| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184 |
- package logic
- import (
- "errors"
- "fmt"
- "net"
- "github.com/gravitl/netmaker/logger"
- "github.com/gravitl/netmaker/models"
- "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
- )
- // CreateRelay - creates a relay
- func CreateRelay(relay models.RelayRequest) ([]models.Client, models.Node, error) {
- var relayedClients []models.Client
- node, err := GetNodeByID(relay.NodeID)
- if err != nil {
- return relayedClients, models.Node{}, err
- }
- host, err := GetHost(node.HostID.String())
- if err != nil {
- return relayedClients, models.Node{}, err
- }
- if host.OS != "linux" {
- return relayedClients, models.Node{}, fmt.Errorf("only linux machines can be relay nodes")
- }
- err = ValidateRelay(relay)
- if err != nil {
- return relayedClients, models.Node{}, err
- }
- node.IsRelay = true
- node.RelayedNodes = relay.RelayedNodes
- node.SetLastModified()
- err = UpsertNode(&node)
- if err != nil {
- return relayedClients, node, err
- }
- relayedClients = SetRelayedNodes(true, relay.NodeID, relay.RelayedNodes)
- for _, relayed := range relayedClients {
- if err := UpsertNode(&relayed.Node); err != nil {
- logger.Log(0, "inserting relayed node", err.Error())
- continue
- }
- }
- return relayedClients, node, nil
- }
- // SetRelayedNodes- sets and saves node as relayed
- func SetRelayedNodes(setRelayed bool, relay string, relayed []string) []models.Client {
- var returnnodes []models.Client
- for _, id := range relayed {
- node, err := GetNodeByID(id)
- if err != nil {
- logger.Log(0, "setRelayedNodes.GetNodebyID", err.Error())
- continue
- }
- node.IsRelayed = setRelayed
- if node.IsRelayed {
- node.RelayedBy = relay
- } else {
- node.RelayedBy = ""
- }
- node.SetLastModified()
- if err := UpsertNode(&node); err != nil {
- logger.Log(0, "setRelayedNodes.Insert", err.Error())
- continue
- }
- host, err := GetHost(node.HostID.String())
- if err == nil {
- returnnodes = append(returnnodes, models.Client{
- Host: *host,
- Node: node,
- })
- }
- }
- return returnnodes
- }
- //func GetRelayedNodes(relayNode *models.Node) (models.Node, error) {
- // var returnnodes []models.Node
- // networkNodes, err := GetNetworkNodes(relayNode.Network)
- // if err != nil {
- // return returnnodes, err
- // }
- // for _, node := range networkNodes {
- // for _, addr := range relayNode.RelayAddrs {
- // if addr == node.Address.IP.String() || addr == node.Address6.IP.String() {
- // returnnodes = append(returnnodes, node)
- // }
- // }
- // }
- // return returnnodes, nil
- //}
- // ValidateRelay - checks if relay is valid
- func ValidateRelay(relay models.RelayRequest) error {
- var err error
- //isIp := functions.IsIpCIDR(gateway.RangeString)
- empty := len(relay.RelayedNodes) == 0
- if empty {
- return errors.New("IP Ranges Cannot Be Empty")
- }
- node, err := GetNodeByID(relay.NodeID)
- if err != nil {
- return err
- }
- if node.IsRelay {
- return errors.New("node is already acting as a relay")
- }
- for _, relayedNodeID := range relay.RelayedNodes {
- relayedNode, err := GetNodeByID(relayedNodeID)
- if err != nil {
- return err
- }
- if relayedNode.IsIngressGateway {
- return errors.New("cannot relay an ingress gateway (" + relayedNodeID + ")")
- }
- }
- return err
- }
- // UpdateRelayed - updates relay nodes
- func UpdateRelayed(relay string, oldNodes []string, newNodes []string) []models.Client {
- _ = SetRelayedNodes(false, relay, oldNodes)
- return SetRelayedNodes(true, relay, newNodes)
- }
- // DeleteRelay - deletes a relay
- func DeleteRelay(network, nodeid string) ([]models.Client, models.Node, error) {
- var returnClients []models.Client
- node, err := GetNodeByID(nodeid)
- if err != nil {
- return returnClients, models.Node{}, err
- }
- returnClients = SetRelayedNodes(false, nodeid, node.RelayedNodes)
- node.IsRelay = false
- node.RelayedNodes = []string{}
- node.SetLastModified()
- if err = UpsertNode(&node); err != nil {
- return returnClients, models.Node{}, err
- }
- return returnClients, node, nil
- }
- // GetPeerConfForRelayed - returns the peerConfig for a node relayed by relay
- func GetPeerConfForRelayed(relayed, relay models.Client) wgtypes.PeerConfig {
- if relayed.Node.RelayedBy != relay.Node.ID.String() {
- logger.Log(0, "peerUpdateForRelayedByRelay called with invalid parameters")
- return wgtypes.PeerConfig{}
- }
- update := wgtypes.PeerConfig{
- PublicKey: relay.Host.PublicKey,
- ReplaceAllowedIPs: true,
- Endpoint: &net.UDPAddr{
- IP: relay.Host.EndpointIP,
- Port: relay.Host.ListenPort,
- },
- AllowedIPs: getAllowedIpsForRelayed(relayed, relay),
- PersistentKeepaliveInterval: &relay.Node.PersistentKeepalive,
- }
- if relay.Node.Address.IP != nil {
- allowed := net.IPNet{
- IP: relay.Node.Address.IP,
- Mask: net.CIDRMask(32, 32),
- }
- update.AllowedIPs = append(update.AllowedIPs, allowed)
- }
- if relay.Node.Address6.IP != nil {
- allowed := net.IPNet{
- IP: relay.Node.Address6.IP,
- Mask: net.CIDRMask(128, 128),
- }
- update.AllowedIPs = append(update.AllowedIPs, allowed)
- }
- if relay.Node.IsIngressGateway {
- update.AllowedIPs = append(update.AllowedIPs, getIngressIPs(relay)...)
- }
- if relay.Node.IsEgressGateway {
- update.AllowedIPs = append(update.AllowedIPs, getEgressIPs(relay)...)
- }
- return update
- }
|