license.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241
  1. //go:build ee
  2. // +build ee
  3. package ee
  4. import (
  5. "bytes"
  6. "crypto/rand"
  7. "encoding/json"
  8. "fmt"
  9. "io"
  10. "math"
  11. "net/http"
  12. "github.com/gravitl/netmaker/database"
  13. "github.com/gravitl/netmaker/logger"
  14. "github.com/gravitl/netmaker/logic"
  15. "github.com/gravitl/netmaker/netclient/ncutils"
  16. "github.com/gravitl/netmaker/servercfg"
  17. "golang.org/x/crypto/nacl/box"
  18. )
  19. const (
  20. db_license_key = "netmaker-id-key-pair"
  21. )
  22. type apiServerConf struct {
  23. PrivateKey []byte `json:"private_key" binding:"required"`
  24. PublicKey []byte `json:"public_key" binding:"required"`
  25. }
  26. // AddLicenseHooks - adds the validation and cache clear hooks
  27. func AddLicenseHooks() {
  28. logic.AddHook(ValidateLicense)
  29. logic.AddHook(ClearLicenseCache)
  30. }
  31. // ValidateLicense - the initial license check for netmaker server
  32. // checks if a license is valid + limits are not exceeded
  33. // if license is free_tier and limits exceeds, then server should terminate
  34. // if license is not valid, server should terminate
  35. func ValidateLicense() error {
  36. licenseKeyValue := servercfg.GetLicenseKey()
  37. netmakerAccountID := servercfg.GetNetmakerAccountID()
  38. logger.Log(0, "proceeding with Netmaker license validation...")
  39. if len(licenseKeyValue) == 0 || len(netmakerAccountID) == 0 {
  40. logger.FatalLog(errValidation.Error())
  41. }
  42. apiPublicKey, err := getLicensePublicKey(licenseKeyValue)
  43. if err != nil {
  44. logger.FatalLog(errValidation.Error())
  45. }
  46. tempPubKey, tempPrivKey, err := FetchApiServerKeys()
  47. if err != nil {
  48. logger.FatalLog(errValidation.Error())
  49. }
  50. licenseSecret := LicenseSecret{
  51. UserID: netmakerAccountID,
  52. Limits: getCurrentServerLimit(),
  53. }
  54. secretData, err := json.Marshal(&licenseSecret)
  55. if err != nil {
  56. logger.FatalLog(errValidation.Error())
  57. }
  58. encryptedData, err := ncutils.BoxEncrypt(secretData, apiPublicKey, tempPrivKey)
  59. if err != nil {
  60. logger.FatalLog(errValidation.Error())
  61. }
  62. validationResponse, err := validateLicenseKey(encryptedData, tempPubKey)
  63. if err != nil || len(validationResponse) == 0 {
  64. logger.FatalLog(errValidation.Error())
  65. }
  66. var licenseResponse ValidatedLicense
  67. if err = json.Unmarshal(validationResponse, &licenseResponse); err != nil {
  68. logger.FatalLog(errValidation.Error())
  69. }
  70. respData, err := ncutils.BoxDecrypt(base64decode(licenseResponse.EncryptedLicense), apiPublicKey, tempPrivKey)
  71. if err != nil {
  72. logger.FatalLog(errValidation.Error())
  73. }
  74. license := LicenseKey{}
  75. if err = json.Unmarshal(respData, &license); err != nil {
  76. logger.FatalLog(errValidation.Error())
  77. }
  78. Limits.Networks = math.MaxInt
  79. Limits.FreeTier = license.FreeTier == "yes"
  80. Limits.Clients = license.LimitClients
  81. Limits.Nodes = license.LimitNodes
  82. Limits.Servers = license.LimitServers
  83. Limits.Users = license.LimitUsers
  84. if Limits.FreeTier {
  85. Limits.Networks = 3
  86. }
  87. setControllerLimits()
  88. logger.Log(0, "License validation succeeded!")
  89. return nil
  90. }
  91. // FetchApiServerKeys - fetches netmaker license keys for identification
  92. // as well as secure communication with API
  93. // if none present, it generates a new pair
  94. func FetchApiServerKeys() (pub *[32]byte, priv *[32]byte, err error) {
  95. var returnData = apiServerConf{}
  96. currentData, err := database.FetchRecord(database.SERVERCONF_TABLE_NAME, db_license_key)
  97. if err != nil && !database.IsEmptyRecord(err) {
  98. return nil, nil, err
  99. } else if database.IsEmptyRecord(err) { // need to generate a new identifier pair
  100. pub, priv, err = box.GenerateKey(rand.Reader)
  101. if err != nil {
  102. return nil, nil, err
  103. }
  104. pubBytes, err := ncutils.ConvertKeyToBytes(pub)
  105. if err != nil {
  106. return nil, nil, err
  107. }
  108. privBytes, err := ncutils.ConvertKeyToBytes(priv)
  109. if err != nil {
  110. return nil, nil, err
  111. }
  112. returnData.PrivateKey = privBytes
  113. returnData.PublicKey = pubBytes
  114. record, err := json.Marshal(&returnData)
  115. if err != nil {
  116. return nil, nil, err
  117. }
  118. if err = database.Insert(db_license_key, string(record), database.SERVERCONF_TABLE_NAME); err != nil {
  119. return nil, nil, err
  120. }
  121. } else {
  122. if err = json.Unmarshal([]byte(currentData), &returnData); err != nil {
  123. return nil, nil, err
  124. }
  125. priv, err = ncutils.ConvertBytesToKey(returnData.PrivateKey)
  126. if err != nil {
  127. return nil, nil, err
  128. }
  129. pub, err = ncutils.ConvertBytesToKey(returnData.PublicKey)
  130. if err != nil {
  131. return nil, nil, err
  132. }
  133. }
  134. return pub, priv, nil
  135. }
  136. func getLicensePublicKey(licensePubKeyEncoded string) (*[32]byte, error) {
  137. decodedPubKey := base64decode(licensePubKeyEncoded)
  138. return ncutils.ConvertBytesToKey(decodedPubKey)
  139. }
  140. func validateLicenseKey(encryptedData []byte, publicKey *[32]byte) ([]byte, error) {
  141. publicKeyBytes, err := ncutils.ConvertKeyToBytes(publicKey)
  142. if err != nil {
  143. return nil, err
  144. }
  145. msg := ValidateLicenseRequest{
  146. NmServerPubKey: base64encode(publicKeyBytes),
  147. EncryptedPart: base64encode(encryptedData),
  148. }
  149. requestBody, err := json.Marshal(msg)
  150. if err != nil {
  151. return nil, err
  152. }
  153. req, err := http.NewRequest(http.MethodPost, api_endpoint, bytes.NewReader(requestBody))
  154. if err != nil {
  155. return nil, err
  156. }
  157. reqParams := req.URL.Query()
  158. reqParams.Add("licensevalue", servercfg.GetLicenseKey())
  159. req.URL.RawQuery = reqParams.Encode()
  160. req.Header.Add("Content-Type", "application/json")
  161. req.Header.Add("Accept", "application/json")
  162. client := &http.Client{}
  163. var body []byte
  164. validateResponse, err := client.Do(req)
  165. if err != nil { // check cache
  166. body, err = getCachedResponse()
  167. if err != nil {
  168. return nil, err
  169. }
  170. logger.Log(3, "proceeding with cached response, Netmaker API may be down")
  171. } else {
  172. defer validateResponse.Body.Close()
  173. if validateResponse.StatusCode != 200 {
  174. return nil, fmt.Errorf("could not validate license")
  175. } // if you received a 200 cache the response locally
  176. body, err = io.ReadAll(validateResponse.Body)
  177. if err != nil {
  178. return nil, err
  179. }
  180. cacheResponse(body)
  181. }
  182. return body, err
  183. }
  184. func cacheResponse(response []byte) error {
  185. var lrc = licenseResponseCache{
  186. Body: response,
  187. }
  188. record, err := json.Marshal(&lrc)
  189. if err != nil {
  190. return err
  191. }
  192. return database.Insert(license_cache_key, string(record), database.CACHE_TABLE_NAME)
  193. }
  194. func getCachedResponse() ([]byte, error) {
  195. var lrc licenseResponseCache
  196. record, err := database.FetchRecord(database.CACHE_TABLE_NAME, license_cache_key)
  197. if err != nil {
  198. return nil, err
  199. }
  200. if err = json.Unmarshal([]byte(record), &lrc); err != nil {
  201. return nil, err
  202. }
  203. return lrc.Body, nil
  204. }
  205. // ClearLicenseCache - clears the cached validate response
  206. func ClearLicenseCache() error {
  207. return database.DeleteRecord(database.CACHE_TABLE_NAME, license_cache_key)
  208. }