mirror of
https://github.com/OpenVPN/openvpn3.git
synced 2024-09-19 19:52:15 +02:00
docs: Improve rendering of README
The GitHub rendering was not optimal and commit fa2919b27c
added a few
more changes disabling HTML rendering completely. This moves the
formatting closer to the .rst format GitHub supports.
Also fix a few various typ0s and a slight sentence improvement in the
new ovpn-dco section.
Signed-off-by: David Sommerseth <davids@openvpn.net>
This commit is contained in:
parent
1fe87f0842
commit
e241c1b7a4
400
README.rst
400
README.rst
@ -31,68 +31,79 @@ Building the OpenVPN 3 client on Linux
|
||||
|
||||
These instructions were tested on Ubuntu 20.
|
||||
|
||||
Prepare directory structure::
|
||||
Prepare directory structure:
|
||||
::
|
||||
|
||||
$ sudo apt install g++ make libmbedtls-dev libssl-dev liblz4-dev cmake
|
||||
$ export O3=~/O3 && mkdir $O3
|
||||
$ export DEP_DIR=$O3/deps && mkdir $DEP_DIR
|
||||
$ export DL=$O3/dl && mkdir $DL
|
||||
$ sudo apt install g++ make libmbedtls-dev libssl-dev liblz4-dev cmake
|
||||
$ export O3=~/O3 && mkdir $O3
|
||||
$ export DEP_DIR=$O3/deps && mkdir $DEP_DIR
|
||||
$ export DL=$O3/dl && mkdir $DL
|
||||
|
||||
Clone the OpenVPN 3 source repo::
|
||||
Clone the OpenVPN 3 source repo:
|
||||
::
|
||||
|
||||
$ cd $O3
|
||||
$ git clone https://github.com/OpenVPN/openvpn3.git core
|
||||
$ cd $O3
|
||||
$ git clone https://github.com/OpenVPN/openvpn3.git core
|
||||
|
||||
Build dependencies::
|
||||
Build dependencies:
|
||||
::
|
||||
|
||||
$ cd core/scripts/linux/
|
||||
$ ./build-all
|
||||
$ cd core/scripts/linux/
|
||||
$ ./build-all
|
||||
|
||||
Build the OpenVPN 3 client wrapper (cli) with OpenSSL library::
|
||||
Build the OpenVPN 3 client wrapper (cli) with OpenSSL library:
|
||||
::
|
||||
|
||||
$ cd $O3/core && mkdir build && cd build
|
||||
$ cmake ..
|
||||
$ cmake --build .
|
||||
$ cd $O3/core && mkdir build && cd build
|
||||
$ cmake ..
|
||||
$ cmake --build .
|
||||
|
||||
To use mbedTLS, use `cmake -DUSE_MBEDTLS=on ..`.
|
||||
To use mbed TLS, use:
|
||||
::
|
||||
|
||||
Run OpenVPN 3 client::
|
||||
$ cmake -DUSE_MBEDTLS=on ..
|
||||
|
||||
$ sudo test/ovpncli/ovpncli myprofile.ovpn route-nopull
|
||||
Run OpenVPN 3 client:
|
||||
::
|
||||
|
||||
Options used::
|
||||
$ sudo test/ovpncli/ovpncli myprofile.ovpn route-nopull
|
||||
|
||||
myprofile.ovpn : OpenVPN config file (must have .ovpn extension)
|
||||
route-nopull : if you are connected via ssh, prevent ssh session lockout
|
||||
Options used:
|
||||
|
||||
- :code:`myprofile.ovpn` : OpenVPN config file (must have .ovpn extension)
|
||||
- :code:`route-nopull` : if you are connected via ssh, prevent ssh session lockout
|
||||
|
||||
Using cli with ovpn-dco
|
||||
.......................
|
||||
"""""""""""""""""""""""
|
||||
|
||||
ovpn-dco is a kernel module which handles data channel
|
||||
and provides better proformance.
|
||||
ovpn-dco is a kernel module which optimises data channel encryption and
|
||||
transport, providing better performance.
|
||||
|
||||
Download, build and install ovpn-dco::
|
||||
Download, build and install ovpn-dco:
|
||||
::
|
||||
|
||||
$ cd $O3
|
||||
$ git clone https://github.com/OpenVPN/ovpn-dco.git
|
||||
$ cd ovpn-dco
|
||||
$ make && sudo make install
|
||||
$ sudo modprobe ovpn-dco
|
||||
$ cd $O3
|
||||
$ git clone https://github.com/OpenVPN/ovpn-dco.git
|
||||
$ cd ovpn-dco
|
||||
$ make && sudo make install
|
||||
$ sudo modprobe ovpn-dco
|
||||
|
||||
Install core dependencies::
|
||||
Install core dependencies:
|
||||
::
|
||||
|
||||
$ sudo apt install pkg-config libnl-genl-3-dev
|
||||
$ sudo apt install pkg-config libnl-genl-3-dev
|
||||
|
||||
Build cli with ovpn-dco support::
|
||||
Build cli with ovpn-dco support:
|
||||
::
|
||||
|
||||
$ cd $O3/core/build
|
||||
$ cmake -DCLI_OVPNDCO=on .. && make
|
||||
$ sudo test/ovpncli/ovpncliovpndco --dco myprofile.ovpn
|
||||
$ cd $O3/core/build
|
||||
$ cmake -DCLI_OVPNDCO=on .. && make
|
||||
$ sudo test/ovpncli/ovpncliovpndco --dco myprofile.ovpn
|
||||
|
||||
Options used::
|
||||
Options used:
|
||||
|
||||
myprofile.ovpn : OpenVPN config file (must have .ovpn extension)
|
||||
--dco : enable data channel offload
|
||||
- :code:`myprofile.ovpn` : OpenVPN config file (must have .ovpn extension)
|
||||
- :code:`--dco` : enable data channel offload
|
||||
|
||||
|
||||
Building the OpenVPN 3 client on Mac OS X
|
||||
@ -102,21 +113,24 @@ OpenVPN 3 should be built in a non-root Mac OS X account.
|
||||
Make sure that Xcode is installed with optional command-line tools.
|
||||
(These instructions have been tested with Xcode 5.1.1).
|
||||
|
||||
Create the directories ``~/src`` and ``~/src/mac``::
|
||||
Create the directories ``~/src`` and ``~/src/mac``:
|
||||
::
|
||||
|
||||
$ mkdir -p ~/src/mac
|
||||
$ mkdir -p ~/src/mac
|
||||
|
||||
Clone the OpenVPN 3 repo::
|
||||
Clone the OpenVPN 3 repo:
|
||||
::
|
||||
|
||||
$ cd ~/src
|
||||
$ mkdir ovpn3
|
||||
$ cd ovpn3
|
||||
$ git clone https://github.com/OpenVPN/openvpn3.git core
|
||||
$ cd ~/src
|
||||
$ mkdir ovpn3
|
||||
$ cd ovpn3
|
||||
$ git clone https://github.com/OpenVPN/openvpn3.git core
|
||||
|
||||
Export the shell variable ``O3`` to point to the OpenVPN 3 top level
|
||||
directory::
|
||||
directory:
|
||||
::
|
||||
|
||||
export O3=~/src/ovpn3
|
||||
$ export O3=~/src/ovpn3
|
||||
|
||||
Download source tarballs (``.tar.gz`` or ``.tgz``) for these dependency
|
||||
libraries into ``~/Downloads``
|
||||
@ -125,9 +139,9 @@ See the file ``$O3/core/deps/lib-versions`` for the expected
|
||||
version numbers of each dependency. If you want to use a different
|
||||
version of the library than listed here, you can edit this file.
|
||||
|
||||
1. Asio — https://github.com/chriskohlhoff/asio
|
||||
2. mbed TLS (2.3.0 or higher) — https://tls.mbed.org/
|
||||
3. LZ4 — https://github.com/Cyan4973/lz4
|
||||
1. Asio - https://github.com/chriskohlhoff/asio
|
||||
2. mbed TLS (2.3.0 or higher) - https://tls.mbed.org/
|
||||
3. LZ4 - https://github.com/Cyan4973/lz4
|
||||
|
||||
For dependencies that are typically cloned from github vs.
|
||||
provided as a .tar.gz file, tools are provided to convert
|
||||
@ -137,12 +151,14 @@ the github to a .tar.gz file. See "snapshot" scripts under
|
||||
Note that while OpenSSL is listed in lib-versions, it is
|
||||
not required for Mac builds.
|
||||
|
||||
Build the dependencies::
|
||||
Build the dependencies:
|
||||
::
|
||||
|
||||
$ DL=~/Downloads
|
||||
$ OSX_ONLY=1 $O3/core/scripts/mac/build-all
|
||||
|
||||
Now build the OpenVPN 3 client executable::
|
||||
Now build the OpenVPN 3 client executable:
|
||||
::
|
||||
|
||||
$ cd $O3/core
|
||||
$ . vars/vars-osx64
|
||||
@ -152,7 +168,7 @@ Now build the OpenVPN 3 client executable::
|
||||
|
||||
This will build the OpenVPN 3 client library with a small client
|
||||
wrapper (``cli``). It will also statically link in all external
|
||||
dependencies (Asio, mbedTLS, and LZ4), so ``cli`` may be distributed
|
||||
dependencies (Asio, mbed TLS, and LZ4), so ``cli`` may be distributed
|
||||
to other Macs and will run as a standalone executable.
|
||||
|
||||
These build scripts will create a **x86_x64** Mac OS X executable,
|
||||
@ -160,11 +176,13 @@ with a minimum deployment target of 10.8.x. The Mac OS X tuntap driver is not
|
||||
required, as OpenVPN 3 can use the integrated utun interface if
|
||||
available.
|
||||
|
||||
To view the client wrapper options::
|
||||
To view the client wrapper options:
|
||||
::
|
||||
|
||||
$ ./cli -h
|
||||
|
||||
To connect::
|
||||
To connect:
|
||||
::
|
||||
|
||||
$ ./cli client.ovpn
|
||||
|
||||
@ -178,19 +196,21 @@ Prerequisites:
|
||||
* CMake
|
||||
* vcpkg
|
||||
|
||||
Download and build dependencies::
|
||||
Download and build dependencies:
|
||||
::
|
||||
|
||||
> git clone https://github.com/Microsoft/vcpkg.git
|
||||
> cd vcpkg
|
||||
> bootstrap-vcpkg.bat
|
||||
> vcpkg integrate install
|
||||
> vcpkg install openssl-windows:x64-windows asio:x64-windows tap-windows6:x64-windows lz4:x64-windows gtest:x64-windows
|
||||
> git clone https://github.com/Microsoft/vcpkg.git
|
||||
> cd vcpkg
|
||||
> bootstrap-vcpkg.bat
|
||||
> vcpkg integrate install
|
||||
> vcpkg install openssl-windows:x64-windows asio:x64-windows tap-windows6:x64-windows lz4:x64-windows gtest:x64-windows
|
||||
|
||||
Download and build core test client::
|
||||
Download and build core test client:
|
||||
::
|
||||
|
||||
> git clone https://github.com/OpenVPN/openvpn3.git
|
||||
> cmake -DCMAKE_TOOLCHAIN_FILE=<path_to_vcpkg>\scripts\buildsystems\vcpkg.cmake -A x64 -B build openvpn3
|
||||
> cmake --build build --config Release --target ovpncli
|
||||
> git clone https://github.com/OpenVPN/openvpn3.git
|
||||
> cmake -DCMAKE_TOOLCHAIN_FILE=<path_to_vcpkg>\scripts\buildsystems\vcpkg.cmake -A x64 -B build openvpn3
|
||||
> cmake --build build --config Release --target ovpncli
|
||||
|
||||
Testing
|
||||
-------
|
||||
@ -208,50 +228,57 @@ is here: `<openvpn/ssl/proto.hpp>`_
|
||||
|
||||
The test code itself is here: `<test/ssl/proto.cpp>`_
|
||||
|
||||
Build the test::
|
||||
Build the test:
|
||||
::
|
||||
|
||||
$ cd ovpn3/core/test/ssl
|
||||
$ ECHO=1 PROF=linux ASIO_DIR=~/asio MTLS_SYS=1 NOSSL=1 $O3/core/scripts/build proto
|
||||
$ cd ovpn3/core/test/ssl
|
||||
$ ECHO=1 PROF=linux ASIO_DIR=~/asio MTLS_SYS=1 NOSSL=1 $O3/core/scripts/build proto
|
||||
|
||||
Run the test::
|
||||
Run the test:
|
||||
::
|
||||
|
||||
$ time ./proto
|
||||
*** app bytes=72777936 net_bytes=122972447 data_bytes=415892854 prog=0000216599/0000216598 D=12700/600/12700/600 N=109/109 SH=17400/15300 HE=0/0
|
||||
$ time ./proto
|
||||
*** app bytes=72777936 net_bytes=122972447 data_bytes=415892854 prog=0000216599/0000216598 D=12700/600/12700/600 N=109/109 SH=17400/15300 HE=0/0
|
||||
|
||||
real 0m15.813s
|
||||
user 0m15.800s
|
||||
sys 0m0.004s
|
||||
real 0m15.813s
|
||||
user 0m15.800s
|
||||
sys 0m0.004s
|
||||
|
||||
The OpenVPN 3 core also includes unit tests, which are based on
|
||||
Google Test framework. To run unit tests, you need to install
|
||||
CMake and build Google Test.
|
||||
|
||||
Building Google Test on Linux::
|
||||
Building Google Test on Linux:
|
||||
::
|
||||
|
||||
$ git clone https://github.com/google/googletest.git
|
||||
$ cd googletest
|
||||
$ cmake . && cmake --build .
|
||||
$ git clone https://github.com/google/googletest.git
|
||||
$ cd googletest
|
||||
$ cmake . && cmake --build .
|
||||
|
||||
Building Google Test on Windows::
|
||||
Building Google Test on Windows:
|
||||
::
|
||||
|
||||
> git clone https://github.com/google/googletest.git
|
||||
> cd googletest
|
||||
> cmake -G "Visual Studio 14 2015 Win64" .
|
||||
> cmake --build .
|
||||
> git clone https://github.com/google/googletest.git
|
||||
> cd googletest
|
||||
> cmake -G "Visual Studio 14 2015 Win64" .
|
||||
> cmake --build .
|
||||
|
||||
After Google Test is built you are ready to build and run unit tests.
|
||||
|
||||
Build and run tests on Linux::
|
||||
Build and run tests on Linux:
|
||||
::
|
||||
|
||||
$ cd ovpn3/core/test/unittests
|
||||
$ GTEST_DIR=~/googletest ECHO=1 PROF=linux ASIO_DIR=~/asio MTLS_SYS=1 LZ4_SYS=1 NOSSL=1 $O3/core/scripts/build test_log
|
||||
$ ./test_log
|
||||
$ cd ovpn3/core/test/unittests
|
||||
$ GTEST_DIR=~/googletest ECHO=1 PROF=linux ASIO_DIR=~/asio MTLS_SYS=1 LZ4_SYS=1 NOSSL=1 $O3/core/scripts/build test_log
|
||||
$ ./test_log
|
||||
|
||||
Build and run tests on Windows::
|
||||
Build and run tests on Windows:
|
||||
::
|
||||
|
||||
$ cd ovpn3/core/win
|
||||
$ python build.py ../test/unittests/test_log.cpp unittest
|
||||
$ test_log.exe
|
||||
|
||||
$ cd ovpn3/core/win
|
||||
$ python build.py ../test/unittests/test_log.cpp unittest
|
||||
$ test_log.exe
|
||||
|
||||
Developer Guide
|
||||
---------------
|
||||
@ -263,7 +290,7 @@ key C++ design patterns such as *RAII*:
|
||||
https://en.wikipedia.org/wiki/Resource_acquisition_is_initialization
|
||||
|
||||
OpenVPN 3 Client Core
|
||||
+++++++++++++++++++++
|
||||
"""""""""""""""""""""
|
||||
|
||||
OpenVPN 3 is designed as a class library, with an API that
|
||||
is essentially defined inside of namespace ``ClientAPI``
|
||||
@ -274,17 +301,17 @@ The consise definition of the client API is essentially ``class OpenVPNClient``
|
||||
in `<client/ovpncli.hpp>`_ with several imporant extensions to
|
||||
the API found in:
|
||||
|
||||
* **class TunBuilderBase** in `<openvpn/tun/builder/base.hpp>`_ —
|
||||
* :code:`class TunBuilderBase` in `<openvpn/tun/builder/base.hpp>`_ —
|
||||
Provides an abstraction layer defining the *tun* interface,
|
||||
and is especially useful for interfacing with an OS-layer VPN API.
|
||||
|
||||
* **class ExternalPKIBase** in `<openvpn/pki/epkibase.hpp>`_ —
|
||||
* :code:`class ExternalPKIBase` in `<openvpn/pki/epkibase.hpp>`_ —
|
||||
Provides a callback for external private key operations, and
|
||||
is useful for interfacing with an OS-layer Keychain such as
|
||||
the Keychain on iOS, Mac OS X, and Android, and the Crypto API
|
||||
on Windows.
|
||||
|
||||
* **class LogReceiver** in `<client/ovpncli.hpp>`_ —
|
||||
* :code:`class LogReceiver` in `<client/ovpncli.hpp>`_ —
|
||||
Provides an abstraction layer for the delivery of logging messages.
|
||||
|
||||
OpenVPN 3 includes a command-line reference client (``cli``) for
|
||||
@ -292,14 +319,13 @@ testing the API. See `<test/ovpncli/cli.cpp>`_.
|
||||
|
||||
The basic approach to building an OpenVPN 3 client is
|
||||
to define a client class that derives from
|
||||
``ClientAPI::OpenVPNClient``, then provide implementations
|
||||
:code:`ClientAPI::OpenVPNClient`, then provide implementations
|
||||
for callbacks including event and logging notifications:
|
||||
::
|
||||
|
||||
.. code:: c++
|
||||
|
||||
class Client : public ClientAPI::OpenVPNClient
|
||||
{
|
||||
public:
|
||||
class Client : public ClientAPI::OpenVPNClient
|
||||
{
|
||||
public:
|
||||
virtual void event(const Event&) override { // events delivered here
|
||||
...
|
||||
}
|
||||
@ -308,37 +334,34 @@ for callbacks including event and logging notifications:
|
||||
}
|
||||
|
||||
...
|
||||
};
|
||||
};
|
||||
|
||||
To start the client, first create a ``ClientAPI::Config`` object
|
||||
To start the client, first create a :code:`ClientAPI::Config` object
|
||||
and initialize it with the OpenVPN config file and other options:
|
||||
::
|
||||
|
||||
.. code:: c++
|
||||
|
||||
ClientAPI::Config config;
|
||||
config.content = <config_file_content_as_multiline_string>;
|
||||
...
|
||||
ClientAPI::Config config;
|
||||
config.content = <config_file_content_as_multiline_string>;
|
||||
...
|
||||
|
||||
Next, create a client object and evaluate the configuration:
|
||||
::
|
||||
|
||||
.. code:: c++
|
||||
|
||||
Client client;
|
||||
ClientAPI::EvalConfig eval = client.eval_config(config);
|
||||
if (eval.error)
|
||||
throw ...;
|
||||
Client client;
|
||||
ClientAPI::EvalConfig eval = client.eval_config(config);
|
||||
if (eval.error)
|
||||
throw ...;
|
||||
|
||||
Finally, in a new worker thread, start the connection:
|
||||
::
|
||||
|
||||
.. code:: c++
|
||||
ClientAPI::Status connect_status = client.connect();
|
||||
|
||||
ClientAPI::Status connect_status = client.connect();
|
||||
|
||||
Note that ``client.connect()`` will not return until
|
||||
Note that :code:`client.connect()` will not return until
|
||||
the session has terminated.
|
||||
|
||||
Top Layer
|
||||
.........
|
||||
"""""""""
|
||||
|
||||
The top layer of the OpenVPN 3 client is implemented
|
||||
in `<test/ovpncli/cli.cpp>`_ and `<openvpn/client/cliopt.hpp>`_.
|
||||
@ -347,9 +370,9 @@ dispatching the higher-level objects that implement the OpenVPN
|
||||
client session.
|
||||
|
||||
Connection
|
||||
..........
|
||||
""""""""""
|
||||
|
||||
``class ClientConnect`` in `<openvpn/client/cliconnect.hpp>`_
|
||||
:code:`class ClientConnect` in `<openvpn/client/cliconnect.hpp>`_
|
||||
implements the top-level connection logic for an OpenVPN client
|
||||
connection. It is concerned with starting, stopping, pausing, and resuming
|
||||
OpenVPN client connections. It deals with retrying a connection and handles
|
||||
@ -366,21 +389,22 @@ to the actual connection thread.
|
||||
|
||||
In an OpenVPN client connection, the following object stack would be used:
|
||||
|
||||
1. **class ClientConnect** in `<openvpn/client/cliconnect.hpp>`_ —
|
||||
1. :code:`class ClientConnect` in `<openvpn/client/cliconnect.hpp>`_ —
|
||||
The top-layer object in an OpenVPN client connection.
|
||||
2. **class ClientProto::Session** in `<openvpn/client/cliproto.hpp>`_ —
|
||||
2. :code:`class ClientProto::Session` in `<openvpn/client/cliproto.hpp>`_ —
|
||||
The OpenVPN client protocol object that subinstantiates the transport
|
||||
and tun layer objects.
|
||||
3. **class ProtoContext** in `<openvpn/ssl/proto.hpp>`_ —
|
||||
3. :code:`class ProtoContext` in `<openvpn/ssl/proto.hpp>`_ —
|
||||
The core OpenVPN protocol implementation that is common to both
|
||||
client and server.
|
||||
4. **class ProtoStackBase<Packet>** in `<openvpn/ssl/protostack.hpp>`_ —
|
||||
4. :code:`class ProtoStackBase<Packet>` in `<openvpn/ssl/protostack.hpp>`_ —
|
||||
The bottom-layer class that implements
|
||||
the basic functionality of tunneling a protocol over a reliable or
|
||||
unreliable transport layer, but isn't specific to OpenVPN per-se.
|
||||
|
||||
|
||||
Transport Layer
|
||||
...............
|
||||
"""""""""""""""
|
||||
|
||||
OpenVPN 3 defines abstract base classes for Transport layer
|
||||
implementations in `<openvpn/transport/client/transbase.hpp>`_.
|
||||
@ -391,8 +415,9 @@ Currently, transport layer implementations are provided for:
|
||||
* **TCP** — `<openvpn/transport/client/tcpcli.hpp>`_
|
||||
* **HTTP Proxy** — `<openvpn/transport/client/httpcli.hpp>`_
|
||||
|
||||
|
||||
Tun Layer
|
||||
.........
|
||||
"""""""""
|
||||
|
||||
OpenVPN 3 defines abstract base classes for Tun layer
|
||||
implementations in `<openvpn/tun/client/tunbase.hpp>`_.
|
||||
@ -406,21 +431,23 @@ layer implementation:
|
||||
|
||||
2. Use an OS-specific model such as:
|
||||
|
||||
* **Linux** — `<openvpn/tun/linux/client/tuncli.hpp>`_
|
||||
* **Windows** — `<openvpn/tun/win/client/tuncli.hpp>`_
|
||||
* **Mac OS X** — `<openvpn/tun/mac/client/tuncli.hpp>`_
|
||||
* **Linux** — `<openvpn/tun/linux/client/tuncli.hpp>`_
|
||||
* **Windows** — `<openvpn/tun/win/client/tuncli.hpp>`_
|
||||
* **Mac OS X** — `<openvpn/tun/mac/client/tuncli.hpp>`_
|
||||
|
||||
|
||||
Protocol Layer
|
||||
..............
|
||||
""""""""""""""
|
||||
|
||||
The OpenVPN protocol is implemented in **class ProtoContext**
|
||||
in `<openvpn/ssl/proto.hpp>`_.
|
||||
|
||||
|
||||
Options Processing
|
||||
..................
|
||||
""""""""""""""""""
|
||||
|
||||
The parsing and query of the OpenVPN config file
|
||||
is implemented by ``class OptionList`` in
|
||||
is implemented by :code:`class OptionList` in
|
||||
`<openvpn/common/options.hpp>`_.
|
||||
|
||||
Note that OpenVPN 3 always assumes an *inline* style of
|
||||
@ -429,14 +456,14 @@ defined inline rather than through an external file
|
||||
reference.
|
||||
|
||||
For config files that do use external file references,
|
||||
``class ProfileMerge`` in `<openvpn/options/merge.hpp>`_
|
||||
:code:`class ProfileMerge` in `<openvpn/options/merge.hpp>`_
|
||||
is provided to merge those external
|
||||
file references into an inline form.
|
||||
|
||||
Calling the Client API from other languages
|
||||
...........................................
|
||||
"""""""""""""""""""""""""""""""""""""""""""
|
||||
|
||||
The OpenVPN 3 client API, as defined by ``class OpenVPNClient``
|
||||
The OpenVPN 3 client API, as defined by :code:`class OpenVPNClient`
|
||||
in `<client/ovpncli.hpp>`_, can be wrapped by the
|
||||
Swig_ tool to create bindings for other languages.
|
||||
|
||||
@ -446,7 +473,7 @@ For example, OpenVPN Connect for Android creates a Java
|
||||
binding of the API using `<javacli/ovpncli.i>`_.
|
||||
|
||||
Security
|
||||
++++++++
|
||||
--------
|
||||
|
||||
When developing security software in C++, it's very important to
|
||||
take advantage of the language and OpenVPN library code
|
||||
@ -455,88 +482,84 @@ bugs that can introduce security vulnerabilities.
|
||||
|
||||
Here is a brief set of guidelines:
|
||||
|
||||
* When dealing with strings, use a ``std::string``
|
||||
rather than a ``char *``.
|
||||
* When dealing with strings, use a :code:`std::string`
|
||||
rather than a :code:`char *`.
|
||||
|
||||
* When dealing with binary data or buffers, always try to use a ``Buffer``,
|
||||
``ConstBuffer``, ``BufferAllocated``, or ``BufferPtr`` object to
|
||||
provide managed access to the buffer, to protect against security
|
||||
bugs that arise when using raw buffer pointers.
|
||||
See `<openvpn/buffer/buffer.hpp>`_ for the OpenVPN ``Buffer`` classes.
|
||||
* When dealing with binary data or buffers, always try to use a
|
||||
:code:`Buffer`, :code:`ConstBuffer`, :code:`BufferAllocated`, or
|
||||
:code:`BufferPtr` object to provide managed access to the buffer, to
|
||||
protect against security bugs that arise when using raw buffer pointers.
|
||||
See `<openvpn/buffer/buffer.hpp>`_ for the OpenVPN :code:`Buffer` classes.
|
||||
|
||||
* When it's necessary to have a pointer to an object, use
|
||||
``std::unique_ptr<>`` for non-shared objects and reference-counted
|
||||
:code:`std::unique_ptr<>` for non-shared objects and reference-counted
|
||||
smart pointers for shared objects. For shared-pointers,
|
||||
OpenVPN code should use the smart pointer classes defined
|
||||
in `<openvpn/common/rc.hpp>`_. Please see the comments in
|
||||
this file for documentation.
|
||||
|
||||
* Never use ``malloc`` or ``free``. When allocating objects,
|
||||
use the C++ ``new`` operator and then immediately construct
|
||||
* Never use :code:`malloc` or :code:`free`. When allocating objects,
|
||||
use the C++ :code:`new` operator and then immediately construct
|
||||
a smart pointer to reference the object:
|
||||
|
||||
.. code:: c++
|
||||
::
|
||||
|
||||
std::unique_ptr<MyObject> ptr = new MyObject();
|
||||
ptr->method();
|
||||
|
||||
* When interfacing with C functions that deal with
|
||||
raw pointers, memory allocation, etc., consider wrapping
|
||||
the functionality in C++. For an example, see ``enum_dir()``
|
||||
the functionality in C++. For an example, see :code:`enum_dir()`
|
||||
in `<openvpn/common/enumdir.hpp>`_,
|
||||
a function that returns a list of files in
|
||||
a directory (Unix only) via a high-level
|
||||
string vector, while internally calling
|
||||
the low level libc methods
|
||||
``opendir``, ``readdir``, and ``closedir``.
|
||||
Notice how ``unique_ptr_del`` is used to wrap the
|
||||
:code:`opendir`, :code:`readdir`, and :code:`closedir`.
|
||||
Notice how :code:`unique_ptr_del` is used to wrap the
|
||||
``DIR`` struct in a smart pointer with a custom
|
||||
deletion function.
|
||||
|
||||
* When grabbing random entropy that is to be used
|
||||
for cryptographic purposes (i.e. for keys, tokens, etc.),
|
||||
always ensure that the RNG is crypto-grade by calling
|
||||
``assert_crypto()`` on the RNG. This will throw
|
||||
:code:`assert_crypto()` on the RNG. This will throw
|
||||
an exception if the RNG is not crypto-grade:
|
||||
|
||||
.. code:: c++
|
||||
::
|
||||
|
||||
void set_rng(RandomAPI::Ptr rng_arg) {
|
||||
rng_arg->assert_crypto();
|
||||
rng = std::move(rng_arg);
|
||||
rng_arg->assert_crypto();
|
||||
rng = std::move(rng_arg);
|
||||
}
|
||||
|
||||
* Any variable whose value is not expected to change should
|
||||
be declared ``const``.
|
||||
be declared :code:`const`.
|
||||
|
||||
* Don't use non-const global or static variables unless absolutely
|
||||
necessary.
|
||||
|
||||
* When formatting strings, don't use ``snprintf``. Instead, use
|
||||
``std::ostringstream`` or build the string using the '+' ``std::string``
|
||||
operator:
|
||||
|
||||
.. code:: c++
|
||||
* When formatting strings, don't use :code:`snprintf`. Instead, use
|
||||
:code:`std::ostringstream` or build the string using the :code:`+`
|
||||
:code:`std::string` operator:
|
||||
::
|
||||
|
||||
std::string format_reconnecting(const int n_seconds) {
|
||||
return "Reconnecting in " + openvpn::to_string(n_seconds) + " seconds.";
|
||||
return "Reconnecting in " + openvpn::to_string(n_seconds) + " seconds.";
|
||||
}
|
||||
|
||||
or:
|
||||
|
||||
.. code:: c++
|
||||
::
|
||||
|
||||
std::string format_reconnecting(const int n_seconds) {
|
||||
std::ostringstream os;
|
||||
os << "Reconnecting in " << n_seconds << " seconds.";
|
||||
return os.str();
|
||||
std::ostringstream os;
|
||||
os << "Reconnecting in " << n_seconds << " seconds.";
|
||||
return os.str();
|
||||
}
|
||||
|
||||
* OpenVPN 3 is a "header-only" library, therefore all free functions
|
||||
outside of classes should have the ``inline`` attribute.
|
||||
outside of classes should have the :code:`inline` attribute.
|
||||
|
||||
Conventions
|
||||
+++++++++++
|
||||
"""""""""""
|
||||
|
||||
* Use the **Asio** library for I/O and timers.
|
||||
Don't deal with sockets directly.
|
||||
@ -544,18 +567,18 @@ Conventions
|
||||
* Never block. If you need to wait for something, use **Asio** timers
|
||||
or sockets.
|
||||
|
||||
* Use the ``OPENVPN_LOG()`` macro to log stuff. Don't use ``printf``.
|
||||
* Use the :code:`OPENVPN_LOG()` macro to log stuff. Don't use :code:`printf`.
|
||||
|
||||
* Don't call crypto/ssl libraries directly. Instead use the abstraction
|
||||
layers (`<openvpn/crypto>`_ and `<openvpn/ssl>`_) that allow OpenVPN
|
||||
to link with different crypto/ssl libraries (such as **OpenSSL**
|
||||
or **mbed TLS**).
|
||||
|
||||
* Use ``RandomAPI`` as a wrapper for random number
|
||||
* Use :code:`RandomAPI` as a wrapper for random number
|
||||
generators (`<openvpn/random/randapi.hpp>`_).
|
||||
|
||||
* If you need to deal with configuration file options,
|
||||
see ``class OptionList`` in `<openvpn/common/options.hpp>`_.
|
||||
see :code:`class OptionList` in `<openvpn/common/options.hpp>`_.
|
||||
|
||||
* If you need to deal with time or time durations, use the
|
||||
classes under `<openvpn/time>`_.
|
||||
@ -581,37 +604,35 @@ Conventions
|
||||
object is also a common use case for weak pointers.
|
||||
|
||||
* Use C++ exceptions for error handling and as an alternative
|
||||
to ``goto``. See OpenVPN's general exception classes
|
||||
to :code:`goto`. See OpenVPN's general exception classes
|
||||
and macros in `<openvpn/common/exception.hpp>`_.
|
||||
|
||||
* Use C++ destructors for automatic object cleanup, and so
|
||||
that thrown exceptions will not leak objects. Alternatively,
|
||||
use ``Cleanup`` in `<openvpn/common/cleanup.hpp>`_ when
|
||||
use :code:`Cleanup` in `<openvpn/common/cleanup.hpp>`_ when
|
||||
you need to specify a code block to execute prior to scope
|
||||
exit. For example, ensure that the file ``pid_fn`` is
|
||||
exit. For example, ensure that the file :code:`pid_fn` is
|
||||
deleted before scope exit:
|
||||
|
||||
.. code:: c++
|
||||
::
|
||||
|
||||
auto clean = Cleanup([pid_fn]() {
|
||||
if (pid_fn)
|
||||
::unlink(pid_fn);
|
||||
if (pid_fn)
|
||||
::unlink(pid_fn);
|
||||
});
|
||||
|
||||
* When calling global methods (such as libc ``fork``),
|
||||
prepend "::" to the symbol name, e.g.:
|
||||
|
||||
.. code:: c++
|
||||
* When calling global methods (such as libc :code:`fork`),
|
||||
prepend :code:`::` to the symbol name, e.g.:
|
||||
::
|
||||
|
||||
struct dirent *e;
|
||||
while ((e = ::readdir(dir.get())) != nullptr) {
|
||||
...
|
||||
...
|
||||
}
|
||||
|
||||
* Use ``nullptr`` instead of ``NULL``.
|
||||
* Use :code:`nullptr` instead of :code:`NULL`.
|
||||
|
||||
Threading
|
||||
+++++++++
|
||||
"""""""""
|
||||
|
||||
The OpenVPN 3 client core is designed to run in a single thread, with
|
||||
the UI or controller driving the OpenVPN API running in a different
|
||||
@ -630,4 +651,3 @@ License
|
||||
-------
|
||||
|
||||
See `<LICENSE.rst>`_.
|
||||
|
Loading…
Reference in New Issue
Block a user