| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283 | package mqimport (	"bytes"	"encoding/json"	"fmt"	"io"	"net/http"	"strings"	"github.com/gravitl/netmaker/servercfg")type EmqxOnPrem struct {	URL      string	UserName string	Password string}const already_exists = "ALREADY_EXISTS"type (	emqxUser struct {		UserID   string `json:"user_id"`		Password string `json:"password"`		Admin    bool   `json:"is_superuser"`	}	emqxLogin struct {		Username string `json:"username"`		Password string `json:"password"`	}	emqxLoginResponse struct {		License struct {			Edition string `json:"edition"`		} `json:"license"`		Token   string `json:"token"`		Version string `json:"version"`	}	aclRule struct {		Topic      string `json:"topic"`		Permission string `json:"permission"`		Action     string `json:"action"`	}	aclObject struct {		Rules    []aclRule `json:"rules"`		Username string    `json:"username,omitempty"`	})func getEmqxAuthToken() (string, error) {	payload, err := json.Marshal(&emqxLogin{		Username: servercfg.GetMqUserName(),		Password: servercfg.GetMqPassword(),	})	if err != nil {		return "", err	}	resp, err := http.Post(servercfg.GetEmqxRestEndpoint()+"/api/v5/login", "application/json", bytes.NewReader(payload))	if err != nil {		return "", err	}	defer resp.Body.Close()	msg, err := io.ReadAll(resp.Body)	if err != nil {		return "", err	}	if resp.StatusCode != http.StatusOK {		return "", fmt.Errorf("error during EMQX login %v", string(msg))	}	var loginResp emqxLoginResponse	if err := json.Unmarshal(msg, &loginResp); err != nil {		return "", err	}	return loginResp.Token, nil}func (e *EmqxOnPrem) GetType() servercfg.Emqxdeploy { return servercfg.EmqxOnPremDeploy }// CreateEmqxUser - creates an EMQX userfunc (e *EmqxOnPrem) CreateEmqxUser(username, password string) error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	payload, err := json.Marshal(&emqxUser{		UserID:   username,		Password: password,	})	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))	if err != nil {		return err	}	req.Header.Add("content-type", "application/json")	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode >= 300 {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		if !strings.Contains(string(msg), already_exists) {			return fmt.Errorf("error creating EMQX user %v", string(msg))		}	}	return nil}func (e *EmqxOnPrem) CreateEmqxUserforServer() error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	payload, err := json.Marshal(&emqxUser{		UserID:   servercfg.GetMqUserName(),		Password: servercfg.GetMqPassword(),		Admin:    true,	})	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users", bytes.NewReader(payload))	if err != nil {		return err	}	req.Header.Add("content-type", "application/json")	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode >= 300 {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		if !strings.Contains(string(msg), already_exists) {			return fmt.Errorf("error creating EMQX user %v", string(msg))		}	}	return nil}// DeleteEmqxUser - deletes an EMQX userfunc (e *EmqxOnPrem) DeleteEmqxUser(username string) error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodDelete, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication/password_based:built_in_database/users/"+username, nil)	if err != nil {		return err	}	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode >= 300 {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		return fmt.Errorf("error deleting EMQX user %v", string(msg))	}	return nil}// CreateEmqxDefaultAuthenticator - creates a default authenticator based on password and using EMQX's built in database as storagefunc (e *EmqxOnPrem) CreateEmqxDefaultAuthenticator() error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	payload, err := json.Marshal(&struct {		Mechanism  string `json:"mechanism"`		Backend    string `json:"backend"`		UserIDType string `json:"user_id_type"`	}{Mechanism: "password_based", Backend: "built_in_database", UserIDType: "username"})	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authentication", bytes.NewReader(payload))	if err != nil {		return err	}	req.Header.Add("content-type", "application/json")	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode != http.StatusOK {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		if !strings.ContainsAny(string(msg), "ALREADY_EXISTS") {			return fmt.Errorf("error creating default EMQX authenticator %v", string(msg))		}	}	return nil}// CreateEmqxDefaultAuthorizer - creates a default ACL authorization mechanism based on the built in databasefunc (e *EmqxOnPrem) CreateEmqxDefaultAuthorizer() error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	payload, err := json.Marshal(&struct {		Enable bool   `json:"enable"`		Type   string `json:"type"`	}{Enable: true, Type: "built_in_database"})	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources", bytes.NewReader(payload))	if err != nil {		return err	}	req.Header.Add("content-type", "application/json")	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode != http.StatusNoContent {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		if !strings.ContainsAny(string(msg), "duplicated_authz_source_type") {			return fmt.Errorf("error creating default EMQX ACL authorization mechanism %v", string(msg))		}	}	return nil}// CreateDefaultAllowRule - creates a rule to deny access to all topics for all users by default// to allow user access to topics use the `mq.CreateUserAccessRule` functionfunc (e *EmqxOnPrem) CreateDefaultAllowRule() error {	token, err := getEmqxAuthToken()	if err != nil {		return err	}	payload, err := json.Marshal(&aclObject{Rules: []aclRule{{Topic: "#", Permission: "allow", Action: "all"}}})	if err != nil {		return err	}	req, err := http.NewRequest(http.MethodPost, servercfg.GetEmqxRestEndpoint()+"/api/v5/authorization/sources/built_in_database/all", bytes.NewReader(payload))	if err != nil {		return err	}	req.Header.Add("content-type", "application/json")	req.Header.Add("authorization", "Bearer "+token)	resp, err := (&http.Client{}).Do(req)	if err != nil {		return err	}	defer resp.Body.Close()	if resp.StatusCode != http.StatusNoContent {		msg, err := io.ReadAll(resp.Body)		if err != nil {			return err		}		return fmt.Errorf("error creating default ACL rules %v", string(msg))	}	return nil}
 |