acls.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "net/url"
  7. "time"
  8. "github.com/google/uuid"
  9. "github.com/gorilla/mux"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. )
  14. func aclHandlers(r *mux.Router) {
  15. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(getAcls))).
  16. Methods(http.MethodGet)
  17. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(createAcl))).
  18. Methods(http.MethodPost)
  19. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(updateAcl))).
  20. Methods(http.MethodPut)
  21. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(deleteAcl))).
  22. Methods(http.MethodDelete)
  23. }
  24. // @Summary List Acls in a network
  25. // @Router /api/v1/acls [get]
  26. // @Tags ACL
  27. // @Accept json
  28. // @Success 200 {array} models.SuccessResponse
  29. // @Failure 500 {object} models.ErrorResponse
  30. func getAcls(w http.ResponseWriter, r *http.Request) {
  31. netID, _ := url.QueryUnescape(r.URL.Query().Get("network"))
  32. if netID == "" {
  33. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("network id param is missing"), "badrequest"))
  34. return
  35. }
  36. // check if network exists
  37. _, err := logic.GetNetwork(netID)
  38. if err != nil {
  39. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  40. return
  41. }
  42. acls, err := logic.ListAcls(models.NetworkID(netID))
  43. if err != nil {
  44. logger.Log(0, r.Header.Get("user"), "failed to get all network acl entries: ", err.Error())
  45. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  46. return
  47. }
  48. logic.SortAclEntrys(acls[:])
  49. logic.ReturnSuccessResponseWithJson(w, r, acls, "fetched all acls in the network "+netID)
  50. }
  51. // @Summary Create Acl
  52. // @Router /api/v1/acls [post]
  53. // @Tags ACL
  54. // @Accept json
  55. // @Success 200 {array} models.SuccessResponse
  56. // @Failure 500 {object} models.ErrorResponse
  57. func createAcl(w http.ResponseWriter, r *http.Request) {
  58. var req models.Acl
  59. err := json.NewDecoder(r.Body).Decode(&req)
  60. if err != nil {
  61. logger.Log(0, "error decoding request body: ",
  62. err.Error())
  63. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  64. return
  65. }
  66. user, err := logic.GetUser(r.Header.Get("user"))
  67. if err != nil {
  68. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  69. return
  70. }
  71. // check if acl network exists
  72. _, err = logic.GetNetwork(req.NetworkID.String())
  73. if err != nil {
  74. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("failed to get network details for "+req.NetworkID.String()), "badrequest"))
  75. return
  76. }
  77. // check if acl exists
  78. acl := req
  79. acl.ID = uuid.New()
  80. acl.CreatedBy = user.UserName
  81. acl.CreatedAt = time.Now().UTC()
  82. // validate create acl policy
  83. if !logic.IsAclPolicyValid(acl) {
  84. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  85. return
  86. }
  87. err = logic.InsertAcl(acl)
  88. if err != nil {
  89. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  90. return
  91. }
  92. logic.ReturnSuccessResponseWithJson(w, r, req, "created acl successfully")
  93. }
  94. // @Summary Update Acl
  95. // @Router /api/v1/acls [put]
  96. // @Tags ACL
  97. // @Accept json
  98. // @Success 200 {array} models.SuccessResponse
  99. // @Failure 500 {object} models.ErrorResponse
  100. func updateAcl(w http.ResponseWriter, r *http.Request) {
  101. var updateAcl models.Acl
  102. err := json.NewDecoder(r.Body).Decode(&updateAcl)
  103. if err != nil {
  104. logger.Log(0, "error decoding request body: ",
  105. err.Error())
  106. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  107. return
  108. }
  109. acl, err := logic.GetAcl(updateAcl.ID.String())
  110. if err != nil {
  111. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  112. return
  113. }
  114. if !logic.IsAclPolicyValid(updateAcl) {
  115. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  116. return
  117. }
  118. err = logic.UpdateAcl(updateAcl, acl)
  119. if err != nil {
  120. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  121. return
  122. }
  123. logic.ReturnSuccessResponse(w, r, "updated acl "+updateAcl.Name)
  124. }
  125. // @Summary Delete Acl
  126. // @Router /api/v1/acls [delete]
  127. // @Tags ACL
  128. // @Accept json
  129. // @Success 200 {array} models.SuccessResponse
  130. // @Failure 500 {object} models.ErrorResponse
  131. func deleteAcl(w http.ResponseWriter, r *http.Request) {
  132. aclID, _ := url.QueryUnescape(r.URL.Query().Get("acl_id"))
  133. if aclID == "" {
  134. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("acl id is required"), "badrequest"))
  135. return
  136. }
  137. acl, err := logic.GetAcl(aclID)
  138. if err != nil {
  139. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  140. return
  141. }
  142. err = logic.DeleteAcl(acl)
  143. if err != nil {
  144. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  145. return
  146. }
  147. logic.ReturnSuccessResponse(w, r, "deleted acl "+acl.Name)
  148. }