225 lines
5.4 KiB
Go
225 lines
5.4 KiB
Go
package apiclient
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
|
|
"github.com/crowdsecurity/crowdsec/pkg/models"
|
|
)
|
|
|
|
var (
|
|
InsecureSkipVerify = false
|
|
Cert *tls.Certificate
|
|
CaCertPool *x509.CertPool
|
|
)
|
|
|
|
type ApiClient struct {
|
|
/*The http client used to make requests*/
|
|
client *http.Client
|
|
/*Reuse a single struct instead of allocating one for each service on the heap.*/
|
|
common service
|
|
/*config stuff*/
|
|
BaseURL *url.URL
|
|
PapiURL *url.URL
|
|
URLPrefix string
|
|
UserAgent string
|
|
/*exposed Services*/
|
|
Decisions *DecisionsService
|
|
DecisionDelete *DecisionDeleteService
|
|
Alerts *AlertsService
|
|
Auth *AuthService
|
|
Metrics *MetricsService
|
|
Signal *SignalService
|
|
HeartBeat *HeartBeatService
|
|
}
|
|
|
|
func (a *ApiClient) GetClient() *http.Client {
|
|
return a.client
|
|
}
|
|
|
|
func (a *ApiClient) IsEnrolled() bool {
|
|
jwtTransport := a.client.Transport.(*JWTTransport)
|
|
tokenStr := jwtTransport.Token
|
|
|
|
token, _ := jwt.Parse(tokenStr, nil)
|
|
if token == nil {
|
|
return false
|
|
}
|
|
|
|
claims := token.Claims.(jwt.MapClaims)
|
|
_, ok := claims["organization_id"]
|
|
|
|
return ok
|
|
}
|
|
|
|
type service struct {
|
|
client *ApiClient
|
|
}
|
|
|
|
func NewClient(config *Config) (*ApiClient, error) {
|
|
t := &JWTTransport{
|
|
MachineID: &config.MachineID,
|
|
Password: &config.Password,
|
|
Scenarios: config.Scenarios,
|
|
UserAgent: config.UserAgent,
|
|
VersionPrefix: config.VersionPrefix,
|
|
UpdateScenario: config.UpdateScenario,
|
|
}
|
|
|
|
transport, baseURL := createTransport(config.URL)
|
|
if transport != nil {
|
|
t.Transport = transport
|
|
}
|
|
|
|
t.URL = baseURL
|
|
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
tlsconfig.RootCAs = CaCertPool
|
|
|
|
if Cert != nil {
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
if ht, ok := http.DefaultTransport.(*http.Transport); ok {
|
|
ht.TLSClientConfig = &tlsconfig
|
|
}
|
|
|
|
c := &ApiClient{client: t.Client(), BaseURL: baseURL, UserAgent: config.UserAgent, URLPrefix: config.VersionPrefix, PapiURL: config.PapiURL}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
c.Metrics = (*MetricsService)(&c.common)
|
|
c.Signal = (*SignalService)(&c.common)
|
|
c.DecisionDelete = (*DecisionDeleteService)(&c.common)
|
|
c.HeartBeat = (*HeartBeatService)(&c.common)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func NewDefaultClient(URL *url.URL, prefix string, userAgent string, client *http.Client) (*ApiClient, error) {
|
|
transport, baseURL := createTransport(URL)
|
|
|
|
if client == nil {
|
|
client = &http.Client{}
|
|
|
|
if transport != nil {
|
|
client.Transport = transport
|
|
} else {
|
|
if ht, ok := http.DefaultTransport.(*http.Transport); ok {
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
tlsconfig.RootCAs = CaCertPool
|
|
|
|
if Cert != nil {
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
ht.TLSClientConfig = &tlsconfig
|
|
client.Transport = ht
|
|
}
|
|
}
|
|
}
|
|
|
|
c := &ApiClient{client: client, BaseURL: baseURL, UserAgent: userAgent, URLPrefix: prefix}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
c.Metrics = (*MetricsService)(&c.common)
|
|
c.Signal = (*SignalService)(&c.common)
|
|
c.DecisionDelete = (*DecisionDeleteService)(&c.common)
|
|
c.HeartBeat = (*HeartBeatService)(&c.common)
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func RegisterClient(config *Config, client *http.Client) (*ApiClient, error) {
|
|
transport, baseURL := createTransport(config.URL)
|
|
|
|
if client == nil {
|
|
client = &http.Client{}
|
|
if transport != nil {
|
|
client.Transport = transport
|
|
} else {
|
|
tlsconfig := tls.Config{InsecureSkipVerify: InsecureSkipVerify}
|
|
if Cert != nil {
|
|
tlsconfig.RootCAs = CaCertPool
|
|
tlsconfig.Certificates = []tls.Certificate{*Cert}
|
|
}
|
|
|
|
http.DefaultTransport.(*http.Transport).TLSClientConfig = &tlsconfig
|
|
}
|
|
} else if client.Transport == nil && transport != nil {
|
|
client.Transport = transport
|
|
}
|
|
|
|
c := &ApiClient{client: client, BaseURL: baseURL, UserAgent: config.UserAgent, URLPrefix: config.VersionPrefix}
|
|
c.common.client = c
|
|
c.Decisions = (*DecisionsService)(&c.common)
|
|
c.Alerts = (*AlertsService)(&c.common)
|
|
c.Auth = (*AuthService)(&c.common)
|
|
|
|
resp, err := c.Auth.RegisterWatcher(context.Background(), models.WatcherRegistrationRequest{MachineID: &config.MachineID, Password: &config.Password})
|
|
/*if we have http status, return it*/
|
|
if err != nil {
|
|
if resp != nil && resp.Response != nil {
|
|
return nil, fmt.Errorf("api register (%s) http %s: %w", c.BaseURL, resp.Response.Status, err)
|
|
}
|
|
|
|
return nil, fmt.Errorf("api register (%s): %w", c.BaseURL, err)
|
|
}
|
|
|
|
return c, nil
|
|
}
|
|
|
|
func createTransport(url *url.URL) (*http.Transport, *url.URL) {
|
|
urlString := url.String()
|
|
|
|
// TCP transport
|
|
if !strings.HasPrefix(urlString, "/") {
|
|
return nil, url
|
|
}
|
|
|
|
// Unix transport
|
|
url.Path = "/"
|
|
url.Host = "unix"
|
|
url.Scheme = "http"
|
|
|
|
return &http.Transport{
|
|
DialContext: func(_ context.Context, _, _ string) (net.Conn, error) {
|
|
return net.Dial("unix", strings.TrimSuffix(urlString, "/"))
|
|
},
|
|
}, url
|
|
}
|
|
|
|
type Response struct {
|
|
Response *http.Response
|
|
// add our pagination stuff
|
|
// NextPage int
|
|
// ...
|
|
}
|
|
|
|
func newResponse(r *http.Response) *Response {
|
|
return &Response{Response: r}
|
|
}
|
|
|
|
type ListOpts struct {
|
|
// Page int
|
|
// PerPage int
|
|
}
|
|
|
|
type DeleteOpts struct {
|
|
// ??
|
|
}
|
|
|
|
type AddOpts struct {
|
|
// ??
|
|
}
|