user.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. package ovpm
  2. import (
  3. "fmt"
  4. "net"
  5. "time"
  6. passlib "gopkg.in/hlandau/passlib.v1"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/asaskevich/govalidator"
  9. "github.com/cad/ovpm/pki"
  10. "github.com/jinzhu/gorm"
  11. )
  12. // User represents the interface that is being used within the public api.
  13. type User interface {
  14. GetUsername() string
  15. GetServerSerialNumber() string
  16. GetCert() string
  17. GetIPNet() string
  18. IsNoGW() bool
  19. }
  20. // DBUser is database model for VPN users.
  21. type DBUser struct {
  22. gorm.Model
  23. ServerID uint
  24. Server DBServer
  25. Username string `gorm:"unique_index"`
  26. Cert string // not user writable
  27. ServerSerialNumber string // not user writable
  28. Hash string
  29. Key string // not user writable
  30. NoGW bool
  31. }
  32. // DBRevoked is a database model for revoked VPN users.
  33. type DBRevoked struct {
  34. gorm.Model
  35. SerialNumber string
  36. }
  37. func (u *DBUser) setPassword(password string) error {
  38. hashedPassword, err := passlib.Hash(password)
  39. if err != nil {
  40. return fmt.Errorf("can not set password: %v", err)
  41. }
  42. u.Hash = hashedPassword
  43. return nil
  44. }
  45. // CheckPassword returns wether the given password is correct for the user.
  46. func (u *DBUser) CheckPassword(password string) bool {
  47. _, err := passlib.Verify(password, u.Hash)
  48. if err != nil {
  49. logrus.Error(err)
  50. return false
  51. }
  52. return true
  53. }
  54. // GetUser finds and returns the user with the given username from database.
  55. func GetUser(username string) (*DBUser, error) {
  56. user := DBUser{}
  57. db.Where(&DBUser{Username: username}).First(&user)
  58. if db.NewRecord(&user) {
  59. // user is not found
  60. return nil, fmt.Errorf("user not found: %s", username)
  61. }
  62. return &user, nil
  63. }
  64. // GetAllUsers returns all recorded users in the database.
  65. func GetAllUsers() ([]*DBUser, error) {
  66. var users []*DBUser
  67. db.Find(&users)
  68. return users, nil
  69. }
  70. // CreateNewUser creates a new user with the given username and password in the database.
  71. // If nogw is true, then ovpm doesn't push vpn server as the default gw for the user.
  72. //
  73. // It also generates the necessary client keys and signs certificates with the current
  74. // server's CA.
  75. func CreateNewUser(username, password string, nogw bool) (*DBUser, error) {
  76. if !IsInitialized() {
  77. return nil, fmt.Errorf("you first need to create server")
  78. }
  79. // Validate user input.
  80. if govalidator.IsNull(username) {
  81. return nil, fmt.Errorf("validation error: %s can not be null", username)
  82. }
  83. if !govalidator.IsAlphanumeric(username) {
  84. return nil, fmt.Errorf("validation error: `%s` can only contain letters and numbers", username)
  85. }
  86. ca, err := GetSystemCA()
  87. if err != nil {
  88. return nil, err
  89. }
  90. clientCert, err := pki.NewClientCertHolder(ca, username)
  91. if err != nil {
  92. return nil, fmt.Errorf("can not create client cert %s: %v", username, err)
  93. }
  94. server, err := GetServerInstance()
  95. if err != nil {
  96. return nil, fmt.Errorf("can not get server: %v", err)
  97. }
  98. user := DBUser{
  99. Username: username,
  100. Cert: clientCert.Cert,
  101. Key: clientCert.Key,
  102. ServerSerialNumber: server.SerialNumber,
  103. NoGW: nogw,
  104. }
  105. user.setPassword(password)
  106. db.Create(&user)
  107. if db.NewRecord(&user) {
  108. // user is still not created
  109. return nil, fmt.Errorf("can not create user in database: %s", user.Username)
  110. }
  111. logrus.Infof("user created: %s", username)
  112. // Emit server config
  113. err = Emit()
  114. if err != nil {
  115. return nil, err
  116. }
  117. return &user, nil
  118. }
  119. // Update updates the user's attributes and writes them to the database.
  120. //
  121. // How this method works is similiar to PUT semantics of REST. It sets the user record fields to the provided function arguments.
  122. func (u *DBUser) Update(password string, nogw bool) error {
  123. if !IsInitialized() {
  124. return fmt.Errorf("you first need to create server")
  125. }
  126. // If password is provided; set it. If not; leave it as it is.
  127. if password != "" {
  128. u.setPassword(password)
  129. }
  130. u.NoGW = nogw
  131. db.Save(u)
  132. err := Emit()
  133. if err != nil {
  134. return err
  135. }
  136. return nil
  137. }
  138. // Delete deletes a user by the given username from the database.
  139. func (u *DBUser) Delete() error {
  140. if db.NewRecord(u) {
  141. // user is not found
  142. return fmt.Errorf("user is not initialized: %s", u.Username)
  143. }
  144. crt, err := pki.ReadCertFromPEM(u.Cert)
  145. if err != nil {
  146. return fmt.Errorf("can not get user's certificate: %v", err)
  147. }
  148. db.Create(&DBRevoked{
  149. SerialNumber: crt.SerialNumber.Text(16),
  150. })
  151. db.Unscoped().Delete(u)
  152. logrus.Infof("user deleted: %s", u.GetUsername())
  153. err = Emit()
  154. if err != nil {
  155. return err
  156. }
  157. u = nil // delete the existing user struct
  158. return nil
  159. }
  160. // ResetPassword resets the users password into the provided password.
  161. func (u *DBUser) ResetPassword(password string) error {
  162. err := u.setPassword(password)
  163. if err != nil {
  164. // user password can not be updated
  165. return fmt.Errorf("user password can not be updated %s: %v", u.Username, err)
  166. }
  167. db.Save(u)
  168. err = Emit()
  169. if err != nil {
  170. return err
  171. }
  172. logrus.Infof("user password reset: %s", u.GetUsername())
  173. return nil
  174. }
  175. // Renew creates a key and a ceritificate signed by the current server's CA.
  176. //
  177. // This is often used to sign users when the current CA is changed while there are
  178. // still existing users in the database.
  179. func (u *DBUser) Renew() error {
  180. if !IsInitialized() {
  181. return fmt.Errorf("you first need to create server")
  182. }
  183. ca, err := GetSystemCA()
  184. if err != nil {
  185. return err
  186. }
  187. clientCert, err := pki.NewClientCertHolder(ca, u.Username)
  188. if err != nil {
  189. return fmt.Errorf("can not create client cert %s: %v", u.Username, err)
  190. }
  191. server, err := GetServerInstance()
  192. if err != nil {
  193. return err
  194. }
  195. u.Cert = clientCert.Cert
  196. u.Key = clientCert.Key
  197. u.ServerSerialNumber = server.SerialNumber
  198. db.Save(u)
  199. err = Emit()
  200. if err != nil {
  201. return err
  202. }
  203. logrus.Infof("user renewed cert: %s", u.GetUsername())
  204. return nil
  205. }
  206. // GetUsername returns user's username.
  207. func (u *DBUser) GetUsername() string {
  208. return u.Username
  209. }
  210. // GetCert returns user's public certificate.
  211. func (u *DBUser) GetCert() string {
  212. return u.Cert
  213. }
  214. // GetServerSerialNumber returns user's server serial number.
  215. func (u *DBUser) GetServerSerialNumber() string {
  216. return u.ServerSerialNumber
  217. }
  218. // GetCreatedAt returns user's creation time.
  219. func (u *DBUser) GetCreatedAt() string {
  220. return u.CreatedAt.Format(time.UnixDate)
  221. }
  222. // getIP returns user's vpn ip addr.
  223. func (u *DBUser) getIP() net.IP {
  224. clientsNetMask := net.IPMask(net.ParseIP(_DefaultServerNetMask))
  225. clientsNetPrefix := net.ParseIP(_DefaultServerNetwork)
  226. clientNet := clientsNetPrefix.Mask(clientsNetMask).To4()
  227. clientNet[3] = byte(u.ID)
  228. return clientNet
  229. }
  230. // GetIPNet returns user's vpn ip network. (e.g. 192.168.0.1/24)
  231. func (u *DBUser) GetIPNet() string {
  232. mask := net.IPMask(net.ParseIP(_DefaultServerNetMask))
  233. ipn := net.IPNet{
  234. IP: u.getIP(),
  235. Mask: mask,
  236. }
  237. return ipn.String()
  238. }
  239. // IsNoGW returns wether user is set to get the vpn server as their default gateway.
  240. func (u *DBUser) IsNoGW() bool {
  241. return u.NoGW
  242. }