server.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. package controller
  2. import (
  3. "crypto/ed25519"
  4. "crypto/x509"
  5. "crypto/x509/pkix"
  6. "encoding/json"
  7. "fmt"
  8. "net/http"
  9. "strings"
  10. "github.com/gorilla/mux"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/logic"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/netclient/config"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "github.com/gravitl/netmaker/serverctl"
  17. "github.com/gravitl/netmaker/tls"
  18. )
  19. func serverHandlers(r *mux.Router) {
  20. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods("POST")
  21. r.HandleFunc("/api/server/getconfig", securityCheckServer(false, http.HandlerFunc(getConfig))).Methods("GET")
  22. r.HandleFunc("/api/server/removenetwork/{network}", securityCheckServer(true, http.HandlerFunc(removeNetwork))).Methods("DELETE")
  23. r.HandleFunc("/api/server/register", authorize(true, false, "node", http.HandlerFunc(register))).Methods("POST")
  24. r.HandleFunc("/api/server/getserverinfo", authorize(true, false, "node", http.HandlerFunc(getServerInfo))).Methods("GET")
  25. }
  26. //Security check is middleware for every function and just checks to make sure that its the master calling
  27. //Only admin should have access to all these network-level actions
  28. //or maybe some Users once implemented
  29. func securityCheckServer(adminonly bool, next http.Handler) http.HandlerFunc {
  30. return func(w http.ResponseWriter, r *http.Request) {
  31. var errorResponse = models.ErrorResponse{
  32. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  33. }
  34. bearerToken := r.Header.Get("Authorization")
  35. var tokenSplit = strings.Split(bearerToken, " ")
  36. var authToken = ""
  37. if len(tokenSplit) < 2 {
  38. errorResponse = models.ErrorResponse{
  39. Code: http.StatusUnauthorized, Message: "W1R3: You are unauthorized to access this endpoint.",
  40. }
  41. returnErrorResponse(w, r, errorResponse)
  42. return
  43. } else {
  44. authToken = tokenSplit[1]
  45. }
  46. //all endpoints here require master so not as complicated
  47. //still might not be a good way of doing this
  48. user, _, isadmin, err := logic.VerifyUserToken(authToken)
  49. errorResponse = models.ErrorResponse{
  50. Code: http.StatusUnauthorized, Message: "W1R3: You are unauthorized to access this endpoint.",
  51. }
  52. if !adminonly && (err != nil || user == "") {
  53. returnErrorResponse(w, r, errorResponse)
  54. return
  55. }
  56. if adminonly && !isadmin && !authenticateMaster(authToken) {
  57. returnErrorResponse(w, r, errorResponse)
  58. return
  59. }
  60. next.ServeHTTP(w, r)
  61. }
  62. }
  63. // swagger:route DELETE /api/server/removenetwork/{network} nodes removeNetwork
  64. //
  65. // Remove a network from the server.
  66. //
  67. // Schemes: https
  68. //
  69. // Security:
  70. // oauth
  71. func removeNetwork(w http.ResponseWriter, r *http.Request) {
  72. // Set header
  73. w.Header().Set("Content-Type", "application/json")
  74. // get params
  75. var params = mux.Vars(r)
  76. network := params["network"]
  77. err := logic.DeleteNetwork(network)
  78. if err != nil {
  79. logger.Log(0, r.Header.Get("user"),
  80. fmt.Sprintf("failed to delete network [%s]: %v", network, err))
  81. json.NewEncoder(w).Encode(fmt.Sprintf("could not remove network %s from server", network))
  82. return
  83. }
  84. logger.Log(1, r.Header.Get("user"),
  85. fmt.Sprintf("deleted network [%s]: %v", network, err))
  86. json.NewEncoder(w).Encode(fmt.Sprintf("network %s removed from server", network))
  87. }
  88. // swagger:route GET /api/server/getserverinfo nodes getServerInfo
  89. //
  90. // Get the server configuration.
  91. //
  92. // Schemes: https
  93. //
  94. // Security:
  95. // oauth
  96. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  97. // Set header
  98. w.Header().Set("Content-Type", "application/json")
  99. // get params
  100. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  101. //w.WriteHeader(http.StatusOK)
  102. }
  103. // swagger:route GET /api/server/getconfig nodes getConfig
  104. //
  105. // Get the server configuration.
  106. //
  107. // Schemes: https
  108. //
  109. // Security:
  110. // oauth
  111. func getConfig(w http.ResponseWriter, r *http.Request) {
  112. // Set header
  113. w.Header().Set("Content-Type", "application/json")
  114. // get params
  115. scfg := servercfg.GetServerConfig()
  116. json.NewEncoder(w).Encode(scfg)
  117. //w.WriteHeader(http.StatusOK)
  118. }
  119. // swagger:route POST /api/server/register nodes register
  120. //
  121. // Registers a client with the server and return the Certificate Authority and certificate
  122. //
  123. // Schemes: https
  124. //
  125. // Security:
  126. // oauth
  127. func register(w http.ResponseWriter, r *http.Request) {
  128. logger.Log(2, "processing registration request")
  129. w.Header().Set("Content-Type", "application/json")
  130. //decode body
  131. var request config.RegisterRequest
  132. if err := json.NewDecoder(r.Body).Decode(&request); err != nil {
  133. logger.Log(0, "error decoding request", err.Error())
  134. errorResponse := models.ErrorResponse{
  135. Code: http.StatusBadRequest, Message: err.Error(),
  136. }
  137. returnErrorResponse(w, r, errorResponse)
  138. return
  139. }
  140. cert, ca, err := genCerts(&request.Key, &request.CommonName)
  141. if err != nil {
  142. logger.Log(0, "failed to generater certs ", err.Error())
  143. errorResponse := models.ErrorResponse{
  144. Code: http.StatusNotFound, Message: err.Error(),
  145. }
  146. returnErrorResponse(w, r, errorResponse)
  147. return
  148. }
  149. //x509.Certificate.PublicKey is an interface therefore json encoding/decoding result in a string value rather than a []byte
  150. //include the actual public key so the certificate can be properly reassembled on the other end.
  151. response := config.RegisterResponse{
  152. CA: *ca,
  153. CAPubKey: (ca.PublicKey).(ed25519.PublicKey),
  154. Cert: *cert,
  155. CertPubKey: (cert.PublicKey).(ed25519.PublicKey),
  156. Broker: servercfg.GetServer(),
  157. Port: servercfg.GetMQPort(),
  158. }
  159. logger.Log(2, r.Header.Get("user"),
  160. fmt.Sprintf("registered client [%+v] with server", request))
  161. w.WriteHeader(http.StatusOK)
  162. json.NewEncoder(w).Encode(response)
  163. }
  164. // genCerts generates a client certificate and returns the certificate and root CA
  165. func genCerts(clientKey *ed25519.PrivateKey, name *pkix.Name) (*x509.Certificate, *x509.Certificate, error) {
  166. ca, err := serverctl.ReadCertFromDB(tls.ROOT_PEM_NAME)
  167. if err != nil {
  168. logger.Log(2, "root ca not found ", err.Error())
  169. return nil, nil, fmt.Errorf("root ca not found %w", err)
  170. }
  171. key, err := serverctl.ReadKeyFromDB(tls.ROOT_KEY_NAME)
  172. if err != nil {
  173. logger.Log(2, "root key not found ", err.Error())
  174. return nil, nil, fmt.Errorf("root key not found %w", err)
  175. }
  176. csr, err := tls.NewCSR(*clientKey, *name)
  177. if err != nil {
  178. logger.Log(2, "failed to generate client certificate requests", err.Error())
  179. return nil, nil, fmt.Errorf("client certification request generation failed %w", err)
  180. }
  181. cert, err := tls.NewEndEntityCert(*key, csr, ca, tls.CERTIFICATE_VALIDITY)
  182. if err != nil {
  183. logger.Log(2, "unable to generate client certificate", err.Error())
  184. return nil, nil, fmt.Errorf("client certification generation failed %w", err)
  185. }
  186. return cert, ca, nil
  187. }