| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213 | package controllerimport (	"encoding/json"	"fmt"	"net"	"net/http"	"time"	"github.com/google/uuid"	"github.com/gravitl/netmaker/database"	"github.com/gravitl/netmaker/logger"	"github.com/gravitl/netmaker/logic"	"github.com/gravitl/netmaker/models"	"github.com/gravitl/netmaker/mq"	"github.com/gravitl/netmaker/servercfg"	"golang.org/x/crypto/bcrypt"	"golang.org/x/exp/slog"	"golang.zx2c4.com/wireguard/wgctrl/wgtypes")// swagger:route PUT /api/v1/nodes/migrate nodes migrateNode//// Used to migrate a legacy node.////			Schemes: https////			Security://	  		oauth////			Responses://				200: nodeJoinResponsefunc migrate(w http.ResponseWriter, r *http.Request) {	data := models.MigrationData{}	host := models.Host{}	node := models.Node{}	nodes := []models.Node{}	server := models.ServerConfig{}	err := json.NewDecoder(r.Body).Decode(&data)	if err != nil {		logger.Log(0, r.Header.Get("user"), "error decoding request body: ", err.Error())		logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))		return	}	for i, legacy := range data.LegacyNodes {		record, err := database.FetchRecord(database.NODES_TABLE_NAME, legacy.ID)		if err != nil {			slog.Error("legacy node not found", "error", err)			logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("legacy node not found %w", err), "badrequest"))			return		}		var legacyNode models.LegacyNode		if err = json.Unmarshal([]byte(record), &legacyNode); err != nil {			slog.Error("decoding legacy node", "errror", err)			logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("decode legacy node %w", err), "badrequest"))			return		}		if err := bcrypt.CompareHashAndPassword([]byte(legacyNode.Password), []byte(legacy.Password)); err != nil {			slog.Error("legacy node invalid password", "error", err)			logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("invalid password %w", err), "unauthorized"))			return		}		if i == 0 {			host, node = convertLegacyHostNode(legacy)			host.Name = data.HostName			host.HostPass = data.Password			host.OS = data.OS			if err := logic.CreateHost(&host); err != nil {				slog.Error("create host", "error", err)				logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))				return			}			server = servercfg.GetServerInfo()			if servercfg.GetBrokerType() == servercfg.EmqxBrokerType {				server.MQUserName = host.ID.String()			}			key, keyErr := logic.RetrievePublicTrafficKey()			if keyErr != nil {				slog.Error("retrieving traffickey", "error", err)				logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))				return			}			server.TrafficKey = key		} else {			node = convertLegacyNode(legacyNode, host.ID)		}		if err := logic.UpsertNode(&node); err != nil {			slog.Error("update node", "error", err)			continue		}		host.Nodes = append(host.Nodes, node.ID.String())		nodes = append(nodes, node)	}	if err := logic.UpsertHost(&host); err != nil {		slog.Error("save host", "error", err)	}	go mq.PublishPeerUpdate()	response := models.HostPull{		Host:         host,		Nodes:        nodes,		ServerConfig: server,	}	w.WriteHeader(http.StatusOK)	json.NewEncoder(w).Encode(&response)	slog.Info("migrated nodes")	// check for gateways	for _, node := range data.LegacyNodes {		if node.IsEgressGateway == "yes" {			egressGateway := models.EgressGatewayRequest{				NodeID:     node.ID,				Ranges:     node.EgressGatewayRanges,				NatEnabled: node.EgressGatewayNatEnabled,			}			if _, err := logic.CreateEgressGateway(egressGateway); err != nil {				logger.Log(0, "error creating egress gateway for node", node.ID, err.Error())			}		}		if node.IsIngressGateway == "yes" {			ingressGateway := models.IngressRequest{}			ingressNode, err := logic.CreateIngressGateway(node.Network, node.ID, ingressGateway)			if err != nil {				logger.Log(0, "error creating ingress gateway for node", node.ID, err.Error())			}			runUpdates(&ingressNode, true)		}	}}func convertLegacyHostNode(legacy models.LegacyNode) (models.Host, models.Node) {	//convert host	host := models.Host{}	host.ID = uuid.New()	host.IPForwarding = models.ParseBool(legacy.IPForwarding)	host.AutoUpdate = servercfg.AutoUpdateEnabled()	host.Interface = "netmaker"	host.ListenPort = int(legacy.ListenPort)	host.MTU = int(legacy.MTU)	host.PublicKey, _ = wgtypes.ParseKey(legacy.PublicKey)	host.MacAddress = net.HardwareAddr(legacy.MacAddress)	host.TrafficKeyPublic = legacy.TrafficKeys.Mine	host.Nodes = append([]string{}, legacy.ID)	host.Interfaces = legacy.Interfaces	//host.DefaultInterface = legacy.Defaul	host.EndpointIP = net.ParseIP(legacy.Endpoint)	host.IsDocker = models.ParseBool(legacy.IsDocker)	host.IsK8S = models.ParseBool(legacy.IsK8S)	host.IsStatic = models.ParseBool(legacy.IsStatic)	node := convertLegacyNode(legacy, host.ID)	return host, node}func convertLegacyNode(legacy models.LegacyNode, hostID uuid.UUID) models.Node {	//convert node	node := models.Node{}	node.ID, _ = uuid.Parse(legacy.ID)	node.HostID = hostID	node.Network = legacy.Network	valid4 := true	valid6 := true	_, cidr4, err := net.ParseCIDR(legacy.NetworkSettings.AddressRange)	if err != nil {		valid4 = false		slog.Warn("parsing address range", "error", err)	} else {		node.NetworkRange = *cidr4	}	_, cidr6, err := net.ParseCIDR(legacy.NetworkSettings.AddressRange6)	if err != nil {		valid6 = false		slog.Warn("parsing address range6", "error", err)	} else {		node.NetworkRange6 = *cidr6	}	node.Server = servercfg.GetServer()	node.Connected = models.ParseBool(legacy.Connected)	if valid4 {		node.Address = net.IPNet{			IP:   net.ParseIP(legacy.Address),			Mask: cidr4.Mask,		}	}	if valid6 {		node.Address6 = net.IPNet{			IP:   net.ParseIP(legacy.Address6),			Mask: cidr6.Mask,		}	}	node.Action = models.NODE_NOOP	node.LocalAddress = net.IPNet{		IP: net.ParseIP(legacy.LocalAddress),	}	node.IsEgressGateway = models.ParseBool(legacy.IsEgressGateway)	node.EgressGatewayRanges = legacy.EgressGatewayRanges	node.IsIngressGateway = models.ParseBool(legacy.IsIngressGateway)	node.IsRelayed = false	node.IsRelay = false	node.RelayedNodes = []string{}	node.DNSOn = models.ParseBool(legacy.DNSOn)	node.PersistentKeepalive = time.Duration(int64(time.Second) * int64(legacy.PersistentKeepalive))	node.LastModified = time.Now()	node.ExpirationDateTime = time.Unix(legacy.ExpirationDateTime, 0)	node.EgressGatewayNatEnabled = models.ParseBool(legacy.EgressGatewayNatEnabled)	node.EgressGatewayRequest = legacy.EgressGatewayRequest	node.IngressGatewayRange = legacy.IngressGatewayRange	node.IngressGatewayRange6 = legacy.IngressGatewayRange6	node.DefaultACL = legacy.DefaultACL	node.OwnerID = legacy.OwnerID	node.FailoverNode, _ = uuid.Parse(legacy.FailoverNode)	node.Failover = models.ParseBool(legacy.Failover)	return node}
 |