migrate.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224
  1. package controller
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "net/http"
  7. "time"
  8. "github.com/google/uuid"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/mq"
  14. "github.com/gravitl/netmaker/servercfg"
  15. "golang.org/x/crypto/bcrypt"
  16. "golang.org/x/exp/slog"
  17. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  18. )
  19. // swagger:route PUT /api/v1/nodes/migrate nodes migrateData
  20. //
  21. // Used to migrate a legacy node.
  22. //
  23. // Schemes: https
  24. //
  25. // Security:
  26. // oauth
  27. //
  28. // Responses:
  29. // 200: hostPull
  30. func migrate(w http.ResponseWriter, r *http.Request) {
  31. data := models.MigrationData{}
  32. host := models.Host{}
  33. node := models.Node{}
  34. nodes := []models.Node{}
  35. server := models.ServerConfig{}
  36. err := json.NewDecoder(r.Body).Decode(&data)
  37. if err != nil {
  38. logger.Log(0, r.Header.Get("user"), "error decoding request body: ", err.Error())
  39. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  40. return
  41. }
  42. for i, legacy := range data.LegacyNodes {
  43. record, err := database.FetchRecord(database.NODES_TABLE_NAME, legacy.ID)
  44. if err != nil {
  45. slog.Error("legacy node not found", "error", err)
  46. logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("legacy node not found %w", err), "badrequest"))
  47. return
  48. }
  49. var legacyNode models.LegacyNode
  50. if err = json.Unmarshal([]byte(record), &legacyNode); err != nil {
  51. slog.Error("decoding legacy node", "errror", err)
  52. logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("decode legacy node %w", err), "badrequest"))
  53. return
  54. }
  55. if err := bcrypt.CompareHashAndPassword([]byte(legacyNode.Password), []byte(legacy.Password)); err != nil {
  56. slog.Error("legacy node invalid password", "error", err)
  57. logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("invalid password %w", err), "unauthorized"))
  58. return
  59. }
  60. if i == 0 {
  61. host, node = convertLegacyHostNode(legacy)
  62. host.Name = data.HostName
  63. host.HostPass = data.Password
  64. host.OS = data.OS
  65. if err := logic.CreateHost(&host); err != nil {
  66. slog.Error("create host", "error", err)
  67. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  68. return
  69. }
  70. server = servercfg.GetServerInfo()
  71. if servercfg.GetBrokerType() == servercfg.EmqxBrokerType {
  72. server.MQUserName = host.ID.String()
  73. }
  74. key, keyErr := logic.RetrievePublicTrafficKey()
  75. if keyErr != nil {
  76. slog.Error("retrieving traffickey", "error", err)
  77. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  78. return
  79. }
  80. server.TrafficKey = key
  81. } else {
  82. node = convertLegacyNode(legacyNode, host.ID)
  83. }
  84. if err := logic.UpsertNode(&node); err != nil {
  85. slog.Error("update node", "error", err)
  86. continue
  87. }
  88. host.Nodes = append(host.Nodes, node.ID.String())
  89. nodes = append(nodes, node)
  90. }
  91. if err := logic.UpsertHost(&host); err != nil {
  92. slog.Error("save host", "error", err)
  93. }
  94. go mq.PublishPeerUpdate()
  95. response := models.HostPull{
  96. Host: host,
  97. Nodes: nodes,
  98. ServerConfig: server,
  99. }
  100. w.WriteHeader(http.StatusOK)
  101. json.NewEncoder(w).Encode(&response)
  102. slog.Info("migrated nodes")
  103. // check for gateways
  104. for _, node := range data.LegacyNodes {
  105. if node.IsEgressGateway == "yes" {
  106. egressGateway := models.EgressGatewayRequest{
  107. NodeID: node.ID,
  108. Ranges: node.EgressGatewayRanges,
  109. NatEnabled: node.EgressGatewayNatEnabled,
  110. }
  111. if _, err := logic.CreateEgressGateway(egressGateway); err != nil {
  112. logger.Log(0, "error creating egress gateway for node", node.ID, err.Error())
  113. }
  114. }
  115. if node.IsIngressGateway == "yes" {
  116. ingressGateway := models.IngressRequest{}
  117. ingressNode, err := logic.CreateIngressGateway(node.Network, node.ID, ingressGateway)
  118. if err != nil {
  119. logger.Log(0, "error creating ingress gateway for node", node.ID, err.Error())
  120. }
  121. go func() {
  122. if err := mq.NodeUpdate(&ingressNode); err != nil {
  123. slog.Error("error publishing node update to node", "node", ingressNode.ID, "error", err)
  124. }
  125. }()
  126. }
  127. }
  128. }
  129. func convertLegacyHostNode(legacy models.LegacyNode) (models.Host, models.Node) {
  130. //convert host
  131. host := models.Host{}
  132. host.ID = uuid.New()
  133. host.IPForwarding = models.ParseBool(legacy.IPForwarding)
  134. host.AutoUpdate = servercfg.AutoUpdateEnabled()
  135. host.Interface = "netmaker"
  136. host.ListenPort = int(legacy.ListenPort)
  137. if host.ListenPort == 0 {
  138. host.ListenPort = 51821
  139. }
  140. host.MTU = int(legacy.MTU)
  141. host.PublicKey, _ = wgtypes.ParseKey(legacy.PublicKey)
  142. host.MacAddress = net.HardwareAddr(legacy.MacAddress)
  143. host.TrafficKeyPublic = legacy.TrafficKeys.Mine
  144. host.Nodes = append([]string{}, legacy.ID)
  145. host.Interfaces = legacy.Interfaces
  146. //host.DefaultInterface = legacy.Defaul
  147. host.EndpointIP = net.ParseIP(legacy.Endpoint)
  148. host.IsDocker = models.ParseBool(legacy.IsDocker)
  149. host.IsK8S = models.ParseBool(legacy.IsK8S)
  150. host.IsStatic = models.ParseBool(legacy.IsStatic)
  151. host.PersistentKeepalive = time.Duration(legacy.PersistentKeepalive)
  152. if host.PersistentKeepalive == 0 {
  153. host.PersistentKeepalive = models.DefaultPersistentKeepAlive
  154. }
  155. node := convertLegacyNode(legacy, host.ID)
  156. return host, node
  157. }
  158. func convertLegacyNode(legacy models.LegacyNode, hostID uuid.UUID) models.Node {
  159. //convert node
  160. node := models.Node{}
  161. node.ID, _ = uuid.Parse(legacy.ID)
  162. node.HostID = hostID
  163. node.Network = legacy.Network
  164. valid4 := true
  165. valid6 := true
  166. _, cidr4, err := net.ParseCIDR(legacy.NetworkSettings.AddressRange)
  167. if err != nil {
  168. valid4 = false
  169. slog.Warn("parsing address range", "error", err)
  170. } else {
  171. node.NetworkRange = *cidr4
  172. }
  173. _, cidr6, err := net.ParseCIDR(legacy.NetworkSettings.AddressRange6)
  174. if err != nil {
  175. valid6 = false
  176. slog.Warn("parsing address range6", "error", err)
  177. } else {
  178. node.NetworkRange6 = *cidr6
  179. }
  180. node.Server = servercfg.GetServer()
  181. node.Connected = models.ParseBool(legacy.Connected)
  182. if valid4 {
  183. node.Address = net.IPNet{
  184. IP: net.ParseIP(legacy.Address),
  185. Mask: cidr4.Mask,
  186. }
  187. }
  188. if valid6 {
  189. node.Address6 = net.IPNet{
  190. IP: net.ParseIP(legacy.Address6),
  191. Mask: cidr6.Mask,
  192. }
  193. }
  194. node.Action = models.NODE_NOOP
  195. node.LocalAddress = net.IPNet{
  196. IP: net.ParseIP(legacy.LocalAddress),
  197. }
  198. node.IsEgressGateway = models.ParseBool(legacy.IsEgressGateway)
  199. node.EgressGatewayRanges = legacy.EgressGatewayRanges
  200. node.IsIngressGateway = models.ParseBool(legacy.IsIngressGateway)
  201. node.IsRelayed = false
  202. node.IsRelay = false
  203. node.RelayedNodes = []string{}
  204. node.DNSOn = models.ParseBool(legacy.DNSOn)
  205. node.LastModified = time.Now()
  206. node.ExpirationDateTime = time.Unix(legacy.ExpirationDateTime, 0)
  207. node.EgressGatewayNatEnabled = models.ParseBool(legacy.EgressGatewayNatEnabled)
  208. node.EgressGatewayRequest = legacy.EgressGatewayRequest
  209. node.IngressGatewayRange = legacy.IngressGatewayRange
  210. node.IngressGatewayRange6 = legacy.IngressGatewayRange6
  211. node.DefaultACL = legacy.DefaultACL
  212. node.OwnerID = legacy.OwnerID
  213. node.FailoverNode, _ = uuid.Parse(legacy.FailoverNode)
  214. node.Failover = models.ParseBool(legacy.Failover)
  215. return node
  216. }