acls.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "net/url"
  7. "time"
  8. "github.com/google/uuid"
  9. "github.com/gorilla/mux"
  10. "github.com/gravitl/netmaker/logger"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. "github.com/gravitl/netmaker/mq"
  14. )
  15. func aclHandlers(r *mux.Router) {
  16. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(getAcls))).
  17. Methods(http.MethodGet)
  18. r.HandleFunc("/api/v1/acls/policy_types", logic.SecurityCheck(true, http.HandlerFunc(aclPolicyTypes))).
  19. Methods(http.MethodGet)
  20. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(createAcl))).
  21. Methods(http.MethodPost)
  22. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(updateAcl))).
  23. Methods(http.MethodPut)
  24. r.HandleFunc("/api/v1/acls", logic.SecurityCheck(true, http.HandlerFunc(deleteAcl))).
  25. Methods(http.MethodDelete)
  26. r.HandleFunc("/api/v1/acls/debug", logic.SecurityCheck(true, http.HandlerFunc(aclDebug))).
  27. Methods(http.MethodGet)
  28. }
  29. // @Summary List Acl Policy types
  30. // @Router /api/v1/acls/policy_types [get]
  31. // @Tags ACL
  32. // @Accept json
  33. // @Success 200 {array} models.SuccessResponse
  34. // @Failure 500 {object} models.ErrorResponse
  35. func aclPolicyTypes(w http.ResponseWriter, r *http.Request) {
  36. resp := models.AclPolicyTypes{
  37. RuleTypes: []models.AclPolicyType{
  38. models.DevicePolicy,
  39. models.UserPolicy,
  40. },
  41. SrcGroupTypes: []models.AclGroupType{
  42. models.UserAclID,
  43. models.UserGroupAclID,
  44. models.DeviceAclID,
  45. },
  46. DstGroupTypes: []models.AclGroupType{
  47. models.DeviceAclID,
  48. // models.NetmakerIPAclID,
  49. // models.NetmakerSubNetRangeAClID,
  50. },
  51. }
  52. logic.ReturnSuccessResponseWithJson(w, r, resp, "fetched acls types")
  53. }
  54. func aclDebug(w http.ResponseWriter, r *http.Request) {
  55. nodeID, _ := url.QueryUnescape(r.URL.Query().Get("node"))
  56. peerID, _ := url.QueryUnescape(r.URL.Query().Get("peer"))
  57. node, err := logic.GetNodeByID(nodeID)
  58. if err != nil {
  59. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  60. return
  61. }
  62. peer, err := logic.GetNodeByID(peerID)
  63. if err != nil {
  64. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  65. return
  66. }
  67. allowed := logic.IsNodeAllowedToCommunicate(node, peer)
  68. logic.ReturnSuccessResponseWithJson(w, r, allowed, "fetched all acls in the network ")
  69. }
  70. // @Summary List Acls in a network
  71. // @Router /api/v1/acls [get]
  72. // @Tags ACL
  73. // @Accept json
  74. // @Success 200 {array} models.SuccessResponse
  75. // @Failure 500 {object} models.ErrorResponse
  76. func getAcls(w http.ResponseWriter, r *http.Request) {
  77. netID := r.URL.Query().Get("network")
  78. if netID == "" {
  79. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("network id param is missing"), "badrequest"))
  80. return
  81. }
  82. // check if network exists
  83. _, err := logic.GetNetwork(netID)
  84. if err != nil {
  85. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  86. return
  87. }
  88. acls, err := logic.ListAcls(models.NetworkID(netID))
  89. if err != nil {
  90. logger.Log(0, r.Header.Get("user"), "failed to get all network acl entries: ", err.Error())
  91. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  92. return
  93. }
  94. logic.SortAclEntrys(acls[:])
  95. logic.ReturnSuccessResponseWithJson(w, r, acls, "fetched all acls in the network "+netID)
  96. }
  97. // @Summary Create Acl
  98. // @Router /api/v1/acls [post]
  99. // @Tags ACL
  100. // @Accept json
  101. // @Success 200 {array} models.SuccessResponse
  102. // @Failure 500 {object} models.ErrorResponse
  103. func createAcl(w http.ResponseWriter, r *http.Request) {
  104. var req models.Acl
  105. err := json.NewDecoder(r.Body).Decode(&req)
  106. if err != nil {
  107. logger.Log(0, "error decoding request body: ",
  108. err.Error())
  109. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  110. return
  111. }
  112. user, err := logic.GetUser(r.Header.Get("user"))
  113. if err != nil {
  114. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  115. return
  116. }
  117. err = logic.ValidateCreateAclReq(req)
  118. if err != nil {
  119. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  120. return
  121. }
  122. acl := req
  123. acl.ID = uuid.New().String()
  124. acl.CreatedBy = user.UserName
  125. acl.CreatedAt = time.Now().UTC()
  126. acl.Default = false
  127. if acl.RuleType == models.DevicePolicy {
  128. acl.AllowedDirection = models.TrafficDirectionBi
  129. } else {
  130. acl.AllowedDirection = models.TrafficDirectionUni
  131. }
  132. // validate create acl policy
  133. if !logic.IsAclPolicyValid(acl) {
  134. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  135. return
  136. }
  137. err = logic.InsertAcl(acl)
  138. if err != nil {
  139. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  140. return
  141. }
  142. acl, err = logic.GetAcl(acl.ID)
  143. if err != nil {
  144. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "internal"))
  145. return
  146. }
  147. go mq.PublishPeerUpdate(false)
  148. logic.ReturnSuccessResponseWithJson(w, r, acl, "created acl successfully")
  149. }
  150. // @Summary Update Acl
  151. // @Router /api/v1/acls [put]
  152. // @Tags ACL
  153. // @Accept json
  154. // @Success 200 {array} models.SuccessResponse
  155. // @Failure 500 {object} models.ErrorResponse
  156. func updateAcl(w http.ResponseWriter, r *http.Request) {
  157. var updateAcl models.UpdateAclRequest
  158. err := json.NewDecoder(r.Body).Decode(&updateAcl)
  159. if err != nil {
  160. logger.Log(0, "error decoding request body: ",
  161. err.Error())
  162. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  163. return
  164. }
  165. acl, err := logic.GetAcl(updateAcl.ID)
  166. if err != nil {
  167. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  168. return
  169. }
  170. if !logic.IsAclPolicyValid(updateAcl.Acl) {
  171. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy"), "badrequest"))
  172. return
  173. }
  174. if updateAcl.Acl.NetworkID != acl.NetworkID {
  175. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("invalid policy, network id mismatch"), "badrequest"))
  176. return
  177. }
  178. if !acl.Default && updateAcl.NewName != "" {
  179. //check if policy exists with same name
  180. updateAcl.Acl.Name = updateAcl.NewName
  181. }
  182. err = logic.UpdateAcl(updateAcl.Acl, acl)
  183. if err != nil {
  184. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  185. return
  186. }
  187. go mq.PublishPeerUpdate(false)
  188. logic.ReturnSuccessResponse(w, r, "updated acl "+acl.Name)
  189. }
  190. // @Summary Delete Acl
  191. // @Router /api/v1/acls [delete]
  192. // @Tags ACL
  193. // @Accept json
  194. // @Success 200 {array} models.SuccessResponse
  195. // @Failure 500 {object} models.ErrorResponse
  196. func deleteAcl(w http.ResponseWriter, r *http.Request) {
  197. aclID, _ := url.QueryUnescape(r.URL.Query().Get("acl_id"))
  198. if aclID == "" {
  199. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("acl id is required"), "badrequest"))
  200. return
  201. }
  202. acl, err := logic.GetAcl(aclID)
  203. if err != nil {
  204. logic.ReturnErrorResponse(w, r, logic.FormatError(err, "badrequest"))
  205. return
  206. }
  207. if acl.Default {
  208. logic.ReturnErrorResponse(w, r, logic.FormatError(errors.New("cannot delete default policy"), "badrequest"))
  209. return
  210. }
  211. err = logic.DeleteAcl(acl)
  212. if err != nil {
  213. logic.ReturnErrorResponse(w, r,
  214. logic.FormatError(errors.New("cannot delete default policy"), "internal"))
  215. return
  216. }
  217. go mq.PublishPeerUpdate(false)
  218. logic.ReturnSuccessResponse(w, r, "deleted acl "+acl.Name)
  219. }