mirror of
https://github.com/gravitl/netmaker.git
synced 2026-04-22 16:07:11 +08:00
edda2868fc
* feat(go): add user schema; * feat(go): migrate to user schema; * feat(go): add audit fields; * feat(go): remove unused fields from the network model; * feat(go): add network schema; * feat(go): migrate to network schema; * refactor(go): add comment to clarify migration logic; * fix(go): test failures; * fix(go): test failures; * feat(go): change membership table to store memberships at all scopes; * feat(go): add schema for access grants; * feat(go): remove nameservers from new networks table; ensure db passed for schema functions; * feat(go): set max conns for sqlite to 1; * fix(go): issues updating user account status; * refactor(go): remove converters and access grants; * refactor(go): add json tags in schema models; * refactor(go): rename file to migrate_v1_6_0.go; * refactor(go): add user groups and user roles tables; use schema tables; * refactor(go): inline get and list from schema package; * refactor(go): inline get network and list users from schema package; * fix(go): staticcheck issues; * fix(go): remove test not in use; fix test case; * fix(go): validate network; * fix(go): resolve static checks; * fix(go): new models errors; * fix(go): test errors; * fix(go): handle no records; * fix(go): add validations for user object; * fix(go): set correct extclient status; * fix(go): test error; * feat(go): make schema the base package; * feat(go): add host schema; * feat(go): use schema host everywhere; * feat(go): inline get host, list hosts and delete host; * feat(go): use non-ptr value; * feat(go): use save to upsert all fields; * feat(go): use save to upsert all fields; * feat(go): save turn endpoint as string; * feat(go): check for gorm error record not found; * fix(go): test failures; * fix(go): update all network fields; * fix(go): update all network fields; * feat(go): add paginated list networks api; * feat(go): add paginated list users api; * feat(go): add paginated list hosts api; * feat(go): add pagination to list groups api; * fix(go): comment; * fix(go): implement marshal and unmarshal text for custom types; * fix(go): implement marshal and unmarshal json for custom types; * fix(go): just use the old model for unmarshalling; * fix(go): implement marshal and unmarshal json for custom types; * feat(go): remove paginated list networks api; * feat(go): use custom paginated response object; * fix(go): ensure default values for page and per_page are used when not passed; * fix(go): rename v1.6.0 to v1.5.1; * fix(go): check for gorm.ErrRecordNotFound instead of database.IsEmptyRecord; * fix(go): use host id, not pending host id; * feat(go): add filters to paginated apis; * feat(go): add filters to paginated apis; * feat(go): remove check for max username length; * feat(go): add filters to count as well; * feat(go): use library to check email address validity; * feat(go): ignore pagination if params not passed; * fix(go): pagination issues; * fix(go): check exists before using; * fix(go): remove debug log; * fix(go): use gorm err record not found; * fix(go): use gorm err record not found; * fix(go): use user principal name when creating pending user; * fix(go): use schema package for consts; * fix(go): prevent disabling superadmin user; Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): swap is admin and is superadmin; Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): remove dead code block; https://github.com/gravitl/netmaker/pull/3910#discussion_r2928837937 * fix(go): incorrect message when trying to disable self; https://github.com/gravitl/netmaker/pull/3910#discussion_r2928837934 * fix(go): use correct header; Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): return after error response; Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): use correct order of params; https://github.com/gravitl/netmaker/pull/3910#discussion_r2929593036 * fix(go): set default values for page and page size; use v2 instead of /list; * Update logic/auth.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * Update schema/user_roles.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): syntax error; * fix(go): set default values when page and per_page are not passed or 0; * fix(go): use uuid.parse instead of uuid.must parse; * fix(go): review errors; * fix(go): review errors; * Update controllers/user.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * Update controllers/user.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * NM-163: fix errors: * Update db/types/options.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * fix(go): persist return user in event; * Update db/types/options.go Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com> * NM-163: duplicate lines of code * NM-163: fix(go): fix missing return and filter parsing in user controller - Add missing return after error response in updateUserAccountStatus to prevent double-response and spurious ext-client side-effects - Use switch statements in listUsers to skip unrecognized account_status and mfa_status filter values * fix(go): check for both min and max page size; * fix(go): enclose transfer superadmin in transaction; * fix(go): review errors; * fix(go): remove free tier checks; * fix(go): review fixes; --------- Co-authored-by: VishalDalwadi <dalwadivishal26@gmail.com> Co-authored-by: Vishal Dalwadi <51291657+VishalDalwadi@users.noreply.github.com> Co-authored-by: tenki-reviewer[bot] <262613592+tenki-reviewer[bot]@users.noreply.github.com>
164 lines
6.4 KiB
Go
164 lines
6.4 KiB
Go
package models
|
|
|
|
import (
|
|
"net"
|
|
|
|
"github.com/gravitl/netmaker/schema"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
)
|
|
|
|
type HostPeerInfo struct {
|
|
NetworkPeerIDs map[schema.NetworkID]PeerMap `json:"network_peers"`
|
|
}
|
|
|
|
type PeerType int
|
|
|
|
const (
|
|
PeerType_Node PeerType = iota
|
|
PeerType_User
|
|
PeerType_WireGuard
|
|
PeerType_EgressRoute
|
|
)
|
|
|
|
type PeerIdentity struct {
|
|
ID string `json:"id"`
|
|
Type PeerType `json:"type"`
|
|
Name string `json:"name"`
|
|
}
|
|
|
|
// HostPeerUpdate - struct for host peer updates
|
|
type HostPeerUpdate struct {
|
|
Host schema.Host `json:"host"`
|
|
Nodes []Node `json:"nodes"`
|
|
ChangeDefaultGw bool `json:"change_default_gw"`
|
|
DefaultGwIp net.IP `json:"default_gw_ip"`
|
|
IsInternetGw bool `json:"is_inet_gw"`
|
|
NodeAddrs []net.IPNet `json:"nodes_addrs"`
|
|
Server string `json:"server"`
|
|
ServerVersion string `json:"serverversion"`
|
|
ServerAddrs []ServerAddr `json:"serveraddrs"`
|
|
NodePeers []wgtypes.PeerConfig `json:"node_peers"`
|
|
Peers []wgtypes.PeerConfig `json:"host_peers"`
|
|
PeerIDs PeerMap `json:"peerids"`
|
|
HostNetworkInfo HostInfoMap `json:"host_network_info,omitempty"`
|
|
EgressRoutes []EgressNetworkRoutes `json:"egress_network_routes"`
|
|
FwUpdate FwUpdate `json:"fw_update"`
|
|
ReplacePeers bool `json:"replace_peers"`
|
|
NameServers []string `json:"name_servers"`
|
|
DnsNameservers []Nameserver `json:"dns_nameservers"`
|
|
EgressWithDomains []EgressDomain `json:"egress_with_domains"`
|
|
AutoRelayNodes map[schema.NetworkID][]Node `json:"auto_relay_nodes"`
|
|
GwNodes map[schema.NetworkID][]Node `json:"gw_nodes"`
|
|
AddressIdentityMap map[string]PeerIdentity `json:"address_identity_map"`
|
|
ServerConfig
|
|
OldPeerUpdateFields
|
|
}
|
|
|
|
type EgressDomain struct {
|
|
ID string `json:"id"`
|
|
Node Node `json:"node"`
|
|
Host schema.Host `json:"host"`
|
|
Domain string `json:"domain"`
|
|
}
|
|
type Nameserver struct {
|
|
IPs []string `json:"ips"`
|
|
MatchDomain string `json:"match_domain"`
|
|
IsSearchDomain bool `json:"is_search_domain"`
|
|
IsFallback bool `json:"is_fallback"`
|
|
IsADDomain bool `json:"is_ad_domain"`
|
|
}
|
|
|
|
type OldPeerUpdateFields struct {
|
|
NodePeers []wgtypes.PeerConfig `json:"peers" bson:"peers" yaml:"peers"`
|
|
OldPeers []wgtypes.PeerConfig `json:"Peers"`
|
|
EndpointDetection bool `json:"endpoint_detection"`
|
|
}
|
|
|
|
type FwRule struct {
|
|
SrcIP net.IPNet `json:"src_ip"`
|
|
DstIP net.IPNet `json:"dst_ip"`
|
|
AllowedProtocol Protocol `json:"allowed_protocols"` // tcp, udp, etc.
|
|
AllowedPorts []string `json:"allowed_ports"`
|
|
Allow bool `json:"allow"`
|
|
}
|
|
|
|
// IngressInfo - struct for ingress info
|
|
type IngressInfo struct {
|
|
IngressID string `json:"ingress_id"`
|
|
Network net.IPNet `json:"network"`
|
|
Network6 net.IPNet `json:"network6"`
|
|
StaticNodeIps []net.IP `json:"static_node_ips"`
|
|
Rules []FwRule `json:"rules"`
|
|
EgressRanges []net.IPNet `json:"egress_ranges"`
|
|
EgressRanges6 []net.IPNet `json:"egress_ranges6"`
|
|
}
|
|
|
|
// EgressInfo - struct for egress info
|
|
type EgressInfo struct {
|
|
EgressID string `json:"egress_id" yaml:"egress_id"`
|
|
Network net.IPNet `json:"network" yaml:"network"`
|
|
EgressGwAddr net.IPNet `json:"egress_gw_addr" yaml:"egress_gw_addr"`
|
|
Network6 net.IPNet `json:"network6" yaml:"network6"`
|
|
EgressGwAddr6 net.IPNet `json:"egress_gw_addr6" yaml:"egress_gw_addr6"`
|
|
EgressGWCfg EgressGatewayRequest `json:"egress_gateway_cfg" yaml:"egress_gateway_cfg"`
|
|
EgressFwRules map[string]AclRule `json:"egress_fw_rules"`
|
|
}
|
|
|
|
// EgressNetworkRoutes - struct for egress network routes for adding routes to peer's interface
|
|
type EgressNetworkRoutes struct {
|
|
PeerKey string `json:"peer_key"`
|
|
EgressGwAddr net.IPNet `json:"egress_gw_addr" yaml:"egress_gw_addr"`
|
|
EgressGwAddr6 net.IPNet `json:"egress_gw_addr6" yaml:"egress_gw_addr6"`
|
|
NodeAddr net.IPNet `json:"node_addr"`
|
|
NodeAddr6 net.IPNet `json:"node_addr6"`
|
|
EgressRanges []string `json:"egress_ranges"`
|
|
EgressRangesWithMetric []EgressRangeMetric `json:"egress_ranges_metric"`
|
|
Network string `json:"network"`
|
|
}
|
|
|
|
// PeerRouteInfo - struct for peer info for an ext. client
|
|
type PeerRouteInfo struct {
|
|
PeerAddr net.IPNet `json:"peer_addr" yaml:"peer_addr"`
|
|
PeerKey string `json:"peer_key" yaml:"peer_key"`
|
|
Allow bool `json:"allow" yaml:"allow"`
|
|
ID string `json:"id,omitempty" yaml:"id,omitempty"`
|
|
}
|
|
|
|
// ExtClientInfo - struct for ext. client and it's peers
|
|
type ExtClientInfo struct {
|
|
IngGwAddr net.IPNet `json:"ingress_gw_addr" yaml:"ingress_gw_addr"`
|
|
Network net.IPNet `json:"network" yaml:"network"`
|
|
Masquerade bool `json:"masquerade" yaml:"masquerade"`
|
|
ExtPeerAddr net.IPNet `json:"ext_peer_addr" yaml:"ext_peer_addr"`
|
|
ExtPeerKey string `json:"ext_peer_key" yaml:"ext_peer_key"`
|
|
Peers map[string]PeerRouteInfo `json:"peers" yaml:"peers"`
|
|
}
|
|
|
|
// KeyUpdate - key update struct
|
|
type KeyUpdate struct {
|
|
Network string `json:"network" bson:"network"`
|
|
Interface string `json:"interface" bson:"interface"`
|
|
}
|
|
|
|
// FwUpdate - struct for firewall updates
|
|
type FwUpdate struct {
|
|
AllowAll bool `json:"allow_all"`
|
|
AllowedNetworks []AclRule `json:"networks"`
|
|
IsEgressGw bool `json:"is_egress_gw"`
|
|
IsIngressGw bool `json:"is_ingress_gw"`
|
|
EgressInfo map[string]EgressInfo `json:"egress_info"`
|
|
IngressInfo map[string]IngressInfo `json:"ingress_info"`
|
|
AclRules map[string]AclRule `json:"acl_rules"`
|
|
}
|
|
|
|
// FailOverMeReq - struct for failover req
|
|
type FailOverMeReq struct {
|
|
NodeID string `json:"node_id"`
|
|
}
|
|
|
|
// AutoRelayMeReq - struct for autorelay req
|
|
type AutoRelayMeReq struct {
|
|
NodeID string `json:"node_id"`
|
|
AutoRelayGwID string `json:"auto_relay_gw_id"`
|
|
}
|