user.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "os"
  6. "time"
  7. passlib "gopkg.in/hlandau/passlib.v1"
  8. "github.com/Sirupsen/logrus"
  9. "github.com/asaskevich/govalidator"
  10. "github.com/cad/ovpm/pki"
  11. "github.com/google/uuid"
  12. "github.com/jinzhu/gorm"
  13. )
  14. // dbRevokedModel is a database model for revoked VPN users.
  15. type dbRevokedModel struct {
  16. gorm.Model
  17. SerialNumber string
  18. }
  19. // dbUserModel is database model for VPN users.
  20. type dbUserModel struct {
  21. gorm.Model
  22. ServerID uint
  23. Server dbServerModel
  24. Username string `gorm:"unique_index"`
  25. Cert string // not user writable
  26. ServerSerialNumber string // not user writable
  27. Hash string
  28. Key string // not user writable
  29. NoGW bool
  30. HostID uint32 // not user writable
  31. Admin bool
  32. AuthToken string // auth token
  33. }
  34. // User represents a vpn user.
  35. type User struct {
  36. dbUserModel // persisted fields
  37. isConnected bool
  38. connectedSince time.Time
  39. bytesReceived uint64
  40. bytesSent uint64
  41. }
  42. func (u *dbUserModel) setPassword(password string) error {
  43. hashedPassword, err := passlib.Hash(password)
  44. if err != nil {
  45. return fmt.Errorf("can not set password: %v", err)
  46. }
  47. u.Hash = hashedPassword
  48. return nil
  49. }
  50. // RenewToken generates a new AuthToken and sets it to the db.
  51. func (u *User) RenewToken() (string, error) {
  52. token := uuid.New().String()
  53. u.AuthToken = token
  54. db.Save(u.dbUserModel)
  55. if db.Error != nil {
  56. return "", db.Error
  57. }
  58. return token, nil
  59. }
  60. // ValidateToken returns whether the given token is valid or not.
  61. func (u *User) ValidateToken(token string) bool {
  62. if u.AuthToken == "" {
  63. return false
  64. }
  65. return u.AuthToken == token
  66. }
  67. // CheckPassword returns whether the given password is correct for the user.
  68. func (u *User) CheckPassword(password string) bool {
  69. _, err := passlib.Verify(password, u.Hash)
  70. if err != nil {
  71. logrus.Error(err)
  72. return false
  73. }
  74. return true
  75. }
  76. // GetUser finds and returns the user with the given username from database.
  77. func GetUser(username string) (*User, error) {
  78. user := dbUserModel{}
  79. db.Where(&dbUserModel{Username: username}).First(&user)
  80. if db.NewRecord(&user) {
  81. // user is not found
  82. return nil, fmt.Errorf("user not found: %s", username)
  83. }
  84. return &User{dbUserModel: user}, nil
  85. }
  86. // GetUserByToken finds and returns the user with the given token from database.
  87. func GetUserByToken(token string) (*User, error) {
  88. if token == "" {
  89. return nil, fmt.Errorf("token can not be empty")
  90. }
  91. user := dbUserModel{}
  92. db.Where(&dbUserModel{AuthToken: token}).First(&user)
  93. if db.NewRecord(&user) {
  94. // user is not found
  95. return nil, fmt.Errorf("user not found by token: <token>")
  96. }
  97. return &User{dbUserModel: user}, nil
  98. }
  99. // GetAllUsers returns all recorded users in the database.
  100. func GetAllUsers() ([]*User, error) {
  101. var users []*User
  102. var dbUsers []*dbUserModel
  103. db.Find(&dbUsers)
  104. for _, u := range dbUsers {
  105. users = append(users, &User{dbUserModel: *u})
  106. }
  107. return users, nil
  108. }
  109. // CreateNewUser creates a new user with the given username and password in the database.
  110. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  111. //
  112. // It also generates the necessary client keys and signs certificates with the current
  113. // server's CA.
  114. func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*User, error) {
  115. if !IsInitialized() {
  116. return nil, fmt.Errorf("you first need to create server")
  117. }
  118. // Validate user input.
  119. if govalidator.IsNull(username) {
  120. return nil, fmt.Errorf("validation error: %s can not be null", username)
  121. }
  122. if !govalidator.Matches(username, "^([\\w\\.]+)$") { // allow alphanumeric, underscore and dot
  123. return nil, fmt.Errorf("validation error: `%s` can only contain letters, numbers, underscores and dots", username)
  124. }
  125. if username == "root" {
  126. return nil, fmt.Errorf("forbidden: username root is reserved and can not be used")
  127. }
  128. ca, err := GetSystemCA()
  129. if err != nil {
  130. return nil, err
  131. }
  132. clientCert, err := pki.NewClientCertHolder(ca, username)
  133. if err != nil {
  134. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  135. }
  136. server, err := GetServerInstance()
  137. if err != nil {
  138. return nil, fmt.Errorf("can not get server: %v", err)
  139. }
  140. if hostid != 0 {
  141. ip := HostID2IP(hostid)
  142. if ip == nil {
  143. return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
  144. }
  145. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  146. if !network.Contains(ip) {
  147. return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  148. }
  149. if hostIDsContains(getStaticHostIDs(), hostid) {
  150. return nil, fmt.Errorf("ip %s is already allocated", ip)
  151. }
  152. // Check if requested ip is allocated to the VPN server itself.
  153. serverNet := net.IPNet{
  154. IP: net.ParseIP(server.Net).To4(),
  155. Mask: net.IPMask(net.ParseIP(server.Mask).To4()),
  156. }
  157. ip, ipnet, err := net.ParseCIDR(serverNet.String())
  158. if err != nil {
  159. return nil, fmt.Errorf("can not parse: %v", err)
  160. }
  161. if hostid == IP2HostID(ipnet.IP)+1 { // If it's VPN server's IP addr, then don't allow it.
  162. return nil, fmt.Errorf("can't assign server's ip address to a user")
  163. }
  164. }
  165. user := dbUserModel{
  166. Username: username,
  167. Cert: clientCert.Cert,
  168. Key: clientCert.Key,
  169. ServerSerialNumber: server.SerialNumber,
  170. NoGW: nogw,
  171. HostID: hostid,
  172. Admin: admin,
  173. }
  174. user.setPassword(password)
  175. db.Create(&user)
  176. if db.NewRecord(&user) {
  177. // user is still not created
  178. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  179. }
  180. logrus.Infof("user created: %s", username)
  181. // EmitWithRestart server config
  182. err = EmitWithRestart()
  183. if err != nil {
  184. return nil, err
  185. }
  186. return &User{dbUserModel: user}, nil
  187. }
  188. // Update updates the user's attributes and writes them to the database.
  189. //
  190. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  191. func (u *User) Update(password string, nogw bool, hostid uint32, admin bool) error {
  192. if !IsInitialized() {
  193. return fmt.Errorf("you first need to create server")
  194. }
  195. // If password is provided; set it. If not; leave it as it is.
  196. if password != "" {
  197. u.setPassword(password)
  198. }
  199. u.NoGW = nogw
  200. u.HostID = hostid
  201. u.Admin = admin
  202. if hostid != 0 {
  203. server, err := GetServerInstance()
  204. if err != nil {
  205. return fmt.Errorf("can not get server: %v", err)
  206. }
  207. ip := HostID2IP(hostid)
  208. if ip == nil {
  209. return fmt.Errorf("host id doesn't represent an ip %d", hostid)
  210. }
  211. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  212. if !network.Contains(ip) {
  213. return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  214. }
  215. if u.HostID != hostid && hostIDsContains(getStaticHostIDs(), hostid) {
  216. return fmt.Errorf("ip %s is already allocated", ip)
  217. }
  218. }
  219. db.Save(u.dbUserModel)
  220. err := EmitWithRestart()
  221. if err != nil {
  222. return err
  223. }
  224. return nil
  225. }
  226. // Delete deletes a user by the given username from the database.
  227. func (u *User) Delete() error {
  228. if db.NewRecord(u.dbUserModel) {
  229. // user is not found
  230. return fmt.Errorf("user is not initialized: %s", u.Username)
  231. }
  232. crt, err := pki.ReadCertFromPEM(u.Cert)
  233. if err != nil {
  234. return fmt.Errorf("can not get user's certificate: %v", err)
  235. }
  236. db.Create(&dbRevokedModel{
  237. SerialNumber: crt.SerialNumber.Text(16),
  238. })
  239. db.Unscoped().Delete(u.dbUserModel)
  240. logrus.Infof("user deleted: %s", u.GetUsername())
  241. err = EmitWithRestart()
  242. if err != nil {
  243. return err
  244. }
  245. u = nil // delete the existing user struct
  246. return nil
  247. }
  248. // ResetPassword resets the users password into the provided password.
  249. func (u *User) ResetPassword(password string) error {
  250. err := u.dbUserModel.setPassword(password)
  251. if err != nil {
  252. // user password can not be updated
  253. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  254. }
  255. db.Save(u.dbUserModel)
  256. err = EmitWithRestart()
  257. if err != nil {
  258. return err
  259. }
  260. logrus.Infof("user password reset: %s", u.GetUsername())
  261. return nil
  262. }
  263. // Renew creates a key and a ceritificate signed by the current server's CA.
  264. //
  265. // This is often used to sign users when the current CA is changed while there are
  266. // still existing users in the database.
  267. //
  268. // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
  269. func (u *User) Renew() error {
  270. if !IsInitialized() {
  271. return fmt.Errorf("you first need to create server")
  272. }
  273. ca, err := GetSystemCA()
  274. if err != nil {
  275. return err
  276. }
  277. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  278. if err != nil {
  279. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  280. }
  281. server, err := GetServerInstance()
  282. if err != nil {
  283. return err
  284. }
  285. u.Cert = clientCert.Cert
  286. u.Key = clientCert.Key
  287. u.ServerSerialNumber = server.SerialNumber
  288. db.Save(u.dbUserModel)
  289. err = EmitWithRestart()
  290. if err != nil {
  291. return err
  292. }
  293. logrus.Infof("user renewed cert: %s", u.GetUsername())
  294. return nil
  295. }
  296. // GetUsername returns user's username.
  297. func (u *User) GetUsername() string {
  298. return u.Username
  299. }
  300. // GetCert returns user's public certificate.
  301. func (u *User) GetCert() string {
  302. return u.Cert
  303. }
  304. // GetServerSerialNumber returns user's server serial number.
  305. func (u *User) GetServerSerialNumber() string {
  306. return u.ServerSerialNumber
  307. }
  308. // GetCreatedAt returns user's creation time.
  309. func (u *User) GetCreatedAt() string {
  310. return u.CreatedAt.Format(time.UnixDate)
  311. }
  312. // getIP returns user's vpn ip addr.
  313. func (u *User) getIP() net.IP {
  314. users := getNonStaticHostUsers()
  315. staticHostIDs := getStaticHostIDs()
  316. server, err := GetServerInstance()
  317. if err != nil {
  318. logrus.Panicf("can not get server instance: %v", err)
  319. }
  320. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  321. network := net.ParseIP(server.Net).To4().Mask(mask)
  322. // If the user has static ip address, return it immediately.
  323. if u.HostID != 0 {
  324. return HostID2IP(u.HostID)
  325. }
  326. // Calculate dynamic ip addresses from a deterministic address pool.
  327. freeHostID := 0
  328. for _, user := range users {
  329. // Skip, if user is supposed to have static ip.
  330. if user.HostID != 0 {
  331. continue
  332. }
  333. // Try the next available host id.
  334. hostID := IP2HostID(network) + uint32(freeHostID)
  335. for hostIDsContains(staticHostIDs, hostID+2) {
  336. freeHostID++ // Increase the host id and try again until it is available.
  337. hostID = IP2HostID(network) + uint32(freeHostID)
  338. }
  339. if user.ID == u.ID {
  340. return HostID2IP(hostID + 2)
  341. }
  342. freeHostID++
  343. }
  344. return nil
  345. }
  346. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  347. func (u *User) GetIPNet() string {
  348. server, err := GetServerInstance()
  349. if err != nil {
  350. logrus.Panicf("can not get user ipnet: %v", err)
  351. }
  352. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  353. ipn := net.IPNet{
  354. IP: u.getIP(),
  355. Mask: mask,
  356. }
  357. return ipn.String()
  358. }
  359. // IsNoGW returns whether user is set to get the vpn server as their default gateway.
  360. func (u *User) IsNoGW() bool {
  361. return u.NoGW
  362. }
  363. // GetHostID returns user's Host ID.
  364. func (u *User) GetHostID() uint32 {
  365. return u.HostID
  366. }
  367. // IsAdmin returns whether user is admin or not.
  368. func (u *User) IsAdmin() bool {
  369. return u.Admin
  370. }
  371. func (u *User) getKey() string {
  372. return u.Key
  373. }
  374. // ConnectionStatus returns information about user's connection to the VPN server.
  375. func (u *User) ConnectionStatus() (isConnected bool, connectedSince time.Time, bytesSent uint64, bytesReceived uint64) {
  376. var found *clEntry
  377. // Open the status log file.
  378. f, err := os.Open(_DefaultStatusLogPath)
  379. if err != nil {
  380. panic(err)
  381. }
  382. cl, _ := parseStatusLog(f)
  383. for _, c := range cl {
  384. if c.CommonName == u.Username {
  385. found = &c
  386. }
  387. }
  388. if found == nil {
  389. return false, time.Time{}, 0, 0
  390. }
  391. return true, found.ConnectedSince, found.BytesSent, found.BytesReceived
  392. }
  393. func getStaticHostUsers() []*User {
  394. var users []*User
  395. var dbUsers []*dbUserModel
  396. db.Unscoped().Not(dbUserModel{HostID: 0}).Find(&dbUsers)
  397. for _, u := range dbUsers {
  398. users = append(users, &User{dbUserModel: *u})
  399. }
  400. return users
  401. }
  402. func getNonStaticHostUsers() []*User {
  403. var users []*User
  404. var dbUsers []*dbUserModel
  405. db.Unscoped().Where(dbUserModel{HostID: 0}).Find(&dbUsers)
  406. for _, u := range dbUsers {
  407. users = append(users, &User{dbUserModel: *u})
  408. }
  409. return users
  410. }
  411. func getStaticHostIDs() []uint32 {
  412. var ids []uint32
  413. users := getStaticHostUsers()
  414. for _, user := range users {
  415. ids = append(ids, user.HostID)
  416. }
  417. return ids
  418. }
  419. func hostIDsContains(s []uint32, e uint32) bool {
  420. for _, a := range s {
  421. if a == e {
  422. return true
  423. }
  424. }
  425. return false
  426. }