fix compile errors

This commit is contained in:
Matthew R. Kasun
2022-12-22 06:42:33 -05:00
parent 54691d94cf
commit bce2f8a45c
7 changed files with 105 additions and 46 deletions

View File

@@ -214,7 +214,7 @@ func getExtClientConf(w http.ResponseWriter, r *http.Request) {
if network.DefaultKeepalive != 0 { if network.DefaultKeepalive != 0 {
keepalive = "PersistentKeepalive = " + strconv.Itoa(int(network.DefaultKeepalive)) keepalive = "PersistentKeepalive = " + strconv.Itoa(int(network.DefaultKeepalive))
} }
gwendpoint := gwnode.EndpointIP.String() + ":" + strconv.Itoa(host.ListenPort) gwendpoint := host.EndpointIP.String() + ":" + strconv.Itoa(host.ListenPort)
newAllowedIPs := network.AddressRange newAllowedIPs := network.AddressRange
if newAllowedIPs != "" && network.AddressRange6 != "" { if newAllowedIPs != "" && network.AddressRange6 != "" {
newAllowedIPs += "," newAllowedIPs += ","
@@ -338,12 +338,11 @@ func createExtClient(w http.ResponseWriter, r *http.Request) {
logger.Log(0, r.Header.Get("user"), logger.Log(0, r.Header.Get("user"),
fmt.Sprintf("failed to get ingress gateway host for node [%s] info: %v", nodeid, err)) fmt.Sprintf("failed to get ingress gateway host for node [%s] info: %v", nodeid, err))
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal")) logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
return
listenPort := host.LocalListenPort listenPort := host.LocalListenPort
if node.Proxy { if host.ProxyEnabled {
listenPort = host.ProxyListenPort listenPort = host.ProxyListenPort
} }
extclient.IngressGatewayEndpoint = node.EndpointIP.String() + ":" + strconv.FormatInt(int64(listenPort), 10) extclient.IngressGatewayEndpoint = host.EndpointIP.String() + ":" + strconv.FormatInt(int64(listenPort), 10)
extclient.Enabled = true extclient.Enabled = true
parentNetwork, err := logic.GetNetwork(networkName) parentNetwork, err := logic.GetNetwork(networkName)

View File

@@ -95,6 +95,14 @@ func authenticate(response http.ResponseWriter, request *http.Request) {
} }
} }
host, err := logic.GetHost(result.HostID.String()) host, err := logic.GetHost(result.HostID.String())
if err != nil {
errorResponse.Code = http.StatusBadRequest
errorResponse.Message = err.Error()
logger.Log(0, request.Header.Get("user"),
"error retrieving host: ", err.Error())
logic.ReturnErrorResponse(response, request, errorResponse)
return
}
err = bcrypt.CompareHashAndPassword([]byte(host.HostPass), []byte(authRequest.Password)) err = bcrypt.CompareHashAndPassword([]byte(host.HostPass), []byte(authRequest.Password))
if err != nil { if err != nil {
@@ -485,7 +493,7 @@ func getNode(w http.ResponseWriter, r *http.Request) {
ServerConfig: server, ServerConfig: server,
PeerIDs: peerUpdate.PeerIDs, PeerIDs: peerUpdate.PeerIDs,
} }
if node.Proxy { if host.ProxyEnabled {
proxyPayload, err := logic.GetPeersForProxy(&node, false) proxyPayload, err := logic.GetPeersForProxy(&node, false)
if err == nil { if err == nil {
response.ProxyUpdate = proxyPayload response.ProxyUpdate = proxyPayload
@@ -985,6 +993,12 @@ func deleteNode(w http.ResponseWriter, r *http.Request) {
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest")) logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
return return
} }
host, err := logic.GetHost(node.HostID.String())
if err != nil {
logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error())
logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
return
}
if r.Header.Get("ismaster") != "yes" { if r.Header.Get("ismaster") != "yes" {
username := r.Header.Get("user") username := r.Header.Get("user")
if username != "" && !doesUserOwnNode(username, params["network"], nodeid) { if username != "" && !doesUserOwnNode(username, params["network"], nodeid) {
@@ -996,7 +1010,7 @@ func deleteNode(w http.ResponseWriter, r *http.Request) {
logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("failed to delete node"), "internal")) logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("failed to delete node"), "internal"))
return return
} }
if node.Proxy { if host.ProxyEnabled {
mq.ProxyUpdate(&manager.ProxyManagerPayload{ mq.ProxyUpdate(&manager.ProxyManagerPayload{
Action: manager.DeleteNetwork, Action: manager.DeleteNetwork,
Network: node.Network, Network: node.Network,

View File

@@ -46,7 +46,7 @@ func CreateEgressGateway(gateway models.EgressGatewayRequest) (models.Node, erro
} }
node.IsEgressGateway = true node.IsEgressGateway = true
node.EgressGatewayRanges = gateway.Ranges node.EgressGatewayRanges = gateway.Ranges
node.EgressGatewayNatEnabled = gateway.NatEnabled node.EgressGatewayNatEnabled = models.ParseBool(gateway.NatEnabled)
node.EgressGatewayRequest = gateway // store entire request for use when preserving the egress gateway node.EgressGatewayRequest = gateway // store entire request for use when preserving the egress gateway
postUpCmd := "" postUpCmd := ""
postDownCmd := "" postDownCmd := ""
@@ -335,7 +335,7 @@ func firewallNFTCommandsCreateIngress(networkInterface string) (string, string)
} }
// firewallNFTCommandsCreateEgress - used to centralize firewall command maintenance for creating an egress gateway using the nftables firewall. // firewallNFTCommandsCreateEgress - used to centralize firewall command maintenance for creating an egress gateway using the nftables firewall.
func firewallNFTCommandsCreateEgress(networkInterface string, gatewayInterface string, gatewayranges []string, egressNatEnabled string, ipv4, ipv6 bool) (string, string) { func firewallNFTCommandsCreateEgress(networkInterface string, gatewayInterface string, gatewayranges []string, egressNatEnabled bool, ipv4, ipv6 bool) (string, string) {
// spacing around ; is important for later parsing of postup/postdown in wireguard/common.go // spacing around ; is important for later parsing of postup/postdown in wireguard/common.go
postUp := "" postUp := ""
postDown := "" postDown := ""
@@ -351,7 +351,7 @@ func firewallNFTCommandsCreateEgress(networkInterface string, gatewayInterface s
postDown += "nft flush table filter ; " postDown += "nft flush table filter ; "
if egressNatEnabled == "yes" { if egressNatEnabled {
postUp += "nft add table nat ; " postUp += "nft add table nat ; "
postUp += "nft add chain nat postrouting ; " postUp += "nft add chain nat postrouting ; "
postUp += "nft add rule ip nat postrouting oifname " + gatewayInterface + " counter masquerade ; " postUp += "nft add rule ip nat postrouting oifname " + gatewayInterface + " counter masquerade ; "
@@ -368,7 +368,7 @@ func firewallNFTCommandsCreateEgress(networkInterface string, gatewayInterface s
postDown += "nft flush table ip6 filter ; " postDown += "nft flush table ip6 filter ; "
if egressNatEnabled == "yes" { if egressNatEnabled {
postUp += "nft add table ip6 nat ; " postUp += "nft add table ip6 nat ; "
postUp += "nft 'add chain ip6 nat prerouting { type nat hook prerouting priority 0 ;}' ; " postUp += "nft 'add chain ip6 nat prerouting { type nat hook prerouting priority 0 ;}' ; "
postUp += "nft 'add chain ip6 nat postrouting { type nat hook postrouting priority 0 ;}' ; " postUp += "nft 'add chain ip6 nat postrouting { type nat hook postrouting priority 0 ;}' ; "
@@ -411,7 +411,7 @@ func firewallIPTablesCommandsCreateIngress(networkInterface string, ipv4, ipv6 b
} }
// firewallIPTablesCommandsCreateEgress - used to centralize firewall command maintenance for creating an egress gateway using the iptables firewall. // firewallIPTablesCommandsCreateEgress - used to centralize firewall command maintenance for creating an egress gateway using the iptables firewall.
func firewallIPTablesCommandsCreateEgress(networkInterface string, gatewayInterface string, egressNatEnabled string, ipv4, ipv6 bool) (string, string) { func firewallIPTablesCommandsCreateEgress(networkInterface string, gatewayInterface string, egressNatEnabled bool, ipv4, ipv6 bool) (string, string) {
// spacing around ; is important for later parsing of postup/postdown in wireguard/common.go // spacing around ; is important for later parsing of postup/postdown in wireguard/common.go
postUp := "" postUp := ""
postDown := "" postDown := ""
@@ -421,7 +421,7 @@ func firewallIPTablesCommandsCreateEgress(networkInterface string, gatewayInterf
postDown += "iptables -D FORWARD -i " + networkInterface + " -j ACCEPT ; " postDown += "iptables -D FORWARD -i " + networkInterface + " -j ACCEPT ; "
postDown += "iptables -D FORWARD -o " + networkInterface + " -j ACCEPT ; " postDown += "iptables -D FORWARD -o " + networkInterface + " -j ACCEPT ; "
if egressNatEnabled == "yes" { if egressNatEnabled {
postUp += "iptables -t nat -A POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; " postUp += "iptables -t nat -A POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; "
postDown += "iptables -t nat -D POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; " postDown += "iptables -t nat -D POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; "
} }
@@ -432,7 +432,7 @@ func firewallIPTablesCommandsCreateEgress(networkInterface string, gatewayInterf
postDown += "ip6tables -D FORWARD -i " + networkInterface + " -j ACCEPT ; " postDown += "ip6tables -D FORWARD -i " + networkInterface + " -j ACCEPT ; "
postDown += "ip6tables -D FORWARD -o " + networkInterface + " -j ACCEPT ; " postDown += "ip6tables -D FORWARD -o " + networkInterface + " -j ACCEPT ; "
if egressNatEnabled == "yes" { if egressNatEnabled {
postUp += "ip6tables -t nat -A POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; " postUp += "ip6tables -t nat -A POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; "
postDown += "ip6tables -t nat -D POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; " postDown += "ip6tables -t nat -D POSTROUTING -o " + gatewayInterface + " -j MASQUERADE ; "
} }

View File

@@ -40,12 +40,16 @@ func GetPeersForProxy(node *models.Node, onlyPeers bool) (manager.ProxyManagerPa
if !onlyPeers { if !onlyPeers {
if node.IsRelayed { if node.IsRelayed {
relayNode := FindRelay(node) relayNode := FindRelay(node)
relayHost, err := GetHost(relayNode.ID.String())
if err != nil {
return proxyPayload, err
}
if relayNode != nil { if relayNode != nil {
host, err := GetHost(relayNode.HostID.String()) host, err := GetHost(relayNode.HostID.String())
if err != nil { if err != nil {
logger.Log(0, "error retrieving host for relay node", relayNode.HostID.String(), err.Error()) logger.Log(0, "error retrieving host for relay node", relayNode.HostID.String(), err.Error())
} }
relayEndpoint, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayNode.EndpointIP, host.LocalListenPort)) relayEndpoint, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayHost.EndpointIP, host.LocalListenPort))
if err != nil { if err != nil {
logger.Log(1, "failed to resolve relay node endpoint: ", err.Error()) logger.Log(1, "failed to resolve relay node endpoint: ", err.Error())
} }
@@ -74,7 +78,7 @@ func GetPeersForProxy(node *models.Node, onlyPeers bool) (manager.ProxyManagerPa
if err != nil { if err != nil {
logger.Log(0, "error retrieving host for relayNode", relayedNode.ID.String(), err.Error()) logger.Log(0, "error retrieving host for relayNode", relayedNode.ID.String(), err.Error())
} }
relayedEndpoint, udpErr := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayedNode.EndpointIP, host.LocalListenPort)) relayedEndpoint, udpErr := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayedHost.EndpointIP, host.LocalListenPort))
if udpErr == nil { if udpErr == nil {
relayPeersMap[host.PublicKey.String()] = proxy_models.RelayedConf{ relayPeersMap[host.PublicKey.String()] = proxy_models.RelayedConf{
RelayedPeerEndpoint: relayedEndpoint, RelayedPeerEndpoint: relayedEndpoint,
@@ -101,7 +105,7 @@ func GetPeersForProxy(node *models.Node, onlyPeers bool) (manager.ProxyManagerPa
if err != nil { if err != nil {
continue continue
} }
proxyStatus := peer.Proxy proxyStatus := host.ProxyEnabled
listenPort := host.LocalListenPort listenPort := host.LocalListenPort
if proxyStatus { if proxyStatus {
listenPort = host.ProxyListenPort listenPort = host.ProxyListenPort
@@ -113,9 +117,9 @@ func GetPeersForProxy(node *models.Node, onlyPeers bool) (manager.ProxyManagerPa
} }
endpoint, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", peer.EndpointIP, listenPort)) endpoint, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", host.EndpointIP, listenPort))
if err != nil { if err != nil {
logger.Log(1, "failed to resolve udp addr for node: ", peer.ID.String(), peer.EndpointIP.String(), err.Error()) logger.Log(1, "failed to resolve udp addr for node: ", peer.ID.String(), host.EndpointIP.String(), err.Error())
continue continue
} }
allowedips := GetAllowedIPs(node, &peer, nil, false) allowedips := GetAllowedIPs(node, &peer, nil, false)
@@ -145,7 +149,7 @@ func GetPeersForProxy(node *models.Node, onlyPeers bool) (manager.ProxyManagerPa
logger.Log(0, "error retrieving host for relayNode", relayNode.ID.String(), err.Error()) logger.Log(0, "error retrieving host for relayNode", relayNode.ID.String(), err.Error())
continue continue
} }
relayTo, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayNode.EndpointIP, relayHost.LocalListenPort)) relayTo, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", relayHost.EndpointIP, relayHost.LocalListenPort))
if err == nil { if err == nil {
peerConfMap[host.PublicKey.String()] = proxy_models.PeerConf{ peerConfMap[host.PublicKey.String()] = proxy_models.PeerConf{
@@ -215,8 +219,11 @@ func GetPeerUpdate(node *models.Node) (models.PeerUpdate, error) {
if err != nil { if err != nil {
return models.PeerUpdate{}, err return models.PeerUpdate{}, err
} }
host, err := GetHost(node.ID.String())
if node.IsRelayed && !node.Proxy { if err != nil {
return peerUpdate, err
}
if node.IsRelayed && !host.ProxyEnabled {
return GetPeerUpdateForRelayedNode(node, udppeers) return GetPeerUpdateForRelayedNode(node, udppeers)
} }
@@ -224,6 +231,11 @@ func GetPeerUpdate(node *models.Node) (models.PeerUpdate, error) {
// #2 Set local address: set_local - could be a LOT BETTER and fix some bugs with additional logic // #2 Set local address: set_local - could be a LOT BETTER and fix some bugs with additional logic
// #3 Set allowedips: set_allowedips // #3 Set allowedips: set_allowedips
for _, peer := range currentPeers { for _, peer := range currentPeers {
peerHost, err := GetHost(peer.ID.String())
if err != nil {
logger.Log(0, "error retrieving host for peer", node.ID.String(), err.Error())
return models.PeerUpdate{}, err
}
if peer.ID == node.ID { if peer.ID == node.ID {
//skip yourself //skip yourself
continue continue
@@ -237,7 +249,7 @@ func GetPeerUpdate(node *models.Node) (models.PeerUpdate, error) {
var setEndpoint = true var setEndpoint = true
if peer.IsRelayed { if peer.IsRelayed {
if !peer.Proxy && !(node.IsRelay && ncutils.StringSliceContains(node.RelayAddrs, peer.PrimaryAddress())) { if !peerHost.ProxyEnabled && !(node.IsRelay && ncutils.StringSliceContains(node.RelayAddrs, peer.PrimaryAddress())) {
//skip -- will be added to relay //skip -- will be added to relay
continue continue
} else if node.IsRelay && ncutils.StringSliceContains(node.RelayAddrs, peer.PrimaryAddress()) { } else if node.IsRelay && ncutils.StringSliceContains(node.RelayAddrs, peer.PrimaryAddress()) {
@@ -261,16 +273,11 @@ func GetPeerUpdate(node *models.Node) (models.PeerUpdate, error) {
logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error()) logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error())
return models.PeerUpdate{}, err return models.PeerUpdate{}, err
} }
peerHost, err := GetHost(peer.HostID.String()) if host.EndpointIP.String() == peerHost.EndpointIP.String() {
if err != nil {
logger.Log(0, "error retrieving host for peer", node.ID.String(), err.Error())
return models.PeerUpdate{}, err
}
if node.EndpointIP.String() == peer.EndpointIP.String() {
//peer is on same network //peer is on same network
// set_local // set_local
if host.LocalAddress.String() != peerHost.LocalAddress.String() && peerHost.LocalAddress.IP != nil { if host.LocalAddress.String() != peerHost.LocalAddress.String() && peerHost.LocalAddress.IP != nil {
peer.EndpointIP = peerHost.LocalAddress.IP peerHost.EndpointIP = peerHost.LocalAddress.IP
if peerHost.LocalListenPort != 0 { if peerHost.LocalListenPort != 0 {
peerHost.ListenPort = peerHost.LocalListenPort peerHost.ListenPort = peerHost.LocalListenPort
} }
@@ -308,14 +315,14 @@ func GetPeerUpdate(node *models.Node) (models.PeerUpdate, error) {
peerHost.ListenPort = peerHost.LocalListenPort peerHost.ListenPort = peerHost.LocalListenPort
} }
endpoint := peer.EndpointIP.String() + ":" + strconv.FormatInt(int64(peerHost.ListenPort), 10) endpoint := peerHost.EndpointIP.String() + ":" + strconv.FormatInt(int64(peerHost.ListenPort), 10)
address, err = net.ResolveUDPAddr("udp", endpoint) address, err = net.ResolveUDPAddr("udp", endpoint)
if err != nil { if err != nil {
return models.PeerUpdate{}, err return models.PeerUpdate{}, err
} }
} }
fetchRelayedIps := true fetchRelayedIps := true
if node.Proxy { if host.ProxyEnabled {
fetchRelayedIps = false fetchRelayedIps = false
} }
allowedips := GetAllowedIPs(node, &peer, metrics, fetchRelayedIps) allowedips := GetAllowedIPs(node, &peer, metrics, fetchRelayedIps)
@@ -741,7 +748,7 @@ func GetPeerUpdateForRelayedNode(node *models.Node, udppeers map[string]string)
listenPort = relayHost.LocalListenPort listenPort = relayHost.LocalListenPort
} }
endpoint := relay.EndpointIP.String() + ":" + strconv.FormatInt(int64(listenPort), 10) endpoint := relayHost.EndpointIP.String() + ":" + strconv.FormatInt(int64(listenPort), 10)
address, err := net.ResolveUDPAddr("udp", endpoint) address, err := net.ResolveUDPAddr("udp", endpoint)
if err != nil { if err != nil {
return models.PeerUpdate{}, err return models.PeerUpdate{}, err
@@ -781,6 +788,11 @@ func getEgressIPs(node, peer *models.Node) []net.IPNet {
if err != nil { if err != nil {
logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error()) logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error())
} }
peerHost, err := GetHost(peer.ID.String())
if err != nil {
logger.Log(0, "error retrieving host for peer", peer.ID.String(), err.Error())
}
//check for internet gateway //check for internet gateway
internetGateway := false internetGateway := false
if slices.Contains(peer.EgressGatewayRanges, "0.0.0.0/0") || slices.Contains(peer.EgressGatewayRanges, "::/0") { if slices.Contains(peer.EgressGatewayRanges, "0.0.0.0/0") || slices.Contains(peer.EgressGatewayRanges, "::/0") {
@@ -793,9 +805,9 @@ func getEgressIPs(node, peer *models.Node) []net.IPNet {
logger.Log(1, "could not parse gateway IP range. Not adding ", iprange) logger.Log(1, "could not parse gateway IP range. Not adding ", iprange)
continue // if can't parse CIDR continue // if can't parse CIDR
} }
nodeEndpointArr := strings.Split(peer.EndpointIP.String(), ":") // getting the public ip of node nodeEndpointArr := strings.Split(peerHost.EndpointIP.String(), ":") // getting the public ip of node
if ipnet.Contains(net.ParseIP(nodeEndpointArr[0])) && !internetGateway { // ensuring egress gateway range does not contain endpoint of node if ipnet.Contains(net.ParseIP(nodeEndpointArr[0])) && !internetGateway { // ensuring egress gateway range does not contain endpoint of node
logger.Log(2, "egress IP range of ", iprange, " overlaps with ", node.EndpointIP.String(), ", omitting") logger.Log(2, "egress IP range of ", iprange, " overlaps with ", host.EndpointIP.String(), ", omitting")
continue // skip adding egress range if overlaps with node's ip continue // skip adding egress range if overlaps with node's ip
} }
// TODO: Could put in a lot of great logic to avoid conflicts / bad routes // TODO: Could put in a lot of great logic to avoid conflicts / bad routes
@@ -814,11 +826,13 @@ func getEgressIPs(node, peer *models.Node) []net.IPNet {
func getNodeAllowedIPs(peer, node *models.Node) []net.IPNet { func getNodeAllowedIPs(peer, node *models.Node) []net.IPNet {
var allowedips = []net.IPNet{} var allowedips = []net.IPNet{}
host, err := GetHost(node.ID.String())
if err != nil {
logger.Log(0, "error retrieving host for node", node.ID.String(), err.Error())
}
if peer.Address.IP != nil { if peer.Address.IP != nil {
allowedips = append(allowedips, peer.Address) allowedips = append(allowedips, peer.Address)
} }
if peer.Address6.IP != nil { if peer.Address6.IP != nil {
allowedips = append(allowedips, peer.Address6) allowedips = append(allowedips, peer.Address6)
} }
@@ -827,7 +841,7 @@ func getNodeAllowedIPs(peer, node *models.Node) []net.IPNet {
// parsing as a CIDR first. If valid CIDR, append // parsing as a CIDR first. If valid CIDR, append
if _, ipnet, err := net.ParseCIDR(allowedIp); err == nil { if _, ipnet, err := net.ParseCIDR(allowedIp); err == nil {
nodeEndpointArr := strings.Split(node.EndpointIP.String(), ":") nodeEndpointArr := strings.Split(host.EndpointIP.String(), ":")
if !ipnet.Contains(net.IP(nodeEndpointArr[0])) && ipnet.IP.String() != peer.Address.IP.String() { // don't need to add an allowed ip that already exists.. if !ipnet.Contains(net.IP(nodeEndpointArr[0])) && ipnet.IP.String() != peer.Address.IP.String() { // don't need to add an allowed ip that already exists..
allowedips = append(allowedips, *ipnet) allowedips = append(allowedips, *ipnet)
} }

View File

@@ -41,3 +41,21 @@ type Host struct {
IsK8S bool `json:"isk8s" yaml:"isk8s"` IsK8S bool `json:"isk8s" yaml:"isk8s"`
IsStatic bool `json:"isstatic" yaml:"isstatic"` IsStatic bool `json:"isstatic" yaml:"isstatic"`
} }
// FormatBool converts a boolean to a [yes|no] string
func FormatBool(b bool) string {
s := "no"
if b {
s = "yes"
}
return s
}
// ParseBool parses a [yes|no] string to boolean value
func ParseBool(s string) bool {
b := false
if s == "yes" {
b = true
}
return b
}

View File

@@ -57,9 +57,9 @@ func Ping(client mqtt.Client, msg mqtt.Message) {
node.SetLastCheckIn() node.SetLastCheckIn()
host.Version = checkin.Version host.Version = checkin.Version
node.Connected = checkin.Connected node.Connected = checkin.Connected
node.Interfaces = checkin.Ifaces host.Interfaces = checkin.Ifaces
for i := range node.Interfaces { for i := range host.Interfaces {
node.Interfaces[i].AddressString = node.Interfaces[i].Address.String() host.Interfaces[i].AddressString = host.Interfaces[i].Address.String()
} }
if err := logic.UpdateNode(&node, &node); err != nil { if err := logic.UpdateNode(&node, &node); err != nil {
logger.Log(0, "error updating node", node.ID.String(), " on checkin", err.Error()) logger.Log(0, "error updating node", node.ID.String(), " on checkin", err.Error())

View File

@@ -49,12 +49,16 @@ func PublishProxyPeerUpdate(node *models.Node) error {
// PublishSinglePeerUpdate --- determines and publishes a peer update to one node // PublishSinglePeerUpdate --- determines and publishes a peer update to one node
func PublishSinglePeerUpdate(node *models.Node) error { func PublishSinglePeerUpdate(node *models.Node) error {
host, err := logic.GetHost(node.ID.String())
if err != nil {
return nil
}
peerUpdate, err := logic.GetPeerUpdate(node) peerUpdate, err := logic.GetPeerUpdate(node)
if err != nil { if err != nil {
return err return err
} }
if node.Proxy { if host.ProxyEnabled {
proxyUpdate, err := logic.GetPeersForProxy(node, false) proxyUpdate, err := logic.GetPeersForProxy(node, false)
if err != nil { if err != nil {
return err return err
@@ -73,7 +77,10 @@ func PublishSinglePeerUpdate(node *models.Node) error {
// PublishPeerUpdate --- publishes a peer update to all the peers of a node // PublishPeerUpdate --- publishes a peer update to all the peers of a node
func PublishExtPeerUpdate(node *models.Node) error { func PublishExtPeerUpdate(node *models.Node) error {
var err error host, err := logic.GetHost(node.ID.String())
if err != nil {
return nil
}
if !servercfg.IsMessageQueueBackend() { if !servercfg.IsMessageQueueBackend() {
return nil return nil
} }
@@ -85,7 +92,7 @@ func PublishExtPeerUpdate(node *models.Node) error {
if err != nil { if err != nil {
return err return err
} }
if node.Proxy { if host.ProxyEnabled {
proxyUpdate, err := logic.GetPeersForProxy(node, false) proxyUpdate, err := logic.GetPeersForProxy(node, false)
if err == nil { if err == nil {
peerUpdate.ProxyUpdate = proxyUpdate peerUpdate.ProxyUpdate = proxyUpdate
@@ -101,7 +108,10 @@ func PublishExtPeerUpdate(node *models.Node) error {
// NodeUpdate -- publishes a node update // NodeUpdate -- publishes a node update
func NodeUpdate(node *models.Node) error { func NodeUpdate(node *models.Node) error {
var err error host, err := logic.GetHost(node.ID.String())
if err != nil {
return nil
}
if !servercfg.IsMessageQueueBackend() { if !servercfg.IsMessageQueueBackend() {
return nil return nil
} }
@@ -120,7 +130,7 @@ func NodeUpdate(node *models.Node) error {
logger.Log(2, "error publishing node update to peer ", node.ID.String(), err.Error()) logger.Log(2, "error publishing node update to peer ", node.ID.String(), err.Error())
return err return err
} }
if node.Proxy { if host.ProxyEnabled {
err = PublishProxyPeerUpdate(node) err = PublishProxyPeerUpdate(node)
if err != nil { if err != nil {
logger.Log(1, "failed to publish proxy update to node", node.ID.String(), "on network", node.Network, ":", err.Error()) logger.Log(1, "failed to publish proxy update to node", node.ID.String(), "on network", node.Network, ":", err.Error())
@@ -132,7 +142,11 @@ func NodeUpdate(node *models.Node) error {
// ProxyUpdate -- publishes updates to peers related to proxy // ProxyUpdate -- publishes updates to peers related to proxy
func ProxyUpdate(proxyPayload *manager.ProxyManagerPayload, node *models.Node) error { func ProxyUpdate(proxyPayload *manager.ProxyManagerPayload, node *models.Node) error {
if !servercfg.IsMessageQueueBackend() || !node.Proxy { host, err := logic.GetHost(node.ID.String())
if err != nil {
return nil
}
if !servercfg.IsMessageQueueBackend() || !host.ProxyEnabled {
return nil return nil
} }
logger.Log(3, "publishing proxy update to "+node.ID.String()) logger.Log(3, "publishing proxy update to "+node.ID.String())