security.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. package logic
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "github.com/gravitl/netmaker/logger"
  7. "github.com/gravitl/netmaker/logic"
  8. "github.com/gravitl/netmaker/models"
  9. )
  10. func NetworkPermissionsCheck(username string, r *http.Request) error {
  11. // at this point global checks should be completed
  12. user, err := logic.GetUser(username)
  13. if err != nil {
  14. return err
  15. }
  16. logger.Log(0, "NET MIDDL----> 1")
  17. userRole, err := logic.GetRole(user.PlatformRoleID)
  18. if err != nil {
  19. return errors.New("access denied")
  20. }
  21. if userRole.FullAccess {
  22. return nil
  23. }
  24. logger.Log(0, "NET MIDDL----> 2")
  25. // get info from header to determine the target rsrc
  26. targetRsrc := r.Header.Get("TARGET_RSRC")
  27. targetRsrcID := r.Header.Get("TARGET_RSRC_ID")
  28. netID := r.Header.Get("NET_ID")
  29. if targetRsrc == "" {
  30. return errors.New("target rsrc is missing")
  31. }
  32. if netID == "" {
  33. return errors.New("network id is missing")
  34. }
  35. if r.Method == "" {
  36. r.Method = http.MethodGet
  37. }
  38. if targetRsrc == models.MetricRsrc.String() {
  39. return nil
  40. }
  41. // check if user has scope for target resource
  42. // TODO - differentitate between global scope and network scope apis
  43. // check for global network role
  44. if netRoles, ok := user.NetworkRoles[models.AllNetworks]; ok {
  45. for netRoleID := range netRoles {
  46. err = checkNetworkAccessPermissions(netRoleID, username, r.Method, targetRsrc, targetRsrcID, netID)
  47. if err == nil {
  48. return nil
  49. }
  50. }
  51. }
  52. netRoles := user.NetworkRoles[models.NetworkID(netID)]
  53. for netRoleID := range netRoles {
  54. err = checkNetworkAccessPermissions(netRoleID, username, r.Method, targetRsrc, targetRsrcID, netID)
  55. if err == nil {
  56. return nil
  57. }
  58. }
  59. for groupID := range user.UserGroups {
  60. userG, err := GetUserGroup(groupID)
  61. if err == nil {
  62. netRoles := userG.NetworkRoles[models.NetworkID(netID)]
  63. for netRoleID := range netRoles {
  64. err = checkNetworkAccessPermissions(netRoleID, username, r.Method, targetRsrc, targetRsrcID, netID)
  65. if err == nil {
  66. return nil
  67. }
  68. }
  69. }
  70. }
  71. return errors.New("access denied")
  72. }
  73. func checkNetworkAccessPermissions(netRoleID models.UserRoleID, username, reqScope, targetRsrc, targetRsrcID, netID string) error {
  74. networkPermissionScope, err := logic.GetRole(netRoleID)
  75. if err != nil {
  76. return err
  77. }
  78. logger.Log(0, "NET MIDDL----> 3", string(netRoleID))
  79. if networkPermissionScope.FullAccess {
  80. return nil
  81. }
  82. rsrcPermissionScope, ok := networkPermissionScope.NetworkLevelAccess[models.RsrcType(targetRsrc)]
  83. if targetRsrc == models.HostRsrc.String() && !ok {
  84. rsrcPermissionScope, ok = networkPermissionScope.NetworkLevelAccess[models.RemoteAccessGwRsrc]
  85. }
  86. if !ok {
  87. return errors.New("access denied")
  88. }
  89. logger.Log(0, "NET MIDDL----> 4", string(netRoleID))
  90. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", targetRsrc))]; ok {
  91. // handle extclient apis here
  92. if models.RsrcType(targetRsrc) == models.ExtClientsRsrc && allRsrcsTypePermissionScope.SelfOnly && targetRsrcID != "" {
  93. extclient, err := logic.GetExtClient(targetRsrcID, netID)
  94. if err != nil {
  95. return err
  96. }
  97. if !logic.IsUserAllowedAccessToExtClient(username, extclient) {
  98. return errors.New("access denied")
  99. }
  100. }
  101. err = checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, reqScope)
  102. if err == nil {
  103. return nil
  104. }
  105. }
  106. if targetRsrc == models.HostRsrc.String() {
  107. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", models.RemoteAccessGwRsrc))]; ok {
  108. err = checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, reqScope)
  109. if err == nil {
  110. return nil
  111. }
  112. }
  113. }
  114. logger.Log(0, "NET MIDDL----> 5", string(netRoleID))
  115. if targetRsrcID == "" {
  116. return errors.New("target rsrc id is empty")
  117. }
  118. if scope, ok := rsrcPermissionScope[models.RsrcID(targetRsrcID)]; ok {
  119. err = checkPermissionScopeWithReqMethod(scope, reqScope)
  120. if err == nil {
  121. return nil
  122. }
  123. }
  124. logger.Log(0, "NET MIDDL----> 6", string(netRoleID))
  125. return errors.New("access denied")
  126. }
  127. func GlobalPermissionsCheck(username string, r *http.Request) error {
  128. user, err := logic.GetUser(username)
  129. if err != nil {
  130. return err
  131. }
  132. userRole, err := logic.GetRole(user.PlatformRoleID)
  133. if err != nil {
  134. return errors.New("access denied")
  135. }
  136. if userRole.FullAccess {
  137. return nil
  138. }
  139. targetRsrc := r.Header.Get("TARGET_RSRC")
  140. targetRsrcID := r.Header.Get("TARGET_RSRC_ID")
  141. if targetRsrc == "" {
  142. return errors.New("target rsrc is missing")
  143. }
  144. if r.Method == "" {
  145. r.Method = http.MethodGet
  146. }
  147. if targetRsrc == models.MetricRsrc.String() {
  148. return nil
  149. }
  150. if (targetRsrc == models.HostRsrc.String() || targetRsrc == models.NetworkRsrc.String()) && r.Method == http.MethodGet && targetRsrcID == "" {
  151. return nil
  152. }
  153. if targetRsrc == models.UserRsrc.String() && username == targetRsrcID && (r.Method != http.MethodDelete) {
  154. return nil
  155. }
  156. rsrcPermissionScope, ok := userRole.GlobalLevelAccess[models.RsrcType(targetRsrc)]
  157. if !ok {
  158. return fmt.Errorf("access denied to %s", targetRsrc)
  159. }
  160. if allRsrcsTypePermissionScope, ok := rsrcPermissionScope[models.RsrcID(fmt.Sprintf("all_%s", targetRsrc))]; ok {
  161. return checkPermissionScopeWithReqMethod(allRsrcsTypePermissionScope, r.Method)
  162. }
  163. if targetRsrcID == "" {
  164. return errors.New("target rsrc id is missing")
  165. }
  166. if scope, ok := rsrcPermissionScope[models.RsrcID(targetRsrcID)]; ok {
  167. return checkPermissionScopeWithReqMethod(scope, r.Method)
  168. }
  169. return errors.New("access denied")
  170. }
  171. func checkPermissionScopeWithReqMethod(scope models.RsrcPermissionScope, reqmethod string) error {
  172. if reqmethod == http.MethodGet && scope.Read {
  173. return nil
  174. }
  175. if (reqmethod == http.MethodPatch || reqmethod == http.MethodPut) && scope.Update {
  176. return nil
  177. }
  178. if reqmethod == http.MethodDelete && scope.Delete {
  179. return nil
  180. }
  181. if reqmethod == http.MethodPost && scope.Create {
  182. return nil
  183. }
  184. return errors.New("operation not permitted")
  185. }