Files
elmprodvpn/selective-vpn-api/app/transport_handlers_policy_mutations_apply.go

261 lines
8.6 KiB
Go

package app
import (
"encoding/json"
"io"
"net/http"
"strings"
"time"
)
func handleTransportPoliciesApplyExec(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
var body TransportPolicyApplyRequest
if r.Body != nil {
defer r.Body.Close()
if err := json.NewDecoder(io.LimitReader(r.Body, 2<<20)).Decode(&body); err != nil && err != io.EOF {
http.Error(w, "bad json", http.StatusBadRequest)
return
}
}
idempotencyKey := normalizeTransportIdempotencyKey(r.Header.Get("Idempotency-Key"))
requestHash := hashTransportPolicyMutationRequest(body)
transportMu.Lock()
publishRuntimeSnapshot := false
defer func() {
transportMu.Unlock()
if publishRuntimeSnapshot {
publishTransportRuntimeObservabilitySnapshotChanged("transport_policy_applied", nil, nil)
}
}()
respond := func(resp TransportPolicyResponse) {
persistTransportPolicyIdempotencyLocked(transportPolicyIdempotencyApplyScope, idempotencyKey, requestHash, resp)
writeJSON(w, http.StatusOK, resp)
}
if lookup := lookupTransportPolicyIdempotencyLocked(transportPolicyIdempotencyApplyScope, idempotencyKey, requestHash); lookup.Replay || lookup.Conflict {
writeJSON(w, http.StatusOK, lookup.Response)
return
}
clientsState := loadTransportClientsState()
clients := transportPolicyClientsWithVirtualTargets(clientsState.Items)
current := loadTransportPolicyState()
locks := TransportOwnerLockState{}
if transportPolicyKernelConntrackStickyEnabled() {
locks = loadTransportOwnerLocksState()
}
if body.BaseRevision != current.Revision {
respond(TransportPolicyResponse{
OK: false,
Message: "stale policy revision",
Code: "POLICY_REVISION_MISMATCH",
CurrentRevision: current.Revision,
})
return
}
result := validateTransportPolicy(body.Intents, current.Intents, clients)
ownerSwitchConflicts := detectTransportOwnerSwitchConflicts(current.Intents, result.Normalized)
if len(ownerSwitchConflicts) > 0 {
result.Conflicts = append(result.Conflicts, ownerSwitchConflicts...)
result.Conflicts = dedupeTransportConflicts(result.Conflicts)
result.Summary = summarizeTransportConflicts(result.Conflicts)
result.Valid = result.Summary.BlockCount == 0
}
ownerLockConflicts := detectTransportOwnerLockConflicts(current.Intents, result.Normalized, clients)
if len(ownerLockConflicts) > 0 {
result.Conflicts = append(result.Conflicts, ownerLockConflicts...)
result.Conflicts = dedupeTransportConflicts(result.Conflicts)
result.Summary = summarizeTransportConflicts(result.Conflicts)
result.Valid = result.Summary.BlockCount == 0
}
destinationLockConflicts := detectTransportDestinationLockConflicts(current.Intents, result.Normalized, locks)
if len(destinationLockConflicts) > 0 {
result.Conflicts = append(result.Conflicts, destinationLockConflicts...)
result.Conflicts = dedupeTransportConflicts(result.Conflicts)
result.Summary = summarizeTransportConflicts(result.Conflicts)
result.Valid = result.Summary.BlockCount == 0
}
overridableBlocks, hardBlocks := splitTransportBlockingConflicts(result.Conflicts)
if len(hardBlocks) > 0 {
respond(TransportPolicyResponse{
OK: false,
Message: "policy has non-overridable blocking conflicts",
Code: "POLICY_CONFLICT_BLOCK",
Conflicts: result.Conflicts,
})
return
}
if len(overridableBlocks) > 0 && !body.Options.ForceOverride {
respond(TransportPolicyResponse{
OK: false,
Message: "policy requires explicit force override",
Code: "POLICY_FORCE_OVERRIDE_REQUIRED",
Conflicts: result.Conflicts,
})
return
}
plan, compileConflicts := compileTransportPolicyPlan(result.Normalized, clients, current.Revision+1)
mergedConflicts := append([]TransportConflictRecord{}, result.Conflicts...)
if len(compileConflicts) > 0 {
mergedConflicts = append(mergedConflicts, compileConflicts...)
mergedConflicts = dedupeTransportConflicts(mergedConflicts)
sum := summarizeTransportConflicts(mergedConflicts)
if sum.BlockCount > 0 {
respond(TransportPolicyResponse{
OK: false,
Message: "policy compile blocked by allocator/interface conflicts",
Code: "POLICY_COMPILE_BLOCK",
Conflicts: mergedConflicts,
Plan: &plan,
})
return
}
}
conflictsSummary := summarizeTransportConflicts(mergedConflicts)
digest := digestTransportIntents(result.Normalized)
if len(overridableBlocks) > 0 && body.Options.ForceOverride {
if !consumeTransportConfirmToken(strings.TrimSpace(body.Options.ConfirmToken), current.Revision, digest) {
respond(TransportPolicyResponse{
OK: false,
Message: "invalid or expired confirm token",
Code: "FORCE_OVERRIDE_CONFIRM_REQUIRED",
})
return
}
}
if err := saveTransportPolicySnapshot(current); err != nil {
respond(TransportPolicyResponse{
OK: false,
Message: "snapshot save failed: " + err.Error(),
})
return
}
next := TransportPolicyState{
Version: transportStateVersion,
Revision: current.Revision + 1,
UpdatedAt: time.Now().UTC().Format(time.RFC3339),
Intents: append([]TransportPolicyIntent(nil), result.Normalized...),
}
plan.PolicyRevision = next.Revision
applyID := "apl-" + newTransportToken(8)
appliedRuntime, err := applyTransportPolicyDataPlaneAtomicLocked(plan, applyID)
if err != nil {
respond(TransportPolicyResponse{
OK: false,
Message: "policy runtime apply failed: " + err.Error(),
Code: "POLICY_RUNTIME_APPLY_FAILED",
Plan: &plan,
})
return
}
healthCheck, updatedClients, clientsChanged := runTransportPolicyHealthCheck(clients, plan, time.Now().UTC())
if clientsChanged {
persistClients := transportPolicyPersistableClients(updatedClients)
if err := saveTransportClientsState(transportClientsState{
Version: transportStateVersion,
Items: persistClients,
}); err != nil {
_ = rollbackTransportPolicyRuntimeToSnapshot(appliedRuntime)
respond(TransportPolicyResponse{
OK: false,
Message: "health-check client state save failed: " + err.Error(),
Code: "POLICY_HEALTHCHECK_SAVE_FAILED",
Plan: &plan,
HealthCheck: &healthCheck,
})
return
}
clients = updatedClients
}
if !healthCheck.OK {
rollbackErr := rollbackTransportPolicyRuntimeToSnapshot(appliedRuntime)
msg := healthCheck.Message
if rollbackErr != nil {
msg = strings.TrimSpace(msg + "; runtime rollback failed: " + rollbackErr.Error())
}
events.push("transport_policy_healthcheck_failed", map[string]any{
"apply_id": applyID,
"policy_revision": next.Revision,
"failed_count": healthCheck.FailedCount,
})
respond(TransportPolicyResponse{
OK: false,
Message: msg,
Code: "POLICY_HEALTHCHECK_FAILED",
Plan: &plan,
HealthCheck: &healthCheck,
})
return
}
events.push("transport_policy_healthcheck_passed", map[string]any{
"apply_id": applyID,
"policy_revision": next.Revision,
"checked_count": healthCheck.CheckedCount,
})
if err := saveTransportPolicyState(next); err != nil {
respond(TransportPolicyResponse{
OK: false,
Message: "policy save failed: " + err.Error(),
})
return
}
if err := saveTransportPolicyCompilePlan(plan); err != nil {
respond(TransportPolicyResponse{
OK: false,
Message: "policy plan save failed: " + err.Error(),
Code: "POLICY_PLAN_SAVE_FAILED",
})
return
}
ownership := buildTransportOwnershipStateFromPlan(plan, next.Revision)
if err := saveTransportOwnershipState(ownership); err != nil {
respond(TransportPolicyResponse{
OK: false,
Message: "ownership save failed: " + err.Error(),
Code: "POLICY_OWNERSHIP_SAVE_FAILED",
})
return
}
conflicts := TransportConflictState{
Version: transportStateVersion,
UpdatedAt: time.Now().UTC().Format(time.RFC3339),
HasBlocking: conflictsSummary.BlockCount > 0,
Items: append([]TransportConflictRecord(nil), mergedConflicts...),
}
_ = saveTransportConflictsState(conflicts)
events.push("transport_policy_applied", map[string]any{
"apply_id": applyID,
"policy_revision": next.Revision,
"iface_count": plan.InterfaceCount,
"rule_count": plan.RuleCount,
})
if conflictsSummary.BlockCount > 0 {
events.push("transport_conflict_detected", map[string]any{
"count": conflictsSummary.BlockCount,
})
}
publishRuntimeSnapshot = true
respond(TransportPolicyResponse{
OK: true,
Message: "policy applied",
PolicyRevision: next.Revision,
ApplyID: applyID,
RollbackAvailable: true,
Plan: &plan,
HealthCheck: &healthCheck,
})
}