authGrpc.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. package controller
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/functions"
  8. nodepb "github.com/gravitl/netmaker/grpc"
  9. "github.com/gravitl/netmaker/models"
  10. "golang.org/x/crypto/bcrypt"
  11. "google.golang.org/grpc"
  12. "google.golang.org/grpc/codes"
  13. "google.golang.org/grpc/metadata"
  14. "google.golang.org/grpc/status"
  15. )
  16. func AuthServerUnaryInterceptor(ctx context.Context,
  17. req interface{},
  18. info *grpc.UnaryServerInfo,
  19. handler grpc.UnaryHandler) (interface{}, error) {
  20. // Skip authorize when GetJWT is requested
  21. if info.FullMethod != "/node.NodeService/Login" {
  22. if info.FullMethod != "/node.NodeService/CreateNode" {
  23. err := grpcAuthorize(ctx)
  24. if err != nil {
  25. return nil, err
  26. }
  27. }
  28. }
  29. // Calls the handler
  30. h, err := handler(ctx, req)
  31. return h, err
  32. }
  33. func AuthServerStreamInterceptor(
  34. srv interface{},
  35. stream grpc.ServerStream,
  36. info *grpc.StreamServerInfo,
  37. handler grpc.StreamHandler,
  38. ) error {
  39. if info.FullMethod == "/node.NodeService/GetPeers" {
  40. if err := grpcAuthorize(stream.Context()); err != nil {
  41. return err
  42. }
  43. }
  44. // Calls the handler
  45. return handler(srv, stream)
  46. }
  47. func grpcAuthorize(ctx context.Context) error {
  48. md, ok := metadata.FromIncomingContext(ctx)
  49. if !ok {
  50. return status.Errorf(codes.InvalidArgument, "Retrieving metadata is failed")
  51. }
  52. authHeader, ok := md["authorization"]
  53. if !ok {
  54. return status.Errorf(codes.Unauthenticated, "Authorization token is not supplied")
  55. }
  56. authToken := authHeader[0]
  57. mac, network, err := functions.VerifyToken(authToken)
  58. if err != nil {
  59. return err
  60. }
  61. networkexists, err := functions.NetworkExists(network)
  62. if err != nil {
  63. return status.Errorf(codes.Unauthenticated, "Unauthorized. Network does not exist: "+network)
  64. }
  65. emptynode := models.Node{}
  66. node, err := functions.GetNodeByMacAddress(network, mac)
  67. if !database.IsEmptyRecord(err) {
  68. if node, err = functions.GetDeletedNodeByMacAddress(network, mac); err != nil {
  69. if !database.IsEmptyRecord(err) {
  70. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  71. }
  72. } else {
  73. node.SetID()
  74. if functions.RemoveDeletedNode(node.ID) {
  75. return nil
  76. }
  77. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  78. }
  79. } else if err != nil || node.MacAddress == emptynode.MacAddress {
  80. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  81. }
  82. //check that the request is for a valid network
  83. //if (networkCheck && !networkexists) || err != nil {
  84. if !networkexists {
  85. return status.Errorf(codes.Unauthenticated, "Network does not exist.")
  86. } else {
  87. return nil
  88. }
  89. }
  90. //Node authenticates using its password and retrieves a JWT for authorization.
  91. func (s *NodeServiceServer) Login(ctx context.Context, req *nodepb.Object) (*nodepb.Object, error) {
  92. //out := new(LoginResponse)
  93. var reqNode models.Node
  94. if err := json.Unmarshal([]byte(req.Data), &reqNode); err != nil {
  95. return nil, err
  96. }
  97. macaddress := reqNode.MacAddress
  98. network := reqNode.Network
  99. password := reqNode.Password
  100. var result models.NodeAuth
  101. err := errors.New("Generic server error.")
  102. if macaddress == "" {
  103. //TODO: Set Error response
  104. err = errors.New("Missing Mac Address.")
  105. return nil, err
  106. } else if password == "" {
  107. err = errors.New("Missing Password.")
  108. return nil, err
  109. } else {
  110. //Search DB for node with Mac Address. Ignore pending nodes (they should not be able to authenticate with API untill approved).
  111. collection, err := database.FetchRecords(database.NODES_TABLE_NAME)
  112. if err != nil {
  113. return nil, err
  114. }
  115. for _, value := range collection {
  116. if err = json.Unmarshal([]byte(value), &result); err != nil {
  117. continue // finish going through nodes
  118. }
  119. if result.MacAddress == macaddress && result.Network == network {
  120. break
  121. }
  122. }
  123. //compare password from request to stored password in database
  124. //might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  125. //TODO: Consider a way of hashing the password client side before sending, or using certificates
  126. err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(password))
  127. if err != nil && result.Password != password {
  128. return nil, err
  129. } else {
  130. //Create a new JWT for the node
  131. tokenString, err := functions.CreateJWT(macaddress, result.Network)
  132. if err != nil {
  133. return nil, err
  134. }
  135. if tokenString == "" {
  136. err = errors.New("Something went wrong. Could not retrieve token.")
  137. return nil, err
  138. }
  139. response := &nodepb.Object{
  140. Data: tokenString,
  141. Type: nodepb.ACCESS_TOKEN,
  142. }
  143. return response, nil
  144. }
  145. }
  146. }