2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2021-01-29 20:16:36 +00:00
|
|
|
|
|
|
|
package wgcfg
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net"
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
"net/netip"
|
2021-01-29 20:16:36 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
|
2021-07-13 19:48:39 +01:00
|
|
|
"go4.org/mem"
|
2021-10-28 01:42:33 +01:00
|
|
|
"tailscale.com/types/key"
|
2021-01-29 20:16:36 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type ParseError struct {
|
|
|
|
why string
|
|
|
|
offender string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *ParseError) Error() string {
|
2021-01-30 19:17:55 +00:00
|
|
|
return fmt.Sprintf("%s: %q", e.why, e.offender)
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func parseEndpoint(s string) (host string, port uint16, err error) {
|
|
|
|
i := strings.LastIndexByte(s, ':')
|
|
|
|
if i < 0 {
|
|
|
|
return "", 0, &ParseError{"Missing port from endpoint", s}
|
|
|
|
}
|
|
|
|
host, portStr := s[:i], s[i+1:]
|
|
|
|
if len(host) < 1 {
|
|
|
|
return "", 0, &ParseError{"Invalid endpoint host", host}
|
|
|
|
}
|
|
|
|
uport, err := strconv.ParseUint(portStr, 10, 16)
|
|
|
|
if err != nil {
|
|
|
|
return "", 0, err
|
|
|
|
}
|
|
|
|
hostColon := strings.IndexByte(host, ':')
|
|
|
|
if host[0] == '[' || host[len(host)-1] == ']' || hostColon > 0 {
|
|
|
|
err := &ParseError{"Brackets must contain an IPv6 address", host}
|
|
|
|
if len(host) > 3 && host[0] == '[' && host[len(host)-1] == ']' && hostColon > 0 {
|
|
|
|
maybeV6 := net.ParseIP(host[1 : len(host)-1])
|
|
|
|
if maybeV6 == nil || len(maybeV6) != net.IPv6len {
|
|
|
|
return "", 0, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return "", 0, err
|
|
|
|
}
|
|
|
|
host = host[1 : len(host)-1]
|
|
|
|
}
|
|
|
|
return host, uint16(uport), nil
|
|
|
|
}
|
|
|
|
|
2021-07-13 19:48:39 +01:00
|
|
|
// memROCut separates a mem.RO at the separator if it exists, otherwise
|
|
|
|
// it returns two empty ROs and reports that it was not found.
|
|
|
|
func memROCut(s mem.RO, sep byte) (before, after mem.RO, found bool) {
|
|
|
|
if i := mem.IndexByte(s, sep); i >= 0 {
|
|
|
|
return s.SliceTo(i), s.SliceFrom(i + 1), true
|
2021-07-13 18:12:47 +01:00
|
|
|
}
|
2021-07-13 19:48:39 +01:00
|
|
|
found = false
|
|
|
|
return
|
2021-07-13 18:12:47 +01:00
|
|
|
}
|
|
|
|
|
2021-01-29 20:16:36 +00:00
|
|
|
// FromUAPI generates a Config from r.
|
|
|
|
// r should be generated by calling device.IpcGetOperation;
|
|
|
|
// it is not compatible with other uapi streams.
|
|
|
|
func FromUAPI(r io.Reader) (*Config, error) {
|
|
|
|
cfg := new(Config)
|
|
|
|
var peer *Peer // current peer being operated on
|
|
|
|
deviceConfig := true
|
|
|
|
|
|
|
|
scanner := bufio.NewScanner(r)
|
|
|
|
for scanner.Scan() {
|
2021-07-13 19:48:39 +01:00
|
|
|
line := mem.B(scanner.Bytes())
|
|
|
|
if line.Len() == 0 {
|
2021-01-29 20:16:36 +00:00
|
|
|
continue
|
|
|
|
}
|
2021-07-13 19:48:39 +01:00
|
|
|
key, value, ok := memROCut(line, '=')
|
2021-07-13 18:12:47 +01:00
|
|
|
if !ok {
|
2021-07-13 19:48:39 +01:00
|
|
|
return nil, fmt.Errorf("failed to cut line %q on =", line.StringCopy())
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
2021-07-13 19:48:39 +01:00
|
|
|
valueBytes := scanner.Bytes()[key.Len()+1:]
|
2021-01-29 20:16:36 +00:00
|
|
|
|
2021-07-13 19:48:39 +01:00
|
|
|
if key.EqualString("public_key") {
|
2021-01-29 20:16:36 +00:00
|
|
|
if deviceConfig {
|
|
|
|
deviceConfig = false
|
|
|
|
}
|
|
|
|
// Load/create the peer we are now configuring.
|
|
|
|
var err error
|
2021-07-13 19:48:39 +01:00
|
|
|
peer, err = cfg.handlePublicKeyLine(valueBytes)
|
2021-01-29 20:16:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
if deviceConfig {
|
2021-07-13 19:48:39 +01:00
|
|
|
err = cfg.handleDeviceLine(key, value, valueBytes)
|
2021-01-29 20:16:36 +00:00
|
|
|
} else {
|
2021-05-01 00:45:36 +01:00
|
|
|
err = cfg.handlePeerLine(peer, key, value, valueBytes)
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := scanner.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return cfg, nil
|
|
|
|
}
|
|
|
|
|
2021-10-28 01:42:33 +01:00
|
|
|
func (cfg *Config) handleDeviceLine(k, value mem.RO, valueBytes []byte) error {
|
2021-07-13 19:48:39 +01:00
|
|
|
switch {
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("private_key"):
|
2021-07-13 19:48:39 +01:00
|
|
|
// wireguard-go guarantees not to send zero value; private keys are already clamped.
|
2021-10-28 01:42:33 +01:00
|
|
|
var err error
|
|
|
|
cfg.PrivateKey, err = key.ParseNodePrivateUntyped(value)
|
|
|
|
if err != nil {
|
2021-01-29 20:16:36 +00:00
|
|
|
return err
|
|
|
|
}
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("listen_port") || k.EqualString("fwmark"):
|
2021-07-13 19:48:39 +01:00
|
|
|
// ignore
|
2021-01-29 20:16:36 +00:00
|
|
|
default:
|
2021-10-28 01:42:33 +01:00
|
|
|
return fmt.Errorf("unexpected IpcGetOperation key: %q", k.StringCopy())
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-07-13 19:48:39 +01:00
|
|
|
func (cfg *Config) handlePublicKeyLine(valueBytes []byte) (*Peer, error) {
|
|
|
|
p := Peer{}
|
2021-10-28 01:42:33 +01:00
|
|
|
var err error
|
|
|
|
p.PublicKey, err = key.ParseNodePublicUntyped(mem.B(valueBytes))
|
|
|
|
if err != nil {
|
2021-01-29 20:16:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-07-13 19:48:39 +01:00
|
|
|
cfg.Peers = append(cfg.Peers, p)
|
|
|
|
return &cfg.Peers[len(cfg.Peers)-1], nil
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
|
|
|
|
2021-10-28 01:42:33 +01:00
|
|
|
func (cfg *Config) handlePeerLine(peer *Peer, k, value mem.RO, valueBytes []byte) error {
|
2021-07-13 19:48:39 +01:00
|
|
|
switch {
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("endpoint"):
|
|
|
|
nk, err := key.ParseNodePublicUntyped(value)
|
2021-09-01 06:37:23 +01:00
|
|
|
if err != nil {
|
2021-10-28 01:42:33 +01:00
|
|
|
return fmt.Errorf("invalid endpoint %q for peer %q, expected a hex public key", value.StringCopy(), peer.PublicKey.ShortString())
|
2021-09-01 06:37:23 +01:00
|
|
|
}
|
2021-11-11 02:42:16 +00:00
|
|
|
// nk ought to equal peer.PublicKey.
|
|
|
|
// Under some rare circumstances, it might not. See corp issue #3016.
|
|
|
|
// Even if that happens, don't stop early, so that we can recover from it.
|
|
|
|
// Instead, note the value of nk so we can fix as needed.
|
|
|
|
peer.WGEndpoint = nk
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("persistent_keepalive_interval"):
|
2021-07-13 19:48:39 +01:00
|
|
|
n, err := mem.ParseUint(value, 10, 16)
|
2021-01-29 20:16:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
peer.PersistentKeepalive = uint16(n)
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("allowed_ip"):
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
ipp := netip.Prefix{}
|
2021-07-13 19:48:39 +01:00
|
|
|
err := ipp.UnmarshalText(valueBytes)
|
2021-01-29 20:16:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
peer.AllowedIPs = append(peer.AllowedIPs, ipp)
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("protocol_version"):
|
2021-07-13 19:48:39 +01:00
|
|
|
if !value.EqualString("1") {
|
|
|
|
return fmt.Errorf("invalid protocol version: %q", value.StringCopy())
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
2021-10-28 01:42:33 +01:00
|
|
|
case k.EqualString("replace_allowed_ips") ||
|
|
|
|
k.EqualString("preshared_key") ||
|
|
|
|
k.EqualString("last_handshake_time_sec") ||
|
|
|
|
k.EqualString("last_handshake_time_nsec") ||
|
|
|
|
k.EqualString("tx_bytes") ||
|
|
|
|
k.EqualString("rx_bytes"):
|
2021-07-13 19:48:39 +01:00
|
|
|
// ignore
|
2021-01-29 20:16:36 +00:00
|
|
|
default:
|
2021-10-28 01:42:33 +01:00
|
|
|
return fmt.Errorf("unexpected IpcGetOperation key: %q", k.StringCopy())
|
2021-01-29 20:16:36 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|