|
| 1 | +package data |
| 2 | + |
| 3 | +import ( |
| 4 | + "context" |
| 5 | + "encoding/json" |
| 6 | + "errors" |
| 7 | + "fmt" |
| 8 | + |
| 9 | + "github.com/NHAS/wag/internal/acls" |
| 10 | + "github.com/NHAS/wag/internal/config" |
| 11 | + clientv3 "go.etcd.io/etcd/client/v3" |
| 12 | +) |
| 13 | + |
| 14 | +func SetAcl(effects string, policy acls.Acl, overwrite bool) error { |
| 15 | + |
| 16 | + response, err := etcd.Get(context.Background(), "wag-acls-"+effects) |
| 17 | + if err != nil { |
| 18 | + return err |
| 19 | + } |
| 20 | + |
| 21 | + if len(response.Kvs) > 0 && !overwrite { |
| 22 | + return errors.New("acl already exists") |
| 23 | + } |
| 24 | + |
| 25 | + policyJson, _ := json.Marshal(policy) |
| 26 | + |
| 27 | + _, err = etcd.Put(context.Background(), "wag-acls-"+effects, string(policyJson)) |
| 28 | + |
| 29 | + return err |
| 30 | +} |
| 31 | + |
| 32 | +func RemoveAcl(effects string) error { |
| 33 | + _, err := etcd.Delete(context.Background(), "wag-acls-"+effects) |
| 34 | + return err |
| 35 | +} |
| 36 | + |
| 37 | +func GetEffectiveAcl(username string) acls.Acl { |
| 38 | + var resultingACLs acls.Acl |
| 39 | + //Add the server address by default |
| 40 | + resultingACLs.Allow = []string{config.Values().Wireguard.ServerAddress.String() + "/32"} |
| 41 | + |
| 42 | + // Add dns servers if defined |
| 43 | + // Make sure we resolve the dns servers in case someone added them as domains, so that clients dont get stuck trying to use the domain dns servers to look up the dns servers |
| 44 | + // Restrict dns servers to only having 53/any by default as per #49 |
| 45 | + for _, server := range config.Values().Wireguard.DNS { |
| 46 | + resultingACLs.Allow = append(resultingACLs.Allow, fmt.Sprintf("%s 53/any", server)) |
| 47 | + } |
| 48 | + |
| 49 | + txn := etcd.Txn(context.Background()) |
| 50 | + txn.Then(clientv3.OpGet("wag-acls-*"), clientv3.OpGet("wag-acls-"+username), clientv3.OpGet("wag-membership")) |
| 51 | + resp, err := txn.Commit() |
| 52 | + if err != nil { |
| 53 | + return acls.Acl{} |
| 54 | + } |
| 55 | + |
| 56 | + // the default policy contents |
| 57 | + if resp.Responses[0].GetResponseRange().GetCount() != 0 { |
| 58 | + var acl acls.Acl |
| 59 | + |
| 60 | + err := json.Unmarshal(resp.Responses[0].GetResponseRange().Kvs[0].Value, &acl) |
| 61 | + if err == nil { |
| 62 | + resultingACLs.Allow = append(resultingACLs.Allow, acl.Allow...) |
| 63 | + resultingACLs.Mfa = append(resultingACLs.Mfa, acl.Mfa...) |
| 64 | + } |
| 65 | + } |
| 66 | + |
| 67 | + // User specific acls |
| 68 | + if resp.Responses[1].GetResponseRange().GetCount() != 0 { |
| 69 | + var acl acls.Acl |
| 70 | + |
| 71 | + err := json.Unmarshal(resp.Responses[1].GetResponseRange().Kvs[0].Value, &acl) |
| 72 | + if err == nil { |
| 73 | + resultingACLs.Allow = append(resultingACLs.Allow, acl.Allow...) |
| 74 | + resultingACLs.Mfa = append(resultingACLs.Mfa, acl.Mfa...) |
| 75 | + } |
| 76 | + } |
| 77 | + |
| 78 | + // Membership map for finding all the other policies |
| 79 | + if resp.Responses[2].GetResponseRange().GetCount() != 0 { |
| 80 | + var rGroupLookup map[string]map[string]bool |
| 81 | + |
| 82 | + err = json.Unmarshal(resp.Responses[2].GetResponseRange().Kvs[0].Value, &rGroupLookup) |
| 83 | + if err == nil { |
| 84 | + |
| 85 | + txn := etcd.Txn(context.Background()) |
| 86 | + |
| 87 | + //If the user belongs to a series of groups, grab those, and add their rules |
| 88 | + var ops []clientv3.Op |
| 89 | + for group := range rGroupLookup[username] { |
| 90 | + ops = append(ops, clientv3.OpGet("wag-acls-"+group)) |
| 91 | + } |
| 92 | + |
| 93 | + resp, err := txn.Then(ops...).Commit() |
| 94 | + if err != nil { |
| 95 | + return acls.Acl{} |
| 96 | + } |
| 97 | + |
| 98 | + for m := range resp.Responses { |
| 99 | + r := resp.Responses[m].GetResponseRange() |
| 100 | + if r.Count > 0 { |
| 101 | + |
| 102 | + var acl acls.Acl |
| 103 | + |
| 104 | + err := json.Unmarshal(r.Kvs[0].Value, &acl) |
| 105 | + if err != nil { |
| 106 | + continue |
| 107 | + } |
| 108 | + |
| 109 | + resultingACLs.Allow = append(resultingACLs.Allow, acl.Allow...) |
| 110 | + resultingACLs.Mfa = append(resultingACLs.Mfa, acl.Mfa...) |
| 111 | + } |
| 112 | + } |
| 113 | + |
| 114 | + } |
| 115 | + } |
| 116 | + |
| 117 | + return resultingACLs |
| 118 | +} |
0 commit comments