acls.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "sort"
  7. "sync"
  8. "time"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/models"
  11. "github.com/gravitl/netmaker/servercfg"
  12. )
  13. var (
  14. aclCacheMutex = &sync.RWMutex{}
  15. aclCacheMap = make(map[string]models.Acl)
  16. )
  17. // CreateDefaultAclNetworkPolicies - create default acl network policies
  18. func CreateDefaultAclNetworkPolicies(netID models.NetworkID) {
  19. if netID.String() == "" {
  20. return
  21. }
  22. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-nodes")) {
  23. defaultDeviceAcl := models.Acl{
  24. ID: fmt.Sprintf("%s.%s", netID, "all-nodes"),
  25. Name: "All Nodes",
  26. MetaData: "This Policy allows all nodes in the network to communicate with each other",
  27. Default: true,
  28. NetworkID: netID,
  29. RuleType: models.DevicePolicy,
  30. Src: []models.AclPolicyTag{
  31. {
  32. ID: models.DeviceAclID,
  33. Value: "*",
  34. }},
  35. Dst: []models.AclPolicyTag{
  36. {
  37. ID: models.DeviceAclID,
  38. Value: "*",
  39. }},
  40. AllowedDirection: models.TrafficDirectionBi,
  41. Enabled: true,
  42. CreatedBy: "auto",
  43. CreatedAt: time.Now().UTC(),
  44. }
  45. InsertAcl(defaultDeviceAcl)
  46. }
  47. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-users")) {
  48. defaultUserAcl := models.Acl{
  49. ID: fmt.Sprintf("%s.%s", netID, "all-users"),
  50. Default: true,
  51. Name: "All Users",
  52. MetaData: "This policy gives access to everything in the network for an user",
  53. NetworkID: netID,
  54. RuleType: models.UserPolicy,
  55. Src: []models.AclPolicyTag{
  56. {
  57. ID: models.UserAclID,
  58. Value: "*",
  59. },
  60. },
  61. Dst: []models.AclPolicyTag{{
  62. ID: models.DeviceAclID,
  63. Value: "*",
  64. }},
  65. AllowedDirection: models.TrafficDirectionUni,
  66. Enabled: true,
  67. CreatedBy: "auto",
  68. CreatedAt: time.Now().UTC(),
  69. }
  70. InsertAcl(defaultUserAcl)
  71. }
  72. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-remote-access-gws")) {
  73. defaultUserAcl := models.Acl{
  74. ID: fmt.Sprintf("%s.%s", netID, "all-remote-access-gws"),
  75. Default: true,
  76. Name: "All Remote Access Gateways",
  77. NetworkID: netID,
  78. RuleType: models.DevicePolicy,
  79. Src: []models.AclPolicyTag{
  80. {
  81. ID: models.DeviceAclID,
  82. Value: fmt.Sprintf("%s.%s", netID, models.RemoteAccessTagName),
  83. },
  84. },
  85. Dst: []models.AclPolicyTag{
  86. {
  87. ID: models.DeviceAclID,
  88. Value: "*",
  89. },
  90. },
  91. AllowedDirection: models.TrafficDirectionBi,
  92. Enabled: true,
  93. CreatedBy: "auto",
  94. CreatedAt: time.Now().UTC(),
  95. }
  96. InsertAcl(defaultUserAcl)
  97. }
  98. CreateDefaultUserPolicies(netID)
  99. }
  100. // DeleteDefaultNetworkPolicies - deletes all default network acl policies
  101. func DeleteDefaultNetworkPolicies(netId models.NetworkID) {
  102. acls, _ := ListAcls(netId)
  103. for _, acl := range acls {
  104. if acl.NetworkID == netId && acl.Default {
  105. DeleteAcl(acl)
  106. }
  107. }
  108. }
  109. // ValidateCreateAclReq - validates create req for acl
  110. func ValidateCreateAclReq(req models.Acl) error {
  111. // check if acl network exists
  112. _, err := GetNetwork(req.NetworkID.String())
  113. if err != nil {
  114. return errors.New("failed to get network details for " + req.NetworkID.String())
  115. }
  116. // err = CheckIDSyntax(req.Name)
  117. // if err != nil {
  118. // return err
  119. // }
  120. return nil
  121. }
  122. func listAclFromCache() (acls []models.Acl) {
  123. aclCacheMutex.RLock()
  124. defer aclCacheMutex.RUnlock()
  125. for _, acl := range aclCacheMap {
  126. acls = append(acls, acl)
  127. }
  128. return
  129. }
  130. func storeAclInCache(a models.Acl) {
  131. aclCacheMutex.Lock()
  132. defer aclCacheMutex.Unlock()
  133. aclCacheMap[a.ID] = a
  134. }
  135. func removeAclFromCache(a models.Acl) {
  136. aclCacheMutex.Lock()
  137. defer aclCacheMutex.Unlock()
  138. delete(aclCacheMap, a.ID)
  139. }
  140. func getAclFromCache(aID string) (a models.Acl, ok bool) {
  141. aclCacheMutex.RLock()
  142. defer aclCacheMutex.RUnlock()
  143. a, ok = aclCacheMap[aID]
  144. return
  145. }
  146. // InsertAcl - creates acl policy
  147. func InsertAcl(a models.Acl) error {
  148. d, err := json.Marshal(a)
  149. if err != nil {
  150. return err
  151. }
  152. err = database.Insert(a.ID, string(d), database.ACLS_TABLE_NAME)
  153. if err == nil && servercfg.CacheEnabled() {
  154. storeAclInCache(a)
  155. }
  156. return err
  157. }
  158. // GetAcl - gets acl info by id
  159. func GetAcl(aID string) (models.Acl, error) {
  160. a := models.Acl{}
  161. if servercfg.CacheEnabled() {
  162. var ok bool
  163. a, ok = getAclFromCache(aID)
  164. if ok {
  165. return a, nil
  166. }
  167. }
  168. d, err := database.FetchRecord(database.ACLS_TABLE_NAME, aID)
  169. if err != nil {
  170. return a, err
  171. }
  172. err = json.Unmarshal([]byte(d), &a)
  173. if err != nil {
  174. return a, err
  175. }
  176. if servercfg.CacheEnabled() {
  177. storeAclInCache(a)
  178. }
  179. return a, nil
  180. }
  181. // IsAclExists - checks if acl exists
  182. func IsAclExists(aclID string) bool {
  183. _, err := GetAcl(aclID)
  184. return err == nil
  185. }
  186. // IsAclPolicyValid - validates if acl policy is valid
  187. func IsAclPolicyValid(acl models.Acl) bool {
  188. //check if src and dst are valid
  189. switch acl.RuleType {
  190. case models.UserPolicy:
  191. // src list should only contain users
  192. for _, srcI := range acl.Src {
  193. if srcI.ID == "" || srcI.Value == "" {
  194. return false
  195. }
  196. if srcI.Value == "*" {
  197. continue
  198. }
  199. if srcI.ID != models.UserAclID && srcI.ID != models.UserGroupAclID {
  200. return false
  201. }
  202. // check if user group is valid
  203. if srcI.ID == models.UserAclID {
  204. _, err := GetUser(srcI.Value)
  205. if err != nil {
  206. return false
  207. }
  208. } else if srcI.ID == models.UserGroupAclID {
  209. err := IsGroupValid(models.UserGroupID(srcI.Value))
  210. if err != nil {
  211. return false
  212. }
  213. // check if group belongs to this network
  214. netGrps := GetUserGroupsInNetwork(acl.NetworkID)
  215. if _, ok := netGrps[models.UserGroupID(srcI.Value)]; !ok {
  216. return false
  217. }
  218. }
  219. }
  220. for _, dstI := range acl.Dst {
  221. if dstI.ID == "" || dstI.Value == "" {
  222. return false
  223. }
  224. if dstI.ID != models.DeviceAclID {
  225. return false
  226. }
  227. if dstI.Value == "*" {
  228. continue
  229. }
  230. // check if tag is valid
  231. _, err := GetTag(models.TagID(dstI.Value))
  232. if err != nil {
  233. return false
  234. }
  235. }
  236. case models.DevicePolicy:
  237. for _, srcI := range acl.Src {
  238. if srcI.ID == "" || srcI.Value == "" {
  239. return false
  240. }
  241. if srcI.ID != models.DeviceAclID {
  242. return false
  243. }
  244. if srcI.Value == "*" {
  245. continue
  246. }
  247. // check if tag is valid
  248. _, err := GetTag(models.TagID(srcI.Value))
  249. if err != nil {
  250. return false
  251. }
  252. }
  253. for _, dstI := range acl.Dst {
  254. if dstI.ID == "" || dstI.Value == "" {
  255. return false
  256. }
  257. if dstI.ID != models.DeviceAclID {
  258. return false
  259. }
  260. if dstI.Value == "*" {
  261. continue
  262. }
  263. // check if tag is valid
  264. _, err := GetTag(models.TagID(dstI.Value))
  265. if err != nil {
  266. return false
  267. }
  268. }
  269. }
  270. return true
  271. }
  272. // UpdateAcl - updates allowed fields on acls and commits to DB
  273. func UpdateAcl(newAcl, acl models.Acl) error {
  274. if !acl.Default {
  275. acl.Name = newAcl.Name
  276. acl.Src = newAcl.Src
  277. acl.Dst = newAcl.Dst
  278. }
  279. acl.Enabled = newAcl.Enabled
  280. d, err := json.Marshal(acl)
  281. if err != nil {
  282. return err
  283. }
  284. err = database.Insert(acl.ID, string(d), database.ACLS_TABLE_NAME)
  285. if err == nil && servercfg.CacheEnabled() {
  286. storeAclInCache(acl)
  287. }
  288. return err
  289. }
  290. // UpsertAcl - upserts acl
  291. func UpsertAcl(acl models.Acl) error {
  292. d, err := json.Marshal(acl)
  293. if err != nil {
  294. return err
  295. }
  296. err = database.Insert(acl.ID, string(d), database.ACLS_TABLE_NAME)
  297. if err == nil && servercfg.CacheEnabled() {
  298. storeAclInCache(acl)
  299. }
  300. return err
  301. }
  302. // DeleteAcl - deletes acl policy
  303. func DeleteAcl(a models.Acl) error {
  304. err := database.DeleteRecord(database.ACLS_TABLE_NAME, a.ID)
  305. if err == nil && servercfg.CacheEnabled() {
  306. removeAclFromCache(a)
  307. }
  308. return err
  309. }
  310. // GetDefaultPolicy - fetches default policy in the network by ruleType
  311. func GetDefaultPolicy(netID models.NetworkID, ruleType models.AclPolicyType) (models.Acl, error) {
  312. aclID := "all-users"
  313. if ruleType == models.DevicePolicy {
  314. aclID = "all-nodes"
  315. }
  316. acl, err := GetAcl(fmt.Sprintf("%s.%s", netID, aclID))
  317. if err != nil {
  318. return models.Acl{}, errors.New("default rule not found")
  319. }
  320. if acl.Enabled {
  321. return acl, nil
  322. }
  323. // check if there are any custom all policies
  324. srcMap := make(map[string]struct{})
  325. dstMap := make(map[string]struct{})
  326. defer func() {
  327. srcMap = nil
  328. dstMap = nil
  329. }()
  330. policies, _ := ListAcls(netID)
  331. for _, policy := range policies {
  332. if !policy.Enabled {
  333. continue
  334. }
  335. if policy.RuleType == ruleType {
  336. dstMap = convAclTagToValueMap(policy.Dst)
  337. srcMap = convAclTagToValueMap(policy.Src)
  338. if _, ok := srcMap["*"]; ok {
  339. if _, ok := dstMap["*"]; ok {
  340. return policy, nil
  341. }
  342. }
  343. }
  344. }
  345. return acl, nil
  346. }
  347. func listAcls() (acls []models.Acl) {
  348. if servercfg.CacheEnabled() && len(aclCacheMap) > 0 {
  349. return listAclFromCache()
  350. }
  351. data, err := database.FetchRecords(database.ACLS_TABLE_NAME)
  352. if err != nil && !database.IsEmptyRecord(err) {
  353. return []models.Acl{}
  354. }
  355. for _, dataI := range data {
  356. acl := models.Acl{}
  357. err := json.Unmarshal([]byte(dataI), &acl)
  358. if err != nil {
  359. continue
  360. }
  361. acls = append(acls, acl)
  362. if servercfg.CacheEnabled() {
  363. storeAclInCache(acl)
  364. }
  365. }
  366. return
  367. }
  368. // ListUserPolicies - lists all acl policies enforced on an user
  369. func ListUserPolicies(u models.User) []models.Acl {
  370. allAcls := listAcls()
  371. userAcls := []models.Acl{}
  372. for _, acl := range allAcls {
  373. if acl.RuleType == models.UserPolicy {
  374. srcMap := convAclTagToValueMap(acl.Src)
  375. if _, ok := srcMap[u.UserName]; ok {
  376. userAcls = append(userAcls, acl)
  377. } else {
  378. // check for user groups
  379. for gID := range u.UserGroups {
  380. if _, ok := srcMap[gID.String()]; ok {
  381. userAcls = append(userAcls, acl)
  382. break
  383. }
  384. }
  385. }
  386. }
  387. }
  388. return userAcls
  389. }
  390. // listPoliciesOfUser - lists all user acl policies applied to user in an network
  391. func listPoliciesOfUser(user models.User, netID models.NetworkID) []models.Acl {
  392. allAcls := listAcls()
  393. userAcls := []models.Acl{}
  394. for _, acl := range allAcls {
  395. if acl.NetworkID == netID && acl.RuleType == models.UserPolicy {
  396. srcMap := convAclTagToValueMap(acl.Src)
  397. if _, ok := srcMap[user.UserName]; ok {
  398. userAcls = append(userAcls, acl)
  399. continue
  400. }
  401. for netRole := range user.NetworkRoles {
  402. if _, ok := srcMap[netRole.String()]; ok {
  403. userAcls = append(userAcls, acl)
  404. continue
  405. }
  406. }
  407. for userG := range user.UserGroups {
  408. if _, ok := srcMap[userG.String()]; ok {
  409. userAcls = append(userAcls, acl)
  410. continue
  411. }
  412. }
  413. }
  414. }
  415. return userAcls
  416. }
  417. // listDevicePolicies - lists all device policies in a network
  418. func listDevicePolicies(netID models.NetworkID) []models.Acl {
  419. allAcls := listAcls()
  420. deviceAcls := []models.Acl{}
  421. for _, acl := range allAcls {
  422. if acl.NetworkID == netID && acl.RuleType == models.DevicePolicy {
  423. deviceAcls = append(deviceAcls, acl)
  424. }
  425. }
  426. return deviceAcls
  427. }
  428. // ListAcls - lists all acl policies
  429. func ListAcls(netID models.NetworkID) ([]models.Acl, error) {
  430. allAcls := listAcls()
  431. netAcls := []models.Acl{}
  432. for _, acl := range allAcls {
  433. if acl.NetworkID == netID {
  434. netAcls = append(netAcls, acl)
  435. }
  436. }
  437. return netAcls, nil
  438. }
  439. func convAclTagToValueMap(acltags []models.AclPolicyTag) map[string]struct{} {
  440. aclValueMap := make(map[string]struct{})
  441. for _, aclTagI := range acltags {
  442. aclValueMap[aclTagI.Value] = struct{}{}
  443. }
  444. return aclValueMap
  445. }
  446. // IsUserAllowedToCommunicate - check if user is allowed to communicate with peer
  447. func IsUserAllowedToCommunicate(userName string, peer models.Node) bool {
  448. if peer.IsStatic {
  449. peer = peer.StaticNode.ConvertToStaticNode()
  450. }
  451. acl, _ := GetDefaultPolicy(models.NetworkID(peer.Network), models.UserPolicy)
  452. if acl.Enabled {
  453. return true
  454. }
  455. user, err := GetUser(userName)
  456. if err != nil {
  457. return false
  458. }
  459. policies := listPoliciesOfUser(*user, models.NetworkID(peer.Network))
  460. for _, policy := range policies {
  461. if !policy.Enabled {
  462. continue
  463. }
  464. dstMap := convAclTagToValueMap(policy.Dst)
  465. if _, ok := dstMap["*"]; ok {
  466. return true
  467. }
  468. for tagID := range peer.Tags {
  469. if _, ok := dstMap[tagID.String()]; ok {
  470. return true
  471. }
  472. }
  473. }
  474. return false
  475. }
  476. // IsNodeAllowedToCommunicate - check node is allowed to communicate with the peer
  477. func IsNodeAllowedToCommunicate(node, peer models.Node, checkDefaultPolicy bool) bool {
  478. if node.IsStatic {
  479. node = node.StaticNode.ConvertToStaticNode()
  480. }
  481. if peer.IsStatic {
  482. peer = peer.StaticNode.ConvertToStaticNode()
  483. }
  484. if checkDefaultPolicy {
  485. // check default policy if all allowed return true
  486. defaultPolicy, err := GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)
  487. if err == nil {
  488. if defaultPolicy.Enabled {
  489. return true
  490. }
  491. }
  492. }
  493. // list device policies
  494. policies := listDevicePolicies(models.NetworkID(peer.Network))
  495. srcMap := make(map[string]struct{})
  496. dstMap := make(map[string]struct{})
  497. defer func() {
  498. srcMap = nil
  499. dstMap = nil
  500. }()
  501. for _, policy := range policies {
  502. if !policy.Enabled {
  503. continue
  504. }
  505. srcMap = convAclTagToValueMap(policy.Src)
  506. dstMap = convAclTagToValueMap(policy.Dst)
  507. // fmt.Printf("\n======> SRCMAP: %+v\n", srcMap)
  508. // fmt.Printf("\n======> DSTMAP: %+v\n", dstMap)
  509. // fmt.Printf("\n======> node Tags: %+v\n", node.Tags)
  510. // fmt.Printf("\n======> peer Tags: %+v\n", peer.Tags)
  511. for tagID := range node.Tags {
  512. if _, ok := dstMap[tagID.String()]; ok {
  513. if _, ok := srcMap["*"]; ok {
  514. return true
  515. }
  516. for tagID := range peer.Tags {
  517. if _, ok := srcMap[tagID.String()]; ok {
  518. return true
  519. }
  520. }
  521. }
  522. if _, ok := srcMap[tagID.String()]; ok {
  523. if _, ok := dstMap["*"]; ok {
  524. return true
  525. }
  526. for tagID := range peer.Tags {
  527. if _, ok := dstMap[tagID.String()]; ok {
  528. return true
  529. }
  530. }
  531. }
  532. }
  533. for tagID := range peer.Tags {
  534. if _, ok := dstMap[tagID.String()]; ok {
  535. if _, ok := srcMap["*"]; ok {
  536. return true
  537. }
  538. for tagID := range node.Tags {
  539. if _, ok := srcMap[tagID.String()]; ok {
  540. return true
  541. }
  542. }
  543. }
  544. if _, ok := srcMap[tagID.String()]; ok {
  545. if _, ok := dstMap["*"]; ok {
  546. return true
  547. }
  548. for tagID := range node.Tags {
  549. if _, ok := dstMap[tagID.String()]; ok {
  550. return true
  551. }
  552. }
  553. }
  554. }
  555. }
  556. return false
  557. }
  558. // SortTagEntrys - Sorts slice of Tag entries by their id
  559. func SortAclEntrys(acls []models.Acl) {
  560. sort.Slice(acls, func(i, j int) bool {
  561. return acls[i].Name < acls[j].Name
  562. })
  563. }
  564. // UpdateDeviceTag - updates device tag on acl policies
  565. func UpdateDeviceTag(OldID, newID models.TagID, netID models.NetworkID) {
  566. acls := listDevicePolicies(netID)
  567. update := false
  568. for _, acl := range acls {
  569. for i, srcTagI := range acl.Src {
  570. if srcTagI.ID == models.DeviceAclID {
  571. if OldID.String() == srcTagI.Value {
  572. acl.Src[i].Value = newID.String()
  573. update = true
  574. }
  575. }
  576. }
  577. for i, dstTagI := range acl.Dst {
  578. if dstTagI.ID == models.DeviceAclID {
  579. if OldID.String() == dstTagI.Value {
  580. acl.Dst[i].Value = newID.String()
  581. update = true
  582. }
  583. }
  584. }
  585. if update {
  586. UpsertAcl(acl)
  587. }
  588. }
  589. }
  590. func CheckIfTagAsActivePolicy(tagID models.TagID, netID models.NetworkID) bool {
  591. acls := listDevicePolicies(netID)
  592. for _, acl := range acls {
  593. for _, srcTagI := range acl.Src {
  594. if srcTagI.ID == models.DeviceAclID {
  595. if tagID.String() == srcTagI.Value {
  596. return true
  597. }
  598. }
  599. }
  600. for _, dstTagI := range acl.Dst {
  601. if dstTagI.ID == models.DeviceAclID {
  602. return true
  603. }
  604. }
  605. }
  606. return false
  607. }
  608. // RemoveDeviceTagFromAclPolicies - remove device tag from acl policies
  609. func RemoveDeviceTagFromAclPolicies(tagID models.TagID, netID models.NetworkID) error {
  610. acls := listDevicePolicies(netID)
  611. update := false
  612. for _, acl := range acls {
  613. for i, srcTagI := range acl.Src {
  614. if srcTagI.ID == models.DeviceAclID {
  615. if tagID.String() == srcTagI.Value {
  616. acl.Src = append(acl.Src[:i], acl.Src[i+1:]...)
  617. update = true
  618. }
  619. }
  620. }
  621. for i, dstTagI := range acl.Dst {
  622. if dstTagI.ID == models.DeviceAclID {
  623. if tagID.String() == dstTagI.Value {
  624. acl.Dst = append(acl.Dst[:i], acl.Dst[i+1:]...)
  625. update = true
  626. }
  627. }
  628. }
  629. if update {
  630. UpsertAcl(acl)
  631. }
  632. }
  633. return nil
  634. }