server.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package controller
  2. import (
  3. "crypto/ed25519"
  4. "crypto/x509"
  5. "crypto/x509/pkix"
  6. "encoding/json"
  7. "fmt"
  8. "net/http"
  9. "strings"
  10. "github.com/gorilla/mux"
  11. "github.com/gravitl/netmaker/logger"
  12. "github.com/gravitl/netmaker/logic"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/netclient/config"
  15. "github.com/gravitl/netmaker/servercfg"
  16. "github.com/gravitl/netmaker/serverctl"
  17. "github.com/gravitl/netmaker/tls"
  18. )
  19. func serverHandlers(r *mux.Router) {
  20. // r.HandleFunc("/api/server/addnetwork/{network}", securityCheckServer(true, http.HandlerFunc(addNetwork))).Methods("POST")
  21. r.HandleFunc("/api/server/getconfig", securityCheckServer(false, http.HandlerFunc(getConfig))).Methods("GET")
  22. r.HandleFunc("/api/server/removenetwork/{network}", securityCheckServer(true, http.HandlerFunc(removeNetwork))).Methods("DELETE")
  23. r.HandleFunc("/api/server/register", authorize(true, false, "node", http.HandlerFunc(register))).Methods("POST")
  24. r.HandleFunc("/api/server/getserverinfo", authorize(true, false, "node", http.HandlerFunc(getServerInfo))).Methods("GET")
  25. }
  26. //Security check is middleware for every function and just checks to make sure that its the master calling
  27. //Only admin should have access to all these network-level actions
  28. //or maybe some Users once implemented
  29. func securityCheckServer(adminonly bool, next http.Handler) http.HandlerFunc {
  30. return func(w http.ResponseWriter, r *http.Request) {
  31. var errorResponse = models.ErrorResponse{
  32. Code: http.StatusInternalServerError, Message: "W1R3: It's not you it's me.",
  33. }
  34. bearerToken := r.Header.Get("Authorization")
  35. var tokenSplit = strings.Split(bearerToken, " ")
  36. var authToken = ""
  37. if len(tokenSplit) < 2 {
  38. errorResponse = models.ErrorResponse{
  39. Code: http.StatusUnauthorized, Message: "W1R3: You are unauthorized to access this endpoint.",
  40. }
  41. returnErrorResponse(w, r, errorResponse)
  42. return
  43. } else {
  44. authToken = tokenSplit[1]
  45. }
  46. //all endpoints here require master so not as complicated
  47. //still might not be a good way of doing this
  48. user, _, isadmin, err := logic.VerifyUserToken(authToken)
  49. errorResponse = models.ErrorResponse{
  50. Code: http.StatusUnauthorized, Message: "W1R3: You are unauthorized to access this endpoint.",
  51. }
  52. if !adminonly && (err != nil || user == "") {
  53. returnErrorResponse(w, r, errorResponse)
  54. return
  55. }
  56. if adminonly && !isadmin && !authenticateMaster(authToken) {
  57. returnErrorResponse(w, r, errorResponse)
  58. return
  59. }
  60. next.ServeHTTP(w, r)
  61. }
  62. }
  63. func removeNetwork(w http.ResponseWriter, r *http.Request) {
  64. // Set header
  65. w.Header().Set("Content-Type", "application/json")
  66. // get params
  67. var params = mux.Vars(r)
  68. network := params["network"]
  69. err := logic.DeleteNetwork(network)
  70. if err != nil {
  71. logger.Log(0, r.Header.Get("user"),
  72. fmt.Sprintf("failed to delete network [%s]: %v", network, err))
  73. json.NewEncoder(w).Encode(fmt.Sprintf("could not remove network %s from server", network))
  74. return
  75. }
  76. logger.Log(1, r.Header.Get("user"),
  77. fmt.Sprintf("deleted network [%s]: %v", network, err))
  78. json.NewEncoder(w).Encode(fmt.Sprintf("network %s removed from server", network))
  79. }
  80. func getServerInfo(w http.ResponseWriter, r *http.Request) {
  81. // Set header
  82. w.Header().Set("Content-Type", "application/json")
  83. // get params
  84. json.NewEncoder(w).Encode(servercfg.GetServerInfo())
  85. //w.WriteHeader(http.StatusOK)
  86. }
  87. func getConfig(w http.ResponseWriter, r *http.Request) {
  88. // Set header
  89. w.Header().Set("Content-Type", "application/json")
  90. // get params
  91. scfg := servercfg.GetServerConfig()
  92. json.NewEncoder(w).Encode(scfg)
  93. //w.WriteHeader(http.StatusOK)
  94. }
  95. // register - registers a client with the server and return the CA and cert
  96. func register(w http.ResponseWriter, r *http.Request) {
  97. logger.Log(2, "processing registration request")
  98. w.Header().Set("Content-Type", "application/json")
  99. //decode body
  100. var request config.RegisterRequest
  101. if err := json.NewDecoder(r.Body).Decode(&request); err != nil {
  102. logger.Log(0, "error decoding request", err.Error())
  103. errorResponse := models.ErrorResponse{
  104. Code: http.StatusBadRequest, Message: err.Error(),
  105. }
  106. returnErrorResponse(w, r, errorResponse)
  107. return
  108. }
  109. cert, ca, err := genCerts(&request.Key, &request.CommonName)
  110. if err != nil {
  111. logger.Log(0, "failed to generater certs ", err.Error())
  112. errorResponse := models.ErrorResponse{
  113. Code: http.StatusNotFound, Message: err.Error(),
  114. }
  115. returnErrorResponse(w, r, errorResponse)
  116. return
  117. }
  118. //x509.Certificate.PublicKey is an interface therefore json encoding/decoding result in a string value rather than a []byte
  119. //include the actual public key so the certificate can be properly reassembled on the other end.
  120. response := config.RegisterResponse{
  121. CA: *ca,
  122. CAPubKey: (ca.PublicKey).(ed25519.PublicKey),
  123. Cert: *cert,
  124. CertPubKey: (cert.PublicKey).(ed25519.PublicKey),
  125. Broker: servercfg.GetServer(),
  126. Port: servercfg.GetMQPort(),
  127. }
  128. logger.Log(2, r.Header.Get("user"),
  129. fmt.Sprintf("registered client [%+v] with server", request))
  130. w.WriteHeader(http.StatusOK)
  131. json.NewEncoder(w).Encode(response)
  132. }
  133. // genCerts generates a client certificate and returns the certificate and root CA
  134. func genCerts(clientKey *ed25519.PrivateKey, name *pkix.Name) (*x509.Certificate, *x509.Certificate, error) {
  135. ca, err := serverctl.ReadCertFromDB(tls.ROOT_PEM_NAME)
  136. if err != nil {
  137. logger.Log(2, "root ca not found ", err.Error())
  138. return nil, nil, fmt.Errorf("root ca not found %w", err)
  139. }
  140. key, err := serverctl.ReadKeyFromDB(tls.ROOT_KEY_NAME)
  141. if err != nil {
  142. logger.Log(2, "root key not found ", err.Error())
  143. return nil, nil, fmt.Errorf("root key not found %w", err)
  144. }
  145. csr, err := tls.NewCSR(*clientKey, *name)
  146. if err != nil {
  147. logger.Log(2, "failed to generate client certificate requests", err.Error())
  148. return nil, nil, fmt.Errorf("client certification request generation failed %w", err)
  149. }
  150. cert, err := tls.NewEndEntityCert(*key, csr, ca, tls.CERTIFICATE_VALIDITY)
  151. if err != nil {
  152. logger.Log(2, "unable to generate client certificate", err.Error())
  153. return nil, nil, fmt.Errorf("client certification generation failed %w", err)
  154. }
  155. return cert, ca, nil
  156. }