egress.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224
  1. package logic
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "maps"
  7. "github.com/gravitl/netmaker/db"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/schema"
  10. )
  11. func ValidateEgressReq(e *schema.Egress) error {
  12. if e.Network == "" {
  13. return errors.New("network id is empty")
  14. }
  15. _, err := GetNetwork(e.Network)
  16. if err != nil {
  17. return errors.New("failed to get network " + err.Error())
  18. }
  19. if len(e.Nodes) > 1 {
  20. return errors.New("can only set one internet routing node")
  21. }
  22. if len(e.Nodes) > 0 {
  23. for k := range e.Nodes {
  24. _, err := GetNodeByID(k)
  25. if err != nil {
  26. return errors.New("invalid routing node " + err.Error())
  27. }
  28. }
  29. }
  30. return nil
  31. }
  32. func DoesNodeHaveAccessToEgress(node *models.Node, e *schema.Egress, acls []models.Acl) bool {
  33. nodeTags := maps.Clone(node.Tags)
  34. nodeTags[models.TagID(node.ID.String())] = struct{}{}
  35. for _, acl := range acls {
  36. if !acl.Enabled {
  37. continue
  38. }
  39. srcVal := ConvAclTagToValueMap(acl.Src)
  40. if acl.AllowedDirection == models.TrafficDirectionBi {
  41. if _, ok := srcVal["*"]; ok {
  42. return true
  43. }
  44. }
  45. for _, dstI := range acl.Dst {
  46. if dstI.ID == models.NodeTagID && dstI.Value == "*" {
  47. return true
  48. }
  49. if dstI.ID == models.EgressID && dstI.Value == e.ID {
  50. e := schema.Egress{ID: dstI.Value}
  51. err := e.Get(db.WithContext(context.TODO()))
  52. if err != nil {
  53. continue
  54. }
  55. if node.IsStatic {
  56. if _, ok := srcVal[node.StaticNode.ClientID]; ok {
  57. return true
  58. }
  59. } else {
  60. if _, ok := srcVal[node.ID.String()]; ok {
  61. return true
  62. }
  63. }
  64. for tagID := range nodeTags {
  65. if _, ok := srcVal[tagID.String()]; ok {
  66. return true
  67. }
  68. }
  69. }
  70. }
  71. }
  72. return false
  73. }
  74. func AddEgressInfoToPeerByAccess(node, targetNode *models.Node, eli []schema.Egress, acls []models.Acl, isDefaultPolicyActive bool) {
  75. req := models.EgressGatewayRequest{
  76. NodeID: targetNode.ID.String(),
  77. NetID: targetNode.Network,
  78. NatEnabled: "yes",
  79. }
  80. for _, e := range eli {
  81. if !e.Status || e.Network != targetNode.Network {
  82. continue
  83. }
  84. if !isDefaultPolicyActive {
  85. if !DoesNodeHaveAccessToEgress(node, &e, acls) {
  86. if node.IsRelayed && node.RelayedBy == targetNode.ID.String() {
  87. if !DoesNodeHaveAccessToEgress(targetNode, &e, acls) {
  88. continue
  89. }
  90. } else {
  91. continue
  92. }
  93. }
  94. }
  95. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  96. m64, err := metric.(json.Number).Int64()
  97. if err != nil {
  98. m64 = 256
  99. }
  100. m := uint32(m64)
  101. req.Ranges = append(req.Ranges, e.Range)
  102. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  103. Network: e.Range,
  104. Nat: e.Nat,
  105. RouteMetric: m,
  106. })
  107. }
  108. }
  109. if targetNode.Mutex != nil {
  110. targetNode.Mutex.Lock()
  111. }
  112. if len(req.Ranges) > 0 {
  113. targetNode.EgressDetails.IsEgressGateway = true
  114. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  115. targetNode.EgressDetails.EgressGatewayRequest = req
  116. } else {
  117. targetNode.EgressDetails = models.EgressDetails{}
  118. }
  119. if targetNode.Mutex != nil {
  120. targetNode.Mutex.Unlock()
  121. }
  122. }
  123. func GetNodeEgressInfo(targetNode *models.Node, eli []schema.Egress, acls []models.Acl) {
  124. req := models.EgressGatewayRequest{
  125. NodeID: targetNode.ID.String(),
  126. NetID: targetNode.Network,
  127. NatEnabled: "yes",
  128. }
  129. for _, e := range eli {
  130. if !e.Status || e.Network != targetNode.Network {
  131. continue
  132. }
  133. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  134. m64, err := metric.(json.Number).Int64()
  135. if err != nil {
  136. m64 = 256
  137. }
  138. m := uint32(m64)
  139. req.Ranges = append(req.Ranges, e.Range)
  140. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  141. Network: e.Range,
  142. Nat: e.Nat,
  143. RouteMetric: m,
  144. })
  145. }
  146. }
  147. if targetNode.Mutex != nil {
  148. targetNode.Mutex.Lock()
  149. }
  150. if len(req.Ranges) > 0 {
  151. targetNode.EgressDetails.IsEgressGateway = true
  152. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  153. targetNode.EgressDetails.EgressGatewayRequest = req
  154. } else {
  155. targetNode.EgressDetails = models.EgressDetails{}
  156. }
  157. if targetNode.Mutex != nil {
  158. targetNode.Mutex.Unlock()
  159. }
  160. }
  161. func RemoveNodeFromEgress(node models.Node) {
  162. egs, _ := (&schema.Egress{
  163. Network: node.Network,
  164. }).ListByNetwork(db.WithContext(context.TODO()))
  165. for _, egI := range egs {
  166. if _, ok := egI.Nodes[node.ID.String()]; ok {
  167. delete(egI.Nodes, node.ID.String())
  168. egI.Update(db.WithContext(context.TODO()))
  169. }
  170. }
  171. }
  172. func GetEgressRanges(netID models.NetworkID) (map[string][]string, map[string]struct{}, error) {
  173. resultMap := make(map[string]struct{})
  174. nodeEgressMap := make(map[string][]string)
  175. networkNodes, err := GetNetworkNodes(netID.String())
  176. if err != nil {
  177. return nil, nil, err
  178. }
  179. for _, currentNode := range networkNodes {
  180. if currentNode.Network != netID.String() {
  181. continue
  182. }
  183. if currentNode.EgressDetails.IsEgressGateway { // add the egress gateway range(s) to the result
  184. if len(currentNode.EgressDetails.EgressGatewayRanges) > 0 {
  185. nodeEgressMap[currentNode.ID.String()] = currentNode.EgressDetails.EgressGatewayRanges
  186. for _, egressRangeI := range currentNode.EgressDetails.EgressGatewayRanges {
  187. resultMap[egressRangeI] = struct{}{}
  188. }
  189. }
  190. }
  191. }
  192. extclients, _ := GetNetworkExtClients(netID.String())
  193. for _, extclient := range extclients {
  194. if len(extclient.ExtraAllowedIPs) > 0 {
  195. nodeEgressMap[extclient.ClientID] = extclient.ExtraAllowedIPs
  196. for _, extraAllowedIP := range extclient.ExtraAllowedIPs {
  197. resultMap[extraAllowedIP] = struct{}{}
  198. }
  199. }
  200. }
  201. return nodeEgressMap, resultMap, nil
  202. }