accesskeys.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. package logic
  2. import (
  3. "encoding/base64"
  4. "encoding/json"
  5. "errors"
  6. "math/rand"
  7. "time"
  8. "github.com/go-playground/validator/v10"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/servercfg"
  13. )
  14. const (
  15. charset = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  16. )
  17. // CreateAccessKey - create access key
  18. func CreateAccessKey(accesskey models.AccessKey, network models.Network) (models.AccessKey, error) {
  19. if accesskey.Name == "" {
  20. accesskey.Name = genKeyName()
  21. }
  22. if accesskey.Value == "" {
  23. accesskey.Value = genKey()
  24. }
  25. if accesskey.Uses == 0 {
  26. accesskey.Uses = 1
  27. }
  28. checkkeys, err := GetKeys(network.NetID)
  29. if err != nil {
  30. return models.AccessKey{}, errors.New("could not retrieve network keys")
  31. }
  32. for _, key := range checkkeys {
  33. if key.Name == accesskey.Name {
  34. return models.AccessKey{}, errors.New("duplicate AccessKey Name")
  35. }
  36. }
  37. privAddr := ""
  38. if network.IsLocal != "" {
  39. privAddr = network.LocalRange
  40. }
  41. netID := network.NetID
  42. var accessToken models.AccessToken
  43. s := servercfg.GetServerConfig()
  44. servervals := models.ServerConfig{
  45. CoreDNSAddr: s.CoreDNSAddr,
  46. APIConnString: s.APIConnString,
  47. APIHost: s.APIHost,
  48. APIPort: s.APIPort,
  49. GRPCConnString: s.GRPCConnString,
  50. GRPCHost: s.GRPCHost,
  51. GRPCPort: s.GRPCPort,
  52. GRPCSSL: s.GRPCSSL,
  53. CheckinInterval: s.CheckinInterval,
  54. }
  55. accessToken.ServerConfig = servervals
  56. accessToken.ClientConfig.Network = netID
  57. accessToken.ClientConfig.Key = accesskey.Value
  58. accessToken.ClientConfig.LocalRange = privAddr
  59. tokenjson, err := json.Marshal(accessToken)
  60. if err != nil {
  61. return accesskey, err
  62. }
  63. accesskey.AccessString = base64.StdEncoding.EncodeToString([]byte(tokenjson))
  64. //validate accesskey
  65. v := validator.New()
  66. err = v.Struct(accesskey)
  67. if err != nil {
  68. for _, e := range err.(validator.ValidationErrors) {
  69. logger.Log(1, "validator", e.Error())
  70. }
  71. return models.AccessKey{}, err
  72. }
  73. network.AccessKeys = append(network.AccessKeys, accesskey)
  74. data, err := json.Marshal(&network)
  75. if err != nil {
  76. return models.AccessKey{}, err
  77. }
  78. if err = database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  79. return models.AccessKey{}, err
  80. }
  81. return accesskey, nil
  82. }
  83. // DeleteKey - deletes a key
  84. func DeleteKey(keyname, netname string) error {
  85. network, err := GetParentNetwork(netname)
  86. if err != nil {
  87. return err
  88. }
  89. //basically, turn the list of access keys into the list of access keys before and after the item
  90. //have not done any error handling for if there's like...1 item. I think it works? need to test.
  91. found := false
  92. var updatedKeys []models.AccessKey
  93. for _, currentkey := range network.AccessKeys {
  94. if currentkey.Name == keyname {
  95. found = true
  96. } else {
  97. updatedKeys = append(updatedKeys, currentkey)
  98. }
  99. }
  100. if !found {
  101. return errors.New("key " + keyname + " does not exist")
  102. }
  103. network.AccessKeys = updatedKeys
  104. data, err := json.Marshal(&network)
  105. if err != nil {
  106. return err
  107. }
  108. if err := database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  109. return err
  110. }
  111. return nil
  112. }
  113. // GetKeys - fetches keys for network
  114. func GetKeys(net string) ([]models.AccessKey, error) {
  115. record, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, net)
  116. if err != nil {
  117. return []models.AccessKey{}, err
  118. }
  119. network, err := ParseNetwork(record)
  120. if err != nil {
  121. return []models.AccessKey{}, err
  122. }
  123. return network.AccessKeys, nil
  124. }
  125. // DecrimentKey - decriments key uses
  126. func DecrimentKey(networkName string, keyvalue string) {
  127. var network models.Network
  128. network, err := GetParentNetwork(networkName)
  129. if err != nil {
  130. return
  131. }
  132. for i := len(network.AccessKeys) - 1; i >= 0; i-- {
  133. currentkey := network.AccessKeys[i]
  134. if currentkey.Value == keyvalue {
  135. network.AccessKeys[i].Uses--
  136. if network.AccessKeys[i].Uses < 1 {
  137. network.AccessKeys = append(network.AccessKeys[:i],
  138. network.AccessKeys[i+1:]...)
  139. break
  140. }
  141. }
  142. }
  143. if newNetworkData, err := json.Marshal(&network); err != nil {
  144. logger.Log(2, "failed to decrement key")
  145. return
  146. } else {
  147. database.Insert(network.NetID, string(newNetworkData), database.NETWORKS_TABLE_NAME)
  148. }
  149. }
  150. // IsKeyValid - check if key is valid
  151. func IsKeyValid(networkname string, keyvalue string) bool {
  152. network, _ := GetParentNetwork(networkname)
  153. var key models.AccessKey
  154. foundkey := false
  155. isvalid := false
  156. for i := len(network.AccessKeys) - 1; i >= 0; i-- {
  157. currentkey := network.AccessKeys[i]
  158. if currentkey.Value == keyvalue {
  159. key = currentkey
  160. foundkey = true
  161. }
  162. }
  163. if foundkey {
  164. if key.Uses > 0 {
  165. isvalid = true
  166. }
  167. }
  168. return isvalid
  169. }
  170. // RemoveKeySensitiveInfo - remove sensitive key info
  171. func RemoveKeySensitiveInfo(keys []models.AccessKey) []models.AccessKey {
  172. var returnKeys []models.AccessKey
  173. for _, key := range keys {
  174. key.Value = models.PLACEHOLDER_KEY_TEXT
  175. key.AccessString = models.PLACEHOLDER_TOKEN_TEXT
  176. returnKeys = append(returnKeys, key)
  177. }
  178. return returnKeys
  179. }
  180. // == private methods ==
  181. func genKeyName() string {
  182. var seededRand *rand.Rand = rand.New(
  183. rand.NewSource(time.Now().UnixNano()))
  184. length := 5
  185. b := make([]byte, length)
  186. for i := range b {
  187. b[i] = charset[seededRand.Intn(len(charset))]
  188. }
  189. return "key" + string(b)
  190. }
  191. func genKey() string {
  192. var seededRand *rand.Rand = rand.New(
  193. rand.NewSource(time.Now().UnixNano()))
  194. length := 16
  195. b := make([]byte, length)
  196. for i := range b {
  197. b[i] = charset[seededRand.Intn(len(charset))]
  198. }
  199. return string(b)
  200. }