Compare commits

...

1 Commits

Author SHA1 Message Date
Quentin McGaw
732f826ec2 fix(settings): read PEM files but b64 env vars
- Extract base64 data from PEM files and secret files
- Environment variables are not PEM encoded and only the base64 data
- Affects OpenVPN certificate, key and encrypted key
2022-08-24 19:31:52 +00:00
8 changed files with 53 additions and 54 deletions

View File

@@ -1,6 +1,7 @@
package settings package settings
import ( import (
"encoding/base64"
"fmt" "fmt"
"regexp" "regexp"
"strings" "strings"
@@ -172,7 +173,7 @@ func validateOpenVPNClientCertificate(vpnProvider,
return nil return nil
} }
_, err = extract.PEM([]byte(clientCert)) _, err = base64.StdEncoding.DecodeString(clientCert)
if err != nil { if err != nil {
return err return err
} }
@@ -194,7 +195,7 @@ func validateOpenVPNClientKey(vpnProvider, clientKey string) (err error) {
return nil return nil
} }
_, err = extract.PEM([]byte(clientKey)) _, err = base64.StdEncoding.DecodeString(clientKey)
if err != nil { if err != nil {
return err return err
} }

View File

@@ -1,7 +1,6 @@
package env package env
import ( import (
"encoding/base64"
"fmt" "fmt"
"os" "os"
"strconv" "strconv"
@@ -133,15 +132,6 @@ func lowerAndSplit(csv string) (values []string) {
return strings.Split(csv, ",") return strings.Split(csv, ",")
} }
func decodeBase64(b64String string) (decoded string, err error) {
b, err := base64.StdEncoding.DecodeString(b64String)
if err != nil {
return "", fmt.Errorf("cannot decode base64 string %q: %w",
b64String, err)
}
return string(b), nil
}
func unsetEnvKeys(envKeys []string, err error) (newErr error) { func unsetEnvKeys(envKeys []string, err error) (newErr error) {
newErr = err newErr = err
for _, envKey := range envKeys { for _, envKey := range envKeys {

View File

@@ -30,15 +30,8 @@ func (r *Reader) readOpenVPN() (
openVPN.Auth = &auth openVPN.Auth = &auth
} }
openVPN.ClientCrt, err = readBase64OrNil("OPENVPN_CLIENTCRT") openVPN.ClientCrt = envToStringPtr("OPENVPN_CLIENTCRT")
if err != nil { openVPN.ClientKey = envToStringPtr("OPENVPN_CLIENTKEY")
return openVPN, fmt.Errorf("environment variable OPENVPN_CLIENTCRT: %w", err)
}
openVPN.ClientKey, err = readBase64OrNil("OPENVPN_CLIENTKEY")
if err != nil {
return openVPN, fmt.Errorf("environment variable OPENVPN_CLIENTKEY: %w", err)
}
openVPN.PIAEncPreset = r.readPIAEncryptionPreset() openVPN.PIAEncPreset = r.readPIAEncryptionPreset()
@@ -83,20 +76,6 @@ func (r *Reader) readOpenVPNPassword() (password string) {
return password return password
} }
func readBase64OrNil(envKey string) (valueOrNil *string, err error) {
value := getCleanedEnv(envKey)
if value == "" {
return nil, nil //nolint:nilnil
}
decoded, err := decodeBase64(value)
if err != nil {
return nil, err
}
return &decoded, nil
}
func (r *Reader) readPIAEncryptionPreset() (presetPtr *string) { func (r *Reader) readPIAEncryptionPreset() (presetPtr *string) {
_, preset := r.getEnvWithRetro( _, preset := r.getEnvWithRetro(
"PRIVATE_INTERNET_ACCESS_OPENVPN_ENCRYPTION_PRESET", "PRIVATE_INTERNET_ACCESS_OPENVPN_ENCRYPTION_PRESET",

View File

@@ -1,9 +1,12 @@
package files package files
import ( import (
"fmt"
"io" "io"
"os" "os"
"strings" "strings"
"github.com/qdm12/gluetun/internal/openvpn/extract"
) )
// ReadFromFile reads the content of the file as a string. // ReadFromFile reads the content of the file as a string.
@@ -32,3 +35,21 @@ func ReadFromFile(filepath string) (s *string, err error) {
content = strings.TrimSuffix(content, "\n") content = strings.TrimSuffix(content, "\n")
return &content, nil return &content, nil
} }
func readPEMFile(filepath string) (base64Ptr *string, err error) {
pemData, err := ReadFromFile(filepath)
if err != nil {
return nil, fmt.Errorf("reading file: %w", err)
}
if pemData == nil {
return nil, nil //nolint:nilnil
}
base64Data, err := extract.PEM([]byte(*pemData))
if err != nil {
return nil, fmt.Errorf("extracting base64 encoded data from PEM content: %w", err)
}
return &base64Data, nil
}

View File

@@ -14,12 +14,12 @@ const (
) )
func (r *Reader) readOpenVPN() (settings settings.OpenVPN, err error) { func (r *Reader) readOpenVPN() (settings settings.OpenVPN, err error) {
settings.ClientKey, err = ReadFromFile(OpenVPNClientKeyPath) settings.ClientKey, err = readPEMFile(OpenVPNClientKeyPath)
if err != nil { if err != nil {
return settings, fmt.Errorf("client key: %w", err) return settings, fmt.Errorf("client key: %w", err)
} }
settings.ClientCrt, err = ReadFromFile(OpenVPNClientCertificatePath) settings.ClientCrt, err = readPEMFile(OpenVPNClientCertificatePath)
if err != nil { if err != nil {
return settings, fmt.Errorf("client certificate: %w", err) return settings, fmt.Errorf("client certificate: %w", err)
} }

View File

@@ -1,10 +1,12 @@
package secrets package secrets
import ( import (
"fmt"
"os" "os"
"strings" "strings"
"github.com/qdm12/gluetun/internal/configuration/sources/files" "github.com/qdm12/gluetun/internal/configuration/sources/files"
"github.com/qdm12/gluetun/internal/openvpn/extract"
) )
// getCleanedEnv returns an environment variable value with // getCleanedEnv returns an environment variable value with
@@ -40,3 +42,22 @@ func readSecretFileAsString(secretPathEnvKey, defaultSecretPath string) (
} }
return *stringPtr, nil return *stringPtr, nil
} }
func readPEMSecretFile(secretPathEnvKey, defaultSecretPath string) (
base64Ptr *string, err error) {
pemData, err := readSecretFileAsStringPtr(secretPathEnvKey, defaultSecretPath)
if err != nil {
return nil, fmt.Errorf("reading secret file: %w", err)
}
if pemData == nil {
return nil, nil //nolint:nilnil
}
base64Data, err := extract.PEM([]byte(*pemData))
if err != nil {
return nil, fmt.Errorf("extracting base64 encoded data from PEM content: %w", err)
}
return &base64Data, nil
}

View File

@@ -24,7 +24,7 @@ func readOpenVPN() (
return settings, fmt.Errorf("cannot read password file: %w", err) return settings, fmt.Errorf("cannot read password file: %w", err)
} }
settings.ClientKey, err = readSecretFileAsStringPtr( settings.ClientKey, err = readPEMSecretFile(
"OPENVPN_CLIENTKEY_SECRETFILE", "OPENVPN_CLIENTKEY_SECRETFILE",
"/run/secrets/openvpn_clientkey", "/run/secrets/openvpn_clientkey",
) )
@@ -32,7 +32,7 @@ func readOpenVPN() (
return settings, fmt.Errorf("cannot read client key file: %w", err) return settings, fmt.Errorf("cannot read client key file: %w", err)
} }
settings.ClientCrt, err = readSecretFileAsStringPtr( settings.ClientCrt, err = readPEMSecretFile(
"OPENVPN_CLIENTCRT_SECRETFILE", "OPENVPN_CLIENTCRT_SECRETFILE",
"/run/secrets/openvpn_clientcrt", "/run/secrets/openvpn_clientcrt",
) )

View File

@@ -8,7 +8,6 @@ import (
"github.com/qdm12/gluetun/internal/constants" "github.com/qdm12/gluetun/internal/constants"
"github.com/qdm12/gluetun/internal/constants/openvpn" "github.com/qdm12/gluetun/internal/constants/openvpn"
"github.com/qdm12/gluetun/internal/models" "github.com/qdm12/gluetun/internal/models"
"github.com/qdm12/gluetun/internal/openvpn/extract"
) )
type OpenVPNProviderSettings struct { type OpenVPNProviderSettings struct {
@@ -190,15 +189,11 @@ func OpenVPNConfig(provider OpenVPNProviderSettings,
} }
if *settings.ClientCrt != "" { if *settings.ClientCrt != "" {
certData, err := extract.PEM([]byte(*settings.ClientCrt)) lines.addLines(WrapOpenvpnCert(*settings.ClientCrt))
panicOnError(err, "cannot extract client crt")
lines.addLines(WrapOpenvpnCert(certData))
} }
if *settings.ClientKey != "" { if *settings.ClientKey != "" {
keyData, err := extract.PEM([]byte(*settings.ClientKey)) lines.addLines(WrapOpenvpnKey(*settings.ClientKey))
panicOnError(err, "cannot extract client private key")
lines.addLines(WrapOpenvpnKey(keyData))
} }
lines.addLines(provider.ExtraLines) lines.addLines(provider.ExtraLines)
@@ -247,14 +242,6 @@ func defaultStringSlice(value, defaultValue []string) (
return result return result
} }
func panicOnError(err error, context string) {
if err == nil {
return
}
panicMessage := fmt.Sprintf("%s: %s", context, err)
panic(panicMessage)
}
func WrapOpenvpnCA(certificate string) (lines []string) { func WrapOpenvpnCA(certificate string) (lines []string) {
return []string{ return []string{
"<ca>", "<ca>",