mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-07 16:54:16 +01:00
877ad97a96
* feature: replace RegisterPeer with Login method that does both - registration and login * test: add management login test * feature: add WiretrusteeConfig to the Login response to configure peer global config * feature: add client peer login support * fix: missing parts * chore: update go deps * feature: support Management Service gRPC endpoints [CLIENT] * feature: finalize client sync with management * fix: management store peer key lower case restore * fix: management returns peer ip without a mask * refactor: remove cmd pkg * fix: invalid tun interface name on mac * fix: timeout when calling management client * fix: tests and lint errors * fix: golang-test workflow * fix: client service tests * fix: iface build * feature: detect management scheme on startup * chore: better logs for management * fix: goreleaser * fix: lint errors * fix: signal TLS * fix: direct Wireguard connection * chore: verbose logging on direct connection
238 lines
5.2 KiB
Go
238 lines
5.2 KiB
Go
package iface
|
|
|
|
import (
|
|
log "github.com/sirupsen/logrus"
|
|
"golang.zx2c4.com/wireguard/conn"
|
|
"golang.zx2c4.com/wireguard/device"
|
|
"golang.zx2c4.com/wireguard/tun"
|
|
"golang.zx2c4.com/wireguard/wgctrl"
|
|
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
|
|
"net"
|
|
"time"
|
|
)
|
|
|
|
const (
|
|
defaultMTU = 1280
|
|
WgPort = 51820
|
|
)
|
|
|
|
var tunIface tun.Device
|
|
|
|
// CreateWithUserspace Creates a new Wireguard interface, using wireguard-go userspace implementation
|
|
func CreateWithUserspace(iface string, address string) error {
|
|
var err error
|
|
tunIface, err = tun.CreateTUN(iface, defaultMTU)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// We need to create a wireguard-go device and listen to configuration requests
|
|
tunDevice := device.NewDevice(tunIface, conn.NewDefaultBind(), device.NewLogger(device.LogLevelSilent, "[wiretrustee] "))
|
|
err = tunDevice.Up()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
uapi, err := getUAPI(iface)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
go func() {
|
|
for {
|
|
uapiConn, err := uapi.Accept()
|
|
if err != nil {
|
|
log.Debugln("uapi Accept failed with error: ", err)
|
|
continue
|
|
}
|
|
go tunDevice.IpcHandle(uapiConn)
|
|
}
|
|
}()
|
|
|
|
log.Debugln("UAPI listener started")
|
|
|
|
err = assignAddr(address, iface)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// configure peer for the wireguard device
|
|
func configureDevice(iface string, config wgtypes.Config) error {
|
|
wg, err := wgctrl.New()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer wg.Close()
|
|
|
|
_, err = wg.Device(iface)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Debugf("got Wireguard device %s", iface)
|
|
|
|
return wg.ConfigureDevice(iface, config)
|
|
}
|
|
|
|
// Exists checks whether specified Wireguard device exists or not
|
|
func Exists(iface string) (*bool, error) {
|
|
wg, err := wgctrl.New()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer wg.Close()
|
|
|
|
devices, err := wg.Devices()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var exists bool
|
|
for _, d := range devices {
|
|
if d.Name == iface {
|
|
exists = true
|
|
return &exists, nil
|
|
}
|
|
}
|
|
exists = false
|
|
return &exists, nil
|
|
}
|
|
|
|
// Configure configures a Wireguard interface
|
|
// The interface must exist before calling this method (e.g. call interface.Create() before)
|
|
func Configure(iface string, privateKey string) error {
|
|
|
|
log.Debugf("configuring Wireguard interface %s", iface)
|
|
|
|
log.Debugf("adding Wireguard private key")
|
|
key, err := wgtypes.ParseKey(privateKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
fwmark := 0
|
|
p := WgPort
|
|
config := wgtypes.Config{
|
|
PrivateKey: &key,
|
|
ReplacePeers: false,
|
|
FirewallMark: &fwmark,
|
|
ListenPort: &p,
|
|
}
|
|
|
|
return configureDevice(iface, config)
|
|
}
|
|
|
|
// GetListenPort returns the listening port of the Wireguard endpoint
|
|
func GetListenPort(iface string) (*int, error) {
|
|
log.Debugf("getting Wireguard listen port of interface %s", iface)
|
|
|
|
//discover Wireguard current configuration
|
|
wg, err := wgctrl.New()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer wg.Close()
|
|
|
|
d, err := wg.Device(iface)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
log.Debugf("got Wireguard device listen port %s, %d", iface, d.ListenPort)
|
|
|
|
return &d.ListenPort, nil
|
|
}
|
|
|
|
// UpdatePeer updates existing Wireguard Peer or creates a new one if doesn't exist
|
|
// Endpoint is optional
|
|
func UpdatePeer(iface string, peerKey string, allowedIps string, keepAlive time.Duration, endpoint string) error {
|
|
|
|
log.Debugf("updating interface %s peer %s: endpoint %s ", iface, peerKey, endpoint)
|
|
|
|
//parse allowed ips
|
|
_, ipNet, err := net.ParseCIDR(allowedIps)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
peerKeyParsed, err := wgtypes.ParseKey(peerKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
peer := wgtypes.PeerConfig{
|
|
PublicKey: peerKeyParsed,
|
|
ReplaceAllowedIPs: true,
|
|
AllowedIPs: []net.IPNet{*ipNet},
|
|
PersistentKeepaliveInterval: &keepAlive,
|
|
}
|
|
|
|
config := wgtypes.Config{
|
|
Peers: []wgtypes.PeerConfig{peer},
|
|
}
|
|
|
|
err = configureDevice(iface, config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if endpoint != "" {
|
|
return UpdatePeerEndpoint(iface, peerKey, endpoint)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// UpdatePeerEndpoint updates a Wireguard interface Peer with the new endpoint
|
|
// Used when NAT hole punching was successful and an update of the remote peer endpoint is required
|
|
func UpdatePeerEndpoint(iface string, peerKey string, newEndpoint string) error {
|
|
|
|
log.Debugf("updating peer %s endpoint %s ", peerKey, newEndpoint)
|
|
|
|
peerAddr, err := net.ResolveUDPAddr("udp4", newEndpoint)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
log.Debugf("parsed peer endpoint [%s]", peerAddr.String())
|
|
|
|
peerKeyParsed, err := wgtypes.ParseKey(peerKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
peer := wgtypes.PeerConfig{
|
|
PublicKey: peerKeyParsed,
|
|
ReplaceAllowedIPs: false,
|
|
UpdateOnly: true,
|
|
Endpoint: peerAddr,
|
|
}
|
|
config := wgtypes.Config{
|
|
Peers: []wgtypes.PeerConfig{peer},
|
|
}
|
|
return configureDevice(iface, config)
|
|
}
|
|
|
|
// RemovePeer removes a Wireguard Peer from the interface iface
|
|
func RemovePeer(iface string, peerKey string) error {
|
|
log.Debugf("Removing peer %s from interface %s ", peerKey, iface)
|
|
|
|
peerKeyParsed, err := wgtypes.ParseKey(peerKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
peer := wgtypes.PeerConfig{
|
|
PublicKey: peerKeyParsed,
|
|
Remove: true,
|
|
}
|
|
|
|
config := wgtypes.Config{
|
|
Peers: []wgtypes.PeerConfig{peer},
|
|
}
|
|
|
|
return configureDevice(iface, config)
|
|
}
|
|
|
|
// Closes the User Space tunnel interface
|
|
func CloseWithUserspace() error {
|
|
return tunIface.Close()
|
|
}
|