hosts.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "reflect"
  8. "github.com/gorilla/mux"
  9. "github.com/gravitl/netmaker/logger"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/mq"
  13. "golang.org/x/crypto/bcrypt"
  14. )
  15. func hostHandlers(r *mux.Router) {
  16. r.HandleFunc("/api/hosts", logic.SecurityCheck(true, http.HandlerFunc(getHosts))).Methods(http.MethodGet)
  17. r.HandleFunc("/api/hosts/{hostid}", logic.SecurityCheck(true, http.HandlerFunc(updateHost))).Methods(http.MethodPut)
  18. r.HandleFunc("/api/hosts/{hostid}", logic.SecurityCheck(true, http.HandlerFunc(deleteHost))).Methods(http.MethodDelete)
  19. r.HandleFunc("/api/hosts/{hostid}/networks/{network}", logic.SecurityCheck(true, http.HandlerFunc(addHostToNetwork))).Methods(http.MethodPost)
  20. r.HandleFunc("/api/hosts/{hostid}/networks/{network}", logic.SecurityCheck(true, http.HandlerFunc(deleteHostFromNetwork))).Methods(http.MethodDelete)
  21. r.HandleFunc("/api/hosts/{hostid}/relay", logic.SecurityCheck(false, http.HandlerFunc(createHostRelay))).Methods(http.MethodPost)
  22. r.HandleFunc("/api/hosts/{hostid}/relay", logic.SecurityCheck(false, http.HandlerFunc(deleteHostRelay))).Methods(http.MethodDelete)
  23. r.HandleFunc("/api/hosts/adm/authenticate", authenticateHost).Methods(http.MethodPost)
  24. }
  25. // swagger:route GET /api/hosts hosts getHosts
  26. //
  27. // Lists all hosts.
  28. //
  29. // Schemes: https
  30. //
  31. // Security:
  32. // oauth
  33. //
  34. // Responses:
  35. // 200: getHostsSliceResponse
  36. func getHosts(w http.ResponseWriter, r *http.Request) {
  37. currentHosts, err := logic.GetAllHosts()
  38. if err != nil {
  39. logger.Log(0, r.Header.Get("user"), "failed to fetch hosts: ", err.Error())
  40. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  41. return
  42. }
  43. // return JSON/API formatted hosts
  44. apiHosts := logic.GetAllHostsAPI(currentHosts[:])
  45. logger.Log(2, r.Header.Get("user"), "fetched all hosts")
  46. w.WriteHeader(http.StatusOK)
  47. json.NewEncoder(w).Encode(apiHosts)
  48. }
  49. // swagger:route PUT /api/hosts/{hostid} hosts updateHost
  50. //
  51. // Updates a Netclient host on Netmaker server.
  52. //
  53. // Schemes: https
  54. //
  55. // Security:
  56. // oauth
  57. //
  58. // Responses:
  59. // 200: updateHostResponse
  60. func updateHost(w http.ResponseWriter, r *http.Request) {
  61. var newHostData models.ApiHost
  62. err := json.NewDecoder(r.Body).Decode(&newHostData)
  63. if err != nil {
  64. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  65. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  66. return
  67. }
  68. // confirm host exists
  69. currHost, err := logic.GetHost(newHostData.ID)
  70. if err != nil {
  71. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  72. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  73. return
  74. }
  75. newHost := newHostData.ConvertAPIHostToNMHost(currHost)
  76. // check if relay information is changed
  77. updateRelay := false
  78. if newHost.IsRelay && len(newHost.RelayedHosts) > 0 {
  79. if len(newHost.RelayedHosts) != len(currHost.RelayedHosts) || !reflect.DeepEqual(newHost.RelayedHosts, currHost.RelayedHosts) {
  80. updateRelay = true
  81. }
  82. }
  83. logic.UpdateHost(newHost, currHost) // update the in memory struct values
  84. if err = logic.UpsertHost(newHost); err != nil {
  85. logger.Log(0, r.Header.Get("user"), "failed to update a host:", err.Error())
  86. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  87. return
  88. }
  89. if updateRelay {
  90. logic.UpdateHostRelay(currHost.ID.String(), currHost.RelayedHosts, newHost.RelayedHosts)
  91. }
  92. // publish host update through MQ
  93. if err := mq.HostUpdate(&models.HostUpdate{
  94. Action: models.UpdateHost,
  95. Host: *newHost,
  96. }); err != nil {
  97. logger.Log(0, r.Header.Get("user"), "failed to send host update: ", currHost.ID.String(), err.Error())
  98. }
  99. go func() {
  100. if err := mq.PublishPeerUpdate(); err != nil {
  101. logger.Log(0, "fail to publish peer update: ", err.Error())
  102. }
  103. }()
  104. apiHostData := newHost.ConvertNMHostToAPI()
  105. logger.Log(2, r.Header.Get("user"), "updated host", newHost.ID.String())
  106. w.WriteHeader(http.StatusOK)
  107. json.NewEncoder(w).Encode(apiHostData)
  108. }
  109. // swagger:route DELETE /api/hosts/{hostid} hosts deleteHost
  110. //
  111. // Deletes a Netclient host from Netmaker server.
  112. //
  113. // Schemes: https
  114. //
  115. // Security:
  116. // oauth
  117. //
  118. // Responses:
  119. // 200: deleteHostResponse
  120. func deleteHost(w http.ResponseWriter, r *http.Request) {
  121. var params = mux.Vars(r)
  122. hostid := params["hostid"]
  123. // confirm host exists
  124. currHost, err := logic.GetHost(hostid)
  125. if err != nil {
  126. logger.Log(0, r.Header.Get("user"), "failed to delete a host:", err.Error())
  127. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  128. return
  129. }
  130. if currHost.IsRelay {
  131. if _, _, err := logic.DeleteHostRelay(hostid); err != nil {
  132. logger.Log(0, r.Header.Get("user"), "failed to dissociate host from relays:", err.Error())
  133. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  134. return
  135. }
  136. }
  137. if currHost.IsRelayed {
  138. relayHost, err := logic.GetHost(currHost.RelayedBy)
  139. if err != nil {
  140. logger.Log(0, r.Header.Get("user"), "failed to fetch relay host:", err.Error())
  141. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  142. return
  143. }
  144. newRelayedHosts := make([]string, 0)
  145. for _, relayedHostID := range relayHost.RelayedHosts {
  146. if relayedHostID != hostid {
  147. newRelayedHosts = append(newRelayedHosts, relayedHostID)
  148. }
  149. }
  150. relayHost.RelayedHosts = newRelayedHosts
  151. if err := logic.UpsertHost(relayHost); err != nil {
  152. logger.Log(0, r.Header.Get("user"), "failed to update host relays:", err.Error())
  153. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  154. return
  155. }
  156. }
  157. if err = logic.RemoveHost(currHost); err != nil {
  158. logger.Log(0, r.Header.Get("user"), "failed to delete a host:", err.Error())
  159. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  160. return
  161. }
  162. if err = mq.HostUpdate(&models.HostUpdate{
  163. Action: models.DeleteHost,
  164. Host: *currHost,
  165. }); err != nil {
  166. logger.Log(0, r.Header.Get("user"), "failed to send delete host update: ", currHost.ID.String(), err.Error())
  167. }
  168. apiHostData := currHost.ConvertNMHostToAPI()
  169. logger.Log(2, r.Header.Get("user"), "removed host", currHost.Name)
  170. w.WriteHeader(http.StatusOK)
  171. json.NewEncoder(w).Encode(apiHostData)
  172. }
  173. // swagger:route POST /api/hosts/{hostid}/networks/{network} hosts addHostToNetwork
  174. //
  175. // Given a network, a host is added to the network.
  176. //
  177. // Schemes: https
  178. //
  179. // Security:
  180. // oauth
  181. //
  182. // Responses:
  183. // 200: addHostToNetworkResponse
  184. func addHostToNetwork(w http.ResponseWriter, r *http.Request) {
  185. var params = mux.Vars(r)
  186. hostid := params["hostid"]
  187. network := params["network"]
  188. if hostid == "" || network == "" {
  189. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("hostid or network cannot be empty"), "badrequest"))
  190. return
  191. }
  192. // confirm host exists
  193. currHost, err := logic.GetHost(hostid)
  194. if err != nil {
  195. logger.Log(0, r.Header.Get("user"), "failed to find host:", hostid, err.Error())
  196. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  197. return
  198. }
  199. newNode, err := logic.UpdateHostNetwork(currHost, network, true)
  200. if err != nil {
  201. logger.Log(0, r.Header.Get("user"), "failed to add host to network:", hostid, network, err.Error())
  202. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  203. return
  204. }
  205. logger.Log(1, "added new node", newNode.ID.String(), "to host", currHost.Name)
  206. if err = mq.HostUpdate(&models.HostUpdate{
  207. Action: models.JoinHostToNetwork,
  208. Host: *currHost,
  209. Node: *newNode,
  210. }); err != nil {
  211. logger.Log(0, r.Header.Get("user"), "failed to update host to join network:", hostid, network, err.Error())
  212. }
  213. logger.Log(2, r.Header.Get("user"), fmt.Sprintf("added host %s to network %s", currHost.Name, network))
  214. w.WriteHeader(http.StatusOK)
  215. }
  216. // swagger:route DELETE /api/hosts/{hostid}/networks/{network} hosts deleteHostFromNetwork
  217. //
  218. // Given a network, a host is removed from the network.
  219. //
  220. // Schemes: https
  221. //
  222. // Security:
  223. // oauth
  224. //
  225. // Responses:
  226. // 200: deleteHostFromNetworkResponse
  227. func deleteHostFromNetwork(w http.ResponseWriter, r *http.Request) {
  228. var params = mux.Vars(r)
  229. hostid := params["hostid"]
  230. network := params["network"]
  231. if hostid == "" || network == "" {
  232. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("hostid or network cannot be empty"), "badrequest"))
  233. return
  234. }
  235. // confirm host exists
  236. currHost, err := logic.GetHost(hostid)
  237. if err != nil {
  238. logger.Log(0, r.Header.Get("user"), "failed to find host:", err.Error())
  239. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  240. return
  241. }
  242. node, err := logic.UpdateHostNetwork(currHost, network, false)
  243. if err != nil {
  244. logger.Log(0, r.Header.Get("user"), "failed to remove host from network:", hostid, network, err.Error())
  245. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  246. return
  247. }
  248. logger.Log(1, "deleting node", node.ID.String(), "from host", currHost.Name)
  249. if err := logic.DeleteNode(node, false); err != nil {
  250. logic.ReturnErrorResponse(w, r, logic.FormatError(fmt.Errorf("failed to delete node"), "internal"))
  251. return
  252. }
  253. // notify node change
  254. runUpdates(node, false)
  255. go func() { // notify of peer change
  256. if err := mq.PublishPeerUpdate(); err != nil {
  257. logger.Log(1, "error publishing peer update ", err.Error())
  258. }
  259. }()
  260. logger.Log(2, r.Header.Get("user"), fmt.Sprintf("removed host %s from network %s", currHost.Name, network))
  261. w.WriteHeader(http.StatusOK)
  262. }
  263. // swagger:route POST /api/hosts/adm/authenticate hosts authenticateHost
  264. //
  265. // Host based authentication for making further API calls.
  266. //
  267. // Schemes: https
  268. //
  269. // Security:
  270. // oauth
  271. //
  272. // Responses:
  273. // 200: successResponse
  274. func authenticateHost(response http.ResponseWriter, request *http.Request) {
  275. var authRequest models.AuthParams
  276. var errorResponse = models.ErrorResponse{
  277. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  278. }
  279. decoder := json.NewDecoder(request.Body)
  280. decoderErr := decoder.Decode(&authRequest)
  281. defer request.Body.Close()
  282. if decoderErr != nil {
  283. errorResponse.Code = http.StatusBadRequest
  284. errorResponse.Message = decoderErr.Error()
  285. logger.Log(0, request.Header.Get("user"), "error decoding request body: ",
  286. decoderErr.Error())
  287. logic.ReturnErrorResponse(response, request, errorResponse)
  288. return
  289. }
  290. errorResponse.Code = http.StatusBadRequest
  291. if authRequest.ID == "" {
  292. errorResponse.Message = "W1R3: ID can't be empty"
  293. logger.Log(0, request.Header.Get("user"), errorResponse.Message)
  294. logic.ReturnErrorResponse(response, request, errorResponse)
  295. return
  296. } else if authRequest.Password == "" {
  297. errorResponse.Message = "W1R3: Password can't be empty"
  298. logger.Log(0, request.Header.Get("user"), errorResponse.Message)
  299. logic.ReturnErrorResponse(response, request, errorResponse)
  300. return
  301. }
  302. host, err := logic.GetHost(authRequest.ID)
  303. if err != nil {
  304. errorResponse.Code = http.StatusBadRequest
  305. errorResponse.Message = err.Error()
  306. logger.Log(0, request.Header.Get("user"),
  307. "error retrieving host: ", err.Error())
  308. logic.ReturnErrorResponse(response, request, errorResponse)
  309. return
  310. }
  311. err = bcrypt.CompareHashAndPassword([]byte(host.HostPass), []byte(authRequest.Password))
  312. if err != nil {
  313. errorResponse.Code = http.StatusUnauthorized
  314. errorResponse.Message = "unauthorized"
  315. logger.Log(0, request.Header.Get("user"),
  316. "error validating user password: ", err.Error())
  317. logic.ReturnErrorResponse(response, request, errorResponse)
  318. return
  319. }
  320. tokenString, err := logic.CreateJWT(authRequest.ID, authRequest.MacAddress, "")
  321. if tokenString == "" {
  322. errorResponse.Code = http.StatusUnauthorized
  323. errorResponse.Message = "unauthorized"
  324. logger.Log(0, request.Header.Get("user"),
  325. fmt.Sprintf("%s: %v", errorResponse.Message, err))
  326. logic.ReturnErrorResponse(response, request, errorResponse)
  327. return
  328. }
  329. var successResponse = models.SuccessResponse{
  330. Code: http.StatusOK,
  331. Message: "W1R3: Host " + authRequest.ID + " Authorized",
  332. Response: models.SuccessfulLoginResponse{
  333. AuthToken: tokenString,
  334. ID: authRequest.ID,
  335. },
  336. }
  337. successJSONResponse, jsonError := json.Marshal(successResponse)
  338. if jsonError != nil {
  339. errorResponse.Code = http.StatusBadRequest
  340. errorResponse.Message = err.Error()
  341. logger.Log(0, request.Header.Get("user"),
  342. "error marshalling resp: ", err.Error())
  343. logic.ReturnErrorResponse(response, request, errorResponse)
  344. return
  345. }
  346. response.WriteHeader(http.StatusOK)
  347. response.Header().Set("Content-Type", "application/json")
  348. response.Write(successJSONResponse)
  349. }