2022-11-07 15:38:21 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
nbdns "github.com/netbirdio/netbird/dns"
|
|
|
|
"github.com/netbirdio/netbird/management/proto"
|
2023-01-17 17:34:40 +01:00
|
|
|
"github.com/netbirdio/netbird/management/server/activity"
|
|
|
|
"github.com/netbirdio/netbird/management/server/status"
|
2022-11-07 15:38:21 +01:00
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"strconv"
|
|
|
|
)
|
|
|
|
|
2023-01-17 17:34:40 +01:00
|
|
|
const defaultTTL = 300
|
|
|
|
|
2022-11-07 15:38:21 +01:00
|
|
|
type lookupMap map[string]struct{}
|
|
|
|
|
2023-01-17 17:34:40 +01:00
|
|
|
// DNSSettings defines dns settings at the account level
|
|
|
|
type DNSSettings struct {
|
|
|
|
// DisabledManagementGroups groups whose DNS management is disabled
|
|
|
|
DisabledManagementGroups []string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy returns a copy of the DNS settings
|
|
|
|
func (d *DNSSettings) Copy() *DNSSettings {
|
|
|
|
settings := &DNSSettings{
|
|
|
|
DisabledManagementGroups: make([]string, 0),
|
|
|
|
}
|
|
|
|
|
|
|
|
if d == nil {
|
|
|
|
return settings
|
|
|
|
}
|
|
|
|
|
|
|
|
if d.DisabledManagementGroups != nil && len(d.DisabledManagementGroups) > 0 {
|
|
|
|
settings.DisabledManagementGroups = d.DisabledManagementGroups[:]
|
|
|
|
}
|
|
|
|
|
|
|
|
return settings
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDNSSettings validates a user role and returns the DNS settings for the provided account ID
|
|
|
|
func (am *DefaultAccountManager) GetDNSSettings(accountID string, userID string) (*DNSSettings, error) {
|
|
|
|
unlock := am.Store.AcquireAccountLock(accountID)
|
|
|
|
defer unlock()
|
|
|
|
|
|
|
|
account, err := am.Store.GetAccount(accountID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
user, err := account.FindUser(userID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !user.IsAdmin() {
|
|
|
|
return nil, status.Errorf(status.PermissionDenied, "only admins are allowed to view DNS settings")
|
|
|
|
}
|
|
|
|
|
|
|
|
if account.DNSSettings == nil {
|
|
|
|
return &DNSSettings{}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return account.DNSSettings.Copy(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// SaveDNSSettings validates a user role and updates the account's DNS settings
|
|
|
|
func (am *DefaultAccountManager) SaveDNSSettings(accountID string, userID string, dnsSettingsToSave *DNSSettings) error {
|
|
|
|
unlock := am.Store.AcquireAccountLock(accountID)
|
|
|
|
defer unlock()
|
|
|
|
|
|
|
|
account, err := am.Store.GetAccount(accountID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
user, err := account.FindUser(userID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !user.IsAdmin() {
|
|
|
|
return status.Errorf(status.PermissionDenied, "only admins are allowed to update DNS settings")
|
|
|
|
}
|
|
|
|
|
|
|
|
if dnsSettingsToSave == nil {
|
|
|
|
return status.Errorf(status.InvalidArgument, "the dns settings provided are nil")
|
|
|
|
}
|
|
|
|
|
2023-01-18 14:01:50 +01:00
|
|
|
if len(dnsSettingsToSave.DisabledManagementGroups) != 0 {
|
|
|
|
err = validateGroups(dnsSettingsToSave.DisabledManagementGroups, account.Groups)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-01-17 17:34:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
oldSettings := &DNSSettings{}
|
|
|
|
if account.DNSSettings != nil {
|
|
|
|
oldSettings = account.DNSSettings.Copy()
|
|
|
|
}
|
|
|
|
|
|
|
|
account.DNSSettings = dnsSettingsToSave.Copy()
|
|
|
|
|
|
|
|
account.Network.IncSerial()
|
|
|
|
if err = am.Store.SaveAccount(account); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-01-24 10:17:24 +01:00
|
|
|
addedGroups := difference(dnsSettingsToSave.DisabledManagementGroups, oldSettings.DisabledManagementGroups)
|
|
|
|
for _, id := range addedGroups {
|
|
|
|
group := account.GetGroup(id)
|
|
|
|
meta := map[string]any{"group": group.Name, "group_id": group.ID}
|
|
|
|
am.storeEvent(userID, accountID, accountID, activity.GroupAddedToDisabledManagementGroups, meta)
|
|
|
|
}
|
2023-01-17 17:34:40 +01:00
|
|
|
|
2023-01-24 10:17:24 +01:00
|
|
|
removedGroups := difference(oldSettings.DisabledManagementGroups, dnsSettingsToSave.DisabledManagementGroups)
|
|
|
|
for _, id := range removedGroups {
|
|
|
|
group := account.GetGroup(id)
|
|
|
|
meta := map[string]any{"group": group.Name, "group_id": group.ID}
|
|
|
|
am.storeEvent(userID, accountID, accountID, activity.GroupRemovedFromDisabledManagementGroups, meta)
|
|
|
|
}
|
2023-01-17 17:34:40 +01:00
|
|
|
|
|
|
|
return am.updateAccountPeers(account)
|
|
|
|
}
|
2022-11-07 15:38:21 +01:00
|
|
|
|
|
|
|
func toProtocolDNSConfig(update nbdns.Config) *proto.DNSConfig {
|
|
|
|
protoUpdate := &proto.DNSConfig{ServiceEnable: update.ServiceEnable}
|
|
|
|
|
|
|
|
for _, zone := range update.CustomZones {
|
|
|
|
protoZone := &proto.CustomZone{Domain: zone.Domain}
|
|
|
|
for _, record := range zone.Records {
|
|
|
|
protoZone.Records = append(protoZone.Records, &proto.SimpleRecord{
|
|
|
|
Name: record.Name,
|
|
|
|
Type: int64(record.Type),
|
|
|
|
Class: record.Class,
|
|
|
|
TTL: int64(record.TTL),
|
|
|
|
RData: record.RData,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
protoUpdate.CustomZones = append(protoUpdate.CustomZones, protoZone)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, nsGroup := range update.NameServerGroups {
|
|
|
|
protoGroup := &proto.NameServerGroup{
|
|
|
|
Primary: nsGroup.Primary,
|
|
|
|
Domains: nsGroup.Domains,
|
|
|
|
}
|
|
|
|
for _, ns := range nsGroup.NameServers {
|
|
|
|
protoNS := &proto.NameServer{
|
|
|
|
IP: ns.IP.String(),
|
|
|
|
Port: int64(ns.Port),
|
|
|
|
NSType: int64(ns.NSType),
|
|
|
|
}
|
|
|
|
protoGroup.NameServers = append(protoGroup.NameServers, protoNS)
|
|
|
|
}
|
|
|
|
protoUpdate.NameServerGroups = append(protoUpdate.NameServerGroups, protoGroup)
|
|
|
|
}
|
|
|
|
|
|
|
|
return protoUpdate
|
|
|
|
}
|
|
|
|
|
|
|
|
func getPeersCustomZone(account *Account, dnsDomain string) nbdns.CustomZone {
|
|
|
|
if dnsDomain == "" {
|
|
|
|
log.Errorf("no dns domain is set, returning empty zone")
|
|
|
|
return nbdns.CustomZone{}
|
|
|
|
}
|
|
|
|
|
|
|
|
customZone := nbdns.CustomZone{
|
|
|
|
Domain: dns.Fqdn(dnsDomain),
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, peer := range account.Peers {
|
|
|
|
if peer.DNSLabel == "" {
|
|
|
|
log.Errorf("found a peer with empty dns label. It was probably caused by a invalid character in its name. Peer Name: %s", peer.Name)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
customZone.Records = append(customZone.Records, nbdns.SimpleRecord{
|
|
|
|
Name: dns.Fqdn(peer.DNSLabel + "." + dnsDomain),
|
|
|
|
Type: int(dns.TypeA),
|
|
|
|
Class: nbdns.DefaultClass,
|
|
|
|
TTL: defaultTTL,
|
|
|
|
RData: peer.IP.String(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
return customZone
|
|
|
|
}
|
|
|
|
|
|
|
|
func getPeerNSGroups(account *Account, peerID string) []*nbdns.NameServerGroup {
|
2022-12-06 10:11:57 +01:00
|
|
|
groupList := account.getPeerGroups(peerID)
|
2022-11-07 15:38:21 +01:00
|
|
|
|
|
|
|
var peerNSGroups []*nbdns.NameServerGroup
|
|
|
|
|
|
|
|
for _, nsGroup := range account.NameServerGroups {
|
|
|
|
if !nsGroup.Enabled {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, gID := range nsGroup.Groups {
|
|
|
|
_, found := groupList[gID]
|
|
|
|
if found {
|
|
|
|
peerNSGroups = append(peerNSGroups, nsGroup.Copy())
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return peerNSGroups
|
|
|
|
}
|
|
|
|
|
|
|
|
func addPeerLabelsToAccount(account *Account, peerLabels lookupMap) {
|
|
|
|
for _, peer := range account.Peers {
|
|
|
|
label, err := getPeerHostLabel(peer.Name, peerLabels)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("got an error while generating a peer host label. Peer name %s, error: %v. Trying with the peer's meta hostname", peer.Name, err)
|
|
|
|
label, err = getPeerHostLabel(peer.Meta.Hostname, peerLabels)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("got another error while generating a peer host label with hostname. Peer hostname %s, error: %v. Skiping", peer.Meta.Hostname, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
peer.DNSLabel = label
|
|
|
|
peerLabels[label] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func getPeerHostLabel(name string, peerLabels lookupMap) (string, error) {
|
|
|
|
label, err := nbdns.GetParsedDomainLabel(name)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
uniqueLabel := getUniqueHostLabel(label, peerLabels)
|
|
|
|
if uniqueLabel == "" {
|
2022-11-08 16:14:36 +01:00
|
|
|
return "", fmt.Errorf("couldn't find a unique valid label for %s, parsed label %s", name, label)
|
2022-11-07 15:38:21 +01:00
|
|
|
}
|
|
|
|
return uniqueLabel, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getUniqueHostLabel look for a unique host label, and if doesn't find add a suffix up to 999
|
|
|
|
func getUniqueHostLabel(name string, peerLabels lookupMap) string {
|
|
|
|
_, found := peerLabels[name]
|
|
|
|
if !found {
|
|
|
|
return name
|
|
|
|
}
|
|
|
|
for i := 1; i < 1000; i++ {
|
|
|
|
nameWithSuffix := name + "-" + strconv.Itoa(i)
|
|
|
|
_, found = peerLabels[nameWithSuffix]
|
|
|
|
if !found {
|
|
|
|
return nameWithSuffix
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|