networkHttpController.go 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777
  1. package controller
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "net/http"
  10. "strings"
  11. "time"
  12. "github.com/go-playground/validator/v10"
  13. "github.com/gorilla/mux"
  14. "github.com/gravitl/netmaker/functions"
  15. "github.com/gravitl/netmaker/models"
  16. "github.com/gravitl/netmaker/mongoconn"
  17. "github.com/gravitl/netmaker/servercfg"
  18. "go.mongodb.org/mongo-driver/bson"
  19. "go.mongodb.org/mongo-driver/mongo"
  20. "go.mongodb.org/mongo-driver/mongo/options"
  21. )
  22. func networkHandlers(r *mux.Router) {
  23. r.HandleFunc("/api/networks", securityCheck(http.HandlerFunc(getNetworks))).Methods("GET")
  24. r.HandleFunc("/api/networks", securityCheck(http.HandlerFunc(createNetwork))).Methods("POST")
  25. r.HandleFunc("/api/networks/{networkname}", securityCheck(http.HandlerFunc(getNetwork))).Methods("GET")
  26. r.HandleFunc("/api/networks/{networkname}", securityCheck(http.HandlerFunc(updateNetwork))).Methods("PUT")
  27. r.HandleFunc("/api/networks/{networkname}", securityCheck(http.HandlerFunc(deleteNetwork))).Methods("DELETE")
  28. r.HandleFunc("/api/networks/{networkname}/keyupdate", securityCheck(http.HandlerFunc(keyUpdate))).Methods("POST")
  29. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(http.HandlerFunc(createAccessKey))).Methods("POST")
  30. r.HandleFunc("/api/networks/{networkname}/keys", securityCheck(http.HandlerFunc(getAccessKeys))).Methods("GET")
  31. r.HandleFunc("/api/networks/{networkname}/signuptoken", securityCheck(http.HandlerFunc(getSignupToken))).Methods("GET")
  32. r.HandleFunc("/api/networks/{networkname}/keys/{name}", securityCheck(http.HandlerFunc(deleteAccessKey))).Methods("DELETE")
  33. }
  34. //Security check is middleware for every function and just checks to make sure that its the master calling
  35. //Only admin should have access to all these network-level actions
  36. //or maybe some Users once implemented
  37. func securityCheck(next http.Handler) http.HandlerFunc {
  38. return func(w http.ResponseWriter, r *http.Request) {
  39. var errorResponse = models.ErrorResponse{
  40. Code: http.StatusUnauthorized, Message: "W1R3: It's not you it's me.",
  41. }
  42. var params = mux.Vars(r)
  43. bearerToken := r.Header.Get("Authorization")
  44. err := SecurityCheck(params["networkname"], bearerToken)
  45. if err != nil {
  46. if strings.Contains(err.Error(), "does not exist") {
  47. errorResponse.Code = http.StatusNotFound
  48. }
  49. errorResponse.Message = err.Error()
  50. returnErrorResponse(w, r, errorResponse)
  51. return
  52. }
  53. next.ServeHTTP(w, r)
  54. }
  55. }
  56. func SecurityCheck(netname, token string) error {
  57. hasnetwork := netname != ""
  58. networkexists, err := functions.NetworkExists(netname)
  59. if err != nil {
  60. return err
  61. }
  62. if hasnetwork && !networkexists {
  63. return errors.New("This network does not exist")
  64. }
  65. var hasBearer = true
  66. var tokenSplit = strings.Split(token, " ")
  67. var authToken = ""
  68. if len(tokenSplit) < 2 {
  69. hasBearer = false
  70. } else {
  71. authToken = tokenSplit[1]
  72. }
  73. //all endpoints here require master so not as complicated
  74. if !hasBearer || !authenticateMaster(authToken) {
  75. _, networks, isadmin, err := functions.VerifyUserToken(authToken)
  76. if err != nil {
  77. return errors.New("Error verifying user token")
  78. }
  79. if !isadmin && netname != ""{
  80. if !functions.SliceContains(networks, netname){
  81. return errors.New("You are unauthorized to access this endpoint")
  82. }
  83. } else if !isadmin {
  84. return errors.New("You are unauthorized to access this endpoint")
  85. }
  86. }
  87. return nil
  88. }
  89. //Consider a more secure way of setting master key
  90. func authenticateMaster(tokenString string) bool {
  91. if tokenString == servercfg.GetMasterKey() {
  92. return true
  93. }
  94. return false
  95. }
  96. //simple get all networks function
  97. func getNetworks(w http.ResponseWriter, r *http.Request) {
  98. allnetworks, err := functions.ListNetworks()
  99. if err != nil {
  100. returnErrorResponse(w, r, formatError(err, "internal"))
  101. return
  102. }
  103. networks := RemoveComms(allnetworks)
  104. w.WriteHeader(http.StatusOK)
  105. json.NewEncoder(w).Encode(networks)
  106. return
  107. }
  108. func RemoveComms(networks []models.Network) []models.Network {
  109. var index int = 100000001
  110. for ind, net := range networks {
  111. if net.NetID == "comms" {
  112. index = ind
  113. }
  114. }
  115. if index == 100000001 {
  116. return networks
  117. }
  118. returnable := make([]models.Network, 0)
  119. returnable = append(returnable, networks[:index]...)
  120. return append(returnable, networks[index+1:]...)
  121. }
  122. func ValidateNetworkUpdate(network models.NetworkUpdate) error {
  123. v := validator.New()
  124. // _ = v.RegisterValidation("addressrange_valid", func(fl validator.FieldLevel) bool {
  125. // isvalid := fl.Field().String() == "" || functions.IsIpCIDR(fl.Field().String())
  126. // return isvalid
  127. // })
  128. //_ = v.RegisterValidation("addressrange6_valid", func(fl validator.FieldLevel) bool {
  129. // isvalid := fl.Field().String() == "" || functions.IsIpCIDR(fl.Field().String())
  130. // return isvalid
  131. // })
  132. // _ = v.RegisterValidation("localrange_valid", func(fl validator.FieldLevel) bool {
  133. // isvalid := fl.Field().String() == "" || functions.IsIpCIDR(fl.Field().String())
  134. // return isvalid
  135. // })
  136. // _ = v.RegisterValidation("netid_valid", func(fl validator.FieldLevel) bool {
  137. // return true
  138. // })
  139. // _ = v.RegisterValidation("displayname_unique", func(fl validator.FieldLevel) bool {
  140. // return true
  141. // })
  142. err := v.Struct(network)
  143. if err != nil {
  144. for _, e := range err.(validator.ValidationErrors) {
  145. fmt.Println(e)
  146. }
  147. }
  148. return err
  149. }
  150. func ValidateNetworkCreate(network models.Network) error {
  151. v := validator.New()
  152. // _ = v.RegisterValidation("addressrange_valid", func(fl validator.FieldLevel) bool {
  153. // isvalid := functions.IsIpCIDR(fl.Field().String())
  154. // return isvalid
  155. // })
  156. _ = v.RegisterValidation("addressrange6_valid", func(fl validator.FieldLevel) bool {
  157. isvalid := true
  158. if *network.IsDualStack {
  159. isvalid = functions.IsIpCIDR(fl.Field().String())
  160. }
  161. return isvalid
  162. })
  163. //
  164. // _ = v.RegisterValidation("localrange_valid", func(fl validator.FieldLevel) bool {
  165. // isvalid := fl.Field().String() == "" || functions.IsIpCIDR(fl.Field().String())
  166. // return isvalid
  167. // })
  168. //
  169. _ = v.RegisterValidation("netid_valid", func(fl validator.FieldLevel) bool {
  170. isFieldUnique, _ := functions.IsNetworkNameUnique(fl.Field().String())
  171. // inCharSet := functions.NameInNetworkCharSet(fl.Field().String())
  172. return isFieldUnique
  173. })
  174. //
  175. _ = v.RegisterValidation("displayname_unique", func(fl validator.FieldLevel) bool {
  176. isFieldUnique, _ := functions.IsNetworkDisplayNameUnique(fl.Field().String())
  177. return isFieldUnique
  178. })
  179. err := v.Struct(network)
  180. if err != nil {
  181. for _, e := range err.(validator.ValidationErrors) {
  182. fmt.Println(e)
  183. }
  184. }
  185. return err
  186. }
  187. //Simple get network function
  188. func getNetwork(w http.ResponseWriter, r *http.Request) {
  189. // set header.
  190. w.Header().Set("Content-Type", "application/json")
  191. var params = mux.Vars(r)
  192. netname := params["networkname"]
  193. network, err := GetNetwork(netname)
  194. if err != nil {
  195. returnErrorResponse(w, r, formatError(err, "internal"))
  196. return
  197. }
  198. w.WriteHeader(http.StatusOK)
  199. json.NewEncoder(w).Encode(network)
  200. }
  201. func GetNetwork(name string) (models.Network, error) {
  202. var network models.Network
  203. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  204. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  205. filter := bson.M{"netid": name}
  206. err := collection.FindOne(ctx, filter, options.FindOne().SetProjection(bson.M{"_id": 0})).Decode(&network)
  207. defer cancel()
  208. if err != nil {
  209. return models.Network{}, err
  210. }
  211. return network, nil
  212. }
  213. func keyUpdate(w http.ResponseWriter, r *http.Request) {
  214. w.Header().Set("Content-Type", "application/json")
  215. var params = mux.Vars(r)
  216. netname := params["networkname"]
  217. network, err := KeyUpdate(netname)
  218. if err != nil {
  219. returnErrorResponse(w, r, formatError(err, "internal"))
  220. return
  221. }
  222. w.WriteHeader(http.StatusOK)
  223. json.NewEncoder(w).Encode(network)
  224. }
  225. func KeyUpdate(netname string) (models.Network, error) {
  226. network, err := functions.GetParentNetwork(netname)
  227. if err != nil {
  228. return models.Network{}, err
  229. }
  230. network.KeyUpdateTimeStamp = time.Now().Unix()
  231. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  232. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  233. filter := bson.M{"netid": netname}
  234. // prepare update model.
  235. update := bson.D{
  236. {"$set", bson.D{
  237. {"addressrange", network.AddressRange},
  238. {"addressrange6", network.AddressRange6},
  239. {"displayname", network.DisplayName},
  240. {"defaultlistenport", network.DefaultListenPort},
  241. {"defaultpostup", network.DefaultPostUp},
  242. {"defaultpostdown", network.DefaultPostDown},
  243. {"defaultkeepalive", network.DefaultKeepalive},
  244. {"keyupdatetimestamp", network.KeyUpdateTimeStamp},
  245. {"defaultsaveconfig", network.DefaultSaveConfig},
  246. {"defaultinterface", network.DefaultInterface},
  247. {"nodeslastmodified", network.NodesLastModified},
  248. {"networklastmodified", network.NetworkLastModified},
  249. {"allowmanualsignup", network.AllowManualSignUp},
  250. {"checkininterval", network.DefaultCheckInInterval},
  251. }},
  252. }
  253. err = collection.FindOneAndUpdate(ctx, filter, update).Decode(&network)
  254. defer cancel()
  255. if err != nil {
  256. return models.Network{}, err
  257. }
  258. return network, nil
  259. }
  260. //Update a network
  261. func AlertNetwork(netid string) error {
  262. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  263. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  264. filter := bson.M{"netid": netid}
  265. var network models.Network
  266. network, err := functions.GetParentNetwork(netid)
  267. if err != nil {
  268. return err
  269. }
  270. updatetime := time.Now().Unix()
  271. update := bson.D{
  272. {"$set", bson.D{
  273. {"nodeslastmodified", updatetime},
  274. {"networklastmodified", updatetime},
  275. }},
  276. }
  277. err = collection.FindOneAndUpdate(ctx, filter, update).Decode(&network)
  278. defer cancel()
  279. return err
  280. }
  281. //Update a network
  282. func updateNetwork(w http.ResponseWriter, r *http.Request) {
  283. w.Header().Set("Content-Type", "application/json")
  284. var params = mux.Vars(r)
  285. var network models.Network
  286. network, err := functions.GetParentNetwork(params["networkname"])
  287. if err != nil {
  288. returnErrorResponse(w, r, formatError(err, "internal"))
  289. return
  290. }
  291. var networkChange models.NetworkUpdate
  292. _ = json.NewDecoder(r.Body).Decode(&networkChange)
  293. if networkChange.AddressRange == "" {
  294. networkChange.AddressRange = network.AddressRange
  295. }
  296. if networkChange.AddressRange6 == "" {
  297. networkChange.AddressRange6 = network.AddressRange6
  298. }
  299. if networkChange.NetID == "" {
  300. networkChange.NetID = network.NetID
  301. }
  302. err = ValidateNetworkUpdate(networkChange)
  303. if err != nil {
  304. returnErrorResponse(w, r, formatError(err, "badrequest"))
  305. return
  306. }
  307. returnednetwork, err := UpdateNetwork(networkChange, network)
  308. if err != nil {
  309. returnErrorResponse(w, r, formatError(err, "badrequest"))
  310. return
  311. }
  312. w.WriteHeader(http.StatusOK)
  313. json.NewEncoder(w).Encode(returnednetwork)
  314. }
  315. func UpdateNetwork(networkChange models.NetworkUpdate, network models.Network) (models.Network, error) {
  316. //NOTE: Network.NetID is intentionally NOT editable. It acts as a static ID for the network.
  317. //DisplayName can be changed instead, which is what shows on the front end
  318. if networkChange.NetID != network.NetID {
  319. return models.Network{}, errors.New("NetID is not editable")
  320. }
  321. haschange := false
  322. hasrangeupdate := false
  323. haslocalrangeupdate := false
  324. if networkChange.AddressRange != "" {
  325. haschange = true
  326. hasrangeupdate = true
  327. network.AddressRange = networkChange.AddressRange
  328. }
  329. if networkChange.LocalRange != "" {
  330. haschange = true
  331. haslocalrangeupdate = true
  332. network.LocalRange = networkChange.LocalRange
  333. }
  334. if networkChange.IsLocal != nil {
  335. network.IsLocal = networkChange.IsLocal
  336. }
  337. if networkChange.IsDualStack != nil {
  338. network.IsDualStack = networkChange.IsDualStack
  339. }
  340. if networkChange.DefaultListenPort != 0 {
  341. network.DefaultListenPort = networkChange.DefaultListenPort
  342. haschange = true
  343. }
  344. if networkChange.DefaultPostDown != "" {
  345. network.DefaultPostDown = networkChange.DefaultPostDown
  346. haschange = true
  347. }
  348. if networkChange.DefaultInterface != "" {
  349. network.DefaultInterface = networkChange.DefaultInterface
  350. haschange = true
  351. }
  352. if networkChange.DefaultPostUp != "" {
  353. network.DefaultPostUp = networkChange.DefaultPostUp
  354. haschange = true
  355. }
  356. if networkChange.DefaultKeepalive != 0 {
  357. network.DefaultKeepalive = networkChange.DefaultKeepalive
  358. haschange = true
  359. }
  360. if networkChange.DisplayName != "" {
  361. network.DisplayName = networkChange.DisplayName
  362. haschange = true
  363. }
  364. if networkChange.DefaultCheckInInterval != 0 {
  365. network.DefaultCheckInInterval = networkChange.DefaultCheckInInterval
  366. haschange = true
  367. }
  368. if networkChange.AllowManualSignUp != nil {
  369. network.AllowManualSignUp = networkChange.AllowManualSignUp
  370. haschange = true
  371. }
  372. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  373. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  374. filter := bson.M{"netid": network.NetID}
  375. if haschange {
  376. network.SetNetworkLastModified()
  377. }
  378. // prepare update model.
  379. update := bson.D{
  380. {"$set", bson.D{
  381. {"addressrange", network.AddressRange},
  382. {"addressrange6", network.AddressRange6},
  383. {"displayname", network.DisplayName},
  384. {"defaultlistenport", network.DefaultListenPort},
  385. {"defaultpostup", network.DefaultPostUp},
  386. {"defaultpostdown", network.DefaultPostDown},
  387. {"defaultkeepalive", network.DefaultKeepalive},
  388. {"defaultsaveconfig", network.DefaultSaveConfig},
  389. {"defaultinterface", network.DefaultInterface},
  390. {"nodeslastmodified", network.NodesLastModified},
  391. {"networklastmodified", network.NetworkLastModified},
  392. {"allowmanualsignup", network.AllowManualSignUp},
  393. {"localrange", network.LocalRange},
  394. {"islocal", network.IsLocal},
  395. {"isdualstack", network.IsDualStack},
  396. {"checkininterval", network.DefaultCheckInInterval},
  397. }},
  398. }
  399. err := collection.FindOneAndUpdate(ctx, filter, update).Decode(&network)
  400. defer cancel()
  401. if err != nil {
  402. return models.Network{}, err
  403. }
  404. //Cycles through nodes and gives them new IP's based on the new range
  405. //Pretty cool, but also pretty inefficient currently
  406. if hasrangeupdate {
  407. err = functions.UpdateNetworkNodeAddresses(network.NetID)
  408. if err != nil {
  409. return models.Network{}, err
  410. }
  411. }
  412. if haslocalrangeupdate {
  413. err = functions.UpdateNetworkPrivateAddresses(network.NetID)
  414. if err != nil {
  415. return models.Network{}, err
  416. }
  417. }
  418. returnnetwork, err := functions.GetParentNetwork(network.NetID)
  419. if err != nil {
  420. return models.Network{}, err
  421. }
  422. return returnnetwork, nil
  423. }
  424. //Delete a network
  425. //Will stop you if there's any nodes associated
  426. func deleteNetwork(w http.ResponseWriter, r *http.Request) {
  427. // Set header
  428. w.Header().Set("Content-Type", "application/json")
  429. var params = mux.Vars(r)
  430. network := params["networkname"]
  431. count, err := DeleteNetwork(network)
  432. if err != nil {
  433. errtype := "badrequest"
  434. if strings.Contains(err.Error(), "Node check failed"){
  435. errtype = "forbidden"
  436. }
  437. returnErrorResponse(w, r, formatError(err, errtype))
  438. return
  439. }
  440. w.WriteHeader(http.StatusOK)
  441. json.NewEncoder(w).Encode(count)
  442. }
  443. func DeleteNetwork(network string) (*mongo.DeleteResult, error) {
  444. none := &mongo.DeleteResult{}
  445. nodecount, err := functions.GetNetworkNodeNumber(network)
  446. if err != nil {
  447. //returnErrorResponse(w, r, formatError(err, "internal"))
  448. return none, err
  449. } else if nodecount > 0 {
  450. //errorResponse := models.ErrorResponse{
  451. // Code: http.StatusForbidden, Message: "W1R3: Node check failed. All nodes must be deleted before deleting network.",
  452. //}
  453. //returnErrorResponse(w, r, errorResponse)
  454. return none, errors.New("Node check failed. All nodes must be deleted before deleting network")
  455. }
  456. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  457. filter := bson.M{"netid": network}
  458. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  459. deleteResult, err := collection.DeleteOne(ctx, filter)
  460. defer cancel()
  461. if err != nil {
  462. //returnErrorResponse(w, r, formatError(err, "internal"))
  463. return none, err
  464. }
  465. return deleteResult, nil
  466. }
  467. //Create a network
  468. //Pretty simple
  469. func createNetwork(w http.ResponseWriter, r *http.Request) {
  470. w.Header().Set("Content-Type", "application/json")
  471. var network models.Network
  472. // we decode our body request params
  473. err := json.NewDecoder(r.Body).Decode(&network)
  474. if err != nil {
  475. returnErrorResponse(w, r, formatError(err, "internal"))
  476. return
  477. }
  478. err = CreateNetwork(network)
  479. if err != nil {
  480. returnErrorResponse(w, r, formatError(err, "badrequest"))
  481. return
  482. }
  483. w.WriteHeader(http.StatusOK)
  484. //json.NewEncoder(w).Encode(result)
  485. }
  486. func CreateNetwork(network models.Network) error {
  487. //TODO: Not really doing good validation here. Same as createNode, updateNode, and updateNetwork
  488. //Need to implement some better validation across the board
  489. if network.IsLocal == nil {
  490. falsevar := false
  491. network.IsLocal = &falsevar
  492. }
  493. if network.IsDualStack == nil {
  494. falsevar := false
  495. network.IsDualStack = &falsevar
  496. }
  497. err := ValidateNetworkCreate(network)
  498. if err != nil {
  499. //returnErrorResponse(w, r, formatError(err, "badrequest"))
  500. return err
  501. }
  502. network.SetDefaults()
  503. network.SetNodesLastModified()
  504. network.SetNetworkLastModified()
  505. network.KeyUpdateTimeStamp = time.Now().Unix()
  506. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  507. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  508. // insert our network into the network table
  509. _, err = collection.InsertOne(ctx, network)
  510. defer cancel()
  511. if err != nil {
  512. return err
  513. }
  514. return nil
  515. }
  516. // BEGIN KEY MANAGEMENT SECTION
  517. //TODO: Very little error handling
  518. //accesskey is created as a json string inside the Network collection item in mongo
  519. func createAccessKey(w http.ResponseWriter, r *http.Request) {
  520. w.Header().Set("Content-Type", "application/json")
  521. var params = mux.Vars(r)
  522. var accesskey models.AccessKey
  523. //start here
  524. network, err := functions.GetParentNetwork(params["networkname"])
  525. if err != nil {
  526. returnErrorResponse(w, r, formatError(err, "internal"))
  527. return
  528. }
  529. err = json.NewDecoder(r.Body).Decode(&accesskey)
  530. if err != nil {
  531. returnErrorResponse(w, r, formatError(err, "internal"))
  532. return
  533. }
  534. key, err := CreateAccessKey(accesskey, network)
  535. if err != nil {
  536. returnErrorResponse(w, r, formatError(err, "badrequest"))
  537. return
  538. }
  539. w.WriteHeader(http.StatusOK)
  540. json.NewEncoder(w).Encode(key)
  541. //w.Write([]byte(accesskey.AccessString))
  542. }
  543. func CreateAccessKey(accesskey models.AccessKey, network models.Network) (models.AccessKey, error) {
  544. if accesskey.Name == "" {
  545. accesskey.Name = functions.GenKeyName()
  546. }
  547. if accesskey.Value == "" {
  548. accesskey.Value = functions.GenKey()
  549. }
  550. if accesskey.Uses == 0 {
  551. accesskey.Uses = 1
  552. }
  553. checkkeys, err := GetKeys(network.NetID)
  554. if err != nil {
  555. return models.AccessKey{}, errors.New("could not retrieve network keys")
  556. }
  557. for _, key := range checkkeys {
  558. if key.Name == accesskey.Name {
  559. return models.AccessKey{}, errors.New("Duplicate AccessKey Name")
  560. }
  561. }
  562. privAddr := ""
  563. if network.IsLocal != nil {
  564. if *network.IsLocal {
  565. privAddr = network.LocalRange
  566. }
  567. }
  568. netID := network.NetID
  569. grpcaddress := net.JoinHostPort(servercfg.GetGRPCHost(), servercfg.GetGRPCPort())
  570. apiaddress := net.JoinHostPort(servercfg.GetAPIHost(), servercfg.GetAPIPort())
  571. wgport := servercfg.GetGRPCWGPort()
  572. accessstringdec := wgport + "|" +grpcaddress + "|" + apiaddress + "|" + netID + "|" + accesskey.Value + "|" + privAddr
  573. accesskey.AccessString = base64.StdEncoding.EncodeToString([]byte(accessstringdec))
  574. //validate accesskey
  575. v := validator.New()
  576. err = v.Struct(accesskey)
  577. if err != nil {
  578. for _, e := range err.(validator.ValidationErrors) {
  579. fmt.Println(e)
  580. }
  581. return models.AccessKey{}, err
  582. }
  583. network.AccessKeys = append(network.AccessKeys, accesskey)
  584. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  585. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  586. // Create filter
  587. filter := bson.M{"netid": network.NetID}
  588. // Read update model from body request
  589. // prepare update model.
  590. update := bson.D{
  591. {"$set", bson.D{
  592. {"accesskeys", network.AccessKeys},
  593. }},
  594. }
  595. err = collection.FindOneAndUpdate(ctx, filter, update).Decode(&network)
  596. defer cancel()
  597. if err != nil {
  598. //returnErrorResponse(w, r, formatError(err, "internal"))
  599. return models.AccessKey{}, err
  600. }
  601. return accesskey, nil
  602. }
  603. func GetSignupToken(netID string) (models.AccessKey, error) {
  604. var accesskey models.AccessKey
  605. address := net.JoinHostPort(servercfg.GetGRPCHost(), servercfg.GetGRPCPort())
  606. accessstringdec := address + "|" + netID + "|" + "" + "|"
  607. accesskey.AccessString = base64.StdEncoding.EncodeToString([]byte(accessstringdec))
  608. return accesskey, nil
  609. }
  610. func getSignupToken(w http.ResponseWriter, r *http.Request) {
  611. w.Header().Set("Content-Type", "application/json")
  612. var params = mux.Vars(r)
  613. netID := params["networkname"]
  614. token, err := GetSignupToken(netID)
  615. if err != nil {
  616. returnErrorResponse(w, r, formatError(err, "internal"))
  617. return
  618. }
  619. w.WriteHeader(http.StatusOK)
  620. json.NewEncoder(w).Encode(token)
  621. }
  622. //pretty simple get
  623. func getAccessKeys(w http.ResponseWriter, r *http.Request) {
  624. w.Header().Set("Content-Type", "application/json")
  625. var params = mux.Vars(r)
  626. network := params["networkname"]
  627. keys, err := GetKeys(network)
  628. if err != nil {
  629. returnErrorResponse(w, r, formatError(err, "internal"))
  630. return
  631. }
  632. w.WriteHeader(http.StatusOK)
  633. json.NewEncoder(w).Encode(keys)
  634. }
  635. func GetKeys(net string) ([]models.AccessKey, error) {
  636. var network models.Network
  637. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  638. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  639. filter := bson.M{"netid": net}
  640. err := collection.FindOne(ctx, filter, options.FindOne().SetProjection(bson.M{"_id": 0})).Decode(&network)
  641. defer cancel()
  642. if err != nil {
  643. return []models.AccessKey{}, err
  644. }
  645. return network.AccessKeys, nil
  646. }
  647. //delete key. Has to do a little funky logic since it's not a collection item
  648. func deleteAccessKey(w http.ResponseWriter, r *http.Request) {
  649. w.Header().Set("Content-Type", "application/json")
  650. var params = mux.Vars(r)
  651. keyname := params["name"]
  652. netname := params["networkname"]
  653. err := DeleteKey(keyname, netname)
  654. if err != nil {
  655. returnErrorResponse(w, r, formatError(err, "badrequest"))
  656. return
  657. }
  658. w.WriteHeader(http.StatusOK)
  659. }
  660. func DeleteKey(keyname, netname string) error {
  661. network, err := functions.GetParentNetwork(netname)
  662. if err != nil {
  663. return err
  664. }
  665. //basically, turn the list of access keys into the list of access keys before and after the item
  666. //have not done any error handling for if there's like...1 item. I think it works? need to test.
  667. found := false
  668. var updatedKeys []models.AccessKey
  669. for _, currentkey := range network.AccessKeys {
  670. if currentkey.Name == keyname {
  671. found = true
  672. } else {
  673. updatedKeys = append(updatedKeys, currentkey)
  674. }
  675. }
  676. if !found {
  677. return errors.New("key " + keyname + " does not exist")
  678. }
  679. collection := mongoconn.Client.Database("netmaker").Collection("networks")
  680. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  681. // Create filter
  682. filter := bson.M{"netid": netname}
  683. // prepare update model.
  684. update := bson.D{
  685. {"$set", bson.D{
  686. {"accesskeys", updatedKeys},
  687. }},
  688. }
  689. err = collection.FindOneAndUpdate(ctx, filter, update).Decode(&network)
  690. defer cancel()
  691. if err != nil {
  692. return err
  693. }
  694. return nil
  695. }