util.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. // package for logicing client and server code
  2. package logic
  3. import (
  4. "encoding/base64"
  5. "encoding/json"
  6. "log"
  7. "math/rand"
  8. "strconv"
  9. "strings"
  10. "time"
  11. "github.com/gravitl/netmaker/database"
  12. "github.com/gravitl/netmaker/dnslogic"
  13. "github.com/gravitl/netmaker/functions"
  14. "github.com/gravitl/netmaker/models"
  15. "github.com/gravitl/netmaker/netclient/ncutils"
  16. "github.com/gravitl/netmaker/relay"
  17. "github.com/gravitl/netmaker/servercfg"
  18. "golang.org/x/crypto/bcrypt"
  19. )
  20. // IsBase64 - checks if a string is in base64 format
  21. // This is used to validate public keys (make sure they're base64 encoded like all public keys should be).
  22. func IsBase64(s string) bool {
  23. _, err := base64.StdEncoding.DecodeString(s)
  24. return err == nil
  25. }
  26. // CheckEndpoint - checks if an endpoint is valid
  27. func CheckEndpoint(endpoint string) bool {
  28. endpointarr := strings.Split(endpoint, ":")
  29. return len(endpointarr) == 2
  30. }
  31. // SetNetworkServerPeers - sets the network server peers of a given node
  32. func SetNetworkServerPeers(node *models.Node) {
  33. if currentPeersList, err := GetSystemPeers(node); err == nil {
  34. if database.SetPeers(currentPeersList, node.Network) {
  35. functions.PrintUserLog(models.NODE_SERVER_NAME, "set new peers on network "+node.Network, 1)
  36. }
  37. } else {
  38. functions.PrintUserLog(models.NODE_SERVER_NAME, "could not set peers on network "+node.Network, 1)
  39. functions.PrintUserLog(models.NODE_SERVER_NAME, err.Error(), 1)
  40. }
  41. }
  42. // DeleteNode - deletes a node from database or moves into delete nodes table
  43. func DeleteNode(node *models.Node, exterminate bool) error {
  44. var err error
  45. node.SetID()
  46. var key = node.ID
  47. if !exterminate {
  48. args := strings.Split(key, "###")
  49. node, err := GetNode(args[0], args[1])
  50. if err != nil {
  51. return err
  52. }
  53. node.Action = models.NODE_DELETE
  54. nodedata, err := json.Marshal(&node)
  55. if err != nil {
  56. return err
  57. }
  58. err = database.Insert(key, string(nodedata), database.DELETED_NODES_TABLE_NAME)
  59. if err != nil {
  60. return err
  61. }
  62. } else {
  63. if err := database.DeleteRecord(database.DELETED_NODES_TABLE_NAME, key); err != nil {
  64. Log(err.Error(), 2)
  65. }
  66. }
  67. if err = database.DeleteRecord(database.NODES_TABLE_NAME, key); err != nil {
  68. return err
  69. }
  70. if servercfg.IsDNSMode() {
  71. err = dnslogic.SetDNS()
  72. }
  73. return removeLocalServer(node)
  74. }
  75. // CreateNode - creates a node in database
  76. func CreateNode(node models.Node, networkName string) (models.Node, error) {
  77. //encrypt that password so we never see it
  78. hash, err := bcrypt.GenerateFromPassword([]byte(node.Password), 5)
  79. if err != nil {
  80. return node, err
  81. }
  82. //set password to encrypted password
  83. node.Password = string(hash)
  84. node.Network = networkName
  85. if node.Name == models.NODE_SERVER_NAME {
  86. node.IsServer = "yes"
  87. }
  88. if node.DNSOn == "" {
  89. if servercfg.IsDNSMode() {
  90. node.DNSOn = "yes"
  91. } else {
  92. node.DNSOn = "no"
  93. }
  94. }
  95. node.SetDefaults()
  96. node.Address, err = functions.UniqueAddress(networkName)
  97. if err != nil {
  98. return node, err
  99. }
  100. node.Address6, err = functions.UniqueAddress6(networkName)
  101. if err != nil {
  102. return node, err
  103. }
  104. //Create a JWT for the node
  105. tokenString, _ := functions.CreateJWT(node.MacAddress, networkName)
  106. if tokenString == "" {
  107. //returnErrorResponse(w, r, errorResponse)
  108. return node, err
  109. }
  110. err = node.Validate(false)
  111. if err != nil {
  112. return node, err
  113. }
  114. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  115. if err != nil {
  116. return node, err
  117. }
  118. nodebytes, err := json.Marshal(&node)
  119. if err != nil {
  120. return node, err
  121. }
  122. err = database.Insert(key, string(nodebytes), database.NODES_TABLE_NAME)
  123. if err != nil {
  124. return node, err
  125. }
  126. if node.IsPending != "yes" {
  127. functions.DecrimentKey(node.Network, node.AccessKey)
  128. }
  129. SetNetworkNodesLastModified(node.Network)
  130. if servercfg.IsDNSMode() {
  131. err = dnslogic.SetDNS()
  132. }
  133. return node, err
  134. }
  135. // SetNetworkNodesLastModified - sets the network nodes last modified
  136. func SetNetworkNodesLastModified(networkName string) error {
  137. timestamp := time.Now().Unix()
  138. network, err := functions.GetParentNetwork(networkName)
  139. if err != nil {
  140. return err
  141. }
  142. network.NodesLastModified = timestamp
  143. data, err := json.Marshal(&network)
  144. if err != nil {
  145. return err
  146. }
  147. err = database.Insert(networkName, string(data), database.NETWORKS_TABLE_NAME)
  148. if err != nil {
  149. return err
  150. }
  151. return nil
  152. }
  153. // GetNode - fetches a node from database
  154. func GetNode(macaddress string, network string) (models.Node, error) {
  155. var node models.Node
  156. key, err := functions.GetRecordKey(macaddress, network)
  157. if err != nil {
  158. return node, err
  159. }
  160. data, err := database.FetchRecord(database.NODES_TABLE_NAME, key)
  161. if err != nil {
  162. if data == "" {
  163. data, err = database.FetchRecord(database.DELETED_NODES_TABLE_NAME, key)
  164. err = json.Unmarshal([]byte(data), &node)
  165. }
  166. return node, err
  167. }
  168. if err = json.Unmarshal([]byte(data), &node); err != nil {
  169. return node, err
  170. }
  171. node.SetDefaults()
  172. return node, err
  173. }
  174. // GetNodePeers - fetches peers for a given node
  175. func GetNodePeers(networkName string, excludeRelayed bool) ([]models.Node, error) {
  176. var peers []models.Node
  177. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  178. if err != nil {
  179. if database.IsEmptyRecord(err) {
  180. return peers, nil
  181. }
  182. Log(err.Error(), 2)
  183. return nil, err
  184. }
  185. udppeers, errN := database.GetPeers(networkName)
  186. if errN != nil {
  187. Log(errN.Error(), 2)
  188. }
  189. for _, value := range collection {
  190. var node models.Node
  191. var peer models.Node
  192. err := json.Unmarshal([]byte(value), &node)
  193. if err != nil {
  194. Log(err.Error(), 2)
  195. continue
  196. }
  197. if node.IsEgressGateway == "yes" { // handle egress stuff
  198. peer.EgressGatewayRanges = node.EgressGatewayRanges
  199. peer.IsEgressGateway = node.IsEgressGateway
  200. }
  201. allow := node.IsRelayed != "yes" || !excludeRelayed
  202. if node.Network == networkName && node.IsPending != "yes" && allow {
  203. peer = setPeerInfo(node)
  204. if node.UDPHolePunch == "yes" && errN == nil && CheckEndpoint(udppeers[node.PublicKey]) {
  205. endpointstring := udppeers[node.PublicKey]
  206. endpointarr := strings.Split(endpointstring, ":")
  207. if len(endpointarr) == 2 {
  208. port, err := strconv.Atoi(endpointarr[1])
  209. if err == nil {
  210. peer.Endpoint = endpointarr[0]
  211. peer.ListenPort = int32(port)
  212. }
  213. }
  214. }
  215. if node.IsRelay == "yes" {
  216. network, err := models.GetNetwork(networkName)
  217. if err == nil {
  218. peer.AllowedIPs = append(peer.AllowedIPs, network.AddressRange)
  219. } else {
  220. peer.AllowedIPs = append(peer.AllowedIPs, node.RelayAddrs...)
  221. }
  222. }
  223. peers = append(peers, peer)
  224. }
  225. }
  226. return peers, err
  227. }
  228. // GetPeersList - gets the peers of a given network
  229. func GetPeersList(networkName string, excludeRelayed bool, relayedNodeAddr string) ([]models.Node, error) {
  230. var peers []models.Node
  231. var relayNode models.Node
  232. var err error
  233. if relayedNodeAddr == "" {
  234. peers, err = GetNodePeers(networkName, excludeRelayed)
  235. } else {
  236. relayNode, err = relay.GetNodeRelay(networkName, relayedNodeAddr)
  237. if relayNode.Address != "" {
  238. relayNode = setPeerInfo(relayNode)
  239. network, err := models.GetNetwork(networkName)
  240. if err == nil {
  241. relayNode.AllowedIPs = append(relayNode.AllowedIPs, network.AddressRange)
  242. } else {
  243. relayNode.AllowedIPs = append(relayNode.AllowedIPs, relayNode.RelayAddrs...)
  244. }
  245. nodepeers, err := GetNodePeers(networkName, false)
  246. if err == nil && relayNode.UDPHolePunch == "yes" {
  247. for _, nodepeer := range nodepeers {
  248. if nodepeer.Address == relayNode.Address {
  249. relayNode.Endpoint = nodepeer.Endpoint
  250. relayNode.ListenPort = nodepeer.ListenPort
  251. }
  252. }
  253. }
  254. peers = append(peers, relayNode)
  255. }
  256. }
  257. return peers, err
  258. }
  259. // RandomString - returns a random string in a charset
  260. func RandomString(length int) string {
  261. const charset = "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  262. var seededRand *rand.Rand = rand.New(rand.NewSource(time.Now().UnixNano()))
  263. b := make([]byte, length)
  264. for i := range b {
  265. b[i] = charset[seededRand.Intn(len(charset))]
  266. }
  267. return string(b)
  268. }
  269. func setPeerInfo(node models.Node) models.Node {
  270. var peer models.Node
  271. peer.RelayAddrs = node.RelayAddrs
  272. peer.IsRelay = node.IsRelay
  273. peer.IsServer = node.IsServer
  274. peer.IsRelayed = node.IsRelayed
  275. peer.PublicKey = node.PublicKey
  276. peer.Endpoint = node.Endpoint
  277. peer.Name = node.Name
  278. peer.LocalAddress = node.LocalAddress
  279. peer.ListenPort = node.ListenPort
  280. peer.AllowedIPs = node.AllowedIPs
  281. peer.UDPHolePunch = node.UDPHolePunch
  282. peer.Address = node.Address
  283. peer.Address6 = node.Address6
  284. peer.EgressGatewayRanges = node.EgressGatewayRanges
  285. peer.IsEgressGateway = node.IsEgressGateway
  286. peer.IngressGatewayRange = node.IngressGatewayRange
  287. peer.IsIngressGateway = node.IsIngressGateway
  288. peer.IsPending = node.IsPending
  289. return peer
  290. }
  291. func Log(message string, loglevel int) {
  292. log.SetFlags(log.Flags() &^ (log.Llongfile | log.Lshortfile))
  293. if int32(loglevel) <= servercfg.GetVerbose() && servercfg.GetVerbose() >= 0 {
  294. log.Println("[netmaker] " + message)
  295. }
  296. }
  297. // == Private Methods ==
  298. func setIPForwardingLinux() error {
  299. out, err := ncutils.RunCmd("sysctl net.ipv4.ip_forward", true)
  300. if err != nil {
  301. log.Println("WARNING: Error encountered setting ip forwarding. This can break functionality.")
  302. return err
  303. } else {
  304. s := strings.Fields(string(out))
  305. if s[2] != "1" {
  306. _, err = ncutils.RunCmd("sysctl -w net.ipv4.ip_forward=1", true)
  307. if err != nil {
  308. log.Println("WARNING: Error encountered setting ip forwarding. You may want to investigate this.")
  309. return err
  310. }
  311. }
  312. }
  313. return nil
  314. }