nodeHttpController.go 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "log"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/gorilla/mux"
  11. "github.com/gravitl/netmaker/database"
  12. "github.com/gravitl/netmaker/functions"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/servercfg"
  15. "golang.org/x/crypto/bcrypt"
  16. )
  17. func nodeHandlers(r *mux.Router) {
  18. r.HandleFunc("/api/nodes", authorize(false, "user", http.HandlerFunc(getAllNodes))).Methods("GET")
  19. r.HandleFunc("/api/nodes/{network}", authorize(true, "network", http.HandlerFunc(getNetworkNodes))).Methods("GET")
  20. r.HandleFunc("/api/nodes/{network}/{macaddress}", authorize(true, "node", http.HandlerFunc(getNode))).Methods("GET")
  21. r.HandleFunc("/api/nodes/{network}/{macaddress}", authorize(true, "node", http.HandlerFunc(updateNode))).Methods("PUT")
  22. r.HandleFunc("/api/nodes/{network}/{macaddress}", authorize(true, "node", http.HandlerFunc(deleteNode))).Methods("DELETE")
  23. r.HandleFunc("/api/nodes/{network}/{macaddress}/checkin", authorize(true, "node", http.HandlerFunc(checkIn))).Methods("POST")
  24. r.HandleFunc("/api/nodes/{network}/{macaddress}/creategateway", authorize(true, "user", http.HandlerFunc(createEgressGateway))).Methods("POST")
  25. r.HandleFunc("/api/nodes/{network}/{macaddress}/deletegateway", authorize(true, "user", http.HandlerFunc(deleteEgressGateway))).Methods("DELETE")
  26. r.HandleFunc("/api/nodes/{network}/{macaddress}/createingress", securityCheck(false, http.HandlerFunc(createIngressGateway))).Methods("POST")
  27. r.HandleFunc("/api/nodes/{network}/{macaddress}/deleteingress", securityCheck(false, http.HandlerFunc(deleteIngressGateway))).Methods("DELETE")
  28. r.HandleFunc("/api/nodes/{network}/{macaddress}/approve", authorize(true, "user", http.HandlerFunc(uncordonNode))).Methods("POST")
  29. r.HandleFunc("/api/nodes/{network}", createNode).Methods("POST")
  30. r.HandleFunc("/api/nodes/adm/{network}/lastmodified", authorize(true, "network", http.HandlerFunc(getLastModified))).Methods("GET")
  31. r.HandleFunc("/api/nodes/adm/{network}/authenticate", authenticate).Methods("POST")
  32. }
  33. //Node authenticates using its password and retrieves a JWT for authorization.
  34. func authenticate(response http.ResponseWriter, request *http.Request) {
  35. var params = mux.Vars(request)
  36. networkname := params["network"]
  37. //Auth request consists of Mac Address and Password (from node that is authorizing
  38. //in case of Master, auth is ignored and mac is set to "mastermac"
  39. var authRequest models.AuthParams
  40. var result models.Node
  41. var errorResponse = models.ErrorResponse{
  42. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  43. }
  44. //Get password fnd mac rom request
  45. decoder := json.NewDecoder(request.Body)
  46. decoderErr := decoder.Decode(&authRequest)
  47. defer request.Body.Close()
  48. if decoderErr != nil {
  49. errorResponse.Code = http.StatusBadRequest
  50. errorResponse.Message = decoderErr.Error()
  51. returnErrorResponse(response, request, errorResponse)
  52. return
  53. } else {
  54. errorResponse.Code = http.StatusBadRequest
  55. if authRequest.MacAddress == "" {
  56. errorResponse.Message = "W1R3: MacAddress can't be empty"
  57. returnErrorResponse(response, request, errorResponse)
  58. return
  59. } else if authRequest.Password == "" {
  60. errorResponse.Message = "W1R3: Password can't be empty"
  61. returnErrorResponse(response, request, errorResponse)
  62. return
  63. } else {
  64. //Search DB for node with Mac Address. Ignore pending nodes (they should not be able to authenticate with API untill approved).
  65. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  66. if err != nil {
  67. errorResponse.Code = http.StatusBadRequest
  68. errorResponse.Message = err.Error()
  69. returnErrorResponse(response, request, errorResponse)
  70. return
  71. }
  72. for _, value := range collection {
  73. if err := json.Unmarshal([]byte(value), &result); err != nil {
  74. continue
  75. }
  76. if result.MacAddress == authRequest.MacAddress && result.IsPending != "yes" && result.Network == networkname {
  77. break
  78. }
  79. }
  80. if err != nil {
  81. errorResponse.Code = http.StatusBadRequest
  82. errorResponse.Message = err.Error()
  83. returnErrorResponse(response, request, errorResponse)
  84. return
  85. }
  86. //compare password from request to stored password in database
  87. //might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  88. //TODO: Consider a way of hashing the password client side before sending, or using certificates
  89. err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(authRequest.Password))
  90. if err != nil {
  91. errorResponse.Code = http.StatusBadRequest
  92. errorResponse.Message = err.Error()
  93. returnErrorResponse(response, request, errorResponse)
  94. return
  95. } else {
  96. //Create a new JWT for the node
  97. tokenString, _ := functions.CreateJWT(authRequest.MacAddress, result.Network)
  98. if tokenString == "" {
  99. errorResponse.Code = http.StatusBadRequest
  100. errorResponse.Message = "Could not create Token"
  101. returnErrorResponse(response, request, errorResponse)
  102. return
  103. }
  104. var successResponse = models.SuccessResponse{
  105. Code: http.StatusOK,
  106. Message: "W1R3: Device " + authRequest.MacAddress + " Authorized",
  107. Response: models.SuccessfulLoginResponse{
  108. AuthToken: tokenString,
  109. MacAddress: authRequest.MacAddress,
  110. },
  111. }
  112. //Send back the JWT
  113. successJSONResponse, jsonError := json.Marshal(successResponse)
  114. if jsonError != nil {
  115. errorResponse.Code = http.StatusBadRequest
  116. errorResponse.Message = err.Error()
  117. returnErrorResponse(response, request, errorResponse)
  118. return
  119. }
  120. response.WriteHeader(http.StatusOK)
  121. response.Header().Set("Content-Type", "application/json")
  122. response.Write(successJSONResponse)
  123. }
  124. }
  125. }
  126. }
  127. //The middleware for most requests to the API
  128. //They all pass through here first
  129. //This will validate the JWT (or check for master token)
  130. //This will also check against the authNetwork and make sure the node should be accessing that endpoint,
  131. //even if it's technically ok
  132. //This is kind of a poor man's RBAC. There's probably a better/smarter way.
  133. //TODO: Consider better RBAC implementations
  134. func authorize(networkCheck bool, authNetwork string, next http.Handler) http.HandlerFunc {
  135. return func(w http.ResponseWriter, r *http.Request) {
  136. var errorResponse = models.ErrorResponse{
  137. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  138. }
  139. var params = mux.Vars(r)
  140. networkexists, _ := functions.NetworkExists(params["network"])
  141. //check that the request is for a valid network
  142. //if (networkCheck && !networkexists) || err != nil {
  143. if networkCheck && !networkexists {
  144. errorResponse = models.ErrorResponse{
  145. Code: http.StatusNotFound, Message: "W1R3: This network does not exist. ",
  146. }
  147. returnErrorResponse(w, r, errorResponse)
  148. return
  149. } else {
  150. w.Header().Set("Content-Type", "application/json")
  151. //get the auth token
  152. bearerToken := r.Header.Get("Authorization")
  153. var tokenSplit = strings.Split(bearerToken, " ")
  154. //I put this in in case the user doesn't put in a token at all (in which case it's empty)
  155. //There's probably a smarter way of handling this.
  156. var authToken = "928rt238tghgwe@TY@$Y@#WQAEGB2FC#@HG#@$Hddd"
  157. if len(tokenSplit) > 1 {
  158. authToken = tokenSplit[1]
  159. } else {
  160. errorResponse = models.ErrorResponse{
  161. Code: http.StatusUnauthorized, Message: "W1R3: Missing Auth Token.",
  162. }
  163. returnErrorResponse(w, r, errorResponse)
  164. return
  165. }
  166. //This checks if
  167. //A: the token is the master password
  168. //B: the token corresponds to a mac address, and if so, which one
  169. //TODO: There's probably a better way of dealing with the "master token"/master password. Plz Halp.
  170. var isAuthorized = false
  171. var macaddress = ""
  172. username, networks, isadmin, errN := functions.VerifyUserToken(authToken)
  173. isnetadmin := isadmin
  174. if errN == nil && isadmin {
  175. macaddress = "mastermac"
  176. isAuthorized = true
  177. } else {
  178. mac, _, err := functions.VerifyToken(authToken)
  179. if err != nil {
  180. errorResponse = models.ErrorResponse{
  181. Code: http.StatusUnauthorized, Message: "W1R3: Error Verifying Auth Token.",
  182. }
  183. returnErrorResponse(w, r, errorResponse)
  184. return
  185. }
  186. macaddress = mac
  187. }
  188. if !isadmin && params["network"] != "" {
  189. if functions.SliceContains(networks, params["network"]) {
  190. isnetadmin = true
  191. }
  192. }
  193. //The mastermac (login with masterkey from config) can do everything!! May be dangerous.
  194. if macaddress == "mastermac" {
  195. isAuthorized = true
  196. //for everyone else, there's poor man's RBAC. The "cases" are defined in the routes in the handlers
  197. //So each route defines which access network should be allowed to access it
  198. } else {
  199. switch authNetwork {
  200. case "all":
  201. isAuthorized = true
  202. case "nodes":
  203. isAuthorized = (macaddress != "") || isnetadmin
  204. case "network":
  205. if isnetadmin {
  206. isAuthorized = true
  207. } else {
  208. node, err := functions.GetNodeByMacAddress(params["network"], macaddress)
  209. if err != nil {
  210. errorResponse = models.ErrorResponse{
  211. Code: http.StatusUnauthorized, Message: "W1R3: Missing Auth Token.",
  212. }
  213. returnErrorResponse(w, r, errorResponse)
  214. return
  215. }
  216. isAuthorized = (node.Network == params["network"])
  217. }
  218. case "node":
  219. if isnetadmin {
  220. isAuthorized = true
  221. } else {
  222. isAuthorized = (macaddress == params["macaddress"])
  223. }
  224. case "user":
  225. isAuthorized = true
  226. default:
  227. isAuthorized = false
  228. }
  229. }
  230. if !isAuthorized {
  231. errorResponse = models.ErrorResponse{
  232. Code: http.StatusUnauthorized, Message: "W1R3: You are unauthorized to access this endpoint.",
  233. }
  234. returnErrorResponse(w, r, errorResponse)
  235. return
  236. } else {
  237. //If authorized, this function passes along it's request and output to the appropriate route function.
  238. if username == "" {
  239. username = "(user not found)"
  240. }
  241. r.Header.Set("user", username)
  242. next.ServeHTTP(w, r)
  243. }
  244. }
  245. }
  246. }
  247. //Gets all nodes associated with network, including pending nodes
  248. func getNetworkNodes(w http.ResponseWriter, r *http.Request) {
  249. w.Header().Set("Content-Type", "application/json")
  250. var nodes []models.Node
  251. var params = mux.Vars(r)
  252. networkName := params["network"]
  253. nodes, err := GetNetworkNodes(networkName)
  254. if err != nil {
  255. returnErrorResponse(w, r, formatError(err, "internal"))
  256. return
  257. }
  258. //Returns all the nodes in JSON format
  259. functions.PrintUserLog(r.Header.Get("user"), "fetched nodes on network"+networkName, 2)
  260. w.WriteHeader(http.StatusOK)
  261. json.NewEncoder(w).Encode(nodes)
  262. }
  263. func GetNetworkNodes(network string) ([]models.Node, error) {
  264. var nodes []models.Node
  265. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  266. if err != nil {
  267. return nodes, err
  268. }
  269. for _, value := range collection {
  270. var node models.Node
  271. err := json.Unmarshal([]byte(value), &node)
  272. if err != nil {
  273. continue
  274. }
  275. if node.Network == network {
  276. nodes = append(nodes, node)
  277. }
  278. }
  279. return nodes, nil
  280. }
  281. //A separate function to get all nodes, not just nodes for a particular network.
  282. //Not quite sure if this is necessary. Probably necessary based on front end but may want to review after iteration 1 if it's being used or not
  283. func getAllNodes(w http.ResponseWriter, r *http.Request) {
  284. w.Header().Set("Content-Type", "application/json")
  285. user, err := functions.GetUser(r.Header.Get("user"))
  286. if err != nil {
  287. returnErrorResponse(w, r, formatError(err, "internal"))
  288. return
  289. }
  290. var nodes []models.Node
  291. if user.IsAdmin {
  292. nodes, err = models.GetAllNodes()
  293. if err != nil {
  294. returnErrorResponse(w, r, formatError(err, "internal"))
  295. return
  296. }
  297. } else {
  298. nodes, err = getUsersNodes(user)
  299. if err != nil {
  300. returnErrorResponse(w, r, formatError(err, "internal"))
  301. return
  302. }
  303. }
  304. //Return all the nodes in JSON format
  305. functions.PrintUserLog(r.Header.Get("user"), "fetched nodes", 2)
  306. w.WriteHeader(http.StatusOK)
  307. json.NewEncoder(w).Encode(nodes)
  308. }
  309. func getUsersNodes(user models.User) ([]models.Node, error) {
  310. var nodes []models.Node
  311. var err error
  312. for _, networkName := range user.Networks {
  313. tmpNodes, err := GetNetworkNodes(networkName)
  314. if err != nil {
  315. continue
  316. }
  317. nodes = append(nodes, tmpNodes...)
  318. }
  319. return nodes, err
  320. }
  321. //This function get's called when a node "checks in" at check in interval
  322. //Honestly I'm not sure what all it should be doing
  323. //TODO: Implement the necessary stuff, including the below
  324. //Check the last modified of the network
  325. //Check the last modified of the nodes
  326. //Write functions for responding to these two thingies
  327. func checkIn(w http.ResponseWriter, r *http.Request) {
  328. //TODO: Current thoughts:
  329. //Dont bother with a networklastmodified
  330. //Instead, implement a "configupdate" boolean on nodes
  331. //when there is a network update that requrires a config update, then the node will pull its new config
  332. // set header.
  333. w.Header().Set("Content-Type", "application/json")
  334. var params = mux.Vars(r)
  335. node, err := CheckIn(params["network"], params["macaddress"])
  336. if err != nil {
  337. returnErrorResponse(w, r, formatError(err, "internal"))
  338. return
  339. }
  340. w.WriteHeader(http.StatusOK)
  341. json.NewEncoder(w).Encode(node)
  342. }
  343. func CheckIn(network string, macaddress string) (models.Node, error) {
  344. var node models.Node
  345. node, err := GetNode(macaddress, network)
  346. key, err := functions.GetRecordKey(macaddress, network)
  347. if err != nil {
  348. return node, err
  349. }
  350. time := time.Now().Unix()
  351. node.LastCheckIn = time
  352. data, err := json.Marshal(&node)
  353. if err != nil {
  354. return node, err
  355. }
  356. err = database.Insert(key, string(data), database.NODES_TABLE_NAME)
  357. return node, err
  358. }
  359. //Get an individual node. Nothin fancy here folks.
  360. func getNode(w http.ResponseWriter, r *http.Request) {
  361. // set header.
  362. w.Header().Set("Content-Type", "application/json")
  363. var params = mux.Vars(r)
  364. node, err := GetNode(params["macaddress"], params["network"])
  365. if err != nil {
  366. returnErrorResponse(w, r, formatError(err, "internal"))
  367. return
  368. }
  369. functions.PrintUserLog(r.Header.Get("user"), "fetched node "+params["macaddress"], 2)
  370. w.WriteHeader(http.StatusOK)
  371. json.NewEncoder(w).Encode(node)
  372. }
  373. //Get the time that a network of nodes was last modified.
  374. //TODO: This needs to be refactored
  375. //Potential way to do this: On UpdateNode, set a new field for "LastModified"
  376. //If we go with the existing way, we need to at least set network.NodesLastModified on UpdateNode
  377. func getLastModified(w http.ResponseWriter, r *http.Request) {
  378. // set header.
  379. w.Header().Set("Content-Type", "application/json")
  380. var params = mux.Vars(r)
  381. network, err := GetNetwork(params["network"])
  382. if err != nil {
  383. returnErrorResponse(w, r, formatError(err, "internal"))
  384. return
  385. }
  386. functions.PrintUserLog(r.Header.Get("user"), "called last modified", 2)
  387. w.WriteHeader(http.StatusOK)
  388. json.NewEncoder(w).Encode(network.NodesLastModified)
  389. }
  390. func createNode(w http.ResponseWriter, r *http.Request) {
  391. w.Header().Set("Content-Type", "application/json")
  392. var params = mux.Vars(r)
  393. var errorResponse = models.ErrorResponse{
  394. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  395. }
  396. networkName := params["network"]
  397. networkexists, err := functions.NetworkExists(networkName)
  398. if err != nil {
  399. returnErrorResponse(w, r, formatError(err, "internal"))
  400. return
  401. } else if !networkexists {
  402. errorResponse = models.ErrorResponse{
  403. Code: http.StatusNotFound, Message: "W1R3: Network does not exist! ",
  404. }
  405. returnErrorResponse(w, r, errorResponse)
  406. return
  407. }
  408. var node models.Node
  409. //get node from body of request
  410. err = json.NewDecoder(r.Body).Decode(&node)
  411. if err != nil {
  412. returnErrorResponse(w, r, formatError(err, "internal"))
  413. return
  414. }
  415. node.Network = networkName
  416. network, err := node.GetNetwork()
  417. if err != nil {
  418. returnErrorResponse(w, r, formatError(err, "internal"))
  419. return
  420. }
  421. //Check to see if key is valid
  422. //TODO: Triple inefficient!!! This is the third call to the DB we make for networks
  423. validKey := functions.IsKeyValid(networkName, node.AccessKey)
  424. if !validKey {
  425. //Check to see if network will allow manual sign up
  426. //may want to switch this up with the valid key check and avoid a DB call that way.
  427. if network.AllowManualSignUp == "yes" {
  428. node.IsPending = "yes"
  429. } else {
  430. errorResponse = models.ErrorResponse{
  431. Code: http.StatusUnauthorized, Message: "W1R3: Key invalid, or none provided.",
  432. }
  433. returnErrorResponse(w, r, errorResponse)
  434. return
  435. }
  436. }
  437. node, err = CreateNode(node, networkName)
  438. if err != nil {
  439. returnErrorResponse(w, r, formatError(err, "internal"))
  440. return
  441. }
  442. functions.PrintUserLog(r.Header.Get("user"), "created new node "+node.Name+" on network "+node.Network, 1)
  443. w.WriteHeader(http.StatusOK)
  444. json.NewEncoder(w).Encode(node)
  445. }
  446. //Takes node out of pending state
  447. //TODO: May want to use cordon/uncordon terminology instead of "ispending".
  448. func uncordonNode(w http.ResponseWriter, r *http.Request) {
  449. var params = mux.Vars(r)
  450. w.Header().Set("Content-Type", "application/json")
  451. node, err := UncordonNode(params["network"], params["macaddress"])
  452. if err != nil {
  453. returnErrorResponse(w, r, formatError(err, "internal"))
  454. return
  455. }
  456. functions.PrintUserLog(r.Header.Get("user"), "uncordoned node "+node.Name, 1)
  457. w.WriteHeader(http.StatusOK)
  458. json.NewEncoder(w).Encode("SUCCESS")
  459. }
  460. func UncordonNode(network, macaddress string) (models.Node, error) {
  461. node, err := functions.GetNodeByMacAddress(network, macaddress)
  462. if err != nil {
  463. return models.Node{}, err
  464. }
  465. node.SetLastModified()
  466. node.IsPending = "no"
  467. data, err := json.Marshal(&node)
  468. if err != nil {
  469. return node, err
  470. }
  471. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  472. if err != nil {
  473. return node, err
  474. }
  475. err = database.Insert(key, string(data), database.NODES_TABLE_NAME)
  476. return node, err
  477. }
  478. func createEgressGateway(w http.ResponseWriter, r *http.Request) {
  479. var gateway models.EgressGatewayRequest
  480. var params = mux.Vars(r)
  481. w.Header().Set("Content-Type", "application/json")
  482. err := json.NewDecoder(r.Body).Decode(&gateway)
  483. if err != nil {
  484. returnErrorResponse(w, r, formatError(err, "internal"))
  485. return
  486. }
  487. gateway.NetID = params["network"]
  488. gateway.NodeID = params["macaddress"]
  489. node, err := CreateEgressGateway(gateway)
  490. if err != nil {
  491. returnErrorResponse(w, r, formatError(err, "internal"))
  492. return
  493. }
  494. functions.PrintUserLog(r.Header.Get("user"), "created egress gateway on node "+gateway.NodeID+" on network "+gateway.NetID, 1)
  495. w.WriteHeader(http.StatusOK)
  496. json.NewEncoder(w).Encode(node)
  497. }
  498. func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {
  499. node, err := functions.GetNodeByMacAddress(gateway.NetID, gateway.NodeID)
  500. if err != nil {
  501. return models.Node{}, err
  502. }
  503. err = ValidateEgressGateway(gateway)
  504. if err != nil {
  505. return models.Node{}, err
  506. }
  507. node.IsEgressGateway = "yes"
  508. node.EgressGatewayRanges = gateway.Ranges
  509. postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  510. postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  511. if gateway.PostUp != "" {
  512. postUpCmd = gateway.PostUp
  513. }
  514. if gateway.PostDown != "" {
  515. postDownCmd = gateway.PostDown
  516. }
  517. if node.PostUp != "" {
  518. if !strings.Contains(node.PostUp, postUpCmd) {
  519. node.PostUp = node.PostUp + "; " + postUpCmd
  520. }
  521. }
  522. if node.PostDown != "" {
  523. if !strings.Contains(node.PostDown, postDownCmd) {
  524. node.PostDown = node.PostDown + "; " + postDownCmd
  525. }
  526. }
  527. key, err := functions.GetRecordKey(gateway.NodeID, gateway.NetID)
  528. if err != nil {
  529. return node, err
  530. }
  531. nodeData, err := json.Marshal(&node)
  532. if err != nil {
  533. return node, err
  534. }
  535. node.SetLastModified()
  536. err = database.Insert(key, string(nodeData), database.NODES_TABLE_NAME)
  537. // prepare update model.
  538. if err != nil {
  539. return models.Node{}, err
  540. }
  541. err = SetNetworkNodesLastModified(gateway.NetID)
  542. return node, err
  543. }
  544. func ValidateEgressGateway(gateway models.EgressGatewayRequest) error {
  545. var err error
  546. //isIp := functions.IsIpCIDR(gateway.RangeString)
  547. empty := len(gateway.Ranges) == 0
  548. if empty {
  549. err = errors.New("IP Ranges Cannot Be Empty")
  550. }
  551. empty = gateway.Interface == ""
  552. if empty {
  553. err = errors.New("Interface cannot be empty")
  554. }
  555. return err
  556. }
  557. func deleteEgressGateway(w http.ResponseWriter, r *http.Request) {
  558. w.Header().Set("Content-Type", "application/json")
  559. var params = mux.Vars(r)
  560. nodeMac := params["macaddress"]
  561. netid := params["network"]
  562. node, err := DeleteEgressGateway(netid, nodeMac)
  563. if err != nil {
  564. returnErrorResponse(w, r, formatError(err, "internal"))
  565. return
  566. }
  567. functions.PrintUserLog(r.Header.Get("user"), "delete egress gateway "+nodeMac+" on network "+netid, 1)
  568. w.WriteHeader(http.StatusOK)
  569. json.NewEncoder(w).Encode(node)
  570. }
  571. func DeleteEgressGateway(network, macaddress string) (models.Node, error) {
  572. node, err := functions.GetNodeByMacAddress(network, macaddress)
  573. if err != nil {
  574. return models.Node{}, err
  575. }
  576. node.IsEgressGateway = "no"
  577. node.EgressGatewayRanges = []string{}
  578. node.PostUp = ""
  579. node.PostDown = ""
  580. node.SetLastModified()
  581. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  582. if err != nil {
  583. return models.Node{}, err
  584. }
  585. data, err := json.Marshal(&node)
  586. if err != nil {
  587. return models.Node{}, err
  588. }
  589. err = database.Insert(key, string(data), database.NODES_TABLE_NAME)
  590. if err != nil {
  591. return models.Node{}, err
  592. }
  593. err = SetNetworkNodesLastModified(network)
  594. if err != nil {
  595. return models.Node{}, err
  596. }
  597. return node, nil
  598. }
  599. // == INGRESS ==
  600. func createIngressGateway(w http.ResponseWriter, r *http.Request) {
  601. var params = mux.Vars(r)
  602. w.Header().Set("Content-Type", "application/json")
  603. nodeMac := params["macaddress"]
  604. netid := params["network"]
  605. node, err := CreateIngressGateway(netid, nodeMac)
  606. if err != nil {
  607. returnErrorResponse(w, r, formatError(err, "internal"))
  608. return
  609. }
  610. functions.PrintUserLog(r.Header.Get("user"), "created ingress gateway on node "+nodeMac+" on network "+netid, 1)
  611. w.WriteHeader(http.StatusOK)
  612. json.NewEncoder(w).Encode(node)
  613. }
  614. func CreateIngressGateway(netid string, macaddress string) (models.Node, error) {
  615. node, err := functions.GetNodeByMacAddress(netid, macaddress)
  616. if err != nil {
  617. return models.Node{}, err
  618. }
  619. network, err := functions.GetParentNetwork(netid)
  620. if err != nil {
  621. log.Println("Could not find network.")
  622. return models.Node{}, err
  623. }
  624. node.IsIngressGateway = "yes"
  625. node.IngressGatewayRange = network.AddressRange
  626. postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  627. postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  628. if node.PostUp != "" {
  629. if !strings.Contains(node.PostUp, postUpCmd) {
  630. node.PostUp = node.PostUp + "; " + postUpCmd
  631. }
  632. }
  633. if node.PostDown != "" {
  634. if !strings.Contains(node.PostDown, postDownCmd) {
  635. node.PostDown = node.PostDown + "; " + postDownCmd
  636. }
  637. }
  638. node.SetLastModified()
  639. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  640. if err != nil {
  641. return models.Node{}, err
  642. }
  643. data, err := json.Marshal(&node)
  644. if err != nil {
  645. return models.Node{}, err
  646. }
  647. err = database.Insert(key, string(data), database.NODES_TABLE_NAME)
  648. if err != nil {
  649. return models.Node{}, err
  650. }
  651. err = SetNetworkNodesLastModified(netid)
  652. return node, err
  653. }
  654. func deleteIngressGateway(w http.ResponseWriter, r *http.Request) {
  655. w.Header().Set("Content-Type", "application/json")
  656. var params = mux.Vars(r)
  657. nodeMac := params["macaddress"]
  658. node, err := DeleteIngressGateway(params["network"], nodeMac)
  659. if err != nil {
  660. returnErrorResponse(w, r, formatError(err, "internal"))
  661. return
  662. }
  663. functions.PrintUserLog(r.Header.Get("user"), "deleted ingress gateway"+nodeMac, 1)
  664. w.WriteHeader(http.StatusOK)
  665. json.NewEncoder(w).Encode(node)
  666. }
  667. func DeleteIngressGateway(network, macaddress string) (models.Node, error) {
  668. node, err := functions.GetNodeByMacAddress(network, macaddress)
  669. if err != nil {
  670. return models.Node{}, err
  671. }
  672. node.LastModified = time.Now().Unix()
  673. node.IsIngressGateway = "no"
  674. key, err := functions.GetRecordKey(node.MacAddress, node.Network)
  675. if err != nil {
  676. return models.Node{}, err
  677. }
  678. data, err := json.Marshal(&node)
  679. if err != nil {
  680. return models.Node{}, err
  681. }
  682. err = database.Insert(key, string(data), database.NODES_TABLE_NAME)
  683. if err != nil {
  684. return models.Node{}, err
  685. }
  686. err = SetNetworkNodesLastModified(network)
  687. return node, err
  688. }
  689. func updateNode(w http.ResponseWriter, r *http.Request) {
  690. w.Header().Set("Content-Type", "application/json")
  691. var params = mux.Vars(r)
  692. var node models.Node
  693. //start here
  694. node, err := functions.GetNodeByMacAddress(params["network"], params["macaddress"])
  695. if err != nil {
  696. returnErrorResponse(w, r, formatError(err, "internal"))
  697. return
  698. }
  699. var newNode models.Node
  700. // we decode our body request params
  701. err = json.NewDecoder(r.Body).Decode(&newNode)
  702. if err != nil {
  703. returnErrorResponse(w, r, formatError(err, "badrequest"))
  704. return
  705. }
  706. err = node.Update(&newNode)
  707. if err != nil {
  708. returnErrorResponse(w, r, formatError(err, "internal"))
  709. return
  710. }
  711. if err = SetNetworkNodesLastModified(node.Network); err != nil {
  712. fmt.Println(err)
  713. }
  714. if servercfg.IsDNSMode() {
  715. err = SetDNS()
  716. }
  717. if err != nil {
  718. returnErrorResponse(w, r, formatError(err, "internal"))
  719. return
  720. }
  721. functions.PrintUserLog(r.Header.Get("user"), "updated node "+node.MacAddress+" on network "+node.Network, 1)
  722. w.WriteHeader(http.StatusOK)
  723. json.NewEncoder(w).Encode(newNode)
  724. }
  725. //Delete a node
  726. //Pretty straightforward
  727. func deleteNode(w http.ResponseWriter, r *http.Request) {
  728. // Set header
  729. w.Header().Set("Content-Type", "application/json")
  730. // get params
  731. var params = mux.Vars(r)
  732. err := DeleteNode(params["macaddress"], params["network"])
  733. if err != nil {
  734. returnErrorResponse(w, r, formatError(err, "internal"))
  735. return
  736. }
  737. functions.PrintUserLog(r.Header.Get("user"), "Deleted node "+params["macaddress"]+" from network "+params["network"], 1)
  738. returnSuccessResponse(w, r, params["macaddress"]+" deleted.")
  739. }