security.go 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "strings"
  7. "github.com/gorilla/mux"
  8. "github.com/gravitl/netmaker/database"
  9. "github.com/gravitl/netmaker/functions"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/servercfg"
  13. )
  14. func securityCheck(reqAdmin bool, next http.Handler) http.HandlerFunc {
  15. return func(w http.ResponseWriter, r *http.Request) {
  16. var errorResponse = models.ErrorResponse{
  17. Code: http.StatusUnauthorized, Message: "W1R3: It's not you it's me.",
  18. }
  19. var params = mux.Vars(r)
  20. bearerToken := r.Header.Get("Authorization")
  21. if strings.Contains(r.RequestURI, "/dns") && strings.ToUpper(r.Method) == "GET" && authenticateDNSToken(bearerToken) {
  22. // do dns stuff
  23. r.Header.Set("user", "nameserver")
  24. networks, _ := json.Marshal([]string{ALL_NETWORK_ACCESS})
  25. r.Header.Set("networks", string(networks))
  26. next.ServeHTTP(w, r)
  27. return
  28. }
  29. err, networks, username := SecurityCheck(reqAdmin, params["networkname"], bearerToken)
  30. if err != nil {
  31. if strings.Contains(err.Error(), "does not exist") {
  32. errorResponse.Code = http.StatusNotFound
  33. }
  34. errorResponse.Message = err.Error()
  35. returnErrorResponse(w, r, errorResponse)
  36. return
  37. }
  38. networksJson, err := json.Marshal(&networks)
  39. if err != nil {
  40. errorResponse.Message = err.Error()
  41. returnErrorResponse(w, r, errorResponse)
  42. return
  43. }
  44. r.Header.Set("user", username)
  45. r.Header.Set("networks", string(networksJson))
  46. next.ServeHTTP(w, r)
  47. }
  48. }
  49. // SecurityCheck - checks token stuff
  50. func SecurityCheck(reqAdmin bool, netname string, token string) (error, []string, string) {
  51. var hasBearer = true
  52. var tokenSplit = strings.Split(token, " ")
  53. var authToken = ""
  54. if len(tokenSplit) < 2 {
  55. hasBearer = false
  56. } else {
  57. authToken = tokenSplit[1]
  58. }
  59. userNetworks := []string{}
  60. //all endpoints here require master so not as complicated
  61. isMasterAuthenticated := authenticateMaster(authToken)
  62. username := ""
  63. if !hasBearer || !isMasterAuthenticated {
  64. userName, networks, isadmin, err := logic.VerifyUserToken(authToken)
  65. username = userName
  66. if err != nil {
  67. return errors.New("error verifying user token"), nil, username
  68. }
  69. if !isadmin && reqAdmin {
  70. return errors.New("you are unauthorized to access this endpoint"), nil, username
  71. }
  72. userNetworks = networks
  73. if isadmin {
  74. userNetworks = []string{ALL_NETWORK_ACCESS}
  75. } else {
  76. networkexists, err := functions.NetworkExists(netname)
  77. if err != nil && !database.IsEmptyRecord(err) {
  78. return err, nil, ""
  79. }
  80. if netname != "" && !networkexists {
  81. return errors.New("this network does not exist"), nil, ""
  82. }
  83. }
  84. } else if isMasterAuthenticated {
  85. userNetworks = []string{ALL_NETWORK_ACCESS}
  86. }
  87. if len(userNetworks) == 0 {
  88. userNetworks = append(userNetworks, NO_NETWORKS_PRESENT)
  89. }
  90. return nil, userNetworks, username
  91. }
  92. // Consider a more secure way of setting master key
  93. func authenticateMaster(tokenString string) bool {
  94. return tokenString == servercfg.GetMasterKey() && servercfg.GetMasterKey() != ""
  95. }
  96. //Consider a more secure way of setting master key
  97. func authenticateDNSToken(tokenString string) bool {
  98. tokens := strings.Split(tokenString, " ")
  99. if len(tokens) < 2 {
  100. return false
  101. }
  102. return tokens[1] == servercfg.GetDNSKey()
  103. }
  104. func continueIfUserMatch(next http.Handler) http.HandlerFunc {
  105. return func(w http.ResponseWriter, r *http.Request) {
  106. var errorResponse = models.ErrorResponse{
  107. Code: http.StatusUnauthorized, Message: "W1R3: This doesn't look like you.",
  108. }
  109. var params = mux.Vars(r)
  110. var requestedUser = params["username"]
  111. if requestedUser != r.Header.Get("user") {
  112. returnErrorResponse(w, r, errorResponse)
  113. return
  114. }
  115. next.ServeHTTP(w, r)
  116. }
  117. }