mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-01 20:43:43 +01:00
9bc7b9e897
This PR implements the following posture checks: * Agent minimum version allowed * OS minimum version allowed * Geo-location based on connection IP For the geo-based location, we rely on GeoLite2 databases which are free IP geolocation databases. MaxMind was tested and we provide a script that easily allows to download of all necessary files, see infrastructure_files/download-geolite2.sh. The OpenAPI spec should extensively cover the life cycle of current version posture checks.
373 lines
10 KiB
Go
373 lines
10 KiB
Go
package http
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/gorilla/mux"
|
|
"github.com/rs/xid"
|
|
|
|
"github.com/netbirdio/netbird/management/server"
|
|
"github.com/netbirdio/netbird/management/server/http/api"
|
|
"github.com/netbirdio/netbird/management/server/http/util"
|
|
"github.com/netbirdio/netbird/management/server/jwtclaims"
|
|
"github.com/netbirdio/netbird/management/server/status"
|
|
)
|
|
|
|
// Policies is a handler that returns policy of the account
|
|
type Policies struct {
|
|
accountManager server.AccountManager
|
|
claimsExtractor *jwtclaims.ClaimsExtractor
|
|
}
|
|
|
|
// NewPoliciesHandler creates a new Policies handler
|
|
func NewPoliciesHandler(accountManager server.AccountManager, authCfg AuthCfg) *Policies {
|
|
return &Policies{
|
|
accountManager: accountManager,
|
|
claimsExtractor: jwtclaims.NewClaimsExtractor(
|
|
jwtclaims.WithAudience(authCfg.Audience),
|
|
jwtclaims.WithUserIDClaim(authCfg.UserIDClaim),
|
|
),
|
|
}
|
|
}
|
|
|
|
// GetAllPolicies list for the account
|
|
func (h *Policies) GetAllPolicies(w http.ResponseWriter, r *http.Request) {
|
|
claims := h.claimsExtractor.FromRequestContext(r)
|
|
account, user, err := h.accountManager.GetAccountFromToken(claims)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
accountPolicies, err := h.accountManager.ListPolicies(account.Id, user.Id)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
policies := []*api.Policy{}
|
|
for _, policy := range accountPolicies {
|
|
resp := toPolicyResponse(account, policy)
|
|
if len(resp.Rules) == 0 {
|
|
util.WriteError(status.Errorf(status.Internal, "no rules in the policy"), w)
|
|
return
|
|
}
|
|
policies = append(policies, resp)
|
|
}
|
|
|
|
util.WriteJSONObject(w, policies)
|
|
}
|
|
|
|
// UpdatePolicy handles update to a policy identified by a given ID
|
|
func (h *Policies) UpdatePolicy(w http.ResponseWriter, r *http.Request) {
|
|
claims := h.claimsExtractor.FromRequestContext(r)
|
|
account, user, err := h.accountManager.GetAccountFromToken(claims)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
vars := mux.Vars(r)
|
|
policyID := vars["policyId"]
|
|
if len(policyID) == 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid policy ID"), w)
|
|
return
|
|
}
|
|
|
|
policyIdx := -1
|
|
for i, policy := range account.Policies {
|
|
if policy.ID == policyID {
|
|
policyIdx = i
|
|
break
|
|
}
|
|
}
|
|
if policyIdx < 0 {
|
|
util.WriteError(status.Errorf(status.NotFound, "couldn't find policy id %s", policyID), w)
|
|
return
|
|
}
|
|
|
|
h.savePolicy(w, r, account, user, policyID)
|
|
}
|
|
|
|
// CreatePolicy handles policy creation request
|
|
func (h *Policies) CreatePolicy(w http.ResponseWriter, r *http.Request) {
|
|
claims := h.claimsExtractor.FromRequestContext(r)
|
|
account, user, err := h.accountManager.GetAccountFromToken(claims)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
h.savePolicy(w, r, account, user, "")
|
|
}
|
|
|
|
// savePolicy handles policy creation and update
|
|
func (h *Policies) savePolicy(
|
|
w http.ResponseWriter,
|
|
r *http.Request,
|
|
account *server.Account,
|
|
user *server.User,
|
|
policyID string,
|
|
) {
|
|
var req api.PutApiPoliciesPolicyIdJSONRequestBody
|
|
if err := json.NewDecoder(r.Body).Decode(&req); err != nil {
|
|
util.WriteErrorResponse("couldn't parse JSON request", http.StatusBadRequest, w)
|
|
return
|
|
}
|
|
|
|
if req.Name == "" {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "policy name shouldn't be empty"), w)
|
|
return
|
|
}
|
|
|
|
if len(req.Rules) == 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "policy rules shouldn't be empty"), w)
|
|
return
|
|
}
|
|
|
|
if policyID == "" {
|
|
policyID = xid.New().String()
|
|
}
|
|
|
|
policy := server.Policy{
|
|
ID: policyID,
|
|
Name: req.Name,
|
|
Enabled: req.Enabled,
|
|
Description: req.Description,
|
|
}
|
|
for _, r := range req.Rules {
|
|
pr := server.PolicyRule{
|
|
ID: policyID, //TODO: when policy can contain multiple rules, need refactor
|
|
Name: r.Name,
|
|
Destinations: groupMinimumsToStrings(account, r.Destinations),
|
|
Sources: groupMinimumsToStrings(account, r.Sources),
|
|
Bidirectional: r.Bidirectional,
|
|
}
|
|
|
|
pr.Enabled = r.Enabled
|
|
if r.Description != nil {
|
|
pr.Description = *r.Description
|
|
}
|
|
|
|
switch r.Action {
|
|
case api.PolicyRuleUpdateActionAccept:
|
|
pr.Action = server.PolicyTrafficActionAccept
|
|
case api.PolicyRuleUpdateActionDrop:
|
|
pr.Action = server.PolicyTrafficActionDrop
|
|
default:
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "unknown action type"), w)
|
|
return
|
|
}
|
|
|
|
switch r.Protocol {
|
|
case api.PolicyRuleUpdateProtocolAll:
|
|
pr.Protocol = server.PolicyRuleProtocolALL
|
|
case api.PolicyRuleUpdateProtocolTcp:
|
|
pr.Protocol = server.PolicyRuleProtocolTCP
|
|
case api.PolicyRuleUpdateProtocolUdp:
|
|
pr.Protocol = server.PolicyRuleProtocolUDP
|
|
case api.PolicyRuleUpdateProtocolIcmp:
|
|
pr.Protocol = server.PolicyRuleProtocolICMP
|
|
default:
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "unknown protocol type: %v", r.Protocol), w)
|
|
return
|
|
}
|
|
|
|
if r.Ports != nil && len(*r.Ports) != 0 {
|
|
for _, v := range *r.Ports {
|
|
if port, err := strconv.Atoi(v); err != nil || port < 1 || port > 65535 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "valid port value is in 1..65535 range"), w)
|
|
return
|
|
}
|
|
pr.Ports = append(pr.Ports, v)
|
|
}
|
|
}
|
|
|
|
// validate policy object
|
|
switch pr.Protocol {
|
|
case server.PolicyRuleProtocolALL, server.PolicyRuleProtocolICMP:
|
|
if len(pr.Ports) != 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "for ALL or ICMP protocol ports is not allowed"), w)
|
|
return
|
|
}
|
|
if !pr.Bidirectional {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "for ALL or ICMP protocol type flow can be only bi-directional"), w)
|
|
return
|
|
}
|
|
case server.PolicyRuleProtocolTCP, server.PolicyRuleProtocolUDP:
|
|
if !pr.Bidirectional && len(pr.Ports) == 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "for ALL or ICMP protocol type flow can be only bi-directional"), w)
|
|
return
|
|
}
|
|
}
|
|
|
|
policy.Rules = append(policy.Rules, &pr)
|
|
}
|
|
|
|
if req.SourcePostureChecks != nil {
|
|
policy.SourcePostureChecks = sourcePostureChecksToStrings(account, *req.SourcePostureChecks)
|
|
}
|
|
|
|
if err := h.accountManager.SavePolicy(account.Id, user.Id, &policy); err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
resp := toPolicyResponse(account, &policy)
|
|
if len(resp.Rules) == 0 {
|
|
util.WriteError(status.Errorf(status.Internal, "no rules in the policy"), w)
|
|
return
|
|
}
|
|
|
|
util.WriteJSONObject(w, resp)
|
|
}
|
|
|
|
// DeletePolicy handles policy deletion request
|
|
func (h *Policies) DeletePolicy(w http.ResponseWriter, r *http.Request) {
|
|
claims := h.claimsExtractor.FromRequestContext(r)
|
|
account, user, err := h.accountManager.GetAccountFromToken(claims)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
aID := account.Id
|
|
|
|
vars := mux.Vars(r)
|
|
policyID := vars["policyId"]
|
|
if len(policyID) == 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid policy ID"), w)
|
|
return
|
|
}
|
|
|
|
if err = h.accountManager.DeletePolicy(aID, policyID, user.Id); err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
util.WriteJSONObject(w, emptyObject{})
|
|
}
|
|
|
|
// GetPolicy handles a group Get request identified by ID
|
|
func (h *Policies) GetPolicy(w http.ResponseWriter, r *http.Request) {
|
|
claims := h.claimsExtractor.FromRequestContext(r)
|
|
account, user, err := h.accountManager.GetAccountFromToken(claims)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
switch r.Method {
|
|
case http.MethodGet:
|
|
vars := mux.Vars(r)
|
|
policyID := vars["policyId"]
|
|
if len(policyID) == 0 {
|
|
util.WriteError(status.Errorf(status.InvalidArgument, "invalid policy ID"), w)
|
|
return
|
|
}
|
|
|
|
policy, err := h.accountManager.GetPolicy(account.Id, policyID, user.Id)
|
|
if err != nil {
|
|
util.WriteError(err, w)
|
|
return
|
|
}
|
|
|
|
resp := toPolicyResponse(account, policy)
|
|
if len(resp.Rules) == 0 {
|
|
util.WriteError(status.Errorf(status.Internal, "no rules in the policy"), w)
|
|
return
|
|
}
|
|
|
|
util.WriteJSONObject(w, resp)
|
|
default:
|
|
util.WriteError(status.Errorf(status.NotFound, "method not found"), w)
|
|
}
|
|
}
|
|
|
|
func toPolicyResponse(account *server.Account, policy *server.Policy) *api.Policy {
|
|
cache := make(map[string]api.GroupMinimum)
|
|
ap := &api.Policy{
|
|
Id: &policy.ID,
|
|
Name: policy.Name,
|
|
Description: policy.Description,
|
|
Enabled: policy.Enabled,
|
|
SourcePostureChecks: policy.SourcePostureChecks,
|
|
}
|
|
for _, r := range policy.Rules {
|
|
rID := r.ID
|
|
rDescription := r.Description
|
|
rule := api.PolicyRule{
|
|
Id: &rID,
|
|
Name: r.Name,
|
|
Enabled: r.Enabled,
|
|
Description: &rDescription,
|
|
Bidirectional: r.Bidirectional,
|
|
Protocol: api.PolicyRuleProtocol(r.Protocol),
|
|
Action: api.PolicyRuleAction(r.Action),
|
|
}
|
|
if len(r.Ports) != 0 {
|
|
portsCopy := r.Ports
|
|
rule.Ports = &portsCopy
|
|
}
|
|
for _, gid := range r.Sources {
|
|
_, ok := cache[gid]
|
|
if ok {
|
|
continue
|
|
}
|
|
if group, ok := account.Groups[gid]; ok {
|
|
minimum := api.GroupMinimum{
|
|
Id: group.ID,
|
|
Name: group.Name,
|
|
PeersCount: len(group.Peers),
|
|
}
|
|
rule.Sources = append(rule.Sources, minimum)
|
|
cache[gid] = minimum
|
|
}
|
|
}
|
|
for _, gid := range r.Destinations {
|
|
cachedMinimum, ok := cache[gid]
|
|
if ok {
|
|
rule.Destinations = append(rule.Destinations, cachedMinimum)
|
|
continue
|
|
}
|
|
if group, ok := account.Groups[gid]; ok {
|
|
minimum := api.GroupMinimum{
|
|
Id: group.ID,
|
|
Name: group.Name,
|
|
PeersCount: len(group.Peers),
|
|
}
|
|
rule.Destinations = append(rule.Destinations, minimum)
|
|
cache[gid] = minimum
|
|
}
|
|
}
|
|
ap.Rules = append(ap.Rules, rule)
|
|
}
|
|
return ap
|
|
}
|
|
|
|
func groupMinimumsToStrings(account *server.Account, gm []string) []string {
|
|
result := make([]string, 0, len(gm))
|
|
for _, g := range gm {
|
|
if _, ok := account.Groups[g]; !ok {
|
|
continue
|
|
}
|
|
result = append(result, g)
|
|
}
|
|
return result
|
|
}
|
|
|
|
func sourcePostureChecksToStrings(account *server.Account, postureChecksIds []string) []string {
|
|
result := make([]string, 0, len(postureChecksIds))
|
|
for _, id := range postureChecksIds {
|
|
for _, postureCheck := range account.PostureChecks {
|
|
if id == postureCheck.ID {
|
|
result = append(result, id)
|
|
continue
|
|
}
|
|
}
|
|
|
|
}
|
|
return result
|
|
}
|