auth.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452
  1. package logic
  2. import (
  3. "context"
  4. "encoding/base64"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "time"
  9. "github.com/go-playground/validator/v10"
  10. "golang.org/x/crypto/bcrypt"
  11. "golang.org/x/exp/slog"
  12. "github.com/gravitl/netmaker/database"
  13. "github.com/gravitl/netmaker/db"
  14. "github.com/gravitl/netmaker/logger"
  15. "github.com/gravitl/netmaker/models"
  16. "github.com/gravitl/netmaker/schema"
  17. )
  18. const (
  19. auth_key = "netmaker_auth"
  20. )
  21. var (
  22. superUser = models.User{}
  23. )
  24. func ClearSuperUserCache() {
  25. superUser = models.User{}
  26. }
  27. // HasSuperAdmin - checks if server has an superadmin/owner
  28. func HasSuperAdmin() (bool, error) {
  29. if superUser.IsSuperAdmin {
  30. return true, nil
  31. }
  32. collection, err := database.FetchRecords(database.USERS_TABLE_NAME)
  33. if err != nil {
  34. if database.IsEmptyRecord(err) {
  35. return false, nil
  36. } else {
  37. return true, err
  38. }
  39. }
  40. for _, value := range collection { // filter for isadmin true
  41. var user models.User
  42. err = json.Unmarshal([]byte(value), &user)
  43. if err != nil {
  44. continue
  45. }
  46. if user.PlatformRoleID == models.SuperAdminRole || user.IsSuperAdmin {
  47. return true, nil
  48. }
  49. }
  50. return false, err
  51. }
  52. // GetUsersDB - gets users
  53. func GetUsersDB() ([]models.User, error) {
  54. var users []models.User
  55. collection, err := database.FetchRecords(database.USERS_TABLE_NAME)
  56. if err != nil {
  57. return users, err
  58. }
  59. for _, value := range collection {
  60. var user models.User
  61. err = json.Unmarshal([]byte(value), &user)
  62. if err != nil {
  63. continue // get users
  64. }
  65. users = append(users, user)
  66. }
  67. return users, err
  68. }
  69. // GetUsers - gets users
  70. func GetUsers() ([]models.ReturnUser, error) {
  71. var users []models.ReturnUser
  72. collection, err := database.FetchRecords(database.USERS_TABLE_NAME)
  73. if err != nil {
  74. return users, err
  75. }
  76. for _, value := range collection {
  77. var user models.ReturnUser
  78. err = json.Unmarshal([]byte(value), &user)
  79. if err != nil {
  80. continue // get users
  81. }
  82. users = append(users, user)
  83. }
  84. return users, err
  85. }
  86. // IsOauthUser - returns
  87. func IsOauthUser(user *models.User) error {
  88. var currentValue, err = FetchPassValue("")
  89. if err != nil {
  90. return err
  91. }
  92. var bCryptErr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(currentValue))
  93. return bCryptErr
  94. }
  95. func FetchPassValue(newValue string) (string, error) {
  96. type valueHolder struct {
  97. Value string `json:"value" bson:"value"`
  98. }
  99. newValueHolder := valueHolder{}
  100. var currentValue, err = FetchAuthSecret()
  101. if err != nil {
  102. return "", err
  103. }
  104. var unmarshErr = json.Unmarshal([]byte(currentValue), &newValueHolder)
  105. if unmarshErr != nil {
  106. return "", unmarshErr
  107. }
  108. var b64CurrentValue, b64Err = base64.StdEncoding.DecodeString(newValueHolder.Value)
  109. if b64Err != nil {
  110. logger.Log(0, "could not decode pass")
  111. return "", nil
  112. }
  113. return string(b64CurrentValue), nil
  114. }
  115. // CreateUser - creates a user
  116. func CreateUser(user *models.User) error {
  117. // check if user exists
  118. if _, err := GetUser(user.UserName); err == nil {
  119. return errors.New("user exists")
  120. }
  121. SetUserDefaults(user)
  122. if err := IsGroupsValid(user.UserGroups); err != nil {
  123. return errors.New("invalid groups: " + err.Error())
  124. }
  125. if err := IsNetworkRolesValid(user.NetworkRoles); err != nil {
  126. return errors.New("invalid network roles: " + err.Error())
  127. }
  128. var err = ValidateUser(user)
  129. if err != nil {
  130. logger.Log(0, "failed to validate user", err.Error())
  131. return err
  132. }
  133. // encrypt that password so we never see it again
  134. hash, err := bcrypt.GenerateFromPassword([]byte(user.Password), 5)
  135. if err != nil {
  136. logger.Log(0, "error encrypting pass", err.Error())
  137. return err
  138. }
  139. // set password to encrypted password
  140. user.Password = string(hash)
  141. user.AuthType = models.BasicAuth
  142. if IsOauthUser(user) == nil {
  143. user.AuthType = models.OAuth
  144. }
  145. AddGlobalNetRolesToAdmins(user)
  146. _, err = CreateUserJWT(user.UserName, user.PlatformRoleID)
  147. if err != nil {
  148. logger.Log(0, "failed to generate token", err.Error())
  149. return err
  150. }
  151. // connect db
  152. data, err := json.Marshal(user)
  153. if err != nil {
  154. logger.Log(0, "failed to marshal", err.Error())
  155. return err
  156. }
  157. err = database.Insert(user.UserName, string(data), database.USERS_TABLE_NAME)
  158. if err != nil {
  159. logger.Log(0, "failed to insert user", err.Error())
  160. return err
  161. }
  162. return nil
  163. }
  164. // CreateSuperAdmin - creates an super admin user
  165. func CreateSuperAdmin(u *models.User) error {
  166. hassuperadmin, err := HasSuperAdmin()
  167. if err != nil {
  168. return err
  169. }
  170. if hassuperadmin {
  171. return errors.New("superadmin user already exists")
  172. }
  173. u.PlatformRoleID = models.SuperAdminRole
  174. return CreateUser(u)
  175. }
  176. // VerifyAuthRequest - verifies an auth request
  177. func VerifyAuthRequest(authRequest models.UserAuthParams) (string, error) {
  178. var result models.User
  179. if authRequest.UserName == "" {
  180. return "", errors.New("username can't be empty")
  181. } else if authRequest.Password == "" {
  182. return "", errors.New("password can't be empty")
  183. }
  184. // Search DB for node with Mac Address. Ignore pending nodes (they should not be able to authenticate with API until approved).
  185. record, err := database.FetchRecord(database.USERS_TABLE_NAME, authRequest.UserName)
  186. if err != nil {
  187. return "", errors.New("incorrect credentials")
  188. }
  189. if err = json.Unmarshal([]byte(record), &result); err != nil {
  190. return "", errors.New("error unmarshalling user json: " + err.Error())
  191. }
  192. // compare password from request to stored password in database
  193. // might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  194. // TODO: Consider a way of hashing the password client side before sending, or using certificates
  195. if err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(authRequest.Password)); err != nil {
  196. return "", errors.New("incorrect credentials")
  197. }
  198. // Create a new JWT for the node
  199. tokenString, err := CreateUserJWT(authRequest.UserName, result.PlatformRoleID)
  200. if err != nil {
  201. slog.Error("error creating jwt", "error", err)
  202. return "", err
  203. }
  204. // update last login time
  205. result.LastLoginTime = time.Now()
  206. err = UpsertUser(result)
  207. if err != nil {
  208. slog.Error("error upserting user", "error", err)
  209. return "", err
  210. }
  211. return tokenString, nil
  212. }
  213. // UpsertUser - updates user in the db
  214. func UpsertUser(user models.User) error {
  215. data, err := json.Marshal(&user)
  216. if err != nil {
  217. slog.Error("error marshalling user", "user", user.UserName, "error", err.Error())
  218. return err
  219. }
  220. if err = database.Insert(user.UserName, string(data), database.USERS_TABLE_NAME); err != nil {
  221. slog.Error("error inserting user", "user", user.UserName, "error", err.Error())
  222. return err
  223. }
  224. if user.IsSuperAdmin {
  225. superUser = user
  226. }
  227. return nil
  228. }
  229. // UpdateUser - updates a given user
  230. func UpdateUser(userchange, user *models.User) (*models.User, error) {
  231. // check if user exists
  232. if _, err := GetUser(user.UserName); err != nil {
  233. return &models.User{}, err
  234. }
  235. queryUser := user.UserName
  236. if userchange.UserName != "" && user.UserName != userchange.UserName {
  237. // check if username is available
  238. if _, err := GetUser(userchange.UserName); err == nil {
  239. return &models.User{}, errors.New("username exists already")
  240. }
  241. user.UserName = userchange.UserName
  242. }
  243. if userchange.Password != "" {
  244. if len(userchange.Password) < 5 {
  245. return &models.User{}, errors.New("password requires min 5 characters")
  246. }
  247. // encrypt that password so we never see it again
  248. hash, err := bcrypt.GenerateFromPassword([]byte(userchange.Password), 5)
  249. if err != nil {
  250. return userchange, err
  251. }
  252. // set password to encrypted password
  253. userchange.Password = string(hash)
  254. user.Password = userchange.Password
  255. }
  256. if err := IsGroupsValid(userchange.UserGroups); err != nil {
  257. return userchange, errors.New("invalid groups: " + err.Error())
  258. }
  259. if err := IsNetworkRolesValid(userchange.NetworkRoles); err != nil {
  260. return userchange, errors.New("invalid network roles: " + err.Error())
  261. }
  262. // Reset Gw Access for service users
  263. go UpdateUserGwAccess(*user, *userchange)
  264. if userchange.PlatformRoleID != "" {
  265. user.PlatformRoleID = userchange.PlatformRoleID
  266. }
  267. user.UserGroups = userchange.UserGroups
  268. user.NetworkRoles = userchange.NetworkRoles
  269. AddGlobalNetRolesToAdmins(user)
  270. err := ValidateUser(user)
  271. if err != nil {
  272. return &models.User{}, err
  273. }
  274. if err = database.DeleteRecord(database.USERS_TABLE_NAME, queryUser); err != nil {
  275. return &models.User{}, err
  276. }
  277. data, err := json.Marshal(&user)
  278. if err != nil {
  279. return &models.User{}, err
  280. }
  281. if err = database.Insert(user.UserName, string(data), database.USERS_TABLE_NAME); err != nil {
  282. return &models.User{}, err
  283. }
  284. logger.Log(1, "updated user", queryUser)
  285. return user, nil
  286. }
  287. // ValidateUser - validates a user model
  288. func ValidateUser(user *models.User) error {
  289. // check if role is valid
  290. _, err := GetRole(user.PlatformRoleID)
  291. if err != nil {
  292. return errors.New("failed to fetch platform role " + user.PlatformRoleID.String())
  293. }
  294. v := validator.New()
  295. _ = v.RegisterValidation("in_charset", func(fl validator.FieldLevel) bool {
  296. isgood := user.NameInCharSet()
  297. return isgood
  298. })
  299. err = v.Struct(user)
  300. if err != nil {
  301. for _, e := range err.(validator.ValidationErrors) {
  302. logger.Log(2, e.Error())
  303. }
  304. }
  305. return err
  306. }
  307. // DeleteUser - deletes a given user
  308. func DeleteUser(user string) error {
  309. if userRecord, err := database.FetchRecord(database.USERS_TABLE_NAME, user); err != nil || len(userRecord) == 0 {
  310. return errors.New("user does not exist")
  311. }
  312. err := database.DeleteRecord(database.USERS_TABLE_NAME, user)
  313. if err != nil {
  314. return err
  315. }
  316. go RemoveUserFromAclPolicy(user)
  317. return (&schema.UserAccessToken{UserName: user}).DeleteAllUserTokens(db.WithContext(context.TODO()))
  318. }
  319. func SetAuthSecret(secret string) error {
  320. type valueHolder struct {
  321. Value string `json:"value" bson:"value"`
  322. }
  323. record, err := FetchAuthSecret()
  324. if err == nil {
  325. v := valueHolder{}
  326. json.Unmarshal([]byte(record), &v)
  327. if v.Value != "" {
  328. return nil
  329. }
  330. }
  331. var b64NewValue = base64.StdEncoding.EncodeToString([]byte(secret))
  332. newValueHolder := valueHolder{
  333. Value: b64NewValue,
  334. }
  335. d, _ := json.Marshal(newValueHolder)
  336. return database.Insert(auth_key, string(d), database.GENERATED_TABLE_NAME)
  337. }
  338. // FetchAuthSecret - manages secrets for oauth
  339. func FetchAuthSecret() (string, error) {
  340. var record, err = database.FetchRecord(database.GENERATED_TABLE_NAME, auth_key)
  341. if err != nil {
  342. return "", err
  343. }
  344. return record, nil
  345. }
  346. // GetState - gets an SsoState from DB, if expired returns error
  347. func GetState(state string) (*models.SsoState, error) {
  348. var s models.SsoState
  349. record, err := database.FetchRecord(database.SSO_STATE_CACHE, state)
  350. if err != nil {
  351. return &s, err
  352. }
  353. if err = json.Unmarshal([]byte(record), &s); err != nil {
  354. return &s, err
  355. }
  356. if s.IsExpired() {
  357. return &s, fmt.Errorf("state expired")
  358. }
  359. return &s, nil
  360. }
  361. // SetState - sets a state with new expiration
  362. func SetState(state string) error {
  363. s := models.SsoState{
  364. Value: state,
  365. Expiration: time.Now().Add(models.DefaultExpDuration),
  366. }
  367. data, err := json.Marshal(&s)
  368. if err != nil {
  369. return err
  370. }
  371. return database.Insert(state, string(data), database.SSO_STATE_CACHE)
  372. }
  373. // IsStateValid - checks if given state is valid or not
  374. // deletes state after call is made to clean up, should only be called once per sign-in
  375. func IsStateValid(state string) (string, bool) {
  376. s, err := GetState(state)
  377. if err != nil {
  378. logger.Log(2, "error retrieving oauth state:", err.Error())
  379. return "", false
  380. }
  381. if s.Value != "" {
  382. if err = delState(state); err != nil {
  383. logger.Log(2, "error deleting oauth state:", err.Error())
  384. return "", false
  385. }
  386. }
  387. return s.Value, true
  388. }
  389. // delState - removes a state from cache/db
  390. func delState(state string) error {
  391. return database.DeleteRecord(database.SSO_STATE_CACHE, state)
  392. }