user.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "time"
  6. passlib "gopkg.in/hlandau/passlib.v1"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/asaskevich/govalidator"
  9. "github.com/cad/ovpm/pki"
  10. "github.com/jinzhu/gorm"
  11. )
  12. // User represents the interface that is being used within the public api.
  13. type User interface {
  14. GetUsername() string
  15. GetServerSerialNumber() string
  16. GetCert() string
  17. GetIPNet() string
  18. IsNoGW() bool
  19. GetHostID() uint32
  20. IsAdmin() bool
  21. }
  22. // DBUser is database model for VPN users.
  23. type DBUser struct {
  24. gorm.Model
  25. ServerID uint
  26. Server DBServer
  27. Username string `gorm:"unique_index"`
  28. Cert string // not user writable
  29. ServerSerialNumber string // not user writable
  30. Hash string
  31. Key string // not user writable
  32. NoGW bool
  33. HostID uint32 // not user writable
  34. Admin bool
  35. }
  36. // DBRevoked is a database model for revoked VPN users.
  37. type DBRevoked struct {
  38. gorm.Model
  39. SerialNumber string
  40. }
  41. func (u *DBUser) setPassword(password string) error {
  42. hashedPassword, err := passlib.Hash(password)
  43. if err != nil {
  44. return fmt.Errorf("can not set password: %v", err)
  45. }
  46. u.Hash = hashedPassword
  47. return nil
  48. }
  49. // CheckPassword returns wether the given password is correct for the user.
  50. func (u *DBUser) CheckPassword(password string) bool {
  51. _, err := passlib.Verify(password, u.Hash)
  52. if err != nil {
  53. logrus.Error(err)
  54. return false
  55. }
  56. return true
  57. }
  58. // GetUser finds and returns the user with the given username from database.
  59. func GetUser(username string) (*DBUser, error) {
  60. user := DBUser{}
  61. db.Where(&DBUser{Username: username}).First(&user)
  62. if db.NewRecord(&user) {
  63. // user is not found
  64. return nil, fmt.Errorf("user not found: %s", username)
  65. }
  66. return &user, nil
  67. }
  68. // GetAllUsers returns all recorded users in the database.
  69. func GetAllUsers() ([]*DBUser, error) {
  70. var users []*DBUser
  71. db.Find(&users)
  72. return users, nil
  73. }
  74. // CreateNewUser creates a new user with the given username and password in the database.
  75. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  76. //
  77. // It also generates the necessary client keys and signs certificates with the current
  78. // server's CA.
  79. func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*DBUser, error) {
  80. if !IsInitialized() {
  81. return nil, fmt.Errorf("you first need to create server")
  82. }
  83. // Validate user input.
  84. if govalidator.IsNull(username) {
  85. return nil, fmt.Errorf("validation error: %s can not be null", username)
  86. }
  87. if !govalidator.IsAlphanumeric(username) {
  88. return nil, fmt.Errorf("validation error: `%s` can only contain letters and numbers", username)
  89. }
  90. ca, err := GetSystemCA()
  91. if err != nil {
  92. return nil, err
  93. }
  94. clientCert, err := pki.NewClientCertHolder(ca, username)
  95. if err != nil {
  96. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  97. }
  98. server, err := GetServerInstance()
  99. if err != nil {
  100. return nil, fmt.Errorf("can not get server: %v", err)
  101. }
  102. if hostid != 0 {
  103. ip := HostID2IP(hostid)
  104. if ip == nil {
  105. return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
  106. }
  107. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  108. if !network.Contains(ip) {
  109. return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  110. }
  111. if hostIDsContains(getStaticHostIDs(), hostid) {
  112. return nil, fmt.Errorf("ip %s is already allocated", ip)
  113. }
  114. }
  115. user := DBUser{
  116. Username: username,
  117. Cert: clientCert.Cert,
  118. Key: clientCert.Key,
  119. ServerSerialNumber: server.SerialNumber,
  120. NoGW: nogw,
  121. HostID: hostid,
  122. Admin: admin,
  123. }
  124. user.setPassword(password)
  125. db.Create(&user)
  126. if db.NewRecord(&user) {
  127. // user is still not created
  128. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  129. }
  130. logrus.Infof("user created: %s", username)
  131. // Emit server config
  132. err = Emit()
  133. if err != nil {
  134. return nil, err
  135. }
  136. return &user, nil
  137. }
  138. // Update updates the user's attributes and writes them to the database.
  139. //
  140. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  141. func (u *DBUser) Update(password string, nogw bool, hostid uint32, admin bool) error {
  142. if !IsInitialized() {
  143. return fmt.Errorf("you first need to create server")
  144. }
  145. // If password is provided; set it. If not; leave it as it is.
  146. if password != "" {
  147. u.setPassword(password)
  148. }
  149. u.NoGW = nogw
  150. u.HostID = hostid
  151. u.Admin = admin
  152. if hostid != 0 {
  153. server, err := GetServerInstance()
  154. if err != nil {
  155. return fmt.Errorf("can not get server: %v", err)
  156. }
  157. ip := HostID2IP(hostid)
  158. if ip == nil {
  159. return fmt.Errorf("host id doesn't represent an ip %d", hostid)
  160. }
  161. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  162. if !network.Contains(ip) {
  163. return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  164. }
  165. if hostIDsContains(getStaticHostIDs(), hostid) {
  166. return fmt.Errorf("ip %s is already allocated", ip)
  167. }
  168. }
  169. db.Save(u)
  170. err := Emit()
  171. if err != nil {
  172. return err
  173. }
  174. return nil
  175. }
  176. // Delete deletes a user by the given username from the database.
  177. func (u *DBUser) Delete() error {
  178. if db.NewRecord(u) {
  179. // user is not found
  180. return fmt.Errorf("user is not initialized: %s", u.Username)
  181. }
  182. crt, err := pki.ReadCertFromPEM(u.Cert)
  183. if err != nil {
  184. return fmt.Errorf("can not get user's certificate: %v", err)
  185. }
  186. db.Create(&DBRevoked{
  187. SerialNumber: crt.SerialNumber.Text(16),
  188. })
  189. db.Unscoped().Delete(u)
  190. logrus.Infof("user deleted: %s", u.GetUsername())
  191. err = Emit()
  192. if err != nil {
  193. return err
  194. }
  195. u = nil // delete the existing user struct
  196. return nil
  197. }
  198. // ResetPassword resets the users password into the provided password.
  199. func (u *DBUser) ResetPassword(password string) error {
  200. err := u.setPassword(password)
  201. if err != nil {
  202. // user password can not be updated
  203. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  204. }
  205. db.Save(u)
  206. err = Emit()
  207. if err != nil {
  208. return err
  209. }
  210. logrus.Infof("user password reset: %s", u.GetUsername())
  211. return nil
  212. }
  213. // Renew creates a key and a ceritificate signed by the current server's CA.
  214. //
  215. // This is often used to sign users when the current CA is changed while there are
  216. // still existing users in the database.
  217. //
  218. // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
  219. func (u *DBUser) Renew() error {
  220. if !IsInitialized() {
  221. return fmt.Errorf("you first need to create server")
  222. }
  223. ca, err := GetSystemCA()
  224. if err != nil {
  225. return err
  226. }
  227. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  228. if err != nil {
  229. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  230. }
  231. server, err := GetServerInstance()
  232. if err != nil {
  233. return err
  234. }
  235. u.Cert = clientCert.Cert
  236. u.Key = clientCert.Key
  237. u.ServerSerialNumber = server.SerialNumber
  238. db.Save(u)
  239. err = Emit()
  240. if err != nil {
  241. return err
  242. }
  243. logrus.Infof("user renewed cert: %s", u.GetUsername())
  244. return nil
  245. }
  246. // GetUsername returns user's username.
  247. func (u *DBUser) GetUsername() string {
  248. return u.Username
  249. }
  250. // GetCert returns user's public certificate.
  251. func (u *DBUser) GetCert() string {
  252. return u.Cert
  253. }
  254. // GetServerSerialNumber returns user's server serial number.
  255. func (u *DBUser) GetServerSerialNumber() string {
  256. return u.ServerSerialNumber
  257. }
  258. // GetCreatedAt returns user's creation time.
  259. func (u *DBUser) GetCreatedAt() string {
  260. return u.CreatedAt.Format(time.UnixDate)
  261. }
  262. // getIP returns user's vpn ip addr.
  263. func (u *DBUser) getIP() net.IP {
  264. users := getNonStaticHostUsers()
  265. staticHostIDs := getStaticHostIDs()
  266. server, err := GetServerInstance()
  267. if err != nil {
  268. logrus.Panicf("can not get server instance: %v", err)
  269. }
  270. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  271. network := net.ParseIP(server.Net).To4().Mask(mask)
  272. // If the user has static ip address, return it immediately.
  273. if u.HostID != 0 {
  274. return HostID2IP(u.HostID)
  275. }
  276. // Calculate dynamic ip addresses from a deterministic address pool.
  277. freeHostID := 0
  278. for _, user := range users {
  279. // Skip, if user is supposed to have static ip.
  280. if user.HostID != 0 {
  281. continue
  282. }
  283. // Try the next available host id.
  284. hostID := IP2HostID(network) + uint32(freeHostID)
  285. for hostIDsContains(staticHostIDs, hostID+2) {
  286. freeHostID++ // Increase the host id and try again until it is available.
  287. hostID = IP2HostID(network) + uint32(freeHostID)
  288. }
  289. if user.ID == u.ID {
  290. return HostID2IP(hostID + 2)
  291. }
  292. freeHostID++
  293. }
  294. return nil
  295. }
  296. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  297. func (u *DBUser) GetIPNet() string {
  298. server, err := GetServerInstance()
  299. if err != nil {
  300. logrus.Panicf("can not get user ipnet: %v", err)
  301. }
  302. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  303. ipn := net.IPNet{
  304. IP: u.getIP(),
  305. Mask: mask,
  306. }
  307. return ipn.String()
  308. }
  309. // IsNoGW returns wether user is set to get the vpn server as their default gateway.
  310. func (u *DBUser) IsNoGW() bool {
  311. return u.NoGW
  312. }
  313. // GetHostID returns user's Host ID.
  314. func (u *DBUser) GetHostID() uint32 {
  315. return u.HostID
  316. }
  317. // IsAdmin returns whether user is admin or not.
  318. func (u *DBUser) IsAdmin() bool {
  319. return u.Admin
  320. }
  321. func getStaticHostUsers() []*DBUser {
  322. var users []*DBUser
  323. db.Unscoped().Not(DBUser{HostID: 0}).Find(&users)
  324. return users
  325. }
  326. func getNonStaticHostUsers() []*DBUser {
  327. var users []*DBUser
  328. db.Unscoped().Where(DBUser{HostID: 0}).Find(&users)
  329. return users
  330. }
  331. func getStaticHostIDs() []uint32 {
  332. var ids []uint32
  333. users := getStaticHostUsers()
  334. for _, user := range users {
  335. ids = append(ids, user.HostID)
  336. }
  337. return ids
  338. }
  339. func hostIDsContains(s []uint32, e uint32) bool {
  340. for _, a := range s {
  341. if a == e {
  342. return true
  343. }
  344. }
  345. return false
  346. }