user_mgmt.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/logger"
  8. "github.com/gravitl/netmaker/logic"
  9. "github.com/gravitl/netmaker/models"
  10. )
  11. var ServiceUserPermissionTemplate = models.UserRolePermissionTemplate{
  12. ID: models.ServiceUser,
  13. Default: true,
  14. FullAccess: false,
  15. DenyDashboardAccess: true,
  16. }
  17. var PlatformUserUserPermissionTemplate = models.UserRolePermissionTemplate{
  18. ID: models.PlatformUser,
  19. Default: true,
  20. FullAccess: false,
  21. }
  22. var NetworkAdminAllPermissionTemplate = models.UserRolePermissionTemplate{
  23. ID: models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkAdmin)),
  24. Default: true,
  25. FullAccess: true,
  26. NetworkID: models.AllNetworks,
  27. }
  28. var NetworkUserAllPermissionTemplate = models.UserRolePermissionTemplate{
  29. ID: models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkUser)),
  30. Default: true,
  31. FullAccess: false,
  32. NetworkID: models.AllNetworks,
  33. NetworkLevelAccess: map[models.RsrcType]map[models.RsrcID]models.RsrcPermissionScope{
  34. models.RemoteAccessGwRsrc: {
  35. models.AllRemoteAccessGwRsrcID: models.RsrcPermissionScope{
  36. Read: true,
  37. VPNaccess: true,
  38. },
  39. },
  40. models.ExtClientsRsrc: {
  41. models.AllExtClientsRsrcID: models.RsrcPermissionScope{
  42. Read: true,
  43. Create: true,
  44. Update: true,
  45. Delete: true,
  46. SelfOnly: true,
  47. },
  48. },
  49. },
  50. }
  51. func UserRolesInit() {
  52. d, _ := json.Marshal(logic.SuperAdminPermissionTemplate)
  53. database.Insert(logic.SuperAdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  54. d, _ = json.Marshal(logic.AdminPermissionTemplate)
  55. database.Insert(logic.AdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  56. d, _ = json.Marshal(ServiceUserPermissionTemplate)
  57. database.Insert(ServiceUserPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  58. d, _ = json.Marshal(PlatformUserUserPermissionTemplate)
  59. database.Insert(PlatformUserUserPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  60. d, _ = json.Marshal(NetworkAdminAllPermissionTemplate)
  61. database.Insert(NetworkAdminAllPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  62. d, _ = json.Marshal(NetworkUserAllPermissionTemplate)
  63. database.Insert(NetworkUserAllPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  64. }
  65. func CreateDefaultNetworkRolesAndGroups(netID models.NetworkID) {
  66. var NetworkAdminPermissionTemplate = models.UserRolePermissionTemplate{
  67. ID: models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkAdmin)),
  68. Default: true,
  69. NetworkID: netID,
  70. FullAccess: true,
  71. NetworkLevelAccess: make(map[models.RsrcType]map[models.RsrcID]models.RsrcPermissionScope),
  72. }
  73. var NetworkUserPermissionTemplate = models.UserRolePermissionTemplate{
  74. ID: models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkUser)),
  75. Default: true,
  76. FullAccess: false,
  77. NetworkID: netID,
  78. DenyDashboardAccess: false,
  79. NetworkLevelAccess: map[models.RsrcType]map[models.RsrcID]models.RsrcPermissionScope{
  80. models.RemoteAccessGwRsrc: {
  81. models.AllRemoteAccessGwRsrcID: models.RsrcPermissionScope{
  82. Read: true,
  83. VPNaccess: true,
  84. },
  85. },
  86. models.ExtClientsRsrc: {
  87. models.AllExtClientsRsrcID: models.RsrcPermissionScope{
  88. Read: true,
  89. Create: true,
  90. Update: true,
  91. Delete: true,
  92. SelfOnly: true,
  93. },
  94. },
  95. },
  96. }
  97. d, _ := json.Marshal(NetworkAdminPermissionTemplate)
  98. database.Insert(NetworkAdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  99. d, _ = json.Marshal(NetworkUserPermissionTemplate)
  100. database.Insert(NetworkUserPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  101. // create default network groups
  102. var NetworkAdminGroup = models.UserGroup{
  103. ID: models.UserGroupID(fmt.Sprintf("%s-%s-grp", netID, models.NetworkAdmin)),
  104. NetworkRoles: map[models.NetworkID]map[models.UserRoleID]struct{}{
  105. netID: {
  106. models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkAdmin)): {},
  107. },
  108. },
  109. MetaData: "The network role was automatically created by Netmaker.",
  110. }
  111. var NetworkUserGroup = models.UserGroup{
  112. ID: models.UserGroupID(fmt.Sprintf("%s-%s-grp", netID, models.NetworkUser)),
  113. NetworkRoles: map[models.NetworkID]map[models.UserRoleID]struct{}{
  114. netID: {
  115. models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkUser)): {},
  116. },
  117. },
  118. MetaData: "The network role was automatically created by Netmaker.",
  119. }
  120. d, _ = json.Marshal(NetworkAdminGroup)
  121. database.Insert(NetworkAdminGroup.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  122. d, _ = json.Marshal(NetworkUserGroup)
  123. database.Insert(NetworkUserGroup.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  124. }
  125. func DeleteNetworkRoles(netID string) {
  126. users, err := logic.GetUsersDB()
  127. if err != nil {
  128. return
  129. }
  130. defaultUserGrp := fmt.Sprintf("%s-%s-grp", netID, models.NetworkUser)
  131. defaultAdminGrp := fmt.Sprintf("%s-%s-grp", netID, models.NetworkAdmin)
  132. for _, user := range users {
  133. var upsert bool
  134. if _, ok := user.NetworkRoles[models.NetworkID(netID)]; ok {
  135. delete(user.NetworkRoles, models.NetworkID(netID))
  136. upsert = true
  137. }
  138. if _, ok := user.UserGroups[models.UserGroupID(defaultUserGrp)]; ok {
  139. delete(user.UserGroups, models.UserGroupID(defaultUserGrp))
  140. upsert = true
  141. }
  142. if _, ok := user.UserGroups[models.UserGroupID(defaultAdminGrp)]; ok {
  143. delete(user.UserGroups, models.UserGroupID(defaultAdminGrp))
  144. upsert = true
  145. }
  146. if upsert {
  147. logic.UpsertUser(user)
  148. }
  149. }
  150. database.DeleteRecord(database.USER_GROUPS_TABLE_NAME, defaultUserGrp)
  151. database.DeleteRecord(database.USER_GROUPS_TABLE_NAME, defaultAdminGrp)
  152. userGs, _ := ListUserGroups()
  153. for _, userGI := range userGs {
  154. if _, ok := userGI.NetworkRoles[models.NetworkID(netID)]; ok {
  155. delete(userGI.NetworkRoles, models.NetworkID(netID))
  156. UpdateUserGroup(userGI)
  157. }
  158. }
  159. roles, _ := ListNetworkRoles()
  160. for _, role := range roles {
  161. if role.NetworkID.String() == netID {
  162. database.DeleteRecord(database.USER_PERMISSIONS_TABLE_NAME, role.ID.String())
  163. }
  164. }
  165. }
  166. // ListNetworkRoles - lists user network roles permission templates
  167. func ListNetworkRoles() ([]models.UserRolePermissionTemplate, error) {
  168. data, err := database.FetchRecords(database.USER_PERMISSIONS_TABLE_NAME)
  169. if err != nil && !database.IsEmptyRecord(err) {
  170. return []models.UserRolePermissionTemplate{}, err
  171. }
  172. userRoles := []models.UserRolePermissionTemplate{}
  173. for _, dataI := range data {
  174. userRole := models.UserRolePermissionTemplate{}
  175. err := json.Unmarshal([]byte(dataI), &userRole)
  176. if err != nil {
  177. continue
  178. }
  179. if userRole.NetworkID == "" {
  180. continue
  181. }
  182. userRoles = append(userRoles, userRole)
  183. }
  184. return userRoles, nil
  185. }
  186. // ListPlatformRoles - lists user platform roles permission templates
  187. func ListPlatformRoles() ([]models.UserRolePermissionTemplate, error) {
  188. data, err := database.FetchRecords(database.USER_PERMISSIONS_TABLE_NAME)
  189. if err != nil && !database.IsEmptyRecord(err) {
  190. return []models.UserRolePermissionTemplate{}, err
  191. }
  192. userRoles := []models.UserRolePermissionTemplate{}
  193. for _, dataI := range data {
  194. userRole := models.UserRolePermissionTemplate{}
  195. err := json.Unmarshal([]byte(dataI), &userRole)
  196. if err != nil {
  197. continue
  198. }
  199. if userRole.NetworkID != "" {
  200. continue
  201. }
  202. userRoles = append(userRoles, userRole)
  203. }
  204. return userRoles, nil
  205. }
  206. func ValidateCreateRoleReq(userRole *models.UserRolePermissionTemplate) error {
  207. // check if role exists with this id
  208. _, err := logic.GetRole(userRole.ID)
  209. if err == nil {
  210. return fmt.Errorf("role with id `%s` exists already", userRole.ID.String())
  211. }
  212. if len(userRole.NetworkLevelAccess) > 0 {
  213. for rsrcType := range userRole.NetworkLevelAccess {
  214. if _, ok := models.RsrcTypeMap[rsrcType]; !ok {
  215. return errors.New("invalid rsrc type " + rsrcType.String())
  216. }
  217. if rsrcType == models.RemoteAccessGwRsrc {
  218. userRsrcPermissions := userRole.NetworkLevelAccess[models.RemoteAccessGwRsrc]
  219. var vpnAccess bool
  220. for _, scope := range userRsrcPermissions {
  221. if scope.VPNaccess {
  222. vpnAccess = true
  223. break
  224. }
  225. }
  226. if vpnAccess {
  227. userRole.NetworkLevelAccess[models.ExtClientsRsrc] = map[models.RsrcID]models.RsrcPermissionScope{
  228. models.AllExtClientsRsrcID: {
  229. Read: true,
  230. Create: true,
  231. Update: true,
  232. Delete: true,
  233. SelfOnly: true,
  234. },
  235. }
  236. }
  237. }
  238. }
  239. }
  240. if userRole.NetworkID == "" {
  241. return errors.New("only network roles are allowed to be created")
  242. }
  243. return nil
  244. }
  245. func ValidateUpdateRoleReq(userRole *models.UserRolePermissionTemplate) error {
  246. roleInDB, err := logic.GetRole(userRole.ID)
  247. if err != nil {
  248. return err
  249. }
  250. if roleInDB.NetworkID != userRole.NetworkID {
  251. return errors.New("network id mismatch")
  252. }
  253. if roleInDB.Default {
  254. return errors.New("cannot update default role")
  255. }
  256. if len(userRole.NetworkLevelAccess) > 0 {
  257. for rsrcType := range userRole.NetworkLevelAccess {
  258. if _, ok := models.RsrcTypeMap[rsrcType]; !ok {
  259. return errors.New("invalid rsrc type " + rsrcType.String())
  260. }
  261. if rsrcType == models.RemoteAccessGwRsrc {
  262. userRsrcPermissions := userRole.NetworkLevelAccess[models.RemoteAccessGwRsrc]
  263. var vpnAccess bool
  264. for _, scope := range userRsrcPermissions {
  265. if scope.VPNaccess {
  266. vpnAccess = true
  267. break
  268. }
  269. }
  270. if vpnAccess {
  271. userRole.NetworkLevelAccess[models.ExtClientsRsrc] = map[models.RsrcID]models.RsrcPermissionScope{
  272. models.AllExtClientsRsrcID: {
  273. Read: true,
  274. Create: true,
  275. Update: true,
  276. Delete: true,
  277. SelfOnly: true,
  278. },
  279. }
  280. }
  281. }
  282. }
  283. }
  284. return nil
  285. }
  286. // CreateRole - inserts new role into DB
  287. func CreateRole(r models.UserRolePermissionTemplate) error {
  288. // check if role already exists
  289. if r.ID.String() == "" {
  290. return errors.New("role id cannot be empty")
  291. }
  292. _, err := database.FetchRecord(database.USER_PERMISSIONS_TABLE_NAME, r.ID.String())
  293. if err == nil {
  294. return errors.New("role already exists")
  295. }
  296. d, err := json.Marshal(r)
  297. if err != nil {
  298. return err
  299. }
  300. return database.Insert(r.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  301. }
  302. // UpdateRole - updates role template
  303. func UpdateRole(r models.UserRolePermissionTemplate) error {
  304. if r.ID.String() == "" {
  305. return errors.New("role id cannot be empty")
  306. }
  307. _, err := database.FetchRecord(database.USER_PERMISSIONS_TABLE_NAME, r.ID.String())
  308. if err != nil {
  309. return err
  310. }
  311. d, err := json.Marshal(r)
  312. if err != nil {
  313. return err
  314. }
  315. return database.Insert(r.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  316. }
  317. // DeleteRole - deletes user role
  318. func DeleteRole(rid models.UserRoleID, force bool) error {
  319. if rid.String() == "" {
  320. return errors.New("role id cannot be empty")
  321. }
  322. users, err := logic.GetUsersDB()
  323. if err != nil {
  324. return err
  325. }
  326. role, err := logic.GetRole(rid)
  327. if err != nil {
  328. return err
  329. }
  330. if !force && role.Default {
  331. return errors.New("cannot delete default role")
  332. }
  333. for _, user := range users {
  334. for userG := range user.UserGroups {
  335. ug, err := GetUserGroup(userG)
  336. if err == nil {
  337. if role.NetworkID != "" {
  338. for netID, networkRoles := range ug.NetworkRoles {
  339. if _, ok := networkRoles[rid]; ok {
  340. delete(networkRoles, rid)
  341. ug.NetworkRoles[netID] = networkRoles
  342. UpdateUserGroup(ug)
  343. }
  344. }
  345. }
  346. }
  347. }
  348. if user.PlatformRoleID == rid {
  349. err = errors.New("active roles cannot be deleted.switch existing users to a new role before deleting")
  350. return err
  351. }
  352. if role.NetworkID != "" {
  353. for netID, networkRoles := range user.NetworkRoles {
  354. if _, ok := networkRoles[rid]; ok {
  355. delete(networkRoles, rid)
  356. user.NetworkRoles[netID] = networkRoles
  357. logic.UpsertUser(user)
  358. }
  359. }
  360. }
  361. }
  362. return database.DeleteRecord(database.USER_PERMISSIONS_TABLE_NAME, rid.String())
  363. }
  364. func ValidateCreateGroupReq(g models.UserGroup) error {
  365. // check if network roles are valid
  366. for _, roleMap := range g.NetworkRoles {
  367. for roleID := range roleMap {
  368. role, err := logic.GetRole(roleID)
  369. if err != nil {
  370. return fmt.Errorf("invalid network role %s", roleID)
  371. }
  372. if role.NetworkID == "" {
  373. return errors.New("platform role cannot be used as network role")
  374. }
  375. }
  376. }
  377. return nil
  378. }
  379. func ValidateUpdateGroupReq(g models.UserGroup) error {
  380. for networkID := range g.NetworkRoles {
  381. userRolesMap := g.NetworkRoles[networkID]
  382. for roleID := range userRolesMap {
  383. netRole, err := logic.GetRole(roleID)
  384. if err != nil {
  385. err = fmt.Errorf("invalid network role")
  386. return err
  387. }
  388. if netRole.NetworkID == "" {
  389. return errors.New("platform role cannot be used as network role")
  390. }
  391. }
  392. }
  393. return nil
  394. }
  395. // CreateUserGroup - creates new user group
  396. func CreateUserGroup(g models.UserGroup) error {
  397. // check if role already exists
  398. if g.ID == "" {
  399. return errors.New("group id cannot be empty")
  400. }
  401. _, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, g.ID.String())
  402. if err == nil {
  403. return errors.New("group already exists")
  404. }
  405. d, err := json.Marshal(g)
  406. if err != nil {
  407. return err
  408. }
  409. return database.Insert(g.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  410. }
  411. // GetUserGroup - fetches user group
  412. func GetUserGroup(gid models.UserGroupID) (models.UserGroup, error) {
  413. d, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, gid.String())
  414. if err != nil {
  415. return models.UserGroup{}, err
  416. }
  417. var ug models.UserGroup
  418. err = json.Unmarshal([]byte(d), &ug)
  419. if err != nil {
  420. return ug, err
  421. }
  422. return ug, nil
  423. }
  424. // ListUserGroups - lists user groups
  425. func ListUserGroups() ([]models.UserGroup, error) {
  426. data, err := database.FetchRecords(database.USER_GROUPS_TABLE_NAME)
  427. if err != nil && !database.IsEmptyRecord(err) {
  428. return []models.UserGroup{}, err
  429. }
  430. userGroups := []models.UserGroup{}
  431. for _, dataI := range data {
  432. userGroup := models.UserGroup{}
  433. err := json.Unmarshal([]byte(dataI), &userGroup)
  434. if err != nil {
  435. continue
  436. }
  437. userGroups = append(userGroups, userGroup)
  438. }
  439. return userGroups, nil
  440. }
  441. // UpdateUserGroup - updates new user group
  442. func UpdateUserGroup(g models.UserGroup) error {
  443. // check if group exists
  444. if g.ID == "" {
  445. return errors.New("group id cannot be empty")
  446. }
  447. _, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, g.ID.String())
  448. if err != nil {
  449. return err
  450. }
  451. d, err := json.Marshal(g)
  452. if err != nil {
  453. return err
  454. }
  455. return database.Insert(g.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  456. }
  457. // DeleteUserGroup - deletes user group
  458. func DeleteUserGroup(gid models.UserGroupID) error {
  459. users, err := logic.GetUsersDB()
  460. if err != nil {
  461. return err
  462. }
  463. for _, user := range users {
  464. delete(user.UserGroups, gid)
  465. logic.UpsertUser(user)
  466. }
  467. return database.DeleteRecord(database.USER_GROUPS_TABLE_NAME, gid.String())
  468. }
  469. func HasNetworkRsrcScope(permissionTemplate models.UserRolePermissionTemplate, netid string, rsrcType models.RsrcType, rsrcID models.RsrcID, op string) bool {
  470. if permissionTemplate.FullAccess {
  471. return true
  472. }
  473. rsrcScope, ok := permissionTemplate.NetworkLevelAccess[rsrcType]
  474. if !ok {
  475. return false
  476. }
  477. _, ok = rsrcScope[rsrcID]
  478. return ok
  479. }
  480. func GetUserRAGNodes(user models.User) (gws map[string]models.Node) {
  481. gws = make(map[string]models.Node)
  482. userGwAccessScope := GetUserNetworkRolesWithRemoteVPNAccess(user)
  483. logger.Log(0, fmt.Sprintf("User Gw Access Scope: %+v", userGwAccessScope))
  484. _, allNetAccess := userGwAccessScope["*"]
  485. nodes, err := logic.GetAllNodes()
  486. if err != nil {
  487. return
  488. }
  489. for _, node := range nodes {
  490. if node.IsIngressGateway && !node.PendingDelete {
  491. if allNetAccess {
  492. gws[node.ID.String()] = node
  493. } else {
  494. gwRsrcMap := userGwAccessScope[models.NetworkID(node.Network)]
  495. scope, ok := gwRsrcMap[models.AllRemoteAccessGwRsrcID]
  496. if !ok {
  497. if scope, ok = gwRsrcMap[models.RsrcID(node.ID.String())]; !ok {
  498. continue
  499. }
  500. }
  501. if scope.VPNaccess {
  502. gws[node.ID.String()] = node
  503. }
  504. }
  505. }
  506. }
  507. return
  508. }
  509. // GetUserNetworkRoles - get user network roles
  510. func GetUserNetworkRolesWithRemoteVPNAccess(user models.User) (gwAccess map[models.NetworkID]map[models.RsrcID]models.RsrcPermissionScope) {
  511. gwAccess = make(map[models.NetworkID]map[models.RsrcID]models.RsrcPermissionScope)
  512. platformRole, err := logic.GetRole(user.PlatformRoleID)
  513. if err != nil {
  514. return
  515. }
  516. if platformRole.FullAccess {
  517. gwAccess[models.NetworkID("*")] = make(map[models.RsrcID]models.RsrcPermissionScope)
  518. return
  519. }
  520. if _, ok := user.NetworkRoles[models.AllNetworks]; ok {
  521. gwAccess[models.NetworkID("*")] = make(map[models.RsrcID]models.RsrcPermissionScope)
  522. }
  523. if len(user.UserGroups) > 0 {
  524. for gID := range user.UserGroups {
  525. userG, err := GetUserGroup(gID)
  526. if err != nil {
  527. continue
  528. }
  529. for netID, roleMap := range userG.NetworkRoles {
  530. for roleID := range roleMap {
  531. role, err := logic.GetRole(roleID)
  532. if err == nil {
  533. if role.FullAccess {
  534. gwAccess[netID] = map[models.RsrcID]models.RsrcPermissionScope{
  535. models.AllRemoteAccessGwRsrcID: {
  536. Create: true,
  537. Read: true,
  538. Update: true,
  539. VPNaccess: true,
  540. Delete: true,
  541. },
  542. models.AllExtClientsRsrcID: {
  543. Create: true,
  544. Read: true,
  545. Update: true,
  546. Delete: true,
  547. },
  548. }
  549. break
  550. }
  551. if rsrcsMap, ok := role.NetworkLevelAccess[models.RemoteAccessGwRsrc]; ok {
  552. if permissions, ok := rsrcsMap[models.AllRemoteAccessGwRsrcID]; ok && permissions.VPNaccess {
  553. if len(gwAccess[netID]) == 0 {
  554. gwAccess[netID] = make(map[models.RsrcID]models.RsrcPermissionScope)
  555. }
  556. gwAccess[netID][models.AllRemoteAccessGwRsrcID] = permissions
  557. break
  558. } else {
  559. for gwID, scope := range rsrcsMap {
  560. if scope.VPNaccess {
  561. if len(gwAccess[netID]) == 0 {
  562. gwAccess[netID] = make(map[models.RsrcID]models.RsrcPermissionScope)
  563. }
  564. gwAccess[netID][gwID] = scope
  565. }
  566. }
  567. }
  568. }
  569. }
  570. }
  571. }
  572. }
  573. }
  574. for netID, roleMap := range user.NetworkRoles {
  575. for roleID := range roleMap {
  576. role, err := logic.GetRole(roleID)
  577. if err == nil {
  578. if role.FullAccess {
  579. gwAccess[netID] = map[models.RsrcID]models.RsrcPermissionScope{
  580. models.AllRemoteAccessGwRsrcID: {
  581. Create: true,
  582. Read: true,
  583. Update: true,
  584. VPNaccess: true,
  585. Delete: true,
  586. },
  587. models.AllExtClientsRsrcID: {
  588. Create: true,
  589. Read: true,
  590. Update: true,
  591. Delete: true,
  592. },
  593. }
  594. break
  595. }
  596. if rsrcsMap, ok := role.NetworkLevelAccess[models.RemoteAccessGwRsrc]; ok {
  597. if permissions, ok := rsrcsMap[models.AllRemoteAccessGwRsrcID]; ok && permissions.VPNaccess {
  598. if len(gwAccess[netID]) == 0 {
  599. gwAccess[netID] = make(map[models.RsrcID]models.RsrcPermissionScope)
  600. }
  601. gwAccess[netID][models.AllRemoteAccessGwRsrcID] = permissions
  602. break
  603. } else {
  604. for gwID, scope := range rsrcsMap {
  605. if scope.VPNaccess {
  606. if len(gwAccess[netID]) == 0 {
  607. gwAccess[netID] = make(map[models.RsrcID]models.RsrcPermissionScope)
  608. }
  609. gwAccess[netID][gwID] = scope
  610. }
  611. }
  612. }
  613. }
  614. }
  615. }
  616. }
  617. return
  618. }
  619. func GetFilteredNodesByUserAccess(user models.User, nodes []models.Node) (filteredNodes []models.Node) {
  620. nodesMap := make(map[string]struct{})
  621. allNetworkRoles := make(map[models.UserRoleID]struct{})
  622. if len(user.NetworkRoles) > 0 {
  623. for _, netRoles := range user.NetworkRoles {
  624. for netRoleI := range netRoles {
  625. allNetworkRoles[netRoleI] = struct{}{}
  626. }
  627. }
  628. }
  629. if _, ok := user.NetworkRoles[models.AllNetworks]; ok {
  630. return nodes
  631. }
  632. if len(user.UserGroups) > 0 {
  633. for userGID := range user.UserGroups {
  634. userG, err := GetUserGroup(userGID)
  635. if err == nil {
  636. if len(userG.NetworkRoles) > 0 {
  637. if _, ok := userG.NetworkRoles[models.AllNetworks]; ok {
  638. return nodes
  639. }
  640. for _, netRoles := range userG.NetworkRoles {
  641. for netRoleI := range netRoles {
  642. allNetworkRoles[netRoleI] = struct{}{}
  643. }
  644. }
  645. }
  646. }
  647. }
  648. }
  649. for networkRoleID := range allNetworkRoles {
  650. userPermTemplate, err := logic.GetRole(networkRoleID)
  651. if err != nil {
  652. continue
  653. }
  654. networkNodes := logic.GetNetworkNodesMemory(nodes, userPermTemplate.NetworkID.String())
  655. if userPermTemplate.FullAccess {
  656. for _, node := range networkNodes {
  657. if _, ok := nodesMap[node.ID.String()]; ok {
  658. continue
  659. }
  660. nodesMap[node.ID.String()] = struct{}{}
  661. filteredNodes = append(filteredNodes, node)
  662. }
  663. continue
  664. }
  665. if rsrcPerms, ok := userPermTemplate.NetworkLevelAccess[models.RemoteAccessGwRsrc]; ok {
  666. if _, ok := rsrcPerms[models.AllRemoteAccessGwRsrcID]; ok {
  667. for _, node := range networkNodes {
  668. if _, ok := nodesMap[node.ID.String()]; ok {
  669. continue
  670. }
  671. if node.IsIngressGateway {
  672. nodesMap[node.ID.String()] = struct{}{}
  673. filteredNodes = append(filteredNodes, node)
  674. }
  675. }
  676. } else {
  677. for gwID, scope := range rsrcPerms {
  678. if _, ok := nodesMap[gwID.String()]; ok {
  679. continue
  680. }
  681. if scope.Read {
  682. gwNode, err := logic.GetNodeByID(gwID.String())
  683. if err == nil && gwNode.IsIngressGateway {
  684. nodesMap[gwNode.ID.String()] = struct{}{}
  685. filteredNodes = append(filteredNodes, gwNode)
  686. }
  687. }
  688. }
  689. }
  690. }
  691. }
  692. return
  693. }
  694. func FilterNetworksByRole(allnetworks []models.Network, user models.User) []models.Network {
  695. platformRole, err := logic.GetRole(user.PlatformRoleID)
  696. if err != nil {
  697. return []models.Network{}
  698. }
  699. if !platformRole.FullAccess {
  700. allNetworkRoles := make(map[models.NetworkID]struct{})
  701. if len(user.NetworkRoles) > 0 {
  702. for netID := range user.NetworkRoles {
  703. if netID == models.AllNetworks {
  704. return allnetworks
  705. }
  706. allNetworkRoles[netID] = struct{}{}
  707. }
  708. }
  709. if len(user.UserGroups) > 0 {
  710. for userGID := range user.UserGroups {
  711. userG, err := GetUserGroup(userGID)
  712. if err == nil {
  713. if len(userG.NetworkRoles) > 0 {
  714. for netID := range userG.NetworkRoles {
  715. if netID == models.AllNetworks {
  716. return allnetworks
  717. }
  718. allNetworkRoles[netID] = struct{}{}
  719. }
  720. }
  721. }
  722. }
  723. }
  724. filteredNetworks := []models.Network{}
  725. for _, networkI := range allnetworks {
  726. if _, ok := allNetworkRoles[models.NetworkID(networkI.NetID)]; ok {
  727. filteredNetworks = append(filteredNetworks, networkI)
  728. }
  729. }
  730. allnetworks = filteredNetworks
  731. }
  732. return allnetworks
  733. }
  734. func IsGroupsValid(groups map[models.UserGroupID]struct{}) error {
  735. for groupID := range groups {
  736. _, err := GetUserGroup(groupID)
  737. if err != nil {
  738. return fmt.Errorf("user group `%s` not found", groupID)
  739. }
  740. }
  741. return nil
  742. }
  743. func IsNetworkRolesValid(networkRoles map[models.NetworkID]map[models.UserRoleID]struct{}) error {
  744. for netID, netRoles := range networkRoles {
  745. if netID != models.AllNetworks {
  746. _, err := logic.GetNetwork(netID.String())
  747. if err != nil {
  748. return fmt.Errorf("failed to fetch network %s ", netID)
  749. }
  750. }
  751. for netRoleID := range netRoles {
  752. role, err := logic.GetRole(netRoleID)
  753. if err != nil {
  754. return fmt.Errorf("failed to fetch role %s ", netRoleID)
  755. }
  756. if role.NetworkID == "" {
  757. return fmt.Errorf("cannot use platform as network role %s", netRoleID)
  758. }
  759. }
  760. }
  761. return nil
  762. }
  763. // PrepareOauthUserFromInvite - init oauth user before create
  764. func PrepareOauthUserFromInvite(in models.UserInvite) (models.User, error) {
  765. var newPass, fetchErr = logic.FetchPassValue("")
  766. if fetchErr != nil {
  767. return models.User{}, fetchErr
  768. }
  769. user := models.User{
  770. UserName: in.Email,
  771. Password: newPass,
  772. }
  773. user.UserGroups = in.UserGroups
  774. user.NetworkRoles = in.NetworkRoles
  775. user.PlatformRoleID = models.UserRoleID(in.PlatformRoleID)
  776. if user.PlatformRoleID == "" {
  777. user.PlatformRoleID = models.ServiceUser
  778. }
  779. return user, nil
  780. }