mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-02-18 00:17:39 +01:00
Remove ~900 lines of unused code identified by static analysis: Go: - internal/logging: Remove 10 unused functions (InitFromConfig, New, FromContext, WithLogger, etc.) that were built but never integrated - cmd/pulse-sensor-proxy: Remove 7 dead validation functions for a removed command execution feature - internal/metrics: Remove 8 unused notification metric functions and 10 Prometheus metrics that were never wired up Frontend: - Delete ActivationBanner.tsx stub component - Remove unused exports: stopMetricsSampler, getSamplerStatus, formatSpeedCompact, parseMetricKey, getResourceAlerts
498 lines
12 KiB
Go
498 lines
12 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"regexp"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/rs/zerolog/log"
|
|
)
|
|
|
|
var (
|
|
// nodeNameRegex validates node names (alphanumeric, dots, underscores, hyphens, 1-64 chars)
|
|
// Must not start with hyphen to prevent SSH option injection
|
|
nodeNameRegex = regexp.MustCompile(`^[a-zA-Z0-9][a-zA-Z0-9._-]{0,63}$`)
|
|
|
|
// ipv4Regex validates IPv4 addresses
|
|
ipv4Regex = regexp.MustCompile(`^(?:[0-9]{1,3}\.){3}[0-9]{1,3}$`)
|
|
)
|
|
|
|
// sanitizeCorrelationID validates and sanitizes a correlation ID
|
|
// Returns a valid UUID, generating a new one if input is missing or invalid
|
|
func sanitizeCorrelationID(id string) string {
|
|
if id == "" {
|
|
return uuid.NewString()
|
|
}
|
|
if _, err := uuid.Parse(id); err != nil {
|
|
return uuid.NewString()
|
|
}
|
|
return id
|
|
}
|
|
|
|
// validateNodeName checks if a node name is in valid format
|
|
func validateNodeName(name string) error {
|
|
if name == "" {
|
|
return fmt.Errorf("invalid node name")
|
|
}
|
|
|
|
if ipv4Regex.MatchString(name) {
|
|
return nil
|
|
}
|
|
|
|
candidate := name
|
|
if strings.HasPrefix(candidate, "[") && strings.HasSuffix(candidate, "]") {
|
|
candidate = candidate[1 : len(candidate)-1]
|
|
}
|
|
|
|
if ip := net.ParseIP(candidate); ip != nil {
|
|
return nil
|
|
}
|
|
|
|
if nodeNameRegex.MatchString(name) {
|
|
return nil
|
|
}
|
|
|
|
return fmt.Errorf("invalid node name")
|
|
}
|
|
|
|
const (
|
|
nodeValidatorCacheTTL = 5 * time.Minute
|
|
|
|
validationReasonNotAllowlisted = "node_not_allowlisted"
|
|
validationReasonNotClusterMember = "node_not_cluster_member"
|
|
validationReasonNoSources = "no_validation_sources"
|
|
validationReasonResolutionFailed = "allowlist_resolution_failed"
|
|
validationReasonClusterFailed = "cluster_query_failed"
|
|
)
|
|
|
|
// nodeValidator enforces node allow-list and cluster membership checks
|
|
type nodeValidator struct {
|
|
mu sync.RWMutex
|
|
allowHosts map[string]struct{}
|
|
allowCIDRs []*net.IPNet
|
|
hasAllowlist bool
|
|
strict bool
|
|
clusterEnabled bool
|
|
metrics *ProxyMetrics
|
|
resolver hostResolver
|
|
clusterFetcher func() ([]string, error)
|
|
cacheTTL time.Duration
|
|
clock func() time.Time
|
|
clusterCache clusterMembershipCache
|
|
}
|
|
|
|
type clusterMembershipCache struct {
|
|
mu sync.Mutex
|
|
expires time.Time
|
|
nodes map[string]struct{}
|
|
}
|
|
|
|
type hostResolver interface {
|
|
LookupIP(ctx context.Context, host string) ([]net.IP, error)
|
|
}
|
|
|
|
type defaultHostResolver struct{}
|
|
|
|
func (defaultHostResolver) LookupIP(ctx context.Context, host string) ([]net.IP, error) {
|
|
if ctx == nil {
|
|
ctx = context.Background()
|
|
}
|
|
results, err := net.DefaultResolver.LookupIPAddr(ctx, host)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(results) == 0 {
|
|
return nil, fmt.Errorf("no IPs resolved for %s", host)
|
|
}
|
|
|
|
ips := make([]net.IP, 0, len(results))
|
|
for _, addr := range results {
|
|
if addr.IP != nil {
|
|
ips = append(ips, addr.IP)
|
|
}
|
|
}
|
|
if len(ips) == 0 {
|
|
return nil, fmt.Errorf("no IP addresses resolved for %s", host)
|
|
}
|
|
|
|
return ips, nil
|
|
}
|
|
|
|
func newNodeValidator(cfg *Config, metrics *ProxyMetrics) (*nodeValidator, error) {
|
|
if cfg == nil {
|
|
return nil, errors.New("config is required for node validator")
|
|
}
|
|
|
|
v := &nodeValidator{
|
|
allowHosts: make(map[string]struct{}),
|
|
strict: cfg.StrictNodeValidation,
|
|
metrics: metrics,
|
|
resolver: defaultHostResolver{},
|
|
clusterFetcher: discoverClusterNodes,
|
|
cacheTTL: nodeValidatorCacheTTL,
|
|
clock: time.Now,
|
|
}
|
|
|
|
v.setAllowlist(cfg.AllowedNodes)
|
|
|
|
if v.hasAllowlist {
|
|
log.Info().
|
|
Int("allowed_node_count", len(v.allowHosts)).
|
|
Int("allowed_cidr_count", len(v.allowCIDRs)).
|
|
Msg("Node allow-list configured")
|
|
}
|
|
|
|
if !v.hasAllowlist && isProxmoxHost() {
|
|
v.clusterEnabled = true
|
|
log.Info().Msg("Node validator using Proxmox cluster membership (auto-detect)")
|
|
}
|
|
|
|
if !v.clusterEnabled {
|
|
v.clusterFetcher = nil
|
|
}
|
|
|
|
if !v.hasAllowlist && !v.clusterEnabled {
|
|
if v.strict {
|
|
log.Warn().Msg("strict_node_validation enabled but no allowlist or cluster context is available")
|
|
} else {
|
|
log.Warn().Msg("SECURITY: Node validator running in permissive mode (no allowlist or cluster context) - all nodes allowed. Configure allowed_nodes to restrict access.")
|
|
}
|
|
}
|
|
|
|
return v, nil
|
|
}
|
|
|
|
func (v *nodeValidator) setAllowlist(entries []string) {
|
|
v.allowHosts = make(map[string]struct{})
|
|
v.allowCIDRs = nil
|
|
|
|
for _, raw := range entries {
|
|
entry := strings.TrimSpace(raw)
|
|
if entry == "" {
|
|
continue
|
|
}
|
|
|
|
if _, network, err := net.ParseCIDR(entry); err == nil {
|
|
v.allowCIDRs = append(v.allowCIDRs, network)
|
|
continue
|
|
}
|
|
|
|
if normalized := normalizeAllowlistEntry(entry); normalized != "" {
|
|
v.allowHosts[normalized] = struct{}{}
|
|
}
|
|
}
|
|
|
|
v.hasAllowlist = len(v.allowHosts) > 0 || len(v.allowCIDRs) > 0
|
|
}
|
|
|
|
func (v *nodeValidator) UpdateAllowlist(entries []string) {
|
|
if v == nil {
|
|
return
|
|
}
|
|
|
|
v.mu.Lock()
|
|
v.setAllowlist(entries)
|
|
hasAllowlist := v.hasAllowlist
|
|
hosts := len(v.allowHosts)
|
|
cidrs := len(v.allowCIDRs)
|
|
v.mu.Unlock()
|
|
|
|
if hasAllowlist {
|
|
log.Info().
|
|
Int("allowed_node_count", hosts).
|
|
Int("allowed_cidr_count", cidrs).
|
|
Msg("Updated node allow-list from control plane")
|
|
} else {
|
|
log.Warn().Msg("Control plane allow-list update produced empty set")
|
|
}
|
|
}
|
|
|
|
// Validate ensures the provided node is authorized before any SSH is attempted.
|
|
func (v *nodeValidator) Validate(ctx context.Context, node string) error {
|
|
if v == nil {
|
|
return nil
|
|
}
|
|
|
|
v.mu.RLock()
|
|
hasAllowlist := v.hasAllowlist
|
|
clusterEnabled := v.clusterEnabled
|
|
v.mu.RUnlock()
|
|
|
|
if ctx == nil {
|
|
ctx = context.Background()
|
|
}
|
|
|
|
if hasAllowlist {
|
|
allowed, err := v.matchesAllowlist(ctx, node)
|
|
if err != nil {
|
|
v.recordFailure(validationReasonResolutionFailed)
|
|
log.Warn().Err(err).Str("node", node).Msg("Node allow-list resolution failed")
|
|
return err
|
|
}
|
|
if !allowed {
|
|
return v.deny(node, validationReasonNotAllowlisted)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if clusterEnabled {
|
|
allowed, err := v.matchesCluster(ctx, node)
|
|
if err != nil {
|
|
// Cluster query failed (e.g., IPC permission denied, running in LXC)
|
|
// Fall back to localhost-only validation instead of permissive mode
|
|
v.recordFailure(validationReasonClusterFailed)
|
|
log.Warn().
|
|
Err(err).
|
|
Str("node", node).
|
|
Msg("SECURITY: Cluster validation unavailable - falling back to localhost-only validation. Configure allowed_nodes for cluster-wide access.")
|
|
// Attempt to validate against localhost addresses
|
|
return v.validateAsLocalhost(ctx, node)
|
|
} else if !allowed {
|
|
return v.deny(node, validationReasonNotClusterMember)
|
|
} else {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
if v.strict {
|
|
return v.deny(node, validationReasonNoSources)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (v *nodeValidator) validateAsLocalhost(_ context.Context, node string) error {
|
|
// When cluster validation is unavailable, only allow access to localhost
|
|
// This maintains security while allowing self-monitoring
|
|
|
|
// Try to discover local host addresses
|
|
localAddrs, err := discoverLocalHostAddresses()
|
|
if err != nil {
|
|
log.Warn().Err(err).Msg("Failed to discover local host addresses for fallback validation")
|
|
// If we can't even discover localhost, deny access
|
|
return v.deny(node, validationReasonClusterFailed)
|
|
}
|
|
|
|
// Check if the requested node matches any local address
|
|
normalized := normalizeAllowlistEntry(node)
|
|
if normalized == "" {
|
|
normalized = strings.ToLower(strings.TrimSpace(node))
|
|
}
|
|
|
|
for _, localAddr := range localAddrs {
|
|
if strings.EqualFold(localAddr, normalized) {
|
|
log.Debug().
|
|
Str("node", node).
|
|
Str("matched_local", localAddr).
|
|
Msg("Node validated as localhost (cluster validation unavailable)")
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// Node doesn't match any local address - deny
|
|
return v.deny(node, "node_not_localhost")
|
|
}
|
|
|
|
func (v *nodeValidator) matchesAllowlist(ctx context.Context, node string) (bool, error) {
|
|
v.mu.RLock()
|
|
allowHosts := v.allowHosts
|
|
allowCIDRs := v.allowCIDRs
|
|
resolver := v.resolver
|
|
v.mu.RUnlock()
|
|
|
|
normalized := normalizeAllowlistEntry(node)
|
|
if normalized != "" {
|
|
if _, ok := allowHosts[normalized]; ok {
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
if ip := parseNodeIP(node); ip != nil {
|
|
if ipAllowed(ip, allowHosts, allowCIDRs) {
|
|
return true, nil
|
|
}
|
|
// If the node itself is an IP and it didn't match, no need to resolve again.
|
|
return false, nil
|
|
}
|
|
|
|
if len(allowCIDRs) == 0 {
|
|
return false, nil
|
|
}
|
|
|
|
host := stripNodeDelimiters(node)
|
|
ips, err := resolver.LookupIP(ctx, host)
|
|
if err != nil {
|
|
return false, fmt.Errorf("resolve node %q: %w", host, err)
|
|
}
|
|
|
|
for _, ip := range ips {
|
|
if ipAllowed(ip, allowHosts, allowCIDRs) {
|
|
return true, nil
|
|
}
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
func (v *nodeValidator) matchesCluster(ctx context.Context, node string) (bool, error) {
|
|
if v.clusterFetcher == nil {
|
|
return false, errors.New("cluster membership disabled")
|
|
}
|
|
|
|
if ctx == nil {
|
|
ctx = context.Background()
|
|
}
|
|
|
|
members, err := v.getClusterMembers(ctx)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
normalized := normalizeAllowlistEntry(node)
|
|
if normalized == "" {
|
|
normalized = strings.ToLower(strings.TrimSpace(node))
|
|
}
|
|
|
|
_, ok := members[normalized]
|
|
return ok, nil
|
|
}
|
|
|
|
func (v *nodeValidator) getClusterMembers(ctx context.Context) (map[string]struct{}, error) {
|
|
if ctx == nil {
|
|
ctx = context.Background()
|
|
}
|
|
|
|
now := time.Now()
|
|
if v.clock != nil {
|
|
now = v.clock()
|
|
}
|
|
|
|
v.clusterCache.mu.Lock()
|
|
defer v.clusterCache.mu.Unlock()
|
|
|
|
if v.clusterCache.nodes != nil && now.Before(v.clusterCache.expires) {
|
|
return v.clusterCache.nodes, nil
|
|
}
|
|
|
|
nodes, err := v.clusterFetcher()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
result := make(map[string]struct{}, len(nodes))
|
|
resolvedHosts := make(map[string]struct{})
|
|
for _, node := range nodes {
|
|
if normalized := normalizeAllowlistEntry(node); normalized != "" {
|
|
result[normalized] = struct{}{}
|
|
}
|
|
|
|
host := stripNodeDelimiters(strings.TrimSpace(node))
|
|
if host == "" {
|
|
continue
|
|
}
|
|
|
|
if net.ParseIP(host) != nil {
|
|
continue
|
|
}
|
|
|
|
if _, seen := resolvedHosts[host]; seen {
|
|
continue
|
|
}
|
|
resolvedHosts[host] = struct{}{}
|
|
|
|
if v.resolver == nil {
|
|
continue
|
|
}
|
|
|
|
ips, err := v.resolver.LookupIP(ctx, host)
|
|
if err != nil {
|
|
log.Debug().
|
|
Str("host", host).
|
|
Err(err).
|
|
Msg("Failed to resolve cluster node hostname to IP")
|
|
continue
|
|
}
|
|
|
|
for _, ip := range ips {
|
|
if ip == nil {
|
|
continue
|
|
}
|
|
result[ip.String()] = struct{}{}
|
|
}
|
|
}
|
|
|
|
ttl := v.cacheTTL
|
|
if ttl <= 0 {
|
|
ttl = nodeValidatorCacheTTL
|
|
}
|
|
v.clusterCache.nodes = result
|
|
v.clusterCache.expires = now.Add(ttl)
|
|
log.Debug().
|
|
Int("cluster_node_count", len(result)).
|
|
Msg("Refreshed cluster membership cache")
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func ipAllowed(ip net.IP, hosts map[string]struct{}, cidrs []*net.IPNet) bool {
|
|
if ip == nil {
|
|
return false
|
|
}
|
|
if hosts != nil {
|
|
if _, ok := hosts[ip.String()]; ok {
|
|
return true
|
|
}
|
|
}
|
|
for _, network := range cidrs {
|
|
if network.Contains(ip) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (v *nodeValidator) recordFailure(reason string) {
|
|
if v.metrics != nil {
|
|
v.metrics.recordNodeValidationFailure(reason)
|
|
}
|
|
}
|
|
|
|
func (v *nodeValidator) deny(node, reason string) error {
|
|
v.recordFailure(reason)
|
|
log.Warn().
|
|
Str("node", node).
|
|
Str("reason", reason).
|
|
Msg("potential SSRF attempt blocked")
|
|
return fmt.Errorf("node %q rejected by validator (%s)", node, reason)
|
|
}
|
|
|
|
func normalizeAllowlistEntry(entry string) string {
|
|
candidate := strings.TrimSpace(entry)
|
|
if candidate == "" {
|
|
return ""
|
|
}
|
|
unwrapped := stripNodeDelimiters(candidate)
|
|
if ip := net.ParseIP(unwrapped); ip != nil {
|
|
return ip.String()
|
|
}
|
|
return strings.ToLower(candidate)
|
|
}
|
|
|
|
func parseNodeIP(node string) net.IP {
|
|
clean := stripNodeDelimiters(strings.TrimSpace(node))
|
|
return net.ParseIP(clean)
|
|
}
|
|
|
|
func stripNodeDelimiters(node string) string {
|
|
if strings.HasPrefix(node, "[") && strings.HasSuffix(node, "]") && len(node) > 2 {
|
|
return node[1 : len(node)-1]
|
|
}
|
|
return node
|
|
}
|