accesskeys.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251
  1. package logic
  2. import (
  3. "crypto/rand"
  4. "encoding/base64"
  5. "encoding/json"
  6. "errors"
  7. "math/big"
  8. "strings"
  9. "sync"
  10. "github.com/go-playground/validator/v10"
  11. "github.com/gravitl/netmaker/database"
  12. "github.com/gravitl/netmaker/logger"
  13. "github.com/gravitl/netmaker/models"
  14. "github.com/gravitl/netmaker/servercfg"
  15. )
  16. const (
  17. charset = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  18. )
  19. // CreateAccessKey - create access key
  20. func CreateAccessKey(accesskey models.AccessKey, network models.Network) (models.AccessKey, error) {
  21. if accesskey.Name == "" {
  22. accesskey.Name = genKeyName()
  23. }
  24. if accesskey.Value == "" {
  25. accesskey.Value = GenKey()
  26. }
  27. if accesskey.Uses == 0 {
  28. accesskey.Uses = 1
  29. }
  30. checkkeys, err := GetKeys(network.NetID)
  31. if err != nil {
  32. return models.AccessKey{}, errors.New("could not retrieve network keys")
  33. }
  34. for _, key := range checkkeys {
  35. if key.Name == accesskey.Name {
  36. return models.AccessKey{}, errors.New("duplicate AccessKey Name")
  37. }
  38. }
  39. privAddr := ""
  40. if network.IsLocal != "" {
  41. privAddr = network.LocalRange
  42. }
  43. netID := network.NetID
  44. var accessToken models.AccessToken
  45. s := servercfg.GetServerConfig()
  46. servervals := models.ServerConfig{
  47. GRPCConnString: s.GRPCConnString,
  48. GRPCSSL: s.GRPCSSL,
  49. Server: s.Server,
  50. }
  51. accessToken.ServerConfig = servervals
  52. accessToken.ClientConfig.Network = netID
  53. accessToken.ClientConfig.Key = accesskey.Value
  54. accessToken.ClientConfig.LocalRange = privAddr
  55. tokenjson, err := json.Marshal(accessToken)
  56. if err != nil {
  57. return accesskey, err
  58. }
  59. accesskey.AccessString = base64.StdEncoding.EncodeToString([]byte(tokenjson))
  60. //validate accesskey
  61. v := validator.New()
  62. err = v.Struct(accesskey)
  63. if err != nil {
  64. for _, e := range err.(validator.ValidationErrors) {
  65. logger.Log(1, "validator", e.Error())
  66. }
  67. return models.AccessKey{}, err
  68. }
  69. network.AccessKeys = append(network.AccessKeys, accesskey)
  70. data, err := json.Marshal(&network)
  71. if err != nil {
  72. return models.AccessKey{}, err
  73. }
  74. if err = database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  75. return models.AccessKey{}, err
  76. }
  77. return accesskey, nil
  78. }
  79. // DeleteKey - deletes a key
  80. func DeleteKey(keyname, netname string) error {
  81. network, err := GetParentNetwork(netname)
  82. if err != nil {
  83. return err
  84. }
  85. //basically, turn the list of access keys into the list of access keys before and after the item
  86. //have not done any error handling for if there's like...1 item. I think it works? need to test.
  87. found := false
  88. var updatedKeys []models.AccessKey
  89. for _, currentkey := range network.AccessKeys {
  90. if currentkey.Name == keyname {
  91. found = true
  92. } else {
  93. updatedKeys = append(updatedKeys, currentkey)
  94. }
  95. }
  96. if !found {
  97. return errors.New("key " + keyname + " does not exist")
  98. }
  99. network.AccessKeys = updatedKeys
  100. data, err := json.Marshal(&network)
  101. if err != nil {
  102. return err
  103. }
  104. if err := database.Insert(network.NetID, string(data), database.NETWORKS_TABLE_NAME); err != nil {
  105. return err
  106. }
  107. return nil
  108. }
  109. // GetKeys - fetches keys for network
  110. func GetKeys(net string) ([]models.AccessKey, error) {
  111. record, err := database.FetchRecord(database.NETWORKS_TABLE_NAME, net)
  112. if err != nil {
  113. return []models.AccessKey{}, err
  114. }
  115. network, err := ParseNetwork(record)
  116. if err != nil {
  117. return []models.AccessKey{}, err
  118. }
  119. return network.AccessKeys, nil
  120. }
  121. // DecrimentKey - decriments key uses
  122. func DecrimentKey(networkName string, keyvalue string) {
  123. var network models.Network
  124. network, err := GetParentNetwork(networkName)
  125. if err != nil || network.IsComms == "yes" {
  126. return
  127. }
  128. for i := len(network.AccessKeys) - 1; i >= 0; i-- {
  129. currentkey := network.AccessKeys[i]
  130. if currentkey.Value == keyvalue {
  131. network.AccessKeys[i].Uses--
  132. if network.AccessKeys[i].Uses < 1 {
  133. network.AccessKeys = append(network.AccessKeys[:i],
  134. network.AccessKeys[i+1:]...)
  135. break
  136. }
  137. }
  138. }
  139. if newNetworkData, err := json.Marshal(&network); err != nil {
  140. logger.Log(2, "failed to decrement key")
  141. return
  142. } else {
  143. database.Insert(network.NetID, string(newNetworkData), database.NETWORKS_TABLE_NAME)
  144. }
  145. }
  146. // IsKeyValid - check if key is valid
  147. func IsKeyValid(networkname string, keyvalue string) bool {
  148. network, err := GetParentNetwork(networkname)
  149. if err != nil {
  150. return false
  151. }
  152. accesskeys := network.AccessKeys
  153. if network.IsComms == "yes" {
  154. accesskeys = getAllAccessKeys()
  155. }
  156. var key models.AccessKey
  157. foundkey := false
  158. isvalid := false
  159. for i := len(accesskeys) - 1; i >= 0; i-- {
  160. currentkey := accesskeys[i]
  161. if currentkey.Value == keyvalue {
  162. key = currentkey
  163. foundkey = true
  164. }
  165. }
  166. if foundkey {
  167. if key.Uses > 0 {
  168. isvalid = true
  169. }
  170. }
  171. return isvalid
  172. }
  173. // RemoveKeySensitiveInfo - remove sensitive key info
  174. func RemoveKeySensitiveInfo(keys []models.AccessKey) []models.AccessKey {
  175. var returnKeys []models.AccessKey
  176. for _, key := range keys {
  177. key.Value = models.PLACEHOLDER_KEY_TEXT
  178. key.AccessString = models.PLACEHOLDER_TOKEN_TEXT
  179. returnKeys = append(returnKeys, key)
  180. }
  181. return returnKeys
  182. }
  183. const (
  184. maxr string = "ff578f57c15bb743beaa77d27637e02b598dffa9aebd15889187fe6eb3bdca516c3fa1a52eabef31f33b4b8c2e5b5524f1aa4f3329393912f40dbbe23d7f39723e0be05b6696b11f8eea0abe365a11d9f2735ac7e5b4e015ab19b35b84893685b37a9a0a62a566d6571d7e00d4241687f5c804f37cde9bf311c0781f51cc007c5a01a94f6cfcecea640b8e9ab7bd43e73e5df5d0e1eeb4d9b6cc44be67b7cad80808b17869561b579ffe0bbdeca5c83139e458000000000000000000000000000000000000000000000000000000000000000"
  185. )
  186. var (
  187. uno sync.Once
  188. maxentropy *big.Int
  189. )
  190. func init() {
  191. uno.Do(func() {
  192. maxentropy, _ = new(big.Int).SetString(maxr, 16)
  193. })
  194. }
  195. // == private methods ==
  196. func genKeyName() string {
  197. entropy, _ := rand.Int(rand.Reader, maxentropy)
  198. return strings.Join([]string{"key", entropy.Text(16)[:16]}, "-")
  199. }
  200. func GenKey() string {
  201. entropy, _ := rand.Int(rand.Reader, maxentropy)
  202. return entropy.Text(16)[:16]
  203. }
  204. func getAllAccessKeys() []models.AccessKey {
  205. var accesskeys = make([]models.AccessKey, 0)
  206. networks, err := GetNetworks()
  207. if err != nil {
  208. return accesskeys
  209. }
  210. for i := range networks {
  211. accesskeys = append(accesskeys, networks[i].AccessKeys...)
  212. }
  213. return accesskeys
  214. }