user.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "time"
  6. passlib "gopkg.in/hlandau/passlib.v1"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/asaskevich/govalidator"
  9. "github.com/cad/ovpm/pki"
  10. "github.com/jinzhu/gorm"
  11. )
  12. // dbRevokedModel is a database model for revoked VPN users.
  13. type dbRevokedModel struct {
  14. gorm.Model
  15. SerialNumber string
  16. }
  17. // dbUserModel is database model for VPN users.
  18. type dbUserModel struct {
  19. gorm.Model
  20. ServerID uint
  21. Server dbServerModel
  22. Username string `gorm:"unique_index"`
  23. Cert string // not user writable
  24. ServerSerialNumber string // not user writable
  25. Hash string
  26. Key string // not user writable
  27. NoGW bool
  28. HostID uint32 // not user writable
  29. Admin bool
  30. }
  31. // User represents a vpn user.
  32. type User struct {
  33. dbUserModel
  34. }
  35. func (u *dbUserModel) setPassword(password string) error {
  36. hashedPassword, err := passlib.Hash(password)
  37. if err != nil {
  38. return fmt.Errorf("can not set password: %v", err)
  39. }
  40. u.Hash = hashedPassword
  41. return nil
  42. }
  43. // CheckPassword returns whether the given password is correct for the user.
  44. func (u *User) CheckPassword(password string) bool {
  45. _, err := passlib.Verify(password, u.Hash)
  46. if err != nil {
  47. logrus.Error(err)
  48. return false
  49. }
  50. return true
  51. }
  52. // GetUser finds and returns the user with the given username from database.
  53. func GetUser(username string) (*User, error) {
  54. user := dbUserModel{}
  55. db.Where(&dbUserModel{Username: username}).First(&user)
  56. if db.NewRecord(&user) {
  57. // user is not found
  58. return nil, fmt.Errorf("user not found: %s", username)
  59. }
  60. return &User{dbUserModel: user}, nil
  61. }
  62. // GetAllUsers returns all recorded users in the database.
  63. func GetAllUsers() ([]*User, error) {
  64. var users []*User
  65. var dbUsers []*dbUserModel
  66. db.Find(&dbUsers)
  67. for _, u := range dbUsers {
  68. users = append(users, &User{dbUserModel: *u})
  69. }
  70. return users, nil
  71. }
  72. // CreateNewUser creates a new user with the given username and password in the database.
  73. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  74. //
  75. // It also generates the necessary client keys and signs certificates with the current
  76. // server's CA.
  77. func CreateNewUser(username, password string, nogw bool, hostid uint32, admin bool) (*User, error) {
  78. if !IsInitialized() {
  79. return nil, fmt.Errorf("you first need to create server")
  80. }
  81. // Validate user input.
  82. if govalidator.IsNull(username) {
  83. return nil, fmt.Errorf("validation error: %s can not be null", username)
  84. }
  85. if !govalidator.IsAlphanumeric(username) {
  86. return nil, fmt.Errorf("validation error: `%s` can only contain letters and numbers", username)
  87. }
  88. ca, err := GetSystemCA()
  89. if err != nil {
  90. return nil, err
  91. }
  92. clientCert, err := pki.NewClientCertHolder(ca, username)
  93. if err != nil {
  94. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  95. }
  96. server, err := GetServerInstance()
  97. if err != nil {
  98. return nil, fmt.Errorf("can not get server: %v", err)
  99. }
  100. if hostid != 0 {
  101. ip := HostID2IP(hostid)
  102. if ip == nil {
  103. return nil, fmt.Errorf("host id doesn't represent an ip %d", hostid)
  104. }
  105. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  106. if !network.Contains(ip) {
  107. return nil, fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  108. }
  109. if hostIDsContains(getStaticHostIDs(), hostid) {
  110. return nil, fmt.Errorf("ip %s is already allocated", ip)
  111. }
  112. }
  113. user := dbUserModel{
  114. Username: username,
  115. Cert: clientCert.Cert,
  116. Key: clientCert.Key,
  117. ServerSerialNumber: server.SerialNumber,
  118. NoGW: nogw,
  119. HostID: hostid,
  120. Admin: admin,
  121. }
  122. user.setPassword(password)
  123. db.Create(&user)
  124. if db.NewRecord(&user) {
  125. // user is still not created
  126. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  127. }
  128. logrus.Infof("user created: %s", username)
  129. // Emit server config
  130. err = Emit()
  131. if err != nil {
  132. return nil, err
  133. }
  134. return &User{dbUserModel: user}, nil
  135. }
  136. // Update updates the user's attributes and writes them to the database.
  137. //
  138. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  139. func (u *User) Update(password string, nogw bool, hostid uint32, admin bool) error {
  140. if !IsInitialized() {
  141. return fmt.Errorf("you first need to create server")
  142. }
  143. // If password is provided; set it. If not; leave it as it is.
  144. if password != "" {
  145. u.setPassword(password)
  146. }
  147. u.NoGW = nogw
  148. u.HostID = hostid
  149. u.Admin = admin
  150. if hostid != 0 {
  151. server, err := GetServerInstance()
  152. if err != nil {
  153. return fmt.Errorf("can not get server: %v", err)
  154. }
  155. ip := HostID2IP(hostid)
  156. if ip == nil {
  157. return fmt.Errorf("host id doesn't represent an ip %d", hostid)
  158. }
  159. network := net.IPNet{IP: net.ParseIP(server.Net).To4(), Mask: net.IPMask(net.ParseIP(server.Mask).To4())}
  160. if !network.Contains(ip) {
  161. return fmt.Errorf("ip %s, is out of vpn network %s", ip, network.String())
  162. }
  163. if hostIDsContains(getStaticHostIDs(), hostid) {
  164. return fmt.Errorf("ip %s is already allocated", ip)
  165. }
  166. }
  167. db.Save(u.dbUserModel)
  168. err := Emit()
  169. if err != nil {
  170. return err
  171. }
  172. return nil
  173. }
  174. // Delete deletes a user by the given username from the database.
  175. func (u *User) Delete() error {
  176. if db.NewRecord(u.dbUserModel) {
  177. // user is not found
  178. return fmt.Errorf("user is not initialized: %s", u.Username)
  179. }
  180. crt, err := pki.ReadCertFromPEM(u.Cert)
  181. if err != nil {
  182. return fmt.Errorf("can not get user's certificate: %v", err)
  183. }
  184. db.Create(&dbRevokedModel{
  185. SerialNumber: crt.SerialNumber.Text(16),
  186. })
  187. db.Unscoped().Delete(u.dbUserModel)
  188. logrus.Infof("user deleted: %s", u.GetUsername())
  189. err = Emit()
  190. if err != nil {
  191. return err
  192. }
  193. u = nil // delete the existing user struct
  194. return nil
  195. }
  196. // ResetPassword resets the users password into the provided password.
  197. func (u *User) ResetPassword(password string) error {
  198. err := u.dbUserModel.setPassword(password)
  199. if err != nil {
  200. // user password can not be updated
  201. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  202. }
  203. db.Save(u.dbUserModel)
  204. err = Emit()
  205. if err != nil {
  206. return err
  207. }
  208. logrus.Infof("user password reset: %s", u.GetUsername())
  209. return nil
  210. }
  211. // Renew creates a key and a ceritificate signed by the current server's CA.
  212. //
  213. // This is often used to sign users when the current CA is changed while there are
  214. // still existing users in the database.
  215. //
  216. // Also it can be used when a user cert is expired or user's private key stolen, missing etc.
  217. func (u *User) Renew() error {
  218. if !IsInitialized() {
  219. return fmt.Errorf("you first need to create server")
  220. }
  221. ca, err := GetSystemCA()
  222. if err != nil {
  223. return err
  224. }
  225. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  226. if err != nil {
  227. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  228. }
  229. server, err := GetServerInstance()
  230. if err != nil {
  231. return err
  232. }
  233. u.Cert = clientCert.Cert
  234. u.Key = clientCert.Key
  235. u.ServerSerialNumber = server.SerialNumber
  236. db.Save(u.dbUserModel)
  237. err = Emit()
  238. if err != nil {
  239. return err
  240. }
  241. logrus.Infof("user renewed cert: %s", u.GetUsername())
  242. return nil
  243. }
  244. // GetUsername returns user's username.
  245. func (u *User) GetUsername() string {
  246. return u.Username
  247. }
  248. // GetCert returns user's public certificate.
  249. func (u *User) GetCert() string {
  250. return u.Cert
  251. }
  252. // GetServerSerialNumber returns user's server serial number.
  253. func (u *User) GetServerSerialNumber() string {
  254. return u.ServerSerialNumber
  255. }
  256. // GetCreatedAt returns user's creation time.
  257. func (u *User) GetCreatedAt() string {
  258. return u.CreatedAt.Format(time.UnixDate)
  259. }
  260. // getIP returns user's vpn ip addr.
  261. func (u *User) getIP() net.IP {
  262. users := getNonStaticHostUsers()
  263. staticHostIDs := getStaticHostIDs()
  264. server, err := GetServerInstance()
  265. if err != nil {
  266. logrus.Panicf("can not get server instance: %v", err)
  267. }
  268. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  269. network := net.ParseIP(server.Net).To4().Mask(mask)
  270. // If the user has static ip address, return it immediately.
  271. if u.HostID != 0 {
  272. return HostID2IP(u.HostID)
  273. }
  274. // Calculate dynamic ip addresses from a deterministic address pool.
  275. freeHostID := 0
  276. for _, user := range users {
  277. // Skip, if user is supposed to have static ip.
  278. if user.HostID != 0 {
  279. continue
  280. }
  281. // Try the next available host id.
  282. hostID := IP2HostID(network) + uint32(freeHostID)
  283. for hostIDsContains(staticHostIDs, hostID+2) {
  284. freeHostID++ // Increase the host id and try again until it is available.
  285. hostID = IP2HostID(network) + uint32(freeHostID)
  286. }
  287. if user.ID == u.ID {
  288. return HostID2IP(hostID + 2)
  289. }
  290. freeHostID++
  291. }
  292. return nil
  293. }
  294. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  295. func (u *User) GetIPNet() string {
  296. server, err := GetServerInstance()
  297. if err != nil {
  298. logrus.Panicf("can not get user ipnet: %v", err)
  299. }
  300. mask := net.IPMask(net.ParseIP(server.Mask).To4())
  301. ipn := net.IPNet{
  302. IP: u.getIP(),
  303. Mask: mask,
  304. }
  305. return ipn.String()
  306. }
  307. // IsNoGW returns whether user is set to get the vpn server as their default gateway.
  308. func (u *User) IsNoGW() bool {
  309. return u.NoGW
  310. }
  311. // GetHostID returns user's Host ID.
  312. func (u *User) GetHostID() uint32 {
  313. return u.HostID
  314. }
  315. // IsAdmin returns whether user is admin or not.
  316. func (u *User) IsAdmin() bool {
  317. return u.Admin
  318. }
  319. func (u *User) getKey() string {
  320. return u.Key
  321. }
  322. func getStaticHostUsers() []*User {
  323. var users []*User
  324. var dbUsers []*dbUserModel
  325. db.Unscoped().Not(dbUserModel{HostID: 0}).Find(&dbUsers)
  326. for _, u := range dbUsers {
  327. users = append(users, &User{dbUserModel: *u})
  328. }
  329. return users
  330. }
  331. func getNonStaticHostUsers() []*User {
  332. var users []*User
  333. var dbUsers []*dbUserModel
  334. db.Unscoped().Where(dbUserModel{HostID: 0}).Find(&dbUsers)
  335. for _, u := range dbUsers {
  336. users = append(users, &User{dbUserModel: *u})
  337. }
  338. return users
  339. }
  340. func getStaticHostIDs() []uint32 {
  341. var ids []uint32
  342. users := getStaticHostUsers()
  343. for _, user := range users {
  344. ids = append(ids, user.HostID)
  345. }
  346. return ids
  347. }
  348. func hostIDsContains(s []uint32, e uint32) bool {
  349. for _, a := range s {
  350. if a == e {
  351. return true
  352. }
  353. }
  354. return false
  355. }