rpc.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401
  1. package api
  2. import (
  3. "os"
  4. "google.golang.org/grpc"
  5. "google.golang.org/grpc/codes"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/cad/ovpm"
  8. "github.com/cad/ovpm/api/pb"
  9. "golang.org/x/net/context"
  10. )
  11. type AuthService struct{}
  12. func (s *AuthService) Status(ctx context.Context, req *pb.AuthStatusRequest) (*pb.AuthStatusResponse, error) {
  13. logrus.Debug("rpc call: auth status")
  14. username, err := GetUsernameFromContext(ctx)
  15. if err != nil {
  16. logrus.Debugln(err)
  17. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  18. }
  19. if username == "root" {
  20. userResp := pb.UserResponse_User{
  21. Username: username,
  22. IsAdmin: true,
  23. }
  24. return &pb.AuthStatusResponse{User: &userResp, IsRoot: true}, nil
  25. }
  26. user, err := ovpm.GetUser(username)
  27. if err != nil {
  28. logrus.Debugln(err)
  29. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  30. }
  31. userResp := pb.UserResponse_User{
  32. Username: user.GetUsername(),
  33. IsAdmin: user.IsAdmin(),
  34. }
  35. return &pb.AuthStatusResponse{User: &userResp}, nil
  36. }
  37. func (s *AuthService) Authenticate(ctx context.Context, req *pb.AuthAuthenticateRequest) (*pb.AuthAuthenticateResponse, error) {
  38. logrus.Debug("rpc call: auth authenticate")
  39. user, err := ovpm.GetUser(req.Username)
  40. if err != nil {
  41. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  42. }
  43. if !user.CheckPassword(req.Password) {
  44. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  45. }
  46. token, err := user.RenewToken()
  47. if err != nil {
  48. return nil, grpc.Errorf(codes.Internal, "token can not be generated")
  49. }
  50. return &pb.AuthAuthenticateResponse{Token: token}, nil
  51. }
  52. type UserService struct{}
  53. func (s *UserService) List(ctx context.Context, req *pb.UserListRequest) (*pb.UserResponse, error) {
  54. logrus.Debug("rpc call: user list")
  55. var ut []*pb.UserResponse_User
  56. users, err := ovpm.GetAllUsers()
  57. if err != nil {
  58. logrus.Errorf("users can not be fetched: %v", err)
  59. os.Exit(1)
  60. return nil, err
  61. }
  62. for _, user := range users {
  63. ut = append(ut, &pb.UserResponse_User{
  64. ServerSerialNumber: user.GetServerSerialNumber(),
  65. Username: user.GetUsername(),
  66. CreatedAt: user.GetCreatedAt(),
  67. IpNet: user.GetIPNet(),
  68. NoGw: user.IsNoGW(),
  69. HostId: user.GetHostID(),
  70. IsAdmin: user.IsAdmin(),
  71. })
  72. }
  73. return &pb.UserResponse{Users: ut}, nil
  74. }
  75. func (s *UserService) Create(ctx context.Context, req *pb.UserCreateRequest) (*pb.UserResponse, error) {
  76. logrus.Debugf("rpc call: user create: %s", req.Username)
  77. var ut []*pb.UserResponse_User
  78. user, err := ovpm.CreateNewUser(req.Username, req.Password, req.NoGw, req.HostId, req.IsAdmin)
  79. if err != nil {
  80. return nil, err
  81. }
  82. pbUser := pb.UserResponse_User{
  83. Username: user.GetUsername(),
  84. ServerSerialNumber: user.GetServerSerialNumber(),
  85. NoGw: user.IsNoGW(),
  86. HostId: user.GetHostID(),
  87. IsAdmin: user.IsAdmin(),
  88. }
  89. ut = append(ut, &pbUser)
  90. return &pb.UserResponse{Users: ut}, nil
  91. }
  92. func (s *UserService) Update(ctx context.Context, req *pb.UserUpdateRequest) (*pb.UserResponse, error) {
  93. logrus.Debugf("rpc call: user update: %s", req.Username)
  94. var ut []*pb.UserResponse_User
  95. user, err := ovpm.GetUser(req.Username)
  96. if err != nil {
  97. return nil, err
  98. }
  99. var noGW bool
  100. switch req.Gwpref {
  101. case pb.UserUpdateRequest_NOGW:
  102. noGW = true
  103. case pb.UserUpdateRequest_GW:
  104. noGW = false
  105. default:
  106. noGW = user.NoGW
  107. }
  108. var admin bool
  109. switch req.AdminPref {
  110. case pb.UserUpdateRequest_ADMIN:
  111. admin = true
  112. case pb.UserUpdateRequest_NOADMIN:
  113. admin = false
  114. case pb.UserUpdateRequest_NOPREFADMIN:
  115. admin = user.IsAdmin()
  116. }
  117. err = user.Update(req.Password, noGW, req.HostId, admin)
  118. if err != nil {
  119. return nil, err
  120. }
  121. pbUser := pb.UserResponse_User{
  122. Username: user.GetUsername(),
  123. ServerSerialNumber: user.GetServerSerialNumber(),
  124. NoGw: user.IsNoGW(),
  125. HostId: user.GetHostID(),
  126. IsAdmin: user.IsAdmin(),
  127. }
  128. ut = append(ut, &pbUser)
  129. return &pb.UserResponse{Users: ut}, nil
  130. }
  131. func (s *UserService) Delete(ctx context.Context, req *pb.UserDeleteRequest) (*pb.UserResponse, error) {
  132. logrus.Debugf("rpc call: user delete: %s", req.Username)
  133. var ut []*pb.UserResponse_User
  134. user, err := ovpm.GetUser(req.Username)
  135. if err != nil {
  136. return nil, err
  137. }
  138. pbUser := pb.UserResponse_User{
  139. Username: user.GetUsername(),
  140. ServerSerialNumber: user.GetServerSerialNumber(),
  141. HostId: user.GetHostID(),
  142. IsAdmin: user.IsAdmin(),
  143. }
  144. ut = append(ut, &pbUser)
  145. err = user.Delete()
  146. if err != nil {
  147. return nil, err
  148. }
  149. return &pb.UserResponse{Users: ut}, nil
  150. }
  151. func (s *UserService) Renew(ctx context.Context, req *pb.UserRenewRequest) (*pb.UserResponse, error) {
  152. logrus.Debugf("rpc call: user renew cert: %s", req.Username)
  153. var ut []*pb.UserResponse_User
  154. user, err := ovpm.GetUser(req.Username)
  155. if err != nil {
  156. return nil, err
  157. }
  158. pbUser := pb.UserResponse_User{
  159. Username: user.GetUsername(),
  160. ServerSerialNumber: user.GetServerSerialNumber(),
  161. HostId: user.GetHostID(),
  162. IsAdmin: user.IsAdmin(),
  163. }
  164. ut = append(ut, &pbUser)
  165. err = user.Renew()
  166. if err != nil {
  167. return nil, err
  168. }
  169. return &pb.UserResponse{Users: ut}, nil
  170. }
  171. func (s *UserService) GenConfig(ctx context.Context, req *pb.UserGenConfigRequest) (*pb.UserGenConfigResponse, error) {
  172. logrus.Debugf("rpc call: user genconfig: %s", req.Username)
  173. user, err := ovpm.GetUser(req.Username)
  174. if err != nil {
  175. return nil, err
  176. }
  177. configBlob, err := ovpm.DumpsClientConfig(user.GetUsername())
  178. if err != nil {
  179. return nil, err
  180. }
  181. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  182. }
  183. type VPNService struct{}
  184. func (s *VPNService) Status(ctx context.Context, req *pb.VPNStatusRequest) (*pb.VPNStatusResponse, error) {
  185. logrus.Debugf("rpc call: vpn status")
  186. server, err := ovpm.GetServerInstance()
  187. if err != nil {
  188. return nil, err
  189. }
  190. response := pb.VPNStatusResponse{
  191. Name: server.GetServerName(),
  192. SerialNumber: server.GetSerialNumber(),
  193. Hostname: server.GetHostname(),
  194. Port: server.GetPort(),
  195. Proto: server.GetProto(),
  196. Cert: server.GetCert(),
  197. CaCert: server.GetCACert(),
  198. Net: server.GetNet(),
  199. Mask: server.GetMask(),
  200. CreatedAt: server.GetCreatedAt(),
  201. Dns: server.GetDNS(),
  202. }
  203. return &response, nil
  204. }
  205. func (s *VPNService) Init(ctx context.Context, req *pb.VPNInitRequest) (*pb.VPNInitResponse, error) {
  206. logrus.Debugf("rpc call: vpn init")
  207. var proto string
  208. switch req.ProtoPref {
  209. case pb.VPNProto_TCP:
  210. proto = ovpm.TCPProto
  211. case pb.VPNProto_UDP:
  212. proto = ovpm.UDPProto
  213. case pb.VPNProto_NOPREF:
  214. proto = ovpm.UDPProto
  215. }
  216. if err := ovpm.Init(req.Hostname, req.Port, proto, req.IpBlock, req.Dns); err != nil {
  217. logrus.Errorf("server can not be created: %v", err)
  218. }
  219. return &pb.VPNInitResponse{}, nil
  220. }
  221. func (s *VPNService) Update(ctx context.Context, req *pb.VPNUpdateRequest) (*pb.VPNUpdateResponse, error) {
  222. logrus.Debugf("rpc call: vpn update")
  223. if err := ovpm.Update(req.IpBlock, req.Dns); err != nil {
  224. logrus.Errorf("server can not be updated: %v", err)
  225. }
  226. return &pb.VPNUpdateResponse{}, nil
  227. }
  228. type NetworkService struct{}
  229. func (s *NetworkService) List(ctx context.Context, req *pb.NetworkListRequest) (*pb.NetworkListResponse, error) {
  230. logrus.Debug("rpc call: network list")
  231. var nt []*pb.Network
  232. networks := ovpm.GetAllNetworks()
  233. for _, network := range networks {
  234. nt = append(nt, &pb.Network{
  235. Name: network.GetName(),
  236. Cidr: network.GetCIDR(),
  237. Type: network.GetType().String(),
  238. CreatedAt: network.GetCreatedAt(),
  239. AssociatedUsernames: network.GetAssociatedUsernames(),
  240. Via: network.GetVia(),
  241. })
  242. }
  243. return &pb.NetworkListResponse{Networks: nt}, nil
  244. }
  245. func (s *NetworkService) Create(ctx context.Context, req *pb.NetworkCreateRequest) (*pb.NetworkCreateResponse, error) {
  246. logrus.Debugf("rpc call: network create: %s", req.Name)
  247. network, err := ovpm.CreateNewNetwork(req.Name, req.Cidr, ovpm.NetworkTypeFromString(req.Type), req.Via)
  248. if err != nil {
  249. return nil, err
  250. }
  251. n := pb.Network{
  252. Name: network.GetName(),
  253. Cidr: network.GetCIDR(),
  254. Type: network.GetType().String(),
  255. CreatedAt: network.GetCreatedAt(),
  256. AssociatedUsernames: network.GetAssociatedUsernames(),
  257. Via: network.GetVia(),
  258. }
  259. return &pb.NetworkCreateResponse{Network: &n}, nil
  260. }
  261. func (s *NetworkService) Delete(ctx context.Context, req *pb.NetworkDeleteRequest) (*pb.NetworkDeleteResponse, error) {
  262. logrus.Debugf("rpc call: network delete: %s", req.Name)
  263. network, err := ovpm.GetNetwork(req.Name)
  264. if err != nil {
  265. return nil, err
  266. }
  267. err = network.Delete()
  268. if err != nil {
  269. return nil, err
  270. }
  271. n := pb.Network{
  272. Name: network.GetName(),
  273. Cidr: network.GetCIDR(),
  274. Type: network.GetType().String(),
  275. CreatedAt: network.GetCreatedAt(),
  276. AssociatedUsernames: network.GetAssociatedUsernames(),
  277. Via: network.GetVia(),
  278. }
  279. return &pb.NetworkDeleteResponse{Network: &n}, nil
  280. }
  281. func (s *NetworkService) GetAllTypes(ctx context.Context, req *pb.NetworkGetAllTypesRequest) (*pb.NetworkGetAllTypesResponse, error) {
  282. logrus.Debugf("rpc call: network get-types")
  283. var networkTypes []*pb.NetworkType
  284. for _, nt := range ovpm.GetAllNetworkTypes() {
  285. if nt == ovpm.UNDEFINEDNET {
  286. continue
  287. }
  288. networkTypes = append(networkTypes, &pb.NetworkType{Type: nt.String(), Description: nt.Description()})
  289. }
  290. return &pb.NetworkGetAllTypesResponse{Types: networkTypes}, nil
  291. }
  292. func (s *NetworkService) GetAssociatedUsers(ctx context.Context, req *pb.NetworkGetAssociatedUsersRequest) (*pb.NetworkGetAssociatedUsersResponse, error) {
  293. logrus.Debugf("rpc call: network get-associated-users")
  294. network, err := ovpm.GetNetwork(req.Name)
  295. if err != nil {
  296. return nil, err
  297. }
  298. usernames := network.GetAssociatedUsernames()
  299. return &pb.NetworkGetAssociatedUsersResponse{Usernames: usernames}, nil
  300. }
  301. func (s *NetworkService) Associate(ctx context.Context, req *pb.NetworkAssociateRequest) (*pb.NetworkAssociateResponse, error) {
  302. logrus.Debugf("rpc call: network associate")
  303. network, err := ovpm.GetNetwork(req.Name)
  304. if err != nil {
  305. return nil, err
  306. }
  307. err = network.Associate(req.Username)
  308. if err != nil {
  309. return nil, err
  310. }
  311. return &pb.NetworkAssociateResponse{}, nil
  312. }
  313. func (s *NetworkService) Dissociate(ctx context.Context, req *pb.NetworkDissociateRequest) (*pb.NetworkDissociateResponse, error) {
  314. logrus.Debugf("rpc call: network dissociate")
  315. network, err := ovpm.GetNetwork(req.Name)
  316. if err != nil {
  317. return nil, err
  318. }
  319. err = network.Dissociate(req.Username)
  320. if err != nil {
  321. return nil, err
  322. }
  323. return &pb.NetworkDissociateResponse{}, nil
  324. }
  325. // NewRPCServer returns a new gRPC server.
  326. func NewRPCServer() *grpc.Server {
  327. var opts []grpc.ServerOption
  328. opts = append(opts, grpc.UnaryInterceptor(AuthUnaryInterceptor))
  329. s := grpc.NewServer(opts...)
  330. //s := grpc.NewServer()
  331. pb.RegisterUserServiceServer(s, &UserService{})
  332. pb.RegisterVPNServiceServer(s, &VPNService{})
  333. pb.RegisterNetworkServiceServer(s, &NetworkService{})
  334. pb.RegisterAuthServiceServer(s, &AuthService{})
  335. return s
  336. }