mirror of
https://github.com/gravitl/netmaker.git
synced 2025-10-06 17:29:15 +08:00
node ACL logic + tests implemented
This commit is contained in:
@@ -1,2 +1 @@
|
|||||||
10.0.0.1 testnode.skynet
|
10.0.0.2 testnode.skynet myhost.skynet
|
||||||
10.0.0.2 myhost.skynet
|
|
||||||
|
@@ -5,6 +5,8 @@ import (
|
|||||||
|
|
||||||
"github.com/gravitl/netmaker/database"
|
"github.com/gravitl/netmaker/database"
|
||||||
"github.com/gravitl/netmaker/logic"
|
"github.com/gravitl/netmaker/logic"
|
||||||
|
"github.com/gravitl/netmaker/logic/acls"
|
||||||
|
nodeacls "github.com/gravitl/netmaker/logic/acls/node-acls"
|
||||||
"github.com/gravitl/netmaker/models"
|
"github.com/gravitl/netmaker/models"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
)
|
)
|
||||||
@@ -143,6 +145,61 @@ func TestValidateEgressGateway(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestNodeACLs(t *testing.T) {
|
||||||
|
deleteAllNodes()
|
||||||
|
node1 := models.Node{PublicKey: "DM5qhLAE20PG9BbfBCger+Ac9D2NDOwCtY1rbYDLf34=", Name: "testnode", Endpoint: "10.0.0.50", MacAddress: "01:02:03:04:05:06", Password: "password", Network: "skynet", OS: "linux"}
|
||||||
|
node2 := models.Node{PublicKey: "DM5qhLAE20FG7BbfBCger+Ac9D2NDOwCtY1rbYDXf14=", Name: "testnode", Endpoint: "10.0.0.100", MacAddress: "01:02:03:04:05:07", Password: "password", Network: "skynet", OS: "linux"}
|
||||||
|
logic.CreateNode(&node1)
|
||||||
|
logic.CreateNode(&node2)
|
||||||
|
currentACL, err := nodeacls.CreateNetworkACL(acls.NetworkID(node1.Network))
|
||||||
|
t.Run("acls not present", func(t *testing.T) {
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.Nil(t, currentACL[acls.NodeID(node1.ID)])
|
||||||
|
assert.Nil(t, currentACL[acls.NodeID(node2.ID)])
|
||||||
|
node1ACL, err := nodeacls.FetchNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID))
|
||||||
|
assert.NotNil(t, err)
|
||||||
|
assert.Nil(t, node1ACL)
|
||||||
|
assert.EqualError(t, err, "no node ACL present for node "+node1.ID)
|
||||||
|
})
|
||||||
|
t.Run("node acls exists after creates", func(t *testing.T) {
|
||||||
|
node1ACL, err := nodeacls.CreateNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID), acls.Allowed)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotNil(t, node1ACL)
|
||||||
|
assert.Equal(t, node1ACL[acls.NodeID(node2.ID)], acls.NotPresent)
|
||||||
|
node2ACL, err := nodeacls.CreateNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node2.ID), acls.Allowed)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotNil(t, node2ACL)
|
||||||
|
assert.Equal(t, acls.Allowed, node2ACL[acls.NodeID(node1.ID)])
|
||||||
|
})
|
||||||
|
t.Run("node acls correct after fetch", func(t *testing.T) {
|
||||||
|
node1ACL, err := nodeacls.FetchNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID))
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.Equal(t, acls.Allowed, node1ACL[acls.NodeID(node2.ID)])
|
||||||
|
})
|
||||||
|
t.Run("node acls correct after modify", func(t *testing.T) {
|
||||||
|
retNetworkACL, err := nodeacls.ChangeNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID), acls.NodeID(node2.ID), acls.NotAllowed)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotNil(t, retNetworkACL)
|
||||||
|
assert.Equal(t, acls.NotAllowed, retNetworkACL[acls.NodeID(node1.ID)][acls.NodeID(node2.ID)])
|
||||||
|
assert.Equal(t, acls.NotAllowed, retNetworkACL[acls.NodeID(node2.ID)][acls.NodeID(node1.ID)])
|
||||||
|
})
|
||||||
|
t.Run("node acls correct after erroneous modify", func(t *testing.T) {
|
||||||
|
retNetworkACL, err := nodeacls.ChangeNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID), acls.NodeID(node2.ID), acls.NotPresent)
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotNil(t, retNetworkACL)
|
||||||
|
assert.Equal(t, acls.NotAllowed, retNetworkACL[acls.NodeID(node1.ID)][acls.NodeID(node2.ID)])
|
||||||
|
assert.Equal(t, acls.NotAllowed, retNetworkACL[acls.NodeID(node2.ID)][acls.NodeID(node1.ID)])
|
||||||
|
})
|
||||||
|
t.Run("node acls removed", func(t *testing.T) {
|
||||||
|
retNetworkACL, err := nodeacls.RemoveNodeACL(acls.NetworkID(node1.Network), acls.NodeID(node1.ID))
|
||||||
|
assert.Nil(t, err)
|
||||||
|
assert.NotNil(t, retNetworkACL)
|
||||||
|
assert.Equal(t, acls.NotPresent, retNetworkACL[acls.NodeID(node2.ID)][acls.NodeID(node1.ID)])
|
||||||
|
})
|
||||||
|
|
||||||
|
deleteAllNodes()
|
||||||
|
}
|
||||||
|
|
||||||
func deleteAllNodes() {
|
func deleteAllNodes() {
|
||||||
database.DeleteAllRecords(database.NODES_TABLE_NAME)
|
database.DeleteAllRecords(database.NODES_TABLE_NAME)
|
||||||
}
|
}
|
||||||
|
@@ -4,57 +4,97 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
|
||||||
"github.com/gravitl/netmaker/database"
|
"github.com/gravitl/netmaker/database"
|
||||||
|
"github.com/gravitl/netmaker/logic/acls"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UpsertNodeACL - inserts or updates a node ACL on given network
|
// ChangeNodeACL - takes in two node IDs of a given network and changes them to specified allowed or not value
|
||||||
func UpsertNodeACL(networkID NetworkID, nodeID NodeID, defaultVal byte) (NodeACL, error) {
|
// returns the total network's ACL and error
|
||||||
if defaultVal != NotAllowed && defaultVal != Allowed {
|
func ChangeNodeACL(networkID acls.NetworkID, node1, node2 acls.NodeID, value byte) (acls.NetworkACL, error) {
|
||||||
defaultVal = NotAllowed
|
if value != acls.NotAllowed && value != acls.Allowed { // if invalid option make not allowed
|
||||||
|
value = acls.NotAllowed
|
||||||
|
}
|
||||||
|
currentACL, err := FetchCurrentACL(networkID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// == make the access control change ==
|
||||||
|
currentACL[node1][node2] = value
|
||||||
|
currentACL[node2][node1] = value
|
||||||
|
return UpsertNetworkACL(networkID, currentACL)
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateNodeACL - inserts or updates a node ACL on given network
|
||||||
|
func CreateNodeACL(networkID acls.NetworkID, nodeID acls.NodeID, defaultVal byte) (acls.NodeACL, error) {
|
||||||
|
if defaultVal != acls.NotAllowed && defaultVal != acls.Allowed {
|
||||||
|
defaultVal = acls.NotAllowed
|
||||||
}
|
}
|
||||||
var currentNetworkACL, err = FetchCurrentACL(networkID)
|
var currentNetworkACL, err = FetchCurrentACL(networkID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
var newNodeACL = make(NodeACL)
|
var newNodeACL = make(acls.NodeACL)
|
||||||
for existingNode := range currentNetworkACL {
|
for existingNodeID := range currentNetworkACL {
|
||||||
currentNetworkACL[existingNode][nodeID] = defaultVal
|
currentNetworkACL[existingNodeID][nodeID] = defaultVal // set the old nodes to default value for new node
|
||||||
newNodeACL[existingNode] = defaultVal
|
newNodeACL[existingNodeID] = defaultVal // set the old nodes in new node ACL to default value
|
||||||
}
|
}
|
||||||
currentNetworkACL[nodeID] = newNodeACL
|
currentNetworkACL[nodeID] = newNodeACL // append the new node's ACL
|
||||||
return newNodeACL, nil
|
retNetworkACL, err := UpsertNetworkACL(networkID, currentNetworkACL) // insert into db, return result
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return retNetworkACL[nodeID], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateNetworkACL - creates an empty ACL list in a given network
|
||||||
|
func CreateNetworkACL(networkID acls.NetworkID) (acls.NetworkACL, error) {
|
||||||
|
var networkACL = make(acls.NetworkACL)
|
||||||
|
return networkACL, database.Insert(string(networkID), string(convertNetworkACLtoACLJson(&networkACL)), database.NODE_ACLS_TABLE_NAME)
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpsertNodeACL - applies a NodeACL to the db, overwrites or creates
|
||||||
|
func UpsertNodeACL(networkID acls.NetworkID, nodeID acls.NodeID, nodeACL acls.NodeACL) (acls.NodeACL, error) {
|
||||||
|
currentNetACL, err := FetchCurrentACL(networkID)
|
||||||
|
if err != nil {
|
||||||
|
return nodeACL, err
|
||||||
|
}
|
||||||
|
currentNetACL[nodeID] = nodeACL
|
||||||
|
_, err = UpsertNetworkACL(networkID, currentNetACL)
|
||||||
|
return nodeACL, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpsertNetworkACL - Inserts or updates a network ACL given the json string of the ACL and the network name
|
// UpsertNetworkACL - Inserts or updates a network ACL given the json string of the ACL and the network name
|
||||||
// if nil, create it
|
// if nil, create it
|
||||||
func UpsertNetworkACL(networkID NetworkID, networkACL NetworkACL) (NetworkACL, error) {
|
func UpsertNetworkACL(networkID acls.NetworkID, networkACL acls.NetworkACL) (acls.NetworkACL, error) {
|
||||||
if networkACL == nil {
|
if networkACL == nil {
|
||||||
networkACL = make(NetworkACL)
|
networkACL = make(acls.NetworkACL)
|
||||||
}
|
}
|
||||||
return networkACL, database.Insert(string(networkID), string(convertNetworkACLtoACLJson(&networkACL)), database.NODE_ACLS_TABLE_NAME)
|
return networkACL, database.Insert(string(networkID), string(convertNetworkACLtoACLJson(&networkACL)), database.NODE_ACLS_TABLE_NAME)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoveNodeACL - removes a specific Node's ACL, returns the NetworkACL and error
|
// RemoveNodeACL - removes a specific Node's ACL, returns the NetworkACL and error
|
||||||
func RemoveNodeACL(networkID NetworkID, nodeID NodeID) (NetworkACL, error) {
|
func RemoveNodeACL(networkID acls.NetworkID, nodeID acls.NodeID) (acls.NetworkACL, error) {
|
||||||
var currentNeworkACL, err = FetchCurrentACL(networkID)
|
var currentNeworkACL, err = FetchCurrentACL(networkID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
for currentNodeID := range currentNeworkACL {
|
for currentNodeID := range currentNeworkACL {
|
||||||
delete(currentNeworkACL[nodeID], currentNodeID)
|
if currentNodeID != nodeID {
|
||||||
|
delete(currentNeworkACL[currentNodeID], nodeID)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
delete(currentNeworkACL, nodeID)
|
delete(currentNeworkACL, nodeID)
|
||||||
return UpsertNetworkACL(networkID, currentNeworkACL)
|
return UpsertNetworkACL(networkID, currentNeworkACL)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoveNetworkACL - just delete the network ACL
|
// RemoveNetworkACL - just delete the network ACL
|
||||||
func RemoveNetworkACL(networkID NetworkID) error {
|
func RemoveNetworkACL(networkID acls.NetworkID) error {
|
||||||
return database.DeleteRecord(database.NODE_ACLS_TABLE_NAME, string(networkID))
|
return database.DeleteRecord(database.NODE_ACLS_TABLE_NAME, string(networkID))
|
||||||
}
|
}
|
||||||
|
|
||||||
func convertNetworkACLtoACLJson(networkACL *NetworkACL) ACLJson {
|
func convertNetworkACLtoACLJson(networkACL *acls.NetworkACL) acls.ACLJson {
|
||||||
data, err := json.Marshal(networkACL)
|
data, err := json.Marshal(networkACL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
return ACLJson(data)
|
return acls.ACLJson(data)
|
||||||
}
|
}
|
||||||
|
@@ -2,30 +2,35 @@ package nodeacls
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
"github.com/gravitl/netmaker/database"
|
"github.com/gravitl/netmaker/database"
|
||||||
|
"github.com/gravitl/netmaker/logic/acls"
|
||||||
)
|
)
|
||||||
|
|
||||||
// AreNodesAllowed - checks if nodes are allowed to communicate in their network ACL
|
// AreNodesAllowed - checks if nodes are allowed to communicate in their network ACL
|
||||||
func AreNodesAllowed(networkID NetworkID, node1, node2 NodeID) bool {
|
func AreNodesAllowed(networkID acls.NetworkID, node1, node2 acls.NodeID) bool {
|
||||||
var currentNetworkACL, err = FetchCurrentACL(networkID)
|
var currentNetworkACL, err = FetchCurrentACL(networkID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
return currentNetworkACL[node1][node2] == Allowed && currentNetworkACL[node2][node1] == Allowed
|
return currentNetworkACL[node1][node2] == acls.Allowed && currentNetworkACL[node2][node1] == acls.Allowed
|
||||||
}
|
}
|
||||||
|
|
||||||
// FetchNodeACL - fetches a specific node's ACL in a given network
|
// FetchNodeACL - fetches a specific node's ACL in a given network
|
||||||
func FetchNodeACL(networkID NetworkID, nodeID NodeID) (NodeACL, error) {
|
func FetchNodeACL(networkID acls.NetworkID, nodeID acls.NodeID) (acls.NodeACL, error) {
|
||||||
currentNetACL, err := FetchCurrentACL(networkID)
|
currentNetACL, err := FetchCurrentACL(networkID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
if currentNetACL[nodeID] == nil {
|
||||||
|
return nil, fmt.Errorf("no node ACL present for node %s", nodeID)
|
||||||
|
}
|
||||||
return currentNetACL[nodeID], nil
|
return currentNetACL[nodeID], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FetchNodeACLJson - fetches a node's acl in given network except returns the json string
|
// FetchNodeACLJson - fetches a node's acl in given network except returns the json string
|
||||||
func FetchNodeACLJson(networkID NetworkID, nodeID NodeID) (ACLJson, error) {
|
func FetchNodeACLJson(networkID acls.NetworkID, nodeID acls.NodeID) (acls.ACLJson, error) {
|
||||||
currentNodeACL, err := FetchNodeACL(networkID, nodeID)
|
currentNodeACL, err := FetchNodeACL(networkID, nodeID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
@@ -34,16 +39,16 @@ func FetchNodeACLJson(networkID NetworkID, nodeID NodeID) (ACLJson, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
return ACLJson(jsonData), nil
|
return acls.ACLJson(jsonData), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FetchCurrentACL - fetches all current node rules in given network ACL
|
// FetchCurrentACL - fetches all current node rules in given network ACL
|
||||||
func FetchCurrentACL(networkID NetworkID) (NetworkACL, error) {
|
func FetchCurrentACL(networkID acls.NetworkID) (acls.NetworkACL, error) {
|
||||||
aclJson, err := FetchCurrentACLJson(NetworkID(networkID))
|
aclJson, err := FetchCurrentACLJson(acls.NetworkID(networkID))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
var currentNetworkACL NetworkACL
|
var currentNetworkACL acls.NetworkACL
|
||||||
if err := json.Unmarshal([]byte(aclJson), ¤tNetworkACL); err != nil {
|
if err := json.Unmarshal([]byte(aclJson), ¤tNetworkACL); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@@ -51,10 +56,10 @@ func FetchCurrentACL(networkID NetworkID) (NetworkACL, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// FetchCurrentACLJson - fetch the current ACL of given network except in json string
|
// FetchCurrentACLJson - fetch the current ACL of given network except in json string
|
||||||
func FetchCurrentACLJson(networkID NetworkID) (ACLJson, error) {
|
func FetchCurrentACLJson(networkID acls.NetworkID) (acls.ACLJson, error) {
|
||||||
currentACLs, err := database.FetchRecord(database.NODE_ACLS_TABLE_NAME, string(networkID))
|
currentACLs, err := database.FetchRecord(database.NODE_ACLS_TABLE_NAME, string(networkID))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return ACLJson(""), err
|
return acls.ACLJson(""), err
|
||||||
}
|
}
|
||||||
return ACLJson(currentACLs), nil
|
return acls.ACLJson(currentACLs), nil
|
||||||
}
|
}
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
package nodeacls
|
package acls
|
||||||
|
|
||||||
var (
|
var (
|
||||||
// NotPresent - 0 - not present (default)
|
// NotPresent - 0 - not present (default)
|
Reference in New Issue
Block a user