user.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "time"
  6. passlib "gopkg.in/hlandau/passlib.v1"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/asaskevich/govalidator"
  9. "github.com/cad/ovpm/pki"
  10. "github.com/google/uuid"
  11. "github.com/jinzhu/gorm"
  12. )
  13. // dbRevokedModel is a database model for revoked VPN users.
  14. type dbRevokedModel struct {
  15. gorm.Model
  16. SerialNumber string
  17. }
  18. // dbUserModel is database model for VPN users.
  19. type dbUserModel struct {
  20. gorm.Model
  21. ServerID uint
  22. Server dbServerModel
  23. Username string `gorm:"unique_index"`
  24. Cert string // not user writable
  25. ServerSerialNumber string // not user writable
  26. Hash string
  27. Key string // not user writable
  28. NoGW bool
  29. HostID uint32 // not user writable
  30. Admin bool
  31. AuthToken string // auth token
  32. }
  33. // User represents a vpn user.
  34. type User struct {
  35. dbUserModel // persisted fields
  36. }
  37. func (u *dbUserModel) setPassword(password string) error {
  38. hashedPassword, err := passlib.Hash(password)
  39. if err != nil {
  40. return fmt.Errorf("can not set password: %v", err)
  41. }
  42. u.Hash = hashedPassword
  43. return nil
  44. }
  45. // RenewToken generates a new AuthToken and sets it to the db.
  46. func (u *User) RenewToken() (string, error) {
  47. token := uuid.New().String()
  48. u.AuthToken = token
  49. db.Save(u.dbUserModel)
  50. if db.Error != nil {
  51. return "", db.Error
  52. }
  53. return token, nil
  54. }
  55. // ValidateToken returns whether the given token is valid or not.
  56. func (u *User) ValidateToken(token string) bool {
  57. if u.AuthToken == "" {
  58. return false
  59. }
  60. return u.AuthToken == token
  61. }
  62. // CheckPassword returns whether the given password is correct for the user.
  63. func (u *User) CheckPassword(password string) bool {
  64. _, err := passlib.Verify(password, u.Hash)
  65. if err != nil {
  66. logrus.Error(err)
  67. return false
  68. }
  69. return true
  70. }
  71. // GetUser finds and returns the user with the given username from database.
  72. func GetUser(username string) (*User, error) {
  73. user := dbUserModel{}
  74. db.Where(&dbUserModel{Username: username}).First(&user)
  75. if db.NewRecord(&user) {
  76. // user is not found
  77. return nil, fmt.Errorf("user not found: %s", username)
  78. }
  79. return &User{dbUserModel: user}, nil
  80. }
  81. // GetUserByToken finds and returns the user with the given token from database.
  82. func GetUserByToken(token string) (*User, error) {
  83. if token == "" {
  84. return nil, fmt.Errorf("token can not be empty")
  85. }
  86. user := dbUserModel{}
  87. db.Where(&dbUserModel{AuthToken: token}).First(&user)
  88. if db.NewRecord(&user) {
  89. // user is not found
  90. return nil, fmt.Errorf("user not found by token: <token>")
  91. }
  92. return &User{dbUserModel: user}, nil
  93. }
  94. // GetAllUsers returns all recorded users in the database.
  95. func GetAllUsers() ([]*User, error) {
  96. var users []*User
  97. var dbUsers []*dbUserModel
  98. db.Find(&dbUsers)
  99. for _, u := range dbUsers {
  100. users = append(users, &User{dbUserModel: *u})
  101. }
  102. return users, nil
  103. }
  104. // CreateNewUser creates a new user with the given username and password in the database.
  105. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  106. //
  107. // It also generates the necessary client keys and signs certificates with the current
  108. // server's CA.
  109. func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*User, error) {
  110. if !IsInitialized() {
  111. return nil, fmt.Errorf("you first need to create server")
  112. }
  113. // Validate user input.
  114. if govalidator.IsNull(username) {
  115. return nil, fmt.Errorf("validation error: %s can not be null", username)
  116. }
  117. if !govalidator.Matches(username, "^([\\w\\.]+)$") { // allow alphanumeric, underscore and dot
  118. return nil, fmt.Errorf("validation error: `%s` can only contain letters, numbers, underscores and dots", username)
  119. }
  120. if username == "root" {
  121. return nil, fmt.Errorf("forbidden: username root is reserved and can not be used")
  122. }
  123. ca, err := GetSystemCA()
  124. if err != nil {
  125. return nil, err
  126. }
  127. clientCert, err := pki.NewClientCertHolder(ca, username)
  128. if err != nil {
  129. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  130. }
  131. server, err := GetServerInstance()
  132. if err != nil {
  133. return nil, fmt.Errorf("can not get server: %v", err)
  134. }
  135. if hostid != 0 {
  136. ip := HostID2IP(hostid)
  137. if ip == nil {
  138. return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
  139. }
  140. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  141. if !network.Contains(ip) {
  142. return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  143. }
  144. if hostIDsContains(getStaticHostIDs(), hostid) {
  145. return nil, fmt.Errorf("ip %s is already allocated", ip)
  146. }
  147. // Check if requested ip is allocated to the VPN server itself.
  148. serverNet := net.IPNet{
  149. IP: net.ParseIP(server.Net).To4(),
  150. Mask: net.IPMask(net.ParseIP(server.Mask).To4()),
  151. }
  152. ip, ipnet, err := net.ParseCIDR(serverNet.String())
  153. if err != nil {
  154. return nil, fmt.Errorf("can not parse: %v", err)
  155. }
  156. if hostid == IP2HostID(ipnet.IP)+1 { // If it's VPN server's IP addr, then don't allow it.
  157. return nil, fmt.Errorf("can't assign server's ip address to a user")
  158. }
  159. }
  160. user := dbUserModel{
  161. Username: username,
  162. Cert: clientCert.Cert,
  163. Key: clientCert.Key,
  164. ServerSerialNumber: server.SerialNumber,
  165. NoGW: nogw,
  166. HostID: hostid,
  167. Admin: admin,
  168. }
  169. user.setPassword(password)
  170. db.Create(&user)
  171. if db.NewRecord(&user) {
  172. // user is still not created
  173. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  174. }
  175. logrus.Infof("user created: %s", username)
  176. // Emit server config
  177. err = Emit()
  178. if err != nil {
  179. return nil, err
  180. }
  181. return &User{dbUserModel: user}, nil
  182. }
  183. // Update updates the user's attributes and writes them to the database.
  184. //
  185. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  186. func (u *User) Update(password string, nogw bool, hostid uint32, admin bool) error {
  187. if !IsInitialized() {
  188. return fmt.Errorf("you first need to create server")
  189. }
  190. // If password is provided; set it. If not; leave it as it is.
  191. if password != "" {
  192. u.setPassword(password)
  193. }
  194. u.NoGW = nogw
  195. u.HostID = hostid
  196. u.Admin = admin
  197. if hostid != 0 {
  198. server, err := GetServerInstance()
  199. if err != nil {
  200. return fmt.Errorf("can not get server: %v", err)
  201. }
  202. ip := HostID2IP(hostid)
  203. if ip == nil {
  204. return fmt.Errorf("host id doesn't represent an ip %d", hostid)
  205. }
  206. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  207. if !network.Contains(ip) {
  208. return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  209. }
  210. if u.HostID != hostid && hostIDsContains(getStaticHostIDs(), hostid) {
  211. return fmt.Errorf("ip %s is already allocated", ip)
  212. }
  213. }
  214. db.Save(u.dbUserModel)
  215. err := Emit()
  216. if err != nil {
  217. return err
  218. }
  219. return nil
  220. }
  221. // Delete deletes a user by the given username from the database.
  222. func (u *User) Delete() error {
  223. if db.NewRecord(u.dbUserModel) {
  224. // user is not found
  225. return fmt.Errorf("user is not initialized: %s", u.Username)
  226. }
  227. crt, err := pki.ReadCertFromPEM(u.Cert)
  228. if err != nil {
  229. return fmt.Errorf("can not get user's certificate: %v", err)
  230. }
  231. db.Create(&dbRevokedModel{
  232. SerialNumber: crt.SerialNumber.Text(16),
  233. })
  234. db.Unscoped().Delete(u.dbUserModel)
  235. logrus.Infof("user deleted: %s", u.GetUsername())
  236. err = Emit()
  237. if err != nil {
  238. return err
  239. }
  240. u = nil // delete the existing user struct
  241. return nil
  242. }
  243. // ResetPassword resets the users password into the provided password.
  244. func (u *User) ResetPassword(password string) error {
  245. err := u.dbUserModel.setPassword(password)
  246. if err != nil {
  247. // user password can not be updated
  248. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  249. }
  250. db.Save(u.dbUserModel)
  251. err = Emit()
  252. if err != nil {
  253. return err
  254. }
  255. logrus.Infof("user password reset: %s", u.GetUsername())
  256. return nil
  257. }
  258. // Renew creates a key and a ceritificate signed by the current server's CA.
  259. //
  260. // This is often used to sign users when the current CA is changed while there are
  261. // still existing users in the database.
  262. //
  263. // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
  264. func (u *User) Renew() error {
  265. if !IsInitialized() {
  266. return fmt.Errorf("you first need to create server")
  267. }
  268. ca, err := GetSystemCA()
  269. if err != nil {
  270. return err
  271. }
  272. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  273. if err != nil {
  274. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  275. }
  276. server, err := GetServerInstance()
  277. if err != nil {
  278. return err
  279. }
  280. u.Cert = clientCert.Cert
  281. u.Key = clientCert.Key
  282. u.ServerSerialNumber = server.SerialNumber
  283. db.Save(u.dbUserModel)
  284. err = Emit()
  285. if err != nil {
  286. return err
  287. }
  288. logrus.Infof("user renewed cert: %s", u.GetUsername())
  289. return nil
  290. }
  291. // GetUsername returns user's username.
  292. func (u *User) GetUsername() string {
  293. return u.Username
  294. }
  295. // GetCert returns user's public certificate.
  296. func (u *User) GetCert() string {
  297. return u.Cert
  298. }
  299. // GetServerSerialNumber returns user's server serial number.
  300. func (u *User) GetServerSerialNumber() string {
  301. return u.ServerSerialNumber
  302. }
  303. // GetCreatedAt returns user's creation time.
  304. func (u *User) GetCreatedAt() string {
  305. return u.CreatedAt.Format(time.UnixDate)
  306. }
  307. // getIP returns user's vpn ip addr.
  308. func (u *User) getIP() net.IP {
  309. users := getNonStaticHostUsers()
  310. staticHostIDs := getStaticHostIDs()
  311. server, err := GetServerInstance()
  312. if err != nil {
  313. logrus.Panicf("can not get server instance: %v", err)
  314. }
  315. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  316. network := net.ParseIP(server.Net).To4().Mask(mask)
  317. // If the user has static ip address, return it immediately.
  318. if u.HostID != 0 {
  319. return HostID2IP(u.HostID)
  320. }
  321. // Calculate dynamic ip addresses from a deterministic address pool.
  322. freeHostID := 0
  323. for _, user := range users {
  324. // Skip, if user is supposed to have static ip.
  325. if user.HostID != 0 {
  326. continue
  327. }
  328. // Try the next available host id.
  329. hostID := IP2HostID(network) + uint32(freeHostID)
  330. for hostIDsContains(staticHostIDs, hostID+2) {
  331. freeHostID++ // Increase the host id and try again until it is available.
  332. hostID = IP2HostID(network) + uint32(freeHostID)
  333. }
  334. if user.ID == u.ID {
  335. return HostID2IP(hostID + 2)
  336. }
  337. freeHostID++
  338. }
  339. return nil
  340. }
  341. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  342. func (u *User) GetIPNet() string {
  343. server, err := GetServerInstance()
  344. if err != nil {
  345. logrus.Panicf("can not get user ipnet: %v", err)
  346. }
  347. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  348. ipn := net.IPNet{
  349. IP: u.getIP(),
  350. Mask: mask,
  351. }
  352. return ipn.String()
  353. }
  354. // IsNoGW returns whether user is set to get the vpn server as their default gateway.
  355. func (u *User) IsNoGW() bool {
  356. return u.NoGW
  357. }
  358. // GetHostID returns user's Host ID.
  359. func (u *User) GetHostID() uint32 {
  360. return u.HostID
  361. }
  362. // IsAdmin returns whether user is admin or not.
  363. func (u *User) IsAdmin() bool {
  364. return u.Admin
  365. }
  366. func (u *User) getKey() string {
  367. return u.Key
  368. }
  369. func getStaticHostUsers() []*User {
  370. var users []*User
  371. var dbUsers []*dbUserModel
  372. db.Unscoped().Not(dbUserModel{HostID: 0}).Find(&dbUsers)
  373. for _, u := range dbUsers {
  374. users = append(users, &User{dbUserModel: *u})
  375. }
  376. return users
  377. }
  378. func getNonStaticHostUsers() []*User {
  379. var users []*User
  380. var dbUsers []*dbUserModel
  381. db.Unscoped().Where(dbUserModel{HostID: 0}).Find(&dbUsers)
  382. for _, u := range dbUsers {
  383. users = append(users, &User{dbUserModel: *u})
  384. }
  385. return users
  386. }
  387. func getStaticHostIDs() []uint32 {
  388. var ids []uint32
  389. users := getStaticHostUsers()
  390. for _, user := range users {
  391. ids = append(ids, user.HostID)
  392. }
  393. return ids
  394. }
  395. func hostIDsContains(s []uint32, e uint32) bool {
  396. for _, a := range s {
  397. if a == e {
  398. return true
  399. }
  400. }
  401. return false
  402. }