| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632 | package modelsimport (	"bytes"	"math/rand"	"net"	"strings"	"time"	"github.com/google/uuid"	"golang.zx2c4.com/wireguard/wgctrl/wgtypes")const (	// NODE_SERVER_NAME - the default server name	NODE_SERVER_NAME = "netmaker"	// TEN_YEARS_IN_SECONDS - ten years in seconds	TEN_YEARS_IN_SECONDS = 300000000	// MAX_NAME_LENGTH - max name length of node	MAX_NAME_LENGTH = 62	// == ACTIONS == (can only be set by server)	// NODE_UPDATE_KEY - action to update key	NODE_UPDATE_KEY = "updatekey"	// NODE_DELETE - delete node action	NODE_DELETE = "delete"	// NODE_IS_PENDING - node pending status	NODE_IS_PENDING = "pending"	// NODE_NOOP - node no op action	NODE_NOOP = "noop"	// NODE_FORCE_UPDATE - indicates a node should pull all changes	NODE_FORCE_UPDATE = "force"	// FIREWALL_IPTABLES - indicates that iptables is the firewall in use	FIREWALL_IPTABLES = "iptables"	// FIREWALL_NFTABLES - indicates nftables is in use (Linux only)	FIREWALL_NFTABLES = "nftables"	// FIREWALL_NONE - indicates that no supported firewall in use	FIREWALL_NONE = "none")var seededRand *rand.Rand = rand.New(	rand.NewSource(time.Now().UnixNano()))// NodeCheckin - struct for node checkins with servertype NodeCheckin struct {	Version   string	Connected bool	Ifaces    []Iface}// Iface struct for local interfaces of a nodetype Iface struct {	Name          string    `json:"name"`	Address       net.IPNet `json:"address"`	AddressString string    `json:"addressString"`}// CommonNode - represents a commonn node data elements shared by netmaker and netclienttype CommonNode struct {	ID                  uuid.UUID            `json:"id" yaml:"id"`	HostID              uuid.UUID            `json:"hostid" yaml:"hostid"`	Network             string               `json:"network" yaml:"network"`	NetworkRange        net.IPNet            `json:"networkrange" yaml:"networkrange"`	NetworkRange6       net.IPNet            `json:"networkrange6" yaml:"networkrange6"`	InternetGateway     *net.UDPAddr         `json:"internetgateway" yaml:"internetgateway"`	Server              string               `json:"server" yaml:"server"`	Connected           bool                 `json:"connected" yaml:"connected"`	Address             net.IPNet            `json:"address" yaml:"address"`	Address6            net.IPNet            `json:"address6" yaml:"address6"`	PostUp              string               `json:"postup" yaml:"postup"`	PostDown            string               `json:"postdown" yaml:"postdown"`	Action              string               `json:"action" yaml:"action"`	LocalAddress        net.IPNet            `json:"localaddress" yaml:"localaddress"`	IsLocal             bool                 `json:"islocal" yaml:"islocal"`	IsEgressGateway     bool                 `json:"isegressgateway" yaml:"isegressgateway"`	IsIngressGateway    bool                 `json:"isingressgateway" yaml:"isingressgateway"`	DNSOn               bool                 `json:"dnson" yaml:"dnson"`	PersistentKeepalive time.Duration        `json:"persistentkeepalive" yaml:"persistentkeepalive"`	Peers               []wgtypes.PeerConfig `json:"peers" yaml:"peers"`}// Node - a model of a network nodetype Node struct {	CommonNode	PendingDelete           bool                 `json:"pendingdelete" bson:"pendingdelete" yaml:"pendingdelete"`	LastModified            time.Time            `json:"lastmodified" bson:"lastmodified" yaml:"lastmodified"`	LastCheckIn             time.Time            `json:"lastcheckin" bson:"lastcheckin" yaml:"lastcheckin"`	LastPeerUpdate          time.Time            `json:"lastpeerupdate" bson:"lastpeerupdate" yaml:"lastpeerupdate"`	ExpirationDateTime      time.Time            `json:"expdatetime" bson:"expdatetime" yaml:"expdatetime"`	EgressGatewayRanges     []string             `json:"egressgatewayranges" bson:"egressgatewayranges" yaml:"egressgatewayranges"`	EgressGatewayNatEnabled bool                 `json:"egressgatewaynatenabled" bson:"egressgatewaynatenabled" yaml:"egressgatewaynatenabled"`	EgressGatewayRequest    EgressGatewayRequest `json:"egressgatewayrequest" bson:"egressgatewayrequest" yaml:"egressgatewayrequest"`	IngressGatewayRange     string               `json:"ingressgatewayrange" bson:"ingressgatewayrange" yaml:"ingressgatewayrange"`	IngressGatewayRange6    string               `json:"ingressgatewayrange6" bson:"ingressgatewayrange6" yaml:"ingressgatewayrange6"`	IsRelayed               bool                 `json:"isrelayed" bson:"isrelayed" yaml:"isrelayed"`	IsRelay                 bool                 `json:"isrelay" bson:"isrelay" yaml:"isrelay"`	RelayAddrs              []string             `json:"relayaddrs" bson:"relayaddrs" yaml:"relayaddrs"`	// == PRO ==	DefaultACL   string    `json:"defaultacl,omitempty" bson:"defaultacl,omitempty" yaml:"defaultacl,omitempty" validate:"checkyesornoorunset"`	OwnerID      string    `json:"ownerid,omitempty" bson:"ownerid,omitempty" yaml:"ownerid,omitempty"`	FailoverNode uuid.UUID `json:"failovernode" bson:"failovernode" yaml:"failovernode"`	Failover     bool      `json:"failover" bson:"failover" yaml:"failover"`}// LegacyNode - legacy struct for node modeltype LegacyNode struct {	ID                      string               `json:"id,omitempty" bson:"id,omitempty" yaml:"id,omitempty" validate:"required,min=5,id_unique"`	HostID                  string               `json:"hostid,omitempty" bson:"id,omitempty" yaml:"hostid,omitempty" validate:"required,min=5,id_unique"`	Address                 string               `json:"address" bson:"address" yaml:"address" validate:"omitempty,ipv4"`	Address6                string               `json:"address6" bson:"address6" yaml:"address6" validate:"omitempty,ipv6"`	LocalAddress            string               `json:"localaddress" bson:"localaddress" yaml:"localaddress" validate:"omitempty"`	Interfaces              []Iface              `json:"interfaces" yaml:"interfaces"`	Name                    string               `json:"name" bson:"name" yaml:"name" validate:"omitempty,max=62,in_charset"`	NetworkSettings         Network              `json:"networksettings" bson:"networksettings" yaml:"networksettings" validate:"-"`	ListenPort              int32                `json:"listenport" bson:"listenport" yaml:"listenport" validate:"omitempty,numeric,min=1024,max=65535"`	LocalListenPort         int32                `json:"locallistenport" bson:"locallistenport" yaml:"locallistenport" validate:"numeric,min=0,max=65535"`	ProxyListenPort         int32                `json:"proxy_listen_port" bson:"proxy_listen_port" yaml:"proxy_listen_port" validate:"numeric,min=0,max=65535"`	PublicKey               string               `json:"publickey" bson:"publickey" yaml:"publickey" validate:"required,base64"`	Endpoint                string               `json:"endpoint" bson:"endpoint" yaml:"endpoint" validate:"required,ip"`	PostUp                  string               `json:"postup" bson:"postup" yaml:"postup"`	PostDown                string               `json:"postdown" bson:"postdown" yaml:"postdown"`	AllowedIPs              []string             `json:"allowedips" bson:"allowedips" yaml:"allowedips"`	PersistentKeepalive     int32                `json:"persistentkeepalive" bson:"persistentkeepalive" yaml:"persistentkeepalive" validate:"omitempty,numeric,max=1000"`	IsHub                   string               `json:"ishub" bson:"ishub" yaml:"ishub" validate:"checkyesorno"`	AccessKey               string               `json:"accesskey" bson:"accesskey" yaml:"accesskey"`	Interface               string               `json:"interface" bson:"interface" yaml:"interface"`	LastModified            int64                `json:"lastmodified" bson:"lastmodified" yaml:"lastmodified"`	ExpirationDateTime      int64                `json:"expdatetime" bson:"expdatetime" yaml:"expdatetime"`	LastPeerUpdate          int64                `json:"lastpeerupdate" bson:"lastpeerupdate" yaml:"lastpeerupdate"`	LastCheckIn             int64                `json:"lastcheckin" bson:"lastcheckin" yaml:"lastcheckin"`	MacAddress              string               `json:"macaddress" bson:"macaddress" yaml:"macaddress"`	Password                string               `json:"password" bson:"password" yaml:"password" validate:"required,min=6"`	Network                 string               `json:"network" bson:"network" yaml:"network" validate:"network_exists"`	IsRelayed               string               `json:"isrelayed" bson:"isrelayed" yaml:"isrelayed"`	IsPending               string               `json:"ispending" bson:"ispending" yaml:"ispending"`	IsRelay                 string               `json:"isrelay" bson:"isrelay" yaml:"isrelay" validate:"checkyesorno"`	IsDocker                string               `json:"isdocker" bson:"isdocker" yaml:"isdocker" validate:"checkyesorno"`	IsK8S                   string               `json:"isk8s" bson:"isk8s" yaml:"isk8s" validate:"checkyesorno"`	IsEgressGateway         string               `json:"isegressgateway" bson:"isegressgateway" yaml:"isegressgateway" validate:"checkyesorno"`	IsIngressGateway        string               `json:"isingressgateway" bson:"isingressgateway" yaml:"isingressgateway" validate:"checkyesorno"`	EgressGatewayRanges     []string             `json:"egressgatewayranges" bson:"egressgatewayranges" yaml:"egressgatewayranges"`	EgressGatewayNatEnabled string               `json:"egressgatewaynatenabled" bson:"egressgatewaynatenabled" yaml:"egressgatewaynatenabled"`	EgressGatewayRequest    EgressGatewayRequest `json:"egressgatewayrequest" bson:"egressgatewayrequest" yaml:"egressgatewayrequest"`	RelayAddrs              []string             `json:"relayaddrs" bson:"relayaddrs" yaml:"relayaddrs"`	FailoverNode            string               `json:"failovernode" bson:"failovernode" yaml:"failovernode"`	IngressGatewayRange     string               `json:"ingressgatewayrange" bson:"ingressgatewayrange" yaml:"ingressgatewayrange"`	IngressGatewayRange6    string               `json:"ingressgatewayrange6" bson:"ingressgatewayrange6" yaml:"ingressgatewayrange6"`	// IsStatic - refers to if the Endpoint is set manually or dynamically	IsStatic        string      `json:"isstatic" bson:"isstatic" yaml:"isstatic" validate:"checkyesorno"`	UDPHolePunch    string      `json:"udpholepunch" bson:"udpholepunch" yaml:"udpholepunch" validate:"checkyesorno"`	DNSOn           string      `json:"dnson" bson:"dnson" yaml:"dnson" validate:"checkyesorno"`	IsServer        string      `json:"isserver" bson:"isserver" yaml:"isserver" validate:"checkyesorno"`	Action          string      `json:"action" bson:"action" yaml:"action"`	IsLocal         string      `json:"islocal" bson:"islocal" yaml:"islocal" validate:"checkyesorno"`	LocalRange      string      `json:"localrange" bson:"localrange" yaml:"localrange"`	IPForwarding    string      `json:"ipforwarding" bson:"ipforwarding" yaml:"ipforwarding" validate:"checkyesorno"`	OS              string      `json:"os" bson:"os" yaml:"os"`	MTU             int32       `json:"mtu" bson:"mtu" yaml:"mtu"`	Version         string      `json:"version" bson:"version" yaml:"version"`	Server          string      `json:"server" bson:"server" yaml:"server"`	TrafficKeys     TrafficKeys `json:"traffickeys" bson:"traffickeys" yaml:"traffickeys"`	FirewallInUse   string      `json:"firewallinuse" bson:"firewallinuse" yaml:"firewallinuse"`	InternetGateway string      `json:"internetgateway" bson:"internetgateway" yaml:"internetgateway"`	Connected       string      `json:"connected" bson:"connected" yaml:"connected" validate:"checkyesorno"`	PendingDelete   bool        `json:"pendingdelete" bson:"pendingdelete" yaml:"pendingdelete"`	Proxy           bool        `json:"proxy" bson:"proxy" yaml:"proxy"`	// == PRO ==	DefaultACL string `json:"defaultacl,omitempty" bson:"defaultacl,omitempty" yaml:"defaultacl,omitempty" validate:"checkyesornoorunset"`	OwnerID    string `json:"ownerid,omitempty" bson:"ownerid,omitempty" yaml:"ownerid,omitempty"`	Failover   string `json:"failover" bson:"failover" yaml:"failover" validate:"checkyesorno"`}// NodesArray - used for node sortingtype NodesArray []Node// NodesArray.Len - gets length of node arrayfunc (a NodesArray) Len() int { return len(a) }// NodesArray.Less - gets returns lower rank of two node addressesFillfunc (a NodesArray) Less(i, j int) bool {	return isLess(a[i].Address.IP.String(), a[j].Address.IP.String())}// NodesArray.Swap - swaps two nodes in arrayfunc (a NodesArray) Swap(i, j int) { a[i], a[j] = a[j], a[i] }func isLess(ipA string, ipB string) bool {	ipNetA := net.ParseIP(ipA)	ipNetB := net.ParseIP(ipB)	return bytes.Compare(ipNetA, ipNetB) < 0}// Node.PrimaryAddress - return ipv4 address if present, else return ipv6func (node *Node) PrimaryAddress() string {	if node.Address.IP != nil {		return node.Address.IP.String()	}	return node.Address6.IP.String()}// Node.SetDefaultConnectedfunc (node *LegacyNode) SetDefaultConnected() {	if node.Connected == "" {		node.Connected = "yes"	}	if node.IsServer == "yes" {		node.Connected = "yes"	}}// Node.SetDefaultACLfunc (node *LegacyNode) SetDefaultACL() {	if node.DefaultACL == "" {		node.DefaultACL = "yes"	}}// Node.SetDefaultMTU - sets default MTU of a nodefunc (node *LegacyNode) SetDefaultMTU() {	if node.MTU == 0 {		node.MTU = 1280	}}// Node.SetDefaultNFTablesPresent - sets default for nftables checkfunc (node *LegacyNode) SetDefaultNFTablesPresent() {	if node.FirewallInUse == "" {		node.FirewallInUse = FIREWALL_IPTABLES // default to iptables	}}// Node.SetDefaultIsRelayed - set default is relayedfunc (node *LegacyNode) SetDefaultIsRelayed() {	if node.IsRelayed == "" {		node.IsRelayed = "no"	}}// Node.SetDefaultIsRelayed - set default is relayedfunc (node *LegacyNode) SetDefaultIsHub() {	if node.IsHub == "" {		node.IsHub = "no"	}}// Node.SetDefaultIsRelay - set default isrelayfunc (node *LegacyNode) SetDefaultIsRelay() {	if node.IsRelay == "" {		node.IsRelay = "no"	}}// Node.SetDefaultIsDocker - set default isdockerfunc (node *LegacyNode) SetDefaultIsDocker() {	if node.IsDocker == "" {		node.IsDocker = "no"	}}// Node.SetDefaultIsK8S - set default isk8sfunc (node *LegacyNode) SetDefaultIsK8S() {	if node.IsK8S == "" {		node.IsK8S = "no"	}}// Node.SetDefaultEgressGateway - sets default egress gateway statusfunc (node *LegacyNode) SetDefaultEgressGateway() {	if node.IsEgressGateway == "" {		node.IsEgressGateway = "no"	}}// Node.SetDefaultIngressGateway - sets default ingress gateway statusfunc (node *LegacyNode) SetDefaultIngressGateway() {	if node.IsIngressGateway == "" {		node.IsIngressGateway = "no"	}}// Node.SetDefaultAction - sets default action statusfunc (node *LegacyNode) SetDefaultAction() {	if node.Action == "" {		node.Action = NODE_NOOP	}}// Node.SetRoamingDefault - sets default roaming status//func (node *Node) SetRoamingDefault() {//	if node.Roaming == "" {//		node.Roaming = "yes"//	}//}// Node.SetIPForwardingDefault - set ip forwarding defaultfunc (node *LegacyNode) SetIPForwardingDefault() {	if node.IPForwarding == "" {		node.IPForwarding = "yes"	}}// Node.SetIsLocalDefault - set is local defaultfunc (node *LegacyNode) SetIsLocalDefault() {	if node.IsLocal == "" {		node.IsLocal = "no"	}}// Node.SetDNSOnDefault - sets dns on defaultfunc (node *LegacyNode) SetDNSOnDefault() {	if node.DNSOn == "" {		node.DNSOn = "yes"	}}// Node.SetIsServerDefault - sets node isserver defaultfunc (node *LegacyNode) SetIsServerDefault() {	if node.IsServer != "yes" {		node.IsServer = "no"	}}// Node.SetIsStaticDefault - set is static defaultfunc (node *LegacyNode) SetIsStaticDefault() {	if node.IsServer == "yes" {		node.IsStatic = "yes"	} else if node.IsStatic != "yes" {		node.IsStatic = "no"	}}// Node.SetLastModified - set last modified initial timefunc (node *Node) SetLastModified() {	node.LastModified = time.Now()}// Node.SetLastCheckIn - set checkin time of nodefunc (node *Node) SetLastCheckIn() {	node.LastCheckIn = time.Now()}// Node.SetLastPeerUpdate - sets last peer update timefunc (node *Node) SetLastPeerUpdate() {	node.LastPeerUpdate = time.Now()}// Node.SetExpirationDateTime - sets node expiry timefunc (node *Node) SetExpirationDateTime() {	node.ExpirationDateTime = time.Now().Add(TEN_YEARS_IN_SECONDS)}// Node.SetDefaultName - sets a random name to nodefunc (node *LegacyNode) SetDefaultName() {	if node.Name == "" {		node.Name = GenerateNodeName()	}}// Node.SetDefaultFailover - sets default value of failover status to no if not setfunc (node *LegacyNode) SetDefaultFailover() {	if node.Failover == "" {		node.Failover = "no"	}}// Node.Fill - fills other node data into calling node data if not set on calling nodefunc (newNode *Node) Fill(currentNode *Node) { // TODO add new field for nftables present	newNode.ID = currentNode.ID	// Revisit the logic for boolean values	// TODO ---- !!!!!!!!!!!!!!!!!!!!!!!!!!!!	// TODO ---- !!!!!!!!!!!!!!!!!!!!!!!!!!	if newNode.Address.String() == "" {		newNode.Address = currentNode.Address	}	if newNode.Address6.String() == "" {		newNode.Address6 = currentNode.Address6	}	if newNode.PostUp == "" {		newNode.PostUp = currentNode.PostUp	}	if newNode.PostDown == "" {		newNode.PostDown = currentNode.PostDown	}	if newNode.PersistentKeepalive < 0 {		newNode.PersistentKeepalive = currentNode.PersistentKeepalive	}	if newNode.LastModified != currentNode.LastModified {		newNode.LastModified = currentNode.LastModified	}	if newNode.ExpirationDateTime.IsZero() {		newNode.ExpirationDateTime = currentNode.ExpirationDateTime	}	if newNode.LastPeerUpdate.IsZero() {		newNode.LastPeerUpdate = currentNode.LastPeerUpdate	}	if newNode.LastCheckIn.IsZero() {		newNode.LastCheckIn = currentNode.LastCheckIn	}	if newNode.Network == "" {		newNode.Network = currentNode.Network	}	if newNode.IsEgressGateway != currentNode.IsEgressGateway {		newNode.IsEgressGateway = currentNode.IsEgressGateway	}	if newNode.IsIngressGateway != currentNode.IsIngressGateway {		newNode.IsIngressGateway = currentNode.IsIngressGateway	}	if newNode.EgressGatewayRanges == nil {		newNode.EgressGatewayRanges = currentNode.EgressGatewayRanges	}	if newNode.IngressGatewayRange == "" {		newNode.IngressGatewayRange = currentNode.IngressGatewayRange	}	if newNode.IngressGatewayRange6 == "" {		newNode.IngressGatewayRange6 = currentNode.IngressGatewayRange6	}	if newNode.DNSOn != currentNode.DNSOn {		newNode.DNSOn = currentNode.DNSOn	}	if newNode.IsLocal != currentNode.IsLocal {		newNode.IsLocal = currentNode.IsLocal	}	if newNode.Action == "" {		newNode.Action = currentNode.Action	}	if newNode.RelayAddrs == nil {		newNode.RelayAddrs = currentNode.RelayAddrs	}	if newNode.IsRelay != currentNode.IsRelay {		newNode.IsRelay = currentNode.IsRelay	}	if newNode.IsRelayed == currentNode.IsRelayed {		newNode.IsRelayed = currentNode.IsRelayed	}	if newNode.Server == "" {		newNode.Server = currentNode.Server	}	if newNode.Connected != currentNode.Connected {		newNode.Connected = currentNode.Connected	}	if newNode.DefaultACL == "" {		newNode.DefaultACL = currentNode.DefaultACL	}	if newNode.Failover != currentNode.Failover {		newNode.Failover = currentNode.Failover	}}// StringWithCharset - returns random string inside defined charsetfunc StringWithCharset(length int, charset string) string {	b := make([]byte, length)	for i := range b {		b[i] = charset[seededRand.Intn(len(charset))]	}	return string(b)}// IsIpv4Net - check for valid IPv4 address// Note: We dont handle IPv6 AT ALL!!!!! This definitely is needed at some point// But for iteration 1, lets just stick to IPv4. Keep it simple stupid.func IsIpv4Net(host string) bool {	return net.ParseIP(host) != nil}// Node.NameInNodeCharset - returns if name is in charset below or notfunc (node *LegacyNode) NameInNodeCharSet() bool {	charset := "abcdefghijklmnopqrstuvwxyz1234567890-"	for _, char := range node.Name {		if !strings.Contains(charset, strings.ToLower(string(char))) {			return false		}	}	return true}// == PRO ==// Node.DoesACLAllow - checks if default ACL on node is "yes"func (node *Node) DoesACLAllow() bool {	return node.DefaultACL == "yes"}// Node.DoesACLDeny - checks if default ACL on node is "no"func (node *Node) DoesACLDeny() bool {	return node.DefaultACL == "no"}func (ln *LegacyNode) ConvertToNewNode() (*Host, *Node) {	var node Node	//host:= logic.GetHost(node.HostID)	var host Host	if host.ID.String() == "" {		host.ID = uuid.New()		host.FirewallInUse = ln.FirewallInUse		host.Version = ln.Version		host.IPForwarding = parseBool(ln.IPForwarding)		host.HostPass = ln.Password		host.Name = ln.Name		host.ListenPort = int(ln.ListenPort)		_, cidr, _ := net.ParseCIDR(ln.LocalAddress)		_, cidr, _ = net.ParseCIDR(ln.LocalRange)		host.LocalRange = *cidr		host.LocalListenPort = int(ln.LocalListenPort)		host.ProxyListenPort = int(ln.ProxyListenPort)		host.MTU = int(ln.MTU)		host.PublicKey, _ = wgtypes.ParseKey(ln.PublicKey)		host.MacAddress, _ = net.ParseMAC(ln.MacAddress)		host.TrafficKeyPublic = ln.TrafficKeys.Mine		gateway, _ := net.ResolveUDPAddr("udp", ln.InternetGateway)		host.InternetGateway = *gateway		id, _ := uuid.Parse(ln.ID)		host.Nodes = append(host.Nodes, id.String())		host.Interfaces = ln.Interfaces		host.EndpointIP = net.ParseIP(ln.Endpoint)		// host.ProxyEnabled = ln.Proxy // this will always be false..	}	id, _ := uuid.Parse(ln.ID)	node.ID = id	node.Network = ln.Network	_, cidr, _ := net.ParseCIDR(ln.NetworkSettings.AddressRange)	node.NetworkRange = *cidr	_, cidr, _ = net.ParseCIDR(ln.NetworkSettings.AddressRange6)	node.NetworkRange6 = *cidr	node.Server = ln.Server	node.Connected = parseBool(ln.Connected)	_, cidr, _ = net.ParseCIDR(ln.Address)	node.Address = *cidr	_, cidr, _ = net.ParseCIDR(ln.Address6)	node.Address6 = *cidr	node.PostUp = ln.PostUp	node.PostDown = ln.PostDown	node.Action = ln.Action	node.IsLocal = parseBool(ln.IsLocal)	node.IsEgressGateway = parseBool(ln.IsEgressGateway)	node.IsIngressGateway = parseBool(ln.IsIngressGateway)	node.DNSOn = parseBool(ln.DNSOn)	return &host, &node}// Node.Legacy converts node to legacy formatfunc (n *Node) Legacy(h *Host, s *ServerConfig, net *Network) *LegacyNode {	l := LegacyNode{}	l.ID = n.ID.String()	l.HostID = h.ID.String()	l.Address = n.Address.String()	l.Address6 = n.Address6.String()	l.Interfaces = h.Interfaces	l.Name = h.Name	l.NetworkSettings = *net	l.ListenPort = int32(h.ListenPort)	l.LocalListenPort = int32(h.LocalListenPort)	l.ProxyListenPort = int32(h.ProxyListenPort)	l.PublicKey = h.PublicKey.String()	l.Endpoint = h.EndpointIP.String()	l.PostUp = n.PostUp	l.PostDown = n.PostDown	//l.AllowedIPs =	l.AccessKey = ""	l.Interface = WIREGUARD_INTERFACE	//l.LastModified =	//l.ExpirationDateTime	//l.LastPeerUpdate	//l.LastCheckIn	l.MacAddress = h.MacAddress.String()	l.Password = h.HostPass	l.Network = n.Network	//l.IsRelayed = formatBool(n.Is)	//l.IsRelay = formatBool(n.IsRelay)	//l.IsDocker = formatBool(n.IsDocker)	//l.IsK8S = formatBool(n.IsK8S)	l.IsEgressGateway = formatBool(n.IsEgressGateway)	l.IsIngressGateway = formatBool(n.IsIngressGateway)	//l.EgressGatewayRanges = n.EgressGatewayRanges	//l.EgressGatewayNatEnabled = n.EgressGatewayNatEnabled	//l.RelayAddrs = n.RelayAddrs	//l.FailoverNode = n.FailoverNode	//l.IngressGatewayRange = n.IngressGatewayRange	//l.IngressGatewayRange6 = n.IngressGatewayRange6	l.IsStatic = formatBool(h.IsStatic)	l.UDPHolePunch = formatBool(true)	l.DNSOn = formatBool(n.DNSOn)	l.Action = n.Action	l.IsLocal = formatBool(n.IsLocal)	l.LocalRange = h.LocalRange.String()	l.IPForwarding = formatBool(h.IPForwarding)	l.OS = h.OS	l.MTU = int32(h.MTU)	l.Version = h.Version	l.Server = n.Server	l.TrafficKeys.Mine = h.TrafficKeyPublic	l.TrafficKeys.Server = s.TrafficKey	l.FirewallInUse = h.FirewallInUse	l.InternetGateway = h.InternetGateway.String()	l.Connected = formatBool(n.Connected)	//l.PendingDelete = formatBool(n.PendingDelete)	l.Proxy = h.ProxyEnabled	l.DefaultACL = n.DefaultACL	l.OwnerID = n.OwnerID	//l.Failover = n.Failover	return &l}// Node.NetworkSettings updates a node with network settingsfunc (node *Node) NetworkSettings(n Network) {	_, cidr, err := net.ParseCIDR(n.AddressRange)	if err == nil {		node.NetworkRange = *cidr	}	_, cidr, err = net.ParseCIDR(n.AddressRange6)	if err == nil {		node.NetworkRange6 = *cidr	}}func parseBool(s string) bool {	b := false	if s == "yes" {		b = true	}	return b}func formatBool(b bool) string {	s := "no"	if b {		s = "yes"	}	return s}
 |