userHttpController.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "strings"
  7. "github.com/gorilla/mux"
  8. "github.com/gravitl/netmaker/auth"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/functions"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. )
  14. func userHandlers(r *mux.Router) {
  15. r.HandleFunc("/api/users/adm/hasadmin", hasAdmin).Methods("GET")
  16. r.HandleFunc("/api/users/adm/createadmin", createAdmin).Methods("POST")
  17. r.HandleFunc("/api/users/adm/authenticate", authenticateUser).Methods("POST")
  18. r.HandleFunc("/api/users/{username}", authorizeUser(http.HandlerFunc(updateUser))).Methods("PUT")
  19. r.HandleFunc("/api/users/{username}/adm", authorizeUserAdm(http.HandlerFunc(updateUserAdm))).Methods("PUT")
  20. r.HandleFunc("/api/users/{username}", authorizeUserAdm(http.HandlerFunc(createUser))).Methods("POST")
  21. r.HandleFunc("/api/users/{username}", authorizeUser(http.HandlerFunc(deleteUser))).Methods("DELETE")
  22. r.HandleFunc("/api/users/{username}", authorizeUser(http.HandlerFunc(getUser))).Methods("GET")
  23. r.HandleFunc("/api/users", authorizeUserAdm(http.HandlerFunc(getUsers))).Methods("GET")
  24. r.HandleFunc("/api/oauth/login", auth.HandleAuthLogin).Methods("GET")
  25. r.HandleFunc("/api/oauth/callback", auth.HandleAuthCallback).Methods("GET")
  26. r.HandleFunc("/api/oauth/error", throwOauthError).Methods("GET")
  27. }
  28. func throwOauthError(response http.ResponseWriter, request *http.Request) {
  29. returnErrorResponse(response, request, formatError(errors.New("No token returned"), "unauthorized"))
  30. }
  31. // Node authenticates using its password and retrieves a JWT for authorization.
  32. func authenticateUser(response http.ResponseWriter, request *http.Request) {
  33. // Auth request consists of Mac Address and Password (from node that is authorizing
  34. // in case of Master, auth is ignored and mac is set to "mastermac"
  35. var authRequest models.UserAuthParams
  36. var errorResponse = models.ErrorResponse{
  37. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  38. }
  39. decoder := json.NewDecoder(request.Body)
  40. decoderErr := decoder.Decode(&authRequest)
  41. defer request.Body.Close()
  42. if decoderErr != nil {
  43. returnErrorResponse(response, request, errorResponse)
  44. return
  45. }
  46. jwt, err := logic.VerifyAuthRequest(authRequest)
  47. if err != nil {
  48. returnErrorResponse(response, request, formatError(err, "badrequest"))
  49. return
  50. }
  51. if jwt == "" {
  52. // very unlikely that err is !nil and no jwt returned, but handle it anyways.
  53. returnErrorResponse(response, request, formatError(errors.New("No token returned"), "internal"))
  54. return
  55. }
  56. username := authRequest.UserName
  57. var successResponse = models.SuccessResponse{
  58. Code: http.StatusOK,
  59. Message: "W1R3: Device " + username + " Authorized",
  60. Response: models.SuccessfulUserLoginResponse{
  61. AuthToken: jwt,
  62. UserName: username,
  63. },
  64. }
  65. // Send back the JWT
  66. successJSONResponse, jsonError := json.Marshal(successResponse)
  67. if jsonError != nil {
  68. returnErrorResponse(response, request, errorResponse)
  69. return
  70. }
  71. functions.PrintUserLog(username, "was authenticated", 2)
  72. response.Header().Set("Content-Type", "application/json")
  73. response.Write(successJSONResponse)
  74. }
  75. // The middleware for most requests to the API
  76. // They all pass through here first
  77. // This will validate the JWT (or check for master token)
  78. // This will also check against the authNetwork and make sure the node should be accessing that endpoint,
  79. // even if it's technically ok
  80. // This is kind of a poor man's RBAC. There's probably a better/smarter way.
  81. // TODO: Consider better RBAC implementations
  82. func authorizeUser(next http.Handler) http.HandlerFunc {
  83. return func(w http.ResponseWriter, r *http.Request) {
  84. w.Header().Set("Content-Type", "application/json")
  85. var params = mux.Vars(r)
  86. // get the auth token
  87. bearerToken := r.Header.Get("Authorization")
  88. username := params["username"]
  89. err := ValidateUserToken(bearerToken, username, false)
  90. if err != nil {
  91. returnErrorResponse(w, r, formatError(err, "unauthorized"))
  92. return
  93. }
  94. r.Header.Set("user", username)
  95. next.ServeHTTP(w, r)
  96. }
  97. }
  98. func authorizeUserAdm(next http.Handler) http.HandlerFunc {
  99. return func(w http.ResponseWriter, r *http.Request) {
  100. w.Header().Set("Content-Type", "application/json")
  101. var params = mux.Vars(r)
  102. //get the auth token
  103. bearerToken := r.Header.Get("Authorization")
  104. username := params["username"]
  105. err := ValidateUserToken(bearerToken, username, true)
  106. if err != nil {
  107. returnErrorResponse(w, r, formatError(err, "unauthorized"))
  108. return
  109. }
  110. r.Header.Set("user", username)
  111. next.ServeHTTP(w, r)
  112. }
  113. }
  114. // ValidateUserToken - self explained
  115. func ValidateUserToken(token string, user string, adminonly bool) error {
  116. var tokenSplit = strings.Split(token, " ")
  117. //I put this in in case the user doesn't put in a token at all (in which case it's empty)
  118. //There's probably a smarter way of handling this.
  119. var authToken = "928rt238tghgwe@TY@$Y@#WQAEGB2FC#@HG#@$Hddd"
  120. if len(tokenSplit) > 1 {
  121. authToken = tokenSplit[1]
  122. } else {
  123. return errors.New("Missing Auth Token.")
  124. }
  125. username, _, isadmin, err := functions.VerifyUserToken(authToken)
  126. if err != nil {
  127. return errors.New("Error Verifying Auth Token")
  128. }
  129. isAuthorized := false
  130. if adminonly {
  131. isAuthorized = isadmin
  132. } else {
  133. isAuthorized = username == user || isadmin
  134. }
  135. if !isAuthorized {
  136. return errors.New("You are unauthorized to access this endpoint.")
  137. }
  138. return nil
  139. }
  140. func hasAdmin(w http.ResponseWriter, r *http.Request) {
  141. w.Header().Set("Content-Type", "application/json")
  142. hasadmin, err := logic.HasAdmin()
  143. if err != nil {
  144. returnErrorResponse(w, r, formatError(err, "internal"))
  145. return
  146. }
  147. json.NewEncoder(w).Encode(hasadmin)
  148. }
  149. // GetUserInternal - gets an internal user
  150. func GetUserInternal(username string) (models.User, error) {
  151. var user models.User
  152. record, err := database.FetchRecord(database.USERS_TABLE_NAME, username)
  153. if err != nil {
  154. return user, err
  155. }
  156. if err = json.Unmarshal([]byte(record), &user); err != nil {
  157. return models.User{}, err
  158. }
  159. return user, err
  160. }
  161. // Get an individual node. Nothin fancy here folks.
  162. func getUser(w http.ResponseWriter, r *http.Request) {
  163. // set header.
  164. w.Header().Set("Content-Type", "application/json")
  165. var params = mux.Vars(r)
  166. usernameFetched := params["username"]
  167. user, err := logic.GetUser(usernameFetched)
  168. if err != nil {
  169. returnErrorResponse(w, r, formatError(err, "internal"))
  170. return
  171. }
  172. functions.PrintUserLog(r.Header.Get("user"), "fetched user "+usernameFetched, 2)
  173. json.NewEncoder(w).Encode(user)
  174. }
  175. // Get an individual node. Nothin fancy here folks.
  176. func getUsers(w http.ResponseWriter, r *http.Request) {
  177. // set header.
  178. w.Header().Set("Content-Type", "application/json")
  179. users, err := logic.GetUsers()
  180. if err != nil {
  181. returnErrorResponse(w, r, formatError(err, "internal"))
  182. return
  183. }
  184. functions.PrintUserLog(r.Header.Get("user"), "fetched users", 2)
  185. json.NewEncoder(w).Encode(users)
  186. }
  187. func createAdmin(w http.ResponseWriter, r *http.Request) {
  188. w.Header().Set("Content-Type", "application/json")
  189. var admin models.User
  190. // get node from body of request
  191. _ = json.NewDecoder(r.Body).Decode(&admin)
  192. admin, err := logic.CreateAdmin(admin)
  193. if err != nil {
  194. returnErrorResponse(w, r, formatError(err, "badrequest"))
  195. return
  196. }
  197. functions.PrintUserLog(admin.UserName, "was made a new admin", 1)
  198. json.NewEncoder(w).Encode(admin)
  199. }
  200. func createUser(w http.ResponseWriter, r *http.Request) {
  201. w.Header().Set("Content-Type", "application/json")
  202. var user models.User
  203. // get node from body of request
  204. _ = json.NewDecoder(r.Body).Decode(&user)
  205. user, err := logic.CreateUser(user)
  206. if err != nil {
  207. returnErrorResponse(w, r, formatError(err, "badrequest"))
  208. return
  209. }
  210. functions.PrintUserLog(user.UserName, "was created", 1)
  211. json.NewEncoder(w).Encode(user)
  212. }
  213. func updateUser(w http.ResponseWriter, r *http.Request) {
  214. w.Header().Set("Content-Type", "application/json")
  215. var params = mux.Vars(r)
  216. var user models.User
  217. // start here
  218. username := params["username"]
  219. user, err := GetUserInternal(username)
  220. if err != nil {
  221. returnErrorResponse(w, r, formatError(err, "internal"))
  222. return
  223. }
  224. var userchange models.User
  225. // we decode our body request params
  226. err = json.NewDecoder(r.Body).Decode(&userchange)
  227. if err != nil {
  228. returnErrorResponse(w, r, formatError(err, "internal"))
  229. return
  230. }
  231. userchange.Networks = nil
  232. user, err = logic.UpdateUser(userchange, user)
  233. if err != nil {
  234. returnErrorResponse(w, r, formatError(err, "badrequest"))
  235. return
  236. }
  237. functions.PrintUserLog(username, "was updated", 1)
  238. json.NewEncoder(w).Encode(user)
  239. }
  240. func updateUserAdm(w http.ResponseWriter, r *http.Request) {
  241. w.Header().Set("Content-Type", "application/json")
  242. var params = mux.Vars(r)
  243. var user models.User
  244. // start here
  245. username := params["username"]
  246. user, err := GetUserInternal(username)
  247. if err != nil {
  248. returnErrorResponse(w, r, formatError(err, "internal"))
  249. return
  250. }
  251. var userchange models.User
  252. // we decode our body request params
  253. err = json.NewDecoder(r.Body).Decode(&userchange)
  254. if err != nil {
  255. returnErrorResponse(w, r, formatError(err, "internal"))
  256. return
  257. }
  258. user, err = logic.UpdateUser(userchange, user)
  259. if err != nil {
  260. returnErrorResponse(w, r, formatError(err, "badrequest"))
  261. return
  262. }
  263. functions.PrintUserLog(username, "was updated (admin)", 1)
  264. json.NewEncoder(w).Encode(user)
  265. }
  266. func deleteUser(w http.ResponseWriter, r *http.Request) {
  267. // Set header
  268. w.Header().Set("Content-Type", "application/json")
  269. // get params
  270. var params = mux.Vars(r)
  271. username := params["username"]
  272. success, err := logic.DeleteUser(username)
  273. if err != nil {
  274. returnErrorResponse(w, r, formatError(err, "internal"))
  275. return
  276. } else if !success {
  277. returnErrorResponse(w, r, formatError(errors.New("delete unsuccessful."), "badrequest"))
  278. return
  279. }
  280. functions.PrintUserLog(username, "was deleted", 1)
  281. json.NewEncoder(w).Encode(params["username"] + " deleted.")
  282. }