#  OpenVPN 3 Linux client -- Next generation OpenVPN client
#
#  SPDX-License-Identifier: AGPL-3.0-only
#
#  Copyright (C) 2017 - 2023  OpenVPN Inc <sales@openvpn.net>
#  Copyright (C) 2017 - 2023  David Sommerseth <davids@openvpn.net>
#

##
# @file  configparser.py
#
# @brief  Parses OpenVPN command line options and configuration files
#

import argparse
import os
import shlex
from getpass import getpass


# Detect if pyOpenSSL is available or not.
# This module is used to parse PKCS#12 files only
# and if not present when needed, it will complain
# later on.
HAVE_OPENSSL = True
try:
    import OpenSSL.crypto as crypto
except ImportError:
    HAVE_OPENSSL = False


##
#  Configuration parser for OpenVPN command line options and configuration
#  files.  This implementation only adds the client related options the
#  OpenVPN 3 Core library supports.  Some options are ignored, as it is
#  possible to establish a connection even though the core library does not
#  use them.
#
#  This parser is also trying to behave as close as possible
#  to the classic OpenVPN 2.x
#
#
class ConfigParser():

    ##
    #  Wrapper around argparse.ArgumentParser to avoid sys.exit() being called
    #  on parsing errors.  Rather throw a generic Exception if needed, which
    #  needs to be handled elsewhere
    #
    class __ovpnArgParser(argparse.ArgumentParser):
        shcompletion_data = {'options': [], 'argvalues': {}}

        def error(self, message):
            raise Exception("%s: error: %s"  % (self.prog, message))


        def add_argument(self, *args, **kwargs):
            # Wrapper around ArgumentParser.add_argument
            # which collects data useful for bash-completion
            self.shcompletion_data['options'].append(args[0])
            if ('choices' in kwargs):
                self.shcompletion_data['argvalues'][args[0]] = kwargs['choices']
            elif ('completion_suggestions' in kwargs):
                self.shcompletion_data['argvalues'][args[0]] = kwargs.pop('completion_suggestions')

            argparse.ArgumentParser.add_argument(self, *args, **kwargs)


        def RetrieveShellCompletionData(self):
            return self.shcompletion_data


    def __init__(self, args, descr):
        self.__args = args[1:]
        self.__parser = ConfigParser.__ovpnArgParser(prog=args[0],
                                                     description=descr,
                                                     usage="%s [options]" % args[0])
        self.__init_arguments()
        self.__opts = vars(self.__parser.parse_args(self.__args))


    def GenerateConfig(self):
        cfg = []
        for opt_key, opt_val in self.__opts.items():
            if opt_key in ['daemon', 'dco', 'profile_override']:
                # Don't put profile overrides, 'daemon' or 'dco' into the
                # generated config. These are not a valid configuration
                # options and are sent to the configuration manager
                # separately
                continue;

            key = opt_key.replace('_', '-')
            if isinstance(opt_val, bool):
                if opt_val is True:
                    cfg.append(key)
            elif isinstance(opt_val, list):
                for v in opt_val:
                    cfg.append('%s %s' %(key, v))
            elif opt_val is not None:
                processed = False
                if key in ('ca', 'cert', 'extra-certs', 'http-proxy-user-pass',
                           'key', 'tls-auth', 'tls-crypt', 'tls-crypt-v2',
                           'auth-user-pass'):
                    # Embedded files should not be prefixed by the key value
                    #
                    # First, check if it is an embedded file here
                    if len(opt_val) > 0 and opt_val[0] == '<' and opt_val[-1:] == '>':
                        cfg.append(opt_val)
                        processed = True

                if not processed:
                    cfg.append('%s %s' % (key, opt_val))

        return '\n'.join(cfg)


    def GetConfigName(self):
        try:
            return getattr(self.__parser, 'config_name')
        except AttributeError:
            return None


    def GetDaemon(self):
        return self.__opts['daemon']


    def GetLogVerbosity(self):
        return self.__opts['verb'] is not None and self.__opts['verb'][0] or 2


    def GetPersistTun(self):
        try:
            return self.__opts['persist_tun']
        except AttributeError:
            return False


    def GetDataChannelOffload(self):
        try:
            return self.__opts['dco']
        except AttributeError:
            return False


    def GetOverrides(self):
        if self.__opts['profile_override'] is None \
           or len(self.__opts['profile_override']) < 1:
            return {}
        return self.__opts['profile_override']

    def RetrieveShellCompletionData(self):
        return self.__parser.RetrieveShellCompletionData()


    ##
    #  Checks if we have at least the pure minimum of options and arguments
    #  to establish a connection.
    #
    #  If not all required options are present, it will throw an execption
    #
    def SanityCheck(self):
        missing = []
        required = ('client', 'remote', 'ca')
        for req in required:
            if req in self.__opts:
                val = self.__opts[req]
                if val is None or val is False:
                    missing.append('--%s' % req)
                elif isinstance(val, list):
                    if 'remote' == req and len(val) < 1:
                        missing.append('--%s' % req)
                elif isinstance(val, str) and len(val) < 1:
                    missing.append('--%s' % req)

        if len(missing) > 0:
            raise Exception('The following options are missing to establish '
                            +' a connection: %s' % ', '.join(missing))


    def __init_arguments(self):
        # List of supported profile overrides.  These do not appear
        # in the generated configuration, but are profile settings
        # sent to the Configuration Manager separately
        profile_overrides = [
            'server-override', 'port-override', 'proto-override', 'ipv6',
            'dns-fallback-google', 'dns-scope',
            'dns-setup-disabled', 'dns-sync-lookup',
            'auth-fail-retry', 'proxy-host', 'proxy-port',
            'proxy-username', 'proxy-password',
            'proxy-auth-cleartext', 'enable-legacy-algorithms',
            'allow-compression', 'persist-tun']

        self.__parser.add_argument('--auth', metavar='ALG',
                                   action='store',
                                   completion_suggestions=['SHA1', 'SHA256', 'SHA384',
                                                 'SHA512'],
                                   nargs=1,
                                   help='Authenticate packets with HMAC using'
                                   +' message digest algorithm alg'
                                   +' (default=SHA1)')

        self.__parser.add_argument('--auth-retry', metavar='MODE',
                                   action='store',
                                   nargs=1,
                                   completion_suggestions=['none','nointeract','interact'],
                                   help='How to handle auth failures - none:disconnect, '
                                   + 'nointeract=reuse credentials, interact=ask for new credentials')

        self.__parser.add_argument('--auth-user-pass', metavar='[USER-PASS-FILE]',
                                   action=ConfigParser.EmbedFile,
                                   embed_tag = 'auth-user-pass',
                                   ignore_missing_filename=True,
                                   help='Authenticate with server using '
                                   + 'username/password')

        self.__parser.add_argument('--ca', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   help='Certificate authority file in '
                                   + '.pem format containing root certificate')

        self.__parser.add_argument('--cd', metavar='DIR',
                                   action=ConfigParser.ChangeDir,
                                   help='Change working directory to the given '
                                   + 'directory')

        self.__parser.add_argument('--cert', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   dest='cert', embed_tag='cert',
                                   help='Certificate authority file in .pem '
                                   + 'format by a Certificate Authority in '
                                   + '--ca file')

        self.__parser.add_argument('--cipher', metavar='ALG',
                                   action='store',
                                   completion_suggestions=['AES-128-CBC', 'AES-192-CBC', 'AES-256-CBC',
                                                           'AES-128-GCM', 'AES-192-GCM', 'AES-256-GCM'],
                                   help='Encrypt packets with cipher '
                                   +' algorithm alg'
                                   +' (default=BF-CBC)')

        self.__parser.add_argument('--client',
                                   action='store_true',
                                   help='Configures client configuration mode'
                                   + ' (mandatory)')

        self.__parser.add_argument('--comp-lzo', metavar='[MODE]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   completion_suggestions=['yes', 'no', 'adaptive'],
                                   help='Use LZO compression '
                                   + '(Deprecated, use --compress instead)')

        self.__parser.add_argument('--compress', metavar='[ALG]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   completion_suggestions=['lzo', 'lz4', 'lz4-v2', 'stub', 'stub-v2'],
                                   help='Compress using algorithm ALG')

        self.__parser.add_argument('--config', metavar='FILE',
                                   action=ConfigParser.ReadConfigFile,
                                   help='Read configuration options from file')

        self.__parser.add_argument('--daemon',
                                   action='store_true',
                                   help='Run the VPN tunnel in the background')

        self.__parser.add_argument('--dev', metavar='DEV-NAME',
                                   action='store',
                                   nargs=1,
                                   help='tun/tap device to use for VPN tunnel')

        self.__parser.add_argument('--dev-type', metavar='DEV-TYPE',
                                   action='store',
                                   choices=['tun'],
                                   nargs=1,
                                   help='Which device type are we using? tun '
                                   + 'or tap. Not needed if --dev starts with'
                                   + 'tun or tap')

        self.__parser.add_argument('--dhcp-option', metavar='OPTION [...]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Set DHCP options which can be picked'
                                   + 'up by the OS configuring DNS, etc')

        self.__parser.add_argument('--extra-certs', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   dest='extra-certs', embed_tag='extra-certs',
                                   help='Specify a file containing one or '
                                   + 'more PEM certs (concatenated together) '
                                   + 'that complete the local certificate '
                                   + 'chain.')

        self.__parser.add_argument('--float',
                                   action='store_true',
                                   help='Allow remote to change its IP '
                                   + 'address/port')

        self.__parser.add_argument('--hand-window', metavar='SEC',
                                   action='store',
                                   nargs=1,
                                   help='Handshake window. The TLS-based key '
                                   + 'exchange must finalize within SEC '
                                   + 'seconds handshake initiation by any '
                                   + 'peer. (Default 60 seconds)')

        self.__parser.add_argument('--http-proxy',
                                   metavar='SRV PORT [auth] [auth-method]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=2,
                                   help='Connect to a remote host via an HTTP'
                                   + 'proxy at address SRV and port PORT. See'
                                   + ' manual for auth details')

        self.__parser.add_argument('--http-proxy-user-pass', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   help='Fetch HTTP proxy credentials from '
                                   + 'FILE')

        self.__parser.add_argument('--ifconfig',
                                   metavar='LOCAL NETMASK',
                                   action='store',
                                   nargs=2,
                                   help='Configure TUN/TAP device with LOCAL '
                                   + 'for local IPv4 address with netmask '
                                   + 'NETMASK')

        self.__parser.add_argument('--ifconfig-ipv6',
                                   metavar='LOCAL [REMOTE_ENDP]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Configure TUN/TAP device with LOCAL '
                                   + 'for local IPv6 address and REMOTE_ENDP '
                                   + 'as the remote end-point')

        self.__parser.add_argument('--ignore-unknown-option',
                                   metavar="OPTION",
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Ignore listed options if they are '
                                   + 'not recognized')

        self.__parser.add_argument('--inactive', metavar='SECS [BYTES]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Exit after n seconds of activity on '
                                   + 'TUN/TAP device. If BYTES is added, '
                                   + 'if bytes on the device is less than BYTES'
                                   + ' the tunnel will also exit')

        self.__parser.add_argument('--keepalive', metavar='P_SECS R_SECS',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   required_args=2,
                                   help='Ping remote every P_SECS second and '
                                   + 'restart tunnel if no response within '
                                   + 'R_SECS seconds')

        self.__parser.add_argument('--key', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   help='Local private key in .pem format')

        self.__parser.add_argument('--key-direction', metavar='DIR',
                                   action='store',
                                   choices=['0', '1'],
                                   nargs=1,
                                   help='Set key direction for static keys.'
                                   + ' Valid values: 0, 1')

        self.__parser.add_argument('--local', metavar='HOST',
                                   action='store',
                                   nargs=1,
                                   help='Local host name or IP address to '
                                   'to bind against on local side')

        self.__parser.add_argument('--lport', metavar='PORT',
                                   action='store',
                                   nargs=1,
                                   help='TCP/UDP port number for local bind '
                                   + '(default 1194)')

        self.__parser.add_argument('--mode', metavar='MODE',
                                   action='store',
                                   choices=['client', 'p2p'],
                                   nargs=1,
                                   help='Operational mode. Only "client" is'
                                   + 'accepted')

        self.__parser.add_argument('--mssfix', metavar='BYTES',
                                   action='store',
                                   nargs=1,
                                   help='Set upper bound on TCP MSS '
                                   + '(Default tun-mtu size)')

        client_server_ch = ['client', 'server']
        self.__parser.add_argument('--ns-cert-type', metavar='TYPE',
                                   action='store',
                                   choices=client_server_ch,
                                   nargs=1,
                                   help='(DEPRECATED) Require that peer '
                                   + 'certificate is signed with an explicit '
                                   + 'nsCertType designation.  '
                                   + 'Migrate to --remote-cert-tls ASAP. '
                                   + 'Valid values: '
                                   + ', '.join(client_server_ch))

        self.__parser.add_argument('--persist-tun',
                                   action='store_true',
                                   help='Keep tun/tap device open across '
                                   + 'connection restarts')

        self.__parser.add_argument('--ping', metavar='SECS',
                                   action='store',
                                   nargs=1,
                                   help='Ping remote once per SECS seconds')

        self.__parser.add_argument('--ping-restart', metavar='SECS',
                                   action='store',
                                   nargs=1,
                                   help='Restart if n seconds pass without '
                                   + 'reception of remote ping')

        self.__parser.add_argument('--pkcs12', metavar='FILE',
                                   action=ConfigParser.PKCS12Parser,
                                   help='PKCS#12 file containing local private '
                                   + 'key, local certificate and optionally '
                                   + 'the root CA certificate')

        self.__parser.add_argument('--port', metavar='PORT',
                                   action='store',
                                   nargs=1,
                                   help='TCP/UDP port number for both local '
                                   + 'and remote.')

        self.__parser.add_argument('--profile-override',
                                   metavar='OVERRIDE-KEY OVERRIDE-VALUE',
                                   action=ConfigParser.OpenVPNoverrideArgs,
                                   choices=profile_overrides,
                                   help='OpenVPN 3 specific: Override '
                                   + 'specific settings. Valid override keys: '
                                   + ', '.join(profile_overrides))

        self.__parser.add_argument('--proto', metavar='PROTO',
                                   action='store',
                                   choices=['udp', 'tcp', 'tcp-client'],
                                   nargs=1,
                                   help='Use protocol PROTO for communicating '
                                   +'with peer. Valid values: udp, tcp')

        self.__parser.add_argument('--push-peer-info',
                                   action='store_true',
                                   help='Push client info to server')

        redirflags = ['autolocal', 'def1', 'bypass-dhcp'
                      'bypass-dns', 'block-local',
                      'ipv4', '!ipv4', 'ipv6', '!ipv6']
        self.__parser.add_argument('--redirect-gateway', metavar='[FLAGS]',
                                   choices=redirflags,
                                   action=ConfigParser.OpenVPNvarArgs,
                                   help='Automatically execute routing '
                                   + 'commands to redirect all outgoing IP '
                                   + 'traffic through the VPN.  Valid flags: '
                                   + ', '.join(redirflags))

        self.__parser.add_argument('--redirect-private', metavar='[FLAGS]',
                                   choices=redirflags,
                                   action=ConfigParser.OpenVPNvarArgs,
                                   help='Like --redirect-gateway, but omit '
                                   + 'actually changing default gateway.'
                                   + 'Valid flags: ' + ', '.join(redirflags))

        self.__parser.add_argument('--remote', metavar='HOST [PORT [PROTO]]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Remote host or IP. PORT number and '
                                   'PROTO are optional. May be provided '
                                   'multiple times.')

        self.__parser.add_argument('--remote-cert-eku', metavar='OID',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Require the peer certificate to be '
                                   + 'signed with explicit extended key usage. '
                                   + 'OID can be an object identifier or '
                                   + 'OpenSSL string representation.')

        self.__parser.add_argument('--remote-cert-ku', metavar='ID',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Require that the peer certificate was '
                                   + 'signed with explicit key usage (ID). '
                                   + 'More than one ID can be provided. Must '
                                   + 'be hexadecimal notation of integers')

        self.__parser.add_argument('--remote-cert-tls', metavar='TYPE',
                                   action='store',
                                   choices=client_server_ch,
                                   nargs=1,
                                   help='Require that peer certificate is '
                                   + 'signed with explicit key usage and '
                                   + 'extended key usage based RFC3280 rules. '
                                   + 'Valid values: '
                                   + ', '.join(client_server_ch))

        self.__parser.add_argument('--remote-random',
                                   action='store_true',
                                   help='If multiple --remote options '
                                   + 'specified, choose one randomly')

        self.__parser.add_argument('--reneg-sec', metavar='SECS',
                                   action='store',
                                   nargs=1,
                                   help='Renegotiate data channel key after '
                                   + 'SECS seconds. (Default 3600)')

        self.__parser.add_argument('--route',
                                   metavar='NETWORK [NETMASK [GATEWAY '
                                   + '[METRIC]]]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Add route to routing table after '
                                   + 'connection is established.  Multiple '
                                   + 'routes can be specified. Default '
                                   + 'NETMASK: 255.255.255.255.  Default '
                                   + 'GATEWAY is taken from --route-gateway '
                                   + 'or --ifconfig')

        self.__parser.add_argument('--route-gateway', metavar='[GW|dhcp]',
                                   action='store',
                                   nargs=1,
                                   help='Specify a default gateway for use '
                                   + 'with --route. See man page for dhcp mode')

        self.__parser.add_argument('--route-ipv6',
                                   metavar='NETWORK/PREFIX [GATEWAY [METRIC]]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Add IPv6 route to routing table after '
                                   + 'connection is established.  Multiple '
                                   + 'routes can be specified. Default GATEWAY '
                                   + 'is taken from \'remote\' in '
                                   + '--ifconfig-ipv6')

        self.__parser.add_argument('--route-metric', metavar='METRIC',
                                   action='store',
                                   nargs=1,
                                   help='Specify a default metric for use with '
                                   + '--route')

        self.__parser.add_argument('--route-nopull',
                                   action='store_true',
                                   help='Do not configure routes pushed by '
                                   + 'remote server')

        self.__parser.add_argument('--server-poll-timeout', metavar='SECS',
                                   action='store',
                                   nargs=1,
                                   help='How long to wait for a response from '
                                   + 'a remote server during connection setup '
                                   + ' (Default 120 seconds)')

        self.__parser.add_argument('--setenv', metavar='NAME [VALUE]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args=1,
                                   help='Set a custom environmental variable '
                                   + 'to pass to script.')

        self.__parser.add_argument('--static-challenge', metavar='MSG ECHO',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   required_args=2,
                                   help='Enable static challenge/response '
                                   + 'protocol using challenge text MSG, with '
                                   + 'ECHO indicating echo flag (0|1)')

        self.__parser.add_argument('--tcp-queue-limit', metavar='NUM',
                                   action='store',
                                   nargs=1,
                                   help='Maximum number of queued TCP output '
                                   + 'packets')

        self.__parser.add_argument('--tls-auth', metavar='FILE [DIR]',
                                   action=ConfigParser.EmbedTLSauth,
                                   help='Add additional HMAC auth on TLS '
                                   + 'control channel. FILE must be a shared '
                                   + 'secret. DIR is optional and defines '
                                   + 'which sub-keys in FILE to use for '
                                   + 'HMAC signing and verification')

        cert_profiles = ['legacy','preferred','suiteb']
        self.__parser.add_argument('--tls-cert-profile', metavar='PROFILE',
                                   action='store',
                                   choices=cert_profiles,
                                   help='Sets certificate profile which '
                                   + 'defines acceptable crypto algorithms. '
                                   + 'Valid profiles: '
                                   + ', '.join(cert_profiles))

        self.__parser.add_argument('--tls-cipher', metavar='CIPHER-STRING',
                                   action='store',
                                   help='Sets the accepted cipher list for '
                                   + 'the TLS based OpenVPN control channel')

        self.__parser.add_argument('--tls-client',
                                   action='store_true',
                                   help='Enable TLS and assume client role '
                                   + 'during TLS handshake. Implicitly added '
                                   + 'when using --client')

        self.__parser.add_argument('--tls-crypt', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   dest='tls-crypt', embed_tag = 'tls-crypt',
                                   help='Encrypts the TLS control channel '
                                   + 'with a shared secret key (FILE).  This'
                                   + 'CANNOT be combined with --tls-auth')

        self.__parser.add_argument('--tls-crypt-v2', metavar='FILE',
                                   action=ConfigParser.EmbedFile,
                                   dest='tls-crypt-v2', embed_tag='tls-crypt-v2',
                                   help='Encrypts the TLS control channel '
                                   + 'with a client specific secret key (FILE).')

        tls_versions = ['1.0','1.1','1.2','1.3']
        self.__parser.add_argument('--tls-version-min',
                                   metavar='TLS_VERSION [\'or-highest\']',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   choices=tls_versions + ['or-highest',],
                                   min_args=1,
                                   help='Set the minimum TLS version accepted '
                                   + 'from the remote peer.  Optionally the'
                                   + '\'or-highest\' keyword can be added.  '
                                   + 'Default: "1.0"  '
                                   + 'Valid versions: '
                                   + ', '.join(tls_versions))

        self.__parser.add_argument('--tls-version-max',
                                   metavar='TLS_VERSION',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   choices=tls_versions,
                                   required_args=1,
                                   help='Set the maximum TLS version accepted '
                                   + 'from the remote peer.  '
                                   + 'Default is the highest supported.  '
                                   + 'Valid versions: '
                                   + ', '.join(tls_versions))

        self.__parser.add_argument('--tls-timeout', metavar='SECS',
                                   action='store',
                                   help='Packet retransmit timeout on TLS '
                                   + 'control channel if no ACK from remote '
                                   + 'within n seconds (Default 2 seconds')

        topologies = ['subnet', 'net30']
        self.__parser.add_argument('--topology', metavar='TYPE',
                                   action='store',
                                   choices=topologies,
                                   nargs=1,
                                   help='Set tunnel topology type. '
                                   + 'Default is net30. Recommended: subnet.'
                                   + 'Valid topologies: '
                                   + ', '.join(topologies))

        self.__parser.add_argument('--tran-window', metavar='SECS',
                                   action='store',
                                   nargs=1,
                                   help='Transition window -- old data channel '
                                   + 'key can live this many seconds after new'
                                   + 'after new key renegotiation begins '
                                   + '(Default 3600 secs)')

        self.__parser.add_argument('--tun-mtu', metavar='SIZE',
                                   action='store',
                                   nargs=1,
                                   help='Set TUN/TAP device MTU to SIZE and '
                                   + 'derive TCP/UDP from it (default is 1500)')

        self.__parser.add_argument('--verb',
                                   metavar= 'LEVEL',
                                   action='store',
                                   type=int,
                                   choices=[1, 2, 3, 4, 5, 6],
                                   nargs=1,
                                   help='Set log verbosity level.  Log levels '
                                   +'are NOT compatible with OpenVPN 2 --verb')

        self.__parser.add_argument('--verify-x509-name',
                                   metavar='MATCH [FLAGS]',
                                   action=ConfigParser.OpenVPNvarArgs,
                                   min_args= 1,
                                   help='Accept connections only with a host '
                                   + 'with a specific X509 subject or CN match '
                                   + 'string.')


        techprev_descr = 'Options in this group may change, disappear or change '\
        + 'behaviour.  These options are not production ready.'
        techpreview = self.__parser.add_argument_group('Tech-Preview options',
                                                       techprev_descr)
        techpreview.add_argument('--enable-dco',
                                 action='store_true',
                                 dest='dco',
                                 help='Enable Data Channel Offload kernel '
                                 + 'acceleration.')
        techpreview.add_argument('--disable-dco',
                                 action='store_false',
                                 dest='dco',
                                 help='Disable Data Channel Offload kernel '
                                 + 'acceleration.')


        descr = 'The following options are ignored and not processed.  These ' \
        + 'options are not implemented in the OpenVPN 3 Core library ' \
        + 'and will not break existing configurations.'
        ignored = self.__parser.add_argument_group('Ignored options', descr)

        ignored.add_argument('--auth-nocache',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Do not cache --askpass or --auth-user-pass '
                             + 'in virtual memory.  Not applicable with '
                             + 'OpenVPN 3 due to different credentials storage '
                             + 'model.')

        ignored.add_argument('--bind',
                            metavar='KEYWORDS',
                            action=ConfigParser.IgnoreArg,
                            nargs='*',
                            help='Bind to local address and port. Not '
                            + 'configurable with OpenVPN 3')

        ignored.add_argument('--chroot',
                             metavar='DIR',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Chroot to this directory after '
                             + 'initialization. Not applicable with OpenVPN 3, '
                             + 'which uses a different execution model.')

        ignored.add_argument('--dev-node',
                             metavar='NODE',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Explicit set the device node instead of'
                             + 'using /dev/net/tun. This is setting is not '
                             + 'configurable in OpenVPN 3 Linux front-ends.')

        ignored.add_argument('--data-ciphers',
                             metavar='CIPHERLIST',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='OpenVPN 2.x option used for handling NCP '
                             + 'related challenges when migrating out of BF-CBC. '
                             + 'Not considered needed in OpenVPN 3')

        ignored.add_argument('--data-ciphers-fallback',
                             metavar='ALG',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='OpenVPN 2.x option used for handling NCP '
                             + 'related challenges when migrating out of BF-CBC. '
                             + 'Not considered needed in OpenVPN 3.')

        ignored.add_argument('--down',
                             metavar='SCRIPT',
                             action=ConfigParser.IgnoreArg,
                             nargs=1, warn=True,
                             help='Run script after tunnel has been '
                             + 'torn down.  This is solved differently with '
                             + 'OpenVPN 3.')

        ignored.add_argument('--down-pre',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Makes --down scripts run before the '
                             + 'disconnect.  Not supported by OpenVPN 3.')

        ignored.add_argument('--explicit-exit-notify',
                             metavar='[ATTEMPTS]',
                             action=ConfigParser.IgnoreArg,
                             nargs='*',
                             help='On exit/restart, send exit signal to remote '
                             + 'end. Automatically configured with OpenVPN 3')

        ignored.add_argument('--fast-io',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='OpenVPN 3 uses a very different socket '
                             + 'packet process implementation removing the '
                             + 'need for this feature')

        ignored.add_argument('--group',
                             metavar='GROUP',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Run OpenVPN with GROUP group credentials. '
                             + 'Not needed with OpenVPN 3 which uses a '
                             + 'different privilege separation approach')

        ignored.add_argument('--mute',
                             metavar='SECS',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Silence repeating messages during n '
                             + 'seconds. Not supported in OpenVPN3')

        ignored.add_argument('--mute-replay-warnings',
                             metavar='SECS',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Silence the output of replay warnings. '
                             + 'Not supported in OpenVPN3')

        ignored.add_argument('--ncp-ciphers',
                             metavar='CIPHERLIST',
                             nargs=1,
                             help='OpenVPN 2.4 option, renamed to '
                             + '--data-ciphers in OpenVPN 2.5')

        ignored.add_argument('--nice',
                             metavar='LEVEL',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Change process priority. Not supported in '
                             + 'OpenVPN 3')

        ignored.add_argument('--nobind',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Do not bind to local address and port. '
                             + 'This is default behaviour in OpenVPN 3')

        ignored.add_argument('--persist-key',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Do not re-read key files across connection '
                             + 'restarts. Not needed. OpenVPN 3 keeps keys '
                             + 'as embedded file elements in the configuration')

        ignored.add_argument('--ping-timer-rem',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Feature not available in OpenVPN 3')

        ignored.add_argument('--pull',
                             action=ConfigParser.IgnoreArg,
                             nargs=0,
                             help='Enabled by default in OpenVPN 3')

        ignored.add_argument('--rcvbuf',
                             metavar='SIZE',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Set the TCP/UDP receive buffer size. Not '
                             + 'supported in OpenVPN 3')

        ignored.add_argument('--resolv-retry',
                             metavar='SECS',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='If hostname resolve fails for --remote, '
                             + 'retry resolve for n seconds before failing. '
                             + 'Not supported by OpenVPN 3')

        ignored.add_argument('--route-delay',
                             action=ConfigParser.IgnoreArg,
                             nargs='*',
                             help='Delay n seconds (default 0) after '
                             + 'connection establishment, before adding '
                             + ' routes. Not supported by OpenVPN 3.')

        ignored.add_argument('--route-method',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Which method m to use for adding routes on '
                             + 'Windows. Not supported by OpenVPN 3.')

        ignored.add_argument('--script-security',
                             metavar='LEVEL',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Sets the security level for scripts which '
                             + 'will be run by OpenVPN.  Running scripts are '
                             + 'not supported by OpenVPN 3.')

        ignored.add_argument('--sndbuf',
                             metavar='SIZE',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Set the TCP/UDP send buffer size. Not '
                             + 'supported in OpenVPN 3')

        ignored.add_argument('--socket-flags',
                             metavar='FLAGS',
                             action=ConfigParser.IgnoreArg,
                             nargs='+',
                             help='Applies flags to the transport socket. Not '
                             + 'supported in OpenVPN 3')

        ignored.add_argument('--tun-mtu-extra',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Not used by OpenVPN 3')

        ignored.add_argument('--up',
                             metavar='SCRIPT',
                             action=ConfigParser.IgnoreArg,
                             nargs=1, warn=True,
                             help='Run script after tunnel has been '
                             + 'established.  This is solved differently with '
                             + 'OpenVPN 3.')

        ignored.add_argument('--user',
                             metavar='USER',
                             action=ConfigParser.IgnoreArg,
                             nargs=1,
                             help='Run OpenVPN with USER user credentials. '
                             + 'Not needed with OpenVPN 3 which uses a '
                             + 'different privilege separation approach')
        # ENDFNC: __init_arguments()


    ##
    #  Special argparser extension which is capable of parsing
    #  a configuration file.  And it handles recursive inclusion, so
    #  configuration files may contain the 'config' to include other
    #  settings to the main configuration
    #
    class ReadConfigFile(argparse.Action):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            super(ConfigParser.ReadConfigFile, self).__init__(option_strings, dest, **kwargs)

        def __call__(self, parser, namespace, values, option_string=None):
            #
            # Parse the configuration file
            #
            fp = open(values, 'r')

            # Remove new line markers on each line and only consider lines which
            # has not been commented out
            cfg = []
            embedded = {}
            tmp = None
            embedded_key = None
            for rawopt in [l.strip() for l in fp.readlines() if 0 < len(l.split('## ')[0])]:
                #
                # FIXME: This is a hackish workaround to better handle OpenVPN Access Server
                #        when configured to do web authentication.  This hack will not be
                #        needed when the OpenVPN 3 Core library properly supports sending
                #        --auth-token in similar ways to how OpenVPN 2.x behaves.
                #
                as_meta_opt = rawopt.split('# OVPN_ACCESS_SERVER_')
                if len(as_meta_opt) > 1:
                    meta_kv = as_meta_opt[1].strip().split('=')
                    if not meta_kv in ('USERNAME', 'PROFILE', 'AUTOLOGIN'):
                        continue
                    opt = 'setenv opt %s %s' % (meta_kv[0], " ".join(meta_kv[1:]))
                elif len(rawopt.split('#')) > 1:
                    continue
                else:
                    opt = rawopt.split('# ')[0].strip()
                if len(opt) == 0:
                    # Skip empty lines
                    continue

                # Check if we have a start-tag for embedded blob
                # An embedded blob is always the option name enclosed in
                # '<' and '>'.  The end of the embedded blob is closed with
                # '</option-name>'.
                if embedded_key is None and opt[0] == '<':
                    # Embedded blob found.  When embedded_key is _NOT_ None, we
                    # are inside an embedded blob tag.
                    tmp = [opt,]
                    embedded_key = opt[1:len(opt)-1]
                elif embedded_key is not None and '</' + embedded_key + '>' != opt:
                    # When inside an embedded blob, save the contents
                    tmp.append(opt)
                elif embedded_key is not None and '</' + embedded_key + '>' == opt:
                    # On closure of the embedded blob, save it separately.  This
                    # should not be parsed by the argument parser further.
                    tmp.append(opt)
                    embedded[embedded_key] = '\n'.join(tmp)
                    embedded_key = None
                else:
                    # When outside an embedded blob, copy the option and its
                    # arguments to be parsed further.  Remove additional
                    # comments using the semicolon separator
                    cfg.append('--' + opt.split(';')[0])

            # Parse the collected arguments further and merge them with the
            # already parsed argument
            args = vars(parser.parse_args(shlex.split('\n'.join(cfg),
                                                      posix=False)))
            for (k,v) in args.items():
                setattr(namespace, k, v)

            # Merge in embedded blobs, without further parsing
            for (k,v) in embedded.items():
                setattr(namespace, k, v)

            # Remove the option triggering this call from the namespace.
            # This option (self.dest) is not needed as the provided config file
            # has already been parsed and embedded.
            #
            # There is one exception though, the very first --config will be
            # preserverd, and stored as config_name.
            if 'config' == self.dest:
                try:
                    cfgname = getattr(parser, 'config_name')
                except AttributeError:
                    setattr(parser, 'config_name', values)
            delattr(namespace, self.dest)
        # ENDFNC: ReadConfigFile::__call__()
    # ENDCLASS: ReadConfigFile

    ##
    #  Some OpenVPN options may take one or more arguments.  This tackles
    #  these odd cases
    class OpenVPNvarArgs(argparse.Action):
            def __init__(self, option_strings, dest, nargs=None, **kwargs):
                try:
                    self.__min_args = kwargs.pop('min_args')
                except KeyError:
                    self.__min_args = 0
                try:
                    self.__required_args = kwargs.pop('required_args')
                except KeyError:
                    self.__required_args = 0

                super(ConfigParser.OpenVPNvarArgs, self).__init__(option_strings, dest, '*', **kwargs)

            def __call__(self, parser, namespace, values, option_string=None):
                # Always presume that these types of options can be
                # enslisted multiple times.  So we will always extend
                # a list where self.dest matches an existing key

                dst = getattr(namespace, self.dest)
                if dst is None:
                    dst = []

                min_args = 0
                try:
                    min_args = self.__min_args
                except AttributeError:
                    pass

                required_args = 0
                try:
                    required_args = self.__required_args
                except AttributeError:
                    pass

                if isinstance(values, list):
                    if len(values) < min_args:
                        err = 'The --%s requires at least %i arguments' % (self.dest, min_args)
                        raise argparse.ArgumentError(self, err)

                    if required_args > 0 and len(values) != required_args:
                        err = 'The --%s require exactly %i arguments' % (self.dest, required_args)
                        raise argparse.ArgumentError(self, err)
                    dst.append(' '.join(values))
                else:
                    dst.append(values)

                setattr(namespace, self.dest, dst)


    ##
    #  The --profile-override args takes arguments like "KEY VALUE"
    #  We need to split out the valid keys and extracting the proper values
    #
    class OpenVPNoverrideArgs(argparse.Action):
            def __init__(self, option_strings, dest, nargs=None, **kwargs):
                try:
                    self.__overrides = kwargs.pop('choices')
                except KeyError:
                    raise Exception('Missing required choices')

                super(ConfigParser.OpenVPNoverrideArgs, self).__init__(option_strings, dest, '+', **kwargs)

            def __call__(self, parser, namespace, values, option_string=None):

                dst = getattr(namespace, self.dest)
                if dst is None:
                    dst = {}

                if isinstance(values, list):
                    if len(values) < 2:
                        err = 'Missing override value to "%s"' % (values[0],)
                        raise argparse.ArgumentError(self, err)

                    override = values[0]
                    override_value = values[1:]

                    if override not in self.__overrides:
                        err = 'Invalid override key: %s' % (values[0],)
                        raise argparse.ArgumentError(self, err)

                    # These overrides takes a boolean value
                    if override in ('auth-fail-retry', 'dns-fallback-google',
                                    'dns-setup-disabled','dns-sync-lookup',
                                    'enable-legacy-algorithms', 'persist-tun'):
                        if type(override_value) is list:
                            override_value = ''.join(override_value)

                        if override_value.lower() in ('1','yes','true'):
                            override_value = True
                        elif override_value.lower() in ('0','no','false'):
                            override_value = False
                        else:
                            raise argparse.ArgumentError(self,
                                                         'Incorrect boolean value for "%s"' % override)

                    if type(override_value) is list:
                        dst[override] = ' '.join(override_value)
                    else:
                        dst[override] = override_value

                else:
                    err = 'Missing override value to "%s"' % (values,)
                    raise argparse.ArgumentError(self, err)

                setattr(namespace, self.dest, dst)


    class ChangeDir(argparse.Action):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            super(ConfigParser.ChangeDir, self).__init__(option_strings, dest, '+', **kwargs)

        def __call__(self, parser, namespace, values, option_string=None):
            """Changes the current working directory to the provided one
            """

            os.chdir(values[0])
            setattr(namespace, self.dest, values[0])

    ##
    #  Options related to keying material needs to be embedded in an
    #  OpenVPN 3 configuration profile.  This argparser extension
    #  will generate an embedded file option on-the-fly
    #
    class EmbedFile(argparse.Action):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            # Add a new argument to the add_argument() method
            # The embed_tag variable is the tag name used when
            # generating the tag.  If not set, use the same as the
            # destination name
            if 'embed_tag' in kwargs:
                self.__tag = kwargs.pop('embed_tag')
            else:
                self.__tag = dest

            if 'ignore_missing_filename' in kwargs:
                self.__ignore_missing_filename = kwargs.pop('ignore_missing_filename')
            else:
                self.__ignore_missing_filename = False

            super(ConfigParser.EmbedFile, self).__init__(option_strings, dest, '*', **kwargs)

        def __call__(self, parser, namespace, values, option_string=None):
            """Loads the given file and generates an embedded option of it"""

            if len(values) < 1 and not self.__ignore_missing_filename:
                err = '%s needs a filename' % (self.option_strings[0])
                raise argparse.ArgumentError(self, err)

            if len(values) > 0:
                # When a filename is present, embed
                # the file into the proper tags
                try:
                    fp = open(self.normalize_filename(values), 'r')
                    ret = '<%s>\n' % self.__tag
                    ret += '\n'.join([l.strip() for l in fp.readlines()])
                    ret += '\n</%s>' % self.__tag
                    fp.close()
                    setattr(namespace, self.dest, ret)
                except IOError as e:
                    err = str(e.strerror) + " '" + values[0] + "'"
                    raise argparse.ArgumentError(self, err)
            else:
                # If no filename is available, but
                # this is allowed (ignore_missing_filename=True),
                # just add this as an option without arguments.
                setattr(namespace, self.dest, '')


        def normalize_filename(self, values):
            fn = " ".join(values)
            fn = fn.replace('"', '').replace("'", '').replace('\\', '')
            return fn

    # ENDCLASS: EmbedFile


    class EmbedTLSauth(EmbedFile):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            # Add a new argument to the add_argument() method
            # The embed_tag variable is the tag name used when
            # generating the tag.  If not set, use the same as the
            # destination name
            if 'embed_tag' in kwargs:
                self.__tag = kwargs.pop('embed_tag')
            else:
                self.__tag = 'tls-auth'
            super(ConfigParser.EmbedTLSauth, self).__init__(option_strings, dest, '+', **kwargs)

        def __call__(self, parser, namespace, values, option_string=None):
            """Loads the tls-auth file, generates an embedded option of it
            and considers if there is a key-direction argument as well
            """

            # If values is a list, we have filename and key-direction
            filename = ""
            if values[-1:][0] in ('0', '1'):
                filename = self.normalize_filename(values[:-1])
                setattr(namespace, 'key-direction', values[-1:])
            else:
                filename = self.normalize_filename(values)

            fp = open(filename, 'r')
            ret = '<%s>\n' % self.__tag
            ret += '\n'.join([l.strip() for l in fp.readlines()])
            ret += '\n</%s>' % self.__tag
            fp.close()
            setattr(namespace, self.dest, ret)


    ##
    #  Special file parser for PKCS12 files.  Will extract keys and
    #  certificates and embed them to the configuration as embedded files
    #
    class PKCS12Parser(argparse.Action):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            super(ConfigParser.PKCS12Parser, self).__init__(option_strings, dest, **kwargs)

        def __call__(self, parser, namespace, values, option_string=None):
            # Bail out with an error if we don't have pyOpenSSL installed
            if not HAVE_OPENSSL:
                raise Exception('pyOpenSSL library is not installed.  '
                                + 'Cannot parse PKCS#12 files.')

            # Read the PKCS12 file into a memory buffer (p12bin)
            # and decode it (p12)
            with open(values, 'rb') as f:
                p12bin = f.read()
            p12 = None

            # First try without password
            try:
                p12 = crypto.load_pkcs12(p12bin)
            except crypto.Error as e:
                errargs  = e.args[0][0]
                if 'PKCS12_parse' == errargs[1] and \
                   'mac verify failure' == errargs[2]:
                    # Password is needed.  Query the user for it
                    p12 = crypto.load_pkcs12(p12bin,
                                             getpass('PKCS12 passphrase: '))

            # Extract CA, certificate and private key
            key = crypto.dump_privatekey(crypto.FILETYPE_PEM,
                                         p12.get_privatekey())
            d = '<key>\n%s</key>' % (str(key.decode('UTF-8')),)
            setattr(namespace, 'key', d)

            crt = crypto.dump_certificate(crypto.FILETYPE_PEM,
                                          p12.get_certificate())
            d = '<cert>\n%s</cert>' % (str(crt.decode('UTF-8')),)
            setattr(namespace, 'cert', d)

            cacerts = []
            for c in p12.get_ca_certificates():
                crt = crypto.dump_certificate(crypto.FILETYPE_PEM, c)
                cacerts.append(str(crt.decode('UTF-8')))
            if 0 < len(cacerts):
                d = '<ca>\n%s</ca>' % (''.join(cacerts),)
                setattr(namespace, 'ca', d)

            # We don't want to save this option, it is not useful as
            # we've already split up the PKCS#12 file into appropriate
            # sub-elements
            delattr(namespace, 'pkcs12')
        # ENDFNC: PKCS12Parser::__call__()
    # ENDCLASS: PKCS12Parser


    ##
    #  Options using this argparse.Action variant will just be ignored
    #  and never passed on further for the following parsing
    class IgnoreArg(argparse.Action):
        def __init__(self, option_strings, dest, nargs=None, **kwargs):
            if 'warn' in kwargs:
                self.__warn = kwargs.pop('warn')
            else:
                self.__warn = False
            super(ConfigParser.IgnoreArg, self).__init__(option_strings, dest, nargs, **kwargs)

        def __call__(self, parser, namespace, values, options_string=None):
            if options_string is None:
                raise KeyError('option_string is required')
            if self.__warn is True:
                print("** WARNING ** Ignoring option: %s %s" % (
                    self.option_strings[0], " ".join(values)))

            # Ensure this option/argument is not preserved
            delattr(namespace, self.dest)
    # ENDCLASS: ConfigParser
