1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
|
"""
OpenVPN Connection
"""
from __future__ import (print_function)
import logging
import socket
import time
from functools import partial
logger = logging.getLogger(name=__name__)
from leap.base.connection import Connection
from leap.util.coroutines import spawn_and_watch_process
from leap.eip.udstelnet import UDSTelnet
from leap.eip import config as eip_config
from leap.eip import exceptions as eip_exceptions
class OpenVPNConnection(Connection):
"""
All related to invocation
of the openvpn binary
"""
# Connection Methods
def __init__(self, config_file=None,
watcher_cb=None,
debug=False,
host="/tmp/.eip.sock",
port="unix",
password=None,
*args, **kwargs):
#XXX FIXME
#change watcher_cb to line_observer
"""
:param config_file: configuration file to read from
:param watcher_cb: callback to be \
called for each line in watched stdout
:param signal_map: dictionary of signal names and callables \
to be triggered for each one of them.
:type config_file: str
:type watcher_cb: function
:type signal_map: dict
"""
self.debug = debug
#print('conductor:%s' % debug)
self.config_file = config_file
self.watcher_cb = watcher_cb
#self.signal_maps = signal_maps
self.subp = None
self.watcher = None
self.server = None
self.port = None
self.proto = None
self.missing_pkexec = False
self.missing_auth_agent = False
self.bad_keyfile_perms = False
self.missing_vpn_keyfile = False
self.missing_provider = False
self.bad_provider = False
#XXX workaround for signaling
#the ui that we don't know how to
#manage a connection error
self.with_errors = False
self.command = None
self.args = None
self.autostart = True
self._get_or_create_config()
self._check_vpn_keys()
#
# management init methods
#
self.host = host
if isinstance(port, str) and port.isdigit():
port = int(port)
self.port = port
self.password = password
self.tn = None
def _set_autostart(self):
config = self.config
if config.has_option('openvpn', 'autostart'):
autostart = config.getboolean('openvpn',
'autostart')
self.autostart = autostart
else:
if config.has_option('DEFAULT', 'autostart'):
autostart = config.getboolean('DEFAULT',
'autostart')
self.autostart = autostart
def _set_ovpn_command(self):
config = self.config
if config.has_option('openvpn', 'command'):
commandline = config.get('openvpn', 'command')
command_split = commandline.split(' ')
command = command_split[0]
if len(command_split) > 1:
args = command_split[1:]
else:
args = []
self.command = command
self.args = args
else:
# no command in config, we build it up.
# XXX check also for command-line --command flag
try:
command, args = eip_config.build_ovpn_command(
config,
debug=self.debug)
except eip_exceptions.EIPNoPolkitAuthAgentAvailable:
command = args = None
self.missing_auth_agent = True
except eip_exceptions.EIPNoPkexecAvailable:
command = args = None
self.missing_pkexec = True
# XXX if not command, signal error.
self.command = command
self.args = args
def _check_ovpn_config(self):
"""
checks if there is a default openvpn config.
if not, it writes one with info from the provider
definition file
"""
# TODO
# - get --with-openvpn-config from opts
try:
eip_config.check_or_create_default_vpnconf(self.config)
except eip_exceptions.EIPInitNoProviderError:
logger.error('missing default provider definition')
self.missing_provider = True
except eip_exceptions.EIPInitBadProviderError:
logger.error('bad provider definition')
self.bad_provider = True
def _get_or_create_config(self):
"""
retrieves the config options from defaults or
home file, or config file passed in command line.
populates command and args to be passed to subprocess.
"""
config = eip_config.get_config(
config_file=self.config_file)
self.config = config
self._set_autostart()
self._set_ovpn_command()
self._check_ovpn_config()
def _check_vpn_keys(self):
"""
checks for correct permissions on vpn keys
"""
try:
eip_config.check_vpn_keys(self.config)
except eip_exceptions.EIPInitNoKeyFileError:
self.missing_vpn_keyfile = True
except eip_exceptions.EIPInitBadKeyFilePermError:
logger.error('error while checking vpn keys')
self.bad_keyfile_perms = True
def _launch_openvpn(self):
"""
invocation of openvpn binaries in a subprocess.
"""
#XXX TODO:
#deprecate watcher_cb,
#use _only_ signal_maps instead
if self.watcher_cb is not None:
linewrite_callback = self.watcher_cb
else:
#XXX get logger instead
linewrite_callback = lambda line: print('watcher: %s' % line)
observers = (linewrite_callback,
partial(lambda: None, self.status))
subp, watcher = spawn_and_watch_process(
self.command,
self.args,
observers=observers)
self.subp = subp
self.watcher = watcher
def _try_connection(self):
"""
attempts to connect
"""
if self.command is None:
raise eip_exceptions.EIPNoCommandError
if self.subp is not None:
print('cowardly refusing to launch subprocess again')
return
self._launch_openvpn()
def cleanup(self):
"""
terminates child subprocess
"""
if self.subp:
self.subp.terminate()
#
# management methods
#
# XXX REVIEW-ME
# REFACTOR INFO: (former "manager".
# Can we move to another
# base class to test independently?)
#
def forget_errors(self):
print('forgetting errors')
self.with_errors = False
def connect(self):
"""Connect to openvpn management interface"""
try:
self.close()
except:
#XXX don't like this general
#catch here.
pass
if self.connected():
return True
self.tn = UDSTelnet(self.host, self.port)
# XXX make password optional
# specially for win. we should generate
# the pass on the fly when invoking manager
# from conductor
#self.tn.read_until('ENTER PASSWORD:', 2)
#self.tn.write(self.password + '\n')
#self.tn.read_until('SUCCESS:', 2)
self._seek_to_eof()
self.forget_errors()
return True
def _seek_to_eof(self):
"""
Read as much as available. Position seek pointer to end of stream
"""
b = self.tn.read_eager()
while b:
b = self.tn.read_eager()
def connected(self):
"""
Returns True if connected
rtype: bool
"""
try:
assert self.tn
return True
except:
#XXX get rid of
#this pokemon exception!!!
return False
def close(self, announce=True):
"""
Close connection to openvpn management interface
"""
if announce:
self.tn.write("quit\n")
self.tn.read_all()
self.tn.get_socket().close()
del self.tn
def _send_command(self, cmd, tries=0):
"""
Send a command to openvpn and return response as list
"""
if tries > 3:
return []
if not self.connected():
try:
self.connect()
except eip_exceptions.MissingSocketError:
#XXX capture more helpful error
#messages
#pass
return self.make_error()
try:
self.tn.write(cmd + "\n")
except socket.error:
logger.error('socket error')
print('socket error!')
self.close(announce=False)
self._send_command(cmd, tries=tries + 1)
return []
buf = self.tn.read_until(b"END", 2)
self._seek_to_eof()
blist = buf.split('\r\n')
if blist[-1].startswith('END'):
del blist[-1]
return blist
else:
return []
def _send_short_command(self, cmd):
"""
parse output from commands that are
delimited by "success" instead
"""
if not self.connected():
self.connect()
self.tn.write(cmd + "\n")
# XXX not working?
buf = self.tn.read_until(b"SUCCESS", 2)
self._seek_to_eof()
blist = buf.split('\r\n')
return blist
#
# useful vpn commands
#
def pid(self):
#XXX broken
return self._send_short_command("pid")
def make_error(self):
"""
capture error and wrap it in an
understandable format
"""
#XXX get helpful error codes
self.with_errors = True
now = int(time.time())
return '%s,LAUNCHER ERROR,ERROR,-,-' % now
def state(self):
"""
OpenVPN command: state
"""
state = self._send_command("state")
if not state:
return None
if isinstance(state, str):
return state
if isinstance(state, list):
if len(state) == 1:
return state[0]
else:
return state[-1]
def status(self):
"""
OpenVPN command: status
"""
status = self._send_command("status")
return status
def status2(self):
"""
OpenVPN command: last 2 statuses
"""
return self._send_command("status 2")
#
# parse info
#
def get_status_io(self):
status = self.status()
if isinstance(status, str):
lines = status.split('\n')
if isinstance(status, list):
lines = status
try:
(header, when, tun_read, tun_write,
tcp_read, tcp_write, auth_read) = tuple(lines)
except ValueError:
return None
when_ts = time.strptime(when.split(',')[1], "%a %b %d %H:%M:%S %Y")
sep = ','
# XXX cleanup!
tun_read = tun_read.split(sep)[1]
tun_write = tun_write.split(sep)[1]
tcp_read = tcp_read.split(sep)[1]
tcp_write = tcp_write.split(sep)[1]
auth_read = auth_read.split(sep)[1]
# XXX this could be a named tuple. prettier.
return when_ts, (tun_read, tun_write, tcp_read, tcp_write, auth_read)
def get_connection_state(self):
state = self.state()
if state is not None:
ts, status_step, ok, ip, remote = state.split(',')
ts = time.gmtime(float(ts))
# XXX this could be a named tuple. prettier.
return ts, status_step, ok, ip, remote
|