123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283 |
- package mq
- import (
- "bytes"
- "encoding/json"
- "fmt"
- "io"
- "net/http"
- "strings"
- "github.com/gravitl/netmaker/servercfg"
- )
- type EmqxOnPrem struct {
- URL string
- UserName string
- Password string
- }
- const already_exists = "ALREADY_EXISTS"
- type (
- emqxUser struct {
- UserID string `json:"user_id"`
- Password string `json:"password"`
- Admin bool `json:"is_superuser"`
- }
- emqxLogin struct {
- Username string `json:"username"`
- Password string `json:"password"`
- }
- emqxLoginResponse struct {
- License struct {
- Edition string `json:"edition"`
- } `json:"license"`
- Token string `json:"token"`
- Version string `json:"version"`
- }
- aclRule struct {
- Topic string `json:"topic"`
- Permission string `json:"permission"`
- Action string `json:"action"`
- }
- aclObject struct {
- Rules []aclRule `json:"rules"`
- Username string `json:"username,omitempty"`
- }
- )
- func getEmqxAuthToken() (string, error) {
- payload, err := json.Marshal(&emqxLogin{
- Username: servercfg.GetMqUserName(),
- Password: servercfg.GetMqPassword(),
- })
- if err != nil {
- return "", err
- }
- resp, err := http.Post(servercfg.GetEmqxRestEndpoint()+"/api/v5/login", "application/json", bytes.NewReader(payload))
- if err != nil {
- return "", err
- }
- defer resp.Body.Close()
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return "", err
- }
- if resp.StatusCode != http.StatusOK {
- return "", fmt.Errorf("error during EMQX login %v", string(msg))
- }
- var loginResp emqxLoginResponse
- if err := json.Unmarshal(msg, &loginResp); err != nil {
- return "", err
- }
- return loginResp.Token, nil
- }
- func (e *EmqxOnPrem) GetType() servercfg.Emqxdeploy { return servercfg.EmqxOnPremDeploy }
- // CreateEmqxUser - creates an EMQX user
- func (e *EmqxOnPrem) CreateEmqxUser(username, password string) error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- payload, err := json.Marshal(&emqxUser{
- UserID: username,
- Password: password,
- })
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))
- if err != nil {
- return err
- }
- req.Header.Add("content-type", "application/json")
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode >= 300 {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- if !strings.Contains(string(msg), already_exists) {
- return fmt.Errorf("error creating EMQX user %v", string(msg))
- }
- }
- return nil
- }
- func (e *EmqxOnPrem) CreateEmqxUserforServer() error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- payload, err := json.Marshal(&emqxUser{
- UserID: servercfg.GetMqUserName(),
- Password: servercfg.GetMqPassword(),
- Admin: true,
- })
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))
- if err != nil {
- return err
- }
- req.Header.Add("content-type", "application/json")
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode >= 300 {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- if !strings.Contains(string(msg), already_exists) {
- return fmt.Errorf("error creating EMQX user %v", string(msg))
- }
- }
- return nil
- }
- // DeleteEmqxUser - deletes an EMQX user
- func (e *EmqxOnPrem) DeleteEmqxUser(username string) error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodDelete, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users/"+username, nil)
- if err != nil {
- return err
- }
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode >= 300 {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- return fmt.Errorf("error deleting EMQX user %v", string(msg))
- }
- return nil
- }
- // CreateEmqxDefaultAuthenticator - creates a default authenticator based on password and using EMQX's built in database as storage
- func (e *EmqxOnPrem) CreateEmqxDefaultAuthenticator() error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- payload, err := json.Marshal(&struct {
- Mechanism string `json:"mechanism"`
- Backend string `json:"backend"`
- UserIDType string `json:"user_id_type"`
- }{Mechanism: "password_based", Backend: "built_in_database", UserIDType: "username"})
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication", bytes.NewReader(payload))
- if err != nil {
- return err
- }
- req.Header.Add("content-type", "application/json")
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- if !strings.ContainsAny(string(msg), "ALREADY_EXISTS") {
- return fmt.Errorf("error creating default EMQX authenticator %v", string(msg))
- }
- }
- return nil
- }
- // CreateEmqxDefaultAuthorizer - creates a default ACL authorization mechanism based on the built in database
- func (e *EmqxOnPrem) CreateEmqxDefaultAuthorizer() error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- payload, err := json.Marshal(&struct {
- Enable bool `json:"enable"`
- Type string `json:"type"`
- }{Enable: true, Type: "built_in_database"})
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources", bytes.NewReader(payload))
- if err != nil {
- return err
- }
- req.Header.Add("content-type", "application/json")
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusNoContent {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- if !strings.ContainsAny(string(msg), "duplicated_authz_source_type") {
- return fmt.Errorf("error creating default EMQX ACL authorization mechanism %v", string(msg))
- }
- }
- return nil
- }
- // CreateDefaultAllowRule - creates a rule to deny access to all topics for all users by default
- // to allow user access to topics use the `mq.CreateUserAccessRule` function
- func (e *EmqxOnPrem) CreateDefaultAllowRule() error {
- token, err := getEmqxAuthToken()
- if err != nil {
- return err
- }
- payload, err := json.Marshal(&aclObject{Rules: []aclRule{{Topic: "#", Permission: "allow", Action: "all"}}})
- if err != nil {
- return err
- }
- req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources/built_in_database/all", bytes.NewReader(payload))
- if err != nil {
- return err
- }
- req.Header.Add("content-type", "application/json")
- req.Header.Add("authorization", "Bearer "+token)
- resp, err := (&http.Client{}).Do(req)
- if err != nil {
- return err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusNoContent {
- msg, err := io.ReadAll(resp.Body)
- if err != nil {
- return err
- }
- return fmt.Errorf("error creating default ACL rules %v", string(msg))
- }
- return nil
- }
|