| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411 | package logicimport (	"context"	"encoding/json"	"errors"	"maps"	"strings"	"github.com/gravitl/netmaker/db"	"github.com/gravitl/netmaker/models"	"github.com/gravitl/netmaker/schema"	"github.com/gravitl/netmaker/servercfg")var ValidateEgressReq = validateEgressReqfunc validateEgressReq(e *schema.Egress) error {	if e.Network == "" {		return errors.New("network id is empty")	}	_, err := GetNetwork(e.Network)	if err != nil {		return errors.New("failed to get network " + err.Error())	}	if !servercfg.IsPro && len(e.Nodes) > 1 {		return errors.New("can only set one routing node on CE")	}	if len(e.Nodes) > 0 {		for k := range e.Nodes {			_, err := GetNodeByID(k)			if err != nil {				return errors.New("invalid routing node " + err.Error())			}		}	}	return nil}func DoesUserHaveAccessToEgress(user *models.User, e *schema.Egress, acls []models.Acl) bool {	if !e.Status {		return false	}	for _, acl := range acls {		if !acl.Enabled {			continue		}		dstTags := ConvAclTagToValueMap(acl.Dst)		_, all := dstTags["*"]		if _, ok := dstTags[e.ID]; ok || all {			// get all src tags			for _, srcAcl := range acl.Src {				if srcAcl.ID == models.UserAclID && srcAcl.Value == user.UserName {					return true				} else if srcAcl.ID == models.UserGroupAclID {					// fetch all users in the group					if _, ok := user.UserGroups[models.UserGroupID(srcAcl.Value)]; ok {						return true					}				}			}		}	}	return false}func DoesNodeHaveAccessToEgress(node *models.Node, e *schema.Egress, acls []models.Acl) bool {	nodeTags := maps.Clone(node.Tags)	nodeTags[models.TagID(node.ID.String())] = struct{}{}	nodeTags[models.TagID("*")] = struct{}{}	for _, acl := range acls {		if !acl.Enabled {			continue		}		srcVal := ConvAclTagToValueMap(acl.Src)		for _, dstI := range acl.Dst {			if (dstI.ID == models.EgressID && dstI.Value == e.ID) || (dstI.ID == models.NodeTagID && dstI.Value == "*") {				if dstI.ID == models.EgressID {					e := schema.Egress{ID: dstI.Value}					err := e.Get(db.WithContext(context.TODO()))					if err != nil {						continue					}				}				if node.IsStatic {					if _, ok := srcVal[node.StaticNode.ClientID]; ok {						return true					}				} else {					if _, ok := srcVal[node.ID.String()]; ok {						return true					}				}				for tagID := range nodeTags {					if _, ok := srcVal[tagID.String()]; ok {						return true					}				}			}		}	}	return false}func AddEgressInfoToPeerByAccess(node, targetNode *models.Node, eli []schema.Egress, acls []models.Acl, isDefaultPolicyActive bool) {	req := models.EgressGatewayRequest{		NodeID:     targetNode.ID.String(),		NetID:      targetNode.Network,		NatEnabled: "yes",	}	for _, e := range eli {		if !e.Status || e.Network != targetNode.Network {			continue		}		if !isDefaultPolicyActive {			if !DoesNodeHaveAccessToEgress(node, &e, acls) {				if node.IsRelayed && node.RelayedBy == targetNode.ID.String() {					if !DoesNodeHaveAccessToEgress(targetNode, &e, acls) {						continue					}				} else {					continue				}			}		}		if metric, ok := e.Nodes[targetNode.ID.String()]; ok {			m64, err := metric.(json.Number).Int64()			if err != nil {				m64 = 256			}			m := uint32(m64)			if e.Range != "" {				req.Ranges = append(req.Ranges, e.Range)			} else {				req.Ranges = append(req.Ranges, e.DomainAns...)			}			if e.Range != "" {				req.Ranges = append(req.Ranges, e.Range)				req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{					Network:     e.Range,					Nat:         e.Nat,					RouteMetric: m,				})			}			if e.Domain != "" && len(e.DomainAns) > 0 {				req.Ranges = append(req.Ranges, e.DomainAns...)				for _, domainAnsI := range e.DomainAns {					req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{						Network:     domainAnsI,						Nat:         e.Nat,						RouteMetric: m,					})				}			}		}		for tagID := range targetNode.Tags {			if metric, ok := e.Tags[tagID.String()]; ok {				m64, err := metric.(json.Number).Int64()				if err != nil {					m64 = 256				}				m := uint32(m64)				if e.Range != "" {					req.Ranges = append(req.Ranges, e.Range)				} else {					req.Ranges = append(req.Ranges, e.DomainAns...)				}				if e.Range != "" {					req.Ranges = append(req.Ranges, e.Range)					req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{						Network:     e.Range,						Nat:         e.Nat,						RouteMetric: m,					})				}				if e.Domain != "" && len(e.DomainAns) > 0 {					req.Ranges = append(req.Ranges, e.DomainAns...)					for _, domainAnsI := range e.DomainAns {						req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{							Network:     domainAnsI,							Nat:         e.Nat,							RouteMetric: m,						})					}				}				break			}		}	}	if targetNode.Mutex != nil {		targetNode.Mutex.Lock()	}	if len(req.Ranges) > 0 {		targetNode.EgressDetails.IsEgressGateway = true		targetNode.EgressDetails.EgressGatewayRanges = req.Ranges		targetNode.EgressDetails.EgressGatewayRequest = req	} else {		targetNode.EgressDetails = models.EgressDetails{}	}	if targetNode.Mutex != nil {		targetNode.Mutex.Unlock()	}}func GetEgressDomainsByAccess(user *models.User, network models.NetworkID) (domains []string) {	acls, _ := ListAclsByNetwork(network)	eli, _ := (&schema.Egress{Network: network.String()}).ListByNetwork(db.WithContext(context.TODO()))	defaultDevicePolicy, _ := GetDefaultPolicy(network, models.UserPolicy)	isDefaultPolicyActive := defaultDevicePolicy.Enabled	for _, e := range eli {		if !e.Status || e.Network != network.String() {			continue		}		if !isDefaultPolicyActive {			if !DoesUserHaveAccessToEgress(user, &e, acls) {				continue			}		}		if e.Domain != "" && len(e.DomainAns) > 0 {			domains = append(domains, BaseDomain(e.Domain))		}	}	return}func GetNodeEgressInfo(targetNode *models.Node, eli []schema.Egress, acls []models.Acl) {	req := models.EgressGatewayRequest{		NodeID:     targetNode.ID.String(),		NetID:      targetNode.Network,		NatEnabled: "yes",	}	for _, e := range eli {		if !e.Status || e.Network != targetNode.Network {			continue		}		if metric, ok := e.Nodes[targetNode.ID.String()]; ok {			m64, err := metric.(json.Number).Int64()			if err != nil {				m64 = 256			}			m := uint32(m64)			if e.Range != "" {				req.Ranges = append(req.Ranges, e.Range)				req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{					Network:     e.Range,					Nat:         e.Nat,					RouteMetric: m,				})			}			if e.Domain != "" && len(e.DomainAns) > 0 {				req.Ranges = append(req.Ranges, e.DomainAns...)				for _, domainAnsI := range e.DomainAns {					req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{						Network:     domainAnsI,						Nat:         e.Nat,						RouteMetric: m,					})				}			}		}		for tagID := range targetNode.Tags {			if metric, ok := e.Tags[tagID.String()]; ok {				m64, err := metric.(json.Number).Int64()				if err != nil {					m64 = 256				}				m := uint32(m64)				if e.Range != "" {					req.Ranges = append(req.Ranges, e.Range)				} else {					req.Ranges = append(req.Ranges, e.DomainAns...)				}				if e.Range != "" {					req.Ranges = append(req.Ranges, e.Range)					req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{						Network:     e.Range,						Nat:         e.Nat,						RouteMetric: m,					})				}				if e.Domain != "" && len(e.DomainAns) > 0 {					req.Ranges = append(req.Ranges, e.DomainAns...)					for _, domainAnsI := range e.DomainAns {						req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{							Network:     domainAnsI,							Nat:         e.Nat,							RouteMetric: m,						})					}				}				break			}		}	}	if targetNode.Mutex != nil {		targetNode.Mutex.Lock()	}	if len(req.Ranges) > 0 {		targetNode.EgressDetails.IsEgressGateway = true		targetNode.EgressDetails.EgressGatewayRanges = req.Ranges		targetNode.EgressDetails.EgressGatewayRequest = req	} else {		targetNode.EgressDetails = models.EgressDetails{}	}	if targetNode.Mutex != nil {		targetNode.Mutex.Unlock()	}}func RemoveNodeFromEgress(node models.Node) {	egs, _ := (&schema.Egress{		Network: node.Network,	}).ListByNetwork(db.WithContext(context.TODO()))	for _, egI := range egs {		if _, ok := egI.Nodes[node.ID.String()]; ok {			delete(egI.Nodes, node.ID.String())			egI.Update(db.WithContext(context.TODO()))		}	}}func GetEgressRanges(netID models.NetworkID) (map[string][]string, map[string]struct{}, error) {	resultMap := make(map[string]struct{})	nodeEgressMap := make(map[string][]string)	networkNodes, err := GetNetworkNodes(netID.String())	if err != nil {		return nil, nil, err	}	for _, currentNode := range networkNodes {		if currentNode.Network != netID.String() {			continue		}		if currentNode.EgressDetails.IsEgressGateway { // add the egress gateway range(s) to the result			if len(currentNode.EgressDetails.EgressGatewayRanges) > 0 {				nodeEgressMap[currentNode.ID.String()] = currentNode.EgressDetails.EgressGatewayRanges				for _, egressRangeI := range currentNode.EgressDetails.EgressGatewayRanges {					resultMap[egressRangeI] = struct{}{}				}			}		}	}	extclients, _ := GetNetworkExtClients(netID.String())	for _, extclient := range extclients {		if len(extclient.ExtraAllowedIPs) > 0 {			nodeEgressMap[extclient.ClientID] = extclient.ExtraAllowedIPs			for _, extraAllowedIP := range extclient.ExtraAllowedIPs {				resultMap[extraAllowedIP] = struct{}{}			}		}	}	return nodeEgressMap, resultMap, nil}func ListAllByRoutingNodeWithDomain(egs []schema.Egress, nodeID string) (egWithDomain []models.EgressDomain) {	node, err := GetNodeByID(nodeID)	if err != nil {		return	}	host, err := GetHost(node.HostID.String())	if err != nil {		return	}	for _, egI := range egs {		if !egI.Status || egI.Domain == "" {			continue		}		if _, ok := egI.Nodes[nodeID]; ok {			egWithDomain = append(egWithDomain, models.EgressDomain{				ID:     egI.ID,				Domain: egI.Domain,				Node:   node,				Host:   *host,			})		}	}	return}func BaseDomain(host string) string {	parts := strings.Split(host, ".")	if len(parts) < 2 {		return host // not a FQDN	}	return strings.Join(parts[len(parts)-2:], ".")}
 |