egress.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366
  1. package logic
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "maps"
  7. "net"
  8. "github.com/gravitl/netmaker/db"
  9. "github.com/gravitl/netmaker/models"
  10. "github.com/gravitl/netmaker/schema"
  11. )
  12. func ValidateEgressReq(e *schema.Egress) error {
  13. if e.Network == "" {
  14. return errors.New("network id is empty")
  15. }
  16. _, err := GetNetwork(e.Network)
  17. if err != nil {
  18. return errors.New("failed to get network " + err.Error())
  19. }
  20. if !e.IsInetGw {
  21. if e.Range == "" {
  22. return errors.New("egress range is empty")
  23. }
  24. _, _, err = net.ParseCIDR(e.Range)
  25. if err != nil {
  26. return errors.New("invalid egress range " + err.Error())
  27. }
  28. err = ValidateEgressRange(e.Network, []string{e.Range})
  29. if err != nil {
  30. return errors.New("invalid egress range " + err.Error())
  31. }
  32. } else {
  33. if len(e.Nodes) > 1 {
  34. return errors.New("can only set one internet routing node")
  35. }
  36. req := models.InetNodeReq{}
  37. for k := range e.Nodes {
  38. inetNode, err := GetNodeByID(k)
  39. if err != nil {
  40. return errors.New("invalid routing node " + err.Error())
  41. }
  42. // check if node is acting as egress gw already
  43. GetNodeEgressInfo(&inetNode)
  44. if err := ValidateInetGwReq(inetNode, req, false); err != nil {
  45. return err
  46. }
  47. }
  48. }
  49. if len(e.Nodes) != 0 {
  50. for k := range e.Nodes {
  51. _, err := GetNodeByID(k)
  52. if err != nil {
  53. return errors.New("invalid routing node " + err.Error())
  54. }
  55. }
  56. }
  57. return nil
  58. }
  59. func GetInetClientsFromAclPolicies(eID string) (inetClientIDs []string) {
  60. e := schema.Egress{ID: eID}
  61. err := e.Get(db.WithContext(context.TODO()))
  62. if err != nil || !e.Status {
  63. return
  64. }
  65. acls, _ := ListAclsByNetwork(models.NetworkID(e.Network))
  66. for _, acl := range acls {
  67. for _, dstI := range acl.Dst {
  68. if dstI.ID == models.EgressID {
  69. if dstI.Value != eID {
  70. continue
  71. }
  72. for _, srcI := range acl.Src {
  73. if srcI.Value == "*" {
  74. continue
  75. }
  76. if srcI.ID == models.NodeID {
  77. inetClientIDs = append(inetClientIDs, srcI.Value)
  78. }
  79. if srcI.ID == models.NodeTagID {
  80. inetClientIDs = append(inetClientIDs, GetNodeIDsWithTag(models.TagID(srcI.Value))...)
  81. }
  82. }
  83. }
  84. }
  85. }
  86. return
  87. }
  88. func isNodeUsingInternetGw(node *models.Node) {
  89. host, err := GetHost(node.HostID.String())
  90. if err != nil {
  91. return
  92. }
  93. if host.IsDefault || node.IsFailOver {
  94. return
  95. }
  96. nodeTags := maps.Clone(node.Tags)
  97. nodeTags[models.TagID(node.ID.String())] = struct{}{}
  98. acls, _ := ListAclsByNetwork(models.NetworkID(node.Network))
  99. var isUsing bool
  100. for _, acl := range acls {
  101. if !acl.Enabled {
  102. continue
  103. }
  104. srcVal := convAclTagToValueMap(acl.Src)
  105. for _, dstI := range acl.Dst {
  106. if dstI.ID == models.EgressID {
  107. e := schema.Egress{ID: dstI.Value}
  108. err := e.Get(db.WithContext(context.TODO()))
  109. if err != nil || !e.Status {
  110. continue
  111. }
  112. if e.IsInetGw {
  113. if _, ok := srcVal[node.ID.String()]; ok {
  114. for nodeID := range e.Nodes {
  115. if nodeID == node.ID.String() {
  116. continue
  117. }
  118. node.EgressDetails.InternetGwID = nodeID
  119. isUsing = true
  120. return
  121. }
  122. }
  123. for tagID := range nodeTags {
  124. if _, ok := srcVal[tagID.String()]; ok {
  125. for nodeID := range e.Nodes {
  126. if nodeID == node.ID.String() {
  127. continue
  128. }
  129. node.EgressDetails.InternetGwID = nodeID
  130. isUsing = true
  131. return
  132. }
  133. }
  134. }
  135. }
  136. }
  137. }
  138. }
  139. if !isUsing {
  140. node.EgressDetails.InternetGwID = ""
  141. }
  142. }
  143. func DoesNodeHaveAccessToEgress(node *models.Node, e *schema.Egress) bool {
  144. nodeTags := maps.Clone(node.Tags)
  145. nodeTags[models.TagID(node.ID.String())] = struct{}{}
  146. if !e.IsInetGw {
  147. nodeTags[models.TagID("*")] = struct{}{}
  148. }
  149. acls, _ := ListAclsByNetwork(models.NetworkID(node.Network))
  150. if !e.IsInetGw {
  151. defaultDevicePolicy, _ := GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)
  152. if defaultDevicePolicy.Enabled {
  153. return true
  154. }
  155. }
  156. for _, acl := range acls {
  157. if !acl.Enabled {
  158. continue
  159. }
  160. srcVal := convAclTagToValueMap(acl.Src)
  161. if !e.IsInetGw && acl.AllowedDirection == models.TrafficDirectionBi {
  162. if _, ok := srcVal["*"]; ok {
  163. return true
  164. }
  165. }
  166. for _, dstI := range acl.Dst {
  167. if !e.IsInetGw && dstI.ID == models.NodeTagID && dstI.Value == "*" {
  168. return true
  169. }
  170. if dstI.ID == models.EgressID && dstI.Value == e.ID {
  171. e := schema.Egress{ID: dstI.Value}
  172. err := e.Get(db.WithContext(context.TODO()))
  173. if err != nil {
  174. continue
  175. }
  176. if node.IsStatic {
  177. if _, ok := srcVal[node.StaticNode.ClientID]; ok {
  178. return true
  179. }
  180. } else {
  181. if _, ok := srcVal[node.ID.String()]; ok {
  182. return true
  183. }
  184. }
  185. for tagID := range nodeTags {
  186. if _, ok := srcVal[tagID.String()]; ok {
  187. return true
  188. }
  189. }
  190. }
  191. }
  192. }
  193. return false
  194. }
  195. func AddEgressInfoToPeerByAccess(node, targetNode *models.Node) {
  196. eli, _ := (&schema.Egress{Network: targetNode.Network}).ListByNetwork(db.WithContext(context.TODO()))
  197. req := models.EgressGatewayRequest{
  198. NodeID: targetNode.ID.String(),
  199. NetID: targetNode.Network,
  200. }
  201. defer func() {
  202. if targetNode.Mutex != nil {
  203. targetNode.Mutex.Lock()
  204. }
  205. isNodeUsingInternetGw(targetNode)
  206. if targetNode.Mutex != nil {
  207. targetNode.Mutex.Unlock()
  208. }
  209. }()
  210. for _, e := range eli {
  211. if !e.Status || e.Network != targetNode.Network {
  212. continue
  213. }
  214. if !DoesNodeHaveAccessToEgress(node, &e) {
  215. if node.IsRelayed && node.RelayedBy == targetNode.ID.String() {
  216. if !DoesNodeHaveAccessToEgress(targetNode, &e) {
  217. continue
  218. }
  219. } else {
  220. continue
  221. }
  222. }
  223. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  224. if e.IsInetGw {
  225. targetNode.EgressDetails.IsInternetGateway = true
  226. targetNode.EgressDetails.InetNodeReq = models.InetNodeReq{
  227. InetNodeClientIDs: GetInetClientsFromAclPolicies(e.ID),
  228. }
  229. req.Ranges = append(req.Ranges, "0.0.0.0/0")
  230. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  231. Network: "0.0.0.0/0",
  232. Nat: true,
  233. RouteMetric: 256,
  234. })
  235. req.Ranges = append(req.Ranges, "::/0")
  236. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  237. Network: "::/0",
  238. Nat: true,
  239. RouteMetric: 256,
  240. })
  241. } else {
  242. m64, err := metric.(json.Number).Int64()
  243. if err != nil {
  244. m64 = 256
  245. }
  246. m := uint32(m64)
  247. req.Ranges = append(req.Ranges, e.Range)
  248. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  249. Network: e.Range,
  250. Nat: e.Nat,
  251. RouteMetric: m,
  252. })
  253. }
  254. }
  255. }
  256. if targetNode.Mutex != nil {
  257. targetNode.Mutex.Lock()
  258. }
  259. if len(req.Ranges) > 0 {
  260. targetNode.EgressDetails.IsEgressGateway = true
  261. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  262. targetNode.EgressDetails.EgressGatewayRequest = req
  263. } else {
  264. targetNode.EgressDetails = models.EgressDetails{}
  265. }
  266. if targetNode.Mutex != nil {
  267. targetNode.Mutex.Unlock()
  268. }
  269. }
  270. func GetNodeEgressInfo(targetNode *models.Node) {
  271. eli, _ := (&schema.Egress{Network: targetNode.Network}).ListByNetwork(db.WithContext(context.TODO()))
  272. req := models.EgressGatewayRequest{
  273. NodeID: targetNode.ID.String(),
  274. NetID: targetNode.Network,
  275. }
  276. defer func() {
  277. if targetNode.Mutex != nil {
  278. targetNode.Mutex.Lock()
  279. }
  280. isNodeUsingInternetGw(targetNode)
  281. if targetNode.Mutex != nil {
  282. targetNode.Mutex.Unlock()
  283. }
  284. }()
  285. for _, e := range eli {
  286. if !e.Status || e.Network != targetNode.Network {
  287. continue
  288. }
  289. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  290. if e.IsInetGw {
  291. targetNode.EgressDetails.IsInternetGateway = true
  292. targetNode.EgressDetails.InetNodeReq = models.InetNodeReq{
  293. InetNodeClientIDs: GetInetClientsFromAclPolicies(e.ID),
  294. }
  295. req.Ranges = append(req.Ranges, "0.0.0.0/0")
  296. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  297. Network: "0.0.0.0/0",
  298. Nat: true,
  299. RouteMetric: 256,
  300. })
  301. req.Ranges = append(req.Ranges, "::/0")
  302. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  303. Network: "::/0",
  304. Nat: true,
  305. RouteMetric: 256,
  306. })
  307. } else {
  308. m64, err := metric.(json.Number).Int64()
  309. if err != nil {
  310. m64 = 256
  311. }
  312. m := uint32(m64)
  313. req.Ranges = append(req.Ranges, e.Range)
  314. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  315. Network: e.Range,
  316. Nat: e.Nat,
  317. RouteMetric: m,
  318. })
  319. }
  320. }
  321. }
  322. if targetNode.Mutex != nil {
  323. targetNode.Mutex.Lock()
  324. }
  325. if len(req.Ranges) > 0 {
  326. targetNode.EgressDetails.IsEgressGateway = true
  327. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  328. targetNode.EgressDetails.EgressGatewayRequest = req
  329. } else {
  330. targetNode.EgressDetails = models.EgressDetails{}
  331. }
  332. if targetNode.Mutex != nil {
  333. targetNode.Mutex.Unlock()
  334. }
  335. }
  336. func RemoveNodeFromEgress(node models.Node) {
  337. egs, _ := (&schema.Egress{}).ListByNetwork(db.WithContext(context.TODO()))
  338. for _, egI := range egs {
  339. if _, ok := egI.Nodes[node.ID.String()]; ok {
  340. delete(egI.Nodes, node.ID.String())
  341. egI.Update(db.WithContext(context.TODO()))
  342. }
  343. }
  344. }