authGrpc.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. package controller
  2. import (
  3. "errors"
  4. "context"
  5. "golang.org/x/crypto/bcrypt"
  6. "time"
  7. nodepb "github.com/gravitl/netmaker/grpc"
  8. "github.com/gravitl/netmaker/models"
  9. "github.com/gravitl/netmaker/functions"
  10. "github.com/gravitl/netmaker/mongoconn"
  11. "go.mongodb.org/mongo-driver/bson"
  12. "google.golang.org/grpc"
  13. "google.golang.org/grpc/metadata"
  14. "google.golang.org/grpc/status"
  15. "google.golang.org/grpc/codes"
  16. )
  17. func AuthServerUnaryInterceptor(ctx context.Context,
  18. req interface{},
  19. info *grpc.UnaryServerInfo,
  20. handler grpc.UnaryHandler) (interface{}, error) {
  21. // Skip authorize when GetJWT is requested
  22. if info.FullMethod != "/node.NodeService/Login" {
  23. if info.FullMethod != "/node.NodeService/CreateNode" {
  24. err := grpcAuthorize(ctx)
  25. if err != nil {
  26. return nil, err
  27. }
  28. }
  29. }
  30. // Calls the handler
  31. h, err := handler(ctx, req)
  32. return h, err
  33. }
  34. func AuthServerStreamInterceptor(
  35. srv interface{},
  36. stream grpc.ServerStream,
  37. info *grpc.StreamServerInfo,
  38. handler grpc.StreamHandler,
  39. ) error {
  40. if info.FullMethod == "/node.NodeService/GetPeers" {
  41. if err := grpcAuthorize(stream.Context()); err != nil {
  42. return err
  43. }
  44. }
  45. // Calls the handler
  46. return handler(srv, stream)
  47. }
  48. func grpcAuthorize(ctx context.Context) error {
  49. md, ok := metadata.FromIncomingContext(ctx)
  50. if !ok {
  51. return status.Errorf(codes.InvalidArgument, "Retrieving metadata is failed")
  52. }
  53. authHeader, ok := md["authorization"]
  54. if !ok {
  55. return status.Errorf(codes.Unauthenticated, "Authorization token is not supplied")
  56. }
  57. authToken := authHeader[0]
  58. mac, network, err := functions.VerifyToken(authToken)
  59. if err != nil { return err }
  60. networkexists, err := functions.NetworkExists(network)
  61. if err != nil {
  62. return status.Errorf(codes.Unauthenticated, "Unauthorized. Network does not exist: " + network)
  63. }
  64. emptynode := models.Node{}
  65. node, err := functions.GetNodeByMacAddress(network, mac)
  66. if err != nil || node == emptynode {
  67. return status.Errorf(codes.Unauthenticated, "Node does not exist.")
  68. }
  69. //check that the request is for a valid network
  70. //if (networkCheck && !networkexists) || err != nil {
  71. if (!networkexists) {
  72. return status.Errorf(codes.Unauthenticated, "Network does not exist.")
  73. } else {
  74. return nil
  75. }
  76. }
  77. //Node authenticates using its password and retrieves a JWT for authorization.
  78. func (s *NodeServiceServer) Login(ctx context.Context, req *nodepb.LoginRequest) (*nodepb.LoginResponse, error) {
  79. //out := new(LoginResponse)
  80. macaddress := req.GetMacaddress()
  81. network := req.GetNetwork()
  82. password := req.GetPassword()
  83. var result models.NodeAuth
  84. err := errors.New("Generic server error.")
  85. if macaddress == "" {
  86. //TODO: Set Error response
  87. err = errors.New("Missing Mac Address.")
  88. return nil, err
  89. } else if password == "" {
  90. err = errors.New("Missing Password.")
  91. return nil, err
  92. } else {
  93. //Search DB for node with Mac Address. Ignore pending nodes (they should not be able to authenticate with API untill approved).
  94. collection := mongoconn.Client.Database("netmaker").Collection("nodes")
  95. ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
  96. var err = collection.FindOne(ctx, bson.M{ "macaddress": macaddress, "network": network}).Decode(&result)
  97. defer cancel()
  98. if err != nil {
  99. return nil, err
  100. }
  101. //compare password from request to stored password in database
  102. //might be able to have a common hash (certificates?) and compare those so that a password isn't passed in in plain text...
  103. //TODO: Consider a way of hashing the password client side before sending, or using certificates
  104. err = bcrypt.CompareHashAndPassword([]byte(result.Password), []byte(password))
  105. if err != nil && result.Password != password {
  106. return nil, err
  107. } else {
  108. //Create a new JWT for the node
  109. tokenString, err := functions.CreateJWT(macaddress, result.Network)
  110. if err != nil {
  111. return nil, err
  112. }
  113. if tokenString == "" {
  114. err = errors.New("Something went wrong. Could not retrieve token.")
  115. return nil, err
  116. }
  117. response := &nodepb.LoginResponse{
  118. Accesstoken: tokenString,
  119. }
  120. return response, nil
  121. }
  122. }
  123. }