rpc.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586
  1. package api
  2. import (
  3. "os"
  4. "google.golang.org/grpc"
  5. "google.golang.org/grpc/codes"
  6. "github.com/Sirupsen/logrus"
  7. "github.com/cad/ovpm"
  8. "github.com/cad/ovpm/api/pb"
  9. "github.com/cad/ovpm/permset"
  10. "golang.org/x/net/context"
  11. )
  12. type AuthService struct{}
  13. func (s *AuthService) Status(ctx context.Context, req *pb.AuthStatusRequest) (*pb.AuthStatusResponse, error) {
  14. logrus.Debug("rpc call: auth status")
  15. username, err := GetUsernameFromContext(ctx)
  16. if err != nil {
  17. logrus.Debugln(err)
  18. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  19. }
  20. if username == "root" {
  21. userResp := pb.UserResponse_User{
  22. Username: username,
  23. IsAdmin: true,
  24. }
  25. return &pb.AuthStatusResponse{User: &userResp, IsRoot: true}, nil
  26. }
  27. user, err := ovpm.GetUser(username)
  28. if err != nil {
  29. logrus.Debugln(err)
  30. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  31. }
  32. userResp := pb.UserResponse_User{
  33. Username: user.GetUsername(),
  34. IsAdmin: user.IsAdmin(),
  35. }
  36. return &pb.AuthStatusResponse{User: &userResp}, nil
  37. }
  38. func (s *AuthService) Authenticate(ctx context.Context, req *pb.AuthAuthenticateRequest) (*pb.AuthAuthenticateResponse, error) {
  39. logrus.Debug("rpc call: auth authenticate")
  40. user, err := ovpm.GetUser(req.Username)
  41. if err != nil {
  42. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  43. }
  44. if !user.CheckPassword(req.Password) {
  45. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  46. }
  47. token, err := user.RenewToken()
  48. if err != nil {
  49. return nil, grpc.Errorf(codes.Internal, "token can not be generated")
  50. }
  51. return &pb.AuthAuthenticateResponse{Token: token}, nil
  52. }
  53. type UserService struct{}
  54. func (s *UserService) List(ctx context.Context, req *pb.UserListRequest) (*pb.UserResponse, error) {
  55. logrus.Debug("rpc call: user list")
  56. perms, err := permset.FromContext(ctx)
  57. if err != nil {
  58. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  59. }
  60. // Check perms.
  61. if !perms.Contains(ovpm.GetAnyUserPerm) {
  62. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetAnyUserPerm is required for this operation")
  63. }
  64. var ut []*pb.UserResponse_User
  65. users, err := ovpm.GetAllUsers()
  66. if err != nil {
  67. logrus.Errorf("users can not be fetched: %v", err)
  68. os.Exit(1)
  69. return nil, err
  70. }
  71. for _, user := range users {
  72. ut = append(ut, &pb.UserResponse_User{
  73. ServerSerialNumber: user.GetServerSerialNumber(),
  74. Username: user.GetUsername(),
  75. CreatedAt: user.GetCreatedAt(),
  76. IpNet: user.GetIPNet(),
  77. NoGw: user.IsNoGW(),
  78. HostId: user.GetHostID(),
  79. IsAdmin: user.IsAdmin(),
  80. })
  81. }
  82. return &pb.UserResponse{Users: ut}, nil
  83. }
  84. func (s *UserService) Create(ctx context.Context, req *pb.UserCreateRequest) (*pb.UserResponse, error) {
  85. logrus.Debugf("rpc call: user create: %s", req.Username)
  86. perms, err := permset.FromContext(ctx)
  87. if err != nil {
  88. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  89. }
  90. // Check perms.
  91. if !perms.Contains(ovpm.CreateUserPerm) {
  92. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateUserPerm is required for this operation")
  93. }
  94. var ut []*pb.UserResponse_User
  95. user, err := ovpm.CreateNewUser(req.Username, req.Password, req.NoGw, req.HostId, req.IsAdmin)
  96. if err != nil {
  97. return nil, err
  98. }
  99. pbUser := pb.UserResponse_User{
  100. Username: user.GetUsername(),
  101. ServerSerialNumber: user.GetServerSerialNumber(),
  102. NoGw: user.IsNoGW(),
  103. HostId: user.GetHostID(),
  104. IsAdmin: user.IsAdmin(),
  105. }
  106. ut = append(ut, &pbUser)
  107. return &pb.UserResponse{Users: ut}, nil
  108. }
  109. func (s *UserService) Update(ctx context.Context, req *pb.UserUpdateRequest) (*pb.UserResponse, error) {
  110. logrus.Debugf("rpc call: user update: %s", req.Username)
  111. var ut []*pb.UserResponse_User
  112. user, err := ovpm.GetUser(req.Username)
  113. if err != nil {
  114. return nil, err
  115. }
  116. var noGW bool
  117. switch req.Gwpref {
  118. case pb.UserUpdateRequest_NOGW:
  119. noGW = true
  120. case pb.UserUpdateRequest_GW:
  121. noGW = false
  122. default:
  123. noGW = user.NoGW
  124. }
  125. var admin bool
  126. switch req.AdminPref {
  127. case pb.UserUpdateRequest_ADMIN:
  128. admin = true
  129. case pb.UserUpdateRequest_NOADMIN:
  130. admin = false
  131. case pb.UserUpdateRequest_NOPREFADMIN:
  132. admin = user.IsAdmin()
  133. }
  134. perms, err := permset.FromContext(ctx)
  135. if err != nil {
  136. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  137. }
  138. username, err := GetUsernameFromContext(ctx)
  139. if err != nil {
  140. logrus.Debugln(err)
  141. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  142. }
  143. // User has admin perms?
  144. if perms.Contains(ovpm.UpdateAnyUserPerm) {
  145. err = user.Update(req.Password, noGW, req.HostId, admin)
  146. if err != nil {
  147. return nil, err
  148. }
  149. ut = append(ut, &pb.UserResponse_User{
  150. Username: user.GetUsername(),
  151. ServerSerialNumber: user.GetServerSerialNumber(),
  152. NoGw: user.IsNoGW(),
  153. HostId: user.GetHostID(),
  154. IsAdmin: user.IsAdmin(),
  155. })
  156. return &pb.UserResponse{Users: ut}, nil
  157. }
  158. // User has self update perms?
  159. if perms.Contains(ovpm.UpdateSelfPerm) {
  160. if user.GetUsername() != username {
  161. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only update their user with ovpm.UpdateSelfPerm")
  162. }
  163. err = user.Update(req.Password, noGW, req.HostId, admin)
  164. if err != nil {
  165. return nil, err
  166. }
  167. ut = append(ut, &pb.UserResponse_User{
  168. Username: user.GetUsername(),
  169. ServerSerialNumber: user.GetServerSerialNumber(),
  170. NoGw: user.IsNoGW(),
  171. HostId: user.GetHostID(),
  172. IsAdmin: user.IsAdmin(),
  173. })
  174. return &pb.UserResponse{Users: ut}, nil
  175. }
  176. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  177. }
  178. func (s *UserService) Delete(ctx context.Context, req *pb.UserDeleteRequest) (*pb.UserResponse, error) {
  179. logrus.Debugf("rpc call: user delete: %s", req.Username)
  180. var ut []*pb.UserResponse_User
  181. user, err := ovpm.GetUser(req.Username)
  182. if err != nil {
  183. return nil, err
  184. }
  185. perms, err := permset.FromContext(ctx)
  186. if err != nil {
  187. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  188. }
  189. if !perms.Contains(ovpm.DeleteAnyUserPerm) {
  190. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteAnyUserPerm is required for this operation.")
  191. }
  192. pbUser := pb.UserResponse_User{
  193. Username: user.GetUsername(),
  194. ServerSerialNumber: user.GetServerSerialNumber(),
  195. HostId: user.GetHostID(),
  196. IsAdmin: user.IsAdmin(),
  197. }
  198. ut = append(ut, &pbUser)
  199. err = user.Delete()
  200. if err != nil {
  201. return nil, err
  202. }
  203. return &pb.UserResponse{Users: ut}, nil
  204. }
  205. func (s *UserService) Renew(ctx context.Context, req *pb.UserRenewRequest) (*pb.UserResponse, error) {
  206. logrus.Debugf("rpc call: user renew cert: %s", req.Username)
  207. var ut []*pb.UserResponse_User
  208. user, err := ovpm.GetUser(req.Username)
  209. if err != nil {
  210. return nil, err
  211. }
  212. pbUser := pb.UserResponse_User{
  213. Username: user.GetUsername(),
  214. ServerSerialNumber: user.GetServerSerialNumber(),
  215. HostId: user.GetHostID(),
  216. IsAdmin: user.IsAdmin(),
  217. }
  218. ut = append(ut, &pbUser)
  219. perms, err := permset.FromContext(ctx)
  220. if err != nil {
  221. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  222. }
  223. if !perms.Contains(ovpm.RenewAnyUserPerm) {
  224. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.RenewAnyUserPerm is required for this operation.")
  225. }
  226. err = user.Renew()
  227. if err != nil {
  228. return nil, err
  229. }
  230. return &pb.UserResponse{Users: ut}, nil
  231. }
  232. func (s *UserService) GenConfig(ctx context.Context, req *pb.UserGenConfigRequest) (*pb.UserGenConfigResponse, error) {
  233. logrus.Debugf("rpc call: user genconfig: %s", req.Username)
  234. user, err := ovpm.GetUser(req.Username)
  235. if err != nil {
  236. return nil, err
  237. }
  238. username, err := GetUsernameFromContext(ctx)
  239. if err != nil {
  240. logrus.Debugln(err)
  241. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  242. }
  243. perms, err := permset.FromContext(ctx)
  244. if err != nil {
  245. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  246. }
  247. if perms.Contains(ovpm.GenConfigAnyUserPerm) {
  248. configBlob, err := ovpm.DumpsClientConfig(user.GetUsername())
  249. if err != nil {
  250. return nil, err
  251. }
  252. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  253. }
  254. if perms.Contains(ovpm.GenConfigSelfPerm) {
  255. if user.GetUsername() != username {
  256. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only genconfig for their user.")
  257. }
  258. configBlob, err := ovpm.DumpsClientConfig(user.GetUsername())
  259. if err != nil {
  260. return nil, err
  261. }
  262. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  263. }
  264. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  265. }
  266. type VPNService struct{}
  267. func (s *VPNService) Status(ctx context.Context, req *pb.VPNStatusRequest) (*pb.VPNStatusResponse, error) {
  268. logrus.Debugf("rpc call: vpn status")
  269. server, err := ovpm.GetServerInstance()
  270. if err != nil {
  271. return nil, err
  272. }
  273. perms, err := permset.FromContext(ctx)
  274. if err != nil {
  275. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  276. }
  277. if !perms.Contains(ovpm.GetVPNStatusPerm) {
  278. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetVPNStatusPerm is required for this operation.")
  279. }
  280. response := pb.VPNStatusResponse{
  281. Name: server.GetServerName(),
  282. SerialNumber: server.GetSerialNumber(),
  283. Hostname: server.GetHostname(),
  284. Port: server.GetPort(),
  285. Proto: server.GetProto(),
  286. Cert: server.GetCert(),
  287. CaCert: server.GetCACert(),
  288. Net: server.GetNet(),
  289. Mask: server.GetMask(),
  290. CreatedAt: server.GetCreatedAt(),
  291. Dns: server.GetDNS(),
  292. }
  293. return &response, nil
  294. }
  295. func (s *VPNService) Init(ctx context.Context, req *pb.VPNInitRequest) (*pb.VPNInitResponse, error) {
  296. logrus.Debugf("rpc call: vpn init")
  297. var proto string
  298. switch req.ProtoPref {
  299. case pb.VPNProto_TCP:
  300. proto = ovpm.TCPProto
  301. case pb.VPNProto_UDP:
  302. proto = ovpm.UDPProto
  303. case pb.VPNProto_NOPREF:
  304. proto = ovpm.UDPProto
  305. }
  306. perms, err := permset.FromContext(ctx)
  307. if err != nil {
  308. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  309. }
  310. if !perms.Contains(ovpm.InitVPNPerm) {
  311. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.InitVPNPerm is required for this operation.")
  312. }
  313. if err := ovpm.Init(req.Hostname, req.Port, proto, req.IpBlock, req.Dns); err != nil {
  314. logrus.Errorf("server can not be created: %v", err)
  315. }
  316. return &pb.VPNInitResponse{}, nil
  317. }
  318. func (s *VPNService) Update(ctx context.Context, req *pb.VPNUpdateRequest) (*pb.VPNUpdateResponse, error) {
  319. logrus.Debugf("rpc call: vpn update")
  320. perms, err := permset.FromContext(ctx)
  321. if err != nil {
  322. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  323. }
  324. if !perms.Contains(ovpm.UpdateVPNPerm) {
  325. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.UpdateVPNPerm is required for this operation.")
  326. }
  327. if err := ovpm.Update(req.IpBlock, req.Dns); err != nil {
  328. logrus.Errorf("server can not be updated: %v", err)
  329. }
  330. return &pb.VPNUpdateResponse{}, nil
  331. }
  332. type NetworkService struct{}
  333. func (s *NetworkService) List(ctx context.Context, req *pb.NetworkListRequest) (*pb.NetworkListResponse, error) {
  334. logrus.Debug("rpc call: network list")
  335. var nt []*pb.Network
  336. perms, err := permset.FromContext(ctx)
  337. if err != nil {
  338. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  339. }
  340. if !perms.Contains(ovpm.ListNetworksPerm) {
  341. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.ListNetworksPerm is required for this operation.")
  342. }
  343. networks := ovpm.GetAllNetworks()
  344. for _, network := range networks {
  345. nt = append(nt, &pb.Network{
  346. Name: network.GetName(),
  347. Cidr: network.GetCIDR(),
  348. Type: network.GetType().String(),
  349. CreatedAt: network.GetCreatedAt(),
  350. AssociatedUsernames: network.GetAssociatedUsernames(),
  351. Via: network.GetVia(),
  352. })
  353. }
  354. return &pb.NetworkListResponse{Networks: nt}, nil
  355. }
  356. func (s *NetworkService) Create(ctx context.Context, req *pb.NetworkCreateRequest) (*pb.NetworkCreateResponse, error) {
  357. logrus.Debugf("rpc call: network create: %s", req.Name)
  358. perms, err := permset.FromContext(ctx)
  359. if err != nil {
  360. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  361. }
  362. if !perms.Contains(ovpm.CreateNetworkPerm) {
  363. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateNetworkPerm is required for this operation.")
  364. }
  365. network, err := ovpm.CreateNewNetwork(req.Name, req.Cidr, ovpm.NetworkTypeFromString(req.Type), req.Via)
  366. if err != nil {
  367. return nil, err
  368. }
  369. n := pb.Network{
  370. Name: network.GetName(),
  371. Cidr: network.GetCIDR(),
  372. Type: network.GetType().String(),
  373. CreatedAt: network.GetCreatedAt(),
  374. AssociatedUsernames: network.GetAssociatedUsernames(),
  375. Via: network.GetVia(),
  376. }
  377. return &pb.NetworkCreateResponse{Network: &n}, nil
  378. }
  379. func (s *NetworkService) Delete(ctx context.Context, req *pb.NetworkDeleteRequest) (*pb.NetworkDeleteResponse, error) {
  380. logrus.Debugf("rpc call: network delete: %s", req.Name)
  381. perms, err := permset.FromContext(ctx)
  382. if err != nil {
  383. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  384. }
  385. if !perms.Contains(ovpm.DeleteNetworkPerm) {
  386. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteNetworkPerm is required for this operation.")
  387. }
  388. network, err := ovpm.GetNetwork(req.Name)
  389. if err != nil {
  390. return nil, err
  391. }
  392. err = network.Delete()
  393. if err != nil {
  394. return nil, err
  395. }
  396. n := pb.Network{
  397. Name: network.GetName(),
  398. Cidr: network.GetCIDR(),
  399. Type: network.GetType().String(),
  400. CreatedAt: network.GetCreatedAt(),
  401. AssociatedUsernames: network.GetAssociatedUsernames(),
  402. Via: network.GetVia(),
  403. }
  404. return &pb.NetworkDeleteResponse{Network: &n}, nil
  405. }
  406. func (s *NetworkService) GetAllTypes(ctx context.Context, req *pb.NetworkGetAllTypesRequest) (*pb.NetworkGetAllTypesResponse, error) {
  407. logrus.Debugf("rpc call: network get-types")
  408. var networkTypes []*pb.NetworkType
  409. perms, err := permset.FromContext(ctx)
  410. if err != nil {
  411. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  412. }
  413. if !perms.Contains(ovpm.GetNetworkTypesPerm) {
  414. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkTypesPerm is required for this operation.")
  415. }
  416. for _, nt := range ovpm.GetAllNetworkTypes() {
  417. if nt == ovpm.UNDEFINEDNET {
  418. continue
  419. }
  420. networkTypes = append(networkTypes, &pb.NetworkType{Type: nt.String(), Description: nt.Description()})
  421. }
  422. return &pb.NetworkGetAllTypesResponse{Types: networkTypes}, nil
  423. }
  424. func (s *NetworkService) GetAssociatedUsers(ctx context.Context, req *pb.NetworkGetAssociatedUsersRequest) (*pb.NetworkGetAssociatedUsersResponse, error) {
  425. logrus.Debugf("rpc call: network get-associated-users")
  426. perms, err := permset.FromContext(ctx)
  427. if err != nil {
  428. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  429. }
  430. if !perms.Contains(ovpm.GetNetworkAssociatedUsersPerm) {
  431. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkAssociatedUsersPerm is required for this operation.")
  432. }
  433. network, err := ovpm.GetNetwork(req.Name)
  434. if err != nil {
  435. return nil, err
  436. }
  437. usernames := network.GetAssociatedUsernames()
  438. return &pb.NetworkGetAssociatedUsersResponse{Usernames: usernames}, nil
  439. }
  440. func (s *NetworkService) Associate(ctx context.Context, req *pb.NetworkAssociateRequest) (*pb.NetworkAssociateResponse, error) {
  441. logrus.Debugf("rpc call: network associate")
  442. perms, err := permset.FromContext(ctx)
  443. if err != nil {
  444. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  445. }
  446. if !perms.Contains(ovpm.AssociateNetworkUserPerm) {
  447. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.AssociateNetworkUserPerm is required for this operation.")
  448. }
  449. network, err := ovpm.GetNetwork(req.Name)
  450. if err != nil {
  451. return nil, err
  452. }
  453. err = network.Associate(req.Username)
  454. if err != nil {
  455. return nil, err
  456. }
  457. return &pb.NetworkAssociateResponse{}, nil
  458. }
  459. func (s *NetworkService) Dissociate(ctx context.Context, req *pb.NetworkDissociateRequest) (*pb.NetworkDissociateResponse, error) {
  460. logrus.Debugf("rpc call: network dissociate")
  461. perms, err := permset.FromContext(ctx)
  462. if err != nil {
  463. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  464. }
  465. if !perms.Contains(ovpm.DissociateNetworkUserPerm) {
  466. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DissociateNetworkUserPerm is required for this operation.")
  467. }
  468. network, err := ovpm.GetNetwork(req.Name)
  469. if err != nil {
  470. return nil, err
  471. }
  472. err = network.Dissociate(req.Username)
  473. if err != nil {
  474. return nil, err
  475. }
  476. return &pb.NetworkDissociateResponse{}, nil
  477. }
  478. // NewRPCServer returns a new gRPC server.
  479. func NewRPCServer() *grpc.Server {
  480. var opts []grpc.ServerOption
  481. opts = append(opts, grpc.UnaryInterceptor(AuthUnaryInterceptor))
  482. s := grpc.NewServer(opts...)
  483. //s := grpc.NewServer()
  484. pb.RegisterUserServiceServer(s, &UserService{})
  485. pb.RegisterVPNServiceServer(s, &VPNService{})
  486. pb.RegisterNetworkServiceServer(s, &NetworkService{})
  487. pb.RegisterAuthServiceServer(s, &AuthService{})
  488. return s
  489. }