network.go 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/logic/acls"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/mq"
  15. "github.com/gravitl/netmaker/servercfg"
  16. )
  17. func networkHandlers(r *mux.Router) {
  18. r.HandleFunc("/api/networks", logic.SecurityCheck(false, http.HandlerFunc(getNetworks))).Methods(http.MethodGet)
  19. r.HandleFunc("/api/networks", logic.SecurityCheck(true, checkFreeTierLimits(limitChoiceNetworks, http.HandlerFunc(createNetwork)))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(false, http.HandlerFunc(getNetwork))).Methods(http.MethodGet)
  21. r.HandleFunc("/api/networks/{networkname}", logic.SecurityCheck(true, http.HandlerFunc(deleteNetwork))).Methods(http.MethodDelete)
  22. // ACLs
  23. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(updateNetworkACL))).Methods(http.MethodPut)
  24. r.HandleFunc("/api/networks/{networkname}/acls", logic.SecurityCheck(true, http.HandlerFunc(getNetworkACL))).Methods(http.MethodGet)
  25. }
  26. // swagger:route GET /api/networks networks getNetworks
  27. //
  28. // Lists all networks.
  29. //
  30. // Schemes: https
  31. //
  32. // Security:
  33. // oauth
  34. //
  35. // Responses:
  36. // 200: getNetworksSliceResponse
  37. func getNetworks(w http.ResponseWriter, r *http.Request) {
  38. networksSlice, marshalErr := getHeaderNetworks(r)
  39. if marshalErr != nil {
  40. logger.Log(0, r.Header.Get("user"), "error unmarshalling networks: ",
  41. marshalErr.Error())
  42. logic.ReturnErrorResponse(w, r, logic.FormatError(marshalErr, "badrequest"))
  43. return
  44. }
  45. allnetworks := []models.Network{}
  46. var err error
  47. if len(networksSlice) > 0 && networksSlice[0] == logic.ALL_NETWORK_ACCESS {
  48. allnetworks, err = logic.GetNetworks()
  49. if err != nil && !database.IsEmptyRecord(err) {
  50. logger.Log(0, r.Header.Get("user"), "failed to fetch networks: ", err.Error())
  51. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  52. return
  53. }
  54. } else {
  55. for _, network := range networksSlice {
  56. netObject, parentErr := logic.GetParentNetwork(network)
  57. if parentErr == nil {
  58. allnetworks = append(allnetworks, netObject)
  59. }
  60. }
  61. }
  62. logger.Log(2, r.Header.Get("user"), "fetched networks.")
  63. logic.SortNetworks(allnetworks[:])
  64. w.WriteHeader(http.StatusOK)
  65. json.NewEncoder(w).Encode(allnetworks)
  66. }
  67. // swagger:route GET /api/networks/{networkname} networks getNetwork
  68. //
  69. // Get a network.
  70. //
  71. // Schemes: https
  72. //
  73. // Security:
  74. // oauth
  75. //
  76. // Responses:
  77. // 200: networkBodyResponse
  78. func getNetwork(w http.ResponseWriter, r *http.Request) {
  79. // set header.
  80. w.Header().Set("Content-Type", "application/json")
  81. var params = mux.Vars(r)
  82. netname := params["networkname"]
  83. network, err := logic.GetNetwork(netname)
  84. if err != nil {
  85. logger.Log(0, r.Header.Get("user"), fmt.Sprintf("failed to fetch network [%s] info: %v",
  86. netname, err))
  87. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  88. return
  89. }
  90. logger.Log(2, r.Header.Get("user"), "fetched network", netname)
  91. w.WriteHeader(http.StatusOK)
  92. json.NewEncoder(w).Encode(network)
  93. }
  94. // swagger:route PUT /api/networks/{networkname}/acls networks updateNetworkACL
  95. //
  96. // Update a network ACL (Access Control List).
  97. //
  98. // Schemes: https
  99. //
  100. // Security:
  101. // oauth
  102. //
  103. // Responses:
  104. // 200: aclContainerResponse
  105. func updateNetworkACL(w http.ResponseWriter, r *http.Request) {
  106. w.Header().Set("Content-Type", "application/json")
  107. var params = mux.Vars(r)
  108. netname := params["networkname"]
  109. var networkACLChange acls.ACLContainer
  110. networkACLChange, err := networkACLChange.Get(acls.ContainerID(netname))
  111. if err != nil {
  112. logger.Log(0, r.Header.Get("user"),
  113. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  114. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  115. return
  116. }
  117. err = json.NewDecoder(r.Body).Decode(&networkACLChange)
  118. if err != nil {
  119. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  120. err.Error())
  121. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  122. return
  123. }
  124. newNetACL, err := networkACLChange.Save(acls.ContainerID(netname))
  125. if err != nil {
  126. logger.Log(0, r.Header.Get("user"),
  127. fmt.Sprintf("failed to update ACLs for network [%s]: %v", netname, err))
  128. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  129. return
  130. }
  131. logger.Log(1, r.Header.Get("user"), "updated ACLs for network", netname)
  132. // send peer updates
  133. if servercfg.IsMessageQueueBackend() {
  134. if err = mq.PublishPeerUpdate(); err != nil {
  135. logger.Log(0, "failed to publish peer update after ACL update on", netname)
  136. }
  137. }
  138. w.WriteHeader(http.StatusOK)
  139. json.NewEncoder(w).Encode(newNetACL)
  140. }
  141. // swagger:route GET /api/networks/{networkname}/acls networks getNetworkACL
  142. //
  143. // Get a network ACL (Access Control List).
  144. //
  145. // Schemes: https
  146. //
  147. // Security:
  148. // oauth
  149. //
  150. // Responses:
  151. // 200: aclContainerResponse
  152. func getNetworkACL(w http.ResponseWriter, r *http.Request) {
  153. w.Header().Set("Content-Type", "application/json")
  154. var params = mux.Vars(r)
  155. netname := params["networkname"]
  156. var networkACL acls.ACLContainer
  157. networkACL, err := networkACL.Get(acls.ContainerID(netname))
  158. if err != nil {
  159. if database.IsEmptyRecord(err) {
  160. networkACL = acls.ACLContainer{}
  161. w.WriteHeader(http.StatusOK)
  162. json.NewEncoder(w).Encode(networkACL)
  163. return
  164. }
  165. logger.Log(0, r.Header.Get("user"),
  166. fmt.Sprintf("failed to fetch ACLs for network [%s]: %v", netname, err))
  167. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  168. return
  169. }
  170. logger.Log(2, r.Header.Get("user"), "fetched acl for network", netname)
  171. w.WriteHeader(http.StatusOK)
  172. json.NewEncoder(w).Encode(networkACL)
  173. }
  174. // swagger:route DELETE /api/networks/{networkname} networks deleteNetwork
  175. //
  176. // Delete a network. Will not delete if there are any nodes that belong to the network.
  177. //
  178. // Schemes: https
  179. //
  180. // Security:
  181. // oauth
  182. //
  183. // Responses:
  184. // 200: stringJSONResponse
  185. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  186. // Set header
  187. w.Header().Set("Content-Type", "application/json")
  188. var params = mux.Vars(r)
  189. network := params["networkname"]
  190. err := logic.DeleteNetwork(network)
  191. if err != nil {
  192. errtype := "badrequest"
  193. if strings.Contains(err.Error(), "Node check failed") {
  194. errtype = "forbidden"
  195. }
  196. logger.Log(0, r.Header.Get("user"),
  197. fmt.Sprintf("failed to delete network [%s]: %v", network, err))
  198. logic.ReturnErrorResponse(w, r, logic.FormatError(err, errtype))
  199. return
  200. }
  201. logger.Log(1, r.Header.Get("user"), "deleted network", network)
  202. w.WriteHeader(http.StatusOK)
  203. json.NewEncoder(w).Encode("success")
  204. }
  205. // swagger:route POST /api/networks networks createNetwork
  206. //
  207. // Create a network.
  208. //
  209. // Schemes: https
  210. //
  211. // Security:
  212. // oauth
  213. //
  214. // Responses:
  215. // 200: networkBodyResponse
  216. func createNetwork(w http.ResponseWriter, r *http.Request) {
  217. w.Header().Set("Content-Type", "application/json")
  218. var network models.Network
  219. // we decode our body request params
  220. err := json.NewDecoder(r.Body).Decode(&network)
  221. if err != nil {
  222. logger.Log(0, r.Header.Get("user"), "error decoding request body: ",
  223. err.Error())
  224. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  225. return
  226. }
  227. if len(network.NetID) > 32 {
  228. err := errors.New("network name shouldn't exceed 32 characters")
  229. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  230. err.Error())
  231. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  232. return
  233. }
  234. if network.AddressRange == "" && network.AddressRange6 == "" {
  235. err := errors.New("IPv4 or IPv6 CIDR required")
  236. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  237. err.Error())
  238. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  239. return
  240. }
  241. network, err = logic.CreateNetwork(network)
  242. if err != nil {
  243. logger.Log(0, r.Header.Get("user"), "failed to create network: ",
  244. err.Error())
  245. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  246. return
  247. }
  248. defaultHosts := logic.GetDefaultHosts()
  249. for i := range defaultHosts {
  250. currHost := &defaultHosts[i]
  251. newNode, err := logic.UpdateHostNetwork(currHost, network.NetID, true)
  252. if err != nil {
  253. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  254. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  255. return
  256. }
  257. logger.Log(1, "added new node", newNode.ID.String(), "to host", currHost.Name)
  258. if err = mq.HostUpdate(&models.HostUpdate{
  259. Action: models.JoinHostToNetwork,
  260. Host: *currHost,
  261. Node: *newNode,
  262. }); err != nil {
  263. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", currHost.ID.String(), network.NetID, err.Error())
  264. }
  265. }
  266. logger.Log(1, r.Header.Get("user"), "created network", network.NetID)
  267. w.WriteHeader(http.StatusOK)
  268. json.NewEncoder(w).Encode(network)
  269. }