util.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. // package for logicing client and server code
  2. package logic
  3. import (
  4. "encoding/base64"
  5. "encoding/json"
  6. "math/rand"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "github.com/gravitl/netmaker/database"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/netclient/ncutils"
  14. "github.com/gravitl/netmaker/servercfg"
  15. "golang.org/x/crypto/bcrypt"
  16. )
  17. // IsBase64 - checks if a string is in base64 format
  18. // This is used to validate public keys (make sure they're base64 encoded like all public keys should be).
  19. func IsBase64(s string) bool {
  20. _, err := base64.StdEncoding.DecodeString(s)
  21. return err == nil
  22. }
  23. // CheckEndpoint - checks if an endpoint is valid
  24. func CheckEndpoint(endpoint string) bool {
  25. endpointarr := strings.Split(endpoint, ":")
  26. return len(endpointarr) == 2
  27. }
  28. // SetNetworkServerPeers - sets the network server peers of a given node
  29. func SetNetworkServerPeers(node *models.Node) {
  30. if currentPeersList, err := GetSystemPeers(node); err == nil {
  31. if database.SetPeers(currentPeersList, node.Network) {
  32. logger.Log(1, "set new peers on network", node.Network)
  33. }
  34. } else {
  35. logger.Log(1, "could not set peers on network", node.Network, ":", err.Error())
  36. }
  37. }
  38. // DeleteNode - deletes a node from database or moves into delete nodes table
  39. func DeleteNode(node *models.Node, exterminate bool) error {
  40. var err error
  41. if !exterminate {
  42. node.Action = models.NODE_DELETE
  43. nodedata, err := json.Marshal(&node)
  44. if err != nil {
  45. return err
  46. }
  47. err = database.Insert(node.ID, string(nodedata), database.DELETED_NODES_TABLE_NAME)
  48. if err != nil {
  49. return err
  50. }
  51. } else {
  52. if err := database.DeleteRecord(database.DELETED_NODES_TABLE_NAME, node.ID); err != nil {
  53. logger.Log(2, err.Error())
  54. }
  55. }
  56. if err = database.DeleteRecord(database.NODES_TABLE_NAME, node.ID); err != nil {
  57. return err
  58. }
  59. macnet := node.MacAddress + "###" + node.Network
  60. if err = database.DeleteRecord(database.UUID_MAP_TABLE_NAME, macnet); err != nil {
  61. return err
  62. }
  63. if servercfg.IsDNSMode() {
  64. SetDNS()
  65. }
  66. return removeLocalServer(node)
  67. }
  68. // CreateNode - creates a node in database
  69. func CreateNode(node *models.Node) error {
  70. //encrypt that password so we never see it
  71. hash, err := bcrypt.GenerateFromPassword([]byte(node.Password), 5)
  72. if err != nil {
  73. return err
  74. }
  75. //set password to encrypted password
  76. node.Password = string(hash)
  77. if node.Name == models.NODE_SERVER_NAME {
  78. node.IsServer = "yes"
  79. }
  80. if node.DNSOn == "" {
  81. if servercfg.IsDNSMode() {
  82. node.DNSOn = "yes"
  83. } else {
  84. node.DNSOn = "no"
  85. }
  86. }
  87. SetNodeDefaults(node)
  88. node.Address, err = UniqueAddress(node.Network)
  89. if err != nil {
  90. return err
  91. }
  92. node.Address6, err = UniqueAddress6(node.Network)
  93. if err != nil {
  94. return err
  95. }
  96. //Create a JWT for the node
  97. tokenString, _ := CreateJWT(node.MacAddress, node.Network)
  98. if tokenString == "" {
  99. //returnErrorResponse(w, r, errorResponse)
  100. return err
  101. }
  102. err = ValidateNode(node, false)
  103. if err != nil {
  104. return err
  105. }
  106. key, err := GetRecordKey(node.MacAddress, node.Network)
  107. if err != nil {
  108. return err
  109. }
  110. node.SetID()
  111. nodebytes, err := json.Marshal(&node)
  112. if err != nil {
  113. return err
  114. }
  115. uuidbytes, err := json.Marshal(&node.ID)
  116. if err != nil {
  117. return err
  118. }
  119. if err = database.Insert(key, string(uuidbytes), database.UUID_MAP_TABLE_NAME); err != nil {
  120. return err
  121. }
  122. if err = database.Insert(node.ID, string(nodebytes), database.NODES_TABLE_NAME); err != nil {
  123. return err
  124. }
  125. if node.IsPending != "yes" {
  126. DecrimentKey(node.Network, node.AccessKey)
  127. }
  128. SetNetworkNodesLastModified(node.Network)
  129. if servercfg.IsDNSMode() {
  130. err = SetDNS()
  131. }
  132. return err
  133. }
  134. // SetNetworkNodesLastModified - sets the network nodes last modified
  135. func SetNetworkNodesLastModified(networkName string) error {
  136. timestamp := time.Now().Unix()
  137. network, err := GetParentNetwork(networkName)
  138. if err != nil {
  139. return err
  140. }
  141. network.NodesLastModified = timestamp
  142. data, err := json.Marshal(&network)
  143. if err != nil {
  144. return err
  145. }
  146. err = database.Insert(networkName, string(data), database.NETWORKS_TABLE_NAME)
  147. if err != nil {
  148. return err
  149. }
  150. return nil
  151. }
  152. // GetNode - fetches a node from database
  153. func GetNode(macaddress string, network string) (models.Node, error) {
  154. var node models.Node
  155. key, err := GetRecordKey(macaddress, network)
  156. if err != nil {
  157. return node, err
  158. }
  159. data, err := database.FetchRecord(database.NODES_TABLE_NAME, key)
  160. if err != nil {
  161. if data == "" {
  162. data, _ = database.FetchRecord(database.DELETED_NODES_TABLE_NAME, key)
  163. err = json.Unmarshal([]byte(data), &node)
  164. }
  165. return node, err
  166. }
  167. if err = json.Unmarshal([]byte(data), &node); err != nil {
  168. return node, err
  169. }
  170. SetNodeDefaults(&node)
  171. return node, err
  172. }
  173. // GetNodePeers - fetches peers for a given node
  174. func GetNodePeers(networkName string, excludeRelayed bool) ([]models.Node, error) {
  175. var peers []models.Node
  176. var networkNodes, egressNetworkNodes, err = getNetworkEgressAndNodes(networkName)
  177. if err != nil {
  178. return peers, nil
  179. }
  180. udppeers, errN := database.GetPeers(networkName)
  181. if errN != nil {
  182. logger.Log(2, errN.Error())
  183. }
  184. for _, node := range networkNodes {
  185. var peer = models.Node{}
  186. if node.IsEgressGateway == "yes" { // handle egress stuff
  187. peer.EgressGatewayRanges = node.EgressGatewayRanges
  188. peer.IsEgressGateway = node.IsEgressGateway
  189. }
  190. allow := node.IsRelayed != "yes" || !excludeRelayed
  191. if node.Network == networkName && node.IsPending != "yes" && allow {
  192. peer = setPeerInfo(&node)
  193. if node.UDPHolePunch == "yes" && errN == nil && CheckEndpoint(udppeers[node.PublicKey]) {
  194. endpointstring := udppeers[node.PublicKey]
  195. endpointarr := strings.Split(endpointstring, ":")
  196. if len(endpointarr) == 2 {
  197. port, err := strconv.Atoi(endpointarr[1])
  198. if err == nil {
  199. peer.Endpoint = endpointarr[0]
  200. peer.ListenPort = int32(port)
  201. }
  202. }
  203. }
  204. if node.IsRelay == "yes" {
  205. network, err := GetNetwork(networkName)
  206. if err == nil {
  207. peer.AllowedIPs = append(peer.AllowedIPs, network.AddressRange)
  208. } else {
  209. peer.AllowedIPs = append(peer.AllowedIPs, node.RelayAddrs...)
  210. }
  211. for _, egressNode := range egressNetworkNodes {
  212. if egressNode.IsRelayed == "yes" && StringSliceContains(node.RelayAddrs, egressNode.Address) {
  213. peer.AllowedIPs = append(peer.AllowedIPs, egressNode.EgressGatewayRanges...)
  214. }
  215. }
  216. }
  217. peers = append(peers, peer)
  218. }
  219. }
  220. return peers, err
  221. }
  222. // GetPeersList - gets the peers of a given network
  223. func GetPeersList(networkName string, excludeRelayed bool, relayedNodeAddr string) ([]models.Node, error) {
  224. var peers []models.Node
  225. var err error
  226. if relayedNodeAddr == "" {
  227. peers, err = GetNodePeers(networkName, excludeRelayed)
  228. } else {
  229. var relayNode models.Node
  230. relayNode, err = GetNodeRelay(networkName, relayedNodeAddr)
  231. if relayNode.Address != "" {
  232. var peerNode = setPeerInfo(&relayNode)
  233. network, err := GetNetwork(networkName)
  234. if err == nil {
  235. peerNode.AllowedIPs = append(peerNode.AllowedIPs, network.AddressRange)
  236. var _, egressNetworkNodes, err = getNetworkEgressAndNodes(networkName)
  237. if err == nil {
  238. for _, egress := range egressNetworkNodes {
  239. if egress.Address != relayedNodeAddr {
  240. peerNode.AllowedIPs = append(peerNode.AllowedIPs, egress.EgressGatewayRanges...)
  241. }
  242. }
  243. }
  244. } else {
  245. peerNode.AllowedIPs = append(peerNode.AllowedIPs, peerNode.RelayAddrs...)
  246. }
  247. nodepeers, err := GetNodePeers(networkName, false)
  248. if err == nil && peerNode.UDPHolePunch == "yes" {
  249. for _, nodepeer := range nodepeers {
  250. if nodepeer.Address == peerNode.Address {
  251. peerNode.Endpoint = nodepeer.Endpoint
  252. peerNode.ListenPort = nodepeer.ListenPort
  253. }
  254. }
  255. }
  256. peers = append(peers, peerNode)
  257. }
  258. }
  259. return peers, err
  260. }
  261. // RandomString - returns a random string in a charset
  262. func RandomString(length int) string {
  263. const charset = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  264. var seededRand *rand.Rand = rand.New(rand.NewSource(time.Now().UnixNano()))
  265. b := make([]byte, length)
  266. for i := range b {
  267. b[i] = charset[seededRand.Intn(len(charset))]
  268. }
  269. return string(b)
  270. }
  271. // == Private Methods ==
  272. func getNetworkEgressAndNodes(networkName string) ([]models.Node, []models.Node, error) {
  273. var networkNodes, egressNetworkNodes []models.Node
  274. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  275. if err != nil {
  276. if database.IsEmptyRecord(err) {
  277. return networkNodes, egressNetworkNodes, nil
  278. }
  279. logger.Log(2, err.Error())
  280. return nil, nil, err
  281. }
  282. for _, value := range collection {
  283. var node = models.Node{}
  284. err := json.Unmarshal([]byte(value), &node)
  285. if err != nil {
  286. logger.Log(2, err.Error())
  287. continue
  288. }
  289. if node.Network == networkName {
  290. networkNodes = append(networkNodes, node)
  291. if node.IsEgressGateway == "yes" {
  292. egressNetworkNodes = append(egressNetworkNodes, node)
  293. }
  294. }
  295. }
  296. return networkNodes, egressNetworkNodes, nil
  297. }
  298. func setPeerInfo(node *models.Node) models.Node {
  299. var peer models.Node
  300. peer.RelayAddrs = node.RelayAddrs
  301. peer.IsRelay = node.IsRelay
  302. peer.IsServer = node.IsServer
  303. peer.IsRelayed = node.IsRelayed
  304. peer.PublicKey = node.PublicKey
  305. peer.Endpoint = node.Endpoint
  306. peer.Name = node.Name
  307. peer.LocalAddress = node.LocalAddress
  308. peer.ListenPort = node.ListenPort
  309. peer.AllowedIPs = node.AllowedIPs
  310. peer.UDPHolePunch = node.UDPHolePunch
  311. peer.Address = node.Address
  312. peer.Address6 = node.Address6
  313. peer.EgressGatewayRanges = node.EgressGatewayRanges
  314. peer.IsEgressGateway = node.IsEgressGateway
  315. peer.IngressGatewayRange = node.IngressGatewayRange
  316. peer.IsIngressGateway = node.IsIngressGateway
  317. peer.IsPending = node.IsPending
  318. return peer
  319. }
  320. func setIPForwardingLinux() error {
  321. out, err := ncutils.RunCmd("sysctl net.ipv4.ip_forward", true)
  322. if err != nil {
  323. logger.Log(0, "WARNING: Error encountered setting ip forwarding. This can break functionality.")
  324. return err
  325. } else {
  326. s := strings.Fields(string(out))
  327. if s[2] != "1" {
  328. _, err = ncutils.RunCmd("sysctl -w net.ipv4.ip_forward=1", true)
  329. if err != nil {
  330. logger.Log(0, "WARNING: Error encountered setting ip forwarding. You may want to investigate this.")
  331. return err
  332. }
  333. }
  334. }
  335. return nil
  336. }
  337. // StringSliceContains - sees if a string slice contains a string element
  338. func StringSliceContains(slice []string, item string) bool {
  339. for _, s := range slice {
  340. if s == item {
  341. return true
  342. }
  343. }
  344. return false
  345. }