|
@@ -6,7 +6,6 @@ import (
|
|
"log"
|
|
"log"
|
|
"os"
|
|
"os"
|
|
"os/exec"
|
|
"os/exec"
|
|
- "reflect"
|
|
|
|
"runtime"
|
|
"runtime"
|
|
"strconv"
|
|
"strconv"
|
|
"strings"
|
|
"strings"
|
|
@@ -47,7 +46,6 @@ func SetPeers(iface string, keepalive int32, peers []wgtypes.PeerConfig) error {
|
|
ncutils.PrintLog("no peers pulled", 1)
|
|
ncutils.PrintLog("no peers pulled", 1)
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
-PEERS:
|
|
|
|
for _, peer := range peers {
|
|
for _, peer := range peers {
|
|
|
|
|
|
for _, currentPeer := range devicePeers {
|
|
for _, currentPeer := range devicePeers {
|
|
@@ -57,13 +55,7 @@ PEERS:
|
|
if err != nil {
|
|
if err != nil {
|
|
log.Println("error removing peer", peer.Endpoint.String())
|
|
log.Println("error removing peer", peer.Endpoint.String())
|
|
}
|
|
}
|
|
- } else if currentPeer.PublicKey.String() == peer.PublicKey.String() &&
|
|
|
|
- currentPeer.Endpoint.String() == peer.Endpoint.String() &&
|
|
|
|
- reflect.DeepEqual(currentPeer.AllowedIPs, peer.AllowedIPs) {
|
|
|
|
-
|
|
|
|
- continue PEERS
|
|
|
|
}
|
|
}
|
|
-
|
|
|
|
}
|
|
}
|
|
udpendpoint := peer.Endpoint.String()
|
|
udpendpoint := peer.Endpoint.String()
|
|
var allowedips string
|
|
var allowedips string
|
|
@@ -110,7 +102,7 @@ PEERS:
|
|
}
|
|
}
|
|
|
|
|
|
// Initializes a WireGuard interface
|
|
// Initializes a WireGuard interface
|
|
-func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig, hasGateway bool, gateways []string) error {
|
|
|
|
|
|
+func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig, hasGateway bool, gateways []string, syncconf bool) error {
|
|
|
|
|
|
key, err := wgtypes.ParseKey(privkey)
|
|
key, err := wgtypes.ParseKey(privkey)
|
|
if err != nil {
|
|
if err != nil {
|
|
@@ -126,7 +118,8 @@ func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
- fwmark := modcfg.FWMark
|
|
|
|
|
|
+ fwmarkint32 := modcfg.FWMark
|
|
|
|
+ fwmarkint := int(fwmarkint32)
|
|
nodecfg := modcfg.Node
|
|
nodecfg := modcfg.Node
|
|
servercfg := modcfg.Server
|
|
servercfg := modcfg.Server
|
|
|
|
|
|
@@ -174,6 +167,7 @@ func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig
|
|
conf = wgtypes.Config{
|
|
conf = wgtypes.Config{
|
|
PrivateKey: &key,
|
|
PrivateKey: &key,
|
|
ListenPort: &nodeport,
|
|
ListenPort: &nodeport,
|
|
|
|
+ FirewallMark: &fwmarkint,
|
|
ReplacePeers: true,
|
|
ReplacePeers: true,
|
|
Peers: peers,
|
|
Peers: peers,
|
|
}
|
|
}
|
|
@@ -181,9 +175,9 @@ func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig
|
|
if !ncutils.IsKernel() {
|
|
if !ncutils.IsKernel() {
|
|
var newConf string
|
|
var newConf string
|
|
if node.UDPHolePunch != "yes" {
|
|
if node.UDPHolePunch != "yes" {
|
|
- newConf, _ = ncutils.CreateUserSpaceConf(node.Address, key.String(), strconv.FormatInt(int64(node.ListenPort), 10), node.MTU, fwmark, node.PersistentKeepalive, peers)
|
|
|
|
|
|
+ newConf, _ = ncutils.CreateUserSpaceConf(node.Address, key.String(), strconv.FormatInt(int64(node.ListenPort), 10), node.MTU, fwmarkint32, node.PersistentKeepalive, peers)
|
|
} else {
|
|
} else {
|
|
- newConf, _ = ncutils.CreateUserSpaceConf(node.Address, key.String(), "", node.MTU, fwmark, node.PersistentKeepalive, peers)
|
|
|
|
|
|
+ newConf, _ = ncutils.CreateUserSpaceConf(node.Address, key.String(), "", node.MTU, fwmarkint32, node.PersistentKeepalive, peers)
|
|
}
|
|
}
|
|
confPath := ncutils.GetNetclientPathSpecific() + ifacename + ".conf"
|
|
confPath := ncutils.GetNetclientPathSpecific() + ifacename + ".conf"
|
|
ncutils.PrintLog("writing wg conf file to: "+confPath, 1)
|
|
ncutils.PrintLog("writing wg conf file to: "+confPath, 1)
|
|
@@ -200,16 +194,20 @@ func InitWireguard(node *models.Node, privkey string, peers []wgtypes.PeerConfig
|
|
deviceiface = ifacename
|
|
deviceiface = ifacename
|
|
}
|
|
}
|
|
}
|
|
}
|
|
- d, _ := wgclient.Device(deviceiface)
|
|
|
|
- for d != nil && d.Name == deviceiface {
|
|
|
|
- _ = RemoveConf(ifacename, false) // remove interface first
|
|
|
|
- time.Sleep(time.Second >> 2)
|
|
|
|
- d, _ = wgclient.Device(deviceiface)
|
|
|
|
- }
|
|
|
|
- err = ApplyConf(confPath)
|
|
|
|
- if err != nil {
|
|
|
|
- ncutils.PrintLog("failed to create wireguard interface", 1)
|
|
|
|
- return err
|
|
|
|
|
|
+ if syncconf {
|
|
|
|
+ err = wgclient.ConfigureDevice(deviceiface, conf)
|
|
|
|
+ } else {
|
|
|
|
+ d, _ := wgclient.Device(deviceiface)
|
|
|
|
+ for d != nil && d.Name == deviceiface {
|
|
|
|
+ _ = RemoveConf(ifacename, false) // remove interface first
|
|
|
|
+ time.Sleep(time.Second >> 2)
|
|
|
|
+ d, _ = wgclient.Device(deviceiface)
|
|
|
|
+ }
|
|
|
|
+ err = ApplyConf(confPath)
|
|
|
|
+ if err != nil {
|
|
|
|
+ ncutils.PrintLog("failed to create wireguard interface", 1)
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
}
|
|
}
|
|
} else {
|
|
} else {
|
|
ipExec, err := exec.LookPath("ip")
|
|
ipExec, err := exec.LookPath("ip")
|
|
@@ -293,7 +291,7 @@ func SetWGConfig(network string, peerupdate bool) error {
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
- if peerupdate {
|
|
|
|
|
|
+ if peerupdate && !ncutils.IsFreeBSD() {
|
|
var iface string
|
|
var iface string
|
|
iface = nodecfg.Interface
|
|
iface = nodecfg.Interface
|
|
if ncutils.IsMac() {
|
|
if ncutils.IsMac() {
|
|
@@ -303,8 +301,10 @@ func SetWGConfig(network string, peerupdate bool) error {
|
|
}
|
|
}
|
|
}
|
|
}
|
|
err = SetPeers(iface, nodecfg.PersistentKeepalive, peers)
|
|
err = SetPeers(iface, nodecfg.PersistentKeepalive, peers)
|
|
|
|
+ } else if peerupdate {
|
|
|
|
+ err = InitWireguard(&nodecfg, privkey, peers, hasGateway, gateways, true)
|
|
} else {
|
|
} else {
|
|
- err = InitWireguard(&nodecfg, privkey, peers, hasGateway, gateways)
|
|
|
|
|
|
+ err = InitWireguard(&nodecfg, privkey, peers, hasGateway, gateways, false)
|
|
}
|
|
}
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
@@ -335,3 +335,18 @@ func ApplyConf(confPath string) error {
|
|
}
|
|
}
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+// ApplyConf - applys a conf on disk to WireGuard interface
|
|
|
|
+func SyncConf(confPath string) error {
|
|
|
|
+ os := runtime.GOOS
|
|
|
|
+ var err error
|
|
|
|
+ switch os {
|
|
|
|
+ /*
|
|
|
|
+ case "windows":
|
|
|
|
+ _ = SyncWindowsConf(confPath)
|
|
|
|
+ */
|
|
|
|
+ default:
|
|
|
|
+ err = SyncWGQuickConf(confPath)
|
|
|
|
+ }
|
|
|
|
+ return err
|
|
|
|
+}
|