summaryrefslogtreecommitdiff
path: root/src/conf_mode/vpn_sstp.py
blob: a84513a0ff724af4426a860ee4482feb4513152a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
#!/usr/bin/env python3
#
# Copyright (C) 2018-2024 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os

from sys import exit

from vyos.config import Config
from vyos.configdict import get_accel_dict
from vyos.configdict import dict_merge
from vyos.pki import wrap_certificate
from vyos.pki import wrap_private_key
from vyos.template import render
from vyos.utils.process import call
from vyos.utils.network import check_port_availability
from vyos.utils.dict import dict_search
from vyos.accel_ppp_util import verify_accel_ppp_base_service
from vyos.accel_ppp_util import verify_accel_ppp_ip_pool
from vyos.accel_ppp_util import get_pools_in_order
from vyos.utils.network import is_listen_port_bind_service
from vyos.utils.file import write_file
from vyos import ConfigError
from vyos import airbag
airbag.enable()

cfg_dir = '/run/accel-pppd'
sstp_conf = '/run/accel-pppd/sstp.conf'
sstp_chap_secrets = '/run/accel-pppd/sstp.chap-secrets'

cert_file_path = os.path.join(cfg_dir, 'sstp-cert.pem')
cert_key_path = os.path.join(cfg_dir, 'sstp-cert.key')
ca_cert_file_path = os.path.join(cfg_dir, 'sstp-ca.pem')

def get_config(config=None):
    if config:
        conf = config
    else:
        conf = Config()
    base = ['vpn', 'sstp']
    if not conf.exists(base):
        return None

    # retrieve common dictionary keys
    sstp = get_accel_dict(conf, base, sstp_chap_secrets, with_pki=True)
    if dict_search('client_ip_pool', sstp):
        # Multiple named pools require ordered values T5099
        sstp['ordered_named_pools'] = get_pools_in_order(dict_search('client_ip_pool', sstp))

    sstp['server_type'] = 'sstp'
    return sstp


def verify(sstp):
    if not sstp:
        return None

    port = sstp.get('port')
    proto = 'tcp'
    if check_port_availability('0.0.0.0', int(port), proto) is not True and \
            not is_listen_port_bind_service(int(port), 'accel-pppd'):
        raise ConfigError(f'"{proto}" port "{port}" is used by another service')

    verify_accel_ppp_base_service(sstp)
    verify_accel_ppp_ip_pool(sstp)

    #
    # SSL certificate checks
    #
    if not sstp['pki']:
        raise ConfigError('PKI is not configured')

    if 'ssl' not in sstp:
        raise ConfigError('SSL missing on SSTP config')

    ssl = sstp['ssl']

    # CA
    if 'ca_certificate' not in ssl:
        raise ConfigError('SSL CA certificate missing on SSTP config')

    ca_name = ssl['ca_certificate']

    if ca_name not in sstp['pki']['ca']:
        raise ConfigError('Invalid CA certificate on SSTP config')

    if 'certificate' not in sstp['pki']['ca'][ca_name]:
        raise ConfigError('Missing certificate data for CA certificate on SSTP config')

    # Certificate
    if 'certificate' not in ssl:
        raise ConfigError('SSL certificate missing on SSTP config')

    cert_name = ssl['certificate']

    if cert_name not in sstp['pki']['certificate']:
        raise ConfigError('Invalid certificate on SSTP config')

    pki_cert = sstp['pki']['certificate'][cert_name]

    if 'certificate' not in pki_cert:
        raise ConfigError('Missing certificate data for certificate on SSTP config')

    if 'private' not in pki_cert or 'key' not in pki_cert['private']:
        raise ConfigError('Missing private key for certificate on SSTP config')

    if 'password_protected' in pki_cert['private']:
        raise ConfigError('Encrypted private key is not supported on SSTP config')

def generate(sstp):
    if not sstp:
        return None

    # accel-cmd reload doesn't work so any change results in a restart of the daemon
    render(sstp_conf, 'accel-ppp/sstp.config.j2', sstp)

    cert_name = sstp['ssl']['certificate']
    pki_cert = sstp['pki']['certificate'][cert_name]

    ca_cert_name = sstp['ssl']['ca_certificate']
    pki_ca = sstp['pki']['ca'][ca_cert_name]
    write_file(cert_file_path, wrap_certificate(pki_cert['certificate']))
    write_file(cert_key_path, wrap_private_key(pki_cert['private']['key']))
    write_file(ca_cert_file_path, wrap_certificate(pki_ca['certificate']))

    if dict_search('authentication.mode', sstp) == 'local':
        render(sstp_chap_secrets, 'accel-ppp/chap-secrets.config_dict.j2',
               sstp, permission=0o640)
    else:
        if os.path.exists(sstp_chap_secrets):
             os.unlink(sstp_chap_secrets)

    return sstp

def apply(sstp):
    if not sstp:
        call('systemctl stop accel-ppp@sstp.service')
        for file in [sstp_chap_secrets, sstp_conf]:
            if os.path.exists(file):
                os.unlink(file)

        return None

    call('systemctl restart accel-ppp@sstp.service')


if __name__ == '__main__':
    try:
        c = get_config()
        verify(c)
        generate(c)
        apply(c)
    except ConfigError as e:
        print(e)
        exit(1)