mirror of
https://github.com/fleetdm/fleet
synced 2026-05-18 22:49:19 +00:00
<!-- Add the related story/sub-task/bug number, like Resolves #123, or remove if NA --> **Related issue:** Resolves #33699 Enqueues and kicks off installation process for iOS and iPadOS apps marked for installation during setup Changes file already added during earlier work ont his feature # Checklist for submitter If some of the following don't apply, delete the relevant line. - [x] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files) for more information. - [x] Input data is properly validated, `SELECT *` is avoided, SQL injection is prevented (using placeholders for values in statements) - [x] If paths of existing endpoints are modified without backwards compatibility, checked the frontend/CLI for any necessary changes ## Testing - [x] Added/updated automated tests - [x] Where appropriate, [automated tests simulate multiple hosts and test for host isolation](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/reference/patterns-backend.md#unit-testing) (updates to one hosts's records do not affect another) - [x] QA'd all new/changed functionality manually
368 lines
11 KiB
Go
368 lines
11 KiB
Go
package mdmlifecycle
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/fleetdm/fleet/v4/server/contexts/ctxerr"
|
|
"github.com/fleetdm/fleet/v4/server/contexts/license"
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
|
"github.com/fleetdm/fleet/v4/server/mdm/nanomdm/mdm"
|
|
"github.com/fleetdm/fleet/v4/server/worker"
|
|
kitlog "github.com/go-kit/log"
|
|
"github.com/go-kit/log/level"
|
|
)
|
|
|
|
// HostAction is a supported MDM lifecycle action that can be performed on a
|
|
// host.
|
|
type HostAction string
|
|
|
|
// TODO: we're hooking into the reset step for processing related to mdm idp accounts, but should
|
|
// consider if we need to do anything in the turn-on step or other lifecycle steps
|
|
const (
|
|
// HostActionTurnOn performs tasks right after a host turns on MDM.
|
|
HostActionTurnOn HostAction = "turn-on"
|
|
// HostActionTurnOff performs tasks right after a host turns off MDM.
|
|
HostActionTurnOff HostAction = "turn-off"
|
|
// HostActionReset performs tasks to reset mdm-related information.
|
|
HostActionReset HostAction = "reset"
|
|
// HostActionDelete performs tasks to cleanup MDM information when a
|
|
// host is deleted from fleet.
|
|
HostActionDelete HostAction = "delete"
|
|
)
|
|
|
|
// HostOptions are the options that can be provided for an action.
|
|
//
|
|
// Not all options are required for all actions, each individual action should
|
|
// validate that it receives the required information.
|
|
type HostOptions struct {
|
|
Action HostAction
|
|
Platform string
|
|
UUID string
|
|
UserEnrollmentID string
|
|
HardwareSerial string
|
|
HardwareModel string
|
|
EnrollReference string
|
|
Host *fleet.Host
|
|
HasSetupExperienceItems bool
|
|
SCEPRenewalInProgress bool
|
|
}
|
|
|
|
// HostLifecycle manages MDM host lifecycle actions
|
|
type HostLifecycle struct {
|
|
ds fleet.Datastore
|
|
logger kitlog.Logger
|
|
newActivityFunc NewActivityFunc
|
|
}
|
|
|
|
// NewActivityFunc is the signature type of the service-layer function that can
|
|
// create activities and handle the webhook notification and all other
|
|
// mechanisms required when creating an activity.
|
|
type NewActivityFunc func(ctx context.Context, user *fleet.User, details fleet.ActivityDetails, ds fleet.Datastore, logger kitlog.Logger) error
|
|
|
|
// New creates a new HostLifecycle struct
|
|
func New(ds fleet.Datastore, logger kitlog.Logger, newActivityFn NewActivityFunc) *HostLifecycle {
|
|
return &HostLifecycle{
|
|
ds: ds,
|
|
logger: logger,
|
|
newActivityFunc: newActivityFn,
|
|
}
|
|
}
|
|
|
|
// Do executes the provided HostAction based on the platform requested
|
|
func (t *HostLifecycle) Do(ctx context.Context, opts HostOptions) error {
|
|
switch opts.Platform {
|
|
case "darwin", "ios", "ipados":
|
|
err := t.doApple(ctx, opts)
|
|
return ctxerr.Wrapf(ctx, err, "running apple lifecycle action %s", opts.Action)
|
|
case "windows":
|
|
err := t.doWindows(ctx, opts)
|
|
return ctxerr.Wrapf(ctx, err, "running windows lifecycle action %s", opts.Action)
|
|
default:
|
|
return ctxerr.Errorf(ctx, "unsupported platform %s", opts.Platform)
|
|
}
|
|
}
|
|
|
|
func (t *HostLifecycle) doApple(ctx context.Context, opts HostOptions) error {
|
|
switch opts.Action {
|
|
case HostActionTurnOn:
|
|
return t.turnOnApple(ctx, opts)
|
|
|
|
case HostActionTurnOff:
|
|
return t.doWithUUIDValidation(ctx, t.ds.MDMTurnOff, opts)
|
|
|
|
case HostActionReset:
|
|
return t.resetApple(ctx, opts)
|
|
|
|
case HostActionDelete:
|
|
return t.deleteApple(ctx, opts)
|
|
|
|
default:
|
|
return ctxerr.Errorf(ctx, "unknown action %s", opts.Action)
|
|
|
|
}
|
|
}
|
|
|
|
func (t *HostLifecycle) doWindows(ctx context.Context, opts HostOptions) error {
|
|
switch opts.Action {
|
|
case HostActionReset, HostActionTurnOn:
|
|
return t.resetWindows(ctx, opts)
|
|
|
|
case HostActionTurnOff:
|
|
return t.doWithUUIDValidation(ctx, t.ds.MDMTurnOff, opts)
|
|
|
|
case HostActionDelete:
|
|
return nil
|
|
|
|
default:
|
|
return ctxerr.Errorf(ctx, "unknown action %s", opts.Action)
|
|
}
|
|
}
|
|
|
|
type uuidFn func(ctx context.Context, uuid string) ([]*fleet.User, []fleet.ActivityDetails, error)
|
|
|
|
func (t *HostLifecycle) doWithUUIDValidation(ctx context.Context, action uuidFn, opts HostOptions) error {
|
|
if opts.UUID == "" {
|
|
return ctxerr.New(ctx, "UUID option is required for this action")
|
|
}
|
|
|
|
users, acts, err := action(ctx, opts.UUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return t.createActivities(ctx, users, acts)
|
|
}
|
|
|
|
func (t *HostLifecycle) resetWindows(ctx context.Context, opts HostOptions) error {
|
|
if opts.UUID == "" {
|
|
return ctxerr.New(ctx, "UUID option is required for this action")
|
|
}
|
|
|
|
return t.ds.MDMResetEnrollment(ctx, opts.UUID, false)
|
|
}
|
|
|
|
func (t *HostLifecycle) resetApple(ctx context.Context, opts HostOptions) error {
|
|
isPersonalEnrollment := false
|
|
if opts.UUID == "" && opts.HardwareSerial == "" && opts.UserEnrollmentID != "" {
|
|
// We are doing user enrollment, where we don't have access to device hardware details
|
|
opts.UUID = opts.UserEnrollmentID
|
|
opts.HardwareSerial = opts.UserEnrollmentID
|
|
isPersonalEnrollment = true
|
|
}
|
|
if opts.UUID == "" || opts.HardwareSerial == "" || opts.HardwareModel == "" {
|
|
return ctxerr.New(ctx, "UUID, HardwareSerial and HardwareModel options are required for this action")
|
|
}
|
|
|
|
host := &fleet.Host{
|
|
UUID: opts.UUID,
|
|
HardwareSerial: opts.HardwareSerial,
|
|
HardwareModel: opts.HardwareModel,
|
|
Platform: opts.Platform,
|
|
}
|
|
|
|
// FIXME: Why skip this step if we're in the middle of a SCEP renewal?
|
|
// We need to revisit the renewal flow. Short-circuiting in random places means it is
|
|
// much more difficult to reason about the state of the host. We should try instead
|
|
// to centralize the flow control in the lifecycle methods.
|
|
if !opts.SCEPRenewalInProgress {
|
|
// upsert the host to ensure we have the latest information
|
|
if err := t.ds.MDMAppleUpsertHost(ctx, host, isPersonalEnrollment); err != nil {
|
|
return ctxerr.Wrap(ctx, err, "upserting mdm host")
|
|
}
|
|
}
|
|
|
|
err := t.ds.MDMResetEnrollment(ctx, opts.UUID, opts.SCEPRenewalInProgress)
|
|
return ctxerr.Wrap(ctx, err, "reset mdm enrollment")
|
|
}
|
|
|
|
func (t *HostLifecycle) turnOnApple(ctx context.Context, opts HostOptions) error {
|
|
if opts.UUID == "" {
|
|
return ctxerr.New(ctx, "UUID option is required for this action")
|
|
}
|
|
|
|
nanoEnroll, err := t.ds.GetNanoMDMEnrollment(ctx, opts.UUID)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "retrieving nano enrollment info")
|
|
}
|
|
|
|
if nanoEnroll == nil ||
|
|
!nanoEnroll.Enabled ||
|
|
!(nanoEnroll.Type == mdm.EnrollType(mdm.Device).String() || nanoEnroll.Type == mdm.EnrollType(mdm.UserEnrollmentDevice).String()) ||
|
|
nanoEnroll.TokenUpdateTally != 1 {
|
|
// something unexpected, so we skip the turn on
|
|
// and log the details for debugging
|
|
keyvals := []interface{}{"msg", "skipping turn on darwin", "host_uuid", opts.UUID}
|
|
if nanoEnroll == nil {
|
|
keyvals = append(keyvals, "nano_enroll", "nil")
|
|
} else {
|
|
keyvals = append(keyvals,
|
|
"enabled", nanoEnroll.Enabled,
|
|
"type", nanoEnroll.Type,
|
|
"token_update_tally", nanoEnroll.TokenUpdateTally,
|
|
)
|
|
}
|
|
level.Info(t.logger).Log(keyvals...)
|
|
|
|
return nil
|
|
}
|
|
|
|
info, err := t.ds.GetHostMDMCheckinInfo(ctx, opts.UUID)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "getting checkin info")
|
|
}
|
|
|
|
var tmID *uint
|
|
if info.TeamID != 0 {
|
|
tmID = &info.TeamID
|
|
}
|
|
|
|
// TODO: improve this to not enqueue the job if a host that is
|
|
// assigned in ABM is manually enrolling for some reason.
|
|
if info.DEPAssignedToFleet || info.InstalledFromDEP {
|
|
level.Info(t.logger).Log("msg", "queueing post-enroll task for newly enrolled DEP device", "host_uuid", opts.UUID)
|
|
err := worker.QueueAppleMDMJob(
|
|
ctx,
|
|
t.ds,
|
|
t.logger,
|
|
worker.AppleMDMPostDEPEnrollmentTask,
|
|
opts.UUID,
|
|
opts.Platform,
|
|
tmID,
|
|
opts.EnrollReference,
|
|
!opts.HasSetupExperienceItems || opts.Platform != "darwin",
|
|
)
|
|
return ctxerr.Wrap(ctx, err, "queue DEP post-enroll task")
|
|
}
|
|
|
|
// manual MDM enrollments
|
|
if !info.InstalledFromDEP {
|
|
level.Info(t.logger).Log("msg", "queueing post-enroll task for manual enrolled device", "host_uuid", opts.UUID)
|
|
if err := worker.QueueAppleMDMJob(
|
|
ctx,
|
|
t.ds,
|
|
t.logger,
|
|
worker.AppleMDMPostManualEnrollmentTask,
|
|
opts.UUID,
|
|
opts.Platform,
|
|
tmID,
|
|
opts.EnrollReference,
|
|
false,
|
|
); err != nil {
|
|
return ctxerr.Wrap(ctx, err, "queue manual post-enroll task")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (t *HostLifecycle) deleteApple(ctx context.Context, opts HostOptions) error {
|
|
if opts.Host == nil {
|
|
return ctxerr.New(ctx, "a non-nil Host option is required to perform this action")
|
|
}
|
|
|
|
// NOTE: deletion of mdm-related tables is handled by the ds.DeleteHost method.
|
|
|
|
// Try to immediately restore a host if it's assigned to us in ABM
|
|
if !license.IsPremium(ctx) {
|
|
// only premium tier supports DEP so nothing more to do
|
|
return nil
|
|
}
|
|
|
|
ac, err := t.ds.AppConfig(ctx)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "get app config")
|
|
} else if !ac.MDM.AppleBMEnabledAndConfigured {
|
|
// if ABM is not enabled and configured, nothing more to do
|
|
return nil
|
|
}
|
|
|
|
dep, err := t.ds.GetHostDEPAssignment(ctx, opts.Host.ID)
|
|
if err != nil && !fleet.IsNotFound(err) {
|
|
return ctxerr.Wrap(ctx, err, "get host dep assignment")
|
|
}
|
|
|
|
if dep != nil && dep.DeletedAt == nil {
|
|
return t.restorePendingDEPHost(ctx, opts.Host, dep.ABMTokenID)
|
|
}
|
|
|
|
// no DEP assignment was found or the DEP assignment was deleted in ABM
|
|
// so nothing more to do
|
|
return nil
|
|
}
|
|
|
|
func (t *HostLifecycle) restorePendingDEPHost(ctx context.Context, host *fleet.Host, abmTokenID *uint) error {
|
|
if abmTokenID == nil {
|
|
return ctxerr.New(ctx, "cannot restore pending dep host without valid ABM token id")
|
|
}
|
|
|
|
tmID, err := t.getDefaultTeamForABMToken(ctx, host, *abmTokenID)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "restore pending dep host")
|
|
}
|
|
host.TeamID = tmID
|
|
|
|
if err := t.ds.RestoreMDMApplePendingDEPHost(ctx, host); err != nil {
|
|
return ctxerr.Wrap(ctx, err, "restore pending dep host")
|
|
}
|
|
|
|
if _, err := worker.QueueMacosSetupAssistantJob(ctx, t.ds, t.logger,
|
|
worker.MacosSetupAssistantHostsTransferred, tmID, host.HardwareSerial); err != nil {
|
|
return ctxerr.Wrap(ctx, err, "queue macos setup assistant update profile job")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (t *HostLifecycle) getDefaultTeamForABMToken(ctx context.Context, host *fleet.Host, abmTokenID uint) (*uint, error) {
|
|
var abmDefaultTeamID *uint
|
|
tok, err := t.ds.GetABMTokenByID(ctx, abmTokenID)
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "getting ABM token by id")
|
|
}
|
|
|
|
switch host.FleetPlatform() {
|
|
case "darwin":
|
|
abmDefaultTeamID = tok.MacOSDefaultTeamID
|
|
case "ios":
|
|
abmDefaultTeamID = tok.IOSDefaultTeamID
|
|
case "ipados":
|
|
abmDefaultTeamID = tok.IPadOSDefaultTeamID
|
|
default:
|
|
return nil, ctxerr.NewWithData(ctx, "attempting to get default ABM team for host with invalid platform", map[string]any{"host_platform": host.FleetPlatform(), "host_id": host.ID})
|
|
}
|
|
|
|
if abmDefaultTeamID == nil {
|
|
// The default team is "No team", so we can return nil
|
|
return nil, nil
|
|
}
|
|
|
|
exists, err := t.ds.TeamExists(ctx, *abmDefaultTeamID)
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "get default team for mdm devices")
|
|
}
|
|
|
|
if !exists {
|
|
level.Info(t.logger).Log(
|
|
"msg",
|
|
"unable to find default team assigned to abm token, mdm devices won't be assigned to a team",
|
|
"team_id",
|
|
abmDefaultTeamID,
|
|
)
|
|
return nil, nil
|
|
}
|
|
|
|
return abmDefaultTeamID, nil
|
|
}
|
|
|
|
func (t *HostLifecycle) createActivities(ctx context.Context, users []*fleet.User, acts []fleet.ActivityDetails) error {
|
|
if len(users) != len(acts) {
|
|
return ctxerr.New(ctx, "number of users and activities must match, this is a Fleet development bug")
|
|
}
|
|
|
|
for i, act := range acts {
|
|
user := users[i]
|
|
if err := t.newActivityFunc(ctx, user, act, t.ds, t.logger); err != nil {
|
|
return ctxerr.Wrap(ctx, err, "create activity")
|
|
}
|
|
}
|
|
return nil
|
|
}
|