rpc.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607
  1. package api
  2. import (
  3. "os"
  4. "time"
  5. "google.golang.org/grpc"
  6. "google.golang.org/grpc/codes"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/cad/ovpm"
  9. "github.com/cad/ovpm/api/pb"
  10. "github.com/cad/ovpm/permset"
  11. "golang.org/x/net/context"
  12. )
  13. type AuthService struct{}
  14. func (s *AuthService) Status(ctx context.Context, req *pb.AuthStatusRequest) (*pb.AuthStatusResponse, error) {
  15. logrus.Debug("rpc call: auth status")
  16. username, err := GetUsernameFromContext(ctx)
  17. if err != nil {
  18. logrus.Debugln(err)
  19. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  20. }
  21. if username == "root" {
  22. userResp := pb.UserResponse_User{
  23. Username: username,
  24. IsAdmin: true,
  25. }
  26. return &pb.AuthStatusResponse{User: &userResp, IsRoot: true}, nil
  27. }
  28. user, err := ovpm.GetUser(username)
  29. if err != nil {
  30. logrus.Debugln(err)
  31. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  32. }
  33. userResp := pb.UserResponse_User{
  34. Username: user.GetUsername(),
  35. IsAdmin: user.IsAdmin(),
  36. }
  37. return &pb.AuthStatusResponse{User: &userResp}, nil
  38. }
  39. func (s *AuthService) Authenticate(ctx context.Context, req *pb.AuthAuthenticateRequest) (*pb.AuthAuthenticateResponse, error) {
  40. logrus.Debug("rpc call: auth authenticate")
  41. user, err := ovpm.GetUser(req.Username)
  42. if err != nil {
  43. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  44. }
  45. if !user.CheckPassword(req.Password) {
  46. return nil, grpc.Errorf(codes.Unauthenticated, "user not found with the provided credentials")
  47. }
  48. token, err := user.RenewToken()
  49. if err != nil {
  50. return nil, grpc.Errorf(codes.Internal, "token can not be generated")
  51. }
  52. return &pb.AuthAuthenticateResponse{Token: token}, nil
  53. }
  54. type UserService struct{}
  55. func (s *UserService) List(ctx context.Context, req *pb.UserListRequest) (*pb.UserResponse, error) {
  56. logrus.Debug("rpc call: user list")
  57. perms, err := permset.FromContext(ctx)
  58. if err != nil {
  59. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  60. }
  61. // Check perms.
  62. if !perms.Contains(ovpm.GetAnyUserPerm) {
  63. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetAnyUserPerm is required for this operation")
  64. }
  65. var ut []*pb.UserResponse_User
  66. users, err := ovpm.GetAllUsers()
  67. if err != nil {
  68. logrus.Errorf("users can not be fetched: %v", err)
  69. os.Exit(1)
  70. return nil, err
  71. }
  72. for _, user := range users {
  73. isConnected, connectedSince, bytesSent, bytesReceived := user.ConnectionStatus()
  74. ut = append(ut, &pb.UserResponse_User{
  75. ServerSerialNumber: user.GetServerSerialNumber(),
  76. Username: user.GetUsername(),
  77. CreatedAt: user.GetCreatedAt(),
  78. IpNet: user.GetIPNet(),
  79. NoGw: user.IsNoGW(),
  80. HostId: user.GetHostID(),
  81. IsAdmin: user.IsAdmin(),
  82. IsConnected: isConnected,
  83. ConnectedSince: connectedSince.UTC().Format(time.RFC3339),
  84. BytesSent: bytesSent,
  85. BytesReceived: bytesReceived,
  86. ExpiresAt: user.ExpiresAt().UTC().Format(time.RFC3339),
  87. })
  88. }
  89. return &pb.UserResponse{Users: ut}, nil
  90. }
  91. func (s *UserService) Create(ctx context.Context, req *pb.UserCreateRequest) (*pb.UserResponse, error) {
  92. logrus.Debugf("rpc call: user create: %s", req.Username)
  93. perms, err := permset.FromContext(ctx)
  94. if err != nil {
  95. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  96. }
  97. // Check perms.
  98. if !perms.Contains(ovpm.CreateUserPerm) {
  99. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateUserPerm is required for this operation")
  100. }
  101. var ut []*pb.UserResponse_User
  102. user, err := ovpm.CreateNewUser(req.Username, req.Password, req.NoGw, req.HostId, req.IsAdmin)
  103. if err != nil {
  104. return nil, err
  105. }
  106. pbUser := pb.UserResponse_User{
  107. Username: user.GetUsername(),
  108. ServerSerialNumber: user.GetServerSerialNumber(),
  109. NoGw: user.IsNoGW(),
  110. HostId: user.GetHostID(),
  111. IsAdmin: user.IsAdmin(),
  112. }
  113. ut = append(ut, &pbUser)
  114. return &pb.UserResponse{Users: ut}, nil
  115. }
  116. func (s *UserService) Update(ctx context.Context, req *pb.UserUpdateRequest) (*pb.UserResponse, error) {
  117. logrus.Debugf("rpc call: user update: %s", req.Username)
  118. var ut []*pb.UserResponse_User
  119. user, err := ovpm.GetUser(req.Username)
  120. if err != nil {
  121. return nil, err
  122. }
  123. var noGW bool
  124. switch req.Gwpref {
  125. case pb.UserUpdateRequest_NOGW:
  126. noGW = true
  127. case pb.UserUpdateRequest_GW:
  128. noGW = false
  129. default:
  130. noGW = user.NoGW
  131. }
  132. var admin bool
  133. switch req.AdminPref {
  134. case pb.UserUpdateRequest_ADMIN:
  135. admin = true
  136. case pb.UserUpdateRequest_NOADMIN:
  137. admin = false
  138. case pb.UserUpdateRequest_NOPREFADMIN:
  139. admin = user.IsAdmin()
  140. }
  141. perms, err := permset.FromContext(ctx)
  142. if err != nil {
  143. return nil, grpc.Errorf(codes.Unauthenticated, "permset not found within the context")
  144. }
  145. username, err := GetUsernameFromContext(ctx)
  146. if err != nil {
  147. logrus.Debugln(err)
  148. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  149. }
  150. // User has admin perms?
  151. if perms.Contains(ovpm.UpdateAnyUserPerm) {
  152. err = user.Update(req.Password, noGW, req.HostId, admin)
  153. if err != nil {
  154. return nil, err
  155. }
  156. ut = append(ut, &pb.UserResponse_User{
  157. Username: user.GetUsername(),
  158. ServerSerialNumber: user.GetServerSerialNumber(),
  159. NoGw: user.IsNoGW(),
  160. HostId: user.GetHostID(),
  161. IsAdmin: user.IsAdmin(),
  162. })
  163. return &pb.UserResponse{Users: ut}, nil
  164. }
  165. // User has self update perms?
  166. if perms.Contains(ovpm.UpdateSelfPerm) {
  167. if user.GetUsername() != username {
  168. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only update their user with ovpm.UpdateSelfPerm")
  169. }
  170. err = user.Update(req.Password, noGW, req.HostId, admin)
  171. if err != nil {
  172. return nil, err
  173. }
  174. ut = append(ut, &pb.UserResponse_User{
  175. Username: user.GetUsername(),
  176. ServerSerialNumber: user.GetServerSerialNumber(),
  177. NoGw: user.IsNoGW(),
  178. HostId: user.GetHostID(),
  179. IsAdmin: user.IsAdmin(),
  180. })
  181. return &pb.UserResponse{Users: ut}, nil
  182. }
  183. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  184. }
  185. func (s *UserService) Delete(ctx context.Context, req *pb.UserDeleteRequest) (*pb.UserResponse, error) {
  186. logrus.Debugf("rpc call: user delete: %s", req.Username)
  187. var ut []*pb.UserResponse_User
  188. user, err := ovpm.GetUser(req.Username)
  189. if err != nil {
  190. return nil, err
  191. }
  192. perms, err := permset.FromContext(ctx)
  193. if err != nil {
  194. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  195. }
  196. if !perms.Contains(ovpm.DeleteAnyUserPerm) {
  197. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteAnyUserPerm is required for this operation.")
  198. }
  199. pbUser := pb.UserResponse_User{
  200. Username: user.GetUsername(),
  201. ServerSerialNumber: user.GetServerSerialNumber(),
  202. HostId: user.GetHostID(),
  203. IsAdmin: user.IsAdmin(),
  204. }
  205. ut = append(ut, &pbUser)
  206. err = user.Delete()
  207. if err != nil {
  208. return nil, err
  209. }
  210. return &pb.UserResponse{Users: ut}, nil
  211. }
  212. func (s *UserService) Renew(ctx context.Context, req *pb.UserRenewRequest) (*pb.UserResponse, error) {
  213. logrus.Debugf("rpc call: user renew cert: %s", req.Username)
  214. var ut []*pb.UserResponse_User
  215. user, err := ovpm.GetUser(req.Username)
  216. if err != nil {
  217. return nil, err
  218. }
  219. pbUser := pb.UserResponse_User{
  220. Username: user.GetUsername(),
  221. ServerSerialNumber: user.GetServerSerialNumber(),
  222. HostId: user.GetHostID(),
  223. IsAdmin: user.IsAdmin(),
  224. }
  225. ut = append(ut, &pbUser)
  226. perms, err := permset.FromContext(ctx)
  227. if err != nil {
  228. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  229. }
  230. if !perms.Contains(ovpm.RenewAnyUserPerm) {
  231. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.RenewAnyUserPerm is required for this operation.")
  232. }
  233. err = user.Renew()
  234. if err != nil {
  235. return nil, err
  236. }
  237. return &pb.UserResponse{Users: ut}, nil
  238. }
  239. func (s *UserService) GenConfig(ctx context.Context, req *pb.UserGenConfigRequest) (*pb.UserGenConfigResponse, error) {
  240. logrus.Debugf("rpc call: user genconfig: %s", req.Username)
  241. user, err := ovpm.GetUser(req.Username)
  242. if err != nil {
  243. return nil, err
  244. }
  245. username, err := GetUsernameFromContext(ctx)
  246. if err != nil {
  247. logrus.Debugln(err)
  248. return nil, grpc.Errorf(codes.Unauthenticated, "username not found with the provided credentials")
  249. }
  250. perms, err := permset.FromContext(ctx)
  251. if err != nil {
  252. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  253. }
  254. if perms.Contains(ovpm.GenConfigAnyUserPerm) {
  255. configBlob, err := ovpm.TheServer().DumpsClientConfig(user.GetUsername())
  256. if err != nil {
  257. return nil, err
  258. }
  259. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  260. }
  261. if perms.Contains(ovpm.GenConfigSelfPerm) {
  262. if user.GetUsername() != username {
  263. return nil, grpc.Errorf(codes.PermissionDenied, "Caller can only genconfig for their user.")
  264. }
  265. configBlob, err := ovpm.TheServer().DumpsClientConfig(user.GetUsername())
  266. if err != nil {
  267. return nil, err
  268. }
  269. return &pb.UserGenConfigResponse{ClientConfig: configBlob}, nil
  270. }
  271. return nil, grpc.Errorf(codes.PermissionDenied, "Permissions are required for this operation.")
  272. }
  273. type VPNService struct{}
  274. func (s *VPNService) Status(ctx context.Context, req *pb.VPNStatusRequest) (*pb.VPNStatusResponse, error) {
  275. logrus.Debugf("rpc call: vpn status")
  276. server := ovpm.TheServer()
  277. perms, err := permset.FromContext(ctx)
  278. if err != nil {
  279. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  280. }
  281. if !perms.Contains(ovpm.GetVPNStatusPerm) {
  282. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetVPNStatusPerm is required for this operation.")
  283. }
  284. response := pb.VPNStatusResponse{
  285. Name: server.GetServerName(),
  286. SerialNumber: server.GetSerialNumber(),
  287. Hostname: server.GetHostname(),
  288. Port: server.GetPort(),
  289. Proto: server.GetProto(),
  290. Cert: server.Cert,
  291. CaCert: server.GetCACert(),
  292. Net: server.GetNet(),
  293. Mask: server.GetMask(),
  294. CreatedAt: server.GetCreatedAt(),
  295. Dns: server.GetDNS(),
  296. ExpiresAt: server.ExpiresAt().UTC().Format(time.RFC3339),
  297. CaExpiresAt: server.CAExpiresAt().UTC().Format(time.RFC3339),
  298. }
  299. return &response, nil
  300. }
  301. func (s *VPNService) Init(ctx context.Context, req *pb.VPNInitRequest) (*pb.VPNInitResponse, error) {
  302. logrus.Debugf("rpc call: vpn init")
  303. var proto string
  304. switch req.ProtoPref {
  305. case pb.VPNProto_TCP:
  306. proto = ovpm.TCPProto
  307. case pb.VPNProto_UDP:
  308. proto = ovpm.UDPProto
  309. case pb.VPNProto_NOPREF:
  310. proto = ovpm.UDPProto
  311. }
  312. perms, err := permset.FromContext(ctx)
  313. if err != nil {
  314. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  315. }
  316. if !perms.Contains(ovpm.InitVPNPerm) {
  317. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.InitVPNPerm is required for this operation.")
  318. }
  319. if err := ovpm.TheServer().Init(req.Hostname, req.Port, proto, req.IpBlock, req.Dns); err != nil {
  320. logrus.Errorf("server can not be created: %v", err)
  321. }
  322. return &pb.VPNInitResponse{}, nil
  323. }
  324. func (s *VPNService) Update(ctx context.Context, req *pb.VPNUpdateRequest) (*pb.VPNUpdateResponse, error) {
  325. logrus.Debugf("rpc call: vpn update")
  326. perms, err := permset.FromContext(ctx)
  327. if err != nil {
  328. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  329. }
  330. if !perms.Contains(ovpm.UpdateVPNPerm) {
  331. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.UpdateVPNPerm is required for this operation.")
  332. }
  333. if err := ovpm.TheServer().Update(req.IpBlock, req.Dns); err != nil {
  334. logrus.Errorf("server can not be updated: %v", err)
  335. }
  336. return &pb.VPNUpdateResponse{}, nil
  337. }
  338. func (s *VPNService) Restart(ctx context.Context, req *pb.VPNRestartRequest) (*pb.VPNRestartResponse, error) {
  339. logrus.Debugf("rpc call: vpn restart")
  340. perms, err := permset.FromContext(ctx)
  341. if err != nil {
  342. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  343. }
  344. if !perms.Contains(ovpm.RestartVPNPerm) {
  345. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.UpdateVPNPerm is required for this operation.")
  346. }
  347. ovpm.TheServer().RestartVPNProc()
  348. return &pb.VPNRestartResponse{}, nil
  349. }
  350. type NetworkService struct{}
  351. func (s *NetworkService) List(ctx context.Context, req *pb.NetworkListRequest) (*pb.NetworkListResponse, error) {
  352. logrus.Debug("rpc call: network list")
  353. var nt []*pb.Network
  354. perms, err := permset.FromContext(ctx)
  355. if err != nil {
  356. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  357. }
  358. if !perms.Contains(ovpm.ListNetworksPerm) {
  359. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.ListNetworksPerm is required for this operation.")
  360. }
  361. networks := ovpm.GetAllNetworks()
  362. for _, network := range networks {
  363. nt = append(nt, &pb.Network{
  364. Name: network.GetName(),
  365. Cidr: network.GetCIDR(),
  366. Type: network.GetType().String(),
  367. CreatedAt: network.GetCreatedAt(),
  368. AssociatedUsernames: network.GetAssociatedUsernames(),
  369. Via: network.GetVia(),
  370. })
  371. }
  372. return &pb.NetworkListResponse{Networks: nt}, nil
  373. }
  374. func (s *NetworkService) Create(ctx context.Context, req *pb.NetworkCreateRequest) (*pb.NetworkCreateResponse, error) {
  375. logrus.Debugf("rpc call: network create: %s", req.Name)
  376. perms, err := permset.FromContext(ctx)
  377. if err != nil {
  378. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  379. }
  380. if !perms.Contains(ovpm.CreateNetworkPerm) {
  381. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.CreateNetworkPerm is required for this operation.")
  382. }
  383. network, err := ovpm.CreateNewNetwork(req.Name, req.Cidr, ovpm.NetworkTypeFromString(req.Type), req.Via)
  384. if err != nil {
  385. return nil, err
  386. }
  387. n := pb.Network{
  388. Name: network.GetName(),
  389. Cidr: network.GetCIDR(),
  390. Type: network.GetType().String(),
  391. CreatedAt: network.GetCreatedAt(),
  392. AssociatedUsernames: network.GetAssociatedUsernames(),
  393. Via: network.GetVia(),
  394. }
  395. return &pb.NetworkCreateResponse{Network: &n}, nil
  396. }
  397. func (s *NetworkService) Delete(ctx context.Context, req *pb.NetworkDeleteRequest) (*pb.NetworkDeleteResponse, error) {
  398. logrus.Debugf("rpc call: network delete: %s", req.Name)
  399. perms, err := permset.FromContext(ctx)
  400. if err != nil {
  401. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  402. }
  403. if !perms.Contains(ovpm.DeleteNetworkPerm) {
  404. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DeleteNetworkPerm is required for this operation.")
  405. }
  406. network, err := ovpm.GetNetwork(req.Name)
  407. if err != nil {
  408. return nil, err
  409. }
  410. err = network.Delete()
  411. if err != nil {
  412. return nil, err
  413. }
  414. n := pb.Network{
  415. Name: network.GetName(),
  416. Cidr: network.GetCIDR(),
  417. Type: network.GetType().String(),
  418. CreatedAt: network.GetCreatedAt(),
  419. AssociatedUsernames: network.GetAssociatedUsernames(),
  420. Via: network.GetVia(),
  421. }
  422. return &pb.NetworkDeleteResponse{Network: &n}, nil
  423. }
  424. func (s *NetworkService) GetAllTypes(ctx context.Context, req *pb.NetworkGetAllTypesRequest) (*pb.NetworkGetAllTypesResponse, error) {
  425. logrus.Debugf("rpc call: network get-types")
  426. var networkTypes []*pb.NetworkType
  427. perms, err := permset.FromContext(ctx)
  428. if err != nil {
  429. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  430. }
  431. if !perms.Contains(ovpm.GetNetworkTypesPerm) {
  432. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkTypesPerm is required for this operation.")
  433. }
  434. for _, nt := range ovpm.GetAllNetworkTypes() {
  435. if nt == ovpm.UNDEFINEDNET {
  436. continue
  437. }
  438. networkTypes = append(networkTypes, &pb.NetworkType{Type: nt.String(), Description: nt.Description()})
  439. }
  440. return &pb.NetworkGetAllTypesResponse{Types: networkTypes}, nil
  441. }
  442. func (s *NetworkService) GetAssociatedUsers(ctx context.Context, req *pb.NetworkGetAssociatedUsersRequest) (*pb.NetworkGetAssociatedUsersResponse, error) {
  443. logrus.Debugf("rpc call: network get-associated-users")
  444. perms, err := permset.FromContext(ctx)
  445. if err != nil {
  446. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  447. }
  448. if !perms.Contains(ovpm.GetNetworkAssociatedUsersPerm) {
  449. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.GetNetworkAssociatedUsersPerm is required for this operation.")
  450. }
  451. network, err := ovpm.GetNetwork(req.Name)
  452. if err != nil {
  453. return nil, err
  454. }
  455. usernames := network.GetAssociatedUsernames()
  456. return &pb.NetworkGetAssociatedUsersResponse{Usernames: usernames}, nil
  457. }
  458. func (s *NetworkService) Associate(ctx context.Context, req *pb.NetworkAssociateRequest) (*pb.NetworkAssociateResponse, error) {
  459. logrus.Debugf("rpc call: network associate")
  460. perms, err := permset.FromContext(ctx)
  461. if err != nil {
  462. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  463. }
  464. if !perms.Contains(ovpm.AssociateNetworkUserPerm) {
  465. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.AssociateNetworkUserPerm is required for this operation.")
  466. }
  467. network, err := ovpm.GetNetwork(req.Name)
  468. if err != nil {
  469. return nil, err
  470. }
  471. err = network.Associate(req.Username)
  472. if err != nil {
  473. return nil, err
  474. }
  475. return &pb.NetworkAssociateResponse{}, nil
  476. }
  477. func (s *NetworkService) Dissociate(ctx context.Context, req *pb.NetworkDissociateRequest) (*pb.NetworkDissociateResponse, error) {
  478. logrus.Debugf("rpc call: network dissociate")
  479. perms, err := permset.FromContext(ctx)
  480. if err != nil {
  481. return nil, grpc.Errorf(codes.Unauthenticated, "Can't get permset from context")
  482. }
  483. if !perms.Contains(ovpm.DissociateNetworkUserPerm) {
  484. return nil, grpc.Errorf(codes.PermissionDenied, "ovpm.DissociateNetworkUserPerm is required for this operation.")
  485. }
  486. network, err := ovpm.GetNetwork(req.Name)
  487. if err != nil {
  488. return nil, err
  489. }
  490. err = network.Dissociate(req.Username)
  491. if err != nil {
  492. return nil, err
  493. }
  494. return &pb.NetworkDissociateResponse{}, nil
  495. }
  496. // NewRPCServer returns a new gRPC server.
  497. func NewRPCServer() *grpc.Server {
  498. var opts []grpc.ServerOption
  499. opts = append(opts, grpc.UnaryInterceptor(AuthUnaryInterceptor))
  500. s := grpc.NewServer(opts...)
  501. //s := grpc.NewServer()
  502. pb.RegisterUserServiceServer(s, &UserService{})
  503. pb.RegisterVPNServiceServer(s, &VPNService{})
  504. pb.RegisterNetworkServiceServer(s, &NetworkService{})
  505. pb.RegisterAuthServiceServer(s, &AuthService{})
  506. return s
  507. }