| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205 | package logicimport (	"encoding/json"	"errors"	"strings"	"time"	"github.com/gravitl/netmaker/database"	"github.com/gravitl/netmaker/logger"	"github.com/gravitl/netmaker/models")// CreateEgressGateway - creates an egress gatewayfunc CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, error) {	node, err := GetNodeByID(gateway.NodeID)	if err != nil {		return models.Node{}, err	}	if node.OS != "linux" { // add in darwin later		return models.Node{}, errors.New(node.OS + " is unsupported for egress gateways")	}	err = ValidateEgressGateway(gateway)	if err != nil {		return models.Node{}, err	}	node.IsEgressGateway = "yes"	node.EgressGatewayRanges = gateway.Ranges	postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -A FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"	postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -D FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + gateway.Interface + " -j MASQUERADE"	if gateway.PostUp != "" {		postUpCmd = gateway.PostUp	}	if gateway.PostDown != "" {		postDownCmd = gateway.PostDown	}	if node.PostUp != "" {		if !strings.Contains(node.PostUp, postUpCmd) {			postUpCmd = node.PostUp + "; " + postUpCmd		}	}	if node.PostDown != "" {		if !strings.Contains(node.PostDown, postDownCmd) {			postDownCmd = node.PostDown + "; " + postDownCmd		}	}	node.PostUp = postUpCmd	node.PostDown = postDownCmd	node.SetLastModified()	nodeData, err := json.Marshal(&node)	if err != nil {		return node, err	}	if err = database.Insert(node.ID, string(nodeData), database.NODES_TABLE_NAME); err != nil {		return models.Node{}, err	}	if err = NetworkNodesUpdatePullChanges(node.Network); err != nil {		return models.Node{}, err	}	return node, nil}// ValidateEgressGateway - validates the egress gateway modelfunc ValidateEgressGateway(gateway models.EgressGatewayRequest) error {	var err error	empty := len(gateway.Ranges) == 0	if empty {		err = errors.New("IP Ranges Cannot Be Empty")	}	empty = gateway.Interface == ""	if empty {		err = errors.New("interface cannot be empty")	}	return err}// DeleteEgressGateway - deletes egress from nodefunc DeleteEgressGateway(network, nodeid string) (models.Node, error) {	node, err := GetNodeByID(nodeid)	if err != nil {		return models.Node{}, err	}	node.IsEgressGateway = "no"	node.EgressGatewayRanges = []string{}	node.PostUp = ""	node.PostDown = ""	if node.IsIngressGateway == "yes" { // check if node is still an ingress gateway before completely deleting postdown/up rules		node.PostUp = "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -A FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"		node.PostDown = "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -D FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"	}	node.SetLastModified()	data, err := json.Marshal(&node)	if err != nil {		return models.Node{}, err	}	if err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME); err != nil {		return models.Node{}, err	}	if err = NetworkNodesUpdatePullChanges(network); err != nil {		return models.Node{}, err	}	return node, nil}// CreateIngressGateway - creates an ingress gatewayfunc CreateIngressGateway(netid string, nodeid string) (models.Node, error) {	node, err := GetNodeByID(nodeid)	if node.OS != "linux" { // add in darwin later		return models.Node{}, errors.New(node.OS + " is unsupported for ingress gateways")	}	if err != nil {		return models.Node{}, err	}	network, err := GetParentNetwork(netid)	if err != nil {		return models.Node{}, err	}	node.IsIngressGateway = "yes"	node.IngressGatewayRange = network.AddressRange	postUpCmd := "iptables -A FORWARD -i " + node.Interface + " -j ACCEPT; iptables -A FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -A POSTROUTING -o " + node.Interface + " -j MASQUERADE"	postDownCmd := "iptables -D FORWARD -i " + node.Interface + " -j ACCEPT; iptables -D FORWARD -o " + node.Interface + " -j ACCEPT; iptables -t nat -D POSTROUTING -o " + node.Interface + " -j MASQUERADE"	if node.PostUp != "" {		if !strings.Contains(node.PostUp, postUpCmd) {			postUpCmd = node.PostUp + "; " + postUpCmd		}	}	if node.PostDown != "" {		if !strings.Contains(node.PostDown, postDownCmd) {			postDownCmd = node.PostDown + "; " + postDownCmd		}	}	node.SetLastModified()	node.PostUp = postUpCmd	node.PostDown = postDownCmd	node.UDPHolePunch = "no"	data, err := json.Marshal(&node)	if err != nil {		return models.Node{}, err	}	err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)	if err != nil {		return models.Node{}, err	}	err = SetNetworkNodesLastModified(netid)	return node, err}// DeleteIngressGateway - deletes an ingress gatewayfunc DeleteIngressGateway(networkName string, nodeid string) (models.Node, error) {	node, err := GetNodeByID(nodeid)	if err != nil {		return models.Node{}, err	}	network, err := GetParentNetwork(networkName)	if err != nil {		return models.Node{}, err	}	// delete ext clients belonging to ingress gateway	if err = DeleteGatewayExtClients(node.ID, networkName); err != nil {		return models.Node{}, err	}	node.UDPHolePunch = network.DefaultUDPHolePunch	node.LastModified = time.Now().Unix()	node.IsIngressGateway = "no"	node.IngressGatewayRange = ""	data, err := json.Marshal(&node)	if err != nil {		return models.Node{}, err	}	err = database.Insert(node.ID, string(data), database.NODES_TABLE_NAME)	if err != nil {		return models.Node{}, err	}	err = SetNetworkNodesLastModified(networkName)	return node, err}// DeleteGatewayExtClients - deletes ext clients based on gateway (mac) of ingress node and networkfunc DeleteGatewayExtClients(gatewayID string, networkName string) error {	currentExtClients, err := GetNetworkExtClients(networkName)	if err != nil && !database.IsEmptyRecord(err) {		return err	}	for _, extClient := range currentExtClients {		if extClient.IngressGatewayID == gatewayID {			if err = DeleteExtClient(networkName, extClient.ClientID); err != nil {				logger.Log(1, "failed to remove ext client", extClient.ClientID)				continue			}		}	}	return nil}
 |