mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-19 21:43:03 +00:00
0ac7da2fc8
* feat: wireguard inbound * feat(command): generate wireguard compatible keypair * feat(wireguard): connection idle timeout * fix(wireguard): close endpoint after connection closed * fix(wireguard): resolve conflicts * feat(wireguard): set cubic as default cc algorithm in gVisor TUN * chore(wireguard): resolve conflict * chore(wireguard): remove redurant code * chore(wireguard): remove redurant code * feat: rework server for gvisor tun * feat: keep user-space tun as an option * fix: exclude android from native tun build * feat: auto kernel tun * fix: build * fix: regulate function name & fix test
112 lines
2.7 KiB
Go
112 lines
2.7 KiB
Go
package wireguard
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/netip"
|
|
"strings"
|
|
|
|
"github.com/xtls/xray-core/common"
|
|
"github.com/xtls/xray-core/common/log"
|
|
"golang.zx2c4.com/wireguard/device"
|
|
)
|
|
|
|
//go:generate go run github.com/xtls/xray-core/common/errors/errorgen
|
|
|
|
var wgLogger = &device.Logger{
|
|
Verbosef: func(format string, args ...any) {
|
|
log.Record(&log.GeneralMessage{
|
|
Severity: log.Severity_Debug,
|
|
Content: fmt.Sprintf(format, args...),
|
|
})
|
|
},
|
|
Errorf: func(format string, args ...any) {
|
|
log.Record(&log.GeneralMessage{
|
|
Severity: log.Severity_Error,
|
|
Content: fmt.Sprintf(format, args...),
|
|
})
|
|
},
|
|
}
|
|
|
|
func init() {
|
|
common.Must(common.RegisterConfig((*DeviceConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
|
deviceConfig := config.(*DeviceConfig)
|
|
if deviceConfig.IsClient {
|
|
return New(ctx, deviceConfig)
|
|
} else {
|
|
return NewServer(ctx, deviceConfig)
|
|
}
|
|
}))
|
|
}
|
|
|
|
// convert endpoint string to netip.Addr
|
|
func parseEndpoints(conf *DeviceConfig) ([]netip.Addr, bool, bool, error) {
|
|
var hasIPv4, hasIPv6 bool
|
|
|
|
endpoints := make([]netip.Addr, len(conf.Endpoint))
|
|
for i, str := range conf.Endpoint {
|
|
var addr netip.Addr
|
|
if strings.Contains(str, "/") {
|
|
prefix, err := netip.ParsePrefix(str)
|
|
if err != nil {
|
|
return nil, false, false, err
|
|
}
|
|
addr = prefix.Addr()
|
|
if prefix.Bits() != addr.BitLen() {
|
|
return nil, false, false, newError("interface address subnet should be /32 for IPv4 and /128 for IPv6")
|
|
}
|
|
} else {
|
|
var err error
|
|
addr, err = netip.ParseAddr(str)
|
|
if err != nil {
|
|
return nil, false, false, err
|
|
}
|
|
}
|
|
endpoints[i] = addr
|
|
|
|
if addr.Is4() {
|
|
hasIPv4 = true
|
|
} else if addr.Is6() {
|
|
hasIPv6 = true
|
|
}
|
|
}
|
|
|
|
return endpoints, hasIPv4, hasIPv6, nil
|
|
}
|
|
|
|
// serialize the config into an IPC request
|
|
func createIPCRequest(conf *DeviceConfig) string {
|
|
var request strings.Builder
|
|
|
|
request.WriteString(fmt.Sprintf("private_key=%s\n", conf.SecretKey))
|
|
|
|
if !conf.IsClient {
|
|
// placeholder, we'll handle actual port listening on Xray
|
|
request.WriteString("listen_port=1337\n")
|
|
}
|
|
|
|
for _, peer := range conf.Peers {
|
|
if peer.PublicKey != "" {
|
|
request.WriteString(fmt.Sprintf("public_key=%s\n", peer.PublicKey))
|
|
}
|
|
|
|
if peer.PreSharedKey != "" {
|
|
request.WriteString(fmt.Sprintf("preshared_key=%s\n", peer.PreSharedKey))
|
|
}
|
|
|
|
if peer.Endpoint != "" {
|
|
request.WriteString(fmt.Sprintf("endpoint=%s\n", peer.Endpoint))
|
|
}
|
|
|
|
for _, ip := range peer.AllowedIps {
|
|
request.WriteString(fmt.Sprintf("allowed_ip=%s\n", ip))
|
|
}
|
|
|
|
if peer.KeepAlive != 0 {
|
|
request.WriteString(fmt.Sprintf("persistent_keepalive_interval=%d\n", peer.KeepAlive))
|
|
}
|
|
}
|
|
|
|
return request.String()[:request.Len()]
|
|
}
|