accesskeys.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252
  1. package logic
  2. import (
  3. "encoding/base64"
  4. "encoding/json"
  5. "errors"
  6. "math/rand"
  7. "time"
  8. "github.com/go-playground/validator/v10"
  9. "github.com/gravitl/netmaker/database"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/servercfg"
  13. )
  14. const (
  15. charset = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  16. )
  17. // CreateAccessKey - create access key
  18. func CreateAccessKey(accesskey models.AccessKey, network models.Network) (models.AccessKey, error) {
  19. if accesskey.Name == "" {
  20. accesskey.Name = genKeyName()
  21. }
  22. if accesskey.Value == "" {
  23. accesskey.Value = genKey()
  24. }
  25. if accesskey.Uses == 0 {
  26. accesskey.Uses = 1
  27. }
  28. checkkeys, err := GetKeys(network.NetID)
  29. if err != nil {
  30. return models.AccessKey{}, errors.New("could not retrieve network keys")
  31. }
  32. for _, key := range checkkeys {
  33. if key.Name == accesskey.Name {
  34. return models.AccessKey{}, errors.New("duplicate AccessKey Name")
  35. }
  36. }
  37. privAddr := ""
  38. if network.IsLocal != "" {
  39. privAddr = network.LocalRange
  40. }
  41. netID := network.NetID
  42. var accessToken models.AccessToken
  43. s := servercfg.GetServerConfig()
  44. servervals := models.ServerConfig{
  45. GRPCConnString: s.GRPCConnString,
  46. GRPCSSL: s.GRPCSSL,
  47. CheckinInterval: s.CheckinInterval,
  48. }
  49. accessToken.ServerConfig = servervals
  50. accessToken.ClientConfig.Network = netID
  51. accessToken.ClientConfig.Key = accesskey.Value
  52. accessToken.ClientConfig.LocalRange = privAddr
  53. tokenjson, err := json.Marshal(accessToken)
  54. if err != nil {
  55. return accesskey, err
  56. }
  57. accesskey.AccessString = base64.StdEncoding.EncodeToString([]byte(tokenjson))
  58. //validate accesskey
  59. v := validator.New()
  60. err = v.Struct(accesskey)
  61. if err != nil {
  62. for _, e := range err.(validator.ValidationErrors) {
  63. logger.Log(1, "validator", e.Error())
  64. }
  65. return models.AccessKey{}, err
  66. }
  67. network.AccessKeys = append(network.AccessKeys, accesskey)
  68. data, err := json.Marshal(&network)
  69. if err != nil {
  70. return models.AccessKey{}, err
  71. }
  72. if err = database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  73. return models.AccessKey{}, err
  74. }
  75. return accesskey, nil
  76. }
  77. // DeleteKey - deletes a key
  78. func DeleteKey(keyname, netname string) error {
  79. network, err := GetParentNetwork(netname)
  80. if err != nil {
  81. return err
  82. }
  83. //basically, turn the list of access keys into the list of access keys before and after the item
  84. //have not done any error handling for if there's like...1 item. I think it works? need to test.
  85. found := false
  86. var updatedKeys []models.AccessKey
  87. for _, currentkey := range network.AccessKeys {
  88. if currentkey.Name == keyname {
  89. found = true
  90. } else {
  91. updatedKeys = append(updatedKeys, currentkey)
  92. }
  93. }
  94. if !found {
  95. return errors.New("key " + keyname + " does not exist")
  96. }
  97. network.AccessKeys = updatedKeys
  98. data, err := json.Marshal(&network)
  99. if err != nil {
  100. return err
  101. }
  102. if err := database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  103. return err
  104. }
  105. return nil
  106. }
  107. // GetKeys - fetches keys for network
  108. func GetKeys(net string) ([]models.AccessKey, error) {
  109. record, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, net)
  110. if err != nil {
  111. return []models.AccessKey{}, err
  112. }
  113. network, err := ParseNetwork(record)
  114. if err != nil {
  115. return []models.AccessKey{}, err
  116. }
  117. return network.AccessKeys, nil
  118. }
  119. // DecrimentKey - decriments key uses
  120. func DecrimentKey(networkName string, keyvalue string) {
  121. var network models.Network
  122. network, err := GetParentNetwork(networkName)
  123. if err != nil || network.IsComms == "yes" {
  124. return
  125. }
  126. for i := len(network.AccessKeys) - 1; i >= 0; i-- {
  127. currentkey := network.AccessKeys[i]
  128. if currentkey.Value == keyvalue {
  129. network.AccessKeys[i].Uses--
  130. if network.AccessKeys[i].Uses < 1 {
  131. network.AccessKeys = append(network.AccessKeys[:i],
  132. network.AccessKeys[i+1:]...)
  133. break
  134. }
  135. }
  136. }
  137. if newNetworkData, err := json.Marshal(&network); err != nil {
  138. logger.Log(2, "failed to decrement key")
  139. return
  140. } else {
  141. database.Insert(network.NetID, string(newNetworkData), database.NETWORKS_TABLE_NAME)
  142. }
  143. }
  144. // IsKeyValid - check if key is valid
  145. func IsKeyValid(networkname string, keyvalue string) bool {
  146. network, err := GetParentNetwork(networkname)
  147. if err != nil {
  148. return false
  149. }
  150. accesskeys := network.AccessKeys
  151. if network.IsComms == "yes" {
  152. accesskeys = getAllAccessKeys()
  153. }
  154. var key models.AccessKey
  155. foundkey := false
  156. isvalid := false
  157. for i := len(accesskeys) - 1; i >= 0; i-- {
  158. currentkey := accesskeys[i]
  159. if currentkey.Value == keyvalue {
  160. key = currentkey
  161. foundkey = true
  162. }
  163. }
  164. if foundkey {
  165. if key.Uses > 0 {
  166. isvalid = true
  167. }
  168. }
  169. return isvalid
  170. }
  171. // RemoveKeySensitiveInfo - remove sensitive key info
  172. func RemoveKeySensitiveInfo(keys []models.AccessKey) []models.AccessKey {
  173. var returnKeys []models.AccessKey
  174. for _, key := range keys {
  175. key.Value = models.PLACEHOLDER_KEY_TEXT
  176. key.AccessString = models.PLACEHOLDER_TOKEN_TEXT
  177. returnKeys = append(returnKeys, key)
  178. }
  179. return returnKeys
  180. }
  181. // == private methods ==
  182. func genKeyName() string {
  183. var seededRand *rand.Rand = rand.New(
  184. rand.NewSource(time.Now().UnixNano()))
  185. length := 5
  186. b := make([]byte, length)
  187. for i := range b {
  188. b[i] = charset[seededRand.Intn(len(charset))]
  189. }
  190. return "key" + string(b)
  191. }
  192. func genKey() string {
  193. var seededRand *rand.Rand = rand.New(
  194. rand.NewSource(time.Now().UnixNano()))
  195. length := 16
  196. b := make([]byte, length)
  197. for i := range b {
  198. b[i] = charset[seededRand.Intn(len(charset))]
  199. }
  200. return string(b)
  201. }
  202. func getAllAccessKeys() []models.AccessKey {
  203. var accesskeys = make([]models.AccessKey, 0)
  204. networks, err := GetNetworks()
  205. if err != nil {
  206. return accesskeys
  207. }
  208. for i := range networks {
  209. accesskeys = append(accesskeys, networks[i].AccessKeys...)
  210. }
  211. return accesskeys
  212. }