EtherGuard-VPN/main.go

286 lines
6.6 KiB
Go
Raw Normal View History

2019-02-04 17:29:52 +01:00
// +build !windows
2019-01-02 01:55:51 +01:00
/* SPDX-License-Identifier: MIT
*
2019-01-02 01:55:51 +01:00
* Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved.
*/
package main
2017-06-26 13:14:02 +02:00
import (
"fmt"
"os"
2017-08-01 12:14:38 +02:00
"os/signal"
2018-05-04 19:50:08 +02:00
"runtime"
2017-11-14 18:26:28 +01:00
"strconv"
"syscall"
2019-05-14 09:09:52 +02:00
"golang.zx2c4.com/wireguard/device"
"golang.zx2c4.com/wireguard/ipc"
"golang.zx2c4.com/wireguard/tun"
2017-11-14 18:26:28 +01:00
)
2017-11-30 23:30:29 +01:00
const (
ExitSetupSuccess = 0
ExitSetupFailed = 1
)
2017-11-14 18:26:28 +01:00
const (
2018-05-04 19:50:08 +02:00
ENV_WG_TUN_FD = "WG_TUN_FD"
ENV_WG_UAPI_FD = "WG_UAPI_FD"
2018-05-03 14:50:57 +02:00
ENV_WG_PROCESS_FOREGROUND = "WG_PROCESS_FOREGROUND"
2017-06-26 13:14:02 +02:00
)
func printUsage() {
fmt.Printf("usage:\n")
fmt.Printf("%s [-f/--foreground] INTERFACE-NAME\n", os.Args[0])
}
2018-05-04 19:50:08 +02:00
func warning() {
2019-04-19 00:48:09 +02:00
if runtime.GOOS != "linux" || os.Getenv(ENV_WG_PROCESS_FOREGROUND) == "1" {
return
}
2019-04-19 00:48:09 +02:00
shouldQuit := os.Getenv("WG_I_PREFER_BUGGY_USERSPACE_TO_POLISHED_KMOD") != "1"
2018-05-04 19:50:08 +02:00
fmt.Fprintln(os.Stderr, "WARNING WARNING WARNING WARNING WARNING WARNING WARNING")
fmt.Fprintln(os.Stderr, "W G")
2019-04-19 00:48:09 +02:00
fmt.Fprintln(os.Stderr, "W You are running this software on a Linux kernel, G")
fmt.Fprintln(os.Stderr, "W which is probably unnecessary and foolish. This G")
fmt.Fprintln(os.Stderr, "W is because the Linux kernel has built-in first G")
fmt.Fprintln(os.Stderr, "W class support for WireGuard, and this support is G")
fmt.Fprintln(os.Stderr, "W much more refined than this slower userspace G")
fmt.Fprintln(os.Stderr, "W implementation. For more information on G")
fmt.Fprintln(os.Stderr, "W installing the kernel module, please visit: G")
fmt.Fprintln(os.Stderr, "W https://www.wireguard.com/install G")
if shouldQuit {
2018-05-04 19:50:08 +02:00
fmt.Fprintln(os.Stderr, "W G")
2019-04-19 00:48:09 +02:00
fmt.Fprintln(os.Stderr, "W If you still want to use this program, against G")
fmt.Fprintln(os.Stderr, "W the advice here, please first export this G")
fmt.Fprintln(os.Stderr, "W environment variable: G")
fmt.Fprintln(os.Stderr, "W WG_I_PREFER_BUGGY_USERSPACE_TO_POLISHED_KMOD=1 G")
2018-05-04 19:50:08 +02:00
}
fmt.Fprintln(os.Stderr, "W G")
fmt.Fprintln(os.Stderr, "WARNING WARNING WARNING WARNING WARNING WARNING WARNING")
if shouldQuit {
os.Exit(1)
}
2018-05-04 19:50:08 +02:00
}
func main() {
2018-05-24 01:52:22 +02:00
if len(os.Args) == 2 && os.Args[1] == "--version" {
2019-03-03 04:04:41 +01:00
fmt.Printf("wireguard-go v%s\n\nUserspace WireGuard daemon for %s-%s.\nInformation available at https://www.wireguard.com.\nCopyright (C) Jason A. Donenfeld <Jason@zx2c4.com>.\n", device.WireGuardGoVersion, runtime.GOOS, runtime.GOARCH)
2018-05-24 01:52:22 +02:00
return
}
2018-05-04 19:50:08 +02:00
warning()
2018-05-03 04:49:35 +02:00
// parse arguments
var foreground bool
var interfaceName string
if len(os.Args) < 2 || len(os.Args) > 3 {
printUsage()
return
}
switch os.Args[1] {
2017-07-17 16:16:18 +02:00
case "-f", "--foreground":
foreground = true
if len(os.Args) != 3 {
printUsage()
return
}
interfaceName = os.Args[2]
2017-07-17 16:16:18 +02:00
default:
foreground = false
if len(os.Args) != 2 {
printUsage()
return
}
interfaceName = os.Args[1]
}
2018-05-03 14:50:57 +02:00
if !foreground {
foreground = os.Getenv(ENV_WG_PROCESS_FOREGROUND) == "1"
}
// get log level (default: info)
logLevel := func() int {
switch os.Getenv("LOG_LEVEL") {
case "debug":
2019-03-03 04:04:41 +01:00
return device.LogLevelDebug
case "info":
2019-03-03 04:04:41 +01:00
return device.LogLevelInfo
case "error":
2019-03-03 04:04:41 +01:00
return device.LogLevelError
2018-05-14 03:38:06 +02:00
case "silent":
2019-03-03 04:04:41 +01:00
return device.LogLevelSilent
}
2019-03-03 04:04:41 +01:00
return device.LogLevelInfo
}()
2017-11-17 14:36:08 +01:00
// open TUN device (or use supplied fd)
2018-05-23 02:10:54 +02:00
tun, err := func() (tun.TUNDevice, error) {
2017-11-17 14:36:08 +01:00
tunFdStr := os.Getenv(ENV_WG_TUN_FD)
2017-11-14 18:26:28 +01:00
if tunFdStr == "" {
2019-03-03 04:04:41 +01:00
return tun.CreateTUN(interfaceName, device.DefaultMTU)
2017-11-14 18:26:28 +01:00
}
2017-11-17 14:36:08 +01:00
// construct tun device from supplied fd
2017-11-14 18:26:28 +01:00
fd, err := strconv.ParseUint(tunFdStr, 10, 32)
if err != nil {
return nil, err
}
err = syscall.SetNonblock(int(fd), true)
if err != nil {
return nil, err
}
2017-11-17 14:36:08 +01:00
file := os.NewFile(uintptr(fd), "")
2019-03-03 04:04:41 +01:00
return tun.CreateTUNFromFile(file, device.DefaultMTU)
2017-11-14 18:26:28 +01:00
}()
2018-05-04 21:11:38 +02:00
if err == nil {
realInterfaceName, err2 := tun.Name()
if err2 == nil {
interfaceName = realInterfaceName
}
}
2019-03-03 04:04:41 +01:00
logger := device.NewLogger(
2018-05-04 21:11:38 +02:00
logLevel,
fmt.Sprintf("(%s) ", interfaceName),
)
2019-03-03 04:04:41 +01:00
logger.Info.Println("Starting wireguard-go version", device.WireGuardGoVersion)
2018-05-30 01:09:18 +02:00
2018-05-04 21:11:38 +02:00
logger.Debug.Println("Debug log enabled")
2017-11-14 18:26:28 +01:00
if err != nil {
logger.Error.Println("Failed to create TUN device:", err)
2017-11-17 14:36:08 +01:00
os.Exit(ExitSetupFailed)
2017-11-14 18:26:28 +01:00
}
2017-11-17 14:36:08 +01:00
// open UAPI file (or use supplied fd)
fileUAPI, err := func() (*os.File, error) {
uapiFdStr := os.Getenv(ENV_WG_UAPI_FD)
if uapiFdStr == "" {
2019-03-03 04:04:41 +01:00
return ipc.UAPIOpen(interfaceName)
2017-11-17 14:36:08 +01:00
}
// use supplied fd
fd, err := strconv.ParseUint(uapiFdStr, 10, 32)
if err != nil {
return nil, err
}
return os.NewFile(uintptr(fd), ""), nil
}()
if err != nil {
logger.Error.Println("UAPI listen error:", err)
os.Exit(ExitSetupFailed)
return
}
2017-11-14 18:26:28 +01:00
// daemonize the process
if !foreground {
env := os.Environ()
2017-11-17 14:36:08 +01:00
env = append(env, fmt.Sprintf("%s=3", ENV_WG_TUN_FD))
env = append(env, fmt.Sprintf("%s=4", ENV_WG_UAPI_FD))
2018-05-03 14:50:57 +02:00
env = append(env, fmt.Sprintf("%s=1", ENV_WG_PROCESS_FOREGROUND))
2018-05-14 03:38:06 +02:00
files := [3]*os.File{}
2019-03-03 04:04:41 +01:00
if os.Getenv("LOG_LEVEL") != "" && logLevel != device.LogLevelSilent {
2018-05-14 20:06:33 +02:00
files[0], _ = os.Open(os.DevNull)
2018-05-14 03:38:06 +02:00
files[1] = os.Stdout
files[2] = os.Stderr
2018-05-14 20:06:33 +02:00
} else {
files[0], _ = os.Open(os.DevNull)
files[1], _ = os.Open(os.DevNull)
files[2], _ = os.Open(os.DevNull)
2018-05-14 03:38:06 +02:00
}
2017-11-14 18:26:28 +01:00
attr := &os.ProcAttr{
Files: []*os.File{
2018-05-14 03:38:06 +02:00
files[0], // stdin
files[1], // stdout
files[2], // stderr
2017-11-14 18:26:28 +01:00
tun.File(),
2017-11-17 14:36:08 +01:00
fileUAPI,
2017-11-14 18:26:28 +01:00
},
Dir: ".",
Env: env,
}
2018-05-03 14:50:57 +02:00
path, err := os.Executable()
if err != nil {
logger.Error.Println("Failed to determine executable:", err)
os.Exit(ExitSetupFailed)
}
process, err := os.StartProcess(
path,
os.Args,
attr,
)
2017-11-14 18:26:28 +01:00
if err != nil {
logger.Error.Println("Failed to daemonize:", err)
2017-11-17 14:36:08 +01:00
os.Exit(ExitSetupFailed)
2017-11-14 18:26:28 +01:00
}
2018-05-03 14:50:57 +02:00
process.Release()
2017-11-14 18:26:28 +01:00
return
}
2019-03-03 04:04:41 +01:00
device := device.NewDevice(tun, logger)
2017-11-17 14:36:08 +01:00
2017-11-14 18:26:28 +01:00
logger.Info.Println("Device started")
2017-08-01 12:14:38 +02:00
errs := make(chan error)
term := make(chan os.Signal, 1)
2019-03-03 04:04:41 +01:00
uapi, err := ipc.UAPIListen(interfaceName, fileUAPI)
if err != nil {
logger.Error.Println("Failed to listen on uapi socket:", err)
os.Exit(ExitSetupFailed)
}
2017-11-17 14:36:08 +01:00
2017-07-17 16:16:18 +02:00
go func() {
for {
conn, err := uapi.Accept()
if err != nil {
2017-08-01 12:14:38 +02:00
errs <- err
return
2017-07-17 16:16:18 +02:00
}
2019-03-03 04:04:41 +01:00
go device.IpcHandle(conn)
}
2017-07-17 16:16:18 +02:00
}()
2017-11-14 18:26:28 +01:00
logger.Info.Println("UAPI listener started")
2017-08-01 12:14:38 +02:00
// wait for program to terminate
signal.Notify(term, syscall.SIGTERM)
2017-08-01 12:14:38 +02:00
signal.Notify(term, os.Interrupt)
select {
case <-term:
case <-errs:
2017-12-01 23:37:26 +01:00
case <-device.Wait():
2017-08-01 12:14:38 +02:00
}
2017-11-17 14:36:08 +01:00
// clean up
2017-08-01 12:14:38 +02:00
uapi.Close()
2017-11-17 14:36:08 +01:00
device.Close()
2017-08-01 12:14:38 +02:00
2017-11-14 18:26:28 +01:00
logger.Info.Println("Shutting down")
}