mirror of
https://github.com/netbirdio/netbird.git
synced 2026-03-31 06:34:14 -04:00
172 lines
5.8 KiB
Go
172 lines
5.8 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/netbirdio/netbird/management/server/integrations/integrated_validator"
|
|
nbpeer "github.com/netbirdio/netbird/management/server/peer"
|
|
"github.com/netbirdio/netbird/management/server/store"
|
|
"github.com/netbirdio/netbird/management/server/types"
|
|
)
|
|
|
|
// UpdateIntegratedValidator updates the integrated validator groups for a specified account.
|
|
// It retrieves the account associated with the provided userID, then updates the integrated validator groups
|
|
// with the provided list of group ids. The updated account is then saved.
|
|
//
|
|
// Parameters:
|
|
// - accountID: The ID of the account for which integrated validator groups are to be updated.
|
|
// - userID: The ID of the user whose account is being updated.
|
|
// - validator: The validator type to use, or empty to remove.
|
|
// - groups: A slice of strings representing the ids of integrated validator groups to be updated.
|
|
//
|
|
// Returns:
|
|
// - error: An error if any occurred during the process, otherwise returns nil
|
|
func (am *DefaultAccountManager) UpdateIntegratedValidator(ctx context.Context, accountID, userID, validator string, groups []string) error {
|
|
if validator != "" && len(groups) == 0 {
|
|
return fmt.Errorf("at least one group must be specified for validator")
|
|
}
|
|
|
|
if validator != "" {
|
|
ok, err := am.GroupValidation(ctx, accountID, groups)
|
|
if err != nil {
|
|
log.WithContext(ctx).Debugf("error validating groups: %s", err.Error())
|
|
return err
|
|
}
|
|
|
|
if !ok {
|
|
log.WithContext(ctx).Debugf("invalid groups")
|
|
return errors.New("invalid groups")
|
|
}
|
|
} else {
|
|
// ensure groups is empty
|
|
groups = []string{}
|
|
}
|
|
|
|
return am.Store.ExecuteInTransaction(ctx, func(transaction store.Store) error {
|
|
settings, err := transaction.GetAccountSettings(ctx, store.LockingStrengthUpdate, accountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var extra *types.ExtraSettings
|
|
|
|
if settings.Extra != nil {
|
|
extra = settings.Extra
|
|
} else {
|
|
extra = &types.ExtraSettings{}
|
|
settings.Extra = extra
|
|
}
|
|
|
|
extra.IntegratedValidator = validator
|
|
extra.IntegratedValidatorGroups = groups
|
|
return transaction.SaveAccountSettings(ctx, accountID, settings)
|
|
})
|
|
}
|
|
|
|
func (am *DefaultAccountManager) GroupValidation(ctx context.Context, accountID string, groupIDs []string) (bool, error) {
|
|
if len(groupIDs) == 0 {
|
|
return true, nil
|
|
}
|
|
|
|
err := am.Store.ExecuteInTransaction(ctx, func(transaction store.Store) error {
|
|
for _, groupID := range groupIDs {
|
|
_, err := transaction.GetGroupByID(context.Background(), store.LockingStrengthNone, accountID, groupID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
func (am *DefaultAccountManager) GetValidatedPeers(ctx context.Context, accountID string) (map[string]struct{}, map[string]string, error) {
|
|
var err error
|
|
var groups []*types.Group
|
|
var peers []*nbpeer.Peer
|
|
var settings *types.Settings
|
|
|
|
groups, err = am.Store.GetAccountGroups(ctx, store.LockingStrengthNone, accountID)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
peers, err = am.Store.GetAccountPeers(ctx, store.LockingStrengthNone, accountID, "", "")
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
settings, err = am.Store.GetAccountSettings(ctx, store.LockingStrengthNone, accountID)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
validPeers, err := am.integratedPeerValidator.GetValidatedPeers(ctx, accountID, groups, peers, settings.Extra)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
invalidPeers, err := am.integratedPeerValidator.GetInvalidPeers(ctx, accountID, settings.Extra)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
return validPeers, invalidPeers, nil
|
|
}
|
|
|
|
type MockIntegratedValidator struct {
|
|
integrated_validator.IntegratedValidator
|
|
ValidatePeerFunc func(_ context.Context, update *nbpeer.Peer, peer *nbpeer.Peer, userID string, accountID string, dnsDomain string, peersGroup []string, extraSettings *types.ExtraSettings) (*nbpeer.Peer, bool, error)
|
|
}
|
|
|
|
func (a MockIntegratedValidator) ValidateExtraSettings(_ context.Context, newExtraSettings *types.ExtraSettings, oldExtraSettings *types.ExtraSettings, userID string, accountID string) error {
|
|
return nil
|
|
}
|
|
|
|
func (a MockIntegratedValidator) ValidatePeer(_ context.Context, update *nbpeer.Peer, peer *nbpeer.Peer, userID string, accountID string, dnsDomain string, peersGroup []string, extraSettings *types.ExtraSettings) (*nbpeer.Peer, bool, error) {
|
|
if a.ValidatePeerFunc != nil {
|
|
return a.ValidatePeerFunc(context.Background(), update, peer, userID, accountID, dnsDomain, peersGroup, extraSettings)
|
|
}
|
|
return update, false, nil
|
|
}
|
|
|
|
func (a MockIntegratedValidator) GetValidatedPeers(_ context.Context, accountID string, groups []*types.Group, peers []*nbpeer.Peer, extraSettings *types.ExtraSettings) (map[string]struct{}, error) {
|
|
validatedPeers := make(map[string]struct{})
|
|
for _, peer := range peers {
|
|
validatedPeers[peer.ID] = struct{}{}
|
|
}
|
|
return validatedPeers, nil
|
|
}
|
|
|
|
func (a MockIntegratedValidator) GetInvalidPeers(_ context.Context, accountID string, extraSettings *types.ExtraSettings) (map[string]string, error) {
|
|
return make(map[string]string), nil
|
|
}
|
|
|
|
func (MockIntegratedValidator) PreparePeer(_ context.Context, accountID string, peer *nbpeer.Peer, peersGroup []string, extraSettings *types.ExtraSettings, temporary bool) *nbpeer.Peer {
|
|
return peer
|
|
}
|
|
|
|
func (MockIntegratedValidator) IsNotValidPeer(_ context.Context, accountID string, peer *nbpeer.Peer, peersGroup []string, extraSettings *types.ExtraSettings) (bool, bool, error) {
|
|
return false, false, nil
|
|
}
|
|
|
|
func (MockIntegratedValidator) PeerDeleted(_ context.Context, _, _ string, extraSettings *types.ExtraSettings) error {
|
|
return nil
|
|
}
|
|
|
|
func (MockIntegratedValidator) SetPeerInvalidationListener(func(accountID string, peerIDs []string)) {
|
|
// just a dummy
|
|
}
|
|
|
|
func (MockIntegratedValidator) Stop(_ context.Context) {
|
|
// just a dummy
|
|
}
|