auth_grpc.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. package controller
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/functions"
  8. nodepb "github.com/gravitl/netmaker/grpc"
  9. "github.com/gravitl/netmaker/logic"
  10. "github.com/gravitl/netmaker/models"
  11. "golang.org/x/crypto/bcrypt"
  12. "google.golang.org/grpc"
  13. "google.golang.org/grpc/codes"
  14. "google.golang.org/grpc/metadata"
  15. "google.golang.org/grpc/status"
  16. )
  17. // AuthServerUnaryInterceptor - auth unary interceptor logic
  18. func AuthServerUnaryInterceptor(ctx context.Context,
  19. req interface{},
  20. info *grpc.UnaryServerInfo,
  21. handler grpc.UnaryHandler) (interface{}, error) {
  22. // Skip authorize when GetJWT is requested
  23. if info.FullMethod != "/node.NodeService/Login" {
  24. if info.FullMethod != "/node.NodeService/CreateNode" {
  25. err := grpcAuthorize(ctx)
  26. if err != nil {
  27. return nil, err
  28. }
  29. }
  30. }
  31. // Calls the handler
  32. h, err := handler(ctx, req)
  33. return h, err
  34. }
  35. // AuthServerStreamInterceptor - auth stream interceptor
  36. func AuthServerStreamInterceptor(
  37. srv interface{},
  38. stream grpc.ServerStream,
  39. info *grpc.StreamServerInfo,
  40. handler grpc.StreamHandler,
  41. ) error {
  42. if info.FullMethod == "/node.NodeService/GetPeers" {
  43. if err := grpcAuthorize(stream.Context()); err != nil {
  44. return err
  45. }
  46. }
  47. // Calls the handler
  48. return handler(srv, stream)
  49. }
  50. func grpcAuthorize(ctx context.Context) error {
  51. md, ok := metadata.FromIncomingContext(ctx)
  52. if !ok {
  53. return status.Errorf(codes.InvalidArgument, "Retrieving metadata is failed")
  54. }
  55. authHeader, ok := md["authorization"]
  56. if !ok {
  57. return status.Errorf(codes.Unauthenticated, "Authorization token is not supplied")
  58. }
  59. authToken := authHeader[0]
  60. nodeID, _, network, err := logic.VerifyToken(authToken)
  61. if err != nil {
  62. return err
  63. }
  64. networkexists, err := functions.NetworkExists(network)
  65. if err != nil {
  66. return status.Errorf(codes.Unauthenticated, "Unauthorized. Network does not exist: "+network)
  67. }
  68. node, err := logic.GetNodeByID(nodeID)
  69. if database.IsEmptyRecord(err) {
  70. // == DELETE replace logic after 2 major version updates ==
  71. if node, err = logic.GetDeletedNodeByID(node.ID); err == nil {
  72. if functions.RemoveDeletedNode(node.ID) {
  73. return status.Errorf(codes.Unauthenticated, models.NODE_DELETE)
  74. }
  75. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  76. }
  77. return status.Errorf(codes.Unauthenticated, "Empty record")
  78. }
  79. if err != nil || node.ID == "" {
  80. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  81. }
  82. if !networkexists {
  83. return status.Errorf(codes.Unauthenticated, "Network does not exist.")
  84. }
  85. return nil
  86. }
  87. // Login - node authenticates using its password and retrieves a JWT for authorization.
  88. func (s *NodeServiceServer) Login(ctx context.Context, req *nodepb.Object) (*nodepb.Object, error) {
  89. var reqNode, err = getNodeFromRequestData(req.Data)
  90. if err != nil {
  91. return nil, err
  92. }
  93. nodeID := reqNode.ID
  94. network := reqNode.Network
  95. password := reqNode.Password
  96. macaddress := reqNode.MacAddress
  97. var result models.NodeAuth
  98. if nodeID == "" {
  99. //TODO: Set Error response
  100. err = errors.New("missing node ID")
  101. return nil, err
  102. } else if password == "" {
  103. err = errors.New("missing password")
  104. return nil, err
  105. } else {
  106. //Search DB for node with ID. Ignore pending nodes (they should not be able to authenticate with API until approved).
  107. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  108. if err != nil {
  109. return nil, err
  110. }
  111. var found = false
  112. for _, value := range collection {
  113. if err = json.Unmarshal([]byte(value), &result); err != nil {
  114. continue // finish going through nodes
  115. }
  116. if result.ID == nodeID && result.Network == network {
  117. found = true
  118. break
  119. }
  120. }
  121. if !found {
  122. deletedNode, err := database.FetchRecord(database.DELETED_NODES_TABLE_NAME, nodeID)
  123. if err != nil {
  124. err = errors.New("node not found")
  125. return nil, err
  126. }
  127. if err = json.Unmarshal([]byte(deletedNode), &result); err != nil {
  128. err = errors.New("node data corrupted")
  129. return nil, err
  130. }
  131. }
  132. //compare password from request to stored password in database
  133. //might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  134. //TODO: Consider a way of hashing the password client side before sending, or using certificates
  135. err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(password))
  136. if err != nil && result.Password != password {
  137. return nil, err
  138. } else {
  139. //Create a new JWT for the node
  140. tokenString, err := logic.CreateJWT(result.ID, macaddress, result.Network)
  141. if err != nil {
  142. return nil, err
  143. }
  144. if tokenString == "" {
  145. err = errors.New("something went wrong, could not retrieve token")
  146. return nil, err
  147. }
  148. response := &nodepb.Object{
  149. Data: tokenString,
  150. Type: nodepb.ACCESS_TOKEN,
  151. }
  152. return response, nil
  153. }
  154. }
  155. }