2019-07-10 20:59:43 +00:00
|
|
|
/*
|
|
|
|
Copyright (c) 2019 @crosbymichael
|
|
|
|
|
|
|
|
Permission is hereby granted, free of charge, to any person
|
|
|
|
obtaining a copy of this software and associated documentation
|
|
|
|
files (the "Software"), to deal in the Software without
|
|
|
|
restriction, including without limitation the rights to use, copy,
|
|
|
|
modify, merge, publish, distribute, sublicense, and/or sell copies
|
|
|
|
of the Software, and to permit persons to whom the Software is
|
|
|
|
furnished to do so, subject to the following conditions:
|
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be
|
|
|
|
included in all copies or substantial portions of the Software.
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
EXPRESS OR IMPLIED,
|
|
|
|
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
|
|
|
|
HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
|
|
DAMAGES OR OTHER LIABILITY,
|
|
|
|
WHETHER IN AN ACTION OF CONTRACT,
|
|
|
|
TORT OR OTHERWISE,
|
|
|
|
ARISING FROM, OUT OF OR IN CONNECTION WITH
|
|
|
|
THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2019-07-11 11:46:36 +00:00
|
|
|
"io"
|
2019-07-10 21:10:24 +00:00
|
|
|
"io/ioutil"
|
2019-07-11 11:46:36 +00:00
|
|
|
"net"
|
2019-07-10 20:59:43 +00:00
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"path/filepath"
|
2019-07-10 21:10:24 +00:00
|
|
|
"strings"
|
2019-07-10 20:59:43 +00:00
|
|
|
|
|
|
|
v1 "github.com/crosbymichael/guard/api/v1"
|
|
|
|
"github.com/gogo/protobuf/types"
|
|
|
|
"github.com/pkg/errors"
|
2019-07-11 12:06:54 +00:00
|
|
|
"github.com/sirupsen/logrus"
|
2019-07-10 20:59:43 +00:00
|
|
|
)
|
|
|
|
|
2019-07-11 12:06:54 +00:00
|
|
|
var (
|
|
|
|
empty = &types.Empty{}
|
|
|
|
ErrTunnelExists = errors.New("tunnel exists")
|
|
|
|
)
|
2019-07-10 20:59:43 +00:00
|
|
|
|
2019-07-10 21:35:46 +00:00
|
|
|
const (
|
|
|
|
defaultWireguardDir = "/etc/wireguard"
|
|
|
|
tunnelData = "tunnel.json"
|
2019-07-11 12:06:54 +00:00
|
|
|
guardTunnel = "guard0"
|
2019-07-10 21:35:46 +00:00
|
|
|
)
|
2019-07-10 20:59:43 +00:00
|
|
|
|
|
|
|
func newServer(dir string) (*server, error) {
|
|
|
|
if err := os.MkdirAll(defaultWireguardDir, 0700); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "create wireguard dir")
|
|
|
|
}
|
|
|
|
return &server{
|
|
|
|
dir: dir,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type server struct {
|
|
|
|
dir string
|
|
|
|
}
|
|
|
|
|
2019-07-10 21:35:46 +00:00
|
|
|
func (s *server) Create(ctx context.Context, r *v1.CreateRequest) (*v1.TunnelResponse, error) {
|
2019-07-10 20:59:43 +00:00
|
|
|
if r.ID == "" {
|
|
|
|
return nil, errors.New("tunnel id cannot be empty")
|
|
|
|
}
|
|
|
|
if r.Address == "" {
|
|
|
|
return nil, errors.New("address cannot be empty")
|
|
|
|
}
|
2019-07-11 11:46:36 +00:00
|
|
|
if r.Endpoint == "" {
|
|
|
|
return nil, errors.New("endpoint cannot be empty")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log := logrus.WithField("tunnel", r.ID)
|
2019-07-11 11:46:36 +00:00
|
|
|
host, port, err := net.SplitHostPort(r.Endpoint)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "cannot split endpoint into host and port")
|
2019-07-10 20:59:43 +00:00
|
|
|
}
|
|
|
|
path := filepath.Join(s.dir, r.ID)
|
|
|
|
if err := os.Mkdir(path, 0700); err != nil {
|
|
|
|
if os.IsExist(err) {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.Error("existing tunnel")
|
|
|
|
return nil, ErrTunnelExists
|
2019-07-10 20:59:43 +00:00
|
|
|
}
|
|
|
|
return nil, errors.Wrap(err, "create tunnel directory")
|
|
|
|
}
|
|
|
|
key, err := newPrivateKey(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-07-11 11:46:36 +00:00
|
|
|
pub, err := publicKey(ctx, key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-07-10 20:59:43 +00:00
|
|
|
t := v1.Tunnel{
|
|
|
|
ID: r.ID,
|
2019-07-11 11:46:36 +00:00
|
|
|
ListenPort: port,
|
2019-07-10 20:59:43 +00:00
|
|
|
Address: r.Address,
|
|
|
|
PrivateKey: key,
|
2019-07-11 11:46:36 +00:00
|
|
|
PublicKey: pub,
|
|
|
|
Endpoint: host,
|
2019-07-10 20:59:43 +00:00
|
|
|
}
|
2019-07-10 21:35:46 +00:00
|
|
|
if err := s.saveTunnel(&t); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("save tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := s.saveConf(&t); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("save config")
|
2019-07-10 20:59:43 +00:00
|
|
|
os.RemoveAll(path)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := wgquick(ctx, "enable", t.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("enable tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return nil, errors.Wrap(err, "enable tunnel")
|
|
|
|
}
|
|
|
|
if err := wgquick(ctx, "start", t.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("start tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return nil, errors.Wrap(err, "start tunnel")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log.Info("tunnel created")
|
2019-07-11 12:35:24 +00:00
|
|
|
|
|
|
|
clearTunnel(&t)
|
2019-07-10 21:35:46 +00:00
|
|
|
return &v1.TunnelResponse{
|
2019-07-10 20:59:43 +00:00
|
|
|
Tunnel: &t,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2019-07-11 11:46:36 +00:00
|
|
|
func (s *server) NewPeer(ctx context.Context, r *v1.NewPeerRequest) (*v1.PeerResponse, error) {
|
|
|
|
if r.ID == "" {
|
|
|
|
return nil, errors.New("tunnel id cannot be empty")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log := logrus.WithFields(logrus.Fields{
|
|
|
|
"tunnel": r.ID,
|
|
|
|
"peer": r.PeerID,
|
|
|
|
})
|
2019-07-11 11:46:36 +00:00
|
|
|
t, err := s.loadTunnel(r.ID)
|
|
|
|
if err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("load tunnel")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
peerKey, err := newPrivateKey(ctx)
|
|
|
|
if err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("new private key")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
publicKey, err := publicKey(ctx, peerKey)
|
|
|
|
if err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("new public key")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
peer := &v1.Peer{
|
|
|
|
ID: r.PeerID,
|
|
|
|
PublicKey: publicKey,
|
|
|
|
PrivateKey: peerKey,
|
|
|
|
AllowedIPs: []string{
|
|
|
|
r.Address,
|
|
|
|
},
|
|
|
|
}
|
2019-07-11 12:35:24 +00:00
|
|
|
peerCopy := *peer
|
|
|
|
t.Peers = append(t.Peers, &peerCopy)
|
2019-07-11 12:06:54 +00:00
|
|
|
// TODO: make atomic swaps
|
2019-07-11 11:46:36 +00:00
|
|
|
if err := s.saveTunnel(t); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("save tunnel")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := s.saveConf(t); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("save config")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := wgquick(ctx, "restart", t.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("restart config")
|
2019-07-11 11:46:36 +00:00
|
|
|
return nil, errors.Wrap(err, "restart tunnel")
|
|
|
|
}
|
2019-07-11 12:35:24 +00:00
|
|
|
clearTunnel(t)
|
2019-07-11 11:46:36 +00:00
|
|
|
return &v1.PeerResponse{
|
|
|
|
Tunnel: t,
|
|
|
|
Peer: peer,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2019-07-10 21:35:46 +00:00
|
|
|
func (s *server) DeletePeer(ctx context.Context, r *v1.DeletePeerRequest) (*v1.TunnelResponse, error) {
|
|
|
|
if r.ID == "" {
|
|
|
|
return nil, errors.New("tunnel id cannot be empty")
|
|
|
|
}
|
|
|
|
if r.PeerID == "" {
|
|
|
|
return nil, errors.New("peer id cannot be empty")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log := logrus.WithFields(logrus.Fields{
|
|
|
|
"tunnel": r.ID,
|
|
|
|
"peer": r.PeerID,
|
|
|
|
})
|
|
|
|
|
2019-07-10 21:35:46 +00:00
|
|
|
t, err := s.loadTunnel(r.ID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
var peers []*v1.Peer
|
|
|
|
for _, p := range t.Peers {
|
|
|
|
if p.ID != r.PeerID {
|
|
|
|
peers = append(peers, p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
t.Peers = peers
|
|
|
|
if err := s.saveTunnel(t); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := s.saveConf(t); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := wgquick(ctx, "restart", t.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("restart config")
|
2019-07-10 21:35:46 +00:00
|
|
|
return nil, errors.Wrap(err, "restart tunnel")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log.Info("delete peer")
|
2019-07-11 12:35:24 +00:00
|
|
|
clearTunnel(t)
|
2019-07-10 21:35:46 +00:00
|
|
|
return &v1.TunnelResponse{
|
|
|
|
Tunnel: t,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2019-07-10 20:59:43 +00:00
|
|
|
func (s *server) Delete(ctx context.Context, r *v1.DeleteRequest) (*types.Empty, error) {
|
|
|
|
if r.ID == "" {
|
|
|
|
return nil, errors.New("tunnel id cannot be empty")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log := logrus.WithField("tunnel", r.ID)
|
2019-07-10 20:59:43 +00:00
|
|
|
path := filepath.Join(s.dir, r.ID)
|
|
|
|
if err := wgquick(ctx, "disable", r.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("disable tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return nil, errors.Wrap(err, "disable tunnel")
|
|
|
|
}
|
|
|
|
if err := wgquick(ctx, "stop", r.ID); err != nil {
|
2019-07-11 12:06:54 +00:00
|
|
|
log.WithError(err).Error("stop tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return nil, errors.Wrap(err, "stop tunnel")
|
|
|
|
}
|
|
|
|
if err := os.RemoveAll(path); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "remove data path")
|
|
|
|
}
|
|
|
|
if err := os.Remove(filepath.Join(s.dir, fmt.Sprintf("%s.conf", r.ID))); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "remove configuration")
|
|
|
|
}
|
2019-07-11 12:06:54 +00:00
|
|
|
log.Info("delete tunnel")
|
2019-07-10 20:59:43 +00:00
|
|
|
return empty, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *server) List(ctx context.Context, _ *types.Empty) (*v1.ListResponse, error) {
|
2019-07-10 21:10:24 +00:00
|
|
|
fi, err := ioutil.ReadDir(s.dir)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "read config dir")
|
|
|
|
}
|
|
|
|
var r v1.ListResponse
|
|
|
|
for _, f := range fi {
|
|
|
|
if !f.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
2019-07-11 12:24:24 +00:00
|
|
|
if f.Name() == guardTunnel {
|
|
|
|
continue
|
|
|
|
}
|
2019-07-10 21:35:46 +00:00
|
|
|
t, err := s.loadTunnel(f.Name())
|
2019-07-10 21:10:24 +00:00
|
|
|
if err != nil {
|
2019-07-10 21:35:46 +00:00
|
|
|
return nil, err
|
2019-07-10 21:10:24 +00:00
|
|
|
}
|
2019-07-11 12:35:24 +00:00
|
|
|
clearTunnel(t)
|
2019-07-10 21:35:46 +00:00
|
|
|
r.Tunnels = append(r.Tunnels, t)
|
2019-07-10 21:10:24 +00:00
|
|
|
}
|
|
|
|
return &r, nil
|
2019-07-10 20:59:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *server) saveConf(t *v1.Tunnel) error {
|
|
|
|
path := filepath.Join(s.dir, fmt.Sprintf("%s.conf", t.ID))
|
|
|
|
f, err := os.OpenFile(path, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "create tunnel conf %s", path)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
if err := t.Render(f); err != nil {
|
|
|
|
return errors.Wrap(err, "render tunnel to config")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-10 21:35:46 +00:00
|
|
|
func (s *server) loadTunnel(id string) (*v1.Tunnel, error) {
|
|
|
|
data, err := ioutil.ReadFile(filepath.Join(s.dir, id, tunnelData))
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "read %s", id)
|
|
|
|
}
|
|
|
|
var t v1.Tunnel
|
|
|
|
if err := json.Unmarshal(data, &t); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "unmarshal tunnel")
|
|
|
|
}
|
|
|
|
return &t, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *server) saveTunnel(t *v1.Tunnel) error {
|
|
|
|
path := filepath.Join(s.dir, t.ID, tunnelData)
|
2019-07-10 20:59:43 +00:00
|
|
|
f, err := os.OpenFile(path, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "create data.json")
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
if err := json.NewEncoder(f).Encode(t); err != nil {
|
|
|
|
return errors.Wrap(err, "encode tunnel")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newPrivateKey(ctx context.Context) (string, error) {
|
|
|
|
data, err := wireguard(ctx, "genkey")
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrapf(err, "%s", data)
|
|
|
|
}
|
2019-07-10 21:10:24 +00:00
|
|
|
return strings.TrimSuffix(string(data), "\n"), nil
|
2019-07-10 20:59:43 +00:00
|
|
|
}
|
|
|
|
|
2019-07-11 11:46:36 +00:00
|
|
|
func publicKey(ctx context.Context, privateKey string) (string, error) {
|
|
|
|
r := strings.NewReader(privateKey)
|
|
|
|
data, err := wireguardData(ctx, r, "pubkey")
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrapf(err, "%s", data)
|
|
|
|
}
|
|
|
|
return strings.TrimSuffix(string(data), "\n"), nil
|
|
|
|
}
|
|
|
|
|
2019-07-11 12:35:24 +00:00
|
|
|
func clearTunnel(t *v1.Tunnel) {
|
|
|
|
t.PrivateKey = ""
|
|
|
|
for _, p := range t.Peers {
|
|
|
|
p.PrivateKey = ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-10 20:59:43 +00:00
|
|
|
func wireguard(ctx context.Context, args ...string) ([]byte, error) {
|
|
|
|
cmd := exec.CommandContext(ctx, "wg", args...)
|
|
|
|
return cmd.CombinedOutput()
|
|
|
|
}
|
|
|
|
|
2019-07-11 11:46:36 +00:00
|
|
|
func wireguardData(ctx context.Context, r io.Reader, args ...string) ([]byte, error) {
|
|
|
|
cmd := exec.CommandContext(ctx, "wg", args...)
|
|
|
|
cmd.Stdin = r
|
|
|
|
return cmd.CombinedOutput()
|
|
|
|
}
|
|
|
|
|
2019-07-10 20:59:43 +00:00
|
|
|
func wgquick(ctx context.Context, action, name string) error {
|
|
|
|
cmd := exec.CommandContext(ctx, "systemctl", action, fmt.Sprintf("wg-quick@%s", name))
|
|
|
|
out, err := cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "%s", out)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|