mirror of
https://github.com/netbirdio/netbird.git
synced 2025-04-03 14:00:34 +02:00
Add initial support of device posture checks (#1540)
This PR implements the following posture checks: * Agent minimum version allowed * OS minimum version allowed * Geo-location based on connection IP For the geo-based location, we rely on GeoLite2 databases which are free IP geolocation databases. MaxMind was tested and we provide a script that easily allows to download of all necessary files, see infrastructure_files/download-geolite2.sh. The OpenAPI spec should extensively cover the life cycle of current version posture checks.
This commit is contained in:
parent
db3cba5e0f
commit
9bc7b9e897
2
.gitignore
vendored
2
.gitignore
vendored
@ -29,4 +29,4 @@ infrastructure_files/setup.env
|
|||||||
infrastructure_files/setup-*.env
|
infrastructure_files/setup-*.env
|
||||||
.vscode
|
.vscode
|
||||||
.DS_Store
|
.DS_Store
|
||||||
*.db
|
GeoLite2-City*
|
@ -78,8 +78,7 @@ func startManagement(t *testing.T, config *mgmt.Config) (*grpc.Server, net.Liste
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
accountManager, err := mgmt.BuildManager(store, peersUpdateManager, nil, "", "",
|
accountManager, err := mgmt.BuildManager(store, peersUpdateManager, nil, "", "", eventStore, nil, false)
|
||||||
eventStore, false)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
@ -1049,8 +1049,7 @@ func startManagement(dataDir string) (*grpc.Server, string, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
}
|
}
|
||||||
accountManager, err := server.BuildManager(store, peersUpdateManager, nil, "", "",
|
accountManager, err := server.BuildManager(store, peersUpdateManager, nil, "", "", eventStore, nil, false)
|
||||||
eventStore, false)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
}
|
}
|
||||||
|
@ -23,7 +23,6 @@ const OsNameCtxKey = "OsName"
|
|||||||
type Info struct {
|
type Info struct {
|
||||||
GoOS string
|
GoOS string
|
||||||
Kernel string
|
Kernel string
|
||||||
Core string
|
|
||||||
Platform string
|
Platform string
|
||||||
OS string
|
OS string
|
||||||
OSVersion string
|
OSVersion string
|
||||||
@ -31,6 +30,7 @@ type Info struct {
|
|||||||
CPUs int
|
CPUs int
|
||||||
WiretrusteeVersion string
|
WiretrusteeVersion string
|
||||||
UIVersion string
|
UIVersion string
|
||||||
|
KernelVersion string
|
||||||
}
|
}
|
||||||
|
|
||||||
// extractUserAgent extracts Netbird's agent (client) name and version from the outgoing context
|
// extractUserAgent extracts Netbird's agent (client) name and version from the outgoing context
|
||||||
|
@ -23,7 +23,12 @@ func GetInfo(ctx context.Context) *Info {
|
|||||||
kernel = osInfo[1]
|
kernel = osInfo[1]
|
||||||
}
|
}
|
||||||
|
|
||||||
gio := &Info{Kernel: kernel, Core: osVersion(), Platform: "unknown", OS: "android", OSVersion: osVersion(), GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
var kernelVersion string
|
||||||
|
if len(osInfo) > 2 {
|
||||||
|
kernelVersion = osInfo[2]
|
||||||
|
}
|
||||||
|
|
||||||
|
gio := &Info{Kernel: kernel, Platform: "unknown", OS: "android", OSVersion: osVersion(), GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: kernelVersion}
|
||||||
gio.Hostname = extractDeviceName(ctx, "android")
|
gio.Hostname = extractDeviceName(ctx, "android")
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
gio.UIVersion = extractUserAgent(ctx)
|
gio.UIVersion = extractUserAgent(ctx)
|
||||||
|
@ -33,7 +33,7 @@ func GetInfo(ctx context.Context) *Info {
|
|||||||
log.Warnf("got an error while retrieving macOS version with sw_vers, error: %s. Using darwin version instead.\n", err)
|
log.Warnf("got an error while retrieving macOS version with sw_vers, error: %s. Using darwin version instead.\n", err)
|
||||||
swVersion = []byte(release)
|
swVersion = []byte(release)
|
||||||
}
|
}
|
||||||
gio := &Info{Kernel: sysName, OSVersion: strings.TrimSpace(string(swVersion)), Core: release, Platform: machine, OS: sysName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
gio := &Info{Kernel: sysName, OSVersion: strings.TrimSpace(string(swVersion)), Platform: machine, OS: sysName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: release}
|
||||||
systemHostname, _ := os.Hostname()
|
systemHostname, _ := os.Hostname()
|
||||||
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
|
@ -23,7 +23,7 @@ func GetInfo(ctx context.Context) *Info {
|
|||||||
osStr := strings.Replace(out, "\n", "", -1)
|
osStr := strings.Replace(out, "\n", "", -1)
|
||||||
osStr = strings.Replace(osStr, "\r\n", "", -1)
|
osStr = strings.Replace(osStr, "\r\n", "", -1)
|
||||||
osInfo := strings.Split(osStr, " ")
|
osInfo := strings.Split(osStr, " ")
|
||||||
gio := &Info{Kernel: osInfo[0], Core: osInfo[1], Platform: runtime.GOARCH, OS: osInfo[2], GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
gio := &Info{Kernel: osInfo[0], Platform: runtime.GOARCH, OS: osInfo[2], GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: osInfo[1]}
|
||||||
systemHostname, _ := os.Hostname()
|
systemHostname, _ := os.Hostname()
|
||||||
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
|
@ -17,7 +17,7 @@ func GetInfo(ctx context.Context) *Info {
|
|||||||
sysName := extractOsName(ctx, "sysName")
|
sysName := extractOsName(ctx, "sysName")
|
||||||
swVersion := extractOsVersion(ctx, "swVersion")
|
swVersion := extractOsVersion(ctx, "swVersion")
|
||||||
|
|
||||||
gio := &Info{Kernel: sysName, OSVersion: swVersion, Core: swVersion, Platform: "unknown", OS: sysName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
gio := &Info{Kernel: sysName, OSVersion: swVersion, Platform: "unknown", OS: sysName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: swVersion}
|
||||||
gio.Hostname = extractDeviceName(ctx, "hostname")
|
gio.Hostname = extractDeviceName(ctx, "hostname")
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
gio.UIVersion = extractUserAgent(ctx)
|
gio.UIVersion = extractUserAgent(ctx)
|
||||||
|
@ -50,7 +50,7 @@ func GetInfo(ctx context.Context) *Info {
|
|||||||
if osName == "" {
|
if osName == "" {
|
||||||
osName = osInfo[3]
|
osName = osInfo[3]
|
||||||
}
|
}
|
||||||
gio := &Info{Kernel: osInfo[0], Core: osInfo[1], Platform: osInfo[2], OS: osName, OSVersion: osVer, GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
gio := &Info{Kernel: osInfo[0], Platform: osInfo[2], OS: osName, OSVersion: osVer, GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: osInfo[1]}
|
||||||
systemHostname, _ := os.Hostname()
|
systemHostname, _ := os.Hostname()
|
||||||
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
|
@ -22,7 +22,7 @@ type Win32_OperatingSystem struct {
|
|||||||
func GetInfo(ctx context.Context) *Info {
|
func GetInfo(ctx context.Context) *Info {
|
||||||
osName, osVersion := getOSNameAndVersion()
|
osName, osVersion := getOSNameAndVersion()
|
||||||
buildVersion := getBuildVersion()
|
buildVersion := getBuildVersion()
|
||||||
gio := &Info{Kernel: "windows", OSVersion: osVersion, Core: buildVersion, Platform: "unknown", OS: osName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU()}
|
gio := &Info{Kernel: "windows", OSVersion: osVersion, Platform: "unknown", OS: osName, GoOS: runtime.GOOS, CPUs: runtime.NumCPU(), KernelVersion: buildVersion}
|
||||||
systemHostname, _ := os.Hostname()
|
systemHostname, _ := os.Hostname()
|
||||||
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
gio.Hostname = extractDeviceName(ctx, systemHostname)
|
||||||
gio.WiretrusteeVersion = version.NetbirdVersion()
|
gio.WiretrusteeVersion = version.NetbirdVersion()
|
||||||
|
5
go.mod
5
go.mod
@ -47,7 +47,7 @@ require (
|
|||||||
github.com/google/go-cmp v0.5.9
|
github.com/google/go-cmp v0.5.9
|
||||||
github.com/google/gopacket v1.1.19
|
github.com/google/gopacket v1.1.19
|
||||||
github.com/google/nftables v0.0.0-20220808154552-2eca00135732
|
github.com/google/nftables v0.0.0-20220808154552-2eca00135732
|
||||||
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240202184442-37827591b26c
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357
|
||||||
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2
|
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2
|
||||||
github.com/hashicorp/go-version v1.6.0
|
github.com/hashicorp/go-version v1.6.0
|
||||||
github.com/libp2p/go-netroute v0.2.0
|
github.com/libp2p/go-netroute v0.2.0
|
||||||
@ -60,6 +60,7 @@ require (
|
|||||||
github.com/netbirdio/management-integrations/additions v0.0.0-20240118163419-8a7c87accb22
|
github.com/netbirdio/management-integrations/additions v0.0.0-20240118163419-8a7c87accb22
|
||||||
github.com/netbirdio/management-integrations/integrations v0.0.0-20240118163419-8a7c87accb22
|
github.com/netbirdio/management-integrations/integrations v0.0.0-20240118163419-8a7c87accb22
|
||||||
github.com/okta/okta-sdk-golang/v2 v2.18.0
|
github.com/okta/okta-sdk-golang/v2 v2.18.0
|
||||||
|
github.com/oschwald/maxminddb-golang v1.12.0
|
||||||
github.com/patrickmn/go-cache v2.1.0+incompatible
|
github.com/patrickmn/go-cache v2.1.0+incompatible
|
||||||
github.com/pion/logging v0.2.2
|
github.com/pion/logging v0.2.2
|
||||||
github.com/pion/stun/v2 v2.0.0
|
github.com/pion/stun/v2 v2.0.0
|
||||||
@ -171,5 +172,3 @@ replace github.com/getlantern/systray => github.com/netbirdio/systray v0.0.0-202
|
|||||||
replace golang.zx2c4.com/wireguard => github.com/netbirdio/wireguard-go v0.0.0-20240105182236-6c340dd55aed
|
replace golang.zx2c4.com/wireguard => github.com/netbirdio/wireguard-go v0.0.0-20240105182236-6c340dd55aed
|
||||||
|
|
||||||
replace github.com/cloudflare/circl => github.com/cunicu/circl v0.0.0-20230801113412-fec58fc7b5f6
|
replace github.com/cloudflare/circl => github.com/cunicu/circl v0.0.0-20230801113412-fec58fc7b5f6
|
||||||
|
|
||||||
replace github.com/grpc-ecosystem/go-grpc-middleware/v2 => github.com/surik/go-grpc-middleware/v2 v2.0.0-20240206110057-98a38fc1f86f
|
|
||||||
|
6
go.sum
6
go.sum
@ -286,6 +286,8 @@ github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0 h1:fWY+zXdWhvWnd
|
|||||||
github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k=
|
github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k=
|
||||||
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
||||||
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
||||||
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357 h1:Fkzd8ktnpOR9h47SXHe2AYPwelXLH2GjGsjlAloiWfo=
|
||||||
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357/go.mod h1:w9Y7gY31krpLmrVU5ZPG9H7l9fZuRu5/3R3S3FMtVQ4=
|
||||||
github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
|
github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
|
||||||
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2 h1:ET4pqyjiGmY09R5y+rSd70J2w45CtbWDNvGqWp/R3Ng=
|
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2 h1:ET4pqyjiGmY09R5y+rSd70J2w45CtbWDNvGqWp/R3Ng=
|
||||||
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2/go.mod h1:EdWO6czbmthiwZ3/PUsDV+UD1D5IRU4ActiaWGwt0Yw=
|
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2/go.mod h1:EdWO6czbmthiwZ3/PUsDV+UD1D5IRU4ActiaWGwt0Yw=
|
||||||
@ -407,6 +409,8 @@ github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1y
|
|||||||
github.com/onsi/gomega v1.17.0/go.mod h1:HnhC7FXeEQY45zxNK3PPoIUhzk/80Xly9PcubAlGdZY=
|
github.com/onsi/gomega v1.17.0/go.mod h1:HnhC7FXeEQY45zxNK3PPoIUhzk/80Xly9PcubAlGdZY=
|
||||||
github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE=
|
github.com/onsi/gomega v1.18.1 h1:M1GfJqGRrBrrGGsbxzV5dqM2U2ApXefZCQpkukxYRLE=
|
||||||
github.com/onsi/gomega v1.18.1/go.mod h1:0q+aL8jAiMXy9hbwj2mr5GziHiwhAIQpFmmtT5hitRs=
|
github.com/onsi/gomega v1.18.1/go.mod h1:0q+aL8jAiMXy9hbwj2mr5GziHiwhAIQpFmmtT5hitRs=
|
||||||
|
github.com/oschwald/maxminddb-golang v1.12.0 h1:9FnTOD0YOhP7DGxGsq4glzpGy5+w7pq50AS6wALUMYs=
|
||||||
|
github.com/oschwald/maxminddb-golang v1.12.0/go.mod h1:q0Nob5lTCqyQ8WT6FYgS1L7PXKVVbgiymefNwIjPzgY=
|
||||||
github.com/oxtoacart/bpool v0.0.0-20190530202638-03653db5a59c h1:rp5dCmg/yLR3mgFuSOe4oEnDDmGLROTvMragMUXpTQw=
|
github.com/oxtoacart/bpool v0.0.0-20190530202638-03653db5a59c h1:rp5dCmg/yLR3mgFuSOe4oEnDDmGLROTvMragMUXpTQw=
|
||||||
github.com/oxtoacart/bpool v0.0.0-20190530202638-03653db5a59c/go.mod h1:X07ZCGwUbLaax7L0S3Tw4hpejzu63ZrrQiUe6W0hcy0=
|
github.com/oxtoacart/bpool v0.0.0-20190530202638-03653db5a59c/go.mod h1:X07ZCGwUbLaax7L0S3Tw4hpejzu63ZrrQiUe6W0hcy0=
|
||||||
github.com/patrickmn/go-cache v2.1.0+incompatible h1:HRMgzkcYKYpi3C8ajMPV8OFXaaRUnok+kx1WdO15EQc=
|
github.com/patrickmn/go-cache v2.1.0+incompatible h1:HRMgzkcYKYpi3C8ajMPV8OFXaaRUnok+kx1WdO15EQc=
|
||||||
@ -517,8 +521,6 @@ github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o
|
|||||||
github.com/stretchr/testify v1.8.3/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
github.com/stretchr/testify v1.8.3/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
||||||
github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
|
github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
|
||||||
github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
||||||
github.com/surik/go-grpc-middleware/v2 v2.0.0-20240206110057-98a38fc1f86f h1:J+egXEDkpg/vOYYzPO5IwF8OufGb7g+KcwEF1AWIzhQ=
|
|
||||||
github.com/surik/go-grpc-middleware/v2 v2.0.0-20240206110057-98a38fc1f86f/go.mod h1:w9Y7gY31krpLmrVU5ZPG9H7l9fZuRu5/3R3S3FMtVQ4=
|
|
||||||
github.com/things-go/go-socks5 v0.0.4 h1:jMQjIc+qhD4z9cITOMnBiwo9dDmpGuXmBlkRFrl/qD0=
|
github.com/things-go/go-socks5 v0.0.4 h1:jMQjIc+qhD4z9cITOMnBiwo9dDmpGuXmBlkRFrl/qD0=
|
||||||
github.com/things-go/go-socks5 v0.0.4/go.mod h1:sh4K6WHrmHZpjxLTCHyYtXYH8OUuD+yZun41NomR1IQ=
|
github.com/things-go/go-socks5 v0.0.4/go.mod h1:sh4K6WHrmHZpjxLTCHyYtXYH8OUuD+yZun41NomR1IQ=
|
||||||
github.com/ugorji/go v1.1.7/go.mod h1:kZn38zHttfInRq0xu/PH0az30d+z6vm202qpg1oXVMw=
|
github.com/ugorji/go v1.1.7/go.mod h1:kZn38zHttfInRq0xu/PH0az30d+z6vm202qpg1oXVMw=
|
||||||
|
118
infrastructure_files/download-geolite2.sh
Executable file
118
infrastructure_files/download-geolite2.sh
Executable file
@ -0,0 +1,118 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# set $MM_ACCOUNT_ID and $MM_LICENSE_KEY when calling this script
|
||||||
|
# see https://dev.maxmind.com/geoip/updating-databases#directly-downloading-databases
|
||||||
|
|
||||||
|
# Check if MM_ACCOUNT_ID is set
|
||||||
|
if [ -z "$MM_ACCOUNT_ID" ]; then
|
||||||
|
echo "MM_ACCOUNT_ID is not set. Please set the environment variable."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check if MM_LICENSE_KEY is set
|
||||||
|
if [ -z "$MM_LICENSE_KEY" ]; then
|
||||||
|
echo "MM_LICENSE_KEY is not set. Please set the environment variable."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# to install sha256sum on mac: brew install coreutils
|
||||||
|
if ! command -v sha256sum &> /dev/null
|
||||||
|
then
|
||||||
|
echo "sha256sum is not installed or not in PATH, please install with your package manager. e.g. sudo apt install sha256sum" > /dev/stderr
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! command -v sqlite3 &> /dev/null
|
||||||
|
then
|
||||||
|
echo "sqlite3 is not installed or not in PATH, please install with your package manager. e.g. sudo apt install sqlite3" > /dev/stderr
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
download_geolite_mmdb() {
|
||||||
|
DATABASE_URL="https://download.maxmind.com/geoip/databases/GeoLite2-City/download?suffix=tar.gz"
|
||||||
|
SIGNATURE_URL="https://download.maxmind.com/geoip/databases/GeoLite2-City/download?suffix=tar.gz.sha256"
|
||||||
|
|
||||||
|
# Download the database and signature files
|
||||||
|
echo "Downloading mmdb database file..."
|
||||||
|
DATABASE_FILE=$(curl -s -u "$MM_ACCOUNT_ID":"$MM_LICENSE_KEY" -L -O -J "$DATABASE_URL" -w "%{filename_effective}")
|
||||||
|
echo "Downloading mmdb signature file..."
|
||||||
|
SIGNATURE_FILE=$(curl -s -u "$MM_ACCOUNT_ID":"$MM_LICENSE_KEY" -L -O -J "$SIGNATURE_URL" -w "%{filename_effective}")
|
||||||
|
|
||||||
|
# Verify the signature
|
||||||
|
echo "Verifying signature..."
|
||||||
|
if sha256sum -c --status "$SIGNATURE_FILE"; then
|
||||||
|
echo "Signature is valid."
|
||||||
|
else
|
||||||
|
echo "Signature is invalid. Aborting."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Unpack the database file
|
||||||
|
EXTRACTION_DIR=$(basename "$DATABASE_FILE" .tar.gz)
|
||||||
|
echo "Unpacking $DATABASE_FILE..."
|
||||||
|
mkdir -p "$EXTRACTION_DIR"
|
||||||
|
tar -xzvf "$DATABASE_FILE" > /dev/null 2>&1
|
||||||
|
|
||||||
|
# Create a SHA256 signature file
|
||||||
|
MMDB_FILE="GeoLite2-City.mmdb"
|
||||||
|
cd "$EXTRACTION_DIR"
|
||||||
|
sha256sum "$MMDB_FILE" > "$MMDB_FILE.sha256"
|
||||||
|
echo "SHA256 signature created for $MMDB_FILE."
|
||||||
|
cd - > /dev/null 2>&1
|
||||||
|
|
||||||
|
# Remove downloaded files
|
||||||
|
rm "$DATABASE_FILE" "$SIGNATURE_FILE"
|
||||||
|
|
||||||
|
# Done. Print next steps
|
||||||
|
echo "Process completed successfully."
|
||||||
|
echo "Now you can place $EXTRACTION_DIR/$MMDB_FILE to 'datadir' of management service."
|
||||||
|
echo -e "Example:\n\tdocker compose cp $EXTRACTION_DIR/$MMDB_FILE management:/var/lib/netbird/"
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
download_geolite_csv_and_create_sqlite_db() {
|
||||||
|
DATABASE_URL="https://download.maxmind.com/geoip/databases/GeoLite2-City-CSV/download?suffix=zip"
|
||||||
|
SIGNATURE_URL="https://download.maxmind.com/geoip/databases/GeoLite2-City-CSV/download?suffix=zip.sha256"
|
||||||
|
|
||||||
|
|
||||||
|
# Download the database file
|
||||||
|
echo "Downloading csv database file..."
|
||||||
|
DATABASE_FILE=$(curl -s -u "$MM_ACCOUNT_ID":"$MM_LICENSE_KEY" -L -O -J "$DATABASE_URL" -w "%{filename_effective}")
|
||||||
|
echo "Downloading csv signature file..."
|
||||||
|
SIGNATURE_FILE=$(curl -s -u "$MM_ACCOUNT_ID":"$MM_LICENSE_KEY" -L -O -J "$SIGNATURE_URL" -w "%{filename_effective}")
|
||||||
|
|
||||||
|
# Verify the signature
|
||||||
|
echo "Verifying signature..."
|
||||||
|
if sha256sum -c --status "$SIGNATURE_FILE"; then
|
||||||
|
echo "Signature is valid."
|
||||||
|
else
|
||||||
|
echo "Signature is invalid. Aborting."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Unpack the database file
|
||||||
|
EXTRACTION_DIR=$(basename "$DATABASE_FILE" .zip)
|
||||||
|
DB_NAME="geonames.db"
|
||||||
|
|
||||||
|
echo "Unpacking $DATABASE_FILE..."
|
||||||
|
unzip "$DATABASE_FILE" > /dev/null 2>&1
|
||||||
|
|
||||||
|
# Create SQLite database and import data from CSV
|
||||||
|
sqlite3 "$DB_NAME" <<EOF
|
||||||
|
.mode csv
|
||||||
|
.import "$EXTRACTION_DIR/GeoLite2-City-Locations-en.csv" geonames
|
||||||
|
EOF
|
||||||
|
|
||||||
|
|
||||||
|
# Remove downloaded and extracted files
|
||||||
|
rm -r -r "$EXTRACTION_DIR"
|
||||||
|
rm "$DATABASE_FILE" "$SIGNATURE_FILE"
|
||||||
|
|
||||||
|
echo "SQLite database '$DB_NAME' created successfully."
|
||||||
|
echo "Now you can place $DB_NAME to 'datadir' of management service."
|
||||||
|
echo -e "Example:\n\tdocker compose cp $DB_NAME management:/var/lib/netbird/"
|
||||||
|
}
|
||||||
|
|
||||||
|
download_geolite_mmdb
|
||||||
|
echo ""
|
||||||
|
download_geolite_csv_and_create_sqlite_db
|
@ -60,8 +60,7 @@ func startManagement(t *testing.T) (*grpc.Server, net.Listener) {
|
|||||||
|
|
||||||
peersUpdateManager := mgmt.NewPeersUpdateManager(nil)
|
peersUpdateManager := mgmt.NewPeersUpdateManager(nil)
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
accountManager, err := mgmt.BuildManager(store, peersUpdateManager, nil, "", "",
|
accountManager, err := mgmt.BuildManager(store, peersUpdateManager, nil, "", "", eventStore, nil, false)
|
||||||
eventStore, false)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
@ -348,10 +347,12 @@ func Test_SystemMetaDataFromClient(t *testing.T) {
|
|||||||
Hostname: info.Hostname,
|
Hostname: info.Hostname,
|
||||||
GoOS: info.GoOS,
|
GoOS: info.GoOS,
|
||||||
Kernel: info.Kernel,
|
Kernel: info.Kernel,
|
||||||
Core: info.OSVersion,
|
|
||||||
Platform: info.Platform,
|
Platform: info.Platform,
|
||||||
OS: info.OS,
|
OS: info.OS,
|
||||||
|
Core: info.OSVersion,
|
||||||
|
OSVersion: info.OSVersion,
|
||||||
WiretrusteeVersion: info.WiretrusteeVersion,
|
WiretrusteeVersion: info.WiretrusteeVersion,
|
||||||
|
KernelVersion: info.KernelVersion,
|
||||||
}
|
}
|
||||||
|
|
||||||
assert.Equal(t, ValidKey, actualValidKey)
|
assert.Equal(t, ValidKey, actualValidKey)
|
||||||
|
@ -455,9 +455,11 @@ func infoToMetaData(info *system.Info) *proto.PeerSystemMeta {
|
|||||||
GoOS: info.GoOS,
|
GoOS: info.GoOS,
|
||||||
OS: info.OS,
|
OS: info.OS,
|
||||||
Core: info.OSVersion,
|
Core: info.OSVersion,
|
||||||
|
OSVersion: info.OSVersion,
|
||||||
Platform: info.Platform,
|
Platform: info.Platform,
|
||||||
Kernel: info.Kernel,
|
Kernel: info.Kernel,
|
||||||
WiretrusteeVersion: info.WiretrusteeVersion,
|
WiretrusteeVersion: info.WiretrusteeVersion,
|
||||||
UiVersion: info.UIVersion,
|
UiVersion: info.UIVersion,
|
||||||
|
KernelVersion: info.KernelVersion,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -19,8 +19,6 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/netbirdio/management-integrations/integrations"
|
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
@ -33,9 +31,12 @@ import (
|
|||||||
"google.golang.org/grpc/keepalive"
|
"google.golang.org/grpc/keepalive"
|
||||||
|
|
||||||
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/realip"
|
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/realip"
|
||||||
|
"github.com/netbirdio/management-integrations/integrations"
|
||||||
|
|
||||||
"github.com/netbirdio/netbird/encryption"
|
"github.com/netbirdio/netbird/encryption"
|
||||||
mgmtProto "github.com/netbirdio/netbird/management/proto"
|
mgmtProto "github.com/netbirdio/netbird/management/proto"
|
||||||
"github.com/netbirdio/netbird/management/server"
|
"github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
httpapi "github.com/netbirdio/netbird/management/server/http"
|
httpapi "github.com/netbirdio/netbird/management/server/http"
|
||||||
"github.com/netbirdio/netbird/management/server/idp"
|
"github.com/netbirdio/netbird/management/server/idp"
|
||||||
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
@ -163,8 +164,15 @@ var (
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
geo, err := geolocation.NewGeolocation(config.Datadir)
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("could not initialize geo location service, we proceed without geo support")
|
||||||
|
} else {
|
||||||
|
log.Infof("geo location service has been initialized from %s", config.Datadir)
|
||||||
|
}
|
||||||
|
|
||||||
accountManager, err := server.BuildManager(store, peersUpdateManager, idpManager, mgmtSingleAccModeDomain,
|
accountManager, err := server.BuildManager(store, peersUpdateManager, idpManager, mgmtSingleAccModeDomain,
|
||||||
dnsDomain, eventStore, userDeleteFromIDPEnabled)
|
dnsDomain, eventStore, geo, userDeleteFromIDPEnabled)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to build default manager: %v", err)
|
return fmt.Errorf("failed to build default manager: %v", err)
|
||||||
}
|
}
|
||||||
@ -183,17 +191,17 @@ var (
|
|||||||
log.Warn("TrustedHTTPProxies and TrustedHTTPProxiesCount both are configured. " +
|
log.Warn("TrustedHTTPProxies and TrustedHTTPProxiesCount both are configured. " +
|
||||||
"This is not recommended way to extract X-Forwarded-For. Consider using one of these options.")
|
"This is not recommended way to extract X-Forwarded-For. Consider using one of these options.")
|
||||||
}
|
}
|
||||||
realipOpts := realip.Opts{
|
realipOpts := []realip.Option{
|
||||||
TrustedPeers: trustedPeers,
|
realip.WithTrustedPeers(trustedPeers),
|
||||||
TrustedProxies: trustedHTTPProxies,
|
realip.WithTrustedProxies(trustedHTTPProxies),
|
||||||
TrustedProxiesCount: trustedProxiesCount,
|
realip.WithTrustedProxiesCount(trustedProxiesCount),
|
||||||
Headers: []string{realip.XForwardedFor, realip.XRealIp},
|
realip.WithHeaders([]string{realip.XForwardedFor, realip.XRealIp}),
|
||||||
}
|
}
|
||||||
gRPCOpts := []grpc.ServerOption{
|
gRPCOpts := []grpc.ServerOption{
|
||||||
grpc.KeepaliveEnforcementPolicy(kaep),
|
grpc.KeepaliveEnforcementPolicy(kaep),
|
||||||
grpc.KeepaliveParams(kasp),
|
grpc.KeepaliveParams(kasp),
|
||||||
grpc.ChainUnaryInterceptor(realip.UnaryServerInterceptorOpts(realipOpts)),
|
grpc.ChainUnaryInterceptor(realip.UnaryServerInterceptorOpts(realipOpts...)),
|
||||||
grpc.ChainStreamInterceptor(realip.StreamServerInterceptorOpts(realipOpts)),
|
grpc.ChainStreamInterceptor(realip.StreamServerInterceptorOpts(realipOpts...)),
|
||||||
}
|
}
|
||||||
|
|
||||||
var certManager *autocert.Manager
|
var certManager *autocert.Manager
|
||||||
@ -234,7 +242,7 @@ var (
|
|||||||
UserIDClaim: config.HttpConfig.AuthUserIDClaim,
|
UserIDClaim: config.HttpConfig.AuthUserIDClaim,
|
||||||
KeysLocation: config.HttpConfig.AuthKeysLocation,
|
KeysLocation: config.HttpConfig.AuthKeysLocation,
|
||||||
}
|
}
|
||||||
httpAPIHandler, err := httpapi.APIHandler(accountManager, *jwtValidator, appMetrics, httpAPIAuthCfg)
|
httpAPIHandler, err := httpapi.APIHandler(accountManager, geo, *jwtValidator, appMetrics, httpAPIAuthCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed creating HTTP API handler: %v", err)
|
return fmt.Errorf("failed creating HTTP API handler: %v", err)
|
||||||
}
|
}
|
||||||
@ -312,6 +320,9 @@ var (
|
|||||||
SetupCloseHandler()
|
SetupCloseHandler()
|
||||||
|
|
||||||
<-stopCh
|
<-stopCh
|
||||||
|
if geo != nil {
|
||||||
|
_ = geo.Stop()
|
||||||
|
}
|
||||||
ephemeralManager.Stop()
|
ephemeralManager.Stop()
|
||||||
_ = appMetrics.Close()
|
_ = appMetrics.Close()
|
||||||
_ = listener.Close()
|
_ = listener.Close()
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
// Code generated by protoc-gen-go. DO NOT EDIT.
|
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||||
// versions:
|
// versions:
|
||||||
// protoc-gen-go v1.26.0
|
// protoc-gen-go v1.26.0
|
||||||
// protoc v3.21.9
|
// protoc v4.23.4
|
||||||
// source: management.proto
|
// source: management.proto
|
||||||
|
|
||||||
package proto
|
package proto
|
||||||
@ -603,6 +603,8 @@ type PeerSystemMeta struct {
|
|||||||
OS string `protobuf:"bytes,6,opt,name=OS,proto3" json:"OS,omitempty"`
|
OS string `protobuf:"bytes,6,opt,name=OS,proto3" json:"OS,omitempty"`
|
||||||
WiretrusteeVersion string `protobuf:"bytes,7,opt,name=wiretrusteeVersion,proto3" json:"wiretrusteeVersion,omitempty"`
|
WiretrusteeVersion string `protobuf:"bytes,7,opt,name=wiretrusteeVersion,proto3" json:"wiretrusteeVersion,omitempty"`
|
||||||
UiVersion string `protobuf:"bytes,8,opt,name=uiVersion,proto3" json:"uiVersion,omitempty"`
|
UiVersion string `protobuf:"bytes,8,opt,name=uiVersion,proto3" json:"uiVersion,omitempty"`
|
||||||
|
KernelVersion string `protobuf:"bytes,9,opt,name=kernelVersion,proto3" json:"kernelVersion,omitempty"`
|
||||||
|
OSVersion string `protobuf:"bytes,10,opt,name=OSVersion,proto3" json:"OSVersion,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *PeerSystemMeta) Reset() {
|
func (x *PeerSystemMeta) Reset() {
|
||||||
@ -693,6 +695,20 @@ func (x *PeerSystemMeta) GetUiVersion() string {
|
|||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (x *PeerSystemMeta) GetKernelVersion() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.KernelVersion
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (x *PeerSystemMeta) GetOSVersion() string {
|
||||||
|
if x != nil {
|
||||||
|
return x.OSVersion
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
type LoginResponse struct {
|
type LoginResponse struct {
|
||||||
state protoimpl.MessageState
|
state protoimpl.MessageState
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
@ -2257,7 +2273,7 @@ var file_management_proto_rawDesc = []byte{
|
|||||||
0x73, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x01,
|
0x73, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x01,
|
||||||
0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x12,
|
0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x12,
|
||||||
0x1a, 0x0a, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28,
|
0x1a, 0x0a, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28,
|
||||||
0x0c, 0x52, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x22, 0xe6, 0x01, 0x0a, 0x0e,
|
0x0c, 0x52, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x22, 0xaa, 0x02, 0x0a, 0x0e,
|
||||||
0x50, 0x65, 0x65, 0x72, 0x53, 0x79, 0x73, 0x74, 0x65, 0x6d, 0x4d, 0x65, 0x74, 0x61, 0x12, 0x1a,
|
0x50, 0x65, 0x65, 0x72, 0x53, 0x79, 0x73, 0x74, 0x65, 0x6d, 0x4d, 0x65, 0x74, 0x61, 0x12, 0x1a,
|
||||||
0x0a, 0x08, 0x68, 0x6f, 0x73, 0x74, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09,
|
0x0a, 0x08, 0x68, 0x6f, 0x73, 0x74, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09,
|
||||||
0x52, 0x08, 0x68, 0x6f, 0x73, 0x74, 0x6e, 0x61, 0x6d, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x67, 0x6f,
|
0x52, 0x08, 0x68, 0x6f, 0x73, 0x74, 0x6e, 0x61, 0x6d, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x67, 0x6f,
|
||||||
@ -2272,256 +2288,260 @@ var file_management_proto_rawDesc = []byte{
|
|||||||
0x28, 0x09, 0x52, 0x12, 0x77, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x56,
|
0x28, 0x09, 0x52, 0x12, 0x77, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x56,
|
||||||
0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x1c, 0x0a, 0x09, 0x75, 0x69, 0x56, 0x65, 0x72, 0x73,
|
0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x1c, 0x0a, 0x09, 0x75, 0x69, 0x56, 0x65, 0x72, 0x73,
|
||||||
0x69, 0x6f, 0x6e, 0x18, 0x08, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x75, 0x69, 0x56, 0x65, 0x72,
|
0x69, 0x6f, 0x6e, 0x18, 0x08, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x75, 0x69, 0x56, 0x65, 0x72,
|
||||||
0x73, 0x69, 0x6f, 0x6e, 0x22, 0x94, 0x01, 0x0a, 0x0d, 0x4c, 0x6f, 0x67, 0x69, 0x6e, 0x52, 0x65,
|
0x73, 0x69, 0x6f, 0x6e, 0x12, 0x24, 0x0a, 0x0d, 0x6b, 0x65, 0x72, 0x6e, 0x65, 0x6c, 0x56, 0x65,
|
||||||
0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x4b, 0x0a, 0x11, 0x77, 0x69, 0x72, 0x65, 0x74, 0x72,
|
0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x6b, 0x65, 0x72,
|
||||||
0x75, 0x73, 0x74, 0x65, 0x65, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28,
|
0x6e, 0x65, 0x6c, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x1c, 0x0a, 0x09, 0x4f, 0x53,
|
||||||
0x0b, 0x32, 0x1d, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x57,
|
0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x0a, 0x20, 0x01, 0x28, 0x09, 0x52, 0x09, 0x4f,
|
||||||
0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
0x53, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x22, 0x94, 0x01, 0x0a, 0x0d, 0x4c, 0x6f, 0x67,
|
||||||
0x52, 0x11, 0x77, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x43, 0x6f, 0x6e,
|
0x69, 0x6e, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x4b, 0x0a, 0x11, 0x77, 0x69,
|
||||||
0x66, 0x69, 0x67, 0x12, 0x36, 0x0a, 0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69,
|
0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18,
|
||||||
|
0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
||||||
|
0x6e, 0x74, 0x2e, 0x57, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x43, 0x6f,
|
||||||
|
0x6e, 0x66, 0x69, 0x67, 0x52, 0x11, 0x77, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65,
|
||||||
|
0x65, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x36, 0x0a, 0x0a, 0x70, 0x65, 0x65, 0x72, 0x43,
|
||||||
|
0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61,
|
||||||
|
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e,
|
||||||
|
0x66, 0x69, 0x67, 0x52, 0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x22,
|
||||||
|
0x79, 0x0a, 0x11, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70,
|
||||||
|
0x6f, 0x6e, 0x73, 0x65, 0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28,
|
||||||
|
0x09, 0x52, 0x03, 0x6b, 0x65, 0x79, 0x12, 0x38, 0x0a, 0x09, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65,
|
||||||
|
0x73, 0x41, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67,
|
||||||
|
0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65,
|
||||||
|
0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x09, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x73, 0x41, 0x74,
|
||||||
|
0x12, 0x18, 0x0a, 0x07, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28,
|
||||||
|
0x05, 0x52, 0x07, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x22, 0x07, 0x0a, 0x05, 0x45, 0x6d,
|
||||||
|
0x70, 0x74, 0x79, 0x22, 0xa8, 0x01, 0x0a, 0x11, 0x57, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73,
|
||||||
|
0x74, 0x65, 0x65, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x2c, 0x0a, 0x05, 0x73, 0x74, 0x75,
|
||||||
|
0x6e, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67,
|
||||||
|
0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
||||||
|
0x52, 0x05, 0x73, 0x74, 0x75, 0x6e, 0x73, 0x12, 0x35, 0x0a, 0x05, 0x74, 0x75, 0x72, 0x6e, 0x73,
|
||||||
|
0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1f, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
||||||
|
0x65, 0x6e, 0x74, 0x2e, 0x50, 0x72, 0x6f, 0x74, 0x65, 0x63, 0x74, 0x65, 0x64, 0x48, 0x6f, 0x73,
|
||||||
|
0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x05, 0x74, 0x75, 0x72, 0x6e, 0x73, 0x12, 0x2e,
|
||||||
|
0x0a, 0x06, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x6c, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16,
|
||||||
|
0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74,
|
||||||
|
0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x06, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x6c, 0x22, 0x98,
|
||||||
|
0x01, 0x0a, 0x0a, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x10, 0x0a,
|
||||||
|
0x03, 0x75, 0x72, 0x69, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x69, 0x12,
|
||||||
|
0x3b, 0x0a, 0x08, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28,
|
||||||
|
0x0e, 0x32, 0x1f, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48,
|
||||||
|
0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x2e, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63,
|
||||||
|
0x6f, 0x6c, 0x52, 0x08, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x22, 0x3b, 0x0a, 0x08,
|
||||||
|
0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x12, 0x07, 0x0a, 0x03, 0x55, 0x44, 0x50, 0x10,
|
||||||
|
0x00, 0x12, 0x07, 0x0a, 0x03, 0x54, 0x43, 0x50, 0x10, 0x01, 0x12, 0x08, 0x0a, 0x04, 0x48, 0x54,
|
||||||
|
0x54, 0x50, 0x10, 0x02, 0x12, 0x09, 0x0a, 0x05, 0x48, 0x54, 0x54, 0x50, 0x53, 0x10, 0x03, 0x12,
|
||||||
|
0x08, 0x0a, 0x04, 0x44, 0x54, 0x4c, 0x53, 0x10, 0x04, 0x22, 0x7d, 0x0a, 0x13, 0x50, 0x72, 0x6f,
|
||||||
|
0x74, 0x65, 0x63, 0x74, 0x65, 0x64, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
||||||
|
0x12, 0x36, 0x0a, 0x0a, 0x68, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x01,
|
||||||
|
0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e,
|
||||||
|
0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0a, 0x68, 0x6f,
|
||||||
|
0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x75, 0x73, 0x65, 0x72,
|
||||||
|
0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x75, 0x73, 0x65, 0x72, 0x12, 0x1a, 0x0a, 0x08,
|
||||||
|
0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08,
|
||||||
|
0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x22, 0x81, 0x01, 0x0a, 0x0a, 0x50, 0x65, 0x65,
|
||||||
|
0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x18, 0x0a, 0x07, 0x61, 0x64, 0x64, 0x72, 0x65,
|
||||||
|
0x73, 0x73, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73,
|
||||||
|
0x73, 0x12, 0x10, 0x0a, 0x03, 0x64, 0x6e, 0x73, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03,
|
||||||
|
0x64, 0x6e, 0x73, 0x12, 0x33, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
||||||
|
0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
||||||
|
0x65, 0x6e, 0x74, 0x2e, 0x53, 0x53, 0x48, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x09, 0x73,
|
||||||
|
0x73, 0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x71, 0x64, 0x6e,
|
||||||
|
0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x22, 0xe2, 0x03, 0x0a,
|
||||||
|
0x0a, 0x4e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x4d, 0x61, 0x70, 0x12, 0x16, 0x0a, 0x06, 0x53,
|
||||||
|
0x65, 0x72, 0x69, 0x61, 0x6c, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x53, 0x65, 0x72,
|
||||||
|
0x69, 0x61, 0x6c, 0x12, 0x36, 0x0a, 0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69,
|
||||||
0x67, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
0x67, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
||||||
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52,
|
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52,
|
||||||
0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x22, 0x79, 0x0a, 0x11, 0x53,
|
0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x3e, 0x0a, 0x0b, 0x72,
|
||||||
0x65, 0x72, 0x76, 0x65, 0x72, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65,
|
0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x0b,
|
||||||
0x12, 0x10, 0x0a, 0x03, 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x6b,
|
0x32, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52, 0x65,
|
||||||
0x65, 0x79, 0x12, 0x38, 0x0a, 0x09, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x73, 0x41, 0x74, 0x18,
|
0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0b,
|
||||||
0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70,
|
0x72, 0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x12, 0x2e, 0x0a, 0x12, 0x72,
|
||||||
0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d,
|
0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74,
|
||||||
0x70, 0x52, 0x09, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x73, 0x41, 0x74, 0x12, 0x18, 0x0a, 0x07,
|
0x79, 0x18, 0x04, 0x20, 0x01, 0x28, 0x08, 0x52, 0x12, 0x72, 0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50,
|
||||||
0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x05, 0x52, 0x07, 0x76,
|
0x65, 0x65, 0x72, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x12, 0x29, 0x0a, 0x06, 0x52,
|
||||||
0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x22, 0x07, 0x0a, 0x05, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22,
|
0x6f, 0x75, 0x74, 0x65, 0x73, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x11, 0x2e, 0x6d, 0x61,
|
||||||
0xa8, 0x01, 0x0a, 0x11, 0x57, 0x69, 0x72, 0x65, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x65, 0x43,
|
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x52, 0x06,
|
||||||
0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x2c, 0x0a, 0x05, 0x73, 0x74, 0x75, 0x6e, 0x73, 0x18, 0x01,
|
0x52, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x12, 0x33, 0x0a, 0x09, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e,
|
||||||
0x20, 0x03, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e,
|
0x66, 0x69, 0x67, 0x18, 0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61,
|
||||||
0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x05, 0x73, 0x74,
|
0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
||||||
0x75, 0x6e, 0x73, 0x12, 0x35, 0x0a, 0x05, 0x74, 0x75, 0x72, 0x6e, 0x73, 0x18, 0x02, 0x20, 0x03,
|
0x52, 0x09, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x40, 0x0a, 0x0c, 0x6f,
|
||||||
0x28, 0x0b, 0x32, 0x1f, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e,
|
0x66, 0x66, 0x6c, 0x69, 0x6e, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x18, 0x07, 0x20, 0x03, 0x28,
|
||||||
0x50, 0x72, 0x6f, 0x74, 0x65, 0x63, 0x74, 0x65, 0x64, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e,
|
0x0b, 0x32, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52,
|
||||||
0x66, 0x69, 0x67, 0x52, 0x05, 0x74, 0x75, 0x72, 0x6e, 0x73, 0x12, 0x2e, 0x0a, 0x06, 0x73, 0x69,
|
0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52,
|
||||||
0x67, 0x6e, 0x61, 0x6c, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e,
|
0x0c, 0x6f, 0x66, 0x66, 0x6c, 0x69, 0x6e, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x12, 0x3e, 0x0a,
|
||||||
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66,
|
0x0d, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x18, 0x08,
|
||||||
0x69, 0x67, 0x52, 0x06, 0x73, 0x69, 0x67, 0x6e, 0x61, 0x6c, 0x22, 0x98, 0x01, 0x0a, 0x0a, 0x48,
|
0x20, 0x03, 0x28, 0x0b, 0x32, 0x18, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e,
|
||||||
0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x10, 0x0a, 0x03, 0x75, 0x72, 0x69,
|
0x74, 0x2e, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x52, 0x0d,
|
||||||
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x69, 0x12, 0x3b, 0x0a, 0x08, 0x70,
|
0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x12, 0x32, 0x0a,
|
||||||
0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1f, 0x2e,
|
0x14, 0x66, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x49, 0x73,
|
||||||
0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48, 0x6f, 0x73, 0x74, 0x43,
|
0x45, 0x6d, 0x70, 0x74, 0x79, 0x18, 0x09, 0x20, 0x01, 0x28, 0x08, 0x52, 0x14, 0x66, 0x69, 0x72,
|
||||||
0x6f, 0x6e, 0x66, 0x69, 0x67, 0x2e, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x52, 0x08,
|
|
||||||
0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x22, 0x3b, 0x0a, 0x08, 0x50, 0x72, 0x6f, 0x74,
|
|
||||||
0x6f, 0x63, 0x6f, 0x6c, 0x12, 0x07, 0x0a, 0x03, 0x55, 0x44, 0x50, 0x10, 0x00, 0x12, 0x07, 0x0a,
|
|
||||||
0x03, 0x54, 0x43, 0x50, 0x10, 0x01, 0x12, 0x08, 0x0a, 0x04, 0x48, 0x54, 0x54, 0x50, 0x10, 0x02,
|
|
||||||
0x12, 0x09, 0x0a, 0x05, 0x48, 0x54, 0x54, 0x50, 0x53, 0x10, 0x03, 0x12, 0x08, 0x0a, 0x04, 0x44,
|
|
||||||
0x54, 0x4c, 0x53, 0x10, 0x04, 0x22, 0x7d, 0x0a, 0x13, 0x50, 0x72, 0x6f, 0x74, 0x65, 0x63, 0x74,
|
|
||||||
0x65, 0x64, 0x48, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x36, 0x0a, 0x0a,
|
|
||||||
0x68, 0x6f, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b,
|
|
||||||
0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x48, 0x6f,
|
|
||||||
0x73, 0x74, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0a, 0x68, 0x6f, 0x73, 0x74, 0x43, 0x6f,
|
|
||||||
0x6e, 0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x75, 0x73, 0x65, 0x72, 0x18, 0x02, 0x20, 0x01,
|
|
||||||
0x28, 0x09, 0x52, 0x04, 0x75, 0x73, 0x65, 0x72, 0x12, 0x1a, 0x0a, 0x08, 0x70, 0x61, 0x73, 0x73,
|
|
||||||
0x77, 0x6f, 0x72, 0x64, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x70, 0x61, 0x73, 0x73,
|
|
||||||
0x77, 0x6f, 0x72, 0x64, 0x22, 0x81, 0x01, 0x0a, 0x0a, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e,
|
|
||||||
0x66, 0x69, 0x67, 0x12, 0x18, 0x0a, 0x07, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x18, 0x01,
|
|
||||||
0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x61, 0x64, 0x64, 0x72, 0x65, 0x73, 0x73, 0x12, 0x10, 0x0a,
|
|
||||||
0x03, 0x64, 0x6e, 0x73, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x64, 0x6e, 0x73, 0x12,
|
|
||||||
0x33, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x03, 0x20, 0x01,
|
|
||||||
0x28, 0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e,
|
|
||||||
0x53, 0x53, 0x48, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f,
|
|
||||||
0x6e, 0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x18, 0x04, 0x20, 0x01,
|
|
||||||
0x28, 0x09, 0x52, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x22, 0xe2, 0x03, 0x0a, 0x0a, 0x4e, 0x65, 0x74,
|
|
||||||
0x77, 0x6f, 0x72, 0x6b, 0x4d, 0x61, 0x70, 0x12, 0x16, 0x0a, 0x06, 0x53, 0x65, 0x72, 0x69, 0x61,
|
|
||||||
0x6c, 0x18, 0x01, 0x20, 0x01, 0x28, 0x04, 0x52, 0x06, 0x53, 0x65, 0x72, 0x69, 0x61, 0x6c, 0x12,
|
|
||||||
0x36, 0x0a, 0x0a, 0x70, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x02, 0x20,
|
|
||||||
0x01, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74,
|
|
||||||
0x2e, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0a, 0x70, 0x65, 0x65,
|
|
||||||
0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x3e, 0x0a, 0x0b, 0x72, 0x65, 0x6d, 0x6f, 0x74,
|
|
||||||
0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1c, 0x2e, 0x6d,
|
|
||||||
0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52, 0x65, 0x6d, 0x6f, 0x74, 0x65,
|
|
||||||
0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0b, 0x72, 0x65, 0x6d, 0x6f,
|
|
||||||
0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x12, 0x2e, 0x0a, 0x12, 0x72, 0x65, 0x6d, 0x6f, 0x74,
|
|
||||||
0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x18, 0x04, 0x20,
|
|
||||||
0x01, 0x28, 0x08, 0x52, 0x12, 0x72, 0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73,
|
|
||||||
0x49, 0x73, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x12, 0x29, 0x0a, 0x06, 0x52, 0x6f, 0x75, 0x74, 0x65,
|
|
||||||
0x73, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x11, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
|
||||||
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x52, 0x06, 0x52, 0x6f, 0x75, 0x74,
|
|
||||||
0x65, 0x73, 0x12, 0x33, 0x0a, 0x09, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18,
|
|
||||||
0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
|
||||||
0x6e, 0x74, 0x2e, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x09, 0x44, 0x4e,
|
|
||||||
0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x40, 0x0a, 0x0c, 0x6f, 0x66, 0x66, 0x6c, 0x69,
|
|
||||||
0x6e, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x18, 0x07, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1c, 0x2e,
|
|
||||||
0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x52, 0x65, 0x6d, 0x6f, 0x74,
|
|
||||||
0x65, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0c, 0x6f, 0x66, 0x66,
|
|
||||||
0x6c, 0x69, 0x6e, 0x65, 0x50, 0x65, 0x65, 0x72, 0x73, 0x12, 0x3e, 0x0a, 0x0d, 0x46, 0x69, 0x72,
|
|
||||||
0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x18, 0x08, 0x20, 0x03, 0x28, 0x0b,
|
|
||||||
0x32, 0x18, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69,
|
|
||||||
0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x52, 0x0d, 0x46, 0x69, 0x72, 0x65,
|
|
||||||
0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x12, 0x32, 0x0a, 0x14, 0x66, 0x69, 0x72,
|
|
||||||
0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74,
|
0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74,
|
||||||
0x79, 0x18, 0x09, 0x20, 0x01, 0x28, 0x08, 0x52, 0x14, 0x66, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c,
|
0x79, 0x22, 0x97, 0x01, 0x0a, 0x10, 0x52, 0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72,
|
||||||
0x6c, 0x52, 0x75, 0x6c, 0x65, 0x73, 0x49, 0x73, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x97, 0x01,
|
0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x1a, 0x0a, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b,
|
||||||
0x0a, 0x10, 0x52, 0x65, 0x6d, 0x6f, 0x74, 0x65, 0x50, 0x65, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66,
|
0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b,
|
||||||
0x69, 0x67, 0x12, 0x1a, 0x0a, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x01,
|
0x65, 0x79, 0x12, 0x1e, 0x0a, 0x0a, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 0x49, 0x70, 0x73,
|
||||||
0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x77, 0x67, 0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x12, 0x1e,
|
0x18, 0x02, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0a, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 0x49,
|
||||||
0x0a, 0x0a, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 0x49, 0x70, 0x73, 0x18, 0x02, 0x20, 0x03,
|
0x70, 0x73, 0x12, 0x33, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18,
|
||||||
0x28, 0x09, 0x52, 0x0a, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 0x49, 0x70, 0x73, 0x12, 0x33,
|
0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
||||||
0x0a, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x03, 0x20, 0x01, 0x28,
|
0x6e, 0x74, 0x2e, 0x53, 0x53, 0x48, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x09, 0x73, 0x73,
|
||||||
0x0b, 0x32, 0x15, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x53,
|
0x68, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x18,
|
||||||
0x53, 0x48, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x09, 0x73, 0x73, 0x68, 0x43, 0x6f, 0x6e,
|
0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x22, 0x49, 0x0a, 0x09, 0x53,
|
||||||
0x66, 0x69, 0x67, 0x12, 0x12, 0x0a, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x18, 0x04, 0x20, 0x01, 0x28,
|
0x53, 0x48, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x1e, 0x0a, 0x0a, 0x73, 0x73, 0x68, 0x45,
|
||||||
0x09, 0x52, 0x04, 0x66, 0x71, 0x64, 0x6e, 0x22, 0x49, 0x0a, 0x09, 0x53, 0x53, 0x48, 0x43, 0x6f,
|
0x6e, 0x61, 0x62, 0x6c, 0x65, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x73, 0x73,
|
||||||
0x6e, 0x66, 0x69, 0x67, 0x12, 0x1e, 0x0a, 0x0a, 0x73, 0x73, 0x68, 0x45, 0x6e, 0x61, 0x62, 0x6c,
|
0x68, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x64, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x50,
|
||||||
0x65, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x73, 0x73, 0x68, 0x45, 0x6e, 0x61,
|
0x75, 0x62, 0x4b, 0x65, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x73, 0x68,
|
||||||
0x62, 0x6c, 0x65, 0x64, 0x12, 0x1c, 0x0a, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b, 0x65,
|
0x50, 0x75, 0x62, 0x4b, 0x65, 0x79, 0x22, 0x20, 0x0a, 0x1e, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65,
|
||||||
0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x73, 0x73, 0x68, 0x50, 0x75, 0x62, 0x4b,
|
0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f,
|
||||||
0x65, 0x79, 0x22, 0x20, 0x0a, 0x1e, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68,
|
0x77, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x22, 0xbf, 0x01, 0x0a, 0x17, 0x44, 0x65, 0x76,
|
||||||
0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x52, 0x65, 0x71,
|
0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e,
|
||||||
0x75, 0x65, 0x73, 0x74, 0x22, 0xbf, 0x01, 0x0a, 0x17, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41,
|
0x46, 0x6c, 0x6f, 0x77, 0x12, 0x48, 0x0a, 0x08, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72,
|
||||||
0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77,
|
0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x2c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
||||||
0x12, 0x48, 0x0a, 0x08, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x18, 0x01, 0x20, 0x01,
|
0x65, 0x6e, 0x74, 0x2e, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72,
|
||||||
0x28, 0x0e, 0x32, 0x2c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e,
|
0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x2e, 0x70, 0x72, 0x6f, 0x76,
|
||||||
0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74,
|
0x69, 0x64, 0x65, 0x72, 0x52, 0x08, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x12, 0x42,
|
||||||
0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x2e, 0x70, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72,
|
0x0a, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67,
|
||||||
0x52, 0x08, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x12, 0x42, 0x0a, 0x0e, 0x50, 0x72,
|
0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
||||||
0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x02, 0x20, 0x01,
|
0x65, 0x6e, 0x74, 0x2e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66,
|
||||||
0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e,
|
0x69, 0x67, 0x52, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66,
|
||||||
0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0e,
|
0x69, 0x67, 0x22, 0x16, 0x0a, 0x08, 0x70, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x12, 0x0a,
|
||||||
0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x22, 0x16,
|
0x0a, 0x06, 0x48, 0x4f, 0x53, 0x54, 0x45, 0x44, 0x10, 0x00, 0x22, 0x1e, 0x0a, 0x1c, 0x50, 0x4b,
|
||||||
0x0a, 0x08, 0x70, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x12, 0x0a, 0x0a, 0x06, 0x48, 0x4f,
|
0x43, 0x45, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46,
|
||||||
0x53, 0x54, 0x45, 0x44, 0x10, 0x00, 0x22, 0x1e, 0x0a, 0x1c, 0x50, 0x4b, 0x43, 0x45, 0x41, 0x75,
|
0x6c, 0x6f, 0x77, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x22, 0x5b, 0x0a, 0x15, 0x50, 0x4b,
|
||||||
0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x52,
|
0x43, 0x45, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46,
|
||||||
0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x22, 0x5b, 0x0a, 0x15, 0x50, 0x4b, 0x43, 0x45, 0x41, 0x75,
|
0x6c, 0x6f, 0x77, 0x12, 0x42, 0x0a, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43,
|
||||||
0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x12,
|
0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x6d, 0x61,
|
||||||
0x42, 0x0a, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69,
|
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65,
|
||||||
0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x52, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65,
|
||||||
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e,
|
0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x22, 0xea, 0x02, 0x0a, 0x0e, 0x50, 0x72, 0x6f, 0x76,
|
||||||
0x66, 0x69, 0x67, 0x52, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e,
|
0x69, 0x64, 0x65, 0x72, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x1a, 0x0a, 0x08, 0x43, 0x6c,
|
||||||
0x66, 0x69, 0x67, 0x22, 0xea, 0x02, 0x0a, 0x0e, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72,
|
0x69, 0x65, 0x6e, 0x74, 0x49, 0x44, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x43, 0x6c,
|
||||||
0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x1a, 0x0a, 0x08, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74,
|
0x69, 0x65, 0x6e, 0x74, 0x49, 0x44, 0x12, 0x22, 0x0a, 0x0c, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74,
|
||||||
0x49, 0x44, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74,
|
0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0c, 0x43, 0x6c,
|
||||||
0x49, 0x44, 0x12, 0x22, 0x0a, 0x0c, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74, 0x53, 0x65, 0x63, 0x72,
|
0x69, 0x65, 0x6e, 0x74, 0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x16, 0x0a, 0x06, 0x44, 0x6f,
|
||||||
0x65, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0c, 0x43, 0x6c, 0x69, 0x65, 0x6e, 0x74,
|
0x6d, 0x61, 0x69, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x44, 0x6f, 0x6d, 0x61,
|
||||||
0x53, 0x65, 0x63, 0x72, 0x65, 0x74, 0x12, 0x16, 0x0a, 0x06, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e,
|
0x69, 0x6e, 0x12, 0x1a, 0x0a, 0x08, 0x41, 0x75, 0x64, 0x69, 0x65, 0x6e, 0x63, 0x65, 0x18, 0x04,
|
||||||
0x18, 0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x12, 0x1a,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x08, 0x41, 0x75, 0x64, 0x69, 0x65, 0x6e, 0x63, 0x65, 0x12, 0x2e,
|
||||||
0x0a, 0x08, 0x41, 0x75, 0x64, 0x69, 0x65, 0x6e, 0x63, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09,
|
0x0a, 0x12, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x45, 0x6e, 0x64, 0x70,
|
||||||
0x52, 0x08, 0x41, 0x75, 0x64, 0x69, 0x65, 0x6e, 0x63, 0x65, 0x12, 0x2e, 0x0a, 0x12, 0x44, 0x65,
|
0x6f, 0x69, 0x6e, 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x12, 0x44, 0x65, 0x76, 0x69,
|
||||||
0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74,
|
0x63, 0x65, 0x41, 0x75, 0x74, 0x68, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x12, 0x24,
|
||||||
0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x12, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75,
|
0x0a, 0x0d, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x18,
|
||||||
0x74, 0x68, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x12, 0x24, 0x0a, 0x0d, 0x54, 0x6f,
|
0x06, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0d, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x45, 0x6e, 0x64, 0x70,
|
||||||
0x6b, 0x65, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x18, 0x06, 0x20, 0x01, 0x28,
|
0x6f, 0x69, 0x6e, 0x74, 0x12, 0x14, 0x0a, 0x05, 0x53, 0x63, 0x6f, 0x70, 0x65, 0x18, 0x07, 0x20,
|
||||||
0x09, 0x52, 0x0d, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74,
|
0x01, 0x28, 0x09, 0x52, 0x05, 0x53, 0x63, 0x6f, 0x70, 0x65, 0x12, 0x1e, 0x0a, 0x0a, 0x55, 0x73,
|
||||||
0x12, 0x14, 0x0a, 0x05, 0x53, 0x63, 0x6f, 0x70, 0x65, 0x18, 0x07, 0x20, 0x01, 0x28, 0x09, 0x52,
|
0x65, 0x49, 0x44, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x18, 0x08, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a,
|
||||||
0x05, 0x53, 0x63, 0x6f, 0x70, 0x65, 0x12, 0x1e, 0x0a, 0x0a, 0x55, 0x73, 0x65, 0x49, 0x44, 0x54,
|
0x55, 0x73, 0x65, 0x49, 0x44, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x12, 0x34, 0x0a, 0x15, 0x41, 0x75,
|
||||||
0x6f, 0x6b, 0x65, 0x6e, 0x18, 0x08, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x55, 0x73, 0x65, 0x49,
|
0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f,
|
||||||
0x44, 0x54, 0x6f, 0x6b, 0x65, 0x6e, 0x12, 0x34, 0x0a, 0x15, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72,
|
0x69, 0x6e, 0x74, 0x18, 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x15, 0x41, 0x75, 0x74, 0x68, 0x6f,
|
||||||
0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x18,
|
0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74,
|
||||||
0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x15, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61,
|
0x12, 0x22, 0x0a, 0x0c, 0x52, 0x65, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74, 0x55, 0x52, 0x4c, 0x73,
|
||||||
0x74, 0x69, 0x6f, 0x6e, 0x45, 0x6e, 0x64, 0x70, 0x6f, 0x69, 0x6e, 0x74, 0x12, 0x22, 0x0a, 0x0c,
|
0x18, 0x0a, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0c, 0x52, 0x65, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74,
|
||||||
0x52, 0x65, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74, 0x55, 0x52, 0x4c, 0x73, 0x18, 0x0a, 0x20, 0x03,
|
0x55, 0x52, 0x4c, 0x73, 0x22, 0xb5, 0x01, 0x0a, 0x05, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x12, 0x0e,
|
||||||
0x28, 0x09, 0x52, 0x0c, 0x52, 0x65, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74, 0x55, 0x52, 0x4c, 0x73,
|
0x0a, 0x02, 0x49, 0x44, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x49, 0x44, 0x12, 0x18,
|
||||||
0x22, 0xb5, 0x01, 0x0a, 0x05, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x12, 0x0e, 0x0a, 0x02, 0x49, 0x44,
|
0x0a, 0x07, 0x4e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52,
|
||||||
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x02, 0x49, 0x44, 0x12, 0x18, 0x0a, 0x07, 0x4e, 0x65,
|
0x07, 0x4e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x12, 0x20, 0x0a, 0x0b, 0x4e, 0x65, 0x74, 0x77,
|
||||||
0x74, 0x77, 0x6f, 0x72, 0x6b, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x07, 0x4e, 0x65, 0x74,
|
0x6f, 0x72, 0x6b, 0x54, 0x79, 0x70, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x03, 0x52, 0x0b, 0x4e,
|
||||||
0x77, 0x6f, 0x72, 0x6b, 0x12, 0x20, 0x0a, 0x0b, 0x4e, 0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x54,
|
0x65, 0x74, 0x77, 0x6f, 0x72, 0x6b, 0x54, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x50, 0x65,
|
||||||
0x79, 0x70, 0x65, 0x18, 0x03, 0x20, 0x01, 0x28, 0x03, 0x52, 0x0b, 0x4e, 0x65, 0x74, 0x77, 0x6f,
|
0x65, 0x72, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x50, 0x65, 0x65, 0x72, 0x12, 0x16,
|
||||||
0x72, 0x6b, 0x54, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x50, 0x65, 0x65, 0x72, 0x18, 0x04,
|
0x0a, 0x06, 0x4d, 0x65, 0x74, 0x72, 0x69, 0x63, 0x18, 0x05, 0x20, 0x01, 0x28, 0x03, 0x52, 0x06,
|
||||||
0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x50, 0x65, 0x65, 0x72, 0x12, 0x16, 0x0a, 0x06, 0x4d, 0x65,
|
0x4d, 0x65, 0x74, 0x72, 0x69, 0x63, 0x12, 0x1e, 0x0a, 0x0a, 0x4d, 0x61, 0x73, 0x71, 0x75, 0x65,
|
||||||
0x74, 0x72, 0x69, 0x63, 0x18, 0x05, 0x20, 0x01, 0x28, 0x03, 0x52, 0x06, 0x4d, 0x65, 0x74, 0x72,
|
0x72, 0x61, 0x64, 0x65, 0x18, 0x06, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x4d, 0x61, 0x73, 0x71,
|
||||||
0x69, 0x63, 0x12, 0x1e, 0x0a, 0x0a, 0x4d, 0x61, 0x73, 0x71, 0x75, 0x65, 0x72, 0x61, 0x64, 0x65,
|
0x75, 0x65, 0x72, 0x61, 0x64, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x4e, 0x65, 0x74, 0x49, 0x44, 0x18,
|
||||||
0x18, 0x06, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0a, 0x4d, 0x61, 0x73, 0x71, 0x75, 0x65, 0x72, 0x61,
|
0x07, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x4e, 0x65, 0x74, 0x49, 0x44, 0x22, 0xb4, 0x01, 0x0a,
|
||||||
0x64, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x4e, 0x65, 0x74, 0x49, 0x44, 0x18, 0x07, 0x20, 0x01, 0x28,
|
0x09, 0x44, 0x4e, 0x53, 0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x24, 0x0a, 0x0d, 0x53, 0x65,
|
||||||
0x09, 0x52, 0x05, 0x4e, 0x65, 0x74, 0x49, 0x44, 0x22, 0xb4, 0x01, 0x0a, 0x09, 0x44, 0x4e, 0x53,
|
0x72, 0x76, 0x69, 0x63, 0x65, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28,
|
||||||
0x43, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x24, 0x0a, 0x0d, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63,
|
0x08, 0x52, 0x0d, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65,
|
||||||
0x65, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0d, 0x53,
|
0x12, 0x47, 0x0a, 0x10, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x47, 0x72,
|
||||||
0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x12, 0x47, 0x0a, 0x10,
|
0x6f, 0x75, 0x70, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1b, 0x2e, 0x6d, 0x61, 0x6e,
|
||||||
0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x47, 0x72, 0x6f, 0x75, 0x70, 0x73,
|
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76,
|
||||||
0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1b, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
0x65, 0x72, 0x47, 0x72, 0x6f, 0x75, 0x70, 0x52, 0x10, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72,
|
||||||
0x65, 0x6e, 0x74, 0x2e, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x47, 0x72,
|
0x76, 0x65, 0x72, 0x47, 0x72, 0x6f, 0x75, 0x70, 0x73, 0x12, 0x38, 0x0a, 0x0b, 0x43, 0x75, 0x73,
|
||||||
0x6f, 0x75, 0x70, 0x52, 0x10, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x47,
|
0x74, 0x6f, 0x6d, 0x5a, 0x6f, 0x6e, 0x65, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x16,
|
||||||
0x72, 0x6f, 0x75, 0x70, 0x73, 0x12, 0x38, 0x0a, 0x0b, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a,
|
0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x43, 0x75, 0x73, 0x74,
|
||||||
0x6f, 0x6e, 0x65, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e,
|
0x6f, 0x6d, 0x5a, 0x6f, 0x6e, 0x65, 0x52, 0x0b, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a, 0x6f,
|
||||||
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a, 0x6f,
|
0x6e, 0x65, 0x73, 0x22, 0x58, 0x0a, 0x0a, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a, 0x6f, 0x6e,
|
||||||
0x6e, 0x65, 0x52, 0x0b, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a, 0x6f, 0x6e, 0x65, 0x73, 0x22,
|
0x65, 0x12, 0x16, 0x0a, 0x06, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28,
|
||||||
0x58, 0x0a, 0x0a, 0x43, 0x75, 0x73, 0x74, 0x6f, 0x6d, 0x5a, 0x6f, 0x6e, 0x65, 0x12, 0x16, 0x0a,
|
0x09, 0x52, 0x06, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x12, 0x32, 0x0a, 0x07, 0x52, 0x65, 0x63,
|
||||||
0x06, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x44,
|
0x6f, 0x72, 0x64, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x18, 0x2e, 0x6d, 0x61, 0x6e,
|
||||||
0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x12, 0x32, 0x0a, 0x07, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64, 0x73,
|
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x53, 0x69, 0x6d, 0x70, 0x6c, 0x65, 0x52, 0x65,
|
||||||
0x18, 0x02, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x18, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
0x63, 0x6f, 0x72, 0x64, 0x52, 0x07, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64, 0x73, 0x22, 0x74, 0x0a,
|
||||||
0x65, 0x6e, 0x74, 0x2e, 0x53, 0x69, 0x6d, 0x70, 0x6c, 0x65, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64,
|
0x0c, 0x53, 0x69, 0x6d, 0x70, 0x6c, 0x65, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64, 0x12, 0x12, 0x0a,
|
||||||
0x52, 0x07, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64, 0x73, 0x22, 0x74, 0x0a, 0x0c, 0x53, 0x69, 0x6d,
|
0x04, 0x4e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x4e, 0x61, 0x6d,
|
||||||
0x70, 0x6c, 0x65, 0x52, 0x65, 0x63, 0x6f, 0x72, 0x64, 0x12, 0x12, 0x0a, 0x04, 0x4e, 0x61, 0x6d,
|
0x65, 0x12, 0x12, 0x0a, 0x04, 0x54, 0x79, 0x70, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x03, 0x52,
|
||||||
0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x12, 0x0a,
|
0x04, 0x54, 0x79, 0x70, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x43, 0x6c, 0x61, 0x73, 0x73, 0x18, 0x03,
|
||||||
0x04, 0x54, 0x79, 0x70, 0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x03, 0x52, 0x04, 0x54, 0x79, 0x70,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x43, 0x6c, 0x61, 0x73, 0x73, 0x12, 0x10, 0x0a, 0x03, 0x54,
|
||||||
0x65, 0x12, 0x14, 0x0a, 0x05, 0x43, 0x6c, 0x61, 0x73, 0x73, 0x18, 0x03, 0x20, 0x01, 0x28, 0x09,
|
0x54, 0x4c, 0x18, 0x04, 0x20, 0x01, 0x28, 0x03, 0x52, 0x03, 0x54, 0x54, 0x4c, 0x12, 0x14, 0x0a,
|
||||||
0x52, 0x05, 0x43, 0x6c, 0x61, 0x73, 0x73, 0x12, 0x10, 0x0a, 0x03, 0x54, 0x54, 0x4c, 0x18, 0x04,
|
0x05, 0x52, 0x44, 0x61, 0x74, 0x61, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x52, 0x44,
|
||||||
0x20, 0x01, 0x28, 0x03, 0x52, 0x03, 0x54, 0x54, 0x4c, 0x12, 0x14, 0x0a, 0x05, 0x52, 0x44, 0x61,
|
0x61, 0x74, 0x61, 0x22, 0xb3, 0x01, 0x0a, 0x0f, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76,
|
||||||
0x74, 0x61, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x52, 0x44, 0x61, 0x74, 0x61, 0x22,
|
0x65, 0x72, 0x47, 0x72, 0x6f, 0x75, 0x70, 0x12, 0x38, 0x0a, 0x0b, 0x4e, 0x61, 0x6d, 0x65, 0x53,
|
||||||
0xb3, 0x01, 0x0a, 0x0f, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x47, 0x72,
|
0x65, 0x72, 0x76, 0x65, 0x72, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d,
|
||||||
0x6f, 0x75, 0x70, 0x12, 0x38, 0x0a, 0x0b, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65,
|
0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65,
|
||||||
0x72, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x16, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67,
|
0x72, 0x76, 0x65, 0x72, 0x52, 0x0b, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72,
|
||||||
0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72,
|
0x73, 0x12, 0x18, 0x0a, 0x07, 0x50, 0x72, 0x69, 0x6d, 0x61, 0x72, 0x79, 0x18, 0x02, 0x20, 0x01,
|
||||||
0x52, 0x0b, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x73, 0x12, 0x18, 0x0a,
|
0x28, 0x08, 0x52, 0x07, 0x50, 0x72, 0x69, 0x6d, 0x61, 0x72, 0x79, 0x12, 0x18, 0x0a, 0x07, 0x44,
|
||||||
0x07, 0x50, 0x72, 0x69, 0x6d, 0x61, 0x72, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x08, 0x52, 0x07,
|
0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x09, 0x52, 0x07, 0x44, 0x6f,
|
||||||
0x50, 0x72, 0x69, 0x6d, 0x61, 0x72, 0x79, 0x12, 0x18, 0x0a, 0x07, 0x44, 0x6f, 0x6d, 0x61, 0x69,
|
0x6d, 0x61, 0x69, 0x6e, 0x73, 0x12, 0x32, 0x0a, 0x14, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x44,
|
||||||
0x6e, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x09, 0x52, 0x07, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e,
|
0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x73, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x64, 0x18, 0x04, 0x20,
|
||||||
0x73, 0x12, 0x32, 0x0a, 0x14, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x44, 0x6f, 0x6d, 0x61, 0x69,
|
0x01, 0x28, 0x08, 0x52, 0x14, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x44, 0x6f, 0x6d, 0x61, 0x69,
|
||||||
0x6e, 0x73, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x64, 0x18, 0x04, 0x20, 0x01, 0x28, 0x08, 0x52,
|
0x6e, 0x73, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x64, 0x22, 0x48, 0x0a, 0x0a, 0x4e, 0x61, 0x6d,
|
||||||
0x14, 0x53, 0x65, 0x61, 0x72, 0x63, 0x68, 0x44, 0x6f, 0x6d, 0x61, 0x69, 0x6e, 0x73, 0x45, 0x6e,
|
0x65, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x12, 0x0e, 0x0a, 0x02, 0x49, 0x50, 0x18, 0x01, 0x20,
|
||||||
0x61, 0x62, 0x6c, 0x65, 0x64, 0x22, 0x48, 0x0a, 0x0a, 0x4e, 0x61, 0x6d, 0x65, 0x53, 0x65, 0x72,
|
0x01, 0x28, 0x09, 0x52, 0x02, 0x49, 0x50, 0x12, 0x16, 0x0a, 0x06, 0x4e, 0x53, 0x54, 0x79, 0x70,
|
||||||
0x76, 0x65, 0x72, 0x12, 0x0e, 0x0a, 0x02, 0x49, 0x50, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52,
|
0x65, 0x18, 0x02, 0x20, 0x01, 0x28, 0x03, 0x52, 0x06, 0x4e, 0x53, 0x54, 0x79, 0x70, 0x65, 0x12,
|
||||||
0x02, 0x49, 0x50, 0x12, 0x16, 0x0a, 0x06, 0x4e, 0x53, 0x54, 0x79, 0x70, 0x65, 0x18, 0x02, 0x20,
|
0x12, 0x0a, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x03, 0x52, 0x04, 0x50,
|
||||||
0x01, 0x28, 0x03, 0x52, 0x06, 0x4e, 0x53, 0x54, 0x79, 0x70, 0x65, 0x12, 0x12, 0x0a, 0x04, 0x50,
|
0x6f, 0x72, 0x74, 0x22, 0xf0, 0x02, 0x0a, 0x0c, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c,
|
||||||
0x6f, 0x72, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x03, 0x52, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x22,
|
0x52, 0x75, 0x6c, 0x65, 0x12, 0x16, 0x0a, 0x06, 0x50, 0x65, 0x65, 0x72, 0x49, 0x50, 0x18, 0x01,
|
||||||
0xf0, 0x02, 0x0a, 0x0c, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x50, 0x65, 0x65, 0x72, 0x49, 0x50, 0x12, 0x40, 0x0a, 0x09,
|
||||||
0x12, 0x16, 0x0a, 0x06, 0x50, 0x65, 0x65, 0x72, 0x49, 0x50, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09,
|
0x44, 0x69, 0x72, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32,
|
||||||
0x52, 0x06, 0x50, 0x65, 0x65, 0x72, 0x49, 0x50, 0x12, 0x40, 0x0a, 0x09, 0x44, 0x69, 0x72, 0x65,
|
0x22, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72,
|
||||||
0x63, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x22, 0x2e, 0x6d, 0x61,
|
0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x2e, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74,
|
||||||
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c,
|
0x69, 0x6f, 0x6e, 0x52, 0x09, 0x44, 0x69, 0x72, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x37,
|
||||||
0x6c, 0x52, 0x75, 0x6c, 0x65, 0x2e, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x52,
|
0x0a, 0x06, 0x41, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1f,
|
||||||
0x09, 0x44, 0x69, 0x72, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x37, 0x0a, 0x06, 0x41, 0x63,
|
0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72, 0x65,
|
||||||
0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x1f, 0x2e, 0x6d, 0x61, 0x6e,
|
0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x2e, 0x61, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x52,
|
||||||
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c,
|
0x06, 0x41, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x3d, 0x0a, 0x08, 0x50, 0x72, 0x6f, 0x74, 0x6f,
|
||||||
0x52, 0x75, 0x6c, 0x65, 0x2e, 0x61, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x52, 0x06, 0x41, 0x63, 0x74,
|
0x63, 0x6f, 0x6c, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x21, 0x2e, 0x6d, 0x61, 0x6e, 0x61,
|
||||||
0x69, 0x6f, 0x6e, 0x12, 0x3d, 0x0a, 0x08, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x18,
|
0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52,
|
||||||
0x04, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x21, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
0x75, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x52, 0x08, 0x50, 0x72,
|
||||||
0x6e, 0x74, 0x2e, 0x46, 0x69, 0x72, 0x65, 0x77, 0x61, 0x6c, 0x6c, 0x52, 0x75, 0x6c, 0x65, 0x2e,
|
0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x12, 0x12, 0x0a, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x18, 0x05,
|
||||||
0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x52, 0x08, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63,
|
0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x22, 0x1c, 0x0a, 0x09, 0x64, 0x69,
|
||||||
0x6f, 0x6c, 0x12, 0x12, 0x0a, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09,
|
0x72, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x06, 0x0a, 0x02, 0x49, 0x4e, 0x10, 0x00, 0x12,
|
||||||
0x52, 0x04, 0x50, 0x6f, 0x72, 0x74, 0x22, 0x1c, 0x0a, 0x09, 0x64, 0x69, 0x72, 0x65, 0x63, 0x74,
|
0x07, 0x0a, 0x03, 0x4f, 0x55, 0x54, 0x10, 0x01, 0x22, 0x1e, 0x0a, 0x06, 0x61, 0x63, 0x74, 0x69,
|
||||||
0x69, 0x6f, 0x6e, 0x12, 0x06, 0x0a, 0x02, 0x49, 0x4e, 0x10, 0x00, 0x12, 0x07, 0x0a, 0x03, 0x4f,
|
0x6f, 0x6e, 0x12, 0x0a, 0x0a, 0x06, 0x41, 0x43, 0x43, 0x45, 0x50, 0x54, 0x10, 0x00, 0x12, 0x08,
|
||||||
0x55, 0x54, 0x10, 0x01, 0x22, 0x1e, 0x0a, 0x06, 0x61, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x0a,
|
0x0a, 0x04, 0x44, 0x52, 0x4f, 0x50, 0x10, 0x01, 0x22, 0x3c, 0x0a, 0x08, 0x70, 0x72, 0x6f, 0x74,
|
||||||
0x0a, 0x06, 0x41, 0x43, 0x43, 0x45, 0x50, 0x54, 0x10, 0x00, 0x12, 0x08, 0x0a, 0x04, 0x44, 0x52,
|
0x6f, 0x63, 0x6f, 0x6c, 0x12, 0x0b, 0x0a, 0x07, 0x55, 0x4e, 0x4b, 0x4e, 0x4f, 0x57, 0x4e, 0x10,
|
||||||
0x4f, 0x50, 0x10, 0x01, 0x22, 0x3c, 0x0a, 0x08, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c,
|
0x00, 0x12, 0x07, 0x0a, 0x03, 0x41, 0x4c, 0x4c, 0x10, 0x01, 0x12, 0x07, 0x0a, 0x03, 0x54, 0x43,
|
||||||
0x12, 0x0b, 0x0a, 0x07, 0x55, 0x4e, 0x4b, 0x4e, 0x4f, 0x57, 0x4e, 0x10, 0x00, 0x12, 0x07, 0x0a,
|
0x50, 0x10, 0x02, 0x12, 0x07, 0x0a, 0x03, 0x55, 0x44, 0x50, 0x10, 0x03, 0x12, 0x08, 0x0a, 0x04,
|
||||||
0x03, 0x41, 0x4c, 0x4c, 0x10, 0x01, 0x12, 0x07, 0x0a, 0x03, 0x54, 0x43, 0x50, 0x10, 0x02, 0x12,
|
0x49, 0x43, 0x4d, 0x50, 0x10, 0x04, 0x32, 0xd1, 0x03, 0x0a, 0x11, 0x4d, 0x61, 0x6e, 0x61, 0x67,
|
||||||
0x07, 0x0a, 0x03, 0x55, 0x44, 0x50, 0x10, 0x03, 0x12, 0x08, 0x0a, 0x04, 0x49, 0x43, 0x4d, 0x50,
|
0x65, 0x6d, 0x65, 0x6e, 0x74, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, 0x45, 0x0a, 0x05,
|
||||||
0x10, 0x04, 0x32, 0xd1, 0x03, 0x0a, 0x11, 0x4d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e,
|
0x4c, 0x6f, 0x67, 0x69, 0x6e, 0x12, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
||||||
0x74, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, 0x45, 0x0a, 0x05, 0x4c, 0x6f, 0x67, 0x69,
|
|
||||||
0x6e, 0x12, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45,
|
|
||||||
0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x1a,
|
|
||||||
0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63,
|
|
||||||
0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x22, 0x00, 0x12,
|
|
||||||
0x46, 0x0a, 0x04, 0x53, 0x79, 0x6e, 0x63, 0x12, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
|
||||||
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65,
|
|
||||||
0x73, 0x73, 0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65,
|
|
||||||
0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73,
|
0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73,
|
||||||
0x61, 0x67, 0x65, 0x22, 0x00, 0x30, 0x01, 0x12, 0x42, 0x0a, 0x0c, 0x47, 0x65, 0x74, 0x53, 0x65,
|
0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74,
|
||||||
0x72, 0x76, 0x65, 0x72, 0x4b, 0x65, 0x79, 0x12, 0x11, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65,
|
0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67,
|
||||||
0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1d, 0x2e, 0x6d, 0x61, 0x6e,
|
0x65, 0x22, 0x00, 0x12, 0x46, 0x0a, 0x04, 0x53, 0x79, 0x6e, 0x63, 0x12, 0x1c, 0x2e, 0x6d, 0x61,
|
||||||
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x4b, 0x65,
|
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74,
|
||||||
0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x00, 0x12, 0x33, 0x0a, 0x09, 0x69,
|
0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61,
|
||||||
0x73, 0x48, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x79, 0x12, 0x11, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67,
|
0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64,
|
||||||
0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x11, 0x2e, 0x6d, 0x61,
|
0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x22, 0x00, 0x30, 0x01, 0x12, 0x42, 0x0a, 0x0c, 0x47,
|
||||||
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x22, 0x00,
|
0x65, 0x74, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x4b, 0x65, 0x79, 0x12, 0x11, 0x2e, 0x6d, 0x61,
|
||||||
0x12, 0x5a, 0x0a, 0x1a, 0x47, 0x65, 0x74, 0x44, 0x65, 0x76, 0x69, 0x63, 0x65, 0x41, 0x75, 0x74,
|
0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a, 0x1d,
|
||||||
0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x12, 0x1c,
|
0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x53, 0x65, 0x72, 0x76,
|
||||||
0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72,
|
0x65, 0x72, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x00, 0x12,
|
||||||
0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d,
|
0x33, 0x0a, 0x09, 0x69, 0x73, 0x48, 0x65, 0x61, 0x6c, 0x74, 0x68, 0x79, 0x12, 0x11, 0x2e, 0x6d,
|
||||||
|
0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70, 0x74, 0x79, 0x1a,
|
||||||
|
0x11, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6d, 0x70,
|
||||||
|
0x74, 0x79, 0x22, 0x00, 0x12, 0x5a, 0x0a, 0x1a, 0x47, 0x65, 0x74, 0x44, 0x65, 0x76, 0x69, 0x63,
|
||||||
|
0x65, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c,
|
||||||
|
0x6f, 0x77, 0x12, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e,
|
||||||
|
0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65,
|
||||||
|
0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e,
|
||||||
|
0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x22, 0x00,
|
||||||
|
0x12, 0x58, 0x0a, 0x18, 0x47, 0x65, 0x74, 0x50, 0x4b, 0x43, 0x45, 0x41, 0x75, 0x74, 0x68, 0x6f,
|
||||||
|
0x72, 0x69, 0x7a, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x12, 0x1c, 0x2e, 0x6d,
|
||||||
0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70,
|
0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70,
|
||||||
0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x22, 0x00, 0x12, 0x58, 0x0a, 0x18,
|
0x74, 0x65, 0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e,
|
||||||
0x47, 0x65, 0x74, 0x50, 0x4b, 0x43, 0x45, 0x41, 0x75, 0x74, 0x68, 0x6f, 0x72, 0x69, 0x7a, 0x61,
|
0x61, 0x67, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65,
|
||||||
0x74, 0x69, 0x6f, 0x6e, 0x46, 0x6c, 0x6f, 0x77, 0x12, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67,
|
0x64, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x22, 0x00, 0x42, 0x08, 0x5a, 0x06, 0x2f, 0x70,
|
||||||
0x65, 0x6d, 0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d,
|
0x72, 0x6f, 0x74, 0x6f, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x1a, 0x1c, 0x2e, 0x6d, 0x61, 0x6e, 0x61, 0x67, 0x65, 0x6d,
|
|
||||||
0x65, 0x6e, 0x74, 0x2e, 0x45, 0x6e, 0x63, 0x72, 0x79, 0x70, 0x74, 0x65, 0x64, 0x4d, 0x65, 0x73,
|
|
||||||
0x73, 0x61, 0x67, 0x65, 0x22, 0x00, 0x42, 0x08, 0x5a, 0x06, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f,
|
|
||||||
0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -102,6 +102,8 @@ message PeerSystemMeta {
|
|||||||
string OS = 6;
|
string OS = 6;
|
||||||
string wiretrusteeVersion = 7;
|
string wiretrusteeVersion = 7;
|
||||||
string uiVersion = 8;
|
string uiVersion = 8;
|
||||||
|
string kernelVersion = 9;
|
||||||
|
string OSVersion = 10;
|
||||||
}
|
}
|
||||||
|
|
||||||
message LoginResponse {
|
message LoginResponse {
|
||||||
|
@ -27,9 +27,11 @@ import (
|
|||||||
nbdns "github.com/netbirdio/netbird/dns"
|
nbdns "github.com/netbirdio/netbird/dns"
|
||||||
"github.com/netbirdio/netbird/management/server/account"
|
"github.com/netbirdio/netbird/management/server/account"
|
||||||
"github.com/netbirdio/netbird/management/server/activity"
|
"github.com/netbirdio/netbird/management/server/activity"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
"github.com/netbirdio/netbird/management/server/idp"
|
"github.com/netbirdio/netbird/management/server/idp"
|
||||||
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
"github.com/netbirdio/netbird/management/server/status"
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
"github.com/netbirdio/netbird/route"
|
"github.com/netbirdio/netbird/route"
|
||||||
)
|
)
|
||||||
@ -74,7 +76,7 @@ type AccountManager interface {
|
|||||||
GetUser(claims jwtclaims.AuthorizationClaims) (*User, error)
|
GetUser(claims jwtclaims.AuthorizationClaims) (*User, error)
|
||||||
ListUsers(accountID string) ([]*User, error)
|
ListUsers(accountID string) ([]*User, error)
|
||||||
GetPeers(accountID, userID string) ([]*nbpeer.Peer, error)
|
GetPeers(accountID, userID string) ([]*nbpeer.Peer, error)
|
||||||
MarkPeerConnected(peerKey string, connected bool) error
|
MarkPeerConnected(peerKey string, connected bool, realIP net.IP) error
|
||||||
DeletePeer(accountID, peerID, userID string) error
|
DeletePeer(accountID, peerID, userID string) error
|
||||||
UpdatePeer(accountID, userID string, peer *nbpeer.Peer) (*nbpeer.Peer, error)
|
UpdatePeer(accountID, userID string, peer *nbpeer.Peer) (*nbpeer.Peer, error)
|
||||||
GetNetworkMap(peerID string) (*NetworkMap, error)
|
GetNetworkMap(peerID string) (*NetworkMap, error)
|
||||||
@ -119,6 +121,10 @@ type AccountManager interface {
|
|||||||
GetAllConnectedPeers() (map[string]struct{}, error)
|
GetAllConnectedPeers() (map[string]struct{}, error)
|
||||||
HasConnectedChannel(peerID string) bool
|
HasConnectedChannel(peerID string) bool
|
||||||
GetExternalCacheManager() ExternalCacheManager
|
GetExternalCacheManager() ExternalCacheManager
|
||||||
|
GetPostureChecks(accountID, postureChecksID, userID string) (*posture.Checks, error)
|
||||||
|
SavePostureChecks(accountID, userID string, postureChecks *posture.Checks) error
|
||||||
|
DeletePostureChecks(accountID, postureChecksID, userID string) error
|
||||||
|
ListPostureChecks(accountID, userID string) ([]*posture.Checks, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
type DefaultAccountManager struct {
|
type DefaultAccountManager struct {
|
||||||
@ -133,6 +139,7 @@ type DefaultAccountManager struct {
|
|||||||
externalCacheManager ExternalCacheManager
|
externalCacheManager ExternalCacheManager
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
eventStore activity.Store
|
eventStore activity.Store
|
||||||
|
geo *geolocation.Geolocation
|
||||||
|
|
||||||
// singleAccountMode indicates whether the instance has a single account.
|
// singleAccountMode indicates whether the instance has a single account.
|
||||||
// If true, then every new user will end up under the same account.
|
// If true, then every new user will end up under the same account.
|
||||||
@ -215,6 +222,7 @@ type Account struct {
|
|||||||
NameServerGroups map[string]*nbdns.NameServerGroup `gorm:"-"`
|
NameServerGroups map[string]*nbdns.NameServerGroup `gorm:"-"`
|
||||||
NameServerGroupsG []nbdns.NameServerGroup `json:"-" gorm:"foreignKey:AccountID;references:id"`
|
NameServerGroupsG []nbdns.NameServerGroup `json:"-" gorm:"foreignKey:AccountID;references:id"`
|
||||||
DNSSettings DNSSettings `gorm:"embedded;embeddedPrefix:dns_settings_"`
|
DNSSettings DNSSettings `gorm:"embedded;embeddedPrefix:dns_settings_"`
|
||||||
|
PostureChecks []*posture.Checks `gorm:"foreignKey:AccountID;references:id"`
|
||||||
// Settings is a dictionary of Account settings
|
// Settings is a dictionary of Account settings
|
||||||
Settings *Settings `gorm:"embedded;embeddedPrefix:settings_"`
|
Settings *Settings `gorm:"embedded;embeddedPrefix:settings_"`
|
||||||
// deprecated on store and api level
|
// deprecated on store and api level
|
||||||
@ -658,6 +666,11 @@ func (a *Account) Copy() *Account {
|
|||||||
settings = a.Settings.Copy()
|
settings = a.Settings.Copy()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
postureChecks := []*posture.Checks{}
|
||||||
|
for _, postureCheck := range a.PostureChecks {
|
||||||
|
postureChecks = append(postureChecks, postureCheck.Copy())
|
||||||
|
}
|
||||||
|
|
||||||
return &Account{
|
return &Account{
|
||||||
Id: a.Id,
|
Id: a.Id,
|
||||||
CreatedBy: a.CreatedBy,
|
CreatedBy: a.CreatedBy,
|
||||||
@ -673,6 +686,7 @@ func (a *Account) Copy() *Account {
|
|||||||
Routes: routes,
|
Routes: routes,
|
||||||
NameServerGroups: nsGroups,
|
NameServerGroups: nsGroups,
|
||||||
DNSSettings: dnsSettings,
|
DNSSettings: dnsSettings,
|
||||||
|
PostureChecks: postureChecks,
|
||||||
Settings: settings,
|
Settings: settings,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -799,10 +813,12 @@ func (a *Account) UserGroupsRemoveFromPeers(userID string, groups ...string) {
|
|||||||
|
|
||||||
// BuildManager creates a new DefaultAccountManager with a provided Store
|
// BuildManager creates a new DefaultAccountManager with a provided Store
|
||||||
func BuildManager(store Store, peersUpdateManager *PeersUpdateManager, idpManager idp.Manager,
|
func BuildManager(store Store, peersUpdateManager *PeersUpdateManager, idpManager idp.Manager,
|
||||||
singleAccountModeDomain string, dnsDomain string, eventStore activity.Store, userDeleteFromIDPEnabled bool,
|
singleAccountModeDomain string, dnsDomain string, eventStore activity.Store, geo *geolocation.Geolocation,
|
||||||
|
userDeleteFromIDPEnabled bool,
|
||||||
) (*DefaultAccountManager, error) {
|
) (*DefaultAccountManager, error) {
|
||||||
am := &DefaultAccountManager{
|
am := &DefaultAccountManager{
|
||||||
Store: store,
|
Store: store,
|
||||||
|
geo: geo,
|
||||||
peersUpdateManager: peersUpdateManager,
|
peersUpdateManager: peersUpdateManager,
|
||||||
idpManager: idpManager,
|
idpManager: idpManager,
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
|
@ -16,6 +16,7 @@ import (
|
|||||||
nbdns "github.com/netbirdio/netbird/dns"
|
nbdns "github.com/netbirdio/netbird/dns"
|
||||||
"github.com/netbirdio/netbird/management/server/activity"
|
"github.com/netbirdio/netbird/management/server/activity"
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
"github.com/netbirdio/netbird/route"
|
"github.com/netbirdio/netbird/route"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
@ -1520,9 +1521,10 @@ func TestAccount_Copy(t *testing.T) {
|
|||||||
},
|
},
|
||||||
Policies: []*Policy{
|
Policies: []*Policy{
|
||||||
{
|
{
|
||||||
ID: "policy1",
|
ID: "policy1",
|
||||||
Enabled: true,
|
Enabled: true,
|
||||||
Rules: make([]*PolicyRule, 0),
|
Rules: make([]*PolicyRule, 0),
|
||||||
|
SourcePostureChecks: make([]string, 0),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Routes: map[string]*route.Route{
|
Routes: map[string]*route.Route{
|
||||||
@ -1541,7 +1543,12 @@ func TestAccount_Copy(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
DNSSettings: DNSSettings{DisabledManagementGroups: []string{}},
|
DNSSettings: DNSSettings{DisabledManagementGroups: []string{}},
|
||||||
Settings: &Settings{},
|
PostureChecks: []*posture.Checks{
|
||||||
|
{
|
||||||
|
ID: "posture Checks1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Settings: &Settings{},
|
||||||
}
|
}
|
||||||
err := hasNilField(account)
|
err := hasNilField(account)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -1613,7 +1620,7 @@ func TestDefaultAccountManager_UpdatePeer_PeerLoginExpiration(t *testing.T) {
|
|||||||
LoginExpirationEnabled: true,
|
LoginExpirationEnabled: true,
|
||||||
})
|
})
|
||||||
require.NoError(t, err, "unable to add peer")
|
require.NoError(t, err, "unable to add peer")
|
||||||
err = manager.MarkPeerConnected(key.PublicKey().String(), true)
|
err = manager.MarkPeerConnected(key.PublicKey().String(), true, nil)
|
||||||
require.NoError(t, err, "unable to mark peer connected")
|
require.NoError(t, err, "unable to mark peer connected")
|
||||||
account, err = manager.UpdateAccountSettings(account.Id, userID, &Settings{
|
account, err = manager.UpdateAccountSettings(account.Id, userID, &Settings{
|
||||||
PeerLoginExpiration: time.Hour,
|
PeerLoginExpiration: time.Hour,
|
||||||
@ -1680,7 +1687,7 @@ func TestDefaultAccountManager_MarkPeerConnected_PeerLoginExpiration(t *testing.
|
|||||||
}
|
}
|
||||||
|
|
||||||
// when we mark peer as connected, the peer login expiration routine should trigger
|
// when we mark peer as connected, the peer login expiration routine should trigger
|
||||||
err = manager.MarkPeerConnected(key.PublicKey().String(), true)
|
err = manager.MarkPeerConnected(key.PublicKey().String(), true, nil)
|
||||||
require.NoError(t, err, "unable to mark peer connected")
|
require.NoError(t, err, "unable to mark peer connected")
|
||||||
|
|
||||||
failed := waitTimeout(wg, time.Second)
|
failed := waitTimeout(wg, time.Second)
|
||||||
@ -1703,7 +1710,7 @@ func TestDefaultAccountManager_UpdateAccountSettings_PeerLoginExpiration(t *test
|
|||||||
LoginExpirationEnabled: true,
|
LoginExpirationEnabled: true,
|
||||||
})
|
})
|
||||||
require.NoError(t, err, "unable to add peer")
|
require.NoError(t, err, "unable to add peer")
|
||||||
err = manager.MarkPeerConnected(key.PublicKey().String(), true)
|
err = manager.MarkPeerConnected(key.PublicKey().String(), true, nil)
|
||||||
require.NoError(t, err, "unable to mark peer connected")
|
require.NoError(t, err, "unable to mark peer connected")
|
||||||
|
|
||||||
wg := &sync.WaitGroup{}
|
wg := &sync.WaitGroup{}
|
||||||
@ -2211,7 +2218,7 @@ func createManager(t *testing.T) (*DefaultAccountManager, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "netbird.cloud", eventStore, false)
|
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "netbird.cloud", eventStore, nil, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func createStore(t *testing.T) (Store, error) {
|
func createStore(t *testing.T) (Store, error) {
|
||||||
|
@ -130,6 +130,12 @@ const (
|
|||||||
PeerApprovalRevoked
|
PeerApprovalRevoked
|
||||||
// TransferredOwnerRole indicates that the user transferred the owner role of the account
|
// TransferredOwnerRole indicates that the user transferred the owner role of the account
|
||||||
TransferredOwnerRole
|
TransferredOwnerRole
|
||||||
|
// PostureCheckCreated indicates that the user created a posture check
|
||||||
|
PostureCheckCreated
|
||||||
|
// PostureCheckUpdated indicates that the user updated a posture check
|
||||||
|
PostureCheckUpdated
|
||||||
|
// PostureCheckDeleted indicates that the user deleted a posture check
|
||||||
|
PostureCheckDeleted
|
||||||
)
|
)
|
||||||
|
|
||||||
var activityMap = map[Activity]Code{
|
var activityMap = map[Activity]Code{
|
||||||
@ -193,6 +199,9 @@ var activityMap = map[Activity]Code{
|
|||||||
PeerApproved: {"Peer approved", "peer.approve"},
|
PeerApproved: {"Peer approved", "peer.approve"},
|
||||||
PeerApprovalRevoked: {"Peer approval revoked", "peer.approval.revoke"},
|
PeerApprovalRevoked: {"Peer approval revoked", "peer.approval.revoke"},
|
||||||
TransferredOwnerRole: {"Transferred owner role", "transferred.owner.role"},
|
TransferredOwnerRole: {"Transferred owner role", "transferred.owner.role"},
|
||||||
|
PostureCheckCreated: {"Posture check created", "posture.check.created"},
|
||||||
|
PostureCheckUpdated: {"Posture check updated", "posture.check.updated"},
|
||||||
|
PostureCheckDeleted: {"Posture check deleted", "posture.check.deleted"},
|
||||||
}
|
}
|
||||||
|
|
||||||
// StringCode returns a string code of the activity
|
// StringCode returns a string code of the activity
|
||||||
|
@ -193,7 +193,7 @@ func createDNSManager(t *testing.T) (*DefaultAccountManager, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "netbird.test", eventStore, false)
|
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "netbird.test", eventStore, nil, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func createDNSStore(t *testing.T) (Store, error) {
|
func createDNSStore(t *testing.T) (Store, error) {
|
||||||
|
@ -607,6 +607,27 @@ func (s *FileStore) SavePeerStatus(accountID, peerID string, peerStatus nbpeer.P
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SavePeerLocation stores the PeerStatus in memory. It doesn't attempt to persist data to speed up things.
|
||||||
|
// Peer.Location will be saved eventually when some other changes occur.
|
||||||
|
func (s *FileStore) SavePeerLocation(accountID string, peerWithLocation *nbpeer.Peer) error {
|
||||||
|
s.mux.Lock()
|
||||||
|
defer s.mux.Unlock()
|
||||||
|
|
||||||
|
account, err := s.getAccount(accountID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
peer := account.Peers[peerWithLocation.ID]
|
||||||
|
if peer == nil {
|
||||||
|
return status.Errorf(status.NotFound, "peer %s not found", peerWithLocation.ID)
|
||||||
|
}
|
||||||
|
|
||||||
|
peer.Location = peerWithLocation.Location
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// SaveUserLastLogin stores the last login time for a user in memory. It doesn't attempt to persist data to speed up things.
|
// SaveUserLastLogin stores the last login time for a user in memory. It doesn't attempt to persist data to speed up things.
|
||||||
func (s *FileStore) SaveUserLastLogin(accountID, userID string, lastLogin time.Time) error {
|
func (s *FileStore) SaveUserLastLogin(accountID, userID string, lastLogin time.Time) error {
|
||||||
s.mux.Lock()
|
s.mux.Lock()
|
||||||
|
@ -599,6 +599,55 @@ func TestFileStore_SavePeerStatus(t *testing.T) {
|
|||||||
assert.Equal(t, newStatus, *actual)
|
assert.Equal(t, newStatus, *actual)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestFileStore_SavePeerLocation(t *testing.T) {
|
||||||
|
storeDir := t.TempDir()
|
||||||
|
|
||||||
|
err := util.CopyFileContents("testdata/store.json", filepath.Join(storeDir, "store.json"))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
store, err := NewFileStore(storeDir, nil)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
account, err := store.GetAccount("bf1c8084-ba50-4ce7-9439-34653001fc3b")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
peer := &nbpeer.Peer{
|
||||||
|
AccountID: account.Id,
|
||||||
|
ID: "testpeer",
|
||||||
|
Location: nbpeer.Location{
|
||||||
|
ConnectionIP: net.ParseIP("10.0.0.0"),
|
||||||
|
CountryCode: "YY",
|
||||||
|
CityName: "City",
|
||||||
|
GeoNameID: 1,
|
||||||
|
},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{},
|
||||||
|
}
|
||||||
|
// error is expected as peer is not in store yet
|
||||||
|
err = store.SavePeerLocation(account.Id, peer)
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
account.Peers[peer.ID] = peer
|
||||||
|
err = store.SaveAccount(account)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
peer.Location.ConnectionIP = net.ParseIP("35.1.1.1")
|
||||||
|
peer.Location.CountryCode = "DE"
|
||||||
|
peer.Location.CityName = "Berlin"
|
||||||
|
peer.Location.GeoNameID = 2950159
|
||||||
|
|
||||||
|
err = store.SavePeerLocation(account.Id, account.Peers[peer.ID])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
account, err = store.GetAccount(account.Id)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
actual := account.Peers[peer.ID].Location
|
||||||
|
assert.Equal(t, peer.Location, actual)
|
||||||
|
}
|
||||||
|
|
||||||
func newStore(t *testing.T) *FileStore {
|
func newStore(t *testing.T) *FileStore {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
store, err := NewFileStore(t.TempDir(), nil)
|
store, err := NewFileStore(t.TempDir(), nil)
|
||||||
|
255
management/server/geolocation/geolocation.go
Normal file
255
management/server/geolocation/geolocation.go
Normal file
@ -0,0 +1,255 @@
|
|||||||
|
package geolocation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/sha256"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/oschwald/maxminddb-golang"
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
const MMDBFileName = "GeoLite2-City.mmdb"
|
||||||
|
|
||||||
|
type Geolocation struct {
|
||||||
|
mmdbPath string
|
||||||
|
mux sync.RWMutex
|
||||||
|
sha256sum []byte
|
||||||
|
db *maxminddb.Reader
|
||||||
|
locationDB *SqliteStore
|
||||||
|
stopCh chan struct{}
|
||||||
|
reloadCheckInterval time.Duration
|
||||||
|
}
|
||||||
|
|
||||||
|
type Record struct {
|
||||||
|
City struct {
|
||||||
|
GeonameID uint `maxminddb:"geoname_id"`
|
||||||
|
Names struct {
|
||||||
|
En string `maxminddb:"en"`
|
||||||
|
} `maxminddb:"names"`
|
||||||
|
} `maxminddb:"city"`
|
||||||
|
Continent struct {
|
||||||
|
GeonameID uint `maxminddb:"geoname_id"`
|
||||||
|
Code string `maxminddb:"code"`
|
||||||
|
} `maxminddb:"continent"`
|
||||||
|
Country struct {
|
||||||
|
GeonameID uint `maxminddb:"geoname_id"`
|
||||||
|
ISOCode string `maxminddb:"iso_code"`
|
||||||
|
} `maxminddb:"country"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type City struct {
|
||||||
|
GeoNameID int `gorm:"column:geoname_id"`
|
||||||
|
CityName string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Country struct {
|
||||||
|
CountryISOCode string `gorm:"column:country_iso_code"`
|
||||||
|
CountryName string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewGeolocation(datadir string) (*Geolocation, error) {
|
||||||
|
mmdbPath := path.Join(datadir, MMDBFileName)
|
||||||
|
|
||||||
|
db, err := openDB(mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
sha256sum, err := getSha256sum(mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
locationDB, err := NewSqliteStore(datadir)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
geo := &Geolocation{
|
||||||
|
mmdbPath: mmdbPath,
|
||||||
|
mux: sync.RWMutex{},
|
||||||
|
sha256sum: sha256sum,
|
||||||
|
db: db,
|
||||||
|
locationDB: locationDB,
|
||||||
|
reloadCheckInterval: 60 * time.Second, // TODO: make configurable
|
||||||
|
stopCh: make(chan struct{}),
|
||||||
|
}
|
||||||
|
|
||||||
|
go geo.reloader()
|
||||||
|
|
||||||
|
return geo, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func openDB(mmdbPath string) (*maxminddb.Reader, error) {
|
||||||
|
_, err := os.Stat(mmdbPath)
|
||||||
|
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
return nil, fmt.Errorf("%v does not exist", mmdbPath)
|
||||||
|
} else if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
db, err := maxminddb.Open(mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("%v could not be opened: %w", mmdbPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return db, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getSha256sum(mmdbPath string) ([]byte, error) {
|
||||||
|
f, err := os.Open(mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer f.Close()
|
||||||
|
|
||||||
|
h := sha256.New()
|
||||||
|
if _, err := io.Copy(h, f); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return h.Sum(nil), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (gl *Geolocation) Lookup(ip net.IP) (*Record, error) {
|
||||||
|
gl.mux.RLock()
|
||||||
|
defer gl.mux.RUnlock()
|
||||||
|
|
||||||
|
var record Record
|
||||||
|
err := gl.db.Lookup(ip, &record)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &record, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetAllCountries retrieves a list of all countries.
|
||||||
|
func (gl *Geolocation) GetAllCountries() ([]Country, error) {
|
||||||
|
allCountries, err := gl.locationDB.GetAllCountries()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
countries := make([]Country, 0)
|
||||||
|
for _, country := range allCountries {
|
||||||
|
if country.CountryName != "" {
|
||||||
|
countries = append(countries, country)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return countries, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetCitiesByCountry retrieves a list of cities in a specific country based on the country's ISO code.
|
||||||
|
func (gl *Geolocation) GetCitiesByCountry(countryISOCode string) ([]City, error) {
|
||||||
|
allCities, err := gl.locationDB.GetCitiesByCountry(countryISOCode)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
cities := make([]City, 0)
|
||||||
|
for _, city := range allCities {
|
||||||
|
if city.CityName != "" {
|
||||||
|
cities = append(cities, city)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return cities, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (gl *Geolocation) Stop() error {
|
||||||
|
close(gl.stopCh)
|
||||||
|
if gl.db != nil {
|
||||||
|
if err := gl.db.Close(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if gl.locationDB != nil {
|
||||||
|
if err := gl.locationDB.close(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (gl *Geolocation) reloader() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-gl.stopCh:
|
||||||
|
return
|
||||||
|
case <-time.After(gl.reloadCheckInterval):
|
||||||
|
if err := gl.locationDB.reload(); err != nil {
|
||||||
|
log.Errorf("geonames db reload failed: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
newSha256sum1, err := getSha256sum(gl.mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to calculate sha256 sum for '%s': %s", gl.mmdbPath, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if !bytes.Equal(gl.sha256sum, newSha256sum1) {
|
||||||
|
// we check sum twice just to avoid possible case when we reload during update of the file
|
||||||
|
// considering the frequency of file update (few times a week) checking sum twice should be enough
|
||||||
|
time.Sleep(50 * time.Millisecond)
|
||||||
|
newSha256sum2, err := getSha256sum(gl.mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to calculate sha256 sum for '%s': %s", gl.mmdbPath, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if !bytes.Equal(newSha256sum1, newSha256sum2) {
|
||||||
|
log.Errorf("sha256 sum changed during reloading of '%s'", gl.mmdbPath)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
err = gl.reload(newSha256sum2)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("mmdb reload failed: %s", err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log.Debugf("No changes in '%s', no need to reload. Next check is in %.0f seconds.",
|
||||||
|
gl.mmdbPath, gl.reloadCheckInterval.Seconds())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (gl *Geolocation) reload(newSha256sum []byte) error {
|
||||||
|
gl.mux.Lock()
|
||||||
|
defer gl.mux.Unlock()
|
||||||
|
|
||||||
|
log.Infof("Reloading '%s'", gl.mmdbPath)
|
||||||
|
|
||||||
|
err := gl.db.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
db, err := openDB(gl.mmdbPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
gl.db = db
|
||||||
|
gl.sha256sum = newSha256sum
|
||||||
|
|
||||||
|
log.Infof("Successfully reloaded '%s'", gl.mmdbPath)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func fileExists(filePath string) (bool, error) {
|
||||||
|
_, err := os.Stat(filePath)
|
||||||
|
if err == nil {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
return false, fmt.Errorf("%v does not exist", filePath)
|
||||||
|
}
|
||||||
|
return false, err
|
||||||
|
}
|
55
management/server/geolocation/geolocation_test.go
Normal file
55
management/server/geolocation/geolocation_test.go
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
package geolocation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"sync"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/util"
|
||||||
|
)
|
||||||
|
|
||||||
|
// from https://github.com/maxmind/MaxMind-DB/blob/main/test-data/GeoLite2-City-Test.mmdb
|
||||||
|
var mmdbPath = "../testdata/GeoLite2-City-Test.mmdb"
|
||||||
|
|
||||||
|
func TestGeoLite_Lookup(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
filename := path.Join(tempDir, MMDBFileName)
|
||||||
|
err := util.CopyFileContents(mmdbPath, filename)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
defer func() {
|
||||||
|
err := os.Remove(filename)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("os.Remove: %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
db, err := openDB(mmdbPath)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
geo := &Geolocation{
|
||||||
|
mux: sync.RWMutex{},
|
||||||
|
db: db,
|
||||||
|
stopCh: make(chan struct{}),
|
||||||
|
}
|
||||||
|
assert.NotNil(t, geo)
|
||||||
|
defer func() {
|
||||||
|
err = geo.Stop()
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("geo.Stop: %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
record, err := geo.Lookup(net.ParseIP("89.160.20.128"))
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.NotNil(t, record)
|
||||||
|
assert.Equal(t, "SE", record.Country.ISOCode)
|
||||||
|
assert.Equal(t, uint(2661886), record.Country.GeonameID)
|
||||||
|
assert.Equal(t, "Linköping", record.City.Names.En)
|
||||||
|
assert.Equal(t, uint(2694762), record.City.GeonameID)
|
||||||
|
assert.Equal(t, "EU", record.Continent.Code)
|
||||||
|
assert.Equal(t, uint(6255148), record.Continent.GeonameID)
|
||||||
|
}
|
222
management/server/geolocation/store.go
Normal file
222
management/server/geolocation/store.go
Normal file
@ -0,0 +1,222 @@
|
|||||||
|
package geolocation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"path/filepath"
|
||||||
|
"runtime"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
"gorm.io/driver/sqlite"
|
||||||
|
"gorm.io/gorm"
|
||||||
|
"gorm.io/gorm/logger"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
GeoSqliteDBFile = "geonames.db"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SqliteStore represents a location storage backed by a Sqlite DB.
|
||||||
|
type SqliteStore struct {
|
||||||
|
db *gorm.DB
|
||||||
|
filePath string
|
||||||
|
mux sync.RWMutex
|
||||||
|
closed bool
|
||||||
|
sha256sum []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSqliteStore(dataDir string) (*SqliteStore, error) {
|
||||||
|
file := filepath.Join(dataDir, GeoSqliteDBFile)
|
||||||
|
|
||||||
|
db, err := connectDB(file)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
sha256sum, err := getSha256sum(file)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &SqliteStore{
|
||||||
|
db: db,
|
||||||
|
filePath: file,
|
||||||
|
mux: sync.RWMutex{},
|
||||||
|
sha256sum: sha256sum,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetAllCountries returns a list of all countries in the store.
|
||||||
|
func (s *SqliteStore) GetAllCountries() ([]Country, error) {
|
||||||
|
s.mux.RLock()
|
||||||
|
defer s.mux.RUnlock()
|
||||||
|
|
||||||
|
if s.closed {
|
||||||
|
return nil, status.Errorf(status.PreconditionFailed, "geo location database is not initialized")
|
||||||
|
}
|
||||||
|
|
||||||
|
var countries []Country
|
||||||
|
result := s.db.Table("geonames").
|
||||||
|
Select("country_iso_code", "country_name").
|
||||||
|
Group("country_name").
|
||||||
|
Scan(&countries)
|
||||||
|
if result.Error != nil {
|
||||||
|
return nil, result.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
return countries, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetCitiesByCountry retrieves a list of cities from the store based on the given country ISO code.
|
||||||
|
func (s *SqliteStore) GetCitiesByCountry(countryISOCode string) ([]City, error) {
|
||||||
|
s.mux.RLock()
|
||||||
|
defer s.mux.RUnlock()
|
||||||
|
|
||||||
|
if s.closed {
|
||||||
|
return nil, status.Errorf(status.PreconditionFailed, "geo location database is not initialized")
|
||||||
|
}
|
||||||
|
|
||||||
|
var cities []City
|
||||||
|
result := s.db.Table("geonames").
|
||||||
|
Select("geoname_id", "city_name").
|
||||||
|
Where("country_iso_code = ?", countryISOCode).
|
||||||
|
Group("city_name").
|
||||||
|
Scan(&cities)
|
||||||
|
if result.Error != nil {
|
||||||
|
return nil, result.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
return cities, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// reload attempts to reload the SqliteStore's database if the database file has changed.
|
||||||
|
func (s *SqliteStore) reload() error {
|
||||||
|
s.mux.Lock()
|
||||||
|
defer s.mux.Unlock()
|
||||||
|
|
||||||
|
newSha256sum1, err := getSha256sum(s.filePath)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to calculate sha256 sum for '%s': %s", s.filePath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(s.sha256sum, newSha256sum1) {
|
||||||
|
// we check sum twice just to avoid possible case when we reload during update of the file
|
||||||
|
// considering the frequency of file update (few times a week) checking sum twice should be enough
|
||||||
|
time.Sleep(50 * time.Millisecond)
|
||||||
|
newSha256sum2, err := getSha256sum(s.filePath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to calculate sha256 sum for '%s': %s", s.filePath, err)
|
||||||
|
}
|
||||||
|
if !bytes.Equal(newSha256sum1, newSha256sum2) {
|
||||||
|
return fmt.Errorf("sha256 sum changed during reloading of '%s'", s.filePath)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Reloading '%s'", s.filePath)
|
||||||
|
_ = s.close()
|
||||||
|
s.closed = true
|
||||||
|
|
||||||
|
newDb, err := connectDB(s.filePath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
s.closed = false
|
||||||
|
s.db = newDb
|
||||||
|
|
||||||
|
log.Infof("Successfully reloaded '%s'", s.filePath)
|
||||||
|
} else {
|
||||||
|
log.Debugf("No changes in '%s', no need to reload", s.filePath)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// close closes the database connection.
|
||||||
|
// It retrieves the underlying *sql.DB object from the *gorm.DB object
|
||||||
|
// and calls the Close() method on it.
|
||||||
|
func (s *SqliteStore) close() error {
|
||||||
|
sqlDB, err := s.db.DB()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return sqlDB.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
// connectDB connects to an SQLite database and prepares it by setting up an in-memory database.
|
||||||
|
func connectDB(filePath string) (*gorm.DB, error) {
|
||||||
|
start := time.Now()
|
||||||
|
defer func() {
|
||||||
|
log.Debugf("took %v to setup geoname db", time.Since(start))
|
||||||
|
}()
|
||||||
|
|
||||||
|
_, err := fileExists(filePath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
storeStr := "file::memory:?cache=shared"
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
storeStr = "file::memory:"
|
||||||
|
}
|
||||||
|
|
||||||
|
db, err := gorm.Open(sqlite.Open(storeStr), &gorm.Config{
|
||||||
|
Logger: logger.Default.LogMode(logger.Silent),
|
||||||
|
PrepareStmt: true,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := setupInMemoryDBFromFile(db, filePath); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
sql, err := db.DB()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
conns := runtime.NumCPU()
|
||||||
|
sql.SetMaxOpenConns(conns)
|
||||||
|
|
||||||
|
return db, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupInMemoryDBFromFile prepares an in-memory DB by attaching a file database and,
|
||||||
|
// copies the data from the attached database to the in-memory database.
|
||||||
|
func setupInMemoryDBFromFile(db *gorm.DB, source string) error {
|
||||||
|
// Attach the on-disk database to the in-memory database
|
||||||
|
attachStmt := fmt.Sprintf("ATTACH DATABASE '%s' AS source;", source)
|
||||||
|
if err := db.Exec(attachStmt).Error; err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err := db.Exec(`
|
||||||
|
CREATE TABLE geonames AS SELECT * FROM source.geonames;
|
||||||
|
`).Error
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Detach the on-disk database from the in-memory database
|
||||||
|
err = db.Exec("DETACH DATABASE source;").Error
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// index geoname_id and country_iso_code field
|
||||||
|
err = db.Exec("CREATE INDEX idx_geonames_country_iso_code ON geonames(country_iso_code);").Error
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = db.Exec("CREATE INDEX idx_geonames_geoname_id ON geonames(geoname_id);").Error
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
@ -3,6 +3,7 @@ package server
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -109,11 +110,11 @@ func (s *GRPCServer) GetServerKey(ctx context.Context, req *proto.Empty) (*proto
|
|||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func getRealIP(ctx context.Context) string {
|
func getRealIP(ctx context.Context) net.IP {
|
||||||
if ip, ok := realip.FromContext(ctx); ok {
|
if addr, ok := realip.FromContext(ctx); ok {
|
||||||
return ip.String()
|
return net.IP(addr.AsSlice())
|
||||||
}
|
}
|
||||||
return ""
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Sync validates the existence of a connecting peer, sends an initial state (all available for the connecting peers) and
|
// Sync validates the existence of a connecting peer, sends an initial state (all available for the connecting peers) and
|
||||||
@ -124,7 +125,7 @@ func (s *GRPCServer) Sync(req *proto.EncryptedMessage, srv proto.ManagementServi
|
|||||||
s.appMetrics.GRPCMetrics().CountSyncRequest()
|
s.appMetrics.GRPCMetrics().CountSyncRequest()
|
||||||
}
|
}
|
||||||
realIP := getRealIP(srv.Context())
|
realIP := getRealIP(srv.Context())
|
||||||
log.Debugf("Sync request from peer [%s] [%s]", req.WgPubKey, realIP)
|
log.Debugf("Sync request from peer [%s] [%s]", req.WgPubKey, realIP.String())
|
||||||
|
|
||||||
syncReq := &proto.SyncRequest{}
|
syncReq := &proto.SyncRequest{}
|
||||||
peerKey, err := s.parseRequest(req, syncReq)
|
peerKey, err := s.parseRequest(req, syncReq)
|
||||||
@ -147,7 +148,7 @@ func (s *GRPCServer) Sync(req *proto.EncryptedMessage, srv proto.ManagementServi
|
|||||||
|
|
||||||
s.ephemeralManager.OnPeerConnected(peer)
|
s.ephemeralManager.OnPeerConnected(peer)
|
||||||
|
|
||||||
err = s.accountManager.MarkPeerConnected(peerKey.String(), true)
|
err = s.accountManager.MarkPeerConnected(peerKey.String(), true, realIP)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Warnf("failed marking peer as connected %s %v", peerKey, err)
|
log.Warnf("failed marking peer as connected %s %v", peerKey, err)
|
||||||
}
|
}
|
||||||
@ -205,7 +206,7 @@ func (s *GRPCServer) Sync(req *proto.EncryptedMessage, srv proto.ManagementServi
|
|||||||
func (s *GRPCServer) cancelPeerRoutines(peer *nbpeer.Peer) {
|
func (s *GRPCServer) cancelPeerRoutines(peer *nbpeer.Peer) {
|
||||||
s.peersUpdateManager.CloseChannel(peer.ID)
|
s.peersUpdateManager.CloseChannel(peer.ID)
|
||||||
s.turnCredentialsManager.CancelRefresh(peer.ID)
|
s.turnCredentialsManager.CancelRefresh(peer.ID)
|
||||||
_ = s.accountManager.MarkPeerConnected(peer.Key, false)
|
_ = s.accountManager.MarkPeerConnected(peer.Key, false, nil)
|
||||||
s.ephemeralManager.OnPeerDisconnected(peer)
|
s.ephemeralManager.OnPeerDisconnected(peer)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -254,15 +255,21 @@ func mapError(err error) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func extractPeerMeta(loginReq *proto.LoginRequest) nbpeer.PeerSystemMeta {
|
func extractPeerMeta(loginReq *proto.LoginRequest) nbpeer.PeerSystemMeta {
|
||||||
|
osVersion := loginReq.GetMeta().GetOSVersion()
|
||||||
|
if osVersion == "" {
|
||||||
|
osVersion = loginReq.GetMeta().GetCore()
|
||||||
|
}
|
||||||
|
|
||||||
return nbpeer.PeerSystemMeta{
|
return nbpeer.PeerSystemMeta{
|
||||||
Hostname: loginReq.GetMeta().GetHostname(),
|
Hostname: loginReq.GetMeta().GetHostname(),
|
||||||
GoOS: loginReq.GetMeta().GetGoOS(),
|
GoOS: loginReq.GetMeta().GetGoOS(),
|
||||||
Kernel: loginReq.GetMeta().GetKernel(),
|
Kernel: loginReq.GetMeta().GetKernel(),
|
||||||
Core: loginReq.GetMeta().GetCore(),
|
Platform: loginReq.GetMeta().GetPlatform(),
|
||||||
Platform: loginReq.GetMeta().GetPlatform(),
|
OS: loginReq.GetMeta().GetOS(),
|
||||||
OS: loginReq.GetMeta().GetOS(),
|
OSVersion: osVersion,
|
||||||
WtVersion: loginReq.GetMeta().GetWiretrusteeVersion(),
|
WtVersion: loginReq.GetMeta().GetWiretrusteeVersion(),
|
||||||
UIVersion: loginReq.GetMeta().GetUiVersion(),
|
UIVersion: loginReq.GetMeta().GetUiVersion(),
|
||||||
|
KernelVersion: loginReq.GetMeta().GetKernelVersion(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -296,7 +303,7 @@ func (s *GRPCServer) Login(ctx context.Context, req *proto.EncryptedMessage) (*p
|
|||||||
s.appMetrics.GRPCMetrics().CountLoginRequest()
|
s.appMetrics.GRPCMetrics().CountLoginRequest()
|
||||||
}
|
}
|
||||||
realIP := getRealIP(ctx)
|
realIP := getRealIP(ctx)
|
||||||
log.Debugf("Login request from peer [%s] [%s]", req.WgPubKey, realIP)
|
log.Debugf("Login request from peer [%s] [%s]", req.WgPubKey, realIP.String())
|
||||||
|
|
||||||
loginReq := &proto.LoginRequest{}
|
loginReq := &proto.LoginRequest{}
|
||||||
peerKey, err := s.parseRequest(req, loginReq)
|
peerKey, err := s.parseRequest(req, loginReq)
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
openapi: 3.0.1
|
openapi: 3.1.0
|
||||||
servers:
|
servers:
|
||||||
- url: https://api.netbird.io
|
- url: https://api.netbird.io
|
||||||
description: Default server
|
description: Default server
|
||||||
@ -21,6 +21,8 @@ tags:
|
|||||||
description: Interact with and view information about rules.
|
description: Interact with and view information about rules.
|
||||||
- name: Policies
|
- name: Policies
|
||||||
description: Interact with and view information about policies.
|
description: Interact with and view information about policies.
|
||||||
|
- name: Posture Checks
|
||||||
|
description: Interact with and view information about posture checks.
|
||||||
- name: Routes
|
- name: Routes
|
||||||
description: Interact with and view information about routes.
|
description: Interact with and view information about routes.
|
||||||
- name: DNS
|
- name: DNS
|
||||||
@ -245,6 +247,10 @@ components:
|
|||||||
description: Peer's IP address
|
description: Peer's IP address
|
||||||
type: string
|
type: string
|
||||||
example: 10.64.0.1
|
example: 10.64.0.1
|
||||||
|
connection_ip:
|
||||||
|
description: Peer's public connection IP address
|
||||||
|
type: string
|
||||||
|
example: 35.64.0.1
|
||||||
connected:
|
connected:
|
||||||
description: Peer to Management connection status
|
description: Peer to Management connection status
|
||||||
type: boolean
|
type: boolean
|
||||||
@ -258,6 +264,14 @@ components:
|
|||||||
description: Peer's operating system and version
|
description: Peer's operating system and version
|
||||||
type: string
|
type: string
|
||||||
example: Darwin 13.2.1
|
example: Darwin 13.2.1
|
||||||
|
kernel_version:
|
||||||
|
description: Peer's operating system kernel version
|
||||||
|
type: string
|
||||||
|
example: 23.2.0
|
||||||
|
geoname_id:
|
||||||
|
description: Unique identifier from the GeoNames database for a specific geographical location.
|
||||||
|
type: integer
|
||||||
|
example: 2643743
|
||||||
version:
|
version:
|
||||||
description: Peer's daemon or cli version
|
description: Peer's daemon or cli version
|
||||||
type: string
|
type: string
|
||||||
@ -304,6 +318,10 @@ components:
|
|||||||
description: (Cloud only) Indicates whether peer needs approval
|
description: (Cloud only) Indicates whether peer needs approval
|
||||||
type: boolean
|
type: boolean
|
||||||
example: true
|
example: true
|
||||||
|
country_code:
|
||||||
|
$ref: '#/components/schemas/CountryCode'
|
||||||
|
city_name:
|
||||||
|
$ref: '#/components/schemas/CityName'
|
||||||
required:
|
required:
|
||||||
- ip
|
- ip
|
||||||
- connected
|
- connected
|
||||||
@ -774,6 +792,12 @@ components:
|
|||||||
- $ref: '#/components/schemas/PolicyMinimum'
|
- $ref: '#/components/schemas/PolicyMinimum'
|
||||||
- type: object
|
- type: object
|
||||||
properties:
|
properties:
|
||||||
|
source_posture_checks:
|
||||||
|
description: Posture checks ID's applied to policy source groups
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
example: "chacdk86lnnboviihd70"
|
||||||
rules:
|
rules:
|
||||||
description: Policy rule object for policy UI editor
|
description: Policy rule object for policy UI editor
|
||||||
type: array
|
type: array
|
||||||
@ -786,6 +810,12 @@ components:
|
|||||||
- $ref: '#/components/schemas/PolicyMinimum'
|
- $ref: '#/components/schemas/PolicyMinimum'
|
||||||
- type: object
|
- type: object
|
||||||
properties:
|
properties:
|
||||||
|
source_posture_checks:
|
||||||
|
description: Posture checks ID's applied to policy source groups
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
example: "chacdk86lnnboviihd70"
|
||||||
rules:
|
rules:
|
||||||
description: Policy rule object for policy UI editor
|
description: Policy rule object for policy UI editor
|
||||||
type: array
|
type: array
|
||||||
@ -793,6 +823,170 @@ components:
|
|||||||
$ref: '#/components/schemas/PolicyRule'
|
$ref: '#/components/schemas/PolicyRule'
|
||||||
required:
|
required:
|
||||||
- rules
|
- rules
|
||||||
|
- source_posture_checks
|
||||||
|
PostureCheck:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
id:
|
||||||
|
description: Posture check ID
|
||||||
|
type: string
|
||||||
|
example: ch8i4ug6lnn4g9hqv7mg
|
||||||
|
name:
|
||||||
|
description: Posture check unique name identifier
|
||||||
|
type: string
|
||||||
|
example: Default
|
||||||
|
description:
|
||||||
|
description: Posture check friendly description
|
||||||
|
type: string
|
||||||
|
example: This checks if the peer is running required NetBird's version
|
||||||
|
checks:
|
||||||
|
$ref: '#/components/schemas/Checks'
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
- checks
|
||||||
|
Checks:
|
||||||
|
description: List of objects that perform the actual checks
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
nb_version_check:
|
||||||
|
$ref: '#/components/schemas/NBVersionCheck'
|
||||||
|
os_version_check:
|
||||||
|
$ref: '#/components/schemas/OSVersionCheck'
|
||||||
|
geo_location_check:
|
||||||
|
$ref: '#/components/schemas/GeoLocationCheck'
|
||||||
|
NBVersionCheck:
|
||||||
|
description: Posture check for the version of NetBird
|
||||||
|
type: object
|
||||||
|
$ref: '#/components/schemas/MinVersionCheck'
|
||||||
|
OSVersionCheck:
|
||||||
|
description: Posture check for the version of operating system
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
android:
|
||||||
|
description: Minimum version of Android
|
||||||
|
$ref: '#/components/schemas/MinVersionCheck'
|
||||||
|
darwin:
|
||||||
|
$ref: '#/components/schemas/MinVersionCheck'
|
||||||
|
ios:
|
||||||
|
description: Minimum version of iOS
|
||||||
|
$ref: '#/components/schemas/MinVersionCheck'
|
||||||
|
linux:
|
||||||
|
description: Minimum Linux kernel version
|
||||||
|
$ref: '#/components/schemas/MinKernelVersionCheck'
|
||||||
|
windows:
|
||||||
|
description: Minimum Windows kernel build version
|
||||||
|
$ref: '#/components/schemas/MinKernelVersionCheck'
|
||||||
|
example:
|
||||||
|
android:
|
||||||
|
min_version: "13"
|
||||||
|
ios:
|
||||||
|
min_version: "17.3.1"
|
||||||
|
darwin:
|
||||||
|
min_version: "14.2.1"
|
||||||
|
linux:
|
||||||
|
min_kernel_version: "5.3.3"
|
||||||
|
windows:
|
||||||
|
min_kernel_version: "10.0.1234"
|
||||||
|
MinVersionCheck:
|
||||||
|
description: Posture check for the version of operating system
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
min_version:
|
||||||
|
description: Minimum acceptable version
|
||||||
|
type: string
|
||||||
|
example: "14.3"
|
||||||
|
required:
|
||||||
|
- min_version
|
||||||
|
MinKernelVersionCheck:
|
||||||
|
description: Posture check with the kernel version
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
min_kernel_version:
|
||||||
|
description: Minimum acceptable version
|
||||||
|
type: string
|
||||||
|
example: "6.6.12"
|
||||||
|
required:
|
||||||
|
- min_kernel_version
|
||||||
|
GeoLocationCheck:
|
||||||
|
description: Posture check for geo location
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
locations:
|
||||||
|
description: List of geo locations to which the policy applies
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
$ref: '#/components/schemas/Location'
|
||||||
|
action:
|
||||||
|
description: Action to take upon policy match
|
||||||
|
type: string
|
||||||
|
enum: [ "allow", "deny" ]
|
||||||
|
example: "allow"
|
||||||
|
required:
|
||||||
|
- locations
|
||||||
|
- action
|
||||||
|
Location:
|
||||||
|
description: Describe geographical location information
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
country_code:
|
||||||
|
$ref: '#/components/schemas/CountryCode'
|
||||||
|
city_name:
|
||||||
|
$ref: '#/components/schemas/CityName'
|
||||||
|
required:
|
||||||
|
- country_code
|
||||||
|
CountryCode:
|
||||||
|
description: 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
type: string
|
||||||
|
example: "DE"
|
||||||
|
CityName:
|
||||||
|
description: Commonly used English name of the city
|
||||||
|
type: string
|
||||||
|
example: "Berlin"
|
||||||
|
Country:
|
||||||
|
description: Describe country geographical location information
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
country_name:
|
||||||
|
description: Commonly used English name of the country
|
||||||
|
type: string
|
||||||
|
example: "Germany"
|
||||||
|
country_code:
|
||||||
|
$ref: '#/components/schemas/CountryCode'
|
||||||
|
required:
|
||||||
|
- country_name
|
||||||
|
- country_code
|
||||||
|
City:
|
||||||
|
description: Describe city geographical location information
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
geoname_id:
|
||||||
|
description: Integer ID of the record in GeoNames database
|
||||||
|
type: integer
|
||||||
|
example: 2950158
|
||||||
|
city_name:
|
||||||
|
description: Commonly used English name of the city
|
||||||
|
type: string
|
||||||
|
example: "Berlin"
|
||||||
|
required:
|
||||||
|
- geoname_id
|
||||||
|
- city_name
|
||||||
|
PostureCheckUpdate:
|
||||||
|
type: object
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Posture check name identifier
|
||||||
|
type: string
|
||||||
|
example: Default
|
||||||
|
description:
|
||||||
|
description: Posture check friendly description
|
||||||
|
type: string
|
||||||
|
example: This checks if the peer is running required NetBird's version
|
||||||
|
checks:
|
||||||
|
$ref: '#/components/schemas/Checks'
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
- description
|
||||||
RouteRequest:
|
RouteRequest:
|
||||||
type: object
|
type: object
|
||||||
properties:
|
properties:
|
||||||
@ -2144,7 +2338,6 @@ paths:
|
|||||||
"$ref": "#/components/responses/forbidden"
|
"$ref": "#/components/responses/forbidden"
|
||||||
'500':
|
'500':
|
||||||
"$ref": "#/components/responses/internal_error"
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
|
||||||
/api/routes/{routeId}:
|
/api/routes/{routeId}:
|
||||||
get:
|
get:
|
||||||
summary: Retrieve a Route
|
summary: Retrieve a Route
|
||||||
@ -2289,7 +2482,6 @@ paths:
|
|||||||
"$ref": "#/components/responses/forbidden"
|
"$ref": "#/components/responses/forbidden"
|
||||||
'500':
|
'500':
|
||||||
"$ref": "#/components/responses/internal_error"
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
|
||||||
/api/dns/nameservers/{nsgroupId}:
|
/api/dns/nameservers/{nsgroupId}:
|
||||||
get:
|
get:
|
||||||
summary: Retrieve a Nameserver Group
|
summary: Retrieve a Nameserver Group
|
||||||
@ -2381,7 +2573,6 @@ paths:
|
|||||||
"$ref": "#/components/responses/forbidden"
|
"$ref": "#/components/responses/forbidden"
|
||||||
'500':
|
'500':
|
||||||
"$ref": "#/components/responses/internal_error"
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
|
||||||
/api/dns/settings:
|
/api/dns/settings:
|
||||||
get:
|
get:
|
||||||
summary: Retrieve DNS settings
|
summary: Retrieve DNS settings
|
||||||
@ -2459,3 +2650,194 @@ paths:
|
|||||||
"$ref": "#/components/responses/forbidden"
|
"$ref": "#/components/responses/forbidden"
|
||||||
'500':
|
'500':
|
||||||
"$ref": "#/components/responses/internal_error"
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
/api/posture-checks:
|
||||||
|
get:
|
||||||
|
summary: List all Posture Checks
|
||||||
|
description: Returns a list of all posture checks
|
||||||
|
tags: [ "Posture Checks" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: A JSON Array of posture checks
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
$ref: '#/components/schemas/PostureCheck'
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
post:
|
||||||
|
summary: Create a Posture Check
|
||||||
|
description: Creates a posture check
|
||||||
|
tags: [ "Posture Checks" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
requestBody:
|
||||||
|
description: New posture check request
|
||||||
|
content:
|
||||||
|
'application/json':
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PostureCheckUpdate'
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: A posture check Object
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PostureCheck'
|
||||||
|
/api/posture-checks/{postureCheckId}:
|
||||||
|
get:
|
||||||
|
summary: Retrieve a Posture Check
|
||||||
|
description: Get information about a posture check
|
||||||
|
tags: [ "Posture Checks" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: postureCheckId
|
||||||
|
required: true
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
description: The unique identifier of a posture check
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: A posture check object
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PostureCheck'
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
put:
|
||||||
|
summary: Update a Posture Check
|
||||||
|
description: Update/Replace a posture check
|
||||||
|
tags: [ "Posture Checks" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: postureCheckId
|
||||||
|
required: true
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
description: The unique identifier of a posture check
|
||||||
|
requestBody:
|
||||||
|
description: Update Rule request
|
||||||
|
content:
|
||||||
|
'application/json':
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PostureCheckUpdate'
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: A posture check object
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/PostureCheck'
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
delete:
|
||||||
|
summary: Delete a Posture Check
|
||||||
|
description: Delete a posture check
|
||||||
|
tags: [ "Posture Checks" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: postureCheckId
|
||||||
|
required: true
|
||||||
|
schema:
|
||||||
|
type: string
|
||||||
|
description: The unique identifier of a posture check
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: Delete status code
|
||||||
|
content: { }
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
/api/locations/countries:
|
||||||
|
get:
|
||||||
|
summary: List all country codes
|
||||||
|
description: Get list of all country in 2-letter ISO 3166-1 alpha-2 codes
|
||||||
|
tags: [ "Geo Locations" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: List of country codes
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
example: "DE"
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
||||||
|
/api/locations/countries/{country}/cities:
|
||||||
|
get:
|
||||||
|
summary: List all city names by country
|
||||||
|
description: Get a list of all English city names for a given country code
|
||||||
|
tags: [ "Geo Locations" ]
|
||||||
|
security:
|
||||||
|
- BearerAuth: [ ]
|
||||||
|
- TokenAuth: [ ]
|
||||||
|
parameters:
|
||||||
|
- in: path
|
||||||
|
name: country
|
||||||
|
required: true
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/Country'
|
||||||
|
responses:
|
||||||
|
'200':
|
||||||
|
description: List of city names
|
||||||
|
content:
|
||||||
|
application/json:
|
||||||
|
schema:
|
||||||
|
$ref: '#/components/schemas/City'
|
||||||
|
'400':
|
||||||
|
"$ref": "#/components/responses/bad_request"
|
||||||
|
'401':
|
||||||
|
"$ref": "#/components/responses/requires_authentication"
|
||||||
|
'403':
|
||||||
|
"$ref": "#/components/responses/forbidden"
|
||||||
|
'500':
|
||||||
|
"$ref": "#/components/responses/internal_error"
|
@ -63,6 +63,12 @@ const (
|
|||||||
EventActivityCodeUserUnblock EventActivityCode = "user.unblock"
|
EventActivityCodeUserUnblock EventActivityCode = "user.unblock"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Defines values for GeoLocationCheckAction.
|
||||||
|
const (
|
||||||
|
GeoLocationCheckActionAllow GeoLocationCheckAction = "allow"
|
||||||
|
GeoLocationCheckActionDeny GeoLocationCheckAction = "deny"
|
||||||
|
)
|
||||||
|
|
||||||
// Defines values for NameserverNsType.
|
// Defines values for NameserverNsType.
|
||||||
const (
|
const (
|
||||||
NameserverNsTypeUdp NameserverNsType = "udp"
|
NameserverNsTypeUdp NameserverNsType = "udp"
|
||||||
@ -176,6 +182,40 @@ type AccountSettings struct {
|
|||||||
PeerLoginExpirationEnabled bool `json:"peer_login_expiration_enabled"`
|
PeerLoginExpirationEnabled bool `json:"peer_login_expiration_enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Checks List of objects that perform the actual checks
|
||||||
|
type Checks struct {
|
||||||
|
// GeoLocationCheck Posture check for geo location
|
||||||
|
GeoLocationCheck *GeoLocationCheck `json:"geo_location_check,omitempty"`
|
||||||
|
NbVersionCheck *NBVersionCheck `json:"nb_version_check,omitempty"`
|
||||||
|
|
||||||
|
// OsVersionCheck Posture check for the version of operating system
|
||||||
|
OsVersionCheck *OSVersionCheck `json:"os_version_check,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// City Describe city geographical location information
|
||||||
|
type City struct {
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName string `json:"city_name"`
|
||||||
|
|
||||||
|
// GeonameId Integer ID of the record in GeoNames database
|
||||||
|
GeonameId int `json:"geoname_id"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
type CityName = string
|
||||||
|
|
||||||
|
// Country Describe country geographical location information
|
||||||
|
type Country struct {
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode CountryCode `json:"country_code"`
|
||||||
|
|
||||||
|
// CountryName Commonly used English name of the country
|
||||||
|
CountryName string `json:"country_name"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
type CountryCode = string
|
||||||
|
|
||||||
// DNSSettings defines model for DNSSettings.
|
// DNSSettings defines model for DNSSettings.
|
||||||
type DNSSettings struct {
|
type DNSSettings struct {
|
||||||
// DisabledManagementGroups Groups whose DNS management is disabled
|
// DisabledManagementGroups Groups whose DNS management is disabled
|
||||||
@ -215,6 +255,18 @@ type Event struct {
|
|||||||
// EventActivityCode The string code of the activity that occurred during the event
|
// EventActivityCode The string code of the activity that occurred during the event
|
||||||
type EventActivityCode string
|
type EventActivityCode string
|
||||||
|
|
||||||
|
// GeoLocationCheck Posture check for geo location
|
||||||
|
type GeoLocationCheck struct {
|
||||||
|
// Action Action to take upon policy match
|
||||||
|
Action GeoLocationCheckAction `json:"action"`
|
||||||
|
|
||||||
|
// Locations List of geo locations to which the policy applies
|
||||||
|
Locations []Location `json:"locations"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// GeoLocationCheckAction Action to take upon policy match
|
||||||
|
type GeoLocationCheckAction string
|
||||||
|
|
||||||
// Group defines model for Group.
|
// Group defines model for Group.
|
||||||
type Group struct {
|
type Group struct {
|
||||||
// Id Group ID
|
// Id Group ID
|
||||||
@ -257,6 +309,30 @@ type GroupRequest struct {
|
|||||||
Peers *[]string `json:"peers,omitempty"`
|
Peers *[]string `json:"peers,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Location Describe geographical location information
|
||||||
|
type Location struct {
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName *CityName `json:"city_name,omitempty"`
|
||||||
|
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode CountryCode `json:"country_code"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// MinKernelVersionCheck Posture check with the kernel version
|
||||||
|
type MinKernelVersionCheck struct {
|
||||||
|
// MinKernelVersion Minimum acceptable version
|
||||||
|
MinKernelVersion string `json:"min_kernel_version"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// MinVersionCheck defines model for MinVersionCheck.
|
||||||
|
type MinVersionCheck struct {
|
||||||
|
// MinVersion Minimum acceptable version
|
||||||
|
MinVersion string `json:"min_version"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NBVersionCheck defines model for NBVersionCheck.
|
||||||
|
type NBVersionCheck = MinVersionCheck
|
||||||
|
|
||||||
// Nameserver defines model for Nameserver.
|
// Nameserver defines model for Nameserver.
|
||||||
type Nameserver struct {
|
type Nameserver struct {
|
||||||
// Ip Nameserver IP
|
// Ip Nameserver IP
|
||||||
@ -329,6 +405,19 @@ type NameserverGroupRequest struct {
|
|||||||
SearchDomainsEnabled bool `json:"search_domains_enabled"`
|
SearchDomainsEnabled bool `json:"search_domains_enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// OSVersionCheck Posture check for the version of operating system
|
||||||
|
type OSVersionCheck struct {
|
||||||
|
Android *MinVersionCheck `json:"android,omitempty"`
|
||||||
|
Darwin *MinVersionCheck `json:"darwin,omitempty"`
|
||||||
|
Ios *MinVersionCheck `json:"ios,omitempty"`
|
||||||
|
|
||||||
|
// Linux Posture check with the kernel version
|
||||||
|
Linux *MinKernelVersionCheck `json:"linux,omitempty"`
|
||||||
|
|
||||||
|
// Windows Posture check with the kernel version
|
||||||
|
Windows *MinKernelVersionCheck `json:"windows,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
// Peer defines model for Peer.
|
// Peer defines model for Peer.
|
||||||
type Peer struct {
|
type Peer struct {
|
||||||
// AccessiblePeers List of accessible peers
|
// AccessiblePeers List of accessible peers
|
||||||
@ -337,12 +426,24 @@ type Peer struct {
|
|||||||
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
||||||
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
||||||
|
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName *CityName `json:"city_name,omitempty"`
|
||||||
|
|
||||||
// Connected Peer to Management connection status
|
// Connected Peer to Management connection status
|
||||||
Connected bool `json:"connected"`
|
Connected bool `json:"connected"`
|
||||||
|
|
||||||
|
// ConnectionIp Peer's public connection IP address
|
||||||
|
ConnectionIp *string `json:"connection_ip,omitempty"`
|
||||||
|
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode *CountryCode `json:"country_code,omitempty"`
|
||||||
|
|
||||||
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
||||||
DnsLabel string `json:"dns_label"`
|
DnsLabel string `json:"dns_label"`
|
||||||
|
|
||||||
|
// GeonameId Unique identifier from the GeoNames database for a specific geographical location.
|
||||||
|
GeonameId *int `json:"geoname_id,omitempty"`
|
||||||
|
|
||||||
// Groups Groups that the peer belongs to
|
// Groups Groups that the peer belongs to
|
||||||
Groups []GroupMinimum `json:"groups"`
|
Groups []GroupMinimum `json:"groups"`
|
||||||
|
|
||||||
@ -355,6 +456,9 @@ type Peer struct {
|
|||||||
// Ip Peer's IP address
|
// Ip Peer's IP address
|
||||||
Ip string `json:"ip"`
|
Ip string `json:"ip"`
|
||||||
|
|
||||||
|
// KernelVersion Peer's operating system kernel version
|
||||||
|
KernelVersion *string `json:"kernel_version,omitempty"`
|
||||||
|
|
||||||
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
||||||
LastLogin time.Time `json:"last_login"`
|
LastLogin time.Time `json:"last_login"`
|
||||||
|
|
||||||
@ -391,12 +495,24 @@ type PeerBase struct {
|
|||||||
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
||||||
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
||||||
|
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName *CityName `json:"city_name,omitempty"`
|
||||||
|
|
||||||
// Connected Peer to Management connection status
|
// Connected Peer to Management connection status
|
||||||
Connected bool `json:"connected"`
|
Connected bool `json:"connected"`
|
||||||
|
|
||||||
|
// ConnectionIp Peer's public connection IP address
|
||||||
|
ConnectionIp *string `json:"connection_ip,omitempty"`
|
||||||
|
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode *CountryCode `json:"country_code,omitempty"`
|
||||||
|
|
||||||
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
||||||
DnsLabel string `json:"dns_label"`
|
DnsLabel string `json:"dns_label"`
|
||||||
|
|
||||||
|
// GeonameId Unique identifier from the GeoNames database for a specific geographical location.
|
||||||
|
GeonameId *int `json:"geoname_id,omitempty"`
|
||||||
|
|
||||||
// Groups Groups that the peer belongs to
|
// Groups Groups that the peer belongs to
|
||||||
Groups []GroupMinimum `json:"groups"`
|
Groups []GroupMinimum `json:"groups"`
|
||||||
|
|
||||||
@ -409,6 +525,9 @@ type PeerBase struct {
|
|||||||
// Ip Peer's IP address
|
// Ip Peer's IP address
|
||||||
Ip string `json:"ip"`
|
Ip string `json:"ip"`
|
||||||
|
|
||||||
|
// KernelVersion Peer's operating system kernel version
|
||||||
|
KernelVersion *string `json:"kernel_version,omitempty"`
|
||||||
|
|
||||||
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
||||||
LastLogin time.Time `json:"last_login"`
|
LastLogin time.Time `json:"last_login"`
|
||||||
|
|
||||||
@ -448,12 +567,24 @@ type PeerBatch struct {
|
|||||||
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
// ApprovalRequired (Cloud only) Indicates whether peer needs approval
|
||||||
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
ApprovalRequired *bool `json:"approval_required,omitempty"`
|
||||||
|
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName *CityName `json:"city_name,omitempty"`
|
||||||
|
|
||||||
// Connected Peer to Management connection status
|
// Connected Peer to Management connection status
|
||||||
Connected bool `json:"connected"`
|
Connected bool `json:"connected"`
|
||||||
|
|
||||||
|
// ConnectionIp Peer's public connection IP address
|
||||||
|
ConnectionIp *string `json:"connection_ip,omitempty"`
|
||||||
|
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode *CountryCode `json:"country_code,omitempty"`
|
||||||
|
|
||||||
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
// DnsLabel Peer's DNS label is the parsed peer name for domain resolution. It is used to form an FQDN by appending the account's domain to the peer label. e.g. peer-dns-label.netbird.cloud
|
||||||
DnsLabel string `json:"dns_label"`
|
DnsLabel string `json:"dns_label"`
|
||||||
|
|
||||||
|
// GeonameId Unique identifier from the GeoNames database for a specific geographical location.
|
||||||
|
GeonameId *int `json:"geoname_id,omitempty"`
|
||||||
|
|
||||||
// Groups Groups that the peer belongs to
|
// Groups Groups that the peer belongs to
|
||||||
Groups []GroupMinimum `json:"groups"`
|
Groups []GroupMinimum `json:"groups"`
|
||||||
|
|
||||||
@ -466,6 +597,9 @@ type PeerBatch struct {
|
|||||||
// Ip Peer's IP address
|
// Ip Peer's IP address
|
||||||
Ip string `json:"ip"`
|
Ip string `json:"ip"`
|
||||||
|
|
||||||
|
// KernelVersion Peer's operating system kernel version
|
||||||
|
KernelVersion *string `json:"kernel_version,omitempty"`
|
||||||
|
|
||||||
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
// LastLogin Last time this peer performed log in (authentication). E.g., user authenticated.
|
||||||
LastLogin time.Time `json:"last_login"`
|
LastLogin time.Time `json:"last_login"`
|
||||||
|
|
||||||
@ -569,6 +703,9 @@ type Policy struct {
|
|||||||
|
|
||||||
// Rules Policy rule object for policy UI editor
|
// Rules Policy rule object for policy UI editor
|
||||||
Rules []PolicyRule `json:"rules"`
|
Rules []PolicyRule `json:"rules"`
|
||||||
|
|
||||||
|
// SourcePostureChecks Posture checks ID's applied to policy source groups
|
||||||
|
SourcePostureChecks []string `json:"source_posture_checks"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// PolicyMinimum defines model for PolicyMinimum.
|
// PolicyMinimum defines model for PolicyMinimum.
|
||||||
@ -713,6 +850,36 @@ type PolicyUpdate struct {
|
|||||||
|
|
||||||
// Rules Policy rule object for policy UI editor
|
// Rules Policy rule object for policy UI editor
|
||||||
Rules []PolicyRuleUpdate `json:"rules"`
|
Rules []PolicyRuleUpdate `json:"rules"`
|
||||||
|
|
||||||
|
// SourcePostureChecks Posture checks ID's applied to policy source groups
|
||||||
|
SourcePostureChecks *[]string `json:"source_posture_checks,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostureCheck defines model for PostureCheck.
|
||||||
|
type PostureCheck struct {
|
||||||
|
// Checks List of objects that perform the actual checks
|
||||||
|
Checks Checks `json:"checks"`
|
||||||
|
|
||||||
|
// Description Posture check friendly description
|
||||||
|
Description *string `json:"description,omitempty"`
|
||||||
|
|
||||||
|
// Id Posture check ID
|
||||||
|
Id string `json:"id"`
|
||||||
|
|
||||||
|
// Name Posture check unique name identifier
|
||||||
|
Name string `json:"name"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// PostureCheckUpdate defines model for PostureCheckUpdate.
|
||||||
|
type PostureCheckUpdate struct {
|
||||||
|
// Checks List of objects that perform the actual checks
|
||||||
|
Checks *Checks `json:"checks,omitempty"`
|
||||||
|
|
||||||
|
// Description Posture check friendly description
|
||||||
|
Description string `json:"description"`
|
||||||
|
|
||||||
|
// Name Posture check name identifier
|
||||||
|
Name string `json:"name"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Route defines model for Route.
|
// Route defines model for Route.
|
||||||
@ -1012,6 +1179,12 @@ type PostApiPoliciesJSONRequestBody = PolicyUpdate
|
|||||||
// PutApiPoliciesPolicyIdJSONRequestBody defines body for PutApiPoliciesPolicyId for application/json ContentType.
|
// PutApiPoliciesPolicyIdJSONRequestBody defines body for PutApiPoliciesPolicyId for application/json ContentType.
|
||||||
type PutApiPoliciesPolicyIdJSONRequestBody = PolicyUpdate
|
type PutApiPoliciesPolicyIdJSONRequestBody = PolicyUpdate
|
||||||
|
|
||||||
|
// PostApiPostureChecksJSONRequestBody defines body for PostApiPostureChecks for application/json ContentType.
|
||||||
|
type PostApiPostureChecksJSONRequestBody = PostureCheckUpdate
|
||||||
|
|
||||||
|
// PutApiPostureChecksPostureCheckIdJSONRequestBody defines body for PutApiPostureChecksPostureCheckId for application/json ContentType.
|
||||||
|
type PutApiPostureChecksPostureCheckIdJSONRequestBody = PostureCheckUpdate
|
||||||
|
|
||||||
// PostApiRoutesJSONRequestBody defines body for PostApiRoutes for application/json ContentType.
|
// PostApiRoutesJSONRequestBody defines body for PostApiRoutes for application/json ContentType.
|
||||||
type PostApiRoutesJSONRequestBody = RouteRequest
|
type PostApiRoutesJSONRequestBody = RouteRequest
|
||||||
|
|
||||||
|
236
management/server/http/geolocation_handler_test.go
Normal file
236
management/server/http/geolocation_handler_test.go
Normal file
@ -0,0 +1,236 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"path"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/gorilla/mux"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/api"
|
||||||
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
|
"github.com/netbirdio/netbird/management/server/mock_server"
|
||||||
|
"github.com/netbirdio/netbird/util"
|
||||||
|
)
|
||||||
|
|
||||||
|
func initGeolocationTestData(t *testing.T) *GeolocationsHandler {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
var (
|
||||||
|
mmdbPath = "../testdata/GeoLite2-City-Test.mmdb"
|
||||||
|
geonamesDBPath = "../testdata/geonames-test.db"
|
||||||
|
)
|
||||||
|
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
|
||||||
|
err := util.CopyFileContents(mmdbPath, path.Join(tempDir, geolocation.MMDBFileName))
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
err = util.CopyFileContents(geonamesDBPath, path.Join(tempDir, geolocation.GeoSqliteDBFile))
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
geo, err := geolocation.NewGeolocation(tempDir)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
t.Cleanup(func() { _ = geo.Stop() })
|
||||||
|
|
||||||
|
return &GeolocationsHandler{
|
||||||
|
accountManager: &mock_server.MockAccountManager{
|
||||||
|
GetAccountFromTokenFunc: func(claims jwtclaims.AuthorizationClaims) (*server.Account, *server.User, error) {
|
||||||
|
user := server.NewAdminUser("test_user")
|
||||||
|
return &server.Account{
|
||||||
|
Id: claims.AccountId,
|
||||||
|
Users: map[string]*server.User{
|
||||||
|
"test_user": user,
|
||||||
|
},
|
||||||
|
}, user, nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
geolocationManager: geo,
|
||||||
|
claimsExtractor: jwtclaims.NewClaimsExtractor(
|
||||||
|
jwtclaims.WithFromRequestContext(func(r *http.Request) jwtclaims.AuthorizationClaims {
|
||||||
|
return jwtclaims.AuthorizationClaims{
|
||||||
|
UserId: "test_user",
|
||||||
|
Domain: "hotmail.com",
|
||||||
|
AccountId: "test_id",
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetCitiesByCountry(t *testing.T) {
|
||||||
|
tt := []struct {
|
||||||
|
name string
|
||||||
|
expectedStatus int
|
||||||
|
expectedBody bool
|
||||||
|
expectedCities []api.City
|
||||||
|
requestType string
|
||||||
|
requestPath string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Get cities with valid country iso code",
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedCities: []api.City{
|
||||||
|
{
|
||||||
|
CityName: "Souni",
|
||||||
|
GeonameId: 5819,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CityName: "Protaras",
|
||||||
|
GeonameId: 18918,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
requestType: http.MethodGet,
|
||||||
|
requestPath: "/api/locations/countries/CY/cities",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Get cities with valid country iso code but zero cities",
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedCities: make([]api.City, 0),
|
||||||
|
requestType: http.MethodGet,
|
||||||
|
requestPath: "/api/locations/countries/DE/cities",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Get cities with invalid country iso code",
|
||||||
|
expectedStatus: http.StatusUnprocessableEntity,
|
||||||
|
expectedBody: false,
|
||||||
|
requestType: http.MethodGet,
|
||||||
|
requestPath: "/api/locations/countries/12ds/cities",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
geolocationHandler := initGeolocationTestData(t)
|
||||||
|
|
||||||
|
for _, tc := range tt {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
recorder := httptest.NewRecorder()
|
||||||
|
req := httptest.NewRequest(tc.requestType, tc.requestPath, nil)
|
||||||
|
|
||||||
|
router := mux.NewRouter()
|
||||||
|
router.HandleFunc("/api/locations/countries/{country}/cities", geolocationHandler.GetCitiesByCountry).Methods("GET")
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
|
||||||
|
res := recorder.Result()
|
||||||
|
defer res.Body.Close()
|
||||||
|
|
||||||
|
content, err := io.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("I don't know what I expected; %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if status := recorder.Code; status != tc.expectedStatus {
|
||||||
|
t.Errorf("handler returned wrong status code: got %v want %v, content: %s",
|
||||||
|
status, tc.expectedStatus, string(content))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !tc.expectedBody {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
cities := make([]api.City, 0)
|
||||||
|
if err = json.Unmarshal(content, &cities); err != nil {
|
||||||
|
t.Fatalf("unmarshal request cities response : %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
assert.ElementsMatch(t, tc.expectedCities, cities)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetAllCountries(t *testing.T) {
|
||||||
|
tt := []struct {
|
||||||
|
name string
|
||||||
|
expectedStatus int
|
||||||
|
expectedBody bool
|
||||||
|
expectedCountries []api.Country
|
||||||
|
requestType string
|
||||||
|
requestPath string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Get all countries",
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedCountries: []api.Country{
|
||||||
|
{
|
||||||
|
CountryCode: "IR",
|
||||||
|
CountryName: "Iran",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "CY",
|
||||||
|
CountryName: "Cyprus",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "RW",
|
||||||
|
CountryName: "Rwanda",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "SO",
|
||||||
|
CountryName: "Somalia",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "YE",
|
||||||
|
CountryName: "Yemen",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "LY",
|
||||||
|
CountryName: "Libya",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "IQ",
|
||||||
|
CountryName: "Iraq",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
requestType: http.MethodGet,
|
||||||
|
requestPath: "/api/locations/countries",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
geolocationHandler := initGeolocationTestData(t)
|
||||||
|
|
||||||
|
for _, tc := range tt {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
recorder := httptest.NewRecorder()
|
||||||
|
req := httptest.NewRequest(tc.requestType, tc.requestPath, nil)
|
||||||
|
|
||||||
|
router := mux.NewRouter()
|
||||||
|
router.HandleFunc("/api/locations/countries", geolocationHandler.GetAllCountries).Methods("GET")
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
|
||||||
|
res := recorder.Result()
|
||||||
|
defer res.Body.Close()
|
||||||
|
|
||||||
|
content, err := io.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("I don't know what I expected; %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if status := recorder.Code; status != tc.expectedStatus {
|
||||||
|
t.Errorf("handler returned wrong status code: got %v want %v, content: %s",
|
||||||
|
status, tc.expectedStatus, string(content))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !tc.expectedBody {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
countries := make([]api.Country, 0)
|
||||||
|
if err = json.Unmarshal(content, &countries); err != nil {
|
||||||
|
t.Fatalf("unmarshal request cities response : %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
assert.ElementsMatch(t, tc.expectedCountries, countries)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
119
management/server/http/geolocations_handler.go
Normal file
119
management/server/http/geolocations_handler.go
Normal file
@ -0,0 +1,119 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"github.com/gorilla/mux"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/api"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/util"
|
||||||
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GeolocationsHandler is a handler that returns locations.
|
||||||
|
type GeolocationsHandler struct {
|
||||||
|
accountManager server.AccountManager
|
||||||
|
geolocationManager *geolocation.Geolocation
|
||||||
|
claimsExtractor *jwtclaims.ClaimsExtractor
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewGeolocationsHandlerHandler creates a new Geolocations handler
|
||||||
|
func NewGeolocationsHandlerHandler(accountManager server.AccountManager, geolocationManager *geolocation.Geolocation, authCfg AuthCfg) *GeolocationsHandler {
|
||||||
|
return &GeolocationsHandler{
|
||||||
|
accountManager: accountManager,
|
||||||
|
geolocationManager: geolocationManager,
|
||||||
|
claimsExtractor: jwtclaims.NewClaimsExtractor(
|
||||||
|
jwtclaims.WithAudience(authCfg.Audience),
|
||||||
|
jwtclaims.WithUserIDClaim(authCfg.UserIDClaim),
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetAllCountries retrieves a list of all countries
|
||||||
|
func (l *GeolocationsHandler) GetAllCountries(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if err := l.authenticateUser(r); err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if l.geolocationManager == nil {
|
||||||
|
// TODO: update error message to include geo db self hosted doc link when ready
|
||||||
|
util.WriteError(status.Errorf(status.PreconditionFailed, "Geo location database is not initialized"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
allCountries, err := l.geolocationManager.GetAllCountries()
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
countries := make([]api.Country, 0, len(allCountries))
|
||||||
|
for _, country := range allCountries {
|
||||||
|
countries = append(countries, toCountryResponse(country))
|
||||||
|
}
|
||||||
|
util.WriteJSONObject(w, countries)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetCitiesByCountry retrieves a list of cities based on the given country code
|
||||||
|
func (l *GeolocationsHandler) GetCitiesByCountry(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if err := l.authenticateUser(r); err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := mux.Vars(r)
|
||||||
|
countryCode := vars["country"]
|
||||||
|
if !countryCodeRegex.MatchString(countryCode) {
|
||||||
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid country code"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if l.geolocationManager == nil {
|
||||||
|
// TODO: update error message to include geo db self hosted doc link when ready
|
||||||
|
util.WriteError(status.Errorf(status.PreconditionFailed, "Geo location database is not initialized"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
allCities, err := l.geolocationManager.GetCitiesByCountry(countryCode)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
cities := make([]api.City, 0, len(allCities))
|
||||||
|
for _, city := range allCities {
|
||||||
|
cities = append(cities, toCityResponse(city))
|
||||||
|
}
|
||||||
|
util.WriteJSONObject(w, cities)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *GeolocationsHandler) authenticateUser(r *http.Request) error {
|
||||||
|
claims := l.claimsExtractor.FromRequestContext(r)
|
||||||
|
_, user, err := l.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !user.HasAdminPower() {
|
||||||
|
return status.Errorf(status.PermissionDenied, "user is not allowed to perform this action")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func toCountryResponse(country geolocation.Country) api.Country {
|
||||||
|
return api.Country{
|
||||||
|
CountryName: country.CountryName,
|
||||||
|
CountryCode: country.CountryISOCode,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func toCityResponse(city geolocation.City) api.City {
|
||||||
|
return api.City{
|
||||||
|
CityName: city.CityName,
|
||||||
|
GeonameId: city.GeoNameID,
|
||||||
|
}
|
||||||
|
}
|
@ -9,6 +9,7 @@ import (
|
|||||||
"github.com/netbirdio/management-integrations/integrations"
|
"github.com/netbirdio/management-integrations/integrations"
|
||||||
|
|
||||||
s "github.com/netbirdio/netbird/management/server"
|
s "github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
"github.com/netbirdio/netbird/management/server/http/middleware"
|
"github.com/netbirdio/netbird/management/server/http/middleware"
|
||||||
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
"github.com/netbirdio/netbird/management/server/telemetry"
|
"github.com/netbirdio/netbird/management/server/telemetry"
|
||||||
@ -23,9 +24,10 @@ type AuthCfg struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type apiHandler struct {
|
type apiHandler struct {
|
||||||
Router *mux.Router
|
Router *mux.Router
|
||||||
AccountManager s.AccountManager
|
AccountManager s.AccountManager
|
||||||
AuthCfg AuthCfg
|
geolocationManager *geolocation.Geolocation
|
||||||
|
AuthCfg AuthCfg
|
||||||
}
|
}
|
||||||
|
|
||||||
// EmptyObject is an empty struct used to return empty JSON object
|
// EmptyObject is an empty struct used to return empty JSON object
|
||||||
@ -33,7 +35,7 @@ type emptyObject struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// APIHandler creates the Management service HTTP API handler registering all the available endpoints.
|
// APIHandler creates the Management service HTTP API handler registering all the available endpoints.
|
||||||
func APIHandler(accountManager s.AccountManager, jwtValidator jwtclaims.JWTValidator, appMetrics telemetry.AppMetrics, authCfg AuthCfg) (http.Handler, error) {
|
func APIHandler(accountManager s.AccountManager, LocationManager *geolocation.Geolocation, jwtValidator jwtclaims.JWTValidator, appMetrics telemetry.AppMetrics, authCfg AuthCfg) (http.Handler, error) {
|
||||||
claimsExtractor := jwtclaims.NewClaimsExtractor(
|
claimsExtractor := jwtclaims.NewClaimsExtractor(
|
||||||
jwtclaims.WithAudience(authCfg.Audience),
|
jwtclaims.WithAudience(authCfg.Audience),
|
||||||
jwtclaims.WithUserIDClaim(authCfg.UserIDClaim),
|
jwtclaims.WithUserIDClaim(authCfg.UserIDClaim),
|
||||||
@ -63,9 +65,10 @@ func APIHandler(accountManager s.AccountManager, jwtValidator jwtclaims.JWTValid
|
|||||||
router.Use(metricsMiddleware.Handler, corsMiddleware.Handler, authMiddleware.Handler, acMiddleware.Handler)
|
router.Use(metricsMiddleware.Handler, corsMiddleware.Handler, authMiddleware.Handler, acMiddleware.Handler)
|
||||||
|
|
||||||
api := apiHandler{
|
api := apiHandler{
|
||||||
Router: router,
|
Router: router,
|
||||||
AccountManager: accountManager,
|
AccountManager: accountManager,
|
||||||
AuthCfg: authCfg,
|
geolocationManager: LocationManager,
|
||||||
|
AuthCfg: authCfg,
|
||||||
}
|
}
|
||||||
|
|
||||||
integrations.RegisterHandlers(api.Router, accountManager, claimsExtractor)
|
integrations.RegisterHandlers(api.Router, accountManager, claimsExtractor)
|
||||||
@ -81,6 +84,8 @@ func APIHandler(accountManager s.AccountManager, jwtValidator jwtclaims.JWTValid
|
|||||||
api.addDNSNameserversEndpoint()
|
api.addDNSNameserversEndpoint()
|
||||||
api.addDNSSettingEndpoint()
|
api.addDNSSettingEndpoint()
|
||||||
api.addEventsEndpoint()
|
api.addEventsEndpoint()
|
||||||
|
api.addPostureCheckEndpoint()
|
||||||
|
api.addLocationsEndpoint()
|
||||||
|
|
||||||
err := api.Router.Walk(func(route *mux.Route, _ *mux.Router, _ []*mux.Route) error {
|
err := api.Router.Walk(func(route *mux.Route, _ *mux.Router, _ []*mux.Route) error {
|
||||||
methods, err := route.GetMethods()
|
methods, err := route.GetMethods()
|
||||||
@ -200,3 +205,18 @@ func (apiHandler *apiHandler) addEventsEndpoint() {
|
|||||||
eventsHandler := NewEventsHandler(apiHandler.AccountManager, apiHandler.AuthCfg)
|
eventsHandler := NewEventsHandler(apiHandler.AccountManager, apiHandler.AuthCfg)
|
||||||
apiHandler.Router.HandleFunc("/events", eventsHandler.GetAllEvents).Methods("GET", "OPTIONS")
|
apiHandler.Router.HandleFunc("/events", eventsHandler.GetAllEvents).Methods("GET", "OPTIONS")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (apiHandler *apiHandler) addPostureCheckEndpoint() {
|
||||||
|
postureCheckHandler := NewPostureChecksHandler(apiHandler.AccountManager, apiHandler.geolocationManager, apiHandler.AuthCfg)
|
||||||
|
apiHandler.Router.HandleFunc("/posture-checks", postureCheckHandler.GetAllPostureChecks).Methods("GET", "OPTIONS")
|
||||||
|
apiHandler.Router.HandleFunc("/posture-checks", postureCheckHandler.CreatePostureCheck).Methods("POST", "OPTIONS")
|
||||||
|
apiHandler.Router.HandleFunc("/posture-checks/{postureCheckId}", postureCheckHandler.UpdatePostureCheck).Methods("PUT", "OPTIONS")
|
||||||
|
apiHandler.Router.HandleFunc("/posture-checks/{postureCheckId}", postureCheckHandler.GetPostureCheck).Methods("GET", "OPTIONS")
|
||||||
|
apiHandler.Router.HandleFunc("/posture-checks/{postureCheckId}", postureCheckHandler.DeletePostureCheck).Methods("DELETE", "OPTIONS")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (apiHandler *apiHandler) addLocationsEndpoint() {
|
||||||
|
locationHandler := NewGeolocationsHandlerHandler(apiHandler.AccountManager, apiHandler.geolocationManager, apiHandler.AuthCfg)
|
||||||
|
apiHandler.Router.HandleFunc("/locations/countries", locationHandler.GetAllCountries).Methods("GET", "OPTIONS")
|
||||||
|
apiHandler.Router.HandleFunc("/locations/countries/{country}/cities", locationHandler.GetCitiesByCountry).Methods("GET", "OPTIONS")
|
||||||
|
}
|
||||||
|
@ -3,6 +3,7 @@ package http
|
|||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/gorilla/mux"
|
"github.com/gorilla/mux"
|
||||||
@ -230,14 +231,30 @@ func toGroupsInfo(groups map[string]*server.Group, peerID string) []api.GroupMin
|
|||||||
return groupsInfo
|
return groupsInfo
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func connectionIPoString(ip net.IP) *string {
|
||||||
|
publicIP := ""
|
||||||
|
if ip != nil {
|
||||||
|
publicIP = ip.String()
|
||||||
|
}
|
||||||
|
return &publicIP
|
||||||
|
}
|
||||||
|
|
||||||
func toSinglePeerResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dnsDomain string, accessiblePeer []api.AccessiblePeer) *api.Peer {
|
func toSinglePeerResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dnsDomain string, accessiblePeer []api.AccessiblePeer) *api.Peer {
|
||||||
|
osVersion := peer.Meta.OSVersion
|
||||||
|
if osVersion == "" {
|
||||||
|
osVersion = peer.Meta.Core
|
||||||
|
}
|
||||||
|
geonameID := int(peer.Location.GeoNameID)
|
||||||
return &api.Peer{
|
return &api.Peer{
|
||||||
Id: peer.ID,
|
Id: peer.ID,
|
||||||
Name: peer.Name,
|
Name: peer.Name,
|
||||||
Ip: peer.IP.String(),
|
Ip: peer.IP.String(),
|
||||||
|
ConnectionIp: connectionIPoString(peer.Location.ConnectionIP),
|
||||||
Connected: peer.Status.Connected,
|
Connected: peer.Status.Connected,
|
||||||
LastSeen: peer.Status.LastSeen,
|
LastSeen: peer.Status.LastSeen,
|
||||||
Os: fmt.Sprintf("%s %s", peer.Meta.OS, peer.Meta.Core),
|
Os: fmt.Sprintf("%s %s", peer.Meta.OS, osVersion),
|
||||||
|
KernelVersion: &peer.Meta.KernelVersion,
|
||||||
|
GeonameId: &geonameID,
|
||||||
Version: peer.Meta.WtVersion,
|
Version: peer.Meta.WtVersion,
|
||||||
Groups: groupsInfo,
|
Groups: groupsInfo,
|
||||||
SshEnabled: peer.SSHEnabled,
|
SshEnabled: peer.SSHEnabled,
|
||||||
@ -250,17 +267,27 @@ func toSinglePeerResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dnsD
|
|||||||
LoginExpired: peer.Status.LoginExpired,
|
LoginExpired: peer.Status.LoginExpired,
|
||||||
AccessiblePeers: accessiblePeer,
|
AccessiblePeers: accessiblePeer,
|
||||||
ApprovalRequired: &peer.Status.RequiresApproval,
|
ApprovalRequired: &peer.Status.RequiresApproval,
|
||||||
|
CountryCode: &peer.Location.CountryCode,
|
||||||
|
CityName: &peer.Location.CityName,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func toPeerListItemResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dnsDomain string, accessiblePeersCount int) *api.PeerBatch {
|
func toPeerListItemResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dnsDomain string, accessiblePeersCount int) *api.PeerBatch {
|
||||||
|
osVersion := peer.Meta.OSVersion
|
||||||
|
if osVersion == "" {
|
||||||
|
osVersion = peer.Meta.Core
|
||||||
|
}
|
||||||
|
geonameID := int(peer.Location.GeoNameID)
|
||||||
return &api.PeerBatch{
|
return &api.PeerBatch{
|
||||||
Id: peer.ID,
|
Id: peer.ID,
|
||||||
Name: peer.Name,
|
Name: peer.Name,
|
||||||
Ip: peer.IP.String(),
|
Ip: peer.IP.String(),
|
||||||
|
ConnectionIp: connectionIPoString(peer.Location.ConnectionIP),
|
||||||
Connected: peer.Status.Connected,
|
Connected: peer.Status.Connected,
|
||||||
LastSeen: peer.Status.LastSeen,
|
LastSeen: peer.Status.LastSeen,
|
||||||
Os: fmt.Sprintf("%s %s", peer.Meta.OS, peer.Meta.Core),
|
Os: fmt.Sprintf("%s %s", peer.Meta.OS, osVersion),
|
||||||
|
KernelVersion: &peer.Meta.KernelVersion,
|
||||||
|
GeonameId: &geonameID,
|
||||||
Version: peer.Meta.WtVersion,
|
Version: peer.Meta.WtVersion,
|
||||||
Groups: groupsInfo,
|
Groups: groupsInfo,
|
||||||
SshEnabled: peer.SSHEnabled,
|
SshEnabled: peer.SSHEnabled,
|
||||||
@ -273,6 +300,8 @@ func toPeerListItemResponse(peer *nbpeer.Peer, groupsInfo []api.GroupMinimum, dn
|
|||||||
LoginExpired: peer.Status.LoginExpired,
|
LoginExpired: peer.Status.LoginExpired,
|
||||||
AccessiblePeersCount: accessiblePeersCount,
|
AccessiblePeersCount: accessiblePeersCount,
|
||||||
ApprovalRequired: &peer.Status.RequiresApproval,
|
ApprovalRequired: &peer.Status.RequiresApproval,
|
||||||
|
CountryCode: &peer.Location.CountryCode,
|
||||||
|
CityName: &peer.Location.CityName,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -206,6 +206,10 @@ func (h *Policies) savePolicy(
|
|||||||
policy.Rules = append(policy.Rules, &pr)
|
policy.Rules = append(policy.Rules, &pr)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if req.SourcePostureChecks != nil {
|
||||||
|
policy.SourcePostureChecks = sourcePostureChecksToStrings(account, *req.SourcePostureChecks)
|
||||||
|
}
|
||||||
|
|
||||||
if err := h.accountManager.SavePolicy(account.Id, user.Id, &policy); err != nil {
|
if err := h.accountManager.SavePolicy(account.Id, user.Id, &policy); err != nil {
|
||||||
util.WriteError(err, w)
|
util.WriteError(err, w)
|
||||||
return
|
return
|
||||||
@ -284,10 +288,11 @@ func (h *Policies) GetPolicy(w http.ResponseWriter, r *http.Request) {
|
|||||||
func toPolicyResponse(account *server.Account, policy *server.Policy) *api.Policy {
|
func toPolicyResponse(account *server.Account, policy *server.Policy) *api.Policy {
|
||||||
cache := make(map[string]api.GroupMinimum)
|
cache := make(map[string]api.GroupMinimum)
|
||||||
ap := &api.Policy{
|
ap := &api.Policy{
|
||||||
Id: &policy.ID,
|
Id: &policy.ID,
|
||||||
Name: policy.Name,
|
Name: policy.Name,
|
||||||
Description: policy.Description,
|
Description: policy.Description,
|
||||||
Enabled: policy.Enabled,
|
Enabled: policy.Enabled,
|
||||||
|
SourcePostureChecks: policy.SourcePostureChecks,
|
||||||
}
|
}
|
||||||
for _, r := range policy.Rules {
|
for _, r := range policy.Rules {
|
||||||
rID := r.ID
|
rID := r.ID
|
||||||
@ -351,3 +356,17 @@ func groupMinimumsToStrings(account *server.Account, gm []string) []string {
|
|||||||
}
|
}
|
||||||
return result
|
return result
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func sourcePostureChecksToStrings(account *server.Account, postureChecksIds []string) []string {
|
||||||
|
result := make([]string, 0, len(postureChecksIds))
|
||||||
|
for _, id := range postureChecksIds {
|
||||||
|
for _, postureCheck := range account.PostureChecks {
|
||||||
|
if id == postureCheck.ID {
|
||||||
|
result = append(result, id)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
return result
|
||||||
|
}
|
||||||
|
344
management/server/http/posture_checks_handler.go
Normal file
344
management/server/http/posture_checks_handler.go
Normal file
@ -0,0 +1,344 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"net/http"
|
||||||
|
"regexp"
|
||||||
|
"slices"
|
||||||
|
|
||||||
|
"github.com/gorilla/mux"
|
||||||
|
"github.com/rs/xid"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/api"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/util"
|
||||||
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
countryCodeRegex = regexp.MustCompile("^[a-zA-Z]{2}$")
|
||||||
|
)
|
||||||
|
|
||||||
|
// PostureChecksHandler is a handler that returns posture checks of the account.
|
||||||
|
type PostureChecksHandler struct {
|
||||||
|
accountManager server.AccountManager
|
||||||
|
geolocationManager *geolocation.Geolocation
|
||||||
|
claimsExtractor *jwtclaims.ClaimsExtractor
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPostureChecksHandler creates a new PostureChecks handler
|
||||||
|
func NewPostureChecksHandler(accountManager server.AccountManager, geolocationManager *geolocation.Geolocation, authCfg AuthCfg) *PostureChecksHandler {
|
||||||
|
return &PostureChecksHandler{
|
||||||
|
accountManager: accountManager,
|
||||||
|
geolocationManager: geolocationManager,
|
||||||
|
claimsExtractor: jwtclaims.NewClaimsExtractor(
|
||||||
|
jwtclaims.WithAudience(authCfg.Audience),
|
||||||
|
jwtclaims.WithUserIDClaim(authCfg.UserIDClaim),
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetAllPostureChecks list for the account
|
||||||
|
func (p *PostureChecksHandler) GetAllPostureChecks(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims := p.claimsExtractor.FromRequestContext(r)
|
||||||
|
account, user, err := p.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
accountPostureChecks, err := p.accountManager.ListPostureChecks(account.Id, user.Id)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecks := []*api.PostureCheck{}
|
||||||
|
for _, postureCheck := range accountPostureChecks {
|
||||||
|
postureChecks = append(postureChecks, toPostureChecksResponse(postureCheck))
|
||||||
|
}
|
||||||
|
|
||||||
|
util.WriteJSONObject(w, postureChecks)
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdatePostureCheck handles update to a posture check identified by a given ID
|
||||||
|
func (p *PostureChecksHandler) UpdatePostureCheck(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims := p.claimsExtractor.FromRequestContext(r)
|
||||||
|
account, user, err := p.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := mux.Vars(r)
|
||||||
|
postureChecksID := vars["postureCheckId"]
|
||||||
|
if len(postureChecksID) == 0 {
|
||||||
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid posture checks ID"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecksIdx := -1
|
||||||
|
for i, postureCheck := range account.PostureChecks {
|
||||||
|
if postureCheck.ID == postureChecksID {
|
||||||
|
postureChecksIdx = i
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if postureChecksIdx < 0 {
|
||||||
|
util.WriteError(status.Errorf(status.NotFound, "couldn't find posture checks id %s", postureChecksID), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
p.savePostureChecks(w, r, account, user, postureChecksID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreatePostureCheck handles posture check creation request
|
||||||
|
func (p *PostureChecksHandler) CreatePostureCheck(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims := p.claimsExtractor.FromRequestContext(r)
|
||||||
|
account, user, err := p.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
p.savePostureChecks(w, r, account, user, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetPostureCheck handles a posture check Get request identified by ID
|
||||||
|
func (p *PostureChecksHandler) GetPostureCheck(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims := p.claimsExtractor.FromRequestContext(r)
|
||||||
|
account, user, err := p.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := mux.Vars(r)
|
||||||
|
postureChecksID := vars["postureCheckId"]
|
||||||
|
if len(postureChecksID) == 0 {
|
||||||
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid posture checks ID"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecks, err := p.accountManager.GetPostureChecks(account.Id, postureChecksID, user.Id)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
util.WriteJSONObject(w, toPostureChecksResponse(postureChecks))
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeletePostureCheck handles posture check deletion request
|
||||||
|
func (p *PostureChecksHandler) DeletePostureCheck(w http.ResponseWriter, r *http.Request) {
|
||||||
|
claims := p.claimsExtractor.FromRequestContext(r)
|
||||||
|
account, user, err := p.accountManager.GetAccountFromToken(claims)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
vars := mux.Vars(r)
|
||||||
|
postureChecksID := vars["postureCheckId"]
|
||||||
|
if len(postureChecksID) == 0 {
|
||||||
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid posture checks ID"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = p.accountManager.DeletePostureChecks(account.Id, postureChecksID, user.Id); err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
util.WriteJSONObject(w, emptyObject{})
|
||||||
|
}
|
||||||
|
|
||||||
|
// savePostureChecks handles posture checks create and update
|
||||||
|
func (p *PostureChecksHandler) savePostureChecks(
|
||||||
|
w http.ResponseWriter,
|
||||||
|
r *http.Request,
|
||||||
|
account *server.Account,
|
||||||
|
user *server.User,
|
||||||
|
postureChecksID string,
|
||||||
|
) {
|
||||||
|
|
||||||
|
var req api.PostureCheckUpdate
|
||||||
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
||||||
|
util.WriteErrorResponse("couldn't parse JSON request", http.StatusBadRequest, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
err := validatePostureChecksUpdate(req)
|
||||||
|
if err != nil {
|
||||||
|
util.WriteErrorResponse(err.Error(), http.StatusBadRequest, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if postureChecksID == "" {
|
||||||
|
postureChecksID = xid.New().String()
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecks := posture.Checks{
|
||||||
|
ID: postureChecksID,
|
||||||
|
Name: req.Name,
|
||||||
|
Description: req.Description,
|
||||||
|
}
|
||||||
|
|
||||||
|
if nbVersionCheck := req.Checks.NbVersionCheck; nbVersionCheck != nil {
|
||||||
|
postureChecks.Checks.NBVersionCheck = &posture.NBVersionCheck{
|
||||||
|
MinVersion: nbVersionCheck.MinVersion,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osVersionCheck := req.Checks.OsVersionCheck; osVersionCheck != nil {
|
||||||
|
postureChecks.Checks.OSVersionCheck = &posture.OSVersionCheck{
|
||||||
|
Android: (*posture.MinVersionCheck)(osVersionCheck.Android),
|
||||||
|
Darwin: (*posture.MinVersionCheck)(osVersionCheck.Darwin),
|
||||||
|
Ios: (*posture.MinVersionCheck)(osVersionCheck.Ios),
|
||||||
|
Linux: (*posture.MinKernelVersionCheck)(osVersionCheck.Linux),
|
||||||
|
Windows: (*posture.MinKernelVersionCheck)(osVersionCheck.Windows),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if geoLocationCheck := req.Checks.GeoLocationCheck; geoLocationCheck != nil {
|
||||||
|
if p.geolocationManager == nil {
|
||||||
|
// TODO: update error message to include geo db self hosted doc link when ready
|
||||||
|
util.WriteError(status.Errorf(status.PreconditionFailed, "Geo location database is not initialized"), w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
postureChecks.Checks.GeoLocationCheck = toPostureGeoLocationCheck(geoLocationCheck)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := p.accountManager.SavePostureChecks(account.Id, user.Id, &postureChecks); err != nil {
|
||||||
|
util.WriteError(err, w)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
util.WriteJSONObject(w, toPostureChecksResponse(&postureChecks))
|
||||||
|
}
|
||||||
|
|
||||||
|
func validatePostureChecksUpdate(req api.PostureCheckUpdate) error {
|
||||||
|
if req.Name == "" {
|
||||||
|
return status.Errorf(status.InvalidArgument, "posture checks name shouldn't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.Checks == nil || (req.Checks.NbVersionCheck == nil && req.Checks.OsVersionCheck == nil &&
|
||||||
|
req.Checks.GeoLocationCheck == nil) {
|
||||||
|
return status.Errorf(status.InvalidArgument, "posture checks shouldn't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.Checks.NbVersionCheck != nil && req.Checks.NbVersionCheck.MinVersion == "" {
|
||||||
|
return status.Errorf(status.InvalidArgument, "minimum version for NetBird's version check shouldn't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if osVersionCheck := req.Checks.OsVersionCheck; osVersionCheck != nil {
|
||||||
|
emptyOS := osVersionCheck.Android == nil && osVersionCheck.Darwin == nil && osVersionCheck.Ios == nil &&
|
||||||
|
osVersionCheck.Linux == nil && osVersionCheck.Windows == nil
|
||||||
|
emptyMinVersion := osVersionCheck.Android != nil && osVersionCheck.Android.MinVersion == "" ||
|
||||||
|
osVersionCheck.Darwin != nil && osVersionCheck.Darwin.MinVersion == "" ||
|
||||||
|
osVersionCheck.Ios != nil && osVersionCheck.Ios.MinVersion == "" ||
|
||||||
|
osVersionCheck.Linux != nil && osVersionCheck.Linux.MinKernelVersion == "" ||
|
||||||
|
osVersionCheck.Windows != nil && osVersionCheck.Windows.MinKernelVersion == ""
|
||||||
|
if emptyOS || emptyMinVersion {
|
||||||
|
return status.Errorf(status.InvalidArgument,
|
||||||
|
"minimum version for at least one OS in the OS version check shouldn't be empty")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if geoLocationCheck := req.Checks.GeoLocationCheck; geoLocationCheck != nil {
|
||||||
|
if geoLocationCheck.Action == "" {
|
||||||
|
return status.Errorf(status.InvalidArgument, "action for geolocation check shouldn't be empty")
|
||||||
|
}
|
||||||
|
allowedActions := []api.GeoLocationCheckAction{api.GeoLocationCheckActionAllow, api.GeoLocationCheckActionDeny}
|
||||||
|
if !slices.Contains(allowedActions, geoLocationCheck.Action) {
|
||||||
|
return status.Errorf(status.InvalidArgument, "action for geolocation check is not valid value")
|
||||||
|
}
|
||||||
|
if len(geoLocationCheck.Locations) == 0 {
|
||||||
|
return status.Errorf(status.InvalidArgument, "locations for geolocation check shouldn't be empty")
|
||||||
|
}
|
||||||
|
for _, loc := range geoLocationCheck.Locations {
|
||||||
|
if loc.CountryCode == "" {
|
||||||
|
return status.Errorf(status.InvalidArgument, "country code for geolocation check shouldn't be empty")
|
||||||
|
}
|
||||||
|
if !countryCodeRegex.MatchString(loc.CountryCode) {
|
||||||
|
return status.Errorf(status.InvalidArgument, "country code must be 2 letters (ISO 3166-1 alpha-2 format)")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func toPostureChecksResponse(postureChecks *posture.Checks) *api.PostureCheck {
|
||||||
|
var checks api.Checks
|
||||||
|
|
||||||
|
if postureChecks.Checks.NBVersionCheck != nil {
|
||||||
|
checks.NbVersionCheck = &api.NBVersionCheck{
|
||||||
|
MinVersion: postureChecks.Checks.NBVersionCheck.MinVersion,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if postureChecks.Checks.OSVersionCheck != nil {
|
||||||
|
checks.OsVersionCheck = &api.OSVersionCheck{
|
||||||
|
Android: (*api.MinVersionCheck)(postureChecks.Checks.OSVersionCheck.Android),
|
||||||
|
Darwin: (*api.MinVersionCheck)(postureChecks.Checks.OSVersionCheck.Darwin),
|
||||||
|
Ios: (*api.MinVersionCheck)(postureChecks.Checks.OSVersionCheck.Ios),
|
||||||
|
Linux: (*api.MinKernelVersionCheck)(postureChecks.Checks.OSVersionCheck.Linux),
|
||||||
|
Windows: (*api.MinKernelVersionCheck)(postureChecks.Checks.OSVersionCheck.Windows),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if postureChecks.Checks.GeoLocationCheck != nil {
|
||||||
|
checks.GeoLocationCheck = toGeoLocationCheckResponse(postureChecks.Checks.GeoLocationCheck)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &api.PostureCheck{
|
||||||
|
Id: postureChecks.ID,
|
||||||
|
Name: postureChecks.Name,
|
||||||
|
Description: &postureChecks.Description,
|
||||||
|
Checks: checks,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func toGeoLocationCheckResponse(geoLocationCheck *posture.GeoLocationCheck) *api.GeoLocationCheck {
|
||||||
|
locations := make([]api.Location, 0, len(geoLocationCheck.Locations))
|
||||||
|
for _, loc := range geoLocationCheck.Locations {
|
||||||
|
l := loc // make G601 happy
|
||||||
|
var cityName *string
|
||||||
|
if loc.CityName != "" {
|
||||||
|
cityName = &l.CityName
|
||||||
|
}
|
||||||
|
locations = append(locations, api.Location{
|
||||||
|
CityName: cityName,
|
||||||
|
CountryCode: loc.CountryCode,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
return &api.GeoLocationCheck{
|
||||||
|
Action: api.GeoLocationCheckAction(geoLocationCheck.Action),
|
||||||
|
Locations: locations,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func toPostureGeoLocationCheck(apiGeoLocationCheck *api.GeoLocationCheck) *posture.GeoLocationCheck {
|
||||||
|
locations := make([]posture.Location, 0, len(apiGeoLocationCheck.Locations))
|
||||||
|
for _, loc := range apiGeoLocationCheck.Locations {
|
||||||
|
cityName := ""
|
||||||
|
if loc.CityName != nil {
|
||||||
|
cityName = *loc.CityName
|
||||||
|
}
|
||||||
|
locations = append(locations, posture.Location{
|
||||||
|
CountryCode: loc.CountryCode,
|
||||||
|
CityName: cityName,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
return &posture.GeoLocationCheck{
|
||||||
|
Action: string(apiGeoLocationCheck.Action),
|
||||||
|
Locations: locations,
|
||||||
|
}
|
||||||
|
}
|
796
management/server/http/posture_checks_handler_test.go
Normal file
796
management/server/http/posture_checks_handler_test.go
Normal file
@ -0,0 +1,796 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/gorilla/mux"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/geolocation"
|
||||||
|
"github.com/netbirdio/netbird/management/server/http/api"
|
||||||
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
|
"github.com/netbirdio/netbird/management/server/mock_server"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
var berlin = "Berlin"
|
||||||
|
var losAngeles = "Los Angeles"
|
||||||
|
|
||||||
|
func initPostureChecksTestData(postureChecks ...*posture.Checks) *PostureChecksHandler {
|
||||||
|
testPostureChecks := make(map[string]*posture.Checks, len(postureChecks))
|
||||||
|
for _, postureCheck := range postureChecks {
|
||||||
|
testPostureChecks[postureCheck.ID] = postureCheck
|
||||||
|
}
|
||||||
|
|
||||||
|
return &PostureChecksHandler{
|
||||||
|
accountManager: &mock_server.MockAccountManager{
|
||||||
|
GetPostureChecksFunc: func(accountID, postureChecksID, userID string) (*posture.Checks, error) {
|
||||||
|
p, ok := testPostureChecks[postureChecksID]
|
||||||
|
if !ok {
|
||||||
|
return nil, status.Errorf(status.NotFound, "posture checks not found")
|
||||||
|
}
|
||||||
|
return p, nil
|
||||||
|
},
|
||||||
|
SavePostureChecksFunc: func(accountID, userID string, postureChecks *posture.Checks) error {
|
||||||
|
postureChecks.ID = "postureCheck"
|
||||||
|
testPostureChecks[postureChecks.ID] = postureChecks
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
DeletePostureChecksFunc: func(accountID, postureChecksID, userID string) error {
|
||||||
|
_, ok := testPostureChecks[postureChecksID]
|
||||||
|
if !ok {
|
||||||
|
return status.Errorf(status.NotFound, "posture checks not found")
|
||||||
|
}
|
||||||
|
delete(testPostureChecks, postureChecksID)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
ListPostureChecksFunc: func(accountID, userID string) ([]*posture.Checks, error) {
|
||||||
|
accountPostureChecks := make([]*posture.Checks, len(testPostureChecks))
|
||||||
|
for _, p := range testPostureChecks {
|
||||||
|
accountPostureChecks = append(accountPostureChecks, p)
|
||||||
|
}
|
||||||
|
return accountPostureChecks, nil
|
||||||
|
},
|
||||||
|
GetAccountFromTokenFunc: func(claims jwtclaims.AuthorizationClaims) (*server.Account, *server.User, error) {
|
||||||
|
user := server.NewAdminUser("test_user")
|
||||||
|
return &server.Account{
|
||||||
|
Id: claims.AccountId,
|
||||||
|
Users: map[string]*server.User{
|
||||||
|
"test_user": user,
|
||||||
|
},
|
||||||
|
PostureChecks: postureChecks,
|
||||||
|
}, user, nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
geolocationManager: &geolocation.Geolocation{},
|
||||||
|
claimsExtractor: jwtclaims.NewClaimsExtractor(
|
||||||
|
jwtclaims.WithFromRequestContext(func(r *http.Request) jwtclaims.AuthorizationClaims {
|
||||||
|
return jwtclaims.AuthorizationClaims{
|
||||||
|
UserId: "test_user",
|
||||||
|
Domain: "hotmail.com",
|
||||||
|
AccountId: "test_id",
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetPostureCheck(t *testing.T) {
|
||||||
|
postureCheck := &posture.Checks{
|
||||||
|
ID: "postureCheck",
|
||||||
|
Name: "nbVersion",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
NBVersionCheck: &posture.NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
osPostureCheck := &posture.Checks{
|
||||||
|
ID: "osPostureCheck",
|
||||||
|
Name: "osVersion",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
OSVersionCheck: &posture.OSVersionCheck{
|
||||||
|
Linux: &posture.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.0.0",
|
||||||
|
},
|
||||||
|
Darwin: &posture.MinVersionCheck{
|
||||||
|
MinVersion: "14",
|
||||||
|
},
|
||||||
|
Ios: &posture.MinVersionCheck{
|
||||||
|
MinVersion: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
geoPostureCheck := &posture.Checks{
|
||||||
|
ID: "geoPostureCheck",
|
||||||
|
Name: "geoLocation",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
GeoLocationCheck: &posture.GeoLocationCheck{
|
||||||
|
Locations: []posture.Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: posture.GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
tt := []struct {
|
||||||
|
name string
|
||||||
|
id string
|
||||||
|
checkName string
|
||||||
|
expectedStatus int
|
||||||
|
expectedBody bool
|
||||||
|
requestBody io.Reader
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "GetPostureCheck NBVersion OK",
|
||||||
|
expectedBody: true,
|
||||||
|
id: postureCheck.ID,
|
||||||
|
checkName: postureCheck.Name,
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "GetPostureCheck OSVersion OK",
|
||||||
|
expectedBody: true,
|
||||||
|
id: osPostureCheck.ID,
|
||||||
|
checkName: osPostureCheck.Name,
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "GetPostureCheck GeoLocation OK",
|
||||||
|
expectedBody: true,
|
||||||
|
id: geoPostureCheck.ID,
|
||||||
|
checkName: geoPostureCheck.Name,
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "GetPostureCheck Not Found",
|
||||||
|
id: "not-exists",
|
||||||
|
expectedStatus: http.StatusNotFound,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
p := initPostureChecksTestData(postureCheck, osPostureCheck, geoPostureCheck)
|
||||||
|
|
||||||
|
for _, tc := range tt {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
recorder := httptest.NewRecorder()
|
||||||
|
req := httptest.NewRequest(http.MethodGet, "/api/posture-checks/"+tc.id, tc.requestBody)
|
||||||
|
|
||||||
|
router := mux.NewRouter()
|
||||||
|
router.HandleFunc("/api/posture-checks/{postureCheckId}", p.GetPostureCheck).Methods("GET")
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
|
||||||
|
res := recorder.Result()
|
||||||
|
defer res.Body.Close()
|
||||||
|
|
||||||
|
if status := recorder.Code; status != tc.expectedStatus {
|
||||||
|
t.Errorf("handler returned wrong status code: got %v want %v",
|
||||||
|
status, tc.expectedStatus)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !tc.expectedBody {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
content, err := io.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("I don't know what I expected; %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var got api.PostureCheck
|
||||||
|
if err = json.Unmarshal(content, &got); err != nil {
|
||||||
|
t.Fatalf("Sent content is not in correct json format; %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
assert.Equal(t, got.Id, tc.id)
|
||||||
|
assert.Equal(t, got.Name, tc.checkName)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestPostureCheckUpdate(t *testing.T) {
|
||||||
|
str := func(s string) *string { return &s }
|
||||||
|
tt := []struct {
|
||||||
|
name string
|
||||||
|
expectedStatus int
|
||||||
|
expectedBody bool
|
||||||
|
expectedPostureCheck *api.PostureCheck
|
||||||
|
requestType string
|
||||||
|
requestPath string
|
||||||
|
requestBody io.Reader
|
||||||
|
setupHandlerFunc func(handler *PostureChecksHandler)
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks NB version",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"description": "default",
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {
|
||||||
|
"min_version": "1.2.3"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str("default"),
|
||||||
|
Checks: api.Checks{
|
||||||
|
NbVersionCheck: &api.NBVersionCheck{
|
||||||
|
MinVersion: "1.2.3",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks NB version with No geolocation DB",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"description": "default",
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {
|
||||||
|
"min_version": "1.2.3"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str("default"),
|
||||||
|
Checks: api.Checks{
|
||||||
|
NbVersionCheck: &api.NBVersionCheck{
|
||||||
|
MinVersion: "1.2.3",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
setupHandlerFunc: func(handler *PostureChecksHandler) {
|
||||||
|
handler.geolocationManager = nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks OS version",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"description": "default",
|
||||||
|
"checks": {
|
||||||
|
"os_version_check": {
|
||||||
|
"android": {
|
||||||
|
"min_version": "9.0.0"
|
||||||
|
},
|
||||||
|
"ios": {
|
||||||
|
"min_version": "17.0"
|
||||||
|
},
|
||||||
|
"linux": {
|
||||||
|
"min_kernel_version": "6.0.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str("default"),
|
||||||
|
Checks: api.Checks{
|
||||||
|
OsVersionCheck: &api.OSVersionCheck{
|
||||||
|
Android: &api.MinVersionCheck{
|
||||||
|
MinVersion: "9.0.0",
|
||||||
|
},
|
||||||
|
Ios: &api.MinVersionCheck{
|
||||||
|
MinVersion: "17.0",
|
||||||
|
},
|
||||||
|
Linux: &api.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Geo Location",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"description": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {
|
||||||
|
"locations": [
|
||||||
|
{
|
||||||
|
"city_name": "Berlin",
|
||||||
|
"country_code": "DE"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"action": "allow"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str("default"),
|
||||||
|
Checks: api.Checks{
|
||||||
|
GeoLocationCheck: &api.GeoLocationCheck{
|
||||||
|
Locations: []api.Location{
|
||||||
|
{
|
||||||
|
CityName: &berlin,
|
||||||
|
CountryCode: "DE",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: api.GeoLocationCheckActionAllow,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Geo Location with No geolocation DB",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"description": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {
|
||||||
|
"locations": [
|
||||||
|
{
|
||||||
|
"city_name": "Berlin",
|
||||||
|
"country_code": "DE"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"action": "allow"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusPreconditionFailed,
|
||||||
|
expectedBody: false,
|
||||||
|
setupHandlerFunc: func(handler *PostureChecksHandler) {
|
||||||
|
handler.geolocationManager = nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Invalid Check",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"non_existing_check": {
|
||||||
|
"min_version": "1.2.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Invalid Name",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {
|
||||||
|
"min_version": "1.2.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Invalid NetBird's Min Version",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Create Posture Checks Invalid Geo Location",
|
||||||
|
requestType: http.MethodPost,
|
||||||
|
requestPath: "/api/posture-checks",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks NB Version",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/postureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {
|
||||||
|
"min_version": "1.9.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str(""),
|
||||||
|
Checks: api.Checks{
|
||||||
|
NbVersionCheck: &api.NBVersionCheck{
|
||||||
|
MinVersion: "1.9.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks OS Version",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/osPostureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"os_version_check": {
|
||||||
|
"linux": {
|
||||||
|
"min_kernel_version": "6.9.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str(""),
|
||||||
|
Checks: api.Checks{
|
||||||
|
OsVersionCheck: &api.OSVersionCheck{
|
||||||
|
Linux: &api.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.9.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks OS Version with No geolocation DB",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/osPostureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"os_version_check": {
|
||||||
|
"linux": {
|
||||||
|
"min_kernel_version": "6.9.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str(""),
|
||||||
|
Checks: api.Checks{
|
||||||
|
OsVersionCheck: &api.OSVersionCheck{
|
||||||
|
Linux: &api.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.9.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
setupHandlerFunc: func(handler *PostureChecksHandler) {
|
||||||
|
handler.geolocationManager = nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Geo Location",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/geoPostureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {
|
||||||
|
"locations": [
|
||||||
|
{
|
||||||
|
"city_name": "Los Angeles",
|
||||||
|
"country_code": "US"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"action": "allow"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusOK,
|
||||||
|
expectedBody: true,
|
||||||
|
expectedPostureCheck: &api.PostureCheck{
|
||||||
|
Id: "postureCheck",
|
||||||
|
Name: "default",
|
||||||
|
Description: str(""),
|
||||||
|
Checks: api.Checks{
|
||||||
|
GeoLocationCheck: &api.GeoLocationCheck{
|
||||||
|
Locations: []api.Location{
|
||||||
|
{
|
||||||
|
CityName: &losAngeles,
|
||||||
|
CountryCode: "US",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: api.GeoLocationCheckActionAllow,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Geo Location with No geolocation DB",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/geoPostureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {
|
||||||
|
"locations": [
|
||||||
|
{
|
||||||
|
"city_name": "Los Angeles",
|
||||||
|
"country_code": "US"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"action": "allow"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusPreconditionFailed,
|
||||||
|
expectedBody: false,
|
||||||
|
setupHandlerFunc: func(handler *PostureChecksHandler) {
|
||||||
|
handler.geolocationManager = nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Geo Location with not valid action",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/geoPostureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"geo_location_check": {
|
||||||
|
"locations": [
|
||||||
|
{
|
||||||
|
"city_name": "Los Angeles",
|
||||||
|
"country_code": "US"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"action": "not-valid"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
setupHandlerFunc: func(handler *PostureChecksHandler) {
|
||||||
|
handler.geolocationManager = nil
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Invalid Check",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/postureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"non_existing_check": {
|
||||||
|
"min_version": "1.2.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Invalid Name",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/postureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {
|
||||||
|
"min_version": "1.2.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Update Posture Checks Invalid NetBird's Min Version",
|
||||||
|
requestType: http.MethodPut,
|
||||||
|
requestPath: "/api/posture-checks/postureCheck",
|
||||||
|
requestBody: bytes.NewBuffer(
|
||||||
|
[]byte(`{
|
||||||
|
"name": "default",
|
||||||
|
"checks": {
|
||||||
|
"nb_version_check": {}
|
||||||
|
}
|
||||||
|
}`)),
|
||||||
|
expectedStatus: http.StatusBadRequest,
|
||||||
|
expectedBody: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
p := initPostureChecksTestData(&posture.Checks{
|
||||||
|
ID: "postureCheck",
|
||||||
|
Name: "postureCheck",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
NBVersionCheck: &posture.NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&posture.Checks{
|
||||||
|
ID: "osPostureCheck",
|
||||||
|
Name: "osPostureCheck",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
OSVersionCheck: &posture.OSVersionCheck{
|
||||||
|
Linux: &posture.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "5.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&posture.Checks{
|
||||||
|
ID: "geoPostureCheck",
|
||||||
|
Name: "geoLocation",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
GeoLocationCheck: &posture.GeoLocationCheck{
|
||||||
|
Locations: []posture.Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: posture.GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
for _, tc := range tt {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
recorder := httptest.NewRecorder()
|
||||||
|
req := httptest.NewRequest(tc.requestType, tc.requestPath, tc.requestBody)
|
||||||
|
|
||||||
|
defaultHandler := *p
|
||||||
|
if tc.setupHandlerFunc != nil {
|
||||||
|
tc.setupHandlerFunc(&defaultHandler)
|
||||||
|
}
|
||||||
|
|
||||||
|
router := mux.NewRouter()
|
||||||
|
router.HandleFunc("/api/posture-checks", defaultHandler.CreatePostureCheck).Methods("POST")
|
||||||
|
router.HandleFunc("/api/posture-checks/{postureCheckId}", defaultHandler.UpdatePostureCheck).Methods("PUT")
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
|
||||||
|
res := recorder.Result()
|
||||||
|
defer res.Body.Close()
|
||||||
|
|
||||||
|
content, err := io.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("I don't know what I expected; %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if status := recorder.Code; status != tc.expectedStatus {
|
||||||
|
t.Errorf("handler returned wrong status code: got %v want %v, content: %s",
|
||||||
|
status, tc.expectedStatus, string(content))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !tc.expectedBody {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
expected, err := json.Marshal(tc.expectedPostureCheck)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("marshal expected posture check: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
assert.Equal(t, strings.Trim(string(content), " \n"), string(expected), "content mismatch")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestPostureCheck_validatePostureChecksUpdate(t *testing.T) {
|
||||||
|
// empty name
|
||||||
|
err := validatePostureChecksUpdate(api.PostureCheckUpdate{})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// empty checks
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default"})
|
||||||
|
assert.Error(t, err)
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{}})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// not valid NbVersionCheck
|
||||||
|
nbVersionCheck := api.NBVersionCheck{}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{NbVersionCheck: &nbVersionCheck}})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// valid NbVersionCheck
|
||||||
|
nbVersionCheck = api.NBVersionCheck{MinVersion: "1.0"}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{NbVersionCheck: &nbVersionCheck}})
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
// not valid OsVersionCheck
|
||||||
|
osVersionCheck := api.OSVersionCheck{}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{OsVersionCheck: &osVersionCheck}})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// not valid OsVersionCheck
|
||||||
|
osVersionCheck = api.OSVersionCheck{Linux: &api.MinKernelVersionCheck{}}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{OsVersionCheck: &osVersionCheck}})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// not valid OsVersionCheck
|
||||||
|
osVersionCheck = api.OSVersionCheck{Linux: &api.MinKernelVersionCheck{}, Darwin: &api.MinVersionCheck{MinVersion: "14.2"}}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{OsVersionCheck: &osVersionCheck}})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// valid OsVersionCheck
|
||||||
|
osVersionCheck = api.OSVersionCheck{Linux: &api.MinKernelVersionCheck{MinKernelVersion: "6.0"}}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{OsVersionCheck: &osVersionCheck}})
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
// valid OsVersionCheck
|
||||||
|
osVersionCheck = api.OSVersionCheck{
|
||||||
|
Linux: &api.MinKernelVersionCheck{MinKernelVersion: "6.0"},
|
||||||
|
Darwin: &api.MinVersionCheck{MinVersion: "14.2"},
|
||||||
|
}
|
||||||
|
err = validatePostureChecksUpdate(api.PostureCheckUpdate{Name: "Default", Checks: &api.Checks{OsVersionCheck: &osVersionCheck}})
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
@ -413,7 +413,7 @@ func startManagement(t *testing.T, config *Config) (*grpc.Server, string, error)
|
|||||||
peersUpdateManager := NewPeersUpdateManager(nil)
|
peersUpdateManager := NewPeersUpdateManager(nil)
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
accountManager, err := BuildManager(store, peersUpdateManager, nil, "", "",
|
accountManager, err := BuildManager(store, peersUpdateManager, nil, "", "",
|
||||||
eventStore, false)
|
eventStore, nil, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
}
|
}
|
||||||
|
@ -504,7 +504,7 @@ func startServer(config *server.Config) (*grpc.Server, net.Listener) {
|
|||||||
peersUpdateManager := server.NewPeersUpdateManager(nil)
|
peersUpdateManager := server.NewPeersUpdateManager(nil)
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
accountManager, err := server.BuildManager(store, peersUpdateManager, nil, "", "",
|
accountManager, err := server.BuildManager(store, peersUpdateManager, nil, "", "",
|
||||||
eventStore, false)
|
eventStore, nil, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalf("failed creating a manager: %v", err)
|
log.Fatalf("failed creating a manager: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package mock_server
|
package mock_server
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"google.golang.org/grpc/codes"
|
"google.golang.org/grpc/codes"
|
||||||
@ -11,6 +12,7 @@ import (
|
|||||||
"github.com/netbirdio/netbird/management/server/activity"
|
"github.com/netbirdio/netbird/management/server/activity"
|
||||||
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
"github.com/netbirdio/netbird/route"
|
"github.com/netbirdio/netbird/route"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -23,7 +25,7 @@ type MockAccountManager struct {
|
|||||||
GetUserFunc func(claims jwtclaims.AuthorizationClaims) (*server.User, error)
|
GetUserFunc func(claims jwtclaims.AuthorizationClaims) (*server.User, error)
|
||||||
ListUsersFunc func(accountID string) ([]*server.User, error)
|
ListUsersFunc func(accountID string) ([]*server.User, error)
|
||||||
GetPeersFunc func(accountID, userID string) ([]*nbpeer.Peer, error)
|
GetPeersFunc func(accountID, userID string) ([]*nbpeer.Peer, error)
|
||||||
MarkPeerConnectedFunc func(peerKey string, connected bool) error
|
MarkPeerConnectedFunc func(peerKey string, connected bool, realIP net.IP) error
|
||||||
DeletePeerFunc func(accountID, peerKey, userID string) error
|
DeletePeerFunc func(accountID, peerKey, userID string) error
|
||||||
GetNetworkMapFunc func(peerKey string) (*server.NetworkMap, error)
|
GetNetworkMapFunc func(peerKey string) (*server.NetworkMap, error)
|
||||||
GetPeerNetworkFunc func(peerKey string) (*server.Network, error)
|
GetPeerNetworkFunc func(peerKey string) (*server.Network, error)
|
||||||
@ -85,6 +87,10 @@ type MockAccountManager struct {
|
|||||||
GetAllConnectedPeersFunc func() (map[string]struct{}, error)
|
GetAllConnectedPeersFunc func() (map[string]struct{}, error)
|
||||||
HasConnectedChannelFunc func(peerID string) bool
|
HasConnectedChannelFunc func(peerID string) bool
|
||||||
GetExternalCacheManagerFunc func() server.ExternalCacheManager
|
GetExternalCacheManagerFunc func() server.ExternalCacheManager
|
||||||
|
GetPostureChecksFunc func(accountID, postureChecksID, userID string) (*posture.Checks, error)
|
||||||
|
SavePostureChecksFunc func(accountID, userID string, postureChecks *posture.Checks) error
|
||||||
|
DeletePostureChecksFunc func(accountID, postureChecksID, userID string) error
|
||||||
|
ListPostureChecksFunc func(accountID, userID string) ([]*posture.Checks, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetUsersFromAccount mock implementation of GetUsersFromAccount from server.AccountManager interface
|
// GetUsersFromAccount mock implementation of GetUsersFromAccount from server.AccountManager interface
|
||||||
@ -147,9 +153,9 @@ func (am *MockAccountManager) GetAccountByUserOrAccountID(
|
|||||||
}
|
}
|
||||||
|
|
||||||
// MarkPeerConnected mock implementation of MarkPeerConnected from server.AccountManager interface
|
// MarkPeerConnected mock implementation of MarkPeerConnected from server.AccountManager interface
|
||||||
func (am *MockAccountManager) MarkPeerConnected(peerKey string, connected bool) error {
|
func (am *MockAccountManager) MarkPeerConnected(peerKey string, connected bool, realIP net.IP) error {
|
||||||
if am.MarkPeerConnectedFunc != nil {
|
if am.MarkPeerConnectedFunc != nil {
|
||||||
return am.MarkPeerConnectedFunc(peerKey, connected)
|
return am.MarkPeerConnectedFunc(peerKey, connected, realIP)
|
||||||
}
|
}
|
||||||
return status.Errorf(codes.Unimplemented, "method MarkPeerConnected is not implemented")
|
return status.Errorf(codes.Unimplemented, "method MarkPeerConnected is not implemented")
|
||||||
}
|
}
|
||||||
@ -662,3 +668,37 @@ func (am *MockAccountManager) GetExternalCacheManager() server.ExternalCacheMana
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// GetPostureChecks mocks GetPostureChecks of the AccountManager interface
|
||||||
|
func (am *MockAccountManager) GetPostureChecks(accountID, postureChecksID, userID string) (*posture.Checks, error) {
|
||||||
|
if am.GetPostureChecksFunc != nil {
|
||||||
|
return am.GetPostureChecksFunc(accountID, postureChecksID, userID)
|
||||||
|
}
|
||||||
|
return nil, status.Errorf(codes.Unimplemented, "method GetPostureChecks is not implemented")
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// SavePostureChecks mocks SavePostureChecks of the AccountManager interface
|
||||||
|
func (am *MockAccountManager) SavePostureChecks(accountID, userID string, postureChecks *posture.Checks) error {
|
||||||
|
if am.SavePostureChecksFunc != nil {
|
||||||
|
return am.SavePostureChecksFunc(accountID, userID, postureChecks)
|
||||||
|
}
|
||||||
|
return status.Errorf(codes.Unimplemented, "method SavePostureChecks is not implemented")
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeletePostureChecks mocks DeletePostureChecks of the AccountManager interface
|
||||||
|
func (am *MockAccountManager) DeletePostureChecks(accountID, postureChecksID, userID string) error {
|
||||||
|
if am.DeletePostureChecksFunc != nil {
|
||||||
|
return am.DeletePostureChecksFunc(accountID, postureChecksID, userID)
|
||||||
|
}
|
||||||
|
return status.Errorf(codes.Unimplemented, "method DeletePostureChecks is not implemented")
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// ListPostureChecks mocks ListPostureChecks of the AccountManager interface
|
||||||
|
func (am *MockAccountManager) ListPostureChecks(accountID, userID string) ([]*posture.Checks, error) {
|
||||||
|
if am.ListPostureChecksFunc != nil {
|
||||||
|
return am.ListPostureChecksFunc(accountID, userID)
|
||||||
|
}
|
||||||
|
return nil, status.Errorf(codes.Unimplemented, "method ListPostureChecks is not implemented")
|
||||||
|
}
|
||||||
|
@ -759,7 +759,7 @@ func createNSManager(t *testing.T) (*DefaultAccountManager, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "", eventStore, false)
|
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "", eventStore, nil, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func createNSStore(t *testing.T) (Store, error) {
|
func createNSStore(t *testing.T) (Store, error) {
|
||||||
|
@ -2,6 +2,7 @@ package server
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@ -80,7 +81,7 @@ func (am *DefaultAccountManager) GetPeers(accountID, userID string) ([]*nbpeer.P
|
|||||||
}
|
}
|
||||||
|
|
||||||
// MarkPeerConnected marks peer as connected (true) or disconnected (false)
|
// MarkPeerConnected marks peer as connected (true) or disconnected (false)
|
||||||
func (am *DefaultAccountManager) MarkPeerConnected(peerPubKey string, connected bool) error {
|
func (am *DefaultAccountManager) MarkPeerConnected(peerPubKey string, connected bool, realIP net.IP) error {
|
||||||
account, err := am.Store.GetAccountByPeerPubKey(peerPubKey)
|
account, err := am.Store.GetAccountByPeerPubKey(peerPubKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -109,6 +110,23 @@ func (am *DefaultAccountManager) MarkPeerConnected(peerPubKey string, connected
|
|||||||
newStatus.LoginExpired = false
|
newStatus.LoginExpired = false
|
||||||
}
|
}
|
||||||
peer.Status = newStatus
|
peer.Status = newStatus
|
||||||
|
|
||||||
|
if am.geo != nil && realIP != nil {
|
||||||
|
location, err := am.geo.Lookup(realIP)
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("failed to get location for peer %s realip: [%s]: %v", peer.ID, realIP.String(), err)
|
||||||
|
} else {
|
||||||
|
peer.Location.ConnectionIP = realIP
|
||||||
|
peer.Location.CountryCode = location.Country.ISOCode
|
||||||
|
peer.Location.CityName = location.City.Names.En
|
||||||
|
peer.Location.GeoNameID = location.City.GeonameID
|
||||||
|
err = am.Store.SavePeerLocation(account.Id, peer)
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("could not store location for peer %s: %s", peer.ID, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
account.UpdatePeer(peer)
|
account.UpdatePeer(peer)
|
||||||
|
|
||||||
err = am.Store.SavePeerStatus(account.Id, peer.ID, *newStatus)
|
err = am.Store.SavePeerStatus(account.Id, peer.ID, *newStatus)
|
||||||
|
@ -41,6 +41,8 @@ type Peer struct {
|
|||||||
LastLogin time.Time
|
LastLogin time.Time
|
||||||
// Indicate ephemeral peer attribute
|
// Indicate ephemeral peer attribute
|
||||||
Ephemeral bool
|
Ephemeral bool
|
||||||
|
// Geo location based on connection IP
|
||||||
|
Location Location `gorm:"embedded;embeddedPrefix:location_"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type PeerStatus struct {
|
type PeerStatus struct {
|
||||||
@ -54,25 +56,37 @@ type PeerStatus struct {
|
|||||||
RequiresApproval bool
|
RequiresApproval bool
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Location is a geo location information of a Peer based on public connection IP
|
||||||
|
type Location struct {
|
||||||
|
ConnectionIP net.IP // from grpc peer or reverse proxy headers depends on setup
|
||||||
|
CountryCode string
|
||||||
|
CityName string
|
||||||
|
GeoNameID uint // city level geoname id
|
||||||
|
}
|
||||||
|
|
||||||
// PeerSystemMeta is a metadata of a Peer machine system
|
// PeerSystemMeta is a metadata of a Peer machine system
|
||||||
type PeerSystemMeta struct {
|
type PeerSystemMeta struct {
|
||||||
Hostname string
|
Hostname string
|
||||||
GoOS string
|
GoOS string
|
||||||
Kernel string
|
Kernel string
|
||||||
Core string
|
Core string
|
||||||
Platform string
|
Platform string
|
||||||
OS string
|
OS string
|
||||||
WtVersion string
|
OSVersion string
|
||||||
UIVersion string
|
WtVersion string
|
||||||
|
UIVersion string
|
||||||
|
KernelVersion string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p PeerSystemMeta) isEqual(other PeerSystemMeta) bool {
|
func (p PeerSystemMeta) isEqual(other PeerSystemMeta) bool {
|
||||||
return p.Hostname == other.Hostname &&
|
return p.Hostname == other.Hostname &&
|
||||||
p.GoOS == other.GoOS &&
|
p.GoOS == other.GoOS &&
|
||||||
p.Kernel == other.Kernel &&
|
p.Kernel == other.Kernel &&
|
||||||
|
p.KernelVersion == other.KernelVersion &&
|
||||||
p.Core == other.Core &&
|
p.Core == other.Core &&
|
||||||
p.Platform == other.Platform &&
|
p.Platform == other.Platform &&
|
||||||
p.OS == other.OS &&
|
p.OS == other.OS &&
|
||||||
|
p.OSVersion == other.OSVersion &&
|
||||||
p.WtVersion == other.WtVersion &&
|
p.WtVersion == other.WtVersion &&
|
||||||
p.UIVersion == other.UIVersion
|
p.UIVersion == other.UIVersion
|
||||||
}
|
}
|
||||||
@ -104,6 +118,7 @@ func (p *Peer) Copy() *Peer {
|
|||||||
LoginExpirationEnabled: p.LoginExpirationEnabled,
|
LoginExpirationEnabled: p.LoginExpirationEnabled,
|
||||||
LastLogin: p.LastLogin,
|
LastLogin: p.LastLogin,
|
||||||
Ephemeral: p.Ephemeral,
|
Ephemeral: p.Ephemeral,
|
||||||
|
Location: p.Location,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -11,6 +11,7 @@ import (
|
|||||||
"github.com/netbirdio/netbird/management/proto"
|
"github.com/netbirdio/netbird/management/proto"
|
||||||
"github.com/netbirdio/netbird/management/server/activity"
|
"github.com/netbirdio/netbird/management/server/activity"
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
"github.com/netbirdio/netbird/management/server/status"
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -150,20 +151,25 @@ type Policy struct {
|
|||||||
|
|
||||||
// Rules of the policy
|
// Rules of the policy
|
||||||
Rules []*PolicyRule `gorm:"foreignKey:PolicyID;references:id"`
|
Rules []*PolicyRule `gorm:"foreignKey:PolicyID;references:id"`
|
||||||
|
|
||||||
|
// SourcePostureChecks are ID references to Posture checks for policy source groups
|
||||||
|
SourcePostureChecks []string `gorm:"serializer:json"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Copy returns a copy of the policy.
|
// Copy returns a copy of the policy.
|
||||||
func (p *Policy) Copy() *Policy {
|
func (p *Policy) Copy() *Policy {
|
||||||
c := &Policy{
|
c := &Policy{
|
||||||
ID: p.ID,
|
ID: p.ID,
|
||||||
Name: p.Name,
|
Name: p.Name,
|
||||||
Description: p.Description,
|
Description: p.Description,
|
||||||
Enabled: p.Enabled,
|
Enabled: p.Enabled,
|
||||||
Rules: make([]*PolicyRule, len(p.Rules)),
|
Rules: make([]*PolicyRule, len(p.Rules)),
|
||||||
|
SourcePostureChecks: make([]string, len(p.SourcePostureChecks)),
|
||||||
}
|
}
|
||||||
for i, r := range p.Rules {
|
for i, r := range p.Rules {
|
||||||
c.Rules[i] = r.Copy()
|
c.Rules[i] = r.Copy()
|
||||||
}
|
}
|
||||||
|
copy(c.SourcePostureChecks, p.SourcePostureChecks)
|
||||||
return c
|
return c
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -219,8 +225,8 @@ func (a *Account) getPeerConnectionResources(peerID string) ([]*nbpeer.Peer, []*
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
sourcePeers, peerInSources := getAllPeersFromGroups(a, rule.Sources, peerID)
|
sourcePeers, peerInSources := getAllPeersFromGroups(a, rule.Sources, peerID, policy.SourcePostureChecks)
|
||||||
destinationPeers, peerInDestinations := getAllPeersFromGroups(a, rule.Destinations, peerID)
|
destinationPeers, peerInDestinations := getAllPeersFromGroups(a, rule.Destinations, peerID, nil)
|
||||||
sourcePeers = additions.ValidatePeers(sourcePeers)
|
sourcePeers = additions.ValidatePeers(sourcePeers)
|
||||||
destinationPeers = additions.ValidatePeers(destinationPeers)
|
destinationPeers = additions.ValidatePeers(destinationPeers)
|
||||||
|
|
||||||
@ -269,6 +275,7 @@ func (a *Account) connResourcesGenerator() (func(*PolicyRule, []*nbpeer.Peer, in
|
|||||||
if peer == nil {
|
if peer == nil {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, ok := peersExists[peer.ID]; !ok {
|
if _, ok := peersExists[peer.ID]; !ok {
|
||||||
peers = append(peers, peer)
|
peers = append(peers, peer)
|
||||||
peersExists[peer.ID] = struct{}{}
|
peersExists[peer.ID] = struct{}{}
|
||||||
@ -481,8 +488,12 @@ func toProtocolFirewallRules(update []*FirewallRule) []*proto.FirewallRule {
|
|||||||
|
|
||||||
// getAllPeersFromGroups for given peer ID and list of groups
|
// getAllPeersFromGroups for given peer ID and list of groups
|
||||||
//
|
//
|
||||||
// Returns list of peers and boolean indicating if peer is in any of the groups
|
// Returns a list of peers from specified groups that pass specified posture checks
|
||||||
func getAllPeersFromGroups(account *Account, groups []string, peerID string) ([]*nbpeer.Peer, bool) {
|
// and a boolean indicating if the supplied peer ID exists within these groups.
|
||||||
|
//
|
||||||
|
// Important: Posture checks are applicable only to source group peers,
|
||||||
|
// for destination group peers, call this method with an empty list of sourcePostureChecksIDs
|
||||||
|
func getAllPeersFromGroups(account *Account, groups []string, peerID string, sourcePostureChecksIDs []string) ([]*nbpeer.Peer, bool) {
|
||||||
peerInGroups := false
|
peerInGroups := false
|
||||||
filteredPeers := make([]*nbpeer.Peer, 0, len(groups))
|
filteredPeers := make([]*nbpeer.Peer, 0, len(groups))
|
||||||
for _, g := range groups {
|
for _, g := range groups {
|
||||||
@ -497,6 +508,12 @@ func getAllPeersFromGroups(account *Account, groups []string, peerID string) ([]
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// validate the peer based on policy posture checks applied
|
||||||
|
isValid := account.validatePostureChecksOnPeer(sourcePostureChecksIDs, peer.ID)
|
||||||
|
if !isValid {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
if peer.ID == peerID {
|
if peer.ID == peerID {
|
||||||
peerInGroups = true
|
peerInGroups = true
|
||||||
continue
|
continue
|
||||||
@ -507,3 +524,38 @@ func getAllPeersFromGroups(account *Account, groups []string, peerID string) ([]
|
|||||||
}
|
}
|
||||||
return filteredPeers, peerInGroups
|
return filteredPeers, peerInGroups
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// validatePostureChecksOnPeer validates the posture checks on a peer
|
||||||
|
func (a *Account) validatePostureChecksOnPeer(sourcePostureChecksID []string, peerID string) bool {
|
||||||
|
peer, ok := a.Peers[peerID]
|
||||||
|
if !ok && peer == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, postureChecksID := range sourcePostureChecksID {
|
||||||
|
postureChecks := getPostureChecks(a, postureChecksID)
|
||||||
|
if postureChecks == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, check := range postureChecks.GetChecks() {
|
||||||
|
isValid, err := check.Check(*peer)
|
||||||
|
if err != nil {
|
||||||
|
log.Debugf("an error occurred check %s: on peer: %s :%s", check.Name(), peer.ID, err.Error())
|
||||||
|
}
|
||||||
|
if !isValid {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func getPostureChecks(account *Account, postureChecksID string) *posture.Checks {
|
||||||
|
for _, postureChecks := range account.PostureChecks {
|
||||||
|
if postureChecks.ID == postureChecksID {
|
||||||
|
return postureChecks
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
@ -9,6 +9,7 @@ import (
|
|||||||
"golang.org/x/exp/slices"
|
"golang.org/x/exp/slices"
|
||||||
|
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestAccount_getPeersByPolicy(t *testing.T) {
|
func TestAccount_getPeersByPolicy(t *testing.T) {
|
||||||
@ -474,6 +475,323 @@ func TestAccount_getPeersByPolicyDirect(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestAccount_getPeersByPolicyPostureChecks(t *testing.T) {
|
||||||
|
account := &Account{
|
||||||
|
Peers: map[string]*nbpeer.Peer{
|
||||||
|
"peerA": {
|
||||||
|
ID: "peerA",
|
||||||
|
IP: net.ParseIP("100.65.14.88"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.7",
|
||||||
|
WtVersion: "0.25.9",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerB": {
|
||||||
|
ID: "peerB",
|
||||||
|
IP: net.ParseIP("100.65.80.39"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.23.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerC": {
|
||||||
|
ID: "peerC",
|
||||||
|
IP: net.ParseIP("100.65.254.139"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.25.8",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerD": {
|
||||||
|
ID: "peerD",
|
||||||
|
IP: net.ParseIP("100.65.62.5"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.0",
|
||||||
|
WtVersion: "0.25.9",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerE": {
|
||||||
|
ID: "peerE",
|
||||||
|
IP: net.ParseIP("100.65.32.206"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.24.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerF": {
|
||||||
|
ID: "peerF",
|
||||||
|
IP: net.ParseIP("100.65.250.202"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.25.9",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerG": {
|
||||||
|
ID: "peerG",
|
||||||
|
IP: net.ParseIP("100.65.13.186"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.23.2",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerH": {
|
||||||
|
ID: "peerH",
|
||||||
|
IP: net.ParseIP("100.65.29.55"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.6.1",
|
||||||
|
WtVersion: "0.23.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"peerI": {
|
||||||
|
ID: "peerI",
|
||||||
|
IP: net.ParseIP("100.65.21.56"),
|
||||||
|
Status: &nbpeer.PeerStatus{},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{
|
||||||
|
GoOS: "windows",
|
||||||
|
KernelVersion: "10.0.14393.2430",
|
||||||
|
WtVersion: "0.25.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Groups: map[string]*Group{
|
||||||
|
"GroupAll": {
|
||||||
|
ID: "GroupAll",
|
||||||
|
Name: "All",
|
||||||
|
Peers: []string{
|
||||||
|
"peerB",
|
||||||
|
"peerA",
|
||||||
|
"peerD",
|
||||||
|
"peerC",
|
||||||
|
"peerF",
|
||||||
|
"peerG",
|
||||||
|
"peerH",
|
||||||
|
"peerI",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"GroupSwarm": {
|
||||||
|
ID: "GroupSwarm",
|
||||||
|
Name: "swarm",
|
||||||
|
Peers: []string{
|
||||||
|
"peerB",
|
||||||
|
"peerA",
|
||||||
|
"peerD",
|
||||||
|
"peerE",
|
||||||
|
"peerG",
|
||||||
|
"peerH",
|
||||||
|
"peerI",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
PostureChecks: []*posture.Checks{
|
||||||
|
{
|
||||||
|
ID: "PostureChecksDefault",
|
||||||
|
Name: "Default",
|
||||||
|
Description: "This is a posture checks that check if peer is running required versions",
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
NBVersionCheck: &posture.NBVersionCheck{
|
||||||
|
MinVersion: "0.25",
|
||||||
|
},
|
||||||
|
OSVersionCheck: &posture.OSVersionCheck{
|
||||||
|
Linux: &posture.MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.6.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
account.Policies = append(account.Policies, &Policy{
|
||||||
|
ID: "PolicyPostureChecks",
|
||||||
|
Name: "",
|
||||||
|
Description: "This is the policy with posture checks applied",
|
||||||
|
Enabled: true,
|
||||||
|
Rules: []*PolicyRule{
|
||||||
|
{
|
||||||
|
ID: "RuleSwarm",
|
||||||
|
Name: "Swarm",
|
||||||
|
Enabled: true,
|
||||||
|
Action: PolicyTrafficActionAccept,
|
||||||
|
Destinations: []string{
|
||||||
|
"GroupSwarm",
|
||||||
|
},
|
||||||
|
Sources: []string{
|
||||||
|
"GroupAll",
|
||||||
|
},
|
||||||
|
Bidirectional: false,
|
||||||
|
Protocol: PolicyRuleProtocolTCP,
|
||||||
|
Ports: []string{"80"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
SourcePostureChecks: []string{
|
||||||
|
"PostureChecksDefault",
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("verify peer's network map with default group peer list", func(t *testing.T) {
|
||||||
|
// peerB doesn't fulfill the NB posture check but is included in the destination group Swarm,
|
||||||
|
// will establish a connection with all source peers satisfying the NB posture check.
|
||||||
|
peers, firewallRules := account.getPeerConnectionResources("peerB")
|
||||||
|
assert.Len(t, peers, 4)
|
||||||
|
assert.Len(t, firewallRules, 4)
|
||||||
|
assert.Contains(t, peers, account.Peers["peerA"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerC"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerD"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerF"])
|
||||||
|
|
||||||
|
// peerC satisfy the NB posture check, should establish connection to all destination group peer's
|
||||||
|
// We expect a single permissive firewall rule which all outgoing connections
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerC")
|
||||||
|
assert.Len(t, peers, len(account.Groups["GroupSwarm"].Peers))
|
||||||
|
assert.Len(t, firewallRules, 1)
|
||||||
|
expectedFirewallRules := []*FirewallRule{
|
||||||
|
{
|
||||||
|
PeerIP: "0.0.0.0",
|
||||||
|
Direction: firewallRuleDirectionOUT,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
assert.ElementsMatch(t, firewallRules, expectedFirewallRules)
|
||||||
|
|
||||||
|
// peerE doesn't fulfill the NB posture check and exists in only destination group Swarm,
|
||||||
|
// all source group peers satisfying the NB posture check should establish connection
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerE")
|
||||||
|
assert.Len(t, peers, 4)
|
||||||
|
assert.Len(t, firewallRules, 4)
|
||||||
|
assert.Contains(t, peers, account.Peers["peerA"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerC"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerD"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerF"])
|
||||||
|
|
||||||
|
// peerI doesn't fulfill the OS version posture check and exists in only destination group Swarm,
|
||||||
|
// all source group peers satisfying the NB posture check should establish connection
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerI")
|
||||||
|
assert.Len(t, peers, 4)
|
||||||
|
assert.Len(t, firewallRules, 4)
|
||||||
|
assert.Contains(t, peers, account.Peers["peerA"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerC"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerD"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerF"])
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("verify peer's network map with modified group peer list", func(t *testing.T) {
|
||||||
|
// Removing peerB as the part of destination group Swarm
|
||||||
|
account.Groups["GroupSwarm"].Peers = []string{"peerA", "peerD", "peerE", "peerG", "peerH"}
|
||||||
|
|
||||||
|
// peerB doesn't satisfy the NB posture check, and doesn't exist in destination group peer's
|
||||||
|
// no connection should be established to any peer of destination group
|
||||||
|
peers, firewallRules := account.getPeerConnectionResources("peerB")
|
||||||
|
assert.Len(t, peers, 0)
|
||||||
|
assert.Len(t, firewallRules, 0)
|
||||||
|
|
||||||
|
// peerI doesn't satisfy the OS version posture check, and doesn't exist in destination group peer's
|
||||||
|
// no connection should be established to any peer of destination group
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerI")
|
||||||
|
assert.Len(t, peers, 0)
|
||||||
|
assert.Len(t, firewallRules, 0)
|
||||||
|
|
||||||
|
// peerC satisfy the NB posture check, should establish connection to all destination group peer's
|
||||||
|
// We expect a single permissive firewall rule which all outgoing connections
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerC")
|
||||||
|
assert.Len(t, peers, len(account.Groups["GroupSwarm"].Peers))
|
||||||
|
assert.Len(t, firewallRules, len(account.Groups["GroupSwarm"].Peers))
|
||||||
|
|
||||||
|
peerIDs := make([]string, 0, len(peers))
|
||||||
|
for _, peer := range peers {
|
||||||
|
peerIDs = append(peerIDs, peer.ID)
|
||||||
|
}
|
||||||
|
assert.ElementsMatch(t, peerIDs, account.Groups["GroupSwarm"].Peers)
|
||||||
|
|
||||||
|
// Removing peerF as the part of source group All
|
||||||
|
account.Groups["GroupAll"].Peers = []string{"peerB", "peerA", "peerD", "peerC", "peerG", "peerH"}
|
||||||
|
|
||||||
|
// peerE doesn't fulfill the NB posture check and exists in only destination group Swarm,
|
||||||
|
// all source group peers satisfying the NB posture check should establish connection
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerE")
|
||||||
|
assert.Len(t, peers, 3)
|
||||||
|
assert.Len(t, firewallRules, 3)
|
||||||
|
assert.Contains(t, peers, account.Peers["peerA"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerC"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerD"])
|
||||||
|
|
||||||
|
peers, firewallRules = account.getPeerConnectionResources("peerA")
|
||||||
|
assert.Len(t, peers, 5)
|
||||||
|
// assert peers from Group Swarm
|
||||||
|
assert.Contains(t, peers, account.Peers["peerD"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerE"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerG"])
|
||||||
|
assert.Contains(t, peers, account.Peers["peerH"])
|
||||||
|
|
||||||
|
// assert peers from Group All
|
||||||
|
assert.Contains(t, peers, account.Peers["peerC"])
|
||||||
|
|
||||||
|
expectedFirewallRules := []*FirewallRule{
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.62.5",
|
||||||
|
Direction: firewallRuleDirectionOUT,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.32.206",
|
||||||
|
Direction: firewallRuleDirectionOUT,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.13.186",
|
||||||
|
Direction: firewallRuleDirectionOUT,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.29.55",
|
||||||
|
Direction: firewallRuleDirectionOUT,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.254.139",
|
||||||
|
Direction: firewallRuleDirectionIN,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
PeerIP: "100.65.62.5",
|
||||||
|
Direction: firewallRuleDirectionIN,
|
||||||
|
Action: "accept",
|
||||||
|
Protocol: "tcp",
|
||||||
|
Port: "80",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
assert.Len(t, firewallRules, len(expectedFirewallRules))
|
||||||
|
assert.ElementsMatch(t, firewallRules, expectedFirewallRules)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func sortFunc() func(a *FirewallRule, b *FirewallRule) int {
|
func sortFunc() func(a *FirewallRule, b *FirewallRule) int {
|
||||||
return func(a, b *FirewallRule) int {
|
return func(a, b *FirewallRule) int {
|
||||||
// Concatenate PeerIP and Direction as string for comparison
|
// Concatenate PeerIP and Direction as string for comparison
|
||||||
|
177
management/server/posture/checks.go
Normal file
177
management/server/posture/checks.go
Normal file
@ -0,0 +1,177 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/hashicorp/go-version"
|
||||||
|
|
||||||
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
NBVersionCheckName = "NBVersionCheck"
|
||||||
|
OSVersionCheckName = "OSVersionCheck"
|
||||||
|
GeoLocationCheckName = "GeoLocationCheck"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Check represents an interface for performing a check on a peer.
|
||||||
|
type Check interface {
|
||||||
|
Check(peer nbpeer.Peer) (bool, error)
|
||||||
|
Name() string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Checks struct {
|
||||||
|
// ID of the posture checks
|
||||||
|
ID string `gorm:"primaryKey"`
|
||||||
|
|
||||||
|
// Name of the posture checks
|
||||||
|
Name string
|
||||||
|
|
||||||
|
// Description of the posture checks visible in the UI
|
||||||
|
Description string
|
||||||
|
|
||||||
|
// AccountID is a reference to the Account that this object belongs
|
||||||
|
AccountID string `json:"-" gorm:"index"`
|
||||||
|
|
||||||
|
// Checks is a set of objects that perform the actual checks
|
||||||
|
Checks ChecksDefinition `gorm:"serializer:json"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ChecksDefinition contains definition of actual check
|
||||||
|
type ChecksDefinition struct {
|
||||||
|
NBVersionCheck *NBVersionCheck `json:",omitempty"`
|
||||||
|
OSVersionCheck *OSVersionCheck `json:",omitempty"`
|
||||||
|
GeoLocationCheck *GeoLocationCheck `json:",omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy returns a copy of a checks definition.
|
||||||
|
func (cd ChecksDefinition) Copy() ChecksDefinition {
|
||||||
|
var cdCopy ChecksDefinition
|
||||||
|
if cd.NBVersionCheck != nil {
|
||||||
|
cdCopy.NBVersionCheck = &NBVersionCheck{
|
||||||
|
MinVersion: cd.NBVersionCheck.MinVersion,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if cd.OSVersionCheck != nil {
|
||||||
|
cdCopy.OSVersionCheck = &OSVersionCheck{}
|
||||||
|
osCheck := cdCopy.OSVersionCheck
|
||||||
|
if osCheck.Android != nil {
|
||||||
|
cdCopy.OSVersionCheck.Android = &MinVersionCheck{MinVersion: osCheck.Android.MinVersion}
|
||||||
|
}
|
||||||
|
if osCheck.Darwin != nil {
|
||||||
|
cdCopy.OSVersionCheck.Darwin = &MinVersionCheck{MinVersion: osCheck.Darwin.MinVersion}
|
||||||
|
}
|
||||||
|
if osCheck.Ios != nil {
|
||||||
|
cdCopy.OSVersionCheck.Ios = &MinVersionCheck{MinVersion: osCheck.Ios.MinVersion}
|
||||||
|
}
|
||||||
|
if osCheck.Linux != nil {
|
||||||
|
cdCopy.OSVersionCheck.Linux = &MinKernelVersionCheck{MinKernelVersion: osCheck.Linux.MinKernelVersion}
|
||||||
|
}
|
||||||
|
if osCheck.Windows != nil {
|
||||||
|
cdCopy.OSVersionCheck.Windows = &MinKernelVersionCheck{MinKernelVersion: osCheck.Windows.MinKernelVersion}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if cd.GeoLocationCheck != nil {
|
||||||
|
geoCheck := cd.GeoLocationCheck
|
||||||
|
cdCopy.GeoLocationCheck = &GeoLocationCheck{
|
||||||
|
Action: geoCheck.Action,
|
||||||
|
Locations: make([]Location, len(geoCheck.Locations)),
|
||||||
|
}
|
||||||
|
copy(cd.GeoLocationCheck.Locations, geoCheck.Locations)
|
||||||
|
}
|
||||||
|
return cdCopy
|
||||||
|
}
|
||||||
|
|
||||||
|
// TableName returns the name of the table for the Checks model in the database.
|
||||||
|
func (*Checks) TableName() string {
|
||||||
|
return "posture_checks"
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy returns a copy of a posture checks.
|
||||||
|
func (pc *Checks) Copy() *Checks {
|
||||||
|
checks := &Checks{
|
||||||
|
ID: pc.ID,
|
||||||
|
Name: pc.Name,
|
||||||
|
Description: pc.Description,
|
||||||
|
AccountID: pc.AccountID,
|
||||||
|
Checks: pc.Checks.Copy(),
|
||||||
|
}
|
||||||
|
return checks
|
||||||
|
}
|
||||||
|
|
||||||
|
// EventMeta returns activity event meta-related to this posture checks.
|
||||||
|
func (pc *Checks) EventMeta() map[string]any {
|
||||||
|
return map[string]any{"name": pc.Name}
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetChecks returns list of all initialized checks definitions
|
||||||
|
func (pc *Checks) GetChecks() []Check {
|
||||||
|
var checks []Check
|
||||||
|
if pc.Checks.NBVersionCheck != nil {
|
||||||
|
checks = append(checks, pc.Checks.NBVersionCheck)
|
||||||
|
}
|
||||||
|
if pc.Checks.OSVersionCheck != nil {
|
||||||
|
checks = append(checks, pc.Checks.OSVersionCheck)
|
||||||
|
}
|
||||||
|
if pc.Checks.GeoLocationCheck != nil {
|
||||||
|
checks = append(checks, pc.Checks.GeoLocationCheck)
|
||||||
|
}
|
||||||
|
return checks
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *Checks) Validate() error {
|
||||||
|
if check := pc.Checks.NBVersionCheck; check != nil {
|
||||||
|
if !isVersionValid(check.MinVersion) {
|
||||||
|
return fmt.Errorf("%s version: %s is not valid", check.Name(), check.MinVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osCheck := pc.Checks.OSVersionCheck; osCheck != nil {
|
||||||
|
if osCheck.Android != nil {
|
||||||
|
if !isVersionValid(osCheck.Android.MinVersion) {
|
||||||
|
return fmt.Errorf("%s android version: %s is not valid", osCheck.Name(), osCheck.Android.MinVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osCheck.Ios != nil {
|
||||||
|
if !isVersionValid(osCheck.Ios.MinVersion) {
|
||||||
|
return fmt.Errorf("%s ios version: %s is not valid", osCheck.Name(), osCheck.Ios.MinVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osCheck.Darwin != nil {
|
||||||
|
if !isVersionValid(osCheck.Darwin.MinVersion) {
|
||||||
|
return fmt.Errorf("%s darwin version: %s is not valid", osCheck.Name(), osCheck.Darwin.MinVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osCheck.Linux != nil {
|
||||||
|
if !isVersionValid(osCheck.Linux.MinKernelVersion) {
|
||||||
|
return fmt.Errorf("%s linux kernel version: %s is not valid", osCheck.Name(),
|
||||||
|
osCheck.Linux.MinKernelVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if osCheck.Windows != nil {
|
||||||
|
if !isVersionValid(osCheck.Windows.MinKernelVersion) {
|
||||||
|
return fmt.Errorf("%s windows kernel version: %s is not valid", osCheck.Name(),
|
||||||
|
osCheck.Windows.MinKernelVersion)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func isVersionValid(ver string) bool {
|
||||||
|
newVersion, err := version.NewVersion(ver)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if newVersion != nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
218
management/server/posture/checks_test.go
Normal file
218
management/server/posture/checks_test.go
Normal file
@ -0,0 +1,218 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestChecks_MarshalJSON(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
checks *Checks
|
||||||
|
want []byte
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid Posture Checks Marshal",
|
||||||
|
checks: &Checks{
|
||||||
|
ID: "id1",
|
||||||
|
Name: "name1",
|
||||||
|
Description: "desc1",
|
||||||
|
AccountID: "acc1",
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
want: []byte(`
|
||||||
|
{
|
||||||
|
"ID": "id1",
|
||||||
|
"Name": "name1",
|
||||||
|
"Description": "desc1",
|
||||||
|
"Checks": {
|
||||||
|
"NBVersionCheck": {
|
||||||
|
"MinVersion": "1.0.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
`),
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Empty Posture Checks Marshal",
|
||||||
|
checks: &Checks{
|
||||||
|
ID: "",
|
||||||
|
Name: "",
|
||||||
|
Description: "",
|
||||||
|
AccountID: "",
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
want: []byte(`
|
||||||
|
{
|
||||||
|
"ID": "",
|
||||||
|
"Name": "",
|
||||||
|
"Description": "",
|
||||||
|
"Checks": {
|
||||||
|
"NBVersionCheck": {
|
||||||
|
"MinVersion": ""
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
`),
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
got, err := json.Marshal(tt.checks)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("Checks.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
assert.JSONEq(t, string(got), string(tt.want))
|
||||||
|
assert.Equal(t, tt.checks, tt.checks.Copy(), "original Checks should not be modified")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestChecks_UnmarshalJSON(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
in []byte
|
||||||
|
expected *Checks
|
||||||
|
expectedError bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid JSON Posture Checks Unmarshal",
|
||||||
|
in: []byte(`
|
||||||
|
{
|
||||||
|
"ID": "id1",
|
||||||
|
"Name": "name1",
|
||||||
|
"Description": "desc1",
|
||||||
|
"Checks": {
|
||||||
|
"NBVersionCheck": {
|
||||||
|
"MinVersion": "1.0.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
`),
|
||||||
|
expected: &Checks{
|
||||||
|
ID: "id1",
|
||||||
|
Name: "name1",
|
||||||
|
Description: "desc1",
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedError: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Invalid JSON Posture Checks Unmarshal",
|
||||||
|
in: []byte(`{`),
|
||||||
|
expectedError: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Empty JSON Posture Check Unmarshal",
|
||||||
|
in: []byte(`{}`),
|
||||||
|
expected: &Checks{},
|
||||||
|
expectedError: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
|
||||||
|
var checks Checks
|
||||||
|
err := json.Unmarshal(tc.in, &checks)
|
||||||
|
if tc.expectedError {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Equal(t, tc.expected, &checks)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestChecks_Validate(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
name string
|
||||||
|
checks Checks
|
||||||
|
expectedError bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid checks version",
|
||||||
|
checks: Checks{
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{
|
||||||
|
MinVersion: "0.25.0",
|
||||||
|
},
|
||||||
|
OSVersionCheck: &OSVersionCheck{
|
||||||
|
Ios: &MinVersionCheck{
|
||||||
|
MinVersion: "13.0.1",
|
||||||
|
},
|
||||||
|
Linux: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "5.3.3-dev",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedError: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Invalid checks version",
|
||||||
|
checks: Checks{
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{
|
||||||
|
MinVersion: "abc",
|
||||||
|
},
|
||||||
|
OSVersionCheck: &OSVersionCheck{
|
||||||
|
Android: &MinVersionCheck{
|
||||||
|
MinVersion: "dev",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedError: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Combined valid and invalid checks version",
|
||||||
|
checks: Checks{
|
||||||
|
Checks: ChecksDefinition{
|
||||||
|
NBVersionCheck: &NBVersionCheck{
|
||||||
|
MinVersion: "abc",
|
||||||
|
},
|
||||||
|
OSVersionCheck: &OSVersionCheck{
|
||||||
|
Windows: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "10.0.1234",
|
||||||
|
},
|
||||||
|
Darwin: &MinVersionCheck{
|
||||||
|
MinVersion: "13.0.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedError: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
|
err := tc.checks.Validate()
|
||||||
|
if tc.expectedError {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
67
management/server/posture/geo_location.go
Normal file
67
management/server/posture/geo_location.go
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
GeoLocationActionAllow string = "allow"
|
||||||
|
GeoLocationActionDeny string = "deny"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Location struct {
|
||||||
|
// CountryCode 2-letter ISO 3166-1 alpha-2 code that represents the country
|
||||||
|
CountryCode string
|
||||||
|
|
||||||
|
// CityName Commonly used English name of the city
|
||||||
|
CityName string
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Check = (*GeoLocationCheck)(nil)
|
||||||
|
|
||||||
|
type GeoLocationCheck struct {
|
||||||
|
// Locations list of geolocations, to which the policy applies
|
||||||
|
Locations []Location
|
||||||
|
|
||||||
|
// Action to take upon policy match
|
||||||
|
Action string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *GeoLocationCheck) Check(peer nbpeer.Peer) (bool, error) {
|
||||||
|
// deny if the peer location is not evaluated
|
||||||
|
if peer.Location.CountryCode == "" && peer.Location.CityName == "" {
|
||||||
|
return false, fmt.Errorf("peer's location is not set")
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, loc := range g.Locations {
|
||||||
|
if loc.CountryCode == peer.Location.CountryCode {
|
||||||
|
if loc.CityName == "" || loc.CityName == peer.Location.CityName {
|
||||||
|
switch g.Action {
|
||||||
|
case GeoLocationActionDeny:
|
||||||
|
return false, nil
|
||||||
|
case GeoLocationActionAllow:
|
||||||
|
return true, nil
|
||||||
|
default:
|
||||||
|
return false, fmt.Errorf("invalid geo location action: %s", g.Action)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// At this point, no location in the list matches the peer's location
|
||||||
|
// For action deny and no location match, allow the peer
|
||||||
|
if g.Action == GeoLocationActionDeny {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
// For action allow and no location match, deny the peer
|
||||||
|
if g.Action == GeoLocationActionAllow {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return false, fmt.Errorf("invalid geo location action: %s", g.Action)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *GeoLocationCheck) Name() string {
|
||||||
|
return GeoLocationCheckName
|
||||||
|
}
|
238
management/server/posture/geo_location_test.go
Normal file
238
management/server/posture/geo_location_test.go
Normal file
@ -0,0 +1,238 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestGeoLocationCheck_Check(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input peer.Peer
|
||||||
|
check GeoLocationCheck
|
||||||
|
wantErr bool
|
||||||
|
isValid bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Peer location matches the location in the allow sets",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
CityName: "Los Angeles",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location matches the location in the allow country only",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location doesn't match the location in the allow sets",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Frankfurt am Main",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
CityName: "Los Angeles",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location doesn't match the location in the allow country only",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Frankfurt am Main",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location matches the location in the deny sets",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
CityName: "Los Angeles",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location matches the location in the deny country only",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location doesn't match the location in the deny sets",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Frankfurt am Main",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
CityName: "Los Angeles",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer location doesn't match the location in the deny country only",
|
||||||
|
input: peer.Peer{
|
||||||
|
Location: peer.Location{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Frankfurt am Main",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "US",
|
||||||
|
CityName: "Los Angeles",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer with no location in the allow sets",
|
||||||
|
input: peer.Peer{},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionAllow,
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Peer with no location in the deny sets",
|
||||||
|
input: peer.Peer{},
|
||||||
|
check: GeoLocationCheck{
|
||||||
|
Locations: []Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
CityName: "Berlin",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Action: GeoLocationActionDeny,
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
isValid, err := tt.check.Check(tt.input)
|
||||||
|
if tt.wantErr {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
assert.Equal(t, tt.isValid, isValid)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
39
management/server/posture/nb_version.go
Normal file
39
management/server/posture/nb_version.go
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/hashicorp/go-version"
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
|
||||||
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NBVersionCheck struct {
|
||||||
|
MinVersion string
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Check = (*NBVersionCheck)(nil)
|
||||||
|
|
||||||
|
func (n *NBVersionCheck) Check(peer nbpeer.Peer) (bool, error) {
|
||||||
|
peerNBVersion, err := version.NewVersion(peer.Meta.WtVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
constraints, err := version.NewConstraint(">= " + n.MinVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if constraints.Check(peerNBVersion) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debugf("peer %s NB version %s is older than minimum allowed version %s",
|
||||||
|
peer.ID, peer.Meta.WtVersion, n.MinVersion)
|
||||||
|
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (n *NBVersionCheck) Name() string {
|
||||||
|
return NBVersionCheckName
|
||||||
|
}
|
110
management/server/posture/nb_version_test.go
Normal file
110
management/server/posture/nb_version_test.go
Normal file
@ -0,0 +1,110 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNBVersionCheck_Check(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input peer.Peer
|
||||||
|
check NBVersionCheck
|
||||||
|
wantErr bool
|
||||||
|
isValid bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid Peer NB version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "1.0.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer NB version With No Patch Version 1",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "2.0.9",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "2.0",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer NB version With No Patch Version 2",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "2.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "2.0",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Older Peer NB version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "0.9.9",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Older Peer NB version With Patch Version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "0.1.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "0.2",
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Invalid Peer NB version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
WtVersion: "x.y.z",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: NBVersionCheck{
|
||||||
|
MinVersion: "1.0.0",
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
isValid, err := tt.check.Check(tt.input)
|
||||||
|
if tt.wantErr {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
assert.Equal(t, tt.isValid, isValid)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
99
management/server/posture/os_version.go
Normal file
99
management/server/posture/os_version.go
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/hashicorp/go-version"
|
||||||
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
type MinVersionCheck struct {
|
||||||
|
MinVersion string
|
||||||
|
}
|
||||||
|
|
||||||
|
type MinKernelVersionCheck struct {
|
||||||
|
MinKernelVersion string
|
||||||
|
}
|
||||||
|
|
||||||
|
type OSVersionCheck struct {
|
||||||
|
Android *MinVersionCheck
|
||||||
|
Darwin *MinVersionCheck
|
||||||
|
Ios *MinVersionCheck
|
||||||
|
Linux *MinKernelVersionCheck
|
||||||
|
Windows *MinKernelVersionCheck
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Check = (*OSVersionCheck)(nil)
|
||||||
|
|
||||||
|
func (c *OSVersionCheck) Check(peer nbpeer.Peer) (bool, error) {
|
||||||
|
peerGoOS := peer.Meta.GoOS
|
||||||
|
switch peerGoOS {
|
||||||
|
case "android":
|
||||||
|
return checkMinVersion(peerGoOS, peer.Meta.OSVersion, c.Android)
|
||||||
|
case "darwin":
|
||||||
|
return checkMinVersion(peerGoOS, peer.Meta.OSVersion, c.Darwin)
|
||||||
|
case "ios":
|
||||||
|
return checkMinVersion(peerGoOS, peer.Meta.OSVersion, c.Ios)
|
||||||
|
case "linux":
|
||||||
|
kernelVersion := strings.Split(peer.Meta.KernelVersion, "-")[0]
|
||||||
|
return checkMinKernelVersion(peerGoOS, kernelVersion, c.Linux)
|
||||||
|
case "windows":
|
||||||
|
return checkMinKernelVersion(peerGoOS, peer.Meta.KernelVersion, c.Windows)
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *OSVersionCheck) Name() string {
|
||||||
|
return OSVersionCheckName
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkMinVersion(peerGoOS, peerVersion string, check *MinVersionCheck) (bool, error) {
|
||||||
|
if check == nil {
|
||||||
|
log.Debugf("peer %s OS is not allowed in the check", peerGoOS)
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
peerNBVersion, err := version.NewVersion(peerVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
constraints, err := version.NewConstraint(">= " + check.MinVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if constraints.Check(peerNBVersion) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debugf("peer %s OS version %s is older than minimum allowed version %s", peerGoOS, peerVersion, check.MinVersion)
|
||||||
|
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkMinKernelVersion(peerGoOS, peerVersion string, check *MinKernelVersionCheck) (bool, error) {
|
||||||
|
if check == nil {
|
||||||
|
log.Debugf("peer %s OS is not allowed in the check", peerGoOS)
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
peerNBVersion, err := version.NewVersion(peerVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
constraints, err := version.NewConstraint(">= " + check.MinKernelVersion)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if constraints.Check(peerNBVersion) {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debugf("peer %s kernel version %s is older than minimum allowed version %s", peerGoOS, peerVersion, check.MinKernelVersion)
|
||||||
|
|
||||||
|
return false, nil
|
||||||
|
}
|
152
management/server/posture/os_version_test.go
Normal file
152
management/server/posture/os_version_test.go
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
package posture
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestOSVersionCheck_Check(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input peer.Peer
|
||||||
|
check OSVersionCheck
|
||||||
|
wantErr bool
|
||||||
|
isValid bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid Peer Windows Kernel version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "10.0.20348.2227",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Linux: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "10.0.20340.2200",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer Linux Kernel version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.1.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Linux: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer Linux Kernel version with suffix",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.5.11-linuxkit",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Linux: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Not valid Peer macOS version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "darwin",
|
||||||
|
OSVersion: "14.2.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Darwin: &MinVersionCheck{
|
||||||
|
MinVersion: "15",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer ios version allowed by any rule",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "ios",
|
||||||
|
OSVersion: "17.0.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Ios: &MinVersionCheck{
|
||||||
|
MinVersion: "0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer android version not allowed by rule",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "android",
|
||||||
|
OSVersion: "14",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid Peer Linux Kernel version not allowed by rule",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "6.1.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{},
|
||||||
|
wantErr: false,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Invalid Peer Linux kernel version",
|
||||||
|
input: peer.Peer{
|
||||||
|
Meta: peer.PeerSystemMeta{
|
||||||
|
GoOS: "linux",
|
||||||
|
KernelVersion: "x.y.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
check: OSVersionCheck{
|
||||||
|
Linux: &MinKernelVersionCheck{
|
||||||
|
MinKernelVersion: "6.0.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
wantErr: true,
|
||||||
|
isValid: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
isValid, err := tt.check.Check(tt.input)
|
||||||
|
if tt.wantErr {
|
||||||
|
assert.Error(t, err)
|
||||||
|
} else {
|
||||||
|
assert.NoError(t, err)
|
||||||
|
}
|
||||||
|
assert.Equal(t, tt.isValid, isValid)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
178
management/server/posture_checks.go
Normal file
178
management/server/posture_checks.go
Normal file
@ -0,0 +1,178 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/netbirdio/netbird/management/server/activity"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) GetPostureChecks(accountID, postureChecksID, userID string) (*posture.Checks, error) {
|
||||||
|
unlock := am.Store.AcquireAccountLock(accountID)
|
||||||
|
defer unlock()
|
||||||
|
|
||||||
|
account, err := am.Store.GetAccount(accountID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
user, err := account.FindUser(userID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !user.HasAdminPower() {
|
||||||
|
return nil, status.Errorf(status.PermissionDenied, "only users with admin power are allowed to view posture checks")
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, postureChecks := range account.PostureChecks {
|
||||||
|
if postureChecks.ID == postureChecksID {
|
||||||
|
return postureChecks, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, status.Errorf(status.NotFound, "posture checks with ID %s not found", postureChecksID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) SavePostureChecks(accountID, userID string, postureChecks *posture.Checks) error {
|
||||||
|
unlock := am.Store.AcquireAccountLock(accountID)
|
||||||
|
defer unlock()
|
||||||
|
|
||||||
|
account, err := am.Store.GetAccount(accountID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
user, err := account.FindUser(userID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !user.HasAdminPower() {
|
||||||
|
return status.Errorf(status.PermissionDenied, "only users with admin power are allowed to view posture checks")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := postureChecks.Validate(); err != nil {
|
||||||
|
return status.Errorf(status.BadRequest, err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
exists, uniqName := am.savePostureChecks(account, postureChecks)
|
||||||
|
|
||||||
|
// we do not allow create new posture checks with non uniq name
|
||||||
|
if !exists && !uniqName {
|
||||||
|
return status.Errorf(status.PreconditionFailed, "Posture check name should be unique")
|
||||||
|
}
|
||||||
|
|
||||||
|
action := activity.PostureCheckCreated
|
||||||
|
if exists {
|
||||||
|
action = activity.PostureCheckUpdated
|
||||||
|
account.Network.IncSerial()
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = am.Store.SaveAccount(account); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
am.StoreEvent(userID, postureChecks.ID, accountID, action, postureChecks.EventMeta())
|
||||||
|
if exists {
|
||||||
|
am.updateAccountPeers(account)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) DeletePostureChecks(accountID, postureChecksID, userID string) error {
|
||||||
|
unlock := am.Store.AcquireAccountLock(accountID)
|
||||||
|
defer unlock()
|
||||||
|
|
||||||
|
account, err := am.Store.GetAccount(accountID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
user, err := account.FindUser(userID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !user.HasAdminPower() {
|
||||||
|
return status.Errorf(status.PermissionDenied, "only users with admin power are allowed to view posture checks")
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecks, err := am.deletePostureChecks(account, postureChecksID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = am.Store.SaveAccount(account); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
am.StoreEvent(userID, postureChecks.ID, accountID, activity.PostureCheckDeleted, postureChecks.EventMeta())
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) ListPostureChecks(accountID, userID string) ([]*posture.Checks, error) {
|
||||||
|
unlock := am.Store.AcquireAccountLock(accountID)
|
||||||
|
defer unlock()
|
||||||
|
|
||||||
|
account, err := am.Store.GetAccount(accountID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
user, err := account.FindUser(userID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !user.HasAdminPower() {
|
||||||
|
return nil, status.Errorf(status.PermissionDenied, "only users with admin power are allowed to view posture checks")
|
||||||
|
}
|
||||||
|
|
||||||
|
return account.PostureChecks, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) savePostureChecks(account *Account, postureChecks *posture.Checks) (exists, uniqName bool) {
|
||||||
|
uniqName = true
|
||||||
|
for i, p := range account.PostureChecks {
|
||||||
|
if !exists && p.ID == postureChecks.ID {
|
||||||
|
account.PostureChecks[i] = postureChecks
|
||||||
|
exists = true
|
||||||
|
}
|
||||||
|
if p.Name == postureChecks.Name {
|
||||||
|
uniqName = false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
account.PostureChecks = append(account.PostureChecks, postureChecks)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (am *DefaultAccountManager) deletePostureChecks(account *Account, postureChecksID string) (*posture.Checks, error) {
|
||||||
|
postureChecksIdx := -1
|
||||||
|
for i, postureChecks := range account.PostureChecks {
|
||||||
|
if postureChecks.ID == postureChecksID {
|
||||||
|
postureChecksIdx = i
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if postureChecksIdx < 0 {
|
||||||
|
return nil, status.Errorf(status.NotFound, "posture checks with ID %s doesn't exist", postureChecksID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// check policy links
|
||||||
|
for _, policy := range account.Policies {
|
||||||
|
for _, id := range policy.SourcePostureChecks {
|
||||||
|
if id == postureChecksID {
|
||||||
|
return nil, status.Errorf(status.PreconditionFailed, "posture checks have been linked to policy: %s", policy.Name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
postureChecks := account.PostureChecks[postureChecksIdx]
|
||||||
|
account.PostureChecks = append(account.PostureChecks[:postureChecksIdx], account.PostureChecks[postureChecksIdx+1:]...)
|
||||||
|
|
||||||
|
return postureChecks, nil
|
||||||
|
}
|
118
management/server/posture_checks_test.go
Normal file
118
management/server/posture_checks_test.go
Normal file
@ -0,0 +1,118 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
adminUserID = "adminUserID"
|
||||||
|
regularUserID = "regularUserID"
|
||||||
|
postureCheckID = "existing-id"
|
||||||
|
postureCheckName = "Existing check"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDefaultAccountManager_PostureCheck(t *testing.T) {
|
||||||
|
am, err := createManager(t)
|
||||||
|
if err != nil {
|
||||||
|
t.Error("failed to create account manager")
|
||||||
|
}
|
||||||
|
|
||||||
|
account, err := initTestPostureChecksAccount(am)
|
||||||
|
if err != nil {
|
||||||
|
t.Error("failed to init testing account")
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run("Generic posture check flow", func(t *testing.T) {
|
||||||
|
// regular users can not create checks
|
||||||
|
err := am.SavePostureChecks(account.Id, regularUserID, &posture.Checks{})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// regular users cannot list check
|
||||||
|
_, err = am.ListPostureChecks(account.Id, regularUserID)
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// should be possible to create posture check with uniq name
|
||||||
|
err = am.SavePostureChecks(account.Id, adminUserID, &posture.Checks{
|
||||||
|
ID: postureCheckID,
|
||||||
|
Name: postureCheckName,
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
NBVersionCheck: &posture.NBVersionCheck{
|
||||||
|
MinVersion: "0.26.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
// admin users can list check
|
||||||
|
checks, err := am.ListPostureChecks(account.Id, adminUserID)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Len(t, checks, 1)
|
||||||
|
|
||||||
|
// should not be possible to create posture check with non uniq name
|
||||||
|
err = am.SavePostureChecks(account.Id, adminUserID, &posture.Checks{
|
||||||
|
ID: "new-id",
|
||||||
|
Name: postureCheckName,
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
GeoLocationCheck: &posture.GeoLocationCheck{
|
||||||
|
Locations: []posture.Location{
|
||||||
|
{
|
||||||
|
CountryCode: "DE",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// admins can update posture checks
|
||||||
|
err = am.SavePostureChecks(account.Id, adminUserID, &posture.Checks{
|
||||||
|
ID: postureCheckID,
|
||||||
|
Name: postureCheckName,
|
||||||
|
Checks: posture.ChecksDefinition{
|
||||||
|
NBVersionCheck: &posture.NBVersionCheck{
|
||||||
|
MinVersion: "0.27.0",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
// users should not be able to delete posture checks
|
||||||
|
err = am.DeletePostureChecks(account.Id, postureCheckID, regularUserID)
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
// admin should be able to delete posture checks
|
||||||
|
err = am.DeletePostureChecks(account.Id, postureCheckID, adminUserID)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
checks, err = am.ListPostureChecks(account.Id, adminUserID)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Len(t, checks, 0)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func initTestPostureChecksAccount(am *DefaultAccountManager) (*Account, error) {
|
||||||
|
accountID := "testingAccount"
|
||||||
|
domain := "example.com"
|
||||||
|
|
||||||
|
admin := &User{
|
||||||
|
Id: adminUserID,
|
||||||
|
Role: UserRoleAdmin,
|
||||||
|
}
|
||||||
|
user := &User{
|
||||||
|
Id: regularUserID,
|
||||||
|
Role: UserRoleUser,
|
||||||
|
}
|
||||||
|
|
||||||
|
account := newAccountWithId(accountID, groupAdminUserID, domain)
|
||||||
|
account.Users[admin.Id] = admin
|
||||||
|
account.Users[user.Id] = user
|
||||||
|
|
||||||
|
err := am.Store.SaveAccount(account)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return am.Store.GetAccount(account.Id)
|
||||||
|
}
|
@ -1014,7 +1014,7 @@ func createRouterManager(t *testing.T) (*DefaultAccountManager, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
eventStore := &activity.InMemoryEventStore{}
|
eventStore := &activity.InMemoryEventStore{}
|
||||||
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "", eventStore, false)
|
return BuildManager(store, NewPeersUpdateManager(nil), nil, "", "", eventStore, nil, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func createRouterStore(t *testing.T) (Store, error) {
|
func createRouterStore(t *testing.T) (Store, error) {
|
||||||
|
@ -16,6 +16,7 @@ import (
|
|||||||
nbdns "github.com/netbirdio/netbird/dns"
|
nbdns "github.com/netbirdio/netbird/dns"
|
||||||
"github.com/netbirdio/netbird/management/server/account"
|
"github.com/netbirdio/netbird/management/server/account"
|
||||||
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
||||||
|
"github.com/netbirdio/netbird/management/server/posture"
|
||||||
"github.com/netbirdio/netbird/management/server/status"
|
"github.com/netbirdio/netbird/management/server/status"
|
||||||
"github.com/netbirdio/netbird/management/server/telemetry"
|
"github.com/netbirdio/netbird/management/server/telemetry"
|
||||||
"github.com/netbirdio/netbird/route"
|
"github.com/netbirdio/netbird/route"
|
||||||
@ -63,7 +64,7 @@ func NewSqliteStore(dataDir string, metrics telemetry.AppMetrics) (*SqliteStore,
|
|||||||
err = db.AutoMigrate(
|
err = db.AutoMigrate(
|
||||||
&SetupKey{}, &nbpeer.Peer{}, &User{}, &PersonalAccessToken{}, &Group{}, &Rule{},
|
&SetupKey{}, &nbpeer.Peer{}, &User{}, &PersonalAccessToken{}, &Group{}, &Rule{},
|
||||||
&Account{}, &Policy{}, &PolicyRule{}, &route.Route{}, &nbdns.NameServerGroup{},
|
&Account{}, &Policy{}, &PolicyRule{}, &route.Route{}, &nbdns.NameServerGroup{},
|
||||||
&installation{}, &account.ExtraSettings{},
|
&installation{}, &account.ExtraSettings{}, &posture.Checks{},
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -261,6 +262,18 @@ func (s *SqliteStore) SavePeerStatus(accountID, peerID string, peerStatus nbpeer
|
|||||||
return s.db.Save(peer).Error
|
return s.db.Save(peer).Error
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *SqliteStore) SavePeerLocation(accountID string, peerWithLocation *nbpeer.Peer) error {
|
||||||
|
var peer nbpeer.Peer
|
||||||
|
result := s.db.First(&peer, "account_id = ? and id = ?", accountID, peerWithLocation.ID)
|
||||||
|
if result.Error != nil {
|
||||||
|
return status.Errorf(status.NotFound, "peer %s not found", peer.ID)
|
||||||
|
}
|
||||||
|
|
||||||
|
peer.Location = peerWithLocation.Location
|
||||||
|
|
||||||
|
return s.db.Save(peer).Error
|
||||||
|
}
|
||||||
|
|
||||||
// DeleteHashedPAT2TokenIDIndex is noop in Sqlite
|
// DeleteHashedPAT2TokenIDIndex is noop in Sqlite
|
||||||
func (s *SqliteStore) DeleteHashedPAT2TokenIDIndex(hashedToken string) error {
|
func (s *SqliteStore) DeleteHashedPAT2TokenIDIndex(hashedToken string) error {
|
||||||
return nil
|
return nil
|
||||||
@ -356,6 +369,7 @@ func (s *SqliteStore) GetAccount(accountID string) (*Account, error) {
|
|||||||
Preload(clause.Associations).
|
Preload(clause.Associations).
|
||||||
First(&account, "id = ?", accountID)
|
First(&account, "id = ?", accountID)
|
||||||
if result.Error != nil {
|
if result.Error != nil {
|
||||||
|
log.Errorf("when getting account from the store: %s", result.Error)
|
||||||
return nil, status.Errorf(status.NotFound, "account not found")
|
return nil, status.Errorf(status.NotFound, "account not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -212,6 +212,49 @@ func TestSqlite_SavePeerStatus(t *testing.T) {
|
|||||||
actual := account.Peers["testpeer"].Status
|
actual := account.Peers["testpeer"].Status
|
||||||
assert.Equal(t, newStatus, *actual)
|
assert.Equal(t, newStatus, *actual)
|
||||||
}
|
}
|
||||||
|
func TestSqlite_SavePeerLocation(t *testing.T) {
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
t.Skip("The SQLite store is not properly supported by Windows yet")
|
||||||
|
}
|
||||||
|
|
||||||
|
store := newSqliteStoreFromFile(t, "testdata/store.json")
|
||||||
|
|
||||||
|
account, err := store.GetAccount("bf1c8084-ba50-4ce7-9439-34653001fc3b")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
peer := &nbpeer.Peer{
|
||||||
|
AccountID: account.Id,
|
||||||
|
ID: "testpeer",
|
||||||
|
Location: nbpeer.Location{
|
||||||
|
ConnectionIP: net.ParseIP("0.0.0.0"),
|
||||||
|
CountryCode: "YY",
|
||||||
|
CityName: "City",
|
||||||
|
GeoNameID: 1,
|
||||||
|
},
|
||||||
|
Meta: nbpeer.PeerSystemMeta{},
|
||||||
|
}
|
||||||
|
// error is expected as peer is not in store yet
|
||||||
|
err = store.SavePeerLocation(account.Id, peer)
|
||||||
|
assert.Error(t, err)
|
||||||
|
|
||||||
|
account.Peers[peer.ID] = peer
|
||||||
|
err = store.SaveAccount(account)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
peer.Location.ConnectionIP = net.ParseIP("35.1.1.1")
|
||||||
|
peer.Location.CountryCode = "DE"
|
||||||
|
peer.Location.CityName = "Berlin"
|
||||||
|
peer.Location.GeoNameID = 2950159
|
||||||
|
|
||||||
|
err = store.SavePeerLocation(account.Id, account.Peers[peer.ID])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
|
||||||
|
account, err = store.GetAccount(account.Id)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
actual := account.Peers[peer.ID].Location
|
||||||
|
assert.Equal(t, peer.Location, actual)
|
||||||
|
}
|
||||||
|
|
||||||
func TestSqlite_TestGetAccountByPrivateDomain(t *testing.T) {
|
func TestSqlite_TestGetAccountByPrivateDomain(t *testing.T) {
|
||||||
if runtime.GOOS == "windows" {
|
if runtime.GOOS == "windows" {
|
||||||
|
@ -33,6 +33,7 @@ type Store interface {
|
|||||||
// AcquireGlobalLock should attempt to acquire a global lock and return a function that releases the lock
|
// AcquireGlobalLock should attempt to acquire a global lock and return a function that releases the lock
|
||||||
AcquireGlobalLock() func()
|
AcquireGlobalLock() func()
|
||||||
SavePeerStatus(accountID, peerID string, status nbpeer.PeerStatus) error
|
SavePeerStatus(accountID, peerID string, status nbpeer.PeerStatus) error
|
||||||
|
SavePeerLocation(accountID string, peer *nbpeer.Peer) error
|
||||||
SaveUserLastLogin(accountID, userID string, lastLogin time.Time) error
|
SaveUserLastLogin(accountID, userID string, lastLogin time.Time) error
|
||||||
// Close should close the store persisting all unsaved data.
|
// Close should close the store persisting all unsaved data.
|
||||||
Close() error
|
Close() error
|
||||||
|
BIN
management/server/testdata/GeoLite2-City-Test.mmdb
vendored
Normal file
BIN
management/server/testdata/GeoLite2-City-Test.mmdb
vendored
Normal file
Binary file not shown.
After Width: | Height: | Size: 21 KiB |
BIN
management/server/testdata/geonames-test.db
vendored
Normal file
BIN
management/server/testdata/geonames-test.db
vendored
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user