rpc.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601
  1. package api
  2. import (
  3. "os"
  4. "google.golang.org/grpc"
  5. "google.golang.org/grpc/codes"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/cad/ovpm"
  8. "github.com/cad/ovpm/api/pb"
  9. "github.com/cad/ovpm/permset"
  10. "golang.org/x/net/context"
  11. )
  12. type AuthService struct{}
  13. func (s *AuthService) Status(ctx context.Context, req *pb.AuthStatusRequest) (*pb.AuthStatusResponse, error) {
  14. logrus.Debug("rpc call: auth status")
  15. username, err := GetUsernameFromContext(ctx)
  16. if err != nil {
  17. logrus.Debugln(err)
  18. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  19. }
  20. if username == "root" {
  21. userResp := pb.UserResponse_User{
  22. Username: username,
  23. IsAdmin: true,
  24. }
  25. return &pb.AuthStatusResponse{User: &userResp, IsRoot: true}, nil
  26. }
  27. user, err := ovpm.GetUser(username)
  28. if err != nil {
  29. logrus.Debugln(err)
  30. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  31. }
  32. userResp := pb.UserResponse_User{
  33. Username: user.GetUsername(),
  34. IsAdmin: user.IsAdmin(),
  35. }
  36. return &pb.AuthStatusResponse{User: &userResp}, nil
  37. }
  38. func (s *AuthService) Authenticate(ctx context.Context, req *pb.AuthAuthenticateRequest) (*pb.AuthAuthenticateResponse, error) {
  39. logrus.Debug("rpc call: auth authenticate")
  40. user, err := ovpm.GetUser(req.Username)
  41. if err != nil {
  42. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  43. }
  44. if !user.CheckPassword(req.Password) {
  45. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  46. }
  47. token, err := user.RenewToken()
  48. if err != nil {
  49. return nil, grpc.Errorf(codes.Internal, "token can not be generated")
  50. }
  51. return &pb.AuthAuthenticateResponse{Token: token}, nil
  52. }
  53. type UserService struct{}
  54. func (s *UserService) List(ctx context.Context, req *pb.UserListRequest) (*pb.UserResponse, error) {
  55. logrus.Debug("rpc call: user list")
  56. perms, err := permset.FromContext(ctx)
  57. if err != nil {
  58. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  59. }
  60. // Check perms.
  61. if !perms.Contains(ovpm.GetAnyUserPerm) {
  62. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetAnyUserPerm is required for this operation")
  63. }
  64. var ut []*pb.UserResponse_User
  65. users, err := ovpm.GetAllUsers()
  66. if err != nil {
  67. logrus.Errorf("users can not be fetched: %v", err)
  68. os.Exit(1)
  69. return nil, err
  70. }
  71. for _, user := range users {
  72. ut = append(ut, &pb.UserResponse_User{
  73. ServerSerialNumber: user.GetServerSerialNumber(),
  74. Username: user.GetUsername(),
  75. CreatedAt: user.GetCreatedAt(),
  76. IpNet: user.GetIPNet(),
  77. NoGw: user.IsNoGW(),
  78. HostId: user.GetHostID(),
  79. IsAdmin: user.IsAdmin(),
  80. })
  81. }
  82. return &pb.UserResponse{Users: ut}, nil
  83. }
  84. func (s *UserService) Create(ctx context.Context, req *pb.UserCreateRequest) (*pb.UserResponse, error) {
  85. logrus.Debugf("rpc call: user create: %s", req.Username)
  86. perms, err := permset.FromContext(ctx)
  87. if err != nil {
  88. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  89. }
  90. // Check perms.
  91. if !perms.Contains(ovpm.CreateUserPerm) {
  92. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateUserPerm is required for this operation")
  93. }
  94. var ut []*pb.UserResponse_User
  95. user, err := ovpm.CreateNewUser(req.Username, req.Password, req.NoGw, req.HostId, req.IsAdmin)
  96. if err != nil {
  97. return nil, err
  98. }
  99. pbUser := pb.UserResponse_User{
  100. Username: user.GetUsername(),
  101. ServerSerialNumber: user.GetServerSerialNumber(),
  102. NoGw: user.IsNoGW(),
  103. HostId: user.GetHostID(),
  104. IsAdmin: user.IsAdmin(),
  105. }
  106. ut = append(ut, &pbUser)
  107. return &pb.UserResponse{Users: ut}, nil
  108. }
  109. func (s *UserService) Update(ctx context.Context, req *pb.UserUpdateRequest) (*pb.UserResponse, error) {
  110. logrus.Debugf("rpc call: user update: %s", req.Username)
  111. var ut []*pb.UserResponse_User
  112. user, err := ovpm.GetUser(req.Username)
  113. if err != nil {
  114. return nil, err
  115. }
  116. var noGW bool
  117. switch req.Gwpref {
  118. case pb.UserUpdateRequest_NOGW:
  119. noGW = true
  120. case pb.UserUpdateRequest_GW:
  121. noGW = false
  122. default:
  123. noGW = user.NoGW
  124. }
  125. var admin bool
  126. switch req.AdminPref {
  127. case pb.UserUpdateRequest_ADMIN:
  128. admin = true
  129. case pb.UserUpdateRequest_NOADMIN:
  130. admin = false
  131. case pb.UserUpdateRequest_NOPREFADMIN:
  132. admin = user.IsAdmin()
  133. }
  134. perms, err := permset.FromContext(ctx)
  135. if err != nil {
  136. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  137. }
  138. username, err := GetUsernameFromContext(ctx)
  139. if err != nil {
  140. logrus.Debugln(err)
  141. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  142. }
  143. // User has admin perms?
  144. if perms.Contains(ovpm.UpdateAnyUserPerm) {
  145. err = user.Update(req.Password, noGW, req.HostId, admin)
  146. if err != nil {
  147. return nil, err
  148. }
  149. ut = append(ut, &pb.UserResponse_User{
  150. Username: user.GetUsername(),
  151. ServerSerialNumber: user.GetServerSerialNumber(),
  152. NoGw: user.IsNoGW(),
  153. HostId: user.GetHostID(),
  154. IsAdmin: user.IsAdmin(),
  155. })
  156. return &pb.UserResponse{Users: ut}, nil
  157. }
  158. // User has self update perms?
  159. if perms.Contains(ovpm.UpdateSelfPerm) {
  160. if user.GetUsername() != username {
  161. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only update their user with ovpm.UpdateSelfPerm")
  162. }
  163. err = user.Update(req.Password, noGW, req.HostId, admin)
  164. if err != nil {
  165. return nil, err
  166. }
  167. ut = append(ut, &pb.UserResponse_User{
  168. Username: user.GetUsername(),
  169. ServerSerialNumber: user.GetServerSerialNumber(),
  170. NoGw: user.IsNoGW(),
  171. HostId: user.GetHostID(),
  172. IsAdmin: user.IsAdmin(),
  173. })
  174. return &pb.UserResponse{Users: ut}, nil
  175. }
  176. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  177. }
  178. func (s *UserService) Delete(ctx context.Context, req *pb.UserDeleteRequest) (*pb.UserResponse, error) {
  179. logrus.Debugf("rpc call: user delete: %s", req.Username)
  180. var ut []*pb.UserResponse_User
  181. user, err := ovpm.GetUser(req.Username)
  182. if err != nil {
  183. return nil, err
  184. }
  185. perms, err := permset.FromContext(ctx)
  186. if err != nil {
  187. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  188. }
  189. if !perms.Contains(ovpm.DeleteAnyUserPerm) {
  190. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteAnyUserPerm is required for this operation.")
  191. }
  192. pbUser := pb.UserResponse_User{
  193. Username: user.GetUsername(),
  194. ServerSerialNumber: user.GetServerSerialNumber(),
  195. HostId: user.GetHostID(),
  196. IsAdmin: user.IsAdmin(),
  197. }
  198. ut = append(ut, &pbUser)
  199. err = user.Delete()
  200. if err != nil {
  201. return nil, err
  202. }
  203. return &pb.UserResponse{Users: ut}, nil
  204. }
  205. func (s *UserService) Renew(ctx context.Context, req *pb.UserRenewRequest) (*pb.UserResponse, error) {
  206. logrus.Debugf("rpc call: user renew cert: %s", req.Username)
  207. var ut []*pb.UserResponse_User
  208. user, err := ovpm.GetUser(req.Username)
  209. if err != nil {
  210. return nil, err
  211. }
  212. pbUser := pb.UserResponse_User{
  213. Username: user.GetUsername(),
  214. ServerSerialNumber: user.GetServerSerialNumber(),
  215. HostId: user.GetHostID(),
  216. IsAdmin: user.IsAdmin(),
  217. }
  218. ut = append(ut, &pbUser)
  219. perms, err := permset.FromContext(ctx)
  220. if err != nil {
  221. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  222. }
  223. if !perms.Contains(ovpm.RenewAnyUserPerm) {
  224. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.RenewAnyUserPerm is required for this operation.")
  225. }
  226. err = user.Renew()
  227. if err != nil {
  228. return nil, err
  229. }
  230. return &pb.UserResponse{Users: ut}, nil
  231. }
  232. func (s *UserService) GenConfig(ctx context.Context, req *pb.UserGenConfigRequest) (*pb.UserGenConfigResponse, error) {
  233. logrus.Debugf("rpc call: user genconfig: %s", req.Username)
  234. user, err := ovpm.GetUser(req.Username)
  235. if err != nil {
  236. return nil, err
  237. }
  238. username, err := GetUsernameFromContext(ctx)
  239. if err != nil {
  240. logrus.Debugln(err)
  241. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  242. }
  243. perms, err := permset.FromContext(ctx)
  244. if err != nil {
  245. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  246. }
  247. if perms.Contains(ovpm.GenConfigAnyUserPerm) {
  248. configBlob, err := ovpm.DumpsClientConfig(user.GetUsername())
  249. if err != nil {
  250. return nil, err
  251. }
  252. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  253. }
  254. if perms.Contains(ovpm.GenConfigSelfPerm) {
  255. if user.GetUsername() != username {
  256. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only genconfig for their user.")
  257. }
  258. configBlob, err := ovpm.DumpsClientConfig(user.GetUsername())
  259. if err != nil {
  260. return nil, err
  261. }
  262. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  263. }
  264. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  265. }
  266. type VPNService struct{}
  267. func (s *VPNService) Status(ctx context.Context, req *pb.VPNStatusRequest) (*pb.VPNStatusResponse, error) {
  268. logrus.Debugf("rpc call: vpn status")
  269. server, err := ovpm.GetServerInstance()
  270. if err != nil {
  271. return nil, err
  272. }
  273. perms, err := permset.FromContext(ctx)
  274. if err != nil {
  275. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  276. }
  277. if !perms.Contains(ovpm.GetVPNStatusPerm) {
  278. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetVPNStatusPerm is required for this operation.")
  279. }
  280. response := pb.VPNStatusResponse{
  281. Name: server.GetServerName(),
  282. SerialNumber: server.GetSerialNumber(),
  283. Hostname: server.GetHostname(),
  284. Port: server.GetPort(),
  285. Proto: server.GetProto(),
  286. Cert: server.GetCert(),
  287. CaCert: server.GetCACert(),
  288. Net: server.GetNet(),
  289. Mask: server.GetMask(),
  290. CreatedAt: server.GetCreatedAt(),
  291. Dns: server.GetDNS(),
  292. }
  293. return &response, nil
  294. }
  295. func (s *VPNService) Init(ctx context.Context, req *pb.VPNInitRequest) (*pb.VPNInitResponse, error) {
  296. logrus.Debugf("rpc call: vpn init")
  297. var proto string
  298. switch req.ProtoPref {
  299. case pb.VPNProto_TCP:
  300. proto = ovpm.TCPProto
  301. case pb.VPNProto_UDP:
  302. proto = ovpm.UDPProto
  303. case pb.VPNProto_NOPREF:
  304. proto = ovpm.UDPProto
  305. }
  306. perms, err := permset.FromContext(ctx)
  307. if err != nil {
  308. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  309. }
  310. if !perms.Contains(ovpm.InitVPNPerm) {
  311. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.InitVPNPerm is required for this operation.")
  312. }
  313. if err := ovpm.Init(req.Hostname, req.Port, proto, req.IpBlock, req.Dns); err != nil {
  314. logrus.Errorf("server can not be created: %v", err)
  315. }
  316. return &pb.VPNInitResponse{}, nil
  317. }
  318. func (s *VPNService) Update(ctx context.Context, req *pb.VPNUpdateRequest) (*pb.VPNUpdateResponse, error) {
  319. logrus.Debugf("rpc call: vpn update")
  320. perms, err := permset.FromContext(ctx)
  321. if err != nil {
  322. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  323. }
  324. if !perms.Contains(ovpm.UpdateVPNPerm) {
  325. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.UpdateVPNPerm is required for this operation.")
  326. }
  327. if err := ovpm.Update(req.IpBlock, req.Dns); err != nil {
  328. logrus.Errorf("server can not be updated: %v", err)
  329. }
  330. return &pb.VPNUpdateResponse{}, nil
  331. }
  332. func (s *VPNService) Restart(ctx context.Context, req *pb.VPNRestartRequest) (*pb.VPNRestartResponse, error) {
  333. logrus.Debugf("rpc call: vpn restart")
  334. perms, err := permset.FromContext(ctx)
  335. if err != nil {
  336. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  337. }
  338. if !perms.Contains(ovpm.RestartVPNPerm) {
  339. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.UpdateVPNPerm is required for this operation.")
  340. }
  341. ovpm.RestartVPNProc()
  342. return &pb.VPNRestartResponse{}, nil
  343. }
  344. type NetworkService struct{}
  345. func (s *NetworkService) List(ctx context.Context, req *pb.NetworkListRequest) (*pb.NetworkListResponse, error) {
  346. logrus.Debug("rpc call: network list")
  347. var nt []*pb.Network
  348. perms, err := permset.FromContext(ctx)
  349. if err != nil {
  350. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  351. }
  352. if !perms.Contains(ovpm.ListNetworksPerm) {
  353. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.ListNetworksPerm is required for this operation.")
  354. }
  355. networks := ovpm.GetAllNetworks()
  356. for _, network := range networks {
  357. nt = append(nt, &pb.Network{
  358. Name: network.GetName(),
  359. Cidr: network.GetCIDR(),
  360. Type: network.GetType().String(),
  361. CreatedAt: network.GetCreatedAt(),
  362. AssociatedUsernames: network.GetAssociatedUsernames(),
  363. Via: network.GetVia(),
  364. })
  365. }
  366. return &pb.NetworkListResponse{Networks: nt}, nil
  367. }
  368. func (s *NetworkService) Create(ctx context.Context, req *pb.NetworkCreateRequest) (*pb.NetworkCreateResponse, error) {
  369. logrus.Debugf("rpc call: network create: %s", req.Name)
  370. perms, err := permset.FromContext(ctx)
  371. if err != nil {
  372. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  373. }
  374. if !perms.Contains(ovpm.CreateNetworkPerm) {
  375. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateNetworkPerm is required for this operation.")
  376. }
  377. network, err := ovpm.CreateNewNetwork(req.Name, req.Cidr, ovpm.NetworkTypeFromString(req.Type), req.Via)
  378. if err != nil {
  379. return nil, err
  380. }
  381. n := pb.Network{
  382. Name: network.GetName(),
  383. Cidr: network.GetCIDR(),
  384. Type: network.GetType().String(),
  385. CreatedAt: network.GetCreatedAt(),
  386. AssociatedUsernames: network.GetAssociatedUsernames(),
  387. Via: network.GetVia(),
  388. }
  389. return &pb.NetworkCreateResponse{Network: &n}, nil
  390. }
  391. func (s *NetworkService) Delete(ctx context.Context, req *pb.NetworkDeleteRequest) (*pb.NetworkDeleteResponse, error) {
  392. logrus.Debugf("rpc call: network delete: %s", req.Name)
  393. perms, err := permset.FromContext(ctx)
  394. if err != nil {
  395. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  396. }
  397. if !perms.Contains(ovpm.DeleteNetworkPerm) {
  398. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteNetworkPerm is required for this operation.")
  399. }
  400. network, err := ovpm.GetNetwork(req.Name)
  401. if err != nil {
  402. return nil, err
  403. }
  404. err = network.Delete()
  405. if err != nil {
  406. return nil, err
  407. }
  408. n := pb.Network{
  409. Name: network.GetName(),
  410. Cidr: network.GetCIDR(),
  411. Type: network.GetType().String(),
  412. CreatedAt: network.GetCreatedAt(),
  413. AssociatedUsernames: network.GetAssociatedUsernames(),
  414. Via: network.GetVia(),
  415. }
  416. return &pb.NetworkDeleteResponse{Network: &n}, nil
  417. }
  418. func (s *NetworkService) GetAllTypes(ctx context.Context, req *pb.NetworkGetAllTypesRequest) (*pb.NetworkGetAllTypesResponse, error) {
  419. logrus.Debugf("rpc call: network get-types")
  420. var networkTypes []*pb.NetworkType
  421. perms, err := permset.FromContext(ctx)
  422. if err != nil {
  423. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  424. }
  425. if !perms.Contains(ovpm.GetNetworkTypesPerm) {
  426. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkTypesPerm is required for this operation.")
  427. }
  428. for _, nt := range ovpm.GetAllNetworkTypes() {
  429. if nt == ovpm.UNDEFINEDNET {
  430. continue
  431. }
  432. networkTypes = append(networkTypes, &pb.NetworkType{Type: nt.String(), Description: nt.Description()})
  433. }
  434. return &pb.NetworkGetAllTypesResponse{Types: networkTypes}, nil
  435. }
  436. func (s *NetworkService) GetAssociatedUsers(ctx context.Context, req *pb.NetworkGetAssociatedUsersRequest) (*pb.NetworkGetAssociatedUsersResponse, error) {
  437. logrus.Debugf("rpc call: network get-associated-users")
  438. perms, err := permset.FromContext(ctx)
  439. if err != nil {
  440. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  441. }
  442. if !perms.Contains(ovpm.GetNetworkAssociatedUsersPerm) {
  443. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkAssociatedUsersPerm is required for this operation.")
  444. }
  445. network, err := ovpm.GetNetwork(req.Name)
  446. if err != nil {
  447. return nil, err
  448. }
  449. usernames := network.GetAssociatedUsernames()
  450. return &pb.NetworkGetAssociatedUsersResponse{Usernames: usernames}, nil
  451. }
  452. func (s *NetworkService) Associate(ctx context.Context, req *pb.NetworkAssociateRequest) (*pb.NetworkAssociateResponse, error) {
  453. logrus.Debugf("rpc call: network associate")
  454. perms, err := permset.FromContext(ctx)
  455. if err != nil {
  456. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  457. }
  458. if !perms.Contains(ovpm.AssociateNetworkUserPerm) {
  459. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.AssociateNetworkUserPerm is required for this operation.")
  460. }
  461. network, err := ovpm.GetNetwork(req.Name)
  462. if err != nil {
  463. return nil, err
  464. }
  465. err = network.Associate(req.Username)
  466. if err != nil {
  467. return nil, err
  468. }
  469. return &pb.NetworkAssociateResponse{}, nil
  470. }
  471. func (s *NetworkService) Dissociate(ctx context.Context, req *pb.NetworkDissociateRequest) (*pb.NetworkDissociateResponse, error) {
  472. logrus.Debugf("rpc call: network dissociate")
  473. perms, err := permset.FromContext(ctx)
  474. if err != nil {
  475. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  476. }
  477. if !perms.Contains(ovpm.DissociateNetworkUserPerm) {
  478. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DissociateNetworkUserPerm is required for this operation.")
  479. }
  480. network, err := ovpm.GetNetwork(req.Name)
  481. if err != nil {
  482. return nil, err
  483. }
  484. err = network.Dissociate(req.Username)
  485. if err != nil {
  486. return nil, err
  487. }
  488. return &pb.NetworkDissociateResponse{}, nil
  489. }
  490. // NewRPCServer returns a new gRPC server.
  491. func NewRPCServer() *grpc.Server {
  492. var opts []grpc.ServerOption
  493. opts = append(opts, grpc.UnaryInterceptor(AuthUnaryInterceptor))
  494. s := grpc.NewServer(opts...)
  495. //s := grpc.NewServer()
  496. pb.RegisterUserServiceServer(s, &UserService{})
  497. pb.RegisterVPNServiceServer(s, &VPNService{})
  498. pb.RegisterNetworkServiceServer(s, &NetworkService{})
  499. pb.RegisterAuthServiceServer(s, &AuthService{})
  500. return s
  501. }