user_mgmt.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357
  1. package logic
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "github.com/gravitl/netmaker/database"
  7. "github.com/gravitl/netmaker/models"
  8. )
  9. // Pre-Define Permission Templates for default Roles
  10. var SuperAdminPermissionTemplate = models.UserRolePermissionTemplate{
  11. ID: models.SuperAdminRole,
  12. Default: true,
  13. FullAccess: true,
  14. }
  15. var AdminPermissionTemplate = models.UserRolePermissionTemplate{
  16. ID: models.AdminRole,
  17. Default: true,
  18. FullAccess: true,
  19. }
  20. var ServiceUserPermissionTemplate = models.UserRolePermissionTemplate{
  21. ID: models.ServiceUser,
  22. Default: true,
  23. FullAccess: false,
  24. DenyDashboardAccess: true,
  25. }
  26. var PlatformUserUserPermissionTemplate = models.UserRolePermissionTemplate{
  27. ID: models.PlatformUser,
  28. Default: true,
  29. FullAccess: false,
  30. }
  31. var NetworkAdminPermissionTemplate = models.UserRolePermissionTemplate{
  32. ID: models.NetworkAdmin,
  33. Default: true,
  34. NetworkID: "netmaker",
  35. FullAccess: true,
  36. NetworkLevelAccess: make(map[models.RsrcType]map[models.RsrcID]models.RsrcPermissionScope),
  37. }
  38. var NetworkUserPermissionTemplate = models.UserRolePermissionTemplate{
  39. ID: models.NetworkUser,
  40. Default: true,
  41. FullAccess: false,
  42. NetworkID: "netmaker",
  43. DenyDashboardAccess: false,
  44. NetworkLevelAccess: map[models.RsrcType]map[models.RsrcID]models.RsrcPermissionScope{
  45. models.RemoteAccessGwRsrc: {
  46. models.AllRemoteAccessGwRsrcID: models.RsrcPermissionScope{
  47. Read: true,
  48. },
  49. },
  50. models.ExtClientsRsrc: {
  51. models.AllExtClientsRsrcID: models.RsrcPermissionScope{
  52. Read: true,
  53. Create: true,
  54. Update: true,
  55. Delete: true,
  56. VPNaccess: true,
  57. },
  58. },
  59. },
  60. }
  61. func UserRolesInit() {
  62. d, _ := json.Marshal(SuperAdminPermissionTemplate)
  63. database.Insert(SuperAdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  64. d, _ = json.Marshal(AdminPermissionTemplate)
  65. database.Insert(AdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  66. d, _ = json.Marshal(ServiceUserPermissionTemplate)
  67. database.Insert(ServiceUserPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  68. d, _ = json.Marshal(NetworkAdminPermissionTemplate)
  69. database.Insert(NetworkAdminPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  70. d, _ = json.Marshal(NetworkUserPermissionTemplate)
  71. database.Insert(NetworkUserPermissionTemplate.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  72. }
  73. // ListRoles - lists user roles permission templates
  74. func ListRoles() ([]models.UserRolePermissionTemplate, error) {
  75. data, err := database.FetchRecords(database.USER_PERMISSIONS_TABLE_NAME)
  76. if err != nil {
  77. return []models.UserRolePermissionTemplate{}, err
  78. }
  79. userRoles := []models.UserRolePermissionTemplate{}
  80. for _, dataI := range data {
  81. userRole := models.UserRolePermissionTemplate{}
  82. err := json.Unmarshal([]byte(dataI), &userRole)
  83. if err != nil {
  84. continue
  85. }
  86. userRoles = append(userRoles, userRole)
  87. }
  88. return userRoles, nil
  89. }
  90. func ValidateCreateRoleReq(userRole models.UserRolePermissionTemplate) error {
  91. // check if role exists with this id
  92. _, err := GetRole(userRole.ID)
  93. if err == nil {
  94. return fmt.Errorf("role with id `%s` exists already", userRole.ID.String())
  95. }
  96. if len(userRole.NetworkLevelAccess) > 0 {
  97. for rsrcType := range userRole.NetworkLevelAccess {
  98. if _, ok := models.RsrcTypeMap[rsrcType]; !ok {
  99. return errors.New("invalid rsrc type " + rsrcType.String())
  100. }
  101. }
  102. }
  103. if userRole.NetworkID == "" {
  104. return errors.New("only network roles are allowed to be created")
  105. }
  106. return nil
  107. }
  108. func ValidateUpdateRoleReq(userRole models.UserRolePermissionTemplate) error {
  109. roleInDB, err := GetRole(userRole.ID)
  110. if err != nil {
  111. return err
  112. }
  113. if roleInDB.NetworkID != userRole.NetworkID {
  114. return errors.New("network id mismatch")
  115. }
  116. if roleInDB.Default {
  117. return errors.New("cannot update default role")
  118. }
  119. if len(userRole.NetworkLevelAccess) > 0 {
  120. for rsrcType := range userRole.NetworkLevelAccess {
  121. if _, ok := models.RsrcTypeMap[rsrcType]; !ok {
  122. return errors.New("invalid rsrc type " + rsrcType.String())
  123. }
  124. }
  125. }
  126. return nil
  127. }
  128. // CreateRole - inserts new role into DB
  129. func CreateRole(r models.UserRolePermissionTemplate) error {
  130. // check if role already exists
  131. if r.ID.String() == "" {
  132. return errors.New("role id cannot be empty")
  133. }
  134. _, err := database.FetchRecord(database.USER_PERMISSIONS_TABLE_NAME, r.ID.String())
  135. if err == nil {
  136. return errors.New("role already exists")
  137. }
  138. d, err := json.Marshal(r)
  139. if err != nil {
  140. return err
  141. }
  142. return database.Insert(r.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  143. }
  144. // GetRole - fetches role template by id
  145. func GetRole(roleID models.UserRole) (models.UserRolePermissionTemplate, error) {
  146. // check if role already exists
  147. data, err := database.FetchRecord(database.USER_PERMISSIONS_TABLE_NAME, roleID.String())
  148. if err != nil {
  149. return models.UserRolePermissionTemplate{}, err
  150. }
  151. ur := models.UserRolePermissionTemplate{}
  152. err = json.Unmarshal([]byte(data), &ur)
  153. if err != nil {
  154. return ur, err
  155. }
  156. return ur, nil
  157. }
  158. // UpdateRole - updates role template
  159. func UpdateRole(r models.UserRolePermissionTemplate) error {
  160. if r.ID.String() == "" {
  161. return errors.New("role id cannot be empty")
  162. }
  163. _, err := database.FetchRecord(database.USER_PERMISSIONS_TABLE_NAME, r.ID.String())
  164. if err != nil {
  165. return err
  166. }
  167. d, err := json.Marshal(r)
  168. if err != nil {
  169. return err
  170. }
  171. return database.Insert(r.ID.String(), string(d), database.USER_PERMISSIONS_TABLE_NAME)
  172. }
  173. // DeleteRole - deletes user role
  174. func DeleteRole(rid models.UserRole) error {
  175. if rid.String() == "" {
  176. return errors.New("role id cannot be empty")
  177. }
  178. users, err := GetUsersDB()
  179. if err != nil {
  180. return err
  181. }
  182. role, err := GetRole(rid)
  183. if err != nil {
  184. return err
  185. }
  186. if role.Default {
  187. return errors.New("cannot delete default role")
  188. }
  189. for _, user := range users {
  190. for userG := range user.UserGroups {
  191. ug, err := GetUserGroup(userG)
  192. if err == nil {
  193. if role.NetworkID != "" {
  194. for _, networkRoles := range ug.NetworkRoles {
  195. if _, ok := networkRoles[rid]; ok {
  196. err = errors.New("role cannot be deleted as active user groups are using this role")
  197. return err
  198. }
  199. }
  200. }
  201. }
  202. }
  203. if user.PlatformRoleID == rid {
  204. err = errors.New("active roles cannot be deleted.switch existing users to a new role before deleting")
  205. return err
  206. }
  207. for _, networkRoles := range user.NetworkRoles {
  208. if _, ok := networkRoles[rid]; ok {
  209. err = errors.New("active roles cannot be deleted.switch existing users to a new role before deleting")
  210. return err
  211. }
  212. }
  213. }
  214. return database.DeleteRecord(database.USER_PERMISSIONS_TABLE_NAME, rid.String())
  215. }
  216. func ValidateCreateGroupReq(g models.UserGroup) error {
  217. // check platform role is valid
  218. _, err := GetRole(g.PlatformRole)
  219. if err != nil {
  220. err = fmt.Errorf("invalid platform role")
  221. return err
  222. }
  223. // check if network roles are valid
  224. return nil
  225. }
  226. func ValidateUpdateGroupReq(g models.UserGroup) error {
  227. // check platform role is valid
  228. _, err := GetRole(g.PlatformRole)
  229. if err != nil {
  230. err = fmt.Errorf("invalid platform role")
  231. return err
  232. }
  233. for networkID := range g.NetworkRoles {
  234. userRolesMap := g.NetworkRoles[networkID]
  235. for roleID := range userRolesMap {
  236. _, err := GetRole(roleID)
  237. if err != nil {
  238. err = fmt.Errorf("invalid network role")
  239. return err
  240. }
  241. }
  242. }
  243. return nil
  244. }
  245. // CreateUserGroup - creates new user group
  246. func CreateUserGroup(g models.UserGroup) error {
  247. // check if role already exists
  248. if g.ID == "" {
  249. return errors.New("group id cannot be empty")
  250. }
  251. _, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, g.ID.String())
  252. if err == nil {
  253. return errors.New("group already exists")
  254. }
  255. d, err := json.Marshal(g)
  256. if err != nil {
  257. return err
  258. }
  259. return database.Insert(g.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  260. }
  261. // GetUserGroup - fetches user group
  262. func GetUserGroup(gid models.UserGroupID) (models.UserGroup, error) {
  263. d, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, gid.String())
  264. if err == nil {
  265. return models.UserGroup{}, err
  266. }
  267. var ug models.UserGroup
  268. err = json.Unmarshal([]byte(d), &ug)
  269. if err != nil {
  270. return ug, err
  271. }
  272. return ug, nil
  273. }
  274. // ListUserGroups - lists user groups
  275. func ListUserGroups() ([]models.UserGroup, error) {
  276. data, err := database.FetchRecords(database.USER_GROUPS_TABLE_NAME)
  277. if err != nil {
  278. return []models.UserGroup{}, err
  279. }
  280. userGroups := []models.UserGroup{}
  281. for _, dataI := range data {
  282. userGroup := models.UserGroup{}
  283. err := json.Unmarshal([]byte(dataI), &userGroup)
  284. if err != nil {
  285. continue
  286. }
  287. userGroups = append(userGroups, userGroup)
  288. }
  289. return userGroups, nil
  290. }
  291. // UpdateUserGroup - updates new user group
  292. func UpdateUserGroup(g models.UserGroup) error {
  293. // check if group exists
  294. if g.ID == "" {
  295. return errors.New("group id cannot be empty")
  296. }
  297. _, err := database.FetchRecord(database.USER_GROUPS_TABLE_NAME, g.ID.String())
  298. if err != nil {
  299. return err
  300. }
  301. d, err := json.Marshal(g)
  302. if err != nil {
  303. return err
  304. }
  305. return database.Insert(g.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)
  306. }
  307. // DeleteUserGroup - deletes user group
  308. func DeleteUserGroup(gid models.UserGroupID) error {
  309. users, err := GetUsersDB()
  310. if err != nil {
  311. return err
  312. }
  313. for _, user := range users {
  314. delete(user.UserGroups, gid)
  315. UpsertUser(user)
  316. }
  317. return database.DeleteRecord(database.USER_GROUPS_TABLE_NAME, gid.String())
  318. }
  319. func HasNetworkRsrcScope(permissionTemplate models.UserRolePermissionTemplate, netid string, rsrcType models.RsrcType, rsrcID models.RsrcID, op string) bool {
  320. if permissionTemplate.FullAccess {
  321. return true
  322. }
  323. rsrcScope, ok := permissionTemplate.NetworkLevelAccess[rsrcType]
  324. if !ok {
  325. return false
  326. }
  327. _, ok = rsrcScope[rsrcID]
  328. return ok
  329. }