hosts.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "reflect"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/logger"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/mq"
  13. "golang.org/x/crypto/bcrypt"
  14. )
  15. func hostHandlers(r *mux.Router) {
  16. r.HandleFunc("/api/hosts", logic.SecurityCheck(true, http.HandlerFunc(getHosts))).Methods(http.MethodGet)
  17. r.HandleFunc("/api/hosts/{hostid}", logic.SecurityCheck(true, http.HandlerFunc(updateHost))).Methods(http.MethodPut)
  18. r.HandleFunc("/api/hosts/{hostid}", logic.SecurityCheck(true, http.HandlerFunc(deleteHost))).Methods(http.MethodDelete)
  19. r.HandleFunc("/api/hosts/{hostid}/networks/{network}", logic.SecurityCheck(true, http.HandlerFunc(addHostToNetwork))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/hosts/{hostid}/networks/{network}", logic.SecurityCheck(true, http.HandlerFunc(deleteHostFromNetwork))).Methods(http.MethodDelete)
  21. r.HandleFunc("/api/hosts/{hostid}/relay", logic.SecurityCheck(false, http.HandlerFunc(createHostRelay))).Methods(http.MethodPost)
  22. r.HandleFunc("/api/hosts/{hostid}/relay", logic.SecurityCheck(false, http.HandlerFunc(deleteHostRelay))).Methods(http.MethodDelete)
  23. r.HandleFunc("/api/hosts/adm/authenticate", authenticateHost).Methods(http.MethodPost)
  24. }
  25. // swagger:route GET /api/hosts hosts getHosts
  26. //
  27. // Lists all hosts.
  28. //
  29. // Schemes: https
  30. //
  31. // Security:
  32. // oauth
  33. //
  34. // Responses:
  35. // 200: getHostsSliceResponse
  36. func getHosts(w http.ResponseWriter, r *http.Request) {
  37. currentHosts, err := logic.GetAllHosts()
  38. if err != nil {
  39. logger.Log(0, r.Header.Get("user"), "failed to fetch hosts: ", err.Error())
  40. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  41. return
  42. }
  43. // return JSON/API formatted hosts
  44. apiHosts := logic.GetAllHostsAPI(currentHosts[:])
  45. logger.Log(2, r.Header.Get("user"), "fetched all hosts")
  46. w.WriteHeader(http.StatusOK)
  47. json.NewEncoder(w).Encode(apiHosts)
  48. }
  49. // swagger:route PUT /api/hosts/{hostid} hosts updateHost
  50. //
  51. // Updates a Netclient host on Netmaker server.
  52. //
  53. // Schemes: https
  54. //
  55. // Security:
  56. // oauth
  57. //
  58. // Responses:
  59. // 200: updateHostResponse
  60. func updateHost(w http.ResponseWriter, r *http.Request) {
  61. var newHostData models.ApiHost
  62. err := json.NewDecoder(r.Body).Decode(&newHostData)
  63. if err != nil {
  64. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  65. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  66. return
  67. }
  68. // confirm host exists
  69. currHost, err := logic.GetHost(newHostData.ID)
  70. if err != nil {
  71. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  72. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  73. return
  74. }
  75. newHost := newHostData.ConvertAPIHostToNMHost(currHost)
  76. // check if relay information is changed
  77. updateRelay := false
  78. if newHost.IsRelay && len(newHost.RelayedHosts) > 0 {
  79. if len(newHost.RelayedHosts) != len(currHost.RelayedHosts) || !reflect.DeepEqual(newHost.RelayedHosts, currHost.RelayedHosts) {
  80. updateRelay = true
  81. }
  82. }
  83. logic.UpdateHost(newHost, currHost) // update the in memory struct values
  84. if err = logic.UpsertHost(newHost); err != nil {
  85. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  86. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  87. return
  88. }
  89. if updateRelay {
  90. logic.UpdateHostRelay(currHost.ID.String(), currHost.RelayedHosts, newHost.RelayedHosts)
  91. }
  92. // publish host update through MQ
  93. if err := mq.HostUpdate(&models.HostUpdate{
  94. Action: models.UpdateHost,
  95. Host: *newHost,
  96. }); err != nil {
  97. logger.Log(0, r.Header.Get("user"), "failed to send host update: ", currHost.ID.String(), err.Error())
  98. }
  99. go func() {
  100. if err := mq.PublishPeerUpdate(); err != nil {
  101. logger.Log(0, "fail to publish peer update: ", err.Error())
  102. }
  103. }()
  104. apiHostData := newHost.ConvertNMHostToAPI()
  105. logger.Log(2, r.Header.Get("user"), "updated host", newHost.ID.String())
  106. w.WriteHeader(http.StatusOK)
  107. json.NewEncoder(w).Encode(apiHostData)
  108. }
  109. // swagger:route DELETE /api/hosts/{hostid} hosts deleteHost
  110. //
  111. // Deletes a Netclient host from Netmaker server.
  112. //
  113. // Schemes: https
  114. //
  115. // Security:
  116. // oauth
  117. //
  118. // Responses:
  119. // 200: deleteHostResponse
  120. func deleteHost(w http.ResponseWriter, r *http.Request) {
  121. var params = mux.Vars(r)
  122. hostid := params["hostid"]
  123. // confirm host exists
  124. currHost, err := logic.GetHost(hostid)
  125. if err != nil {
  126. logger.Log(0, r.Header.Get("user"), "failed to delete a host:", err.Error())
  127. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  128. return
  129. }
  130. if currHost.IsRelay {
  131. if _, _, err := logic.DeleteHostRelay(hostid); err != nil {
  132. logger.Log(0, r.Header.Get("user"), "failed to dissociate host from relays:", err.Error())
  133. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  134. return
  135. }
  136. }
  137. if currHost.IsRelayed {
  138. relayHost, err := logic.GetHost(currHost.RelayedBy)
  139. if err != nil {
  140. logger.Log(0, r.Header.Get("user"), "failed to fetch relay host:", err.Error())
  141. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  142. return
  143. }
  144. newRelayedHosts := make([]string, 0)
  145. for _, relayedHostID := range relayHost.RelayedHosts {
  146. if relayedHostID != hostid {
  147. newRelayedHosts = append(newRelayedHosts, relayedHostID)
  148. }
  149. }
  150. relayHost.RelayedHosts = newRelayedHosts
  151. if err := logic.UpsertHost(relayHost); err != nil {
  152. logger.Log(0, r.Header.Get("user"), "failed to update host relays:", err.Error())
  153. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  154. return
  155. }
  156. }
  157. if err = logic.RemoveHost(currHost); err != nil {
  158. logger.Log(0, r.Header.Get("user"), "failed to delete a host:", err.Error())
  159. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  160. return
  161. }
  162. if err = mq.HostUpdate(&models.HostUpdate{
  163. Action: models.DeleteHost,
  164. Host: *currHost,
  165. }); err != nil {
  166. logger.Log(0, r.Header.Get("user"), "failed to send delete host update: ", currHost.ID.String(), err.Error())
  167. }
  168. if err = mq.DeleteMqClient(currHost.ID.String()); err != nil {
  169. logger.Log(0, "error removing DynSec credentials for host:", currHost.Name, err.Error())
  170. }
  171. apiHostData := currHost.ConvertNMHostToAPI()
  172. logger.Log(2, r.Header.Get("user"), "removed host", currHost.Name)
  173. w.WriteHeader(http.StatusOK)
  174. json.NewEncoder(w).Encode(apiHostData)
  175. }
  176. // swagger:route POST /api/hosts/{hostid}/networks/{network} hosts addHostToNetwork
  177. //
  178. // Given a network, a host is added to the network.
  179. //
  180. // Schemes: https
  181. //
  182. // Security:
  183. // oauth
  184. //
  185. // Responses:
  186. // 200: addHostToNetworkResponse
  187. func addHostToNetwork(w http.ResponseWriter, r *http.Request) {
  188. var params = mux.Vars(r)
  189. hostid := params["hostid"]
  190. network := params["network"]
  191. if hostid == "" || network == "" {
  192. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("hostid or network cannot be empty"), "badrequest"))
  193. return
  194. }
  195. // confirm host exists
  196. currHost, err := logic.GetHost(hostid)
  197. if err != nil {
  198. logger.Log(0, r.Header.Get("user"), "failed to find host:", hostid, err.Error())
  199. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  200. return
  201. }
  202. newNode, err := logic.UpdateHostNetwork(currHost, network, true)
  203. if err != nil {
  204. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", hostid, network, err.Error())
  205. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  206. return
  207. }
  208. logger.Log(1, "added new node", newNode.ID.String(), "to host", currHost.Name)
  209. if err = mq.HostUpdate(&models.HostUpdate{
  210. Action: models.JoinHostToNetwork,
  211. Host: *currHost,
  212. Node: *newNode,
  213. }); err != nil {
  214. logger.Log(0, r.Header.Get("user"), "failed to update host to join network:", hostid, network, err.Error())
  215. }
  216. logger.Log(2, r.Header.Get("user"), fmt.Sprintf("added host %s to network %s", currHost.Name, network))
  217. w.WriteHeader(http.StatusOK)
  218. }
  219. // swagger:route DELETE /api/hosts/{hostid}/networks/{network} hosts deleteHostFromNetwork
  220. //
  221. // Given a network, a host is removed from the network.
  222. //
  223. // Schemes: https
  224. //
  225. // Security:
  226. // oauth
  227. //
  228. // Responses:
  229. // 200: deleteHostFromNetworkResponse
  230. func deleteHostFromNetwork(w http.ResponseWriter, r *http.Request) {
  231. var params = mux.Vars(r)
  232. hostid := params["hostid"]
  233. network := params["network"]
  234. if hostid == "" || network == "" {
  235. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("hostid or network cannot be empty"), "badrequest"))
  236. return
  237. }
  238. // confirm host exists
  239. currHost, err := logic.GetHost(hostid)
  240. if err != nil {
  241. logger.Log(0, r.Header.Get("user"), "failed to find host:", err.Error())
  242. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  243. return
  244. }
  245. node, err := logic.UpdateHostNetwork(currHost, network, false)
  246. if err != nil {
  247. logger.Log(0, r.Header.Get("user"), "failed to remove host from network:", hostid, network, err.Error())
  248. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  249. return
  250. }
  251. logger.Log(1, "deleting node", node.ID.String(), "from host", currHost.Name)
  252. if err := logic.DeleteNode(node, false); err != nil {
  253. logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("failed to delete node"), "internal"))
  254. return
  255. }
  256. // notify node change
  257. runUpdates(node, false)
  258. go func() { // notify of peer change
  259. if err := mq.PublishPeerUpdate(); err != nil {
  260. logger.Log(1, "error publishing peer update ", err.Error())
  261. }
  262. }()
  263. logger.Log(2, r.Header.Get("user"), fmt.Sprintf("removed host %s from network %s", currHost.Name, network))
  264. w.WriteHeader(http.StatusOK)
  265. }
  266. // swagger:route POST /api/hosts/adm/authenticate hosts authenticateHost
  267. //
  268. // Host based authentication for making further API calls.
  269. //
  270. // Schemes: https
  271. //
  272. // Security:
  273. // oauth
  274. //
  275. // Responses:
  276. // 200: successResponse
  277. func authenticateHost(response http.ResponseWriter, request *http.Request) {
  278. var authRequest models.AuthParams
  279. var errorResponse = models.ErrorResponse{
  280. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  281. }
  282. decoder := json.NewDecoder(request.Body)
  283. decoderErr := decoder.Decode(&authRequest)
  284. defer request.Body.Close()
  285. if decoderErr != nil {
  286. errorResponse.Code = http.StatusBadRequest
  287. errorResponse.Message = decoderErr.Error()
  288. logger.Log(0, request.Header.Get("user"), "error decoding request body: ",
  289. decoderErr.Error())
  290. logic.ReturnErrorResponse(response, request, errorResponse)
  291. return
  292. }
  293. errorResponse.Code = http.StatusBadRequest
  294. if authRequest.ID == "" {
  295. errorResponse.Message = "W1R3: ID can't be empty"
  296. logger.Log(0, request.Header.Get("user"), errorResponse.Message)
  297. logic.ReturnErrorResponse(response, request, errorResponse)
  298. return
  299. } else if authRequest.Password == "" {
  300. errorResponse.Message = "W1R3: Password can't be empty"
  301. logger.Log(0, request.Header.Get("user"), errorResponse.Message)
  302. logic.ReturnErrorResponse(response, request, errorResponse)
  303. return
  304. }
  305. host, err := logic.GetHost(authRequest.ID)
  306. if err != nil {
  307. errorResponse.Code = http.StatusBadRequest
  308. errorResponse.Message = err.Error()
  309. logger.Log(0, request.Header.Get("user"),
  310. "error retrieving host: ", err.Error())
  311. logic.ReturnErrorResponse(response, request, errorResponse)
  312. return
  313. }
  314. err = bcrypt.CompareHashAndPassword([]byte(host.HostPass), []byte(authRequest.Password))
  315. if err != nil {
  316. errorResponse.Code = http.StatusUnauthorized
  317. errorResponse.Message = "unauthorized"
  318. logger.Log(0, request.Header.Get("user"),
  319. "error validating user password: ", err.Error())
  320. logic.ReturnErrorResponse(response, request, errorResponse)
  321. return
  322. }
  323. tokenString, err := logic.CreateJWT(authRequest.ID, authRequest.MacAddress, "")
  324. if tokenString == "" {
  325. errorResponse.Code = http.StatusUnauthorized
  326. errorResponse.Message = "unauthorized"
  327. logger.Log(0, request.Header.Get("user"),
  328. fmt.Sprintf("%s: %v", errorResponse.Message, err))
  329. logic.ReturnErrorResponse(response, request, errorResponse)
  330. return
  331. }
  332. var successResponse = models.SuccessResponse{
  333. Code: http.StatusOK,
  334. Message: "W1R3: Host " + authRequest.ID + " Authorized",
  335. Response: models.SuccessfulLoginResponse{
  336. AuthToken: tokenString,
  337. ID: authRequest.ID,
  338. },
  339. }
  340. successJSONResponse, jsonError := json.Marshal(successResponse)
  341. if jsonError != nil {
  342. errorResponse.Code = http.StatusBadRequest
  343. errorResponse.Message = err.Error()
  344. logger.Log(0, request.Header.Get("user"),
  345. "error marshalling resp: ", err.Error())
  346. logic.ReturnErrorResponse(response, request, errorResponse)
  347. return
  348. }
  349. response.WriteHeader(http.StatusOK)
  350. response.Header().Set("Content-Type", "application/json")
  351. response.Write(successJSONResponse)
  352. }