acls.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "net/url"
  7. "time"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/logger"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/mq"
  13. )
  14. func aclHandlers(r *mux.Router) {
  15. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(getAcls))).
  16. Methods(http.MethodGet)
  17. r.HandleFunc("/api/v1/acls/policy_types", logic.SecurityCheck(true, http.HandlerFunc(aclPolicyTypes))).
  18. Methods(http.MethodGet)
  19. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(createAcl))).
  20. Methods(http.MethodPost)
  21. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(updateAcl))).
  22. Methods(http.MethodPut)
  23. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(deleteAcl))).
  24. Methods(http.MethodDelete)
  25. r.HandleFunc("/api/v1/acls/debug", logic.SecurityCheck(true, http.HandlerFunc(aclDebug))).
  26. Methods(http.MethodGet)
  27. }
  28. // @Summary List Acl Policy types
  29. // @Router /api/v1/acls/policy_types [get]
  30. // @Tags ACL
  31. // @Accept json
  32. // @Success 200 {array} models.SuccessResponse
  33. // @Failure 500 {object} models.ErrorResponse
  34. func aclPolicyTypes(w http.ResponseWriter, r *http.Request) {
  35. resp := models.AclPolicyTypes{
  36. RuleTypes: []models.AclPolicyType{
  37. models.DevicePolicy,
  38. models.UserPolicy,
  39. },
  40. SrcGroupTypes: []models.AclGroupType{
  41. models.UserAclID,
  42. models.UserGroupAclID,
  43. models.DeviceAclID,
  44. },
  45. DstGroupTypes: []models.AclGroupType{
  46. models.DeviceAclID,
  47. // models.NetmakerIPAclID,
  48. // models.NetmakerSubNetRangeAClID,
  49. },
  50. }
  51. logic.ReturnSuccessResponseWithJson(w, r, resp, "fetched acls types")
  52. }
  53. func aclDebug(w http.ResponseWriter, r *http.Request) {
  54. nodeID, _ := url.QueryUnescape(r.URL.Query().Get("node"))
  55. peerID, _ := url.QueryUnescape(r.URL.Query().Get("peer"))
  56. node, err := logic.GetNodeByID(nodeID)
  57. if err != nil {
  58. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  59. return
  60. }
  61. peer, err := logic.GetNodeByID(peerID)
  62. if err != nil {
  63. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  64. return
  65. }
  66. allowed := logic.IsNodeAllowedToCommunicate(node, peer)
  67. logic.ReturnSuccessResponseWithJson(w, r, allowed, "fetched all acls in the network ")
  68. }
  69. // @Summary List Acls in a network
  70. // @Router /api/v1/acls [get]
  71. // @Tags ACL
  72. // @Accept json
  73. // @Success 200 {array} models.SuccessResponse
  74. // @Failure 500 {object} models.ErrorResponse
  75. func getAcls(w http.ResponseWriter, r *http.Request) {
  76. netID, _ := url.QueryUnescape(r.URL.Query().Get("network"))
  77. if netID == "" {
  78. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("network id param is missing"), "badrequest"))
  79. return
  80. }
  81. // check if network exists
  82. _, err := logic.GetNetwork(netID)
  83. if err != nil {
  84. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  85. return
  86. }
  87. acls, err := logic.ListAcls(models.NetworkID(netID))
  88. if err != nil {
  89. logger.Log(0, r.Header.Get("user"), "failed to get all network acl entries: ", err.Error())
  90. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  91. return
  92. }
  93. logic.SortAclEntrys(acls[:])
  94. logic.ReturnSuccessResponseWithJson(w, r, acls, "fetched all acls in the network "+netID)
  95. }
  96. // @Summary Create Acl
  97. // @Router /api/v1/acls [post]
  98. // @Tags ACL
  99. // @Accept json
  100. // @Success 200 {array} models.SuccessResponse
  101. // @Failure 500 {object} models.ErrorResponse
  102. func createAcl(w http.ResponseWriter, r *http.Request) {
  103. var req models.Acl
  104. err := json.NewDecoder(r.Body).Decode(&req)
  105. if err != nil {
  106. logger.Log(0, "error decoding request body: ",
  107. err.Error())
  108. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  109. return
  110. }
  111. user, err := logic.GetUser(r.Header.Get("user"))
  112. if err != nil {
  113. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  114. return
  115. }
  116. err = logic.ValidateCreateAclReq(req)
  117. if err != nil {
  118. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  119. return
  120. }
  121. acl := req
  122. acl.GetID(req.NetworkID, req.Name)
  123. acl.CreatedBy = user.UserName
  124. acl.CreatedAt = time.Now().UTC()
  125. acl.Default = false
  126. if acl.RuleType == models.DevicePolicy {
  127. acl.AllowedDirection = models.TrafficDirectionBi
  128. } else {
  129. acl.AllowedDirection = models.TrafficDirectionUni
  130. }
  131. // validate create acl policy
  132. if !logic.IsAclPolicyValid(acl) {
  133. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  134. return
  135. }
  136. err = logic.InsertAcl(acl)
  137. if err != nil {
  138. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  139. return
  140. }
  141. acl, err = logic.GetAcl(acl.ID)
  142. if err != nil {
  143. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  144. return
  145. }
  146. go mq.PublishPeerUpdate(false)
  147. logic.ReturnSuccessResponseWithJson(w, r, acl, "created acl successfully")
  148. }
  149. // @Summary Update Acl
  150. // @Router /api/v1/acls [put]
  151. // @Tags ACL
  152. // @Accept json
  153. // @Success 200 {array} models.SuccessResponse
  154. // @Failure 500 {object} models.ErrorResponse
  155. func updateAcl(w http.ResponseWriter, r *http.Request) {
  156. var updateAcl models.UpdateAclRequest
  157. err := json.NewDecoder(r.Body).Decode(&updateAcl)
  158. if err != nil {
  159. logger.Log(0, "error decoding request body: ",
  160. err.Error())
  161. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  162. return
  163. }
  164. acl, err := logic.GetAcl(updateAcl.ID)
  165. if err != nil {
  166. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  167. return
  168. }
  169. if !logic.IsAclPolicyValid(updateAcl.Acl) {
  170. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  171. return
  172. }
  173. if updateAcl.Acl.NetworkID != acl.NetworkID {
  174. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy, network id mismatch"), "badrequest"))
  175. return
  176. }
  177. if !acl.Default && updateAcl.NewName != "" {
  178. //check if policy exists with same name
  179. id := models.FormatAclID(updateAcl.NetworkID, updateAcl.NewName)
  180. _, err := logic.GetAcl(id)
  181. if err == nil {
  182. logic.ReturnErrorResponse(w, r,
  183. logic.FormatError(errors.New("policy already exists with name "+updateAcl.NewName), "badrequest"))
  184. return
  185. }
  186. updateAcl.ID = id
  187. updateAcl.Acl.Name = updateAcl.NewName
  188. }
  189. err = logic.UpdateAcl(updateAcl.Acl, acl)
  190. if err != nil {
  191. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  192. return
  193. }
  194. go mq.PublishPeerUpdate(false)
  195. logic.ReturnSuccessResponse(w, r, "updated acl "+acl.Name)
  196. }
  197. // @Summary Delete Acl
  198. // @Router /api/v1/acls [delete]
  199. // @Tags ACL
  200. // @Accept json
  201. // @Success 200 {array} models.SuccessResponse
  202. // @Failure 500 {object} models.ErrorResponse
  203. func deleteAcl(w http.ResponseWriter, r *http.Request) {
  204. aclID, _ := url.QueryUnescape(r.URL.Query().Get("acl_id"))
  205. if aclID == "" {
  206. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("acl id is required"), "badrequest"))
  207. return
  208. }
  209. acl, err := logic.GetAcl(models.AclID(aclID))
  210. if err != nil {
  211. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  212. return
  213. }
  214. if acl.Default {
  215. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("cannot delete default policy"), "badrequest"))
  216. return
  217. }
  218. err = logic.DeleteAcl(acl)
  219. if err != nil {
  220. logic.ReturnErrorResponse(w, r,
  221. logic.FormatError(errors.New("cannot delete default policy"), "internal"))
  222. return
  223. }
  224. go mq.PublishPeerUpdate(false)
  225. logic.ReturnSuccessResponse(w, r, "deleted acl "+acl.Name)
  226. }