| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403 |
- package ovpm
- import (
- "fmt"
- "net"
- "time"
- passlib "gopkg.in/hlandau/passlib.v1"
- "github.com/Sirupsen/logrus"
- "github.com/asaskevich/govalidator"
- "github.com/cad/ovpm/pki"
- "github.com/jinzhu/gorm"
- )
- // User represents the interface that is being used within the public api.
- type User interface {
- GetUsername() string
- GetServerSerialNumber() string
- GetCert() string
- GetIPNet() string
- IsNoGW() bool
- GetHostID() uint32
- IsAdmin() bool
- }
- // DBUser is database model for VPN users.
- type DBUser struct {
- gorm.Model
- ServerID uint
- Server DBServer
- Username string `gorm:"unique_index"`
- Cert string // not user writable
- ServerSerialNumber string // not user writable
- Hash string
- Key string // not user writable
- NoGW bool
- HostID uint32 // not user writable
- Admin bool
- }
- // DBRevoked is a database model for revoked VPN users.
- type DBRevoked struct {
- gorm.Model
- SerialNumber string
- }
- func (u *DBUser) setPassword(password string) error {
- hashedPassword, err := passlib.Hash(password)
- if err != nil {
- return fmt.Errorf("can not set password: %v", err)
- }
- u.Hash = hashedPassword
- return nil
- }
- // CheckPassword returns wether the given password is correct for the user.
- func (u *DBUser) CheckPassword(password string) bool {
- _, err := passlib.Verify(password, u.Hash)
- if err != nil {
- logrus.Error(err)
- return false
- }
- return true
- }
- // GetUser finds and returns the user with the given username from database.
- func GetUser(username string) (*DBUser, error) {
- user := DBUser{}
- db.Where(&DBUser{Username: username}).First(&user)
- if db.NewRecord(&user) {
- // user is not found
- return nil, fmt.Errorf("user not found: %s", username)
- }
- return &user, nil
- }
- // GetAllUsers returns all recorded users in the database.
- func GetAllUsers() ([]*DBUser, error) {
- var users []*DBUser
- db.Find(&users)
- return users, nil
- }
- // CreateNewUser creates a new user with the given username and password in the database.
- // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
- //
- // It also generates the necessary client keys and signs certificates with the current
- // server's CA.
- func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*DBUser, error) {
- if !IsInitialized() {
- return nil, fmt.Errorf("you first need to create server")
- }
- // Validate user input.
- if govalidator.IsNull(username) {
- return nil, fmt.Errorf("validation error: %s can not be null", username)
- }
- if !govalidator.IsAlphanumeric(username) {
- return nil, fmt.Errorf("validation error: `%s` can only contain letters and numbers", username)
- }
- ca, err := GetSystemCA()
- if err != nil {
- return nil, err
- }
- clientCert, err := pki.NewClientCertHolder(ca, username)
- if err != nil {
- return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
- }
- server, err := GetServerInstance()
- if err != nil {
- return nil, fmt.Errorf("can not get server: %v", err)
- }
- if hostid != 0 {
- ip := HostID2IP(hostid)
- if ip == nil {
- return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
- }
- network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
- if !network.Contains(ip) {
- return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
- }
- if hostIDsContains(getStaticHostIDs(), hostid) {
- return nil, fmt.Errorf("ip %s is already allocated", ip)
- }
- }
- user := DBUser{
- Username: username,
- Cert: clientCert.Cert,
- Key: clientCert.Key,
- ServerSerialNumber: server.SerialNumber,
- NoGW: nogw,
- HostID: hostid,
- Admin: admin,
- }
- user.setPassword(password)
- db.Create(&user)
- if db.NewRecord(&user) {
- // user is still not created
- return nil, fmt.Errorf("can not create user in database: %s", user.Username)
- }
- logrus.Infof("user created: %s", username)
- // Emit server config
- err = Emit()
- if err != nil {
- return nil, err
- }
- return &user, nil
- }
- // Update updates the user's attributes and writes them to the database.
- //
- // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
- func (u *DBUser) Update(password string, nogw bool, hostid uint32, admin bool) error {
- if !IsInitialized() {
- return fmt.Errorf("you first need to create server")
- }
- // If password is provided; set it. If not; leave it as it is.
- if password != "" {
- u.setPassword(password)
- }
- u.NoGW = nogw
- u.HostID = hostid
- u.Admin = admin
- if hostid != 0 {
- server, err := GetServerInstance()
- if err != nil {
- return fmt.Errorf("can not get server: %v", err)
- }
- ip := HostID2IP(hostid)
- if ip == nil {
- return fmt.Errorf("host id doesn't represent an ip %d", hostid)
- }
- network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
- if !network.Contains(ip) {
- return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
- }
- if hostIDsContains(getStaticHostIDs(), hostid) {
- return fmt.Errorf("ip %s is already allocated", ip)
- }
- }
- db.Save(u)
- err := Emit()
- if err != nil {
- return err
- }
- return nil
- }
- // Delete deletes a user by the given username from the database.
- func (u *DBUser) Delete() error {
- if db.NewRecord(u) {
- // user is not found
- return fmt.Errorf("user is not initialized: %s", u.Username)
- }
- crt, err := pki.ReadCertFromPEM(u.Cert)
- if err != nil {
- return fmt.Errorf("can not get user's certificate: %v", err)
- }
- db.Create(&DBRevoked{
- SerialNumber: crt.SerialNumber.Text(16),
- })
- db.Unscoped().Delete(u)
- logrus.Infof("user deleted: %s", u.GetUsername())
- err = Emit()
- if err != nil {
- return err
- }
- u = nil // delete the existing user struct
- return nil
- }
- // ResetPassword resets the users password into the provided password.
- func (u *DBUser) ResetPassword(password string) error {
- err := u.setPassword(password)
- if err != nil {
- // user password can not be updated
- return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
- }
- db.Save(u)
- err = Emit()
- if err != nil {
- return err
- }
- logrus.Infof("user password reset: %s", u.GetUsername())
- return nil
- }
- // Renew creates a key and a ceritificate signed by the current server's CA.
- //
- // This is often used to sign users when the current CA is changed while there are
- // still existing users in the database.
- //
- // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
- func (u *DBUser) Renew() error {
- if !IsInitialized() {
- return fmt.Errorf("you first need to create server")
- }
- ca, err := GetSystemCA()
- if err != nil {
- return err
- }
- clientCert, err := pki.NewClientCertHolder(ca, u.Username)
- if err != nil {
- return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
- }
- server, err := GetServerInstance()
- if err != nil {
- return err
- }
- u.Cert = clientCert.Cert
- u.Key = clientCert.Key
- u.ServerSerialNumber = server.SerialNumber
- db.Save(u)
- err = Emit()
- if err != nil {
- return err
- }
- logrus.Infof("user renewed cert: %s", u.GetUsername())
- return nil
- }
- // GetUsername returns user's username.
- func (u *DBUser) GetUsername() string {
- return u.Username
- }
- // GetCert returns user's public certificate.
- func (u *DBUser) GetCert() string {
- return u.Cert
- }
- // GetServerSerialNumber returns user's server serial number.
- func (u *DBUser) GetServerSerialNumber() string {
- return u.ServerSerialNumber
- }
- // GetCreatedAt returns user's creation time.
- func (u *DBUser) GetCreatedAt() string {
- return u.CreatedAt.Format(time.UnixDate)
- }
- // getIP returns user's vpn ip addr.
- func (u *DBUser) getIP() net.IP {
- users := getNonStaticHostUsers()
- staticHostIDs := getStaticHostIDs()
- server, err := GetServerInstance()
- if err != nil {
- logrus.Panicf("can not get server instance: %v", err)
- }
- mask := net.IPMask(net.ParseIP(server.Mask).To4())
- network := net.ParseIP(server.Net).To4().Mask(mask)
- // If the user has static ip address, return it immediately.
- if u.HostID != 0 {
- return HostID2IP(u.HostID)
- }
- // Calculate dynamic ip addresses from a deterministic address pool.
- freeHostID := 0
- for _, user := range users {
- // Skip, if user is supposed to have static ip.
- if user.HostID != 0 {
- continue
- }
- // Try the next available host id.
- hostID := IP2HostID(network) + uint32(freeHostID)
- for hostIDsContains(staticHostIDs, hostID+2) {
- freeHostID++ // Increase the host id and try again until it is available.
- hostID = IP2HostID(network) + uint32(freeHostID)
- }
- if user.ID == u.ID {
- return HostID2IP(hostID + 2)
- }
- freeHostID++
- }
- return nil
- }
- // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
- func (u *DBUser) GetIPNet() string {
- server, err := GetServerInstance()
- if err != nil {
- logrus.Panicf("can not get user ipnet: %v", err)
- }
- mask := net.IPMask(net.ParseIP(server.Mask).To4())
- ipn := net.IPNet{
- IP: u.getIP(),
- Mask: mask,
- }
- return ipn.String()
- }
- // IsNoGW returns wether user is set to get the vpn server as their default gateway.
- func (u *DBUser) IsNoGW() bool {
- return u.NoGW
- }
- // GetHostID returns user's Host ID.
- func (u *DBUser) GetHostID() uint32 {
- return u.HostID
- }
- // IsAdmin returns whether user is admin or not.
- func (u *DBUser) IsAdmin() bool {
- return u.Admin
- }
- func getStaticHostUsers() []*DBUser {
- var users []*DBUser
- db.Unscoped().Not(DBUser{HostID: 0}).Find(&users)
- return users
- }
- func getNonStaticHostUsers() []*DBUser {
- var users []*DBUser
- db.Unscoped().Where(DBUser{HostID: 0}).Find(&users)
- return users
- }
- func getStaticHostIDs() []uint32 {
- var ids []uint32
- users := getStaticHostUsers()
- for _, user := range users {
- ids = append(ids, user.HostID)
- }
- return ids
- }
- func hostIDsContains(s []uint32, e uint32) bool {
- for _, a := range s {
- if a == e {
- return true
- }
- }
- return false
- }
|