gateway.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "strings"
  6. "time"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/logger"
  9. "github.com/gravitl/netmaker/models"
  10. )
  11. // CreateEgressGateway - creates an egress gateway
  12. func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {
  13. node, err := GetNodeByID(gateway.NodeID)
  14. if err != nil {
  15. return models.Node{}, err
  16. }
  17. if node.OS != "linux" { // add in darwin later
  18. return models.Node{}, errors.New(node.OS + " is unsupported for egress gateways")
  19. }
  20. err = ValidateEgressGateway(gateway)
  21. if err != nil {
  22. return models.Node{}, err
  23. }
  24. node.IsEgressGateway = "yes"
  25. node.EgressGatewayRanges = gateway.Ranges
  26. postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  27. postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"
  28. if gateway.PostUp != "" {
  29. postUpCmd = gateway.PostUp
  30. }
  31. if gateway.PostDown != "" {
  32. postDownCmd = gateway.PostDown
  33. }
  34. if node.PostUp != "" {
  35. if !strings.Contains(node.PostUp, postUpCmd) {
  36. postUpCmd = node.PostUp + "; " + postUpCmd
  37. }
  38. }
  39. if node.PostDown != "" {
  40. if !strings.Contains(node.PostDown, postDownCmd) {
  41. postDownCmd = node.PostDown + "; " + postDownCmd
  42. }
  43. }
  44. node.PostUp = postUpCmd
  45. node.PostDown = postDownCmd
  46. node.SetLastModified()
  47. nodeData, err := json.Marshal(&node)
  48. if err != nil {
  49. return node, err
  50. }
  51. if err = database.Insert(node.ID, string(nodeData), database.NODES_TABLE_NAME); err != nil {
  52. return models.Node{}, err
  53. }
  54. if err = NetworkNodesUpdatePullChanges(node.Network); err != nil {
  55. return models.Node{}, err
  56. }
  57. return node, nil
  58. }
  59. // ValidateEgressGateway - validates the egress gateway model
  60. func ValidateEgressGateway(gateway models.EgressGatewayRequest) error {
  61. var err error
  62. empty := len(gateway.Ranges) == 0
  63. if empty {
  64. err = errors.New("IP Ranges Cannot Be Empty")
  65. }
  66. empty = gateway.Interface == ""
  67. if empty {
  68. err = errors.New("interface cannot be empty")
  69. }
  70. return err
  71. }
  72. // DeleteEgressGateway - deletes egress from node
  73. func DeleteEgressGateway(network, nodeid string) (models.Node, error) {
  74. node, err := GetNodeByID(nodeid)
  75. if err != nil {
  76. return models.Node{}, err
  77. }
  78. node.IsEgressGateway = "no"
  79. node.EgressGatewayRanges = []string{}
  80. node.PostUp = ""
  81. node.PostDown = ""
  82. if node.IsIngressGateway == "yes" { // check if node is still an ingress gateway before completely deleting postdown/up rules
  83. node.PostUp = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  84. node.PostDown = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  85. }
  86. node.SetLastModified()
  87. data, err := json.Marshal(&node)
  88. if err != nil {
  89. return models.Node{}, err
  90. }
  91. if err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME); err != nil {
  92. return models.Node{}, err
  93. }
  94. if err = NetworkNodesUpdatePullChanges(network); err != nil {
  95. return models.Node{}, err
  96. }
  97. return node, nil
  98. }
  99. // CreateIngressGateway - creates an ingress gateway
  100. func CreateIngressGateway(netid string, nodeid string) (models.Node, error) {
  101. node, err := GetNodeByID(nodeid)
  102. if node.OS != "linux" { // add in darwin later
  103. return models.Node{}, errors.New(node.OS + " is unsupported for ingress gateways")
  104. }
  105. if err != nil {
  106. return models.Node{}, err
  107. }
  108. network, err := GetParentNetwork(netid)
  109. if err != nil {
  110. return models.Node{}, err
  111. }
  112. node.IsIngressGateway = "yes"
  113. node.IngressGatewayRange = network.AddressRange
  114. postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  115. postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"
  116. if node.PostUp != "" {
  117. if !strings.Contains(node.PostUp, postUpCmd) {
  118. postUpCmd = node.PostUp + "; " + postUpCmd
  119. }
  120. }
  121. if node.PostDown != "" {
  122. if !strings.Contains(node.PostDown, postDownCmd) {
  123. postDownCmd = node.PostDown + "; " + postDownCmd
  124. }
  125. }
  126. node.SetLastModified()
  127. node.PostUp = postUpCmd
  128. node.PostDown = postDownCmd
  129. node.UDPHolePunch = "no"
  130. data, err := json.Marshal(&node)
  131. if err != nil {
  132. return models.Node{}, err
  133. }
  134. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  135. if err != nil {
  136. return models.Node{}, err
  137. }
  138. err = SetNetworkNodesLastModified(netid)
  139. return node, err
  140. }
  141. // DeleteIngressGateway - deletes an ingress gateway
  142. func DeleteIngressGateway(networkName string, nodeid string) (models.Node, error) {
  143. node, err := GetNodeByID(nodeid)
  144. if err != nil {
  145. return models.Node{}, err
  146. }
  147. network, err := GetParentNetwork(networkName)
  148. if err != nil {
  149. return models.Node{}, err
  150. }
  151. // delete ext clients belonging to ingress gateway
  152. if err = DeleteGatewayExtClients(node.ID, networkName); err != nil {
  153. return models.Node{}, err
  154. }
  155. node.UDPHolePunch = network.DefaultUDPHolePunch
  156. node.LastModified = time.Now().Unix()
  157. node.IsIngressGateway = "no"
  158. node.IngressGatewayRange = ""
  159. data, err := json.Marshal(&node)
  160. if err != nil {
  161. return models.Node{}, err
  162. }
  163. err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)
  164. if err != nil {
  165. return models.Node{}, err
  166. }
  167. err = SetNetworkNodesLastModified(networkName)
  168. return node, err
  169. }
  170. // DeleteGatewayExtClients - deletes ext clients based on gateway (mac) of ingress node and network
  171. func DeleteGatewayExtClients(gatewayID string, networkName string) error {
  172. currentExtClients, err := GetNetworkExtClients(networkName)
  173. if err != nil && !database.IsEmptyRecord(err) {
  174. return err
  175. }
  176. for _, extClient := range currentExtClients {
  177. if extClient.IngressGatewayID == gatewayID {
  178. if err = DeleteExtClient(networkName, extClient.ClientID); err != nil {
  179. logger.Log(1, "failed to remove ext client", extClient.ClientID)
  180. continue
  181. }
  182. }
  183. }
  184. return nil
  185. }