mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-27 01:11:14 +00:00
b956f6bd13
As announced on the mailing list, WireGuard will be in Linux 5.6. As a
result, the wg(8) tool, used by OpenWRT in the same manner as ip(8), is
moving to its own wireguard-tools repo. Meanwhile, the out-of-tree
kernel module for kernels 3.10 - 5.5 moved to its own wireguard-linux-
compat repo. Yesterday, releases were cut out of these repos, so this
commit bumps packages to match. Since wg(8) and the compat kernel module
are versioned and released separately, we create a wireguard-tools
Makefile to contain the source for the new tools repo. Later, when
OpenWRT moves permanently to Linux 5.6, we'll drop the original module
package, leaving only the tools. So this commit shuffles the build
definition around a bit but is basically the same idea as before.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
(cherry picked from commit ea980fb9c6
)
186 lines
4.3 KiB
Bash
186 lines
4.3 KiB
Bash
#!/bin/sh
|
|
# Copyright 2016-2017 Dan Luedtke <mail@danrl.com>
|
|
# Licensed to the public under the Apache License 2.0.
|
|
|
|
WG=/usr/bin/wg
|
|
if [ ! -x $WG ]; then
|
|
logger -t "wireguard" "error: missing wireguard-tools (${WG})"
|
|
exit 0
|
|
fi
|
|
|
|
[ -n "$INCLUDE_ONLY" ] || {
|
|
. /lib/functions.sh
|
|
. ../netifd-proto.sh
|
|
init_proto "$@"
|
|
}
|
|
|
|
proto_wireguard_init_config() {
|
|
proto_config_add_string "private_key"
|
|
proto_config_add_int "listen_port"
|
|
proto_config_add_int "mtu"
|
|
proto_config_add_string "fwmark"
|
|
available=1
|
|
no_proto_task=1
|
|
}
|
|
|
|
proto_wireguard_setup_peer() {
|
|
local peer_config="$1"
|
|
|
|
local public_key
|
|
local preshared_key
|
|
local allowed_ips
|
|
local route_allowed_ips
|
|
local endpoint_host
|
|
local endpoint_port
|
|
local persistent_keepalive
|
|
|
|
config_get public_key "${peer_config}" "public_key"
|
|
config_get preshared_key "${peer_config}" "preshared_key"
|
|
config_get allowed_ips "${peer_config}" "allowed_ips"
|
|
config_get_bool route_allowed_ips "${peer_config}" "route_allowed_ips" 0
|
|
config_get endpoint_host "${peer_config}" "endpoint_host"
|
|
config_get endpoint_port "${peer_config}" "endpoint_port"
|
|
config_get persistent_keepalive "${peer_config}" "persistent_keepalive"
|
|
|
|
echo "[Peer]" >> "${wg_cfg}"
|
|
echo "PublicKey=${public_key}" >> "${wg_cfg}"
|
|
if [ "${preshared_key}" ]; then
|
|
echo "PresharedKey=${preshared_key}" >> "${wg_cfg}"
|
|
fi
|
|
for allowed_ip in $allowed_ips; do
|
|
echo "AllowedIPs=${allowed_ip}" >> "${wg_cfg}"
|
|
done
|
|
if [ "${endpoint_host}" ]; then
|
|
case "${endpoint_host}" in
|
|
*:*)
|
|
endpoint="[${endpoint_host}]"
|
|
;;
|
|
*)
|
|
endpoint="${endpoint_host}"
|
|
;;
|
|
esac
|
|
if [ "${endpoint_port}" ]; then
|
|
endpoint="${endpoint}:${endpoint_port}"
|
|
else
|
|
endpoint="${endpoint}:51820"
|
|
fi
|
|
echo "Endpoint=${endpoint}" >> "${wg_cfg}"
|
|
fi
|
|
if [ "${persistent_keepalive}" ]; then
|
|
echo "PersistentKeepalive=${persistent_keepalive}" >> "${wg_cfg}"
|
|
fi
|
|
|
|
if [ ${route_allowed_ips} -ne 0 ]; then
|
|
for allowed_ip in ${allowed_ips}; do
|
|
case "${allowed_ip}" in
|
|
*:*/*)
|
|
proto_add_ipv6_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
|
;;
|
|
*.*/*)
|
|
proto_add_ipv4_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
|
;;
|
|
*:*)
|
|
proto_add_ipv6_route "${allowed_ip%%/*}" "128"
|
|
;;
|
|
*.*)
|
|
proto_add_ipv4_route "${allowed_ip%%/*}" "32"
|
|
;;
|
|
esac
|
|
done
|
|
fi
|
|
}
|
|
|
|
proto_wireguard_setup() {
|
|
local config="$1"
|
|
local wg_dir="/tmp/wireguard"
|
|
local wg_cfg="${wg_dir}/${config}"
|
|
|
|
local private_key
|
|
local listen_port
|
|
local mtu
|
|
|
|
config_load network
|
|
config_get private_key "${config}" "private_key"
|
|
config_get listen_port "${config}" "listen_port"
|
|
config_get addresses "${config}" "addresses"
|
|
config_get mtu "${config}" "mtu"
|
|
config_get fwmark "${config}" "fwmark"
|
|
config_get ip6prefix "${config}" "ip6prefix"
|
|
config_get nohostroute "${config}" "nohostroute"
|
|
|
|
ip link del dev "${config}" 2>/dev/null
|
|
ip link add dev "${config}" type wireguard
|
|
|
|
if [ "${mtu}" ]; then
|
|
ip link set mtu "${mtu}" dev "${config}"
|
|
fi
|
|
|
|
proto_init_update "${config}" 1
|
|
|
|
umask 077
|
|
mkdir -p "${wg_dir}"
|
|
echo "[Interface]" > "${wg_cfg}"
|
|
echo "PrivateKey=${private_key}" >> "${wg_cfg}"
|
|
if [ "${listen_port}" ]; then
|
|
echo "ListenPort=${listen_port}" >> "${wg_cfg}"
|
|
fi
|
|
if [ "${fwmark}" ]; then
|
|
echo "FwMark=${fwmark}" >> "${wg_cfg}"
|
|
fi
|
|
config_foreach proto_wireguard_setup_peer "wireguard_${config}"
|
|
|
|
# apply configuration file
|
|
${WG} setconf ${config} "${wg_cfg}"
|
|
WG_RETURN=$?
|
|
|
|
rm -f "${wg_cfg}"
|
|
|
|
if [ ${WG_RETURN} -ne 0 ]; then
|
|
sleep 5
|
|
proto_setup_failed "${config}"
|
|
exit 1
|
|
fi
|
|
|
|
for address in ${addresses}; do
|
|
case "${address}" in
|
|
*:*/*)
|
|
proto_add_ipv6_address "${address%%/*}" "${address##*/}"
|
|
;;
|
|
*.*/*)
|
|
proto_add_ipv4_address "${address%%/*}" "${address##*/}"
|
|
;;
|
|
*:*)
|
|
proto_add_ipv6_address "${address%%/*}" "128"
|
|
;;
|
|
*.*)
|
|
proto_add_ipv4_address "${address%%/*}" "32"
|
|
;;
|
|
esac
|
|
done
|
|
|
|
for prefix in ${ip6prefix}; do
|
|
proto_add_ipv6_prefix "$prefix"
|
|
done
|
|
|
|
# endpoint dependency
|
|
if [ "${nohostroute}" != "1" ]; then
|
|
wg show "${config}" endpoints | \
|
|
sed -E 's/\[?([0-9.:a-f]+)\]?:([0-9]+)/\1 \2/' | \
|
|
while IFS=$'\t ' read -r key address port; do
|
|
[ -n "${port}" ] || continue
|
|
proto_add_host_dependency "${config}" "${address}"
|
|
done
|
|
fi
|
|
|
|
proto_send_update "${config}"
|
|
}
|
|
|
|
proto_wireguard_teardown() {
|
|
local config="$1"
|
|
ip link del dev "${config}" >/dev/null 2>&1
|
|
}
|
|
|
|
[ -n "$INCLUDE_ONLY" ] || {
|
|
add_protocol wireguard
|
|
}
|