// // merge.hpp // OpenVPN // // Copyright (c) 2012 OpenVPN Technologies, Inc. All rights reserved. // #ifndef OPENVPN_OPTIONS_MERGE_H #define OPENVPN_OPTIONS_MERGE_H #include #include #include #include #include #include #include #include #include #include #include namespace openvpn { class ProfileMerge { // internal flags enum { F_MAY_INCLUDE_KEY_DIRECTION = (1<<0), F_PKCS12 = (1<<1), }; // limits enum { MAX_FN_LIST_SIZE=16, }; public: // public status values enum Status { MERGE_UNDEFINED, MERGE_SUCCESS, MERGE_EXCEPTION, MERGE_OVPN_EXT_FAIL, MERGE_OVPN_FILE_FAIL, MERGE_REF_FAIL, MERGE_MULTIPLE_REF_FAIL, }; // merge status Status status() const { return status_; } const std::string& error() const { return error_; } // merge path basename const std::string& basename() const { return basename_; } // final unified profile const std::string& profile_content() const { return profile_content_; } // list of all reference paths successfully read const std::vector& ref_path_list() const { return ref_succeed_list_; } // merge status as a string const char *status_string() const { switch (status_) { case MERGE_UNDEFINED: return "MERGE_UNDEFINED"; case MERGE_SUCCESS: return "MERGE_SUCCESS"; case MERGE_EXCEPTION: return "MERGE_EXCEPTION"; case MERGE_OVPN_EXT_FAIL: return "MERGE_OVPN_EXT_FAIL"; case MERGE_OVPN_FILE_FAIL: return "MERGE_OVPN_FILE_FAIL"; case MERGE_REF_FAIL: return "MERGE_REF_FAIL"; case MERGE_MULTIPLE_REF_FAIL: return "MERGE_MULTIPLE_REF_FAIL"; default: return "MERGE_?"; } } ProfileMerge(const std::string& profile_path, const std::string& profile_dir_override, const bool follow_references, const size_t max_line_len, const size_t max_size) : status_(MERGE_UNDEFINED) { try { size_t total_size = 0; // read the profile std::string orig_profile_content; std::string profile_dir; try { profile_dir = !profile_dir_override.empty() ? profile_dir_override : path::dirname(profile_path); basename_ = path::basename(profile_path); const std::string ext = path::ext(basename_); if (string::strcasecmp(ext, "ovpn") == 0) { orig_profile_content = read_text(profile_path, max_size); total_size = orig_profile_content.size(); } else { status_ = MERGE_OVPN_EXT_FAIL; error_ = basename_; return; } } catch (const std::exception& e) { status_ = MERGE_OVPN_FILE_FAIL; error_ = e.what(); return; } // expand the profile expand_profile(orig_profile_content, profile_dir, follow_references, max_line_len, max_size, total_size); } catch (const std::exception& e) { status_ = MERGE_EXCEPTION; error_ = e.what(); } } protected: ProfileMerge() : status_(MERGE_UNDEFINED) {} void expand_profile(const std::string& orig_profile_content, const std::string& profile_dir, const bool follow_references, const size_t max_line_len, const size_t max_size, size_t total_size) { if (total_size > max_size) { status_ = MERGE_EXCEPTION; error_ = "file too large"; return; } status_ = MERGE_SUCCESS; SplitLines in(orig_profile_content, max_line_len); int line_num = 0; bool in_multiline = false; bool opaque_multiline = false; Option multiline; profile_content_.reserve(orig_profile_content.length()); while (in(true)) { if (in.line_overflow()) { status_ = MERGE_EXCEPTION; error_ = "line too long"; return; } const std::string& line = in.line_ref(); bool echo = true; ++line_num; if (in_multiline) { if (OptionList::is_close_tag(line, multiline[0])) { multiline.clear(); in_multiline = false; opaque_multiline = false; } } else if (!OptionList::ignore_line(line)) { Option opt = Split::by_space(line); if (opt.size()) { if (OptionList::is_open_tag(opt[0]) && opt.size() == 1) { OptionList::untag_open_tag(opt[0]); multiline = opt; in_multiline = true; unsigned int flags = 0; // not used opaque_multiline = is_fileref_directive(multiline[0], flags); } else { unsigned int flags = 0; if (!opaque_multiline && opt.size() >= 2 && is_fileref_directive(opt[0], flags)) { // found a directive referencing a file // get basename of file and make sure that it doesn't // attempt to traverse directories std::string fn = path::basename(opt[1]); if (fn.empty()) { echo = false; status_ = MERGE_REF_FAIL; } else if (!path::is_flat(fn)) { echo = false; status_ = MERGE_REF_FAIL; error_ = fn; if (ref_fail_list_.size() < MAX_FN_LIST_SIZE) ref_fail_list_.push_back(fn); } else { std::string path; std::string file_content; bool error = false; try { if (!follow_references) { status_ = MERGE_EXCEPTION; error_ = fn + ": cannot follow file reference"; return; } path = path::join(profile_dir, fn); file_content = read_text(path, max_size); total_size += file_content.size(); if (total_size > max_size) { status_ = MERGE_EXCEPTION; error_ = fn + ": file too large"; return; } } catch (const std::exception& e) { error = true; status_ = MERGE_REF_FAIL; error_ = fn + " : " + e.what(); if (ref_fail_list_.size() < MAX_FN_LIST_SIZE) ref_fail_list_.push_back(fn); } if (!error) // succeeded in reading file? { // don't echo this line, i.e. opt[], instead expand file_content into profile echo = false; // tls-auth or secret directive may include key-direction parameter if ((flags & F_MAY_INCLUDE_KEY_DIRECTION) && opt.size() >= 3) { const std::string kd = "key-direction " + opt[2] + "\n"; profile_content_ += kd; } // format file_content for appending to profile { std::ostringstream os; string::add_trailing_in_place(file_content, '\n'); os << '<' << opt[0] << ">\n" << file_content << "\n"; profile_content_ += os.str(); } // save file we referenced if (ref_succeed_list_.size() < MAX_FN_LIST_SIZE) ref_succeed_list_.push_back(path); } } } } } } if (echo) { profile_content_ += line; profile_content_ += '\n'; } } // If more than 2 errors occurred, change status to // MERGE_MULTIPLE_REF_FAIL and enumerate each failed file. if (ref_fail_list_.size() >= 2) { status_ = MERGE_MULTIPLE_REF_FAIL; error_ = ""; for (size_t i = 0; i < ref_fail_list_.size(); ++i) { if (i) error_ += ", "; error_ += ref_fail_list_[i]; } } } static bool is_fileref_directive(const std::string& d, unsigned int& flags) { if (d.length() > 0) { switch (d[0]) { case 'c': return d == "ca" || d == "cert"; case 'd': return d == "dh"; case 'e': return d == "extra-certs"; case 'k': return d == "key"; #if 0 // define when we have capability to parse out pkcs12 from profile and add to Keychain (fixme) case 'p': if (d == "pkcs12") { flags |= F_PKCS12; return true; } return false; #endif case 's': if (d == "secret") { flags |= F_MAY_INCLUDE_KEY_DIRECTION; return true; } return false; case 't': if (d == "tls-auth") { flags |= F_MAY_INCLUDE_KEY_DIRECTION; return true; } return false; } } return false; } Status status_; std::string profile_content_; std::string basename_; std::string error_; std::vector ref_fail_list_; std::vector ref_succeed_list_; }; class ProfileMergeFromString : public ProfileMerge { public: ProfileMergeFromString(const std::string& profile_content, const std::string& ref_dir, const bool follow_references, const size_t max_line_len, const size_t max_size) { try { // expand the profile expand_profile(profile_content, ref_dir, follow_references, max_line_len, max_size, profile_content.size()); } catch (const std::exception& e) { status_ = MERGE_EXCEPTION; error_ = e.what(); } } }; } #endif