EtherGuard-VPN/main.go

266 lines
6.0 KiB
Go
Raw Normal View History

2019-02-04 17:29:52 +01:00
// +build !windows
2019-01-02 01:55:51 +01:00
/* SPDX-License-Identifier: MIT
*
* Copyright (C) 2017-2020 WireGuard LLC. All Rights Reserved.
*/
package main
2017-06-26 13:14:02 +02:00
import (
"fmt"
"os"
2017-08-01 12:14:38 +02:00
"os/signal"
2018-05-04 19:50:08 +02:00
"runtime"
2017-11-14 18:26:28 +01:00
"strconv"
"syscall"
2019-05-14 09:09:52 +02:00
"golang.zx2c4.com/wireguard/device"
"golang.zx2c4.com/wireguard/ipc"
"golang.zx2c4.com/wireguard/tun"
2017-11-14 18:26:28 +01:00
)
2017-11-30 23:30:29 +01:00
const (
ExitSetupSuccess = 0
ExitSetupFailed = 1
)
2017-11-14 18:26:28 +01:00
const (
2018-05-04 19:50:08 +02:00
ENV_WG_TUN_FD = "WG_TUN_FD"
ENV_WG_UAPI_FD = "WG_UAPI_FD"
2018-05-03 14:50:57 +02:00
ENV_WG_PROCESS_FOREGROUND = "WG_PROCESS_FOREGROUND"
2017-06-26 13:14:02 +02:00
)
func printUsage() {
fmt.Printf("usage:\n")
fmt.Printf("%s [-f/--foreground] INTERFACE-NAME\n", os.Args[0])
}
2018-05-04 19:50:08 +02:00
func warning() {
2019-04-19 00:48:09 +02:00
if runtime.GOOS != "linux" || os.Getenv(ENV_WG_PROCESS_FOREGROUND) == "1" {
return
}
fmt.Fprintln(os.Stderr, "┌───────────────────────────────────────────────────┐")
fmt.Fprintln(os.Stderr, "│ │")
fmt.Fprintln(os.Stderr, "│ Running this software on Linux is unnecessary, │")
fmt.Fprintln(os.Stderr, "│ because the Linux kernel has built-in first │")
fmt.Fprintln(os.Stderr, "│ class support for WireGuard, which will be │")
fmt.Fprintln(os.Stderr, "│ faster, slicker, and better integrated. For │")
fmt.Fprintln(os.Stderr, "│ information on installing the kernel module, │")
fmt.Fprintln(os.Stderr, "│ please visit: <https://wireguard.com/install>. │")
fmt.Fprintln(os.Stderr, "│ │")
fmt.Fprintln(os.Stderr, "└───────────────────────────────────────────────────┘")
2018-05-04 19:50:08 +02:00
}
func main() {
2018-05-24 01:52:22 +02:00
if len(os.Args) == 2 && os.Args[1] == "--version" {
2019-03-03 04:04:41 +01:00
fmt.Printf("wireguard-go v%s\n\nUserspace WireGuard daemon for %s-%s.\nInformation available at https://www.wireguard.com.\nCopyright (C) Jason A. Donenfeld <Jason@zx2c4.com>.\n", device.WireGuardGoVersion, runtime.GOOS, runtime.GOARCH)
2018-05-24 01:52:22 +02:00
return
}
2018-05-04 19:50:08 +02:00
warning()
2018-05-03 04:49:35 +02:00
var foreground bool
var interfaceName string
if len(os.Args) < 2 || len(os.Args) > 3 {
printUsage()
return
}
switch os.Args[1] {
2017-07-17 16:16:18 +02:00
case "-f", "--foreground":
foreground = true
if len(os.Args) != 3 {
printUsage()
return
}
interfaceName = os.Args[2]
2017-07-17 16:16:18 +02:00
default:
foreground = false
if len(os.Args) != 2 {
printUsage()
return
}
interfaceName = os.Args[1]
}
2018-05-03 14:50:57 +02:00
if !foreground {
foreground = os.Getenv(ENV_WG_PROCESS_FOREGROUND) == "1"
}
// get log level (default: info)
logLevel := func() int {
switch os.Getenv("LOG_LEVEL") {
case "verbose", "debug":
return device.LogLevelVerbose
case "error":
2019-03-03 04:04:41 +01:00
return device.LogLevelError
2018-05-14 03:38:06 +02:00
case "silent":
2019-03-03 04:04:41 +01:00
return device.LogLevelSilent
}
return device.LogLevelError
}()
2017-11-17 14:36:08 +01:00
// open TUN device (or use supplied fd)
tun, err := func() (tun.Device, error) {
2017-11-17 14:36:08 +01:00
tunFdStr := os.Getenv(ENV_WG_TUN_FD)
2017-11-14 18:26:28 +01:00
if tunFdStr == "" {
2019-03-03 04:04:41 +01:00
return tun.CreateTUN(interfaceName, device.DefaultMTU)
2017-11-14 18:26:28 +01:00
}
2017-11-17 14:36:08 +01:00
// construct tun device from supplied fd
2017-11-14 18:26:28 +01:00
fd, err := strconv.ParseUint(tunFdStr, 10, 32)
if err != nil {
return nil, err
}
err = syscall.SetNonblock(int(fd), true)
if err != nil {
return nil, err
}
2017-11-17 14:36:08 +01:00
file := os.NewFile(uintptr(fd), "")
2019-03-03 04:04:41 +01:00
return tun.CreateTUNFromFile(file, device.DefaultMTU)
2017-11-14 18:26:28 +01:00
}()
2018-05-04 21:11:38 +02:00
if err == nil {
realInterfaceName, err2 := tun.Name()
if err2 == nil {
interfaceName = realInterfaceName
}
}
2019-03-03 04:04:41 +01:00
logger := device.NewLogger(
2018-05-04 21:11:38 +02:00
logLevel,
fmt.Sprintf("(%s) ", interfaceName),
)
logger.Verbosef("Starting wireguard-go version %s", device.WireGuardGoVersion)
2018-05-04 21:11:38 +02:00
2017-11-14 18:26:28 +01:00
if err != nil {
logger.Errorf("Failed to create TUN device: %v", err)
2017-11-17 14:36:08 +01:00
os.Exit(ExitSetupFailed)
2017-11-14 18:26:28 +01:00
}
2017-11-17 14:36:08 +01:00
// open UAPI file (or use supplied fd)
fileUAPI, err := func() (*os.File, error) {
uapiFdStr := os.Getenv(ENV_WG_UAPI_FD)
if uapiFdStr == "" {
2019-03-03 04:04:41 +01:00
return ipc.UAPIOpen(interfaceName)
2017-11-17 14:36:08 +01:00
}
// use supplied fd
fd, err := strconv.ParseUint(uapiFdStr, 10, 32)
if err != nil {
return nil, err
}
return os.NewFile(uintptr(fd), ""), nil
}()
if err != nil {
logger.Errorf("UAPI listen error: %v", err)
2017-11-17 14:36:08 +01:00
os.Exit(ExitSetupFailed)
return
}
2017-11-14 18:26:28 +01:00
// daemonize the process
if !foreground {
env := os.Environ()
2017-11-17 14:36:08 +01:00
env = append(env, fmt.Sprintf("%s=3", ENV_WG_TUN_FD))
env = append(env, fmt.Sprintf("%s=4", ENV_WG_UAPI_FD))
2018-05-03 14:50:57 +02:00
env = append(env, fmt.Sprintf("%s=1", ENV_WG_PROCESS_FOREGROUND))
2018-05-14 03:38:06 +02:00
files := [3]*os.File{}
2019-03-03 04:04:41 +01:00
if os.Getenv("LOG_LEVEL") != "" && logLevel != device.LogLevelSilent {
2018-05-14 20:06:33 +02:00
files[0], _ = os.Open(os.DevNull)
2018-05-14 03:38:06 +02:00
files[1] = os.Stdout
files[2] = os.Stderr
2018-05-14 20:06:33 +02:00
} else {
files[0], _ = os.Open(os.DevNull)
files[1], _ = os.Open(os.DevNull)
files[2], _ = os.Open(os.DevNull)
2018-05-14 03:38:06 +02:00
}
2017-11-14 18:26:28 +01:00
attr := &os.ProcAttr{
Files: []*os.File{
2018-05-14 03:38:06 +02:00
files[0], // stdin
files[1], // stdout
files[2], // stderr
2017-11-14 18:26:28 +01:00
tun.File(),
2017-11-17 14:36:08 +01:00
fileUAPI,
2017-11-14 18:26:28 +01:00
},
Dir: ".",
Env: env,
}
2018-05-03 14:50:57 +02:00
path, err := os.Executable()
if err != nil {
logger.Errorf("Failed to determine executable: %v", err)
2018-05-03 14:50:57 +02:00
os.Exit(ExitSetupFailed)
}
process, err := os.StartProcess(
path,
os.Args,
attr,
)
2017-11-14 18:26:28 +01:00
if err != nil {
logger.Errorf("Failed to daemonize: %v", err)
2017-11-17 14:36:08 +01:00
os.Exit(ExitSetupFailed)
2017-11-14 18:26:28 +01:00
}
2018-05-03 14:50:57 +02:00
process.Release()
2017-11-14 18:26:28 +01:00
return
}
2019-03-03 04:04:41 +01:00
device := device.NewDevice(tun, logger)
2017-11-17 14:36:08 +01:00
logger.Verbosef("Device started")
2017-08-01 12:14:38 +02:00
errs := make(chan error)
term := make(chan os.Signal, 1)
2019-03-03 04:04:41 +01:00
uapi, err := ipc.UAPIListen(interfaceName, fileUAPI)
if err != nil {
logger.Errorf("Failed to listen on uapi socket: %v", err)
os.Exit(ExitSetupFailed)
}
2017-11-17 14:36:08 +01:00
2017-07-17 16:16:18 +02:00
go func() {
for {
conn, err := uapi.Accept()
if err != nil {
2017-08-01 12:14:38 +02:00
errs <- err
return
2017-07-17 16:16:18 +02:00
}
2019-03-03 04:04:41 +01:00
go device.IpcHandle(conn)
}
2017-07-17 16:16:18 +02:00
}()
logger.Verbosef("UAPI listener started")
2017-08-01 12:14:38 +02:00
// wait for program to terminate
signal.Notify(term, syscall.SIGTERM)
2017-08-01 12:14:38 +02:00
signal.Notify(term, os.Interrupt)
select {
case <-term:
case <-errs:
2017-12-01 23:37:26 +01:00
case <-device.Wait():
2017-08-01 12:14:38 +02:00
}
2017-11-17 14:36:08 +01:00
// clean up
2017-08-01 12:14:38 +02:00
uapi.Close()
2017-11-17 14:36:08 +01:00
device.Close()
2017-08-01 12:14:38 +02:00
logger.Verbosef("Shutting down")
}