relay.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. package logic
  2. import (
  3. "errors"
  4. "fmt"
  5. "net"
  6. "github.com/gravitl/netmaker/logger"
  7. "github.com/gravitl/netmaker/models"
  8. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  9. )
  10. // CreateRelay - creates a relay
  11. func CreateRelay(relay models.RelayRequest) ([]models.Client, models.Node, error) {
  12. var relayedClients []models.Client
  13. node, err := GetNodeByID(relay.NodeID)
  14. if err != nil {
  15. return relayedClients, models.Node{}, err
  16. }
  17. host, err := GetHost(node.HostID.String())
  18. if err != nil {
  19. return relayedClients, models.Node{}, err
  20. }
  21. if host.OS != "linux" {
  22. return relayedClients, models.Node{}, fmt.Errorf("only linux machines can be relay nodes")
  23. }
  24. err = ValidateRelay(relay)
  25. if err != nil {
  26. return relayedClients, models.Node{}, err
  27. }
  28. node.IsRelay = true
  29. node.RelayedNodes = relay.RelayedNodes
  30. node.SetLastModified()
  31. err = UpsertNode(&node)
  32. if err != nil {
  33. return relayedClients, node, err
  34. }
  35. returnnodes := SetRelayedNodes(true, relay.NodeID, relay.RelayedNodes)
  36. return returnnodes, node, nil
  37. }
  38. // SetRelayedNodes- sets and saves node as relayed
  39. func SetRelayedNodes(setRelayed bool, relay string, relayed []string) []models.Client {
  40. var returnnodes []models.Client
  41. for _, id := range relayed {
  42. node, err := GetNodeByID(id)
  43. if err != nil {
  44. logger.Log(0, "setRelayedNodes.GetNodebyID", err.Error())
  45. continue
  46. }
  47. node.IsRelayed = setRelayed
  48. if node.IsRelayed {
  49. node.RelayedBy = relay
  50. } else {
  51. node.RelayedBy = ""
  52. }
  53. node.SetLastModified()
  54. if err := UpsertNode(&node); err != nil {
  55. logger.Log(0, "setRelayedNodes.Insert", err.Error())
  56. continue
  57. }
  58. host, err := GetHost(node.HostID.String())
  59. if err == nil {
  60. returnnodes = append(returnnodes, models.Client{
  61. Host: *host,
  62. Node: node,
  63. })
  64. }
  65. }
  66. return returnnodes
  67. }
  68. // ValidateRelay - checks if relay is valid
  69. func ValidateRelay(relay models.RelayRequest) error {
  70. var err error
  71. //isIp := functions.IsIpCIDR(gateway.RangeString)
  72. empty := len(relay.RelayedNodes) == 0
  73. if empty {
  74. return errors.New("IP Ranges Cannot Be Empty")
  75. }
  76. node, err := GetNodeByID(relay.NodeID)
  77. if err != nil {
  78. return err
  79. }
  80. if node.IsRelay {
  81. return errors.New("node is already acting as a relay")
  82. }
  83. for _, relayedNodeID := range relay.RelayedNodes {
  84. relayedNode, err := GetNodeByID(relayedNodeID)
  85. if err != nil {
  86. return err
  87. }
  88. if relayedNode.IsIngressGateway {
  89. return errors.New("cannot relay an ingress gateway (" + relayedNodeID + ")")
  90. }
  91. }
  92. return err
  93. }
  94. // UpdateRelayed - updates relay nodes
  95. func UpdateRelayed(relay string, oldNodes []string, newNodes []string) []models.Client {
  96. _ = SetRelayedNodes(false, relay, oldNodes)
  97. return SetRelayedNodes(true, relay, newNodes)
  98. }
  99. // DeleteRelay - deletes a relay
  100. func DeleteRelay(network, nodeid string) ([]models.Client, models.Node, error) {
  101. var returnClients []models.Client
  102. node, err := GetNodeByID(nodeid)
  103. if err != nil {
  104. return returnClients, models.Node{}, err
  105. }
  106. returnClients = SetRelayedNodes(false, nodeid, node.RelayedNodes)
  107. node.IsRelay = false
  108. node.RelayedNodes = []string{}
  109. node.SetLastModified()
  110. if err = UpsertNode(&node); err != nil {
  111. return returnClients, models.Node{}, err
  112. }
  113. return returnClients, node, nil
  114. }
  115. // GetPeerConfForRelayed - returns the peerConfig for a node relayed by relay
  116. func GetPeerConfForRelayed(relayed, relay models.Client) wgtypes.PeerConfig {
  117. if relayed.Node.RelayedBy != relay.Node.ID.String() {
  118. logger.Log(0, "peerUpdateForRelayedByRelay called with invalid parameters")
  119. return wgtypes.PeerConfig{}
  120. }
  121. update := wgtypes.PeerConfig{
  122. PublicKey: relay.Host.PublicKey,
  123. ReplaceAllowedIPs: true,
  124. Endpoint: &net.UDPAddr{
  125. IP: relay.Host.EndpointIP,
  126. Port: relay.Host.ListenPort,
  127. },
  128. AllowedIPs: getAllowedIpsForRelayed(relayed, relay),
  129. PersistentKeepaliveInterval: &relay.Node.PersistentKeepalive,
  130. }
  131. if relay.Node.Address.IP != nil {
  132. allowed := net.IPNet{
  133. IP: relay.Node.Address.IP,
  134. Mask: net.CIDRMask(32, 32),
  135. }
  136. update.AllowedIPs = append(update.AllowedIPs, allowed)
  137. }
  138. if relay.Node.Address6.IP != nil {
  139. allowed := net.IPNet{
  140. IP: relay.Node.Address6.IP,
  141. Mask: net.CIDRMask(128, 128),
  142. }
  143. update.AllowedIPs = append(update.AllowedIPs, allowed)
  144. }
  145. if relay.Node.IsIngressGateway {
  146. update.AllowedIPs = append(update.AllowedIPs, getIngressIPs(relay)...)
  147. }
  148. if relay.Node.IsEgressGateway {
  149. update.AllowedIPs = append(update.AllowedIPs, getEgressIPs(relay)...)
  150. }
  151. return update
  152. }