// Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Package wgcfg has types and a parser for representing WireGuard config. package wgcfg import ( "inet.af/netaddr" ) // EndpointDiscoSuffix is appended to the hex representation of a peer's discovery key // and is then the sole wireguard endpoint for peers with a non-zero discovery key. // This form is then recognize by magicsock's CreateEndpoint. const EndpointDiscoSuffix = ".disco.tailscale:12345" // Config is a WireGuard configuration. // It only supports the set of things Tailscale uses. type Config struct { Name string PrivateKey PrivateKey Addresses []netaddr.IPPrefix MTU uint16 DNS []netaddr.IP Peers []Peer } type Peer struct { PublicKey Key AllowedIPs []netaddr.IPPrefix Endpoints string // comma-separated host/port pairs: "1.2.3.4:56,[::]:80" PersistentKeepalive uint16 } // Copy makes a deep copy of Config. // The result aliases no memory with the original. func (cfg Config) Copy() Config { res := cfg if res.Addresses != nil { res.Addresses = append([]netaddr.IPPrefix{}, res.Addresses...) } if res.DNS != nil { res.DNS = append([]netaddr.IP{}, res.DNS...) } peers := make([]Peer, 0, len(res.Peers)) for _, peer := range res.Peers { peers = append(peers, peer.Copy()) } res.Peers = peers return res } // Copy makes a deep copy of Peer. // The result aliases no memory with the original. func (peer Peer) Copy() Peer { res := peer if res.AllowedIPs != nil { res.AllowedIPs = append([]netaddr.IPPrefix{}, res.AllowedIPs...) } return res } // PeerWithKey returns the Peer with key k and reports whether it was found. func (config Config) PeerWithKey(k Key) (Peer, bool) { for _, p := range config.Peers { if p.PublicKey == k { return p, true } } return Peer{}, false }