egress.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. package logic
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "maps"
  7. "github.com/gravitl/netmaker/db"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/schema"
  10. "github.com/gravitl/netmaker/servercfg"
  11. )
  12. func ValidateEgressReq(e *schema.Egress) error {
  13. if e.Network == "" {
  14. return errors.New("network id is empty")
  15. }
  16. _, err := GetNetwork(e.Network)
  17. if err != nil {
  18. return errors.New("failed to get network " + err.Error())
  19. }
  20. if !servercfg.IsPro && len(e.Nodes) > 1 {
  21. return errors.New("can only set one routing node on CE")
  22. }
  23. if len(e.Nodes) > 0 {
  24. for k := range e.Nodes {
  25. _, err := GetNodeByID(k)
  26. if err != nil {
  27. return errors.New("invalid routing node " + err.Error())
  28. }
  29. }
  30. }
  31. return nil
  32. }
  33. func DoesNodeHaveAccessToEgress(node *models.Node, e *schema.Egress, acls []models.Acl) bool {
  34. nodeTags := maps.Clone(node.Tags)
  35. nodeTags[models.TagID(node.ID.String())] = struct{}{}
  36. for _, acl := range acls {
  37. if !acl.Enabled {
  38. continue
  39. }
  40. srcVal := ConvAclTagToValueMap(acl.Src)
  41. if acl.AllowedDirection == models.TrafficDirectionBi {
  42. if _, ok := srcVal["*"]; ok {
  43. return true
  44. }
  45. }
  46. for _, dstI := range acl.Dst {
  47. if dstI.ID == models.NodeTagID && dstI.Value == "*" {
  48. return true
  49. }
  50. if dstI.ID == models.EgressID && dstI.Value == e.ID {
  51. e := schema.Egress{ID: dstI.Value}
  52. err := e.Get(db.WithContext(context.TODO()))
  53. if err != nil {
  54. continue
  55. }
  56. if node.IsStatic {
  57. if _, ok := srcVal[node.StaticNode.ClientID]; ok {
  58. return true
  59. }
  60. } else {
  61. if _, ok := srcVal[node.ID.String()]; ok {
  62. return true
  63. }
  64. }
  65. for tagID := range nodeTags {
  66. if _, ok := srcVal[tagID.String()]; ok {
  67. return true
  68. }
  69. }
  70. }
  71. }
  72. }
  73. return false
  74. }
  75. func AddEgressInfoToPeerByAccess(node, targetNode *models.Node, eli []schema.Egress, acls []models.Acl, isDefaultPolicyActive bool) {
  76. req := models.EgressGatewayRequest{
  77. NodeID: targetNode.ID.String(),
  78. NetID: targetNode.Network,
  79. NatEnabled: "yes",
  80. }
  81. for _, e := range eli {
  82. if !e.Status || e.Network != targetNode.Network {
  83. continue
  84. }
  85. if !isDefaultPolicyActive {
  86. if !DoesNodeHaveAccessToEgress(node, &e, acls) {
  87. if node.IsRelayed && node.RelayedBy == targetNode.ID.String() {
  88. if !DoesNodeHaveAccessToEgress(targetNode, &e, acls) {
  89. continue
  90. }
  91. } else {
  92. continue
  93. }
  94. }
  95. }
  96. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  97. m64, err := metric.(json.Number).Int64()
  98. if err != nil {
  99. m64 = 256
  100. }
  101. m := uint32(m64)
  102. req.Ranges = append(req.Ranges, e.Range)
  103. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  104. Network: e.Range,
  105. Nat: e.Nat,
  106. RouteMetric: m,
  107. })
  108. }
  109. }
  110. if targetNode.Mutex != nil {
  111. targetNode.Mutex.Lock()
  112. }
  113. if len(req.Ranges) > 0 {
  114. targetNode.EgressDetails.IsEgressGateway = true
  115. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  116. targetNode.EgressDetails.EgressGatewayRequest = req
  117. } else {
  118. targetNode.EgressDetails = models.EgressDetails{}
  119. }
  120. if targetNode.Mutex != nil {
  121. targetNode.Mutex.Unlock()
  122. }
  123. }
  124. func GetNodeEgressInfo(targetNode *models.Node, eli []schema.Egress, acls []models.Acl) {
  125. req := models.EgressGatewayRequest{
  126. NodeID: targetNode.ID.String(),
  127. NetID: targetNode.Network,
  128. NatEnabled: "yes",
  129. }
  130. for _, e := range eli {
  131. if !e.Status || e.Network != targetNode.Network {
  132. continue
  133. }
  134. if metric, ok := e.Nodes[targetNode.ID.String()]; ok {
  135. m64, err := metric.(json.Number).Int64()
  136. if err != nil {
  137. m64 = 256
  138. }
  139. m := uint32(m64)
  140. req.Ranges = append(req.Ranges, e.Range)
  141. req.RangesWithMetric = append(req.RangesWithMetric, models.EgressRangeMetric{
  142. Network: e.Range,
  143. Nat: e.Nat,
  144. RouteMetric: m,
  145. })
  146. }
  147. }
  148. if targetNode.Mutex != nil {
  149. targetNode.Mutex.Lock()
  150. }
  151. if len(req.Ranges) > 0 {
  152. targetNode.EgressDetails.IsEgressGateway = true
  153. targetNode.EgressDetails.EgressGatewayRanges = req.Ranges
  154. targetNode.EgressDetails.EgressGatewayRequest = req
  155. } else {
  156. targetNode.EgressDetails = models.EgressDetails{}
  157. }
  158. if targetNode.Mutex != nil {
  159. targetNode.Mutex.Unlock()
  160. }
  161. }
  162. func RemoveNodeFromEgress(node models.Node) {
  163. egs, _ := (&schema.Egress{
  164. Network: node.Network,
  165. }).ListByNetwork(db.WithContext(context.TODO()))
  166. for _, egI := range egs {
  167. if _, ok := egI.Nodes[node.ID.String()]; ok {
  168. delete(egI.Nodes, node.ID.String())
  169. egI.Update(db.WithContext(context.TODO()))
  170. }
  171. }
  172. }
  173. func GetEgressRanges(netID models.NetworkID) (map[string][]string, map[string]struct{}, error) {
  174. resultMap := make(map[string]struct{})
  175. nodeEgressMap := make(map[string][]string)
  176. networkNodes, err := GetNetworkNodes(netID.String())
  177. if err != nil {
  178. return nil, nil, err
  179. }
  180. for _, currentNode := range networkNodes {
  181. if currentNode.Network != netID.String() {
  182. continue
  183. }
  184. if currentNode.EgressDetails.IsEgressGateway { // add the egress gateway range(s) to the result
  185. if len(currentNode.EgressDetails.EgressGatewayRanges) > 0 {
  186. nodeEgressMap[currentNode.ID.String()] = currentNode.EgressDetails.EgressGatewayRanges
  187. for _, egressRangeI := range currentNode.EgressDetails.EgressGatewayRanges {
  188. resultMap[egressRangeI] = struct{}{}
  189. }
  190. }
  191. }
  192. }
  193. extclients, _ := GetNetworkExtClients(netID.String())
  194. for _, extclient := range extclients {
  195. if len(extclient.ExtraAllowedIPs) > 0 {
  196. nodeEgressMap[extclient.ClientID] = extclient.ExtraAllowedIPs
  197. for _, extraAllowedIP := range extclient.ExtraAllowedIPs {
  198. resultMap[extraAllowedIP] = struct{}{}
  199. }
  200. }
  201. }
  202. return nodeEgressMap, resultMap, nil
  203. }