import logging import os import platform from leap.util.fileutil import (which, check_and_fix_urw_only) from leap.base import config as baseconfig from leap.baseapp.permcheck import (is_pkexec_in_system, is_auth_agent_running) from leap.eip import exceptions as eip_exceptions from leap.eip import specs as eipspecs logging.basicConfig() logger = logging.getLogger(name=__name__) logger.setLevel('DEBUG') class EIPConfig(baseconfig.JSONLeapConfig): spec = eipspecs.eipconfig_spec def _get_slug(self): return baseconfig.get_config_file('eip.json') def _set_slug(self, *args, **kwargs): raise AttributeError("you cannot set slug") slug = property(_get_slug, _set_slug) class EIPServiceConfig(baseconfig.JSONLeapConfig): spec = eipspecs.eipservice_config_spec def _get_slug(self): return baseconfig.get_config_file( 'eip-service.json', folder=baseconfig.get_default_provider_path()) def _set_slug(self): raise AttributeError("you cannot set slug") slug = property(_get_slug, _set_slug) def build_ovpn_options(daemon=False): """ build a list of options to be passed in the openvpn invocation @rtype: list @rparam: options """ # XXX review which of the # options we don't need. # TODO pass also the config file, # since we will need to take some # things from there if present. # get user/group name # also from config. user = baseconfig.get_username() group = baseconfig.get_groupname() opts = [] opts.append('--client') opts.append('--dev') # XXX same in win? opts.append('tun') opts.append('--persist-tun') opts.append('--persist-key') # remote # XXX get remote from eip.json opts.append('--remote') opts.append('testprovider.example.org') opts.append('1194') opts.append('udp') opts.append('--tls-client') opts.append('--remote-cert-tls') opts.append('server') # set user and group opts.append('--user') opts.append('%s' % user) opts.append('--group') opts.append('%s' % group) opts.append('--management-client-user') opts.append('%s' % user) opts.append('--management-signal') # set default options for management # interface. unix sockets or telnet interface for win. # XXX take them from the config object. ourplatform = platform.system() if ourplatform in ("Linux", "Mac"): opts.append('--management') # XXX get a different sock each time ... # XXX #505 opts.append('/tmp/.eip.sock') opts.append('unix') if ourplatform == "Windows": opts.append('--management') opts.append('localhost') # XXX which is a good choice? opts.append('7777') # certs opts.append('--cert') opts.append(eipspecs.client_cert_path()) opts.append('--key') opts.append(eipspecs.client_cert_path()) opts.append('--ca') opts.append(eipspecs.provider_ca_path()) # we cannot run in daemon mode # with the current subp setting. # see: https://leap.se/code/issues/383 #if daemon is True: #opts.append('--daemon') return opts def build_ovpn_command(debug=False, do_pkexec_check=True, vpnbin=None): """ build a string with the complete openvpn invocation @rtype [string, [list of strings]] @rparam: a list containing the command string and a list of options. """ command = [] use_pkexec = True ovpn = None # XXX get use_pkexec from config instead. if platform.system() == "Linux" and use_pkexec and do_pkexec_check: # check for both pkexec # AND a suitable authentication # agent running. logger.info('use_pkexec set to True') if not is_pkexec_in_system(): logger.error('no pkexec in system') raise eip_exceptions.EIPNoPkexecAvailable if not is_auth_agent_running(): logger.warning( "no polkit auth agent found. " "pkexec will use its own text " "based authentication agent. " "that's probably a bad idea") raise eip_exceptions.EIPNoPolkitAuthAgentAvailable command.append('pkexec') if vpnbin is None: ovpn = which('openvpn') else: ovpn = vpnbin if ovpn: vpn_command = ovpn else: vpn_command = "openvpn" command.append(vpn_command) daemon_mode = not debug for opt in build_ovpn_options(daemon=daemon_mode): command.append(opt) # XXX check len and raise proper error return [command[0], command[1:]] def check_vpn_keys(): """ performs an existance and permission check over the openvpn keys file. Currently we're expecting a single file per provider, containing the CA cert, the provider key, and our client certificate """ provider_ca = eipspecs.provider_ca_path() client_cert = eipspecs.client_cert_path() logger.debug('provider ca = %s', provider_ca) logger.debug('client cert = %s', client_cert) # if no keys, raise error. # should be catched by the ui and signal user. for keyfile in (provider_ca, client_cert): if not os.path.isfile(keyfile): logger.error('key file %s not found. aborting.', keyfile) raise eip_exceptions.EIPInitNoKeyFileError # check proper permission on keys # bad perms? try to fix them try: check_and_fix_urw_only(keyfile) except OSError: raise eip_exceptions.EIPInitBadKeyFilePermError