gateway.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287
  1. package controller
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "github.com/google/uuid"
  7. "github.com/gorilla/mux"
  8. "github.com/gravitl/netmaker/logger"
  9. "github.com/gravitl/netmaker/logic"
  10. "github.com/gravitl/netmaker/models"
  11. "github.com/gravitl/netmaker/mq"
  12. "github.com/gravitl/netmaker/servercfg"
  13. "golang.org/x/exp/slog"
  14. )
  15. func gwHandlers(r *mux.Router) {
  16. r.HandleFunc("/api/nodes/{network}/{nodeid}/gateway", logic.SecurityCheck(true, checkFreeTierLimits(limitChoiceIngress, http.HandlerFunc(createGateway)))).Methods(http.MethodPost)
  17. r.HandleFunc("/api/nodes/{network}/{nodeid}/gateway", logic.SecurityCheck(true, http.HandlerFunc(deleteGateway))).Methods(http.MethodDelete)
  18. // old relay handlers
  19. r.HandleFunc("/api/nodes/{network}/{nodeid}/createrelay", logic.SecurityCheck(true, http.HandlerFunc(createGateway))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/nodes/{network}/{nodeid}/deleterelay", logic.SecurityCheck(true, http.HandlerFunc(deleteGateway))).Methods(http.MethodDelete)
  21. }
  22. // @Summary Create a gateway
  23. // @Router /api/nodes/{network}/{nodeid}/gateway [post]
  24. // @Tags Nodes
  25. // @Security oauth2
  26. // @Success 200 {object} models.ApiNode
  27. // @Failure 500 {object} models.ErrorResponse
  28. func createGateway(w http.ResponseWriter, r *http.Request) {
  29. w.Header().Set("Content-Type", "application/json")
  30. var params = mux.Vars(r)
  31. nodeid := params["nodeid"]
  32. netid := params["network"]
  33. node, err := logic.ValidateParams(nodeid, netid)
  34. if err != nil {
  35. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  36. return
  37. }
  38. host, err := logic.GetHost(node.HostID.String())
  39. if err != nil {
  40. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  41. return
  42. }
  43. var req models.CreateGwReq
  44. err = json.NewDecoder(r.Body).Decode(&req)
  45. if err != nil {
  46. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  47. return
  48. }
  49. if req.IsInternetGateway && len(req.InetNodeClientIDs) > 0 {
  50. err = logic.ValidateInetGwReq(node, req.InetNodeReq, false)
  51. if err != nil {
  52. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  53. return
  54. }
  55. }
  56. node, err = logic.CreateIngressGateway(netid, nodeid, req.IngressRequest)
  57. if err != nil {
  58. logger.Log(0, r.Header.Get("user"),
  59. fmt.Sprintf("failed to create gateway on node [%s] on network [%s]: %v",
  60. nodeid, netid, err))
  61. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  62. return
  63. }
  64. req.RelayRequest.NetID = netid
  65. req.RelayRequest.NodeID = nodeid
  66. _, relayNode, err := logic.CreateRelay(req.RelayRequest)
  67. if err != nil {
  68. logger.Log(
  69. 0,
  70. r.Header.Get("user"),
  71. fmt.Sprintf(
  72. "failed to create relay on node [%s] on network [%s]: %v",
  73. req.RelayRequest.NodeID,
  74. req.RelayRequest.NetID,
  75. err,
  76. ),
  77. )
  78. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  79. return
  80. }
  81. for _, relayedNodeID := range relayNode.RelayedNodes {
  82. relayedNode, err := logic.GetNodeByID(relayedNodeID)
  83. if err == nil {
  84. if relayedNode.FailedOverBy != uuid.Nil {
  85. go logic.ResetFailedOverPeer(&relayedNode)
  86. }
  87. if relayedNode.AutoRelayedBy != uuid.Nil {
  88. go logic.ResetAutoRelayedPeer(&relayedNode)
  89. }
  90. }
  91. }
  92. if len(req.InetNodeClientIDs) > 0 {
  93. logic.SetInternetGw(&node, req.InetNodeReq)
  94. if servercfg.IsPro {
  95. if _, exists := logic.FailOverExists(node.Network); exists {
  96. go func() {
  97. logic.ResetFailedOverPeer(&node)
  98. mq.PublishPeerUpdate(false)
  99. }()
  100. }
  101. go func() {
  102. logic.ResetAutoRelayedPeer(&node)
  103. mq.PublishPeerUpdate(false)
  104. }()
  105. }
  106. if node.IsGw && node.IngressDNS == "" {
  107. node.IngressDNS = "1.1.1.1"
  108. }
  109. logic.UpsertNode(&node)
  110. }
  111. logger.Log(
  112. 1,
  113. r.Header.Get("user"),
  114. "created gw node",
  115. req.RelayRequest.NodeID,
  116. "on network",
  117. req.RelayRequest.NetID,
  118. )
  119. logic.GetNodeStatus(&relayNode, false)
  120. apiNode := relayNode.ConvertToAPINode()
  121. logic.LogEvent(&models.Event{
  122. Action: models.Create,
  123. Source: models.Subject{
  124. ID: r.Header.Get("user"),
  125. Name: r.Header.Get("user"),
  126. Type: models.UserSub,
  127. },
  128. TriggeredBy: r.Header.Get("user"),
  129. Target: models.Subject{
  130. ID: node.ID.String(),
  131. Name: host.Name,
  132. Type: models.GatewaySub,
  133. },
  134. Origin: models.Dashboard,
  135. })
  136. host.IsStaticPort = true
  137. logic.UpsertHost(host)
  138. w.WriteHeader(http.StatusOK)
  139. json.NewEncoder(w).Encode(apiNode)
  140. go func() {
  141. if err := mq.NodeUpdate(&node); err != nil {
  142. slog.Error("error publishing node update to node", "node", node.ID, "error", err)
  143. }
  144. mq.PublishPeerUpdate(false)
  145. }()
  146. }
  147. // @Summary Delete a gateway
  148. // @Router /api/nodes/{network}/{nodeid}/gateway [delete]
  149. // @Tags Nodes
  150. // @Security oauth2
  151. // @Success 200 {object} models.ApiNode
  152. // @Failure 500 {object} models.ErrorResponse
  153. func deleteGateway(w http.ResponseWriter, r *http.Request) {
  154. w.Header().Set("Content-Type", "application/json")
  155. var params = mux.Vars(r)
  156. nodeid := params["nodeid"]
  157. netid := params["network"]
  158. node, err := logic.ValidateParams(nodeid, netid)
  159. if err != nil {
  160. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  161. return
  162. }
  163. node, removedClients, err := logic.DeleteIngressGateway(nodeid)
  164. if err != nil {
  165. logger.Log(0, r.Header.Get("user"),
  166. fmt.Sprintf("failed to delete ingress gateway on node [%s] on network [%s]: %v",
  167. nodeid, netid, err))
  168. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  169. return
  170. }
  171. updateNodes, node, err := logic.DeleteRelay(netid, nodeid)
  172. if err != nil {
  173. logger.Log(0, r.Header.Get("user"), "error decoding request body: ", err.Error())
  174. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  175. return
  176. }
  177. node, err = logic.GetNodeByID(node.ID.String())
  178. if err != nil {
  179. logger.Log(0, r.Header.Get("user"), "failed to get node", err.Error())
  180. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  181. return
  182. }
  183. host, err := logic.GetHost(node.HostID.String())
  184. if err != nil {
  185. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  186. return
  187. }
  188. logic.UnsetInternetGw(&node)
  189. node.IsGw = false
  190. if node.IsAutoRelay {
  191. logic.ResetAutoRelay(&node)
  192. }
  193. node.IsAutoRelay = false
  194. logic.UpsertNode(&node)
  195. logger.Log(1, r.Header.Get("user"), "deleted gw", nodeid, "on network", netid)
  196. go func() {
  197. host, err := logic.GetHost(node.HostID.String())
  198. if err == nil {
  199. allNodes, err := logic.GetAllNodes()
  200. if err != nil {
  201. return
  202. }
  203. for _, relayedNode := range updateNodes {
  204. err = mq.NodeUpdate(&relayedNode)
  205. if err != nil {
  206. logger.Log(
  207. 1,
  208. "relayed node update ",
  209. relayedNode.ID.String(),
  210. "on network",
  211. relayedNode.Network,
  212. ": ",
  213. err.Error(),
  214. )
  215. }
  216. h, err := logic.GetHost(relayedNode.HostID.String())
  217. if err == nil {
  218. if h.OS == models.OS_Types.IoT {
  219. nodes, err := logic.GetAllNodes()
  220. if err != nil {
  221. return
  222. }
  223. node.IsRelay = true // for iot update to recognise that it has to delete relay peer
  224. if err = mq.PublishSingleHostPeerUpdate(h, nodes, &node, nil, false, nil); err != nil {
  225. logger.Log(1, "failed to publish peer update to host", h.ID.String(), ": ", err.Error())
  226. }
  227. }
  228. }
  229. }
  230. if len(removedClients) > 0 {
  231. if err := mq.PublishSingleHostPeerUpdate(host, allNodes, nil, removedClients[:], false, nil); err != nil {
  232. slog.Error("publishSingleHostUpdate", "host", host.Name, "error", err)
  233. }
  234. }
  235. mq.PublishPeerUpdate(false)
  236. if err := mq.NodeUpdate(&node); err != nil {
  237. slog.Error(
  238. "error publishing node update to node",
  239. "node",
  240. node.ID,
  241. "error",
  242. err,
  243. )
  244. }
  245. if servercfg.IsDNSMode() {
  246. logic.SetDNS()
  247. }
  248. }
  249. }()
  250. logic.LogEvent(&models.Event{
  251. Action: models.Delete,
  252. Source: models.Subject{
  253. ID: r.Header.Get("user"),
  254. Name: r.Header.Get("user"),
  255. Type: models.UserSub,
  256. },
  257. TriggeredBy: r.Header.Get("user"),
  258. Target: models.Subject{
  259. ID: node.ID.String(),
  260. Name: host.Name,
  261. Type: models.GatewaySub,
  262. },
  263. Origin: models.Dashboard,
  264. })
  265. logic.GetNodeStatus(&node, false)
  266. apiNode := node.ConvertToAPINode()
  267. logger.Log(1, r.Header.Get("user"), "deleted ingress gateway", nodeid)
  268. w.WriteHeader(http.StatusOK)
  269. json.NewEncoder(w).Encode(apiNode)
  270. }