auth_grpc.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. package controller
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "log"
  7. "github.com/gravitl/netmaker/database"
  8. "github.com/gravitl/netmaker/functions"
  9. nodepb "github.com/gravitl/netmaker/grpc"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "golang.org/x/crypto/bcrypt"
  13. "google.golang.org/grpc"
  14. "google.golang.org/grpc/codes"
  15. "google.golang.org/grpc/metadata"
  16. "google.golang.org/grpc/status"
  17. )
  18. // AuthServerUnaryInterceptor - auth unary interceptor logic
  19. func AuthServerUnaryInterceptor(ctx context.Context,
  20. req interface{},
  21. info *grpc.UnaryServerInfo,
  22. handler grpc.UnaryHandler) (interface{}, error) {
  23. // Skip authorize when GetJWT is requested
  24. if info.FullMethod != "/node.NodeService/Login" {
  25. if info.FullMethod != "/node.NodeService/CreateNode" {
  26. err := grpcAuthorize(ctx)
  27. if err != nil {
  28. return nil, err
  29. }
  30. }
  31. }
  32. // Calls the handler
  33. h, err := handler(ctx, req)
  34. return h, err
  35. }
  36. // AuthServerStreamInterceptor - auth stream interceptor
  37. func AuthServerStreamInterceptor(
  38. srv interface{},
  39. stream grpc.ServerStream,
  40. info *grpc.StreamServerInfo,
  41. handler grpc.StreamHandler,
  42. ) error {
  43. if info.FullMethod == "/node.NodeService/GetPeers" {
  44. if err := grpcAuthorize(stream.Context()); err != nil {
  45. return err
  46. }
  47. }
  48. // Calls the handler
  49. return handler(srv, stream)
  50. }
  51. func grpcAuthorize(ctx context.Context) error {
  52. md, ok := metadata.FromIncomingContext(ctx)
  53. if !ok {
  54. return status.Errorf(codes.InvalidArgument, "Retrieving metadata is failed")
  55. }
  56. authHeader, ok := md["authorization"]
  57. if !ok {
  58. return status.Errorf(codes.Unauthenticated, "Authorization token is not supplied")
  59. }
  60. authToken := authHeader[0]
  61. nodeID, mac, network, err := logic.VerifyToken(authToken)
  62. if err != nil {
  63. return err
  64. }
  65. networkexists, err := functions.NetworkExists(network)
  66. if err != nil {
  67. return status.Errorf(codes.Unauthenticated, "Unauthorized. Network does not exist: "+network)
  68. }
  69. emptynode := models.Node{}
  70. node, err := logic.GetNodeByIDorMacAddress(nodeID, mac, network)
  71. if database.IsEmptyRecord(err) {
  72. // == DELETE replace logic after 2 major version updates ==
  73. if node, err = logic.GetDeletedNodeByID(node.ID); err == nil {
  74. if functions.RemoveDeletedNode(node.ID) {
  75. return status.Errorf(codes.Unauthenticated, models.NODE_DELETE)
  76. }
  77. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  78. }
  79. return status.Errorf(codes.Unauthenticated, "Empty record")
  80. }
  81. if err != nil || node.MacAddress == emptynode.MacAddress {
  82. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  83. }
  84. if !networkexists {
  85. return status.Errorf(codes.Unauthenticated, "Network does not exist.")
  86. }
  87. return nil
  88. }
  89. // Login - node authenticates using its password and retrieves a JWT for authorization.
  90. func (s *NodeServiceServer) Login(ctx context.Context, req *nodepb.Object) (*nodepb.Object, error) {
  91. //out := new(LoginResponse)
  92. var reqNode models.Node
  93. if err := json.Unmarshal([]byte(req.Data), &reqNode); err != nil {
  94. return nil, err
  95. }
  96. nodeID := reqNode.ID
  97. network := reqNode.Network
  98. password := reqNode.Password
  99. macaddress := reqNode.MacAddress
  100. log.Printf("authing node: %v \n", reqNode)
  101. var result models.NodeAuth
  102. var err error
  103. // err := errors.New("generic server error")
  104. if nodeID == "" {
  105. //TODO: Set Error response
  106. err = errors.New("missing node ID")
  107. return nil, err
  108. } else if password == "" {
  109. err = errors.New("missing password")
  110. return nil, err
  111. } else {
  112. //Search DB for node with Mac Address. Ignore pending nodes (they should not be able to authenticate with API until approved).
  113. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  114. if err != nil {
  115. return nil, err
  116. }
  117. for _, value := range collection {
  118. if err = json.Unmarshal([]byte(value), &result); err != nil {
  119. continue // finish going through nodes
  120. }
  121. if result.ID == nodeID && result.Network == network {
  122. break
  123. }
  124. }
  125. //compare password from request to stored password in database
  126. //might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  127. //TODO: Consider a way of hashing the password client side before sending, or using certificates
  128. err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(password))
  129. if err != nil && result.Password != password {
  130. return nil, err
  131. } else {
  132. //Create a new JWT for the node
  133. tokenString, err := logic.CreateJWT(result.ID, macaddress, result.Network)
  134. if err != nil {
  135. return nil, err
  136. }
  137. if tokenString == "" {
  138. err = errors.New("something went wrong, could not retrieve token")
  139. return nil, err
  140. }
  141. response := &nodepb.Object{
  142. Data: tokenString,
  143. Type: nodepb.ACCESS_TOKEN,
  144. }
  145. return response, nil
  146. }
  147. }
  148. }