1
0

user.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "time"
  6. passlib "gopkg.in/hlandau/passlib.v1"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/asaskevich/govalidator"
  9. "github.com/cad/ovpm/pki"
  10. "github.com/google/uuid"
  11. "github.com/jinzhu/gorm"
  12. )
  13. // dbRevokedModel is a database model for revoked VPN users.
  14. type dbRevokedModel struct {
  15. gorm.Model
  16. SerialNumber string
  17. }
  18. // dbUserModel is database model for VPN users.
  19. type dbUserModel struct {
  20. gorm.Model
  21. ServerID uint
  22. Server dbServerModel
  23. Username string `gorm:"unique_index"`
  24. Cert string // not user writable
  25. ServerSerialNumber string // not user writable
  26. Hash string
  27. Key string // not user writable
  28. NoGW bool
  29. HostID uint32 // not user writable
  30. Admin bool
  31. AuthToken string // auth token
  32. }
  33. // User represents a vpn user.
  34. type User struct {
  35. dbUserModel // persisted fields
  36. isConnected bool
  37. connectedSince time.Time
  38. bytesReceived uint64
  39. bytesSent uint64
  40. }
  41. func (u *dbUserModel) setPassword(password string) error {
  42. hashedPassword, err := passlib.Hash(password)
  43. if err != nil {
  44. return fmt.Errorf("can not set password: %v", err)
  45. }
  46. u.Hash = hashedPassword
  47. return nil
  48. }
  49. // RenewToken generates a new AuthToken and sets it to the db.
  50. func (u *User) RenewToken() (string, error) {
  51. token := uuid.New().String()
  52. u.AuthToken = token
  53. db.Save(u.dbUserModel)
  54. if db.Error != nil {
  55. return "", db.Error
  56. }
  57. return token, nil
  58. }
  59. // ValidateToken returns whether the given token is valid or not.
  60. func (u *User) ValidateToken(token string) bool {
  61. if u.AuthToken == "" {
  62. return false
  63. }
  64. return u.AuthToken == token
  65. }
  66. // CheckPassword returns whether the given password is correct for the user.
  67. func (u *User) CheckPassword(password string) bool {
  68. _, err := passlib.Verify(password, u.Hash)
  69. if err != nil {
  70. logrus.Error(err)
  71. return false
  72. }
  73. return true
  74. }
  75. // GetUser finds and returns the user with the given username from database.
  76. func GetUser(username string) (*User, error) {
  77. user := dbUserModel{}
  78. db.Where(&dbUserModel{Username: username}).First(&user)
  79. if db.NewRecord(&user) {
  80. // user is not found
  81. return nil, fmt.Errorf("user not found: %s", username)
  82. }
  83. return &User{dbUserModel: user}, nil
  84. }
  85. // GetUserByToken finds and returns the user with the given token from database.
  86. func GetUserByToken(token string) (*User, error) {
  87. if token == "" {
  88. return nil, fmt.Errorf("token can not be empty")
  89. }
  90. user := dbUserModel{}
  91. db.Where(&dbUserModel{AuthToken: token}).First(&user)
  92. if db.NewRecord(&user) {
  93. // user is not found
  94. return nil, fmt.Errorf("user not found by token: <token>")
  95. }
  96. return &User{dbUserModel: user}, nil
  97. }
  98. // GetAllUsers returns all recorded users in the database.
  99. func GetAllUsers() ([]*User, error) {
  100. var users []*User
  101. var dbUsers []*dbUserModel
  102. db.Find(&dbUsers)
  103. for _, u := range dbUsers {
  104. users = append(users, &User{dbUserModel: *u})
  105. }
  106. return users, nil
  107. }
  108. // CreateNewUser creates a new user with the given username and password in the database.
  109. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  110. //
  111. // It also generates the necessary client keys and signs certificates with the current
  112. // server's CA.
  113. func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*User, error) {
  114. svr := TheServer()
  115. if !svr.IsInitialized() {
  116. return nil, fmt.Errorf("you first need to create server")
  117. }
  118. // Validate user input.
  119. if govalidator.IsNull(username) {
  120. return nil, fmt.Errorf("validation error: %s can not be null", username)
  121. }
  122. if !govalidator.Matches(username, "^([\\w\\.]+)$") { // allow alphanumeric, underscore and dot
  123. return nil, fmt.Errorf("validation error: `%s` can only contain letters, numbers, underscores and dots", username)
  124. }
  125. if username == "root" {
  126. return nil, fmt.Errorf("forbidden: username root is reserved and can not be used")
  127. }
  128. ca, err := svr.GetSystemCA()
  129. if err != nil {
  130. return nil, err
  131. }
  132. clientCert, err := pki.NewClientCertHolder(ca, username)
  133. if err != nil {
  134. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  135. }
  136. if hostid != 0 {
  137. ip := HostID2IP(hostid)
  138. if ip == nil {
  139. return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
  140. }
  141. network := net.IPNet{IP: net.ParseIP(svr.Net).To4(), Mask: net.IPMask(net.ParseIP(svr.Mask).To4())}
  142. if !network.Contains(ip) {
  143. return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  144. }
  145. if hostIDsContains(getStaticHostIDs(), hostid) {
  146. return nil, fmt.Errorf("ip %s is already allocated", ip)
  147. }
  148. // Check if requested ip is allocated to the VPN server itself.
  149. serverNet := net.IPNet{
  150. IP: net.ParseIP(svr.Net).To4(),
  151. Mask: net.IPMask(net.ParseIP(svr.Mask).To4()),
  152. }
  153. ip, ipnet, err := net.ParseCIDR(serverNet.String())
  154. if err != nil {
  155. return nil, fmt.Errorf("can not parse: %v", err)
  156. }
  157. if hostid == IP2HostID(ipnet.IP)+1 { // If it's VPN server's IP addr, then don't allow it.
  158. return nil, fmt.Errorf("can't assign server's ip address to a user")
  159. }
  160. }
  161. user := dbUserModel{
  162. Username: username,
  163. Cert: clientCert.Cert,
  164. Key: clientCert.Key,
  165. ServerSerialNumber: svr.SerialNumber,
  166. NoGW: nogw,
  167. HostID: hostid,
  168. Admin: admin,
  169. }
  170. user.setPassword(password)
  171. db.Create(&user)
  172. if db.NewRecord(&user) {
  173. // user is still not created
  174. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  175. }
  176. logrus.Infof("user created: %s", username)
  177. // EmitWithRestart server config
  178. if err = svr.EmitWithRestart(); err != nil {
  179. return nil, err
  180. }
  181. return &User{dbUserModel: user}, nil
  182. }
  183. // Update updates the user's attributes and writes them to the database.
  184. //
  185. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  186. func (u *User) Update(password string, nogw bool, hostid uint32, admin bool) error {
  187. svr := TheServer()
  188. if !svr.IsInitialized() {
  189. return fmt.Errorf("you first need to create server")
  190. }
  191. // If password is provided; set it. If not; leave it as it is.
  192. if password != "" {
  193. u.setPassword(password)
  194. }
  195. u.NoGW = nogw
  196. u.HostID = hostid
  197. u.Admin = admin
  198. if hostid != 0 {
  199. ip := HostID2IP(hostid)
  200. if ip == nil {
  201. return fmt.Errorf("host id doesn't represent an ip %d", hostid)
  202. }
  203. network := net.IPNet{IP: net.ParseIP(svr.Net).To4(), Mask: net.IPMask(net.ParseIP(svr.Mask).To4())}
  204. if !network.Contains(ip) {
  205. return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  206. }
  207. if u.HostID != hostid && hostIDsContains(getStaticHostIDs(), hostid) {
  208. return fmt.Errorf("ip %s is already allocated", ip)
  209. }
  210. }
  211. db.Save(u.dbUserModel)
  212. return svr.EmitWithRestart()
  213. }
  214. // Delete deletes a user by the given username from the database.
  215. func (u *User) Delete() error {
  216. if db.NewRecord(u.dbUserModel) {
  217. // user is not found
  218. return fmt.Errorf("user is not initialized: %s", u.Username)
  219. }
  220. crt, err := pki.ReadCertFromPEM(u.Cert)
  221. if err != nil {
  222. return fmt.Errorf("can not get user's certificate: %v", err)
  223. }
  224. db.Create(&dbRevokedModel{
  225. SerialNumber: crt.SerialNumber.Text(16),
  226. })
  227. db.Unscoped().Delete(u.dbUserModel)
  228. logrus.Infof("user deleted: %s", u.GetUsername())
  229. if err = TheServer().EmitWithRestart(); err != nil {
  230. return err
  231. }
  232. u = nil // delete the existing user struct
  233. return nil
  234. }
  235. // ResetPassword resets the users password into the provided password.
  236. func (u *User) ResetPassword(password string) error {
  237. err := u.dbUserModel.setPassword(password)
  238. if err != nil {
  239. // user password can not be updated
  240. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  241. }
  242. db.Save(u.dbUserModel)
  243. if err = TheServer().EmitWithRestart(); err != nil {
  244. return err
  245. }
  246. logrus.Infof("user password reset: %s", u.GetUsername())
  247. return nil
  248. }
  249. // Renew creates a key and a ceritificate signed by the current server's CA.
  250. //
  251. // This is often used to sign users when the current CA is changed while there are
  252. // still existing users in the database.
  253. //
  254. // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
  255. func (u *User) Renew() error {
  256. svr := TheServer()
  257. if !svr.IsInitialized() {
  258. return fmt.Errorf("you first need to create server")
  259. }
  260. ca, err := svr.GetSystemCA()
  261. if err != nil {
  262. return err
  263. }
  264. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  265. if err != nil {
  266. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  267. }
  268. u.Cert = clientCert.Cert
  269. u.Key = clientCert.Key
  270. u.ServerSerialNumber = svr.SerialNumber
  271. db.Save(u.dbUserModel)
  272. if err = svr.EmitWithRestart(); err != nil {
  273. return err
  274. }
  275. logrus.Infof("user renewed cert: %s", u.GetUsername())
  276. return nil
  277. }
  278. // GetUsername returns user's username.
  279. func (u *User) GetUsername() string {
  280. return u.Username
  281. }
  282. // GetCert returns user's public certificate.
  283. func (u *User) GetCert() string {
  284. return u.Cert
  285. }
  286. // ExpiresAt returns user's certificate expiration date time.
  287. func (u *User) ExpiresAt() time.Time {
  288. crt, err := pki.ReadCertFromPEM(u.Cert)
  289. if err != nil {
  290. logrus.Fatalf("can't parse cert: %v", err)
  291. }
  292. return crt.NotAfter
  293. }
  294. // GetServerSerialNumber returns user's server serial number.
  295. func (u *User) GetServerSerialNumber() string {
  296. return u.ServerSerialNumber
  297. }
  298. // GetCreatedAt returns user's creation time.
  299. func (u *User) GetCreatedAt() string {
  300. return u.CreatedAt.Format(time.RFC3339)
  301. }
  302. // getIP returns user's vpn ip addr.
  303. func (u *User) getIP() net.IP {
  304. users := getNonStaticHostUsers()
  305. staticHostIDs := getStaticHostIDs()
  306. svr := TheServer()
  307. mask := net.IPMask(net.ParseIP(svr.Mask).To4())
  308. network := net.ParseIP(svr.Net).To4().Mask(mask)
  309. // If the user has static ip address, return it immediately.
  310. if u.HostID != 0 {
  311. return HostID2IP(u.HostID)
  312. }
  313. // Calculate dynamic ip addresses from a deterministic address pool.
  314. freeHostID := 0
  315. for _, user := range users {
  316. // Skip, if user is supposed to have static ip.
  317. if user.HostID != 0 {
  318. continue
  319. }
  320. // Try the next available host id.
  321. hostID := IP2HostID(network) + uint32(freeHostID)
  322. for hostIDsContains(staticHostIDs, hostID+2) {
  323. freeHostID++ // Increase the host id and try again until it is available.
  324. hostID = IP2HostID(network) + uint32(freeHostID)
  325. }
  326. if user.ID == u.ID {
  327. return HostID2IP(hostID + 2)
  328. }
  329. freeHostID++
  330. }
  331. return nil
  332. }
  333. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  334. func (u *User) GetIPNet() string {
  335. svr := TheServer()
  336. mask := net.IPMask(net.ParseIP(svr.Mask).To4())
  337. ipn := net.IPNet{
  338. IP: u.getIP(),
  339. Mask: mask,
  340. }
  341. return ipn.String()
  342. }
  343. // IsNoGW returns whether user is set to get the vpn server as their default gateway.
  344. func (u *User) IsNoGW() bool {
  345. return u.NoGW
  346. }
  347. // GetHostID returns user's Host ID.
  348. func (u *User) GetHostID() uint32 {
  349. return u.HostID
  350. }
  351. // IsAdmin returns whether user is admin or not.
  352. func (u *User) IsAdmin() bool {
  353. return u.Admin
  354. }
  355. func (u *User) getKey() string {
  356. return u.Key
  357. }
  358. // ConnectionStatus returns information about user's connection to the VPN server.
  359. func (u *User) ConnectionStatus() (isConnected bool, connectedSince time.Time, bytesSent uint64, bytesReceived uint64) {
  360. var found *clEntry
  361. svr := TheServer()
  362. // Open the status log file.
  363. f, err := svr.openFunc(_DefaultStatusLogPath)
  364. if err != nil {
  365. panic(err)
  366. }
  367. cl, _ := svr.parseStatusLogFunc(f) // client list from OpenVPN status log
  368. for _, c := range cl {
  369. if c.CommonName == u.Username {
  370. found = &c
  371. }
  372. }
  373. if found == nil {
  374. return false, time.Time{}, 0, 0
  375. }
  376. return true, found.ConnectedSince, found.BytesSent, found.BytesReceived
  377. }
  378. func getStaticHostUsers() []*User {
  379. var users []*User
  380. var dbUsers []*dbUserModel
  381. db.Unscoped().Not(dbUserModel{HostID: 0}).Find(&dbUsers)
  382. for _, u := range dbUsers {
  383. users = append(users, &User{dbUserModel: *u})
  384. }
  385. return users
  386. }
  387. func getNonStaticHostUsers() []*User {
  388. var users []*User
  389. var dbUsers []*dbUserModel
  390. db.Unscoped().Where(dbUserModel{HostID: 0}).Find(&dbUsers)
  391. for _, u := range dbUsers {
  392. users = append(users, &User{dbUserModel: *u})
  393. }
  394. return users
  395. }
  396. func getStaticHostIDs() []uint32 {
  397. var ids []uint32
  398. users := getStaticHostUsers()
  399. for _, user := range users {
  400. ids = append(ids, user.HostID)
  401. }
  402. return ids
  403. }
  404. func hostIDsContains(s []uint32, e uint32) bool {
  405. for _, a := range s {
  406. if a == e {
  407. return true
  408. }
  409. }
  410. return false
  411. }