acls.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "sort"
  7. "sync"
  8. "time"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/models"
  11. "github.com/gravitl/netmaker/servercfg"
  12. )
  13. var (
  14. aclCacheMutex = &sync.RWMutex{}
  15. aclCacheMap = make(map[string]models.Acl)
  16. )
  17. // CreateDefaultAclNetworkPolicies - create default acl network policies
  18. func CreateDefaultAclNetworkPolicies(netID models.NetworkID) {
  19. if netID.String() == "" {
  20. return
  21. }
  22. _, _ = ListAclsByNetwork(netID)
  23. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-nodes")) {
  24. defaultDeviceAcl := models.Acl{
  25. ID: fmt.Sprintf("%s.%s", netID, "all-nodes"),
  26. Name: "All Nodes",
  27. MetaData: "This Policy allows all nodes in the network to communicate with each other",
  28. Default: true,
  29. NetworkID: netID,
  30. RuleType: models.DevicePolicy,
  31. Src: []models.AclPolicyTag{
  32. {
  33. ID: models.DeviceAclID,
  34. Value: "*",
  35. }},
  36. Dst: []models.AclPolicyTag{
  37. {
  38. ID: models.DeviceAclID,
  39. Value: "*",
  40. }},
  41. AllowedDirection: models.TrafficDirectionBi,
  42. Enabled: true,
  43. CreatedBy: "auto",
  44. CreatedAt: time.Now().UTC(),
  45. }
  46. InsertAcl(defaultDeviceAcl)
  47. }
  48. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-users")) {
  49. defaultUserAcl := models.Acl{
  50. ID: fmt.Sprintf("%s.%s", netID, "all-users"),
  51. Default: true,
  52. Name: "All Users",
  53. MetaData: "This policy gives access to everything in the network for an user",
  54. NetworkID: netID,
  55. RuleType: models.UserPolicy,
  56. Src: []models.AclPolicyTag{
  57. {
  58. ID: models.UserAclID,
  59. Value: "*",
  60. },
  61. },
  62. Dst: []models.AclPolicyTag{{
  63. ID: models.DeviceAclID,
  64. Value: "*",
  65. }},
  66. AllowedDirection: models.TrafficDirectionUni,
  67. Enabled: true,
  68. CreatedBy: "auto",
  69. CreatedAt: time.Now().UTC(),
  70. }
  71. InsertAcl(defaultUserAcl)
  72. }
  73. if !IsAclExists(fmt.Sprintf("%s.%s", netID, "all-remote-access-gws")) {
  74. defaultUserAcl := models.Acl{
  75. ID: fmt.Sprintf("%s.%s", netID, "all-remote-access-gws"),
  76. Default: true,
  77. Name: "All Remote Access Gateways",
  78. NetworkID: netID,
  79. RuleType: models.DevicePolicy,
  80. Src: []models.AclPolicyTag{
  81. {
  82. ID: models.DeviceAclID,
  83. Value: fmt.Sprintf("%s.%s", netID, models.RemoteAccessTagName),
  84. },
  85. },
  86. Dst: []models.AclPolicyTag{
  87. {
  88. ID: models.DeviceAclID,
  89. Value: "*",
  90. },
  91. },
  92. AllowedDirection: models.TrafficDirectionBi,
  93. Enabled: true,
  94. CreatedBy: "auto",
  95. CreatedAt: time.Now().UTC(),
  96. }
  97. InsertAcl(defaultUserAcl)
  98. }
  99. CreateDefaultUserPolicies(netID)
  100. }
  101. // DeleteDefaultNetworkPolicies - deletes all default network acl policies
  102. func DeleteDefaultNetworkPolicies(netId models.NetworkID) {
  103. acls, _ := ListAclsByNetwork(netId)
  104. for _, acl := range acls {
  105. if acl.NetworkID == netId && acl.Default {
  106. DeleteAcl(acl)
  107. }
  108. }
  109. }
  110. // ValidateCreateAclReq - validates create req for acl
  111. func ValidateCreateAclReq(req models.Acl) error {
  112. // check if acl network exists
  113. _, err := GetNetwork(req.NetworkID.String())
  114. if err != nil {
  115. return errors.New("failed to get network details for " + req.NetworkID.String())
  116. }
  117. // err = CheckIDSyntax(req.Name)
  118. // if err != nil {
  119. // return err
  120. // }
  121. return nil
  122. }
  123. func listAclFromCache() (acls []models.Acl) {
  124. aclCacheMutex.RLock()
  125. defer aclCacheMutex.RUnlock()
  126. for _, acl := range aclCacheMap {
  127. acls = append(acls, acl)
  128. }
  129. return
  130. }
  131. func storeAclInCache(a models.Acl) {
  132. aclCacheMutex.Lock()
  133. defer aclCacheMutex.Unlock()
  134. aclCacheMap[a.ID] = a
  135. }
  136. func removeAclFromCache(a models.Acl) {
  137. aclCacheMutex.Lock()
  138. defer aclCacheMutex.Unlock()
  139. delete(aclCacheMap, a.ID)
  140. }
  141. func getAclFromCache(aID string) (a models.Acl, ok bool) {
  142. aclCacheMutex.RLock()
  143. defer aclCacheMutex.RUnlock()
  144. a, ok = aclCacheMap[aID]
  145. return
  146. }
  147. // InsertAcl - creates acl policy
  148. func InsertAcl(a models.Acl) error {
  149. d, err := json.Marshal(a)
  150. if err != nil {
  151. return err
  152. }
  153. err = database.Insert(a.ID, string(d), database.ACLS_TABLE_NAME)
  154. if err == nil && servercfg.CacheEnabled() {
  155. storeAclInCache(a)
  156. }
  157. return err
  158. }
  159. // GetAcl - gets acl info by id
  160. func GetAcl(aID string) (models.Acl, error) {
  161. a := models.Acl{}
  162. if servercfg.CacheEnabled() {
  163. var ok bool
  164. a, ok = getAclFromCache(aID)
  165. if ok {
  166. return a, nil
  167. }
  168. }
  169. d, err := database.FetchRecord(database.ACLS_TABLE_NAME, aID)
  170. if err != nil {
  171. return a, err
  172. }
  173. err = json.Unmarshal([]byte(d), &a)
  174. if err != nil {
  175. return a, err
  176. }
  177. if servercfg.CacheEnabled() {
  178. storeAclInCache(a)
  179. }
  180. return a, nil
  181. }
  182. // IsAclExists - checks if acl exists
  183. func IsAclExists(aclID string) bool {
  184. _, err := GetAcl(aclID)
  185. return err == nil
  186. }
  187. // IsAclPolicyValid - validates if acl policy is valid
  188. func IsAclPolicyValid(acl models.Acl) bool {
  189. //check if src and dst are valid
  190. switch acl.RuleType {
  191. case models.UserPolicy:
  192. // src list should only contain users
  193. for _, srcI := range acl.Src {
  194. if srcI.ID == "" || srcI.Value == "" {
  195. return false
  196. }
  197. if srcI.Value == "*" {
  198. continue
  199. }
  200. if srcI.ID != models.UserAclID && srcI.ID != models.UserGroupAclID {
  201. return false
  202. }
  203. // check if user group is valid
  204. if srcI.ID == models.UserAclID {
  205. _, err := GetUser(srcI.Value)
  206. if err != nil {
  207. return false
  208. }
  209. } else if srcI.ID == models.UserGroupAclID {
  210. err := IsGroupValid(models.UserGroupID(srcI.Value))
  211. if err != nil {
  212. return false
  213. }
  214. // check if group belongs to this network
  215. netGrps := GetUserGroupsInNetwork(acl.NetworkID)
  216. if _, ok := netGrps[models.UserGroupID(srcI.Value)]; !ok {
  217. return false
  218. }
  219. }
  220. }
  221. for _, dstI := range acl.Dst {
  222. if dstI.ID == "" || dstI.Value == "" {
  223. return false
  224. }
  225. if dstI.ID != models.DeviceAclID {
  226. return false
  227. }
  228. if dstI.Value == "*" {
  229. continue
  230. }
  231. // check if tag is valid
  232. _, err := GetTag(models.TagID(dstI.Value))
  233. if err != nil {
  234. return false
  235. }
  236. }
  237. case models.DevicePolicy:
  238. for _, srcI := range acl.Src {
  239. if srcI.ID == "" || srcI.Value == "" {
  240. return false
  241. }
  242. if srcI.ID != models.DeviceAclID {
  243. return false
  244. }
  245. if srcI.Value == "*" {
  246. continue
  247. }
  248. // check if tag is valid
  249. _, err := GetTag(models.TagID(srcI.Value))
  250. if err != nil {
  251. return false
  252. }
  253. }
  254. for _, dstI := range acl.Dst {
  255. if dstI.ID == "" || dstI.Value == "" {
  256. return false
  257. }
  258. if dstI.ID != models.DeviceAclID {
  259. return false
  260. }
  261. if dstI.Value == "*" {
  262. continue
  263. }
  264. // check if tag is valid
  265. _, err := GetTag(models.TagID(dstI.Value))
  266. if err != nil {
  267. return false
  268. }
  269. }
  270. }
  271. return true
  272. }
  273. // UpdateAcl - updates allowed fields on acls and commits to DB
  274. func UpdateAcl(newAcl, acl models.Acl) error {
  275. if !acl.Default {
  276. acl.Name = newAcl.Name
  277. acl.Src = newAcl.Src
  278. acl.Dst = newAcl.Dst
  279. }
  280. acl.Enabled = newAcl.Enabled
  281. d, err := json.Marshal(acl)
  282. if err != nil {
  283. return err
  284. }
  285. err = database.Insert(acl.ID, string(d), database.ACLS_TABLE_NAME)
  286. if err == nil && servercfg.CacheEnabled() {
  287. storeAclInCache(acl)
  288. }
  289. return err
  290. }
  291. // UpsertAcl - upserts acl
  292. func UpsertAcl(acl models.Acl) error {
  293. d, err := json.Marshal(acl)
  294. if err != nil {
  295. return err
  296. }
  297. err = database.Insert(acl.ID, string(d), database.ACLS_TABLE_NAME)
  298. if err == nil && servercfg.CacheEnabled() {
  299. storeAclInCache(acl)
  300. }
  301. return err
  302. }
  303. // DeleteAcl - deletes acl policy
  304. func DeleteAcl(a models.Acl) error {
  305. err := database.DeleteRecord(database.ACLS_TABLE_NAME, a.ID)
  306. if err == nil && servercfg.CacheEnabled() {
  307. removeAclFromCache(a)
  308. }
  309. return err
  310. }
  311. // GetDefaultPolicy - fetches default policy in the network by ruleType
  312. func GetDefaultPolicy(netID models.NetworkID, ruleType models.AclPolicyType) (models.Acl, error) {
  313. aclID := "all-users"
  314. if ruleType == models.DevicePolicy {
  315. aclID = "all-nodes"
  316. }
  317. acl, err := GetAcl(fmt.Sprintf("%s.%s", netID, aclID))
  318. if err != nil {
  319. return models.Acl{}, errors.New("default rule not found")
  320. }
  321. if acl.Enabled {
  322. return acl, nil
  323. }
  324. // check if there are any custom all policies
  325. srcMap := make(map[string]struct{})
  326. dstMap := make(map[string]struct{})
  327. defer func() {
  328. srcMap = nil
  329. dstMap = nil
  330. }()
  331. policies, _ := ListAclsByNetwork(netID)
  332. for _, policy := range policies {
  333. if !policy.Enabled {
  334. continue
  335. }
  336. if policy.RuleType == ruleType {
  337. dstMap = convAclTagToValueMap(policy.Dst)
  338. srcMap = convAclTagToValueMap(policy.Src)
  339. if _, ok := srcMap["*"]; ok {
  340. if _, ok := dstMap["*"]; ok {
  341. return policy, nil
  342. }
  343. }
  344. }
  345. }
  346. return acl, nil
  347. }
  348. func ListAcls() (acls []models.Acl) {
  349. if servercfg.CacheEnabled() && len(aclCacheMap) > 0 {
  350. return listAclFromCache()
  351. }
  352. data, err := database.FetchRecords(database.ACLS_TABLE_NAME)
  353. if err != nil && !database.IsEmptyRecord(err) {
  354. return []models.Acl{}
  355. }
  356. for _, dataI := range data {
  357. acl := models.Acl{}
  358. err := json.Unmarshal([]byte(dataI), &acl)
  359. if err != nil {
  360. continue
  361. }
  362. acls = append(acls, acl)
  363. if servercfg.CacheEnabled() {
  364. storeAclInCache(acl)
  365. }
  366. }
  367. return
  368. }
  369. // ListUserPolicies - lists all acl policies enforced on an user
  370. func ListUserPolicies(u models.User) []models.Acl {
  371. allAcls := ListAcls()
  372. userAcls := []models.Acl{}
  373. for _, acl := range allAcls {
  374. if acl.RuleType == models.UserPolicy {
  375. srcMap := convAclTagToValueMap(acl.Src)
  376. if _, ok := srcMap[u.UserName]; ok {
  377. userAcls = append(userAcls, acl)
  378. } else {
  379. // check for user groups
  380. for gID := range u.UserGroups {
  381. if _, ok := srcMap[gID.String()]; ok {
  382. userAcls = append(userAcls, acl)
  383. break
  384. }
  385. }
  386. }
  387. }
  388. }
  389. return userAcls
  390. }
  391. // listPoliciesOfUser - lists all user acl policies applied to user in an network
  392. func listPoliciesOfUser(user models.User, netID models.NetworkID) []models.Acl {
  393. allAcls := ListAcls()
  394. userAcls := []models.Acl{}
  395. for _, acl := range allAcls {
  396. if acl.NetworkID == netID && acl.RuleType == models.UserPolicy {
  397. srcMap := convAclTagToValueMap(acl.Src)
  398. if _, ok := srcMap[user.UserName]; ok {
  399. userAcls = append(userAcls, acl)
  400. continue
  401. }
  402. for netRole := range user.NetworkRoles {
  403. if _, ok := srcMap[netRole.String()]; ok {
  404. userAcls = append(userAcls, acl)
  405. continue
  406. }
  407. }
  408. for userG := range user.UserGroups {
  409. if _, ok := srcMap[userG.String()]; ok {
  410. userAcls = append(userAcls, acl)
  411. continue
  412. }
  413. }
  414. }
  415. }
  416. return userAcls
  417. }
  418. // listDevicePolicies - lists all device policies in a network
  419. func listDevicePolicies(netID models.NetworkID) []models.Acl {
  420. allAcls := ListAcls()
  421. deviceAcls := []models.Acl{}
  422. for _, acl := range allAcls {
  423. if acl.NetworkID == netID && acl.RuleType == models.DevicePolicy {
  424. deviceAcls = append(deviceAcls, acl)
  425. }
  426. }
  427. return deviceAcls
  428. }
  429. // ListAcls - lists all acl policies
  430. func ListAclsByNetwork(netID models.NetworkID) ([]models.Acl, error) {
  431. allAcls := ListAcls()
  432. netAcls := []models.Acl{}
  433. for _, acl := range allAcls {
  434. if acl.NetworkID == netID {
  435. netAcls = append(netAcls, acl)
  436. }
  437. }
  438. return netAcls, nil
  439. }
  440. func convAclTagToValueMap(acltags []models.AclPolicyTag) map[string]struct{} {
  441. aclValueMap := make(map[string]struct{})
  442. for _, aclTagI := range acltags {
  443. aclValueMap[aclTagI.Value] = struct{}{}
  444. }
  445. return aclValueMap
  446. }
  447. // IsUserAllowedToCommunicate - check if user is allowed to communicate with peer
  448. func IsUserAllowedToCommunicate(userName string, peer models.Node) bool {
  449. if peer.IsStatic {
  450. peer = peer.StaticNode.ConvertToStaticNode()
  451. }
  452. acl, _ := GetDefaultPolicy(models.NetworkID(peer.Network), models.UserPolicy)
  453. if acl.Enabled {
  454. return true
  455. }
  456. user, err := GetUser(userName)
  457. if err != nil {
  458. return false
  459. }
  460. policies := listPoliciesOfUser(*user, models.NetworkID(peer.Network))
  461. for _, policy := range policies {
  462. if !policy.Enabled {
  463. continue
  464. }
  465. dstMap := convAclTagToValueMap(policy.Dst)
  466. if _, ok := dstMap["*"]; ok {
  467. return true
  468. }
  469. for tagID := range peer.Tags {
  470. if _, ok := dstMap[tagID.String()]; ok {
  471. return true
  472. }
  473. }
  474. }
  475. return false
  476. }
  477. // IsNodeAllowedToCommunicate - check node is allowed to communicate with the peer
  478. func IsNodeAllowedToCommunicate(node, peer models.Node, checkDefaultPolicy bool) bool {
  479. if node.IsStatic {
  480. node = node.StaticNode.ConvertToStaticNode()
  481. }
  482. if peer.IsStatic {
  483. peer = peer.StaticNode.ConvertToStaticNode()
  484. }
  485. if checkDefaultPolicy {
  486. // check default policy if all allowed return true
  487. defaultPolicy, err := GetDefaultPolicy(models.NetworkID(node.Network), models.DevicePolicy)
  488. if err == nil {
  489. if defaultPolicy.Enabled {
  490. return true
  491. }
  492. }
  493. }
  494. // list device policies
  495. policies := listDevicePolicies(models.NetworkID(peer.Network))
  496. srcMap := make(map[string]struct{})
  497. dstMap := make(map[string]struct{})
  498. defer func() {
  499. srcMap = nil
  500. dstMap = nil
  501. }()
  502. for _, policy := range policies {
  503. if !policy.Enabled {
  504. continue
  505. }
  506. srcMap = convAclTagToValueMap(policy.Src)
  507. dstMap = convAclTagToValueMap(policy.Dst)
  508. // fmt.Printf("\n======> SRCMAP: %+v\n", srcMap)
  509. // fmt.Printf("\n======> DSTMAP: %+v\n", dstMap)
  510. // fmt.Printf("\n======> node Tags: %+v\n", node.Tags)
  511. // fmt.Printf("\n======> peer Tags: %+v\n", peer.Tags)
  512. for tagID := range node.Tags {
  513. if _, ok := dstMap[tagID.String()]; ok {
  514. if _, ok := srcMap["*"]; ok {
  515. return true
  516. }
  517. for tagID := range peer.Tags {
  518. if _, ok := srcMap[tagID.String()]; ok {
  519. return true
  520. }
  521. }
  522. }
  523. if _, ok := srcMap[tagID.String()]; ok {
  524. if _, ok := dstMap["*"]; ok {
  525. return true
  526. }
  527. for tagID := range peer.Tags {
  528. if _, ok := dstMap[tagID.String()]; ok {
  529. return true
  530. }
  531. }
  532. }
  533. }
  534. for tagID := range peer.Tags {
  535. if _, ok := dstMap[tagID.String()]; ok {
  536. if _, ok := srcMap["*"]; ok {
  537. return true
  538. }
  539. for tagID := range node.Tags {
  540. if _, ok := srcMap[tagID.String()]; ok {
  541. return true
  542. }
  543. }
  544. }
  545. if _, ok := srcMap[tagID.String()]; ok {
  546. if _, ok := dstMap["*"]; ok {
  547. return true
  548. }
  549. for tagID := range node.Tags {
  550. if _, ok := dstMap[tagID.String()]; ok {
  551. return true
  552. }
  553. }
  554. }
  555. }
  556. }
  557. return false
  558. }
  559. // SortTagEntrys - Sorts slice of Tag entries by their id
  560. func SortAclEntrys(acls []models.Acl) {
  561. sort.Slice(acls, func(i, j int) bool {
  562. return acls[i].Name < acls[j].Name
  563. })
  564. }
  565. // UpdateDeviceTag - updates device tag on acl policies
  566. func UpdateDeviceTag(OldID, newID models.TagID, netID models.NetworkID) {
  567. acls := listDevicePolicies(netID)
  568. update := false
  569. for _, acl := range acls {
  570. for i, srcTagI := range acl.Src {
  571. if srcTagI.ID == models.DeviceAclID {
  572. if OldID.String() == srcTagI.Value {
  573. acl.Src[i].Value = newID.String()
  574. update = true
  575. }
  576. }
  577. }
  578. for i, dstTagI := range acl.Dst {
  579. if dstTagI.ID == models.DeviceAclID {
  580. if OldID.String() == dstTagI.Value {
  581. acl.Dst[i].Value = newID.String()
  582. update = true
  583. }
  584. }
  585. }
  586. if update {
  587. UpsertAcl(acl)
  588. }
  589. }
  590. }
  591. func CheckIfTagAsActivePolicy(tagID models.TagID, netID models.NetworkID) bool {
  592. acls := listDevicePolicies(netID)
  593. for _, acl := range acls {
  594. for _, srcTagI := range acl.Src {
  595. if srcTagI.ID == models.DeviceAclID {
  596. if tagID.String() == srcTagI.Value {
  597. return true
  598. }
  599. }
  600. }
  601. for _, dstTagI := range acl.Dst {
  602. if dstTagI.ID == models.DeviceAclID {
  603. return true
  604. }
  605. }
  606. }
  607. return false
  608. }
  609. // RemoveDeviceTagFromAclPolicies - remove device tag from acl policies
  610. func RemoveDeviceTagFromAclPolicies(tagID models.TagID, netID models.NetworkID) error {
  611. acls := listDevicePolicies(netID)
  612. update := false
  613. for _, acl := range acls {
  614. for i, srcTagI := range acl.Src {
  615. if srcTagI.ID == models.DeviceAclID {
  616. if tagID.String() == srcTagI.Value {
  617. acl.Src = append(acl.Src[:i], acl.Src[i+1:]...)
  618. update = true
  619. }
  620. }
  621. }
  622. for i, dstTagI := range acl.Dst {
  623. if dstTagI.ID == models.DeviceAclID {
  624. if tagID.String() == dstTagI.Value {
  625. acl.Dst = append(acl.Dst[:i], acl.Dst[i+1:]...)
  626. update = true
  627. }
  628. }
  629. }
  630. if update {
  631. UpsertAcl(acl)
  632. }
  633. }
  634. return nil
  635. }