AclRule) map[string]models.AclRule {	userNodes := logic.GetStaticUserNodesByNetwork(models.NetworkID(targetnode.Network))	userGrpMap := GetUserGrpMap()	allowedUsers := make(map[string][]models.Acl)	acls := listUserPolicies(models.NetworkID(targetnode.Network))	var targetNodeTags = make(map[models.TagID]struct{})	if targetnode.Mutex != nil {		targetnode.Mutex.Lock()		targetNodeTags = maps.Clone(targetnode.Tags)		targetnode.Mutex.Unlock()	} else {		targetNodeTags = maps.Clone(targetnode.Tags)	}	if targetNodeTags == nil {		targetNodeTags = make(map[models.TagID]struct{})	}	targetNodeTags[models.TagID(targetnode.ID.String())] = struct{}{}	for _, acl := range acls {		if !acl.Enabled {			continue		}		dstTags := logic.ConvAclTagToValueMap(acl.Dst)		_, all := dstTags["*"]		addUsers := false		if !all {			for nodeTag := range targetNodeTags {				if _, ok := dstTags[nodeTag.String()]; ok {					addUsers = true					break				}			}		} else {			addUsers = true		}		if addUsers {			// get all src tags			for _, srcAcl := range acl.Src {				if srcAcl.ID == models.UserAclID {					allowedUsers[srcAcl.Value] = append(allowedUsers[srcAcl.Value], acl)				} else if srcAcl.ID == models.UserGroupAclID {					// fetch all users in the group					if usersMap, ok := userGrpMap[models.UserGroupID(srcAcl.Value)]; ok {						for userName := range usersMap {							allowedUsers[userName] = append(allowedUsers[userName], acl)						}					}				}			}		}	}	for _, userNode := range userNodes {		if !userNode.StaticNode.Enabled {			continue		}		acls, ok := allowedUsers[userNode.StaticNode.OwnerID]		if !ok {			continue		}		for _, acl := range acls {			if !acl.Enabled {				continue			}			r := models.AclRule{				ID:              acl.ID,				AllowedProtocol: acl.Proto,				AllowedPorts:    acl.Port,				Direction:       acl.AllowedDirection,				Allowed:         true,			}			// Get peers in the tags and add allowed rules			if userNode.StaticNode.Address != "" {				r.IPList = append(r.IPList, userNode.StaticNode.AddressIPNet4())			}			if userNode.StaticNode.Address6 != "" {				r.IP6List = append(r.IP6List, userNode.StaticNode.AddressIPNet6())			}			if aclRule, ok := rules[acl.ID]; ok {				aclRule.IPList = append(aclRule.IPList, r.IPList...)				aclRule.IP6List = append(aclRule.IP6List, r.IP6List...)				aclRule.IPList = logic.UniqueIPNetList(aclRule.IPList)				aclRule.IP6List = logic.UniqueIPNetList(aclRule.IP6List)				rules[acl.ID] = aclRule			} else {				r.IPList = logic.UniqueIPNetList(r.IPList)				r.IP6List = logic.UniqueIPNetList(r.IP6List)				rules[acl.ID] = r			}		}	}	return rules}func CheckIfAnyActiveEgressPolicy(targetNode models.Node, acls []models.Acl) bool {	if !targetNode.EgressDetails.IsEgressGateway {		return false	}	var targetNodeTags = make(map[models.TagID]struct{})	if targetNode.Mutex != nil {		targetNode.Mutex.Lock()		targetNodeTags = maps.Clone(targetNode.Tags)		targetNode.Mutex.Unlock()	} else {		targetNodeTags = maps.Clone(targetNode.Tags)	}	if targetNodeTags == nil {		targetNodeTags = make(map[models.TagID]struct{})	}	targetNodeTags[models.TagID(targetNode.ID.String())] = struct{}{}	targetNodeTags["*"] = struct{}{}	for _, acl := range acls {		if !acl.Enabled {			continue		}		srcTags := logic.ConvAclTagToValueMap(acl.Src)		for _, dst := range acl.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeTag := range targetNodeTags {						if _, ok := srcTags[nodeTag.String()]; ok {							return true						}						if _, ok := srcTags[targetNode.ID.String()]; ok {							return true						}					}				}			}		}	}	return false}func CheckIfAnyPolicyisUniDirectional(targetNode models.Node, acls []models.Acl) bool {	var targetNodeTags = make(map[models.TagID]struct{})	if targetNode.Mutex != nil {		targetNode.Mutex.Lock()		targetNodeTags = maps.Clone(targetNode.Tags)		targetNode.Mutex.Unlock()	} else {		targetNodeTags = maps.Clone(targetNode.Tags)	}	if targetNodeTags == nil {		targetNodeTags = make(map[models.TagID]struct{})	}	targetNodeTags[models.TagID(targetNode.ID.String())] = struct{}{}	targetNodeTags["*"] = struct{}{}	for _, acl := range acls {		if !acl.Enabled {			continue		}		if acl.AllowedDirection == models.TrafficDirectionBi && acl.Proto == models.ALL && acl.ServiceType == models.Any {			continue		}		if acl.Proto != models.ALL || acl.ServiceType != models.Any {			return true		}		srcTags := logic.ConvAclTagToValueMap(acl.Src)		dstTags := logic.ConvAclTagToValueMap(acl.Dst)		for nodeTag := range targetNodeTags {			if acl.RuleType == models.DevicePolicy {				if _, ok := srcTags[nodeTag.String()]; ok {					return true				}				if _, ok := srcTags[targetNode.ID.String()]; ok {					return true				}			}			if _, ok := dstTags[nodeTag.String()]; ok {				return true			}			if _, ok := dstTags[targetNode.ID.String()]; ok {				return true			}		}	}	return false}func GetAclRulesForNode(targetnodeI *models.Node) (rules map[string]models.AclRule) {	targetnode := *targetnodeI	defer func() {		if !targetnode.IsIngressGateway {			rules = getUserAclRulesForNode(&targetnode, rules)		}	}()	rules = make(map[string]models.AclRule)	var taggedNodes map[models.TagID][]models.Node	if targetnode.IsIngressGateway {		taggedNodes = GetTagMapWithNodesByNetwork(models.NetworkID(targetnode.Network), false)	} else {		taggedNodes = GetTagMapWithNodesByNetwork(models.NetworkID(targetnode.Network), true)	}	acls := logic.ListDevicePolicies(models.NetworkID(targetnode.Network))	var targetNodeTags = make(map[models.TagID]struct{})	if targetnode.Mutex != nil {		targetnode.Mutex.Lock()		targetNodeTags = maps.Clone(targetnode.Tags)		targetnode.Mutex.Unlock()	} else {		targetNodeTags = maps.Clone(targetnode.Tags)	}	if targetNodeTags == nil {		targetNodeTags = make(map[models.TagID]struct{})	}	targetNodeTags[models.TagID(targetnode.ID.String())] = struct{}{}	targetNodeTags["*"] = struct{}{}	for _, acl := range acls {		if !acl.Enabled {			continue		}		srcTags := logic.ConvAclTagToValueMap(acl.Src)		dstTags := logic.ConvAclTagToValueMap(acl.Dst)		for _, dst := range acl.Dst {			if dst.ID == models.EgressID {				e := schema.Egress{ID: dst.Value}				err := e.Get(db.WithContext(context.TODO()))				if err == nil && e.Status {					for nodeID := range e.Nodes {						dstTags[nodeID] = struct{}{}					}				}			}		}		_, srcAll := srcTags["*"]		_, dstAll := dstTags["*"]		aclRule := models.AclRule{			ID:              acl.ID,			AllowedProtocol: acl.Proto,			AllowedPorts:    acl.Port,			Direction:       acl.AllowedDirection,			Allowed:         true,		}		for nodeTag := range targetNodeTags {			if acl.AllowedDirection == models.TrafficDirectionBi {				var existsInSrcTag bool				var existsInDstTag bool				if _, ok := srcTags[nodeTag.String()]; ok || srcAll {					existsInSrcTag = true				}				if _, ok := srcTags[targetnode.ID.String()]; ok || srcAll {					existsInSrcTag = true				}				if _, ok := dstTags[nodeTag.String()]; ok || dstAll {					existsInDstTag = true				}				if _, ok := dstTags[targetnode.ID.String()]; ok || dstAll {					existsInDstTag = true				}				if existsInSrcTag /* && !existsInDstTag*/ {					// get all dst tags					for dst := range dstTags {						if dst == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(dst)]						if dst != targetnode.ID.String() {							node, err := logic.GetNodeByID(dst)							if err == nil {								nodes = append(nodes, node)							}						}						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.IsStatic && node.StaticNode.IngressGatewayID == targetnode.ID.String() {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}				if existsInDstTag /*&& !existsInSrcTag*/ {					// get all src tags					for src := range srcTags {						if src == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(src)]						if src != targetnode.ID.String() {							node, err := logic.GetNodeByID(src)							if err == nil {								nodes = append(nodes, node)							}						}						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.IsStatic && node.StaticNode.IngressGatewayID == targetnode.ID.String() {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}				// if existsInDstTag && existsInSrcTag {				// 	nodes := taggedNodes[nodeTag]				// 	for srcID := range srcTags {				// 		if srcID == targetnode.ID.String() {				// 			continue				// 		}				// 		node, err := GetNodeByID(srcID)				// 		if err == nil {				// 			nodes = append(nodes, node)				// 		}				// 	}				// 	for dstID := range dstTags {				// 		if dstID == targetnode.ID.String() {				// 			continue				// 		}				// 		node, err := GetNodeByID(dstID)				// 		if err == nil {				// 			nodes = append(nodes, node)				// 		}				// 	}				// 	for _, node := range nodes {				// 		if node.ID == targetnode.ID {				// 			continue				// 		}				// 		if node.IsStatic && node.StaticNode.IngressGatewayID == targetnode.ID.String() {				// 			continue				// 		}				// 		if node.Address.IP != nil {				// 			aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())				// 		}				// 		if node.Address6.IP != nil {				// 			aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())				// 		}				// 		if node.IsStatic && node.StaticNode.Address != "" {				// 			aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())				// 		}				// 		if node.IsStatic && node.StaticNode.Address6 != "" {				// 			aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())				// 		}				// 	}				// }			} else {				_, all := dstTags["*"]				if _, ok := dstTags[nodeTag.String()]; ok || all {					// get all src tags					for src := range srcTags {						if src == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(src)]						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.IsStatic && node.StaticNode.IngressGatewayID == targetnode.ID.String() {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}			}		}		if len(aclRule.IPList) > 0 || len(aclRule.IP6List) > 0 {			aclRule.IPList = logic.UniqueIPNetList(aclRule.IPList)			aclRule.IP6List = logic.UniqueIPNetList(aclRule.IP6List)			rules[acl.ID] = aclRule		}	}	return rules}func GetAclRuleForInetGw(targetnode models.Node) (rules map[string]models.AclRule) {	rules = make(map[string]models.AclRule)	if targetnode.IsInternetGateway {		aclRule := models.AclRule{			ID:              fmt.Sprintf("%s-inet-gw-internal-rule", targetnode.ID.String()),			AllowedProtocol: models.ALL,			AllowedPorts:    []string{},			Direction:       models.TrafficDirectionBi,			Allowed:         true,		}		if targetnode.NetworkRange.IP != nil {			aclRule.IPList = append(aclRule.IPList, targetnode.NetworkRange)			_, allIpv4, _ := net.ParseCIDR(IPv4Network)			aclRule.Dst = append(aclRule.Dst, *allIpv4)		}		if targetnode.NetworkRange6.IP != nil {			aclRule.IP6List = append(aclRule.IP6List, targetnode.NetworkRange6)			_, allIpv6, _ := net.ParseCIDR(IPv6Network)			aclRule.Dst6 = append(aclRule.Dst6, *allIpv6)		}		rules[aclRule.ID] = aclRule	}	return}func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclRule) {	rules = make(map[string]models.AclRule)	defer func() {		rules = getEgressUserRulesForNode(&targetnode, rules)	}()	taggedNodes := GetTagMapWithNodesByNetwork(models.NetworkID(targetnode.Network), true)	acls := logic.ListDevicePolicies(models.NetworkID(targetnode.Network))	var targetNodeTags = make(map[models.TagID]struct{})	targetNodeTags["*"] = struct{}{}	/*		 if target node is egress gateway			if acl policy has egress route and it is present in target node egress ranges			fetch all the nodes in that policy and add rules	*/	egs, _ := (&schema.Egress{Network: targetnode.Network}).ListByNetwork(db.WithContext(context.TODO()))	if len(egs) == 0 {		return	}	for _, egI := range egs {		if !egI.Status {			continue		}		if _, ok := egI.Nodes[targetnode.ID.String()]; ok {			targetNodeTags[models.TagID(egI.Range)] = struct{}{}			targetNodeTags[models.TagID(egI.ID)] = struct{}{}		}	}	for _, acl := range acls {		if !acl.Enabled {			continue		}		srcTags := logic.ConvAclTagToValueMap(acl.Src)		dstTags := logic.ConvAclTagToValueMap(acl.Dst)		_, srcAll := srcTags["*"]		_, dstAll := dstTags["*"]		aclRule := models.AclRule{			ID:              acl.ID,			AllowedProtocol: acl.Proto,			AllowedPorts:    acl.Port,			Direction:       acl.AllowedDirection,			Allowed:         true,		}		for nodeTag := range targetNodeTags {			if nodeTag != "*" {				ip, cidr, err := net.ParseCIDR(nodeTag.String())				if err == nil {					if ip.To4() != nil {						aclRule.Dst = append(aclRule.Dst, *cidr)					} else {						aclRule.Dst6 = append(aclRule.Dst6, *cidr)					}				}			}			if acl.AllowedDirection == models.TrafficDirectionBi {				var existsInSrcTag bool				var existsInDstTag bool				if _, ok := srcTags[nodeTag.String()]; ok || srcAll {					existsInSrcTag = true				}				if _, ok := dstTags[nodeTag.String()]; ok || dstAll {					existsInDstTag = true				}				// if srcAll || dstAll {				// 	if targetnode.NetworkRange.IP != nil {				// 		aclRule.IPList = append(aclRule.IPList, targetnode.NetworkRange)				// 	}				// 	if targetnode.NetworkRange6.IP != nil {				// 		aclRule.IP6List = append(aclRule.IP6List, targetnode.NetworkRange6)				// 	}				// 	break				// }				if existsInSrcTag && !existsInDstTag {					// get all dst tags					for dst := range dstTags {						if dst == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(dst)]						if dst != targetnode.ID.String() {							node, err := logic.GetNodeByID(dst)							if err == nil {								nodes = append(nodes, node)							}							extclient, err := logic.GetExtClient(dst, targetnode.Network)							if err == nil {								nodes = append(nodes, extclient.ConvertToStaticNode())							}						}						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}				if existsInDstTag && !existsInSrcTag {					// get all src tags					for src := range srcTags {						if src == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(src)]						if src != targetnode.ID.String() {							node, err := logic.GetNodeByID(src)							if err == nil {								nodes = append(nodes, node)							}							extclient, err := logic.GetExtClient(src, targetnode.Network)							if err == nil {								nodes = append(nodes, extclient.ConvertToStaticNode())							}						}						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}				if existsInDstTag && existsInSrcTag {					nodes := taggedNodes[nodeTag]					for srcID := range srcTags {						if srcID == targetnode.ID.String() {							continue						}						node, err := logic.GetNodeByID(srcID)						if err == nil {							nodes = append(nodes, node)						}						extclient, err := logic.GetExtClient(srcID, targetnode.Network)						if err == nil {							nodes = append(nodes, extclient.ConvertToStaticNode())						}					}					for dstID := range dstTags {						if dstID == targetnode.ID.String() {							continue						}						node, err := logic.GetNodeByID(dstID)						if err == nil {							nodes = append(nodes, node)						}						extclient, err := logic.GetExtClient(dstID, targetnode.Network)						if err == nil {							nodes = append(nodes, extclient.ConvertToStaticNode())						}					}					for _, node := range nodes {						if node.ID == targetnode.ID {							continue						}						if node.Address.IP != nil {							aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())						}						if node.Address6.IP != nil {							aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())						}						if node.IsStatic && node.StaticNode.Address != "" {							aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())						}						if node.IsStatic && node.StaticNode.Address6 != "" {							aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())						}					}				}			} else {				if dstAll {					if targetnode.NetworkRange.IP != nil {						aclRule.IPList = append(aclRule.IPList, targetnode.NetworkRange)					}					if targetnode.NetworkRange6.IP != nil {						aclRule.IP6List = append(aclRule.IP6List, targetnode.NetworkRange6)					}					break				}				if _, ok := dstTags[nodeTag.String()]; ok || dstAll {					// get all src tags					for src := range srcTags {						if src == nodeTag.String() {							continue						}						// Get peers in the tags and add allowed rules						nodes := taggedNodes[models.TagID(src)]						for _, node := range nodes {							if node.ID == targetnode.ID {								continue							}							if node.Address.IP != nil {								aclRule.IPList = append(aclRule.IPList, node.AddressIPNet4())							}							if node.Address6.IP != nil {								aclRule.IP6List = append(aclRule.IP6List, node.AddressIPNet6())							}							if node.IsStatic && node.StaticNode.Address != "" {								aclRule.IPList = append(aclRule.IPList, node.StaticNode.AddressIPNet4())							}							if node.IsStatic && node.StaticNode.Address6 != "" {								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())							}						}					}				}			}		}		if len(aclRule.IPList) > 0 || len(aclRule.IP6List) > 0 {			aclRule.IPList = logic.UniqueIPNetList(aclRule.IPList)			aclRule.IP6List = logic.UniqueIPNetList(aclRule.IP6List)			rules[acl.ID] = aclRule		}	}	return}func GetInetClientsFromAclPolicies(eID string) (inetClientIDs []string) {	e := schema.Egress{ID: eID}	err := e.Get(db.WithContext(context.TODO()))	if err != nil || !e.Status {		return	}	acls, _ := logic.ListAclsByNetwork(models.NetworkID(e.Network))	for _, acl := range acls {		for _, dstI := range acl.Dst {			if dstI.ID == models.EgressID {				if dstI.Value != eID {					continue				}				for _, srcI := range acl.Src {					if srcI.Value == "*" {						continue					}					if srcI.ID == models.NodeID {						inetClientIDs = append(inetClientIDs, srcI.Value)					}					if srcI.ID == models.NodeTagID {						inetClientIDs = append(inetClientIDs, GetNodeIDsWithTag(models.TagID(srcI.Value))...)					}				}			}		}	}	return}
 |