security.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. package logic
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "github.com/gravitl/netmaker/logger"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/models"
  9. )
  10. func NetworkPermissionsCheck(username string, r *http.Request) error {
  11. // at this point global checks should be completed
  12. user, err := logic.GetUser(username)
  13. if err != nil {
  14. return err
  15. }
  16. logger.Log(0, "NET MIDDL----> 1")
  17. userRole, err := logic.GetRole(user.PlatformRoleID)
  18. if err != nil {
  19. return errors.New("access denied")
  20. }
  21. if userRole.FullAccess {
  22. return nil
  23. }
  24. logger.Log(0, "NET MIDDL----> 2")
  25. // get info from header to determine the target rsrc
  26. targetRsrc := r.Header.Get("TARGET_RSRC")
  27. targetRsrcID := r.Header.Get("TARGET_RSRC_ID")
  28. netID := r.Header.Get("NET_ID")
  29. if targetRsrc == "" {
  30. return errors.New("target rsrc is missing")
  31. }
  32. if netID == "" {
  33. return errors.New("network id is missing")
  34. }
  35. if r.Method == "" {
  36. r.Method = http.MethodGet
  37. }
  38. if targetRsrc == models.MetricRsrc.String() {
  39. return nil
  40. }
  41. // check if user has scope for target resource
  42. // TODO - differentitate between global scope and network scope apis
  43. netRoles := user.NetworkRoles[models.NetworkID(netID)]
  44. for netRoleID := range netRoles {
  45. err = checkNetworkAccessPermissions(netRoleID, username, r.Method, targetRsrc, targetRsrcID)
  46. if err == nil {
  47. return nil
  48. }
  49. }
  50. for groupID := range user.UserGroups {
  51. userG, err := GetUserGroup(groupID)
  52. if err == nil {
  53. netRoles := userG.NetworkRoles[models.NetworkID(netID)]
  54. for netRoleID := range netRoles {
  55. err = checkNetworkAccessPermissions(netRoleID, username, r.Method, targetRsrc, targetRsrcID)
  56. if err == nil {
  57. return nil
  58. }
  59. }
  60. }
  61. }
  62. return errors.New("access denied")
  63. }
  64. func checkNetworkAccessPermissions(netRoleID models.UserRole, username, reqScope, targetRsrc, targetRsrcID string) error {
  65. networkPermissionScope, err := logic.GetRole(netRoleID)
  66. if err != nil {
  67. return err
  68. }
  69. logger.Log(0, "NET MIDDL----> 3", string(netRoleID))
  70. if networkPermissionScope.FullAccess {
  71. return nil
  72. }
  73. rsrcPermissionScope, ok := networkPermissionScope.NetworkLevelAccess[models.RsrcType(targetRsrc)]
  74. if targetRsrc == models.HostRsrc.String() && !ok {
  75. rsrcPermissionScope, ok = networkPermissionScope.NetworkLevelAccess[models.RemoteAccessGwRsrc]
  76. }
  77. if !ok {
  78. return errors.New("access denied")
  79. }
  80. logger.Log(0, "NET MIDDL----> 4", string(netRoleID))
  81. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", targetRsrc))]; ok {
  82. // handle extclient apis here
  83. if models.RsrcType(targetRsrc) == models.ExtClientsRsrc && allRsrcsTypePermissionScope.SelfOnly && targetRsrcID != "" {
  84. extclient, err := logic.GetExtClient(targetRsrcID, networkPermissionScope.NetworkID)
  85. if err != nil {
  86. return err
  87. }
  88. if !logic.IsUserAllowedAccessToExtClient(username, extclient) {
  89. return errors.New("access denied")
  90. }
  91. }
  92. err = checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, reqScope)
  93. if err == nil {
  94. return nil
  95. }
  96. }
  97. if targetRsrc == models.HostRsrc.String() {
  98. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", models.RemoteAccessGwRsrc))]; ok {
  99. err = checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, reqScope)
  100. if err == nil {
  101. return nil
  102. }
  103. }
  104. }
  105. logger.Log(0, "NET MIDDL----> 5", string(netRoleID))
  106. if targetRsrcID == "" {
  107. return errors.New("target rsrc id is empty")
  108. }
  109. if scope, ok := rsrcPermissionScope[models.RsrcID(targetRsrcID)]; ok {
  110. err = checkPermissionScopeWithReqMethod(scope, reqScope)
  111. if err == nil {
  112. return nil
  113. }
  114. }
  115. logger.Log(0, "NET MIDDL----> 6", string(netRoleID))
  116. return errors.New("access denied")
  117. }
  118. func GlobalPermissionsCheck(username string, r *http.Request) error {
  119. user, err := logic.GetUser(username)
  120. if err != nil {
  121. return err
  122. }
  123. userRole, err := logic.GetRole(user.PlatformRoleID)
  124. if err != nil {
  125. return errors.New("access denied")
  126. }
  127. if userRole.FullAccess {
  128. return nil
  129. }
  130. targetRsrc := r.Header.Get("TARGET_RSRC")
  131. targetRsrcID := r.Header.Get("TARGET_RSRC_ID")
  132. if targetRsrc == "" {
  133. return errors.New("target rsrc is missing")
  134. }
  135. if r.Method == "" {
  136. r.Method = http.MethodGet
  137. }
  138. if targetRsrc == models.MetricRsrc.String() {
  139. return nil
  140. }
  141. if (targetRsrc == models.HostRsrc.String() || targetRsrc == models.NetworkRsrc.String()) && r.Method == http.MethodGet && targetRsrcID == "" {
  142. return nil
  143. }
  144. if targetRsrc == models.UserRsrc.String() && username == targetRsrcID && (r.Method != http.MethodDelete) {
  145. return nil
  146. }
  147. rsrcPermissionScope, ok := userRole.GlobalLevelAccess[models.RsrcType(targetRsrc)]
  148. if !ok {
  149. return fmt.Errorf("access denied to %s rsrc", targetRsrc)
  150. }
  151. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", targetRsrc))]; ok {
  152. return checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, r.Method)
  153. }
  154. if targetRsrcID == "" {
  155. return errors.New("target rsrc id is missing")
  156. }
  157. if scope, ok := rsrcPermissionScope[models.RsrcID(targetRsrcID)]; ok {
  158. return checkPermissionScopeWithReqMethod(scope, r.Method)
  159. }
  160. return errors.New("access denied")
  161. }
  162. func checkPermissionScopeWithReqMethod(scope models.RsrcPermissionScope, reqmethod string) error {
  163. if reqmethod == http.MethodGet && scope.Read {
  164. return nil
  165. }
  166. if (reqmethod == http.MethodPatch || reqmethod == http.MethodPut) && scope.Update {
  167. return nil
  168. }
  169. if reqmethod == http.MethodDelete && scope.Delete {
  170. return nil
  171. }
  172. if reqmethod == http.MethodPost && scope.Create {
  173. return nil
  174. }
  175. return errors.New("operation not permitted")
  176. }