//go:build !windows package main import ( "encoding/json" "flag" "fmt" "net" "os" "os/exec" "os/signal" "regexp" "runtime" "strconv" "syscall" "time" "github.com/fosrl/newt/logger" "github.com/fosrl/olm/httpserver" "github.com/fosrl/olm/peermonitor" "github.com/fosrl/olm/websocket" "github.com/vishvananda/netlink" "golang.org/x/sys/unix" "golang.zx2c4.com/wireguard/device" "golang.zx2c4.com/wireguard/ipc" "golang.zx2c4.com/wireguard/tun" "golang.zx2c4.com/wireguard/wgctrl/wgtypes" ) // ConfigureInterface configures a network interface with an IP address and brings it up func ConfigureInterface(interfaceName string, wgData WgData) error { var ipAddr string = wgData.TunnelIP // Parse the IP address and network ip, ipNet, err := net.ParseCIDR(ipAddr) if err != nil { return fmt.Errorf("invalid IP address: %v", err) } switch runtime.GOOS { case "linux": return configureLinux(interfaceName, ip, ipNet) case "darwin": return configureDarwin(interfaceName, ip, ipNet, wgData.TunnelIP) // TODO: is tunnelip correct here? I think it has to do with the route addition in macos default: return fmt.Errorf("unsupported operating system: %s", runtime.GOOS) } } func findUnusedUTUN() (string, error) { ifaces, err := net.Interfaces() if err != nil { return "", fmt.Errorf("failed to list interfaces: %v", err) } used := make(map[int]bool) re := regexp.MustCompile(`^utun(\d+)$`) for _, iface := range ifaces { if matches := re.FindStringSubmatch(iface.Name); len(matches) == 2 { if num, err := strconv.Atoi(matches[1]); err == nil { used[num] = true } } } // Try utun0 up to utun255. for i := 0; i < 256; i++ { if !used[i] { return fmt.Sprintf("utun%d", i), nil } } return "", fmt.Errorf("no unused utun interface found") } func configureDarwin(interfaceName string, ip net.IP, ipNet *net.IPNet, destIp string) error { logger.Info("Configuring darwin interface: %s", interfaceName) _, cidr := ipNet.Mask.Size() ipStr := fmt.Sprintf("%s/%d", ip.String(), cidr) cmd := exec.Command("ifconfig", interfaceName, ipStr, destIp, "up") // print the command used logger.Info("Running command: %v", cmd) out, err := cmd.CombinedOutput() if err != nil { return fmt.Errorf("ifconfig command failed: %v, output: %s", err, out) } return nil } func configureLinux(interfaceName string, ip net.IP, ipNet *net.IPNet) error { // Get the interface link, err := netlink.LinkByName(interfaceName) if err != nil { return fmt.Errorf("failed to get interface %s: %v", interfaceName, err) } // Create the IP address attributes addr := &netlink.Addr{ IPNet: &net.IPNet{ IP: ip, Mask: ipNet.Mask, }, } // Add the IP address to the interface if err := netlink.AddrAdd(link, addr); err != nil { return fmt.Errorf("failed to add IP address: %v", err) } // Bring up the interface if err := netlink.LinkSetUp(link); err != nil { return fmt.Errorf("failed to bring up interface: %v", err) } return nil } func main() { var ( endpoint string id string secret string mtu string mtuInt int dns string privateKey wgtypes.Key err error logLevel string interfaceName string enableHTTP bool httpAddr string ) stopHolepunch = make(chan struct{}) stopRegister = make(chan struct{}) stopPing = make(chan struct{}) // if PANGOLIN_ENDPOINT, OLM_ID, and OLM_SECRET are set as environment variables, they will be used as default values endpoint = os.Getenv("PANGOLIN_ENDPOINT") id = os.Getenv("OLM_ID") secret = os.Getenv("OLM_SECRET") mtu = os.Getenv("MTU") dns = os.Getenv("DNS") logLevel = os.Getenv("LOG_LEVEL") interfaceName = os.Getenv("INTERFACE") httpAddr = os.Getenv("HTTP_ADDR") if endpoint == "" { flag.StringVar(&endpoint, "endpoint", "", "Endpoint of your Pangolin server") } if id == "" { flag.StringVar(&id, "id", "", "Olm ID") } if secret == "" { flag.StringVar(&secret, "secret", "", "Olm secret") } if mtu == "" { flag.StringVar(&mtu, "mtu", "1280", "MTU to use") } if dns == "" { flag.StringVar(&dns, "dns", "8.8.8.8", "DNS server to use") } if logLevel == "" { flag.StringVar(&logLevel, "log-level", "INFO", "Log level (DEBUG, INFO, WARN, ERROR, FATAL)") } if interfaceName == "" { flag.StringVar(&interfaceName, "interface", "olm", "Name of the WireGuard interface") } if httpAddr == "" { flag.StringVar(&httpAddr, "http-addr", ":9452", "HTTP server address (e.g., ':9452')") } flag.BoolVar(&enableHTTP, "http", false, "Enable HTTP server") // do a --version check version := flag.Bool("version", false, "Print the version") flag.Parse() if *version { fmt.Println("Olm version replaceme") os.Exit(0) } logger.Init() loggerLevel := parseLogLevel(logLevel) logger.GetLogger().SetLevel(parseLogLevel(logLevel)) var httpServer *httpserver.HTTPServer if enableHTTP { httpServer = httpserver.NewHTTPServer(httpAddr) if err := httpServer.Start(); err != nil { logger.Fatal("Failed to start HTTP server: %v", err) } // Use a goroutine to handle connection requests go func() { for req := range httpServer.GetConnectionChannel() { logger.Info("Received connection request via HTTP: id=%s, endpoint=%s", req.ID, req.Endpoint) // Set the connection parameters id = req.ID secret = req.Secret endpoint = req.Endpoint } }() } // wait until we have a client id and secret and endpoint for id == "" || secret == "" || endpoint == "" { logger.Debug("Waiting for client ID, secret, and endpoint...") time.Sleep(1 * time.Second) } // parse the mtu string into an int mtuInt, err = strconv.Atoi(mtu) if err != nil { logger.Fatal("Failed to parse MTU: %v", err) } privateKey, err = wgtypes.GeneratePrivateKey() if err != nil { logger.Fatal("Failed to generate private key: %v", err) } // Create a new olm olm, err := websocket.NewClient( id, // CLI arg takes precedence secret, // CLI arg takes precedence endpoint, ) if err != nil { logger.Fatal("Failed to create olm: %v", err) } // Create TUN device and network stack var dev *device.Device var wgData WgData var holePunchData HolePunchData var uapi *os.File var tdev tun.Device sourcePort, err := FindAvailableUDPPort(49152, 65535) if err != nil { fmt.Printf("Error finding available port: %v\n", err) os.Exit(1) } olm.RegisterHandler("olm/wg/holepunch", func(msg websocket.WSMessage) { logger.Info("Received message: %v", msg.Data) jsonData, err := json.Marshal(msg.Data) if err != nil { logger.Info("Error marshaling data: %v", err) return } if err := json.Unmarshal(jsonData, &holePunchData); err != nil { logger.Info("Error unmarshaling target data: %v", err) return } gerbilServerPubKey = holePunchData.ServerPubKey }) connectTimes := 0 // Register handlers for different message types olm.RegisterHandler("olm/wg/connect", func(msg websocket.WSMessage) { logger.Info("Received message: %v", msg.Data) if connectTimes > 0 { logger.Info("Already connected. Ignoring new connection request.") return } connectTimes++ close(stopRegister) // if there is an existing tunnel then close it if dev != nil { logger.Info("Got new message. Closing existing tunnel!") dev.Close() } jsonData, err := json.Marshal(msg.Data) if err != nil { logger.Info("Error marshaling data: %v", err) return } if err := json.Unmarshal(jsonData, &wgData); err != nil { logger.Info("Error unmarshaling target data: %v", err) return } // NEED TO DETERMINE AVAILABLE TUN DEVICE HERE tdev, err = func() (tun.Device, error) { tunFdStr := os.Getenv(ENV_WG_TUN_FD) // if on macOS, call findUnusedUTUN to get a new utun device if runtime.GOOS == "darwin" { interfaceName, err := findUnusedUTUN() if err != nil { return nil, err } return tun.CreateTUN(interfaceName, mtuInt) } if tunFdStr == "" { return tun.CreateTUN(interfaceName, mtuInt) } // construct tun device from supplied fd fd, err := strconv.ParseUint(tunFdStr, 10, 32) if err != nil { return nil, err } err = unix.SetNonblock(int(fd), true) if err != nil { return nil, err } file := os.NewFile(uintptr(fd), "") return tun.CreateTUNFromFile(file, mtuInt) }() if err != nil { logger.Error("Failed to create TUN device: %v", err) return } realInterfaceName, err2 := tdev.Name() if err2 == nil { interfaceName = realInterfaceName } // open UAPI file (or use supplied fd) fileUAPI, err := func() (*os.File, error) { uapiFdStr := os.Getenv(ENV_WG_UAPI_FD) if uapiFdStr == "" { return ipc.UAPIOpen(interfaceName) } // use supplied fd fd, err := strconv.ParseUint(uapiFdStr, 10, 32) if err != nil { return nil, err } return os.NewFile(uintptr(fd), ""), nil }() if err != nil { logger.Error("UAPI listen error: %v", err) os.Exit(1) return } dev = device.NewDevice(tdev, NewFixedPortBind(uint16(sourcePort)), device.NewLogger( mapToWireGuardLogLevel(loggerLevel), "wireguard: ", )) errs := make(chan error) uapi, err := ipc.UAPIListen(interfaceName, fileUAPI) if err != nil { logger.Error("Failed to listen on uapi socket: %v", err) os.Exit(1) } go func() { for { conn, err := uapi.Accept() if err != nil { errs <- err return } go dev.IpcHandle(conn) } }() logger.Info("UAPI listener started") peerMonitor = peermonitor.NewPeerMonitor( func(siteID int, connected bool, rtt time.Duration) { if httpServer != nil { httpServer.UpdatePeerStatus(siteID, connected, rtt) } if connected { logger.Info("Peer %d is now connected (RTT: %v)", siteID, rtt) } else { logger.Warn("Peer %d is disconnected", siteID) } }, fixKey(privateKey.String()), olm, dev, ) // loop over the sites and call ConfigurePeer for each one for _, site := range wgData.Sites { if httpServer != nil { httpServer.UpdatePeerStatus(site.SiteId, false, 0) } err = ConfigurePeer(dev, site, privateKey, endpoint) if err != nil { logger.Error("Failed to configure peer: %v", err) return } logger.Info("Configured peer %s", site.PublicKey) } // Bring up the device err = dev.Up() if err != nil { logger.Error("Failed to bring up WireGuard device: %v", err) } // configure the interface err = ConfigureInterface(realInterfaceName, wgData) if err != nil { logger.Error("Failed to configure interface: %v", err) } close(stopHolepunch) peerMonitor.Start() logger.Info("WireGuard device created.") }) olm.RegisterHandler("olm/wg/peer/update", func(msg websocket.WSMessage) { logger.Info("Received update-peer message: %v", msg.Data) jsonData, err := json.Marshal(msg.Data) if err != nil { logger.Error("Error marshaling data: %v", err) return } var updateData UpdatePeerData if err := json.Unmarshal(jsonData, &updateData); err != nil { logger.Error("Error unmarshaling update data: %v", err) return } // Convert to SiteConfig siteConfig := SiteConfig{ SiteId: updateData.SiteId, Endpoint: updateData.Endpoint, PublicKey: updateData.PublicKey, ServerIP: updateData.ServerIP, ServerPort: updateData.ServerPort, } // Update the peer in WireGuard if dev != nil { if err := ConfigurePeer(dev, siteConfig, privateKey, endpoint); err != nil { logger.Error("Failed to update peer: %v", err) // Send error response if needed return } // Update successful logger.Info("Successfully updated peer for site %d", updateData.SiteId) // If this is part of a WgData structure, update it for i, site := range wgData.Sites { if site.SiteId == updateData.SiteId { wgData.Sites[i] = siteConfig break } } } else { logger.Error("WireGuard device not initialized") } }) // Handler for adding a new peer olm.RegisterHandler("olm/wg/peer/add", func(msg websocket.WSMessage) { logger.Info("Received add-peer message: %v", msg.Data) jsonData, err := json.Marshal(msg.Data) if err != nil { logger.Error("Error marshaling data: %v", err) return } var addData AddPeerData if err := json.Unmarshal(jsonData, &addData); err != nil { logger.Error("Error unmarshaling add data: %v", err) return } // Convert to SiteConfig siteConfig := SiteConfig{ SiteId: addData.SiteId, Endpoint: addData.Endpoint, PublicKey: addData.PublicKey, ServerIP: addData.ServerIP, ServerPort: addData.ServerPort, } // Add the peer to WireGuard if dev != nil { if err := ConfigurePeer(dev, siteConfig, privateKey, endpoint); err != nil { logger.Error("Failed to add peer: %v", err) return } // Add successful logger.Info("Successfully added peer for site %d", addData.SiteId) // Update WgData with the new peer wgData.Sites = append(wgData.Sites, siteConfig) } else { logger.Error("WireGuard device not initialized") } }) // Handler for removing a peer olm.RegisterHandler("olm/wg/peer/remove", func(msg websocket.WSMessage) { logger.Info("Received remove-peer message: %v", msg.Data) jsonData, err := json.Marshal(msg.Data) if err != nil { logger.Error("Error marshaling data: %v", err) return } var removeData RemovePeerData if err := json.Unmarshal(jsonData, &removeData); err != nil { logger.Error("Error unmarshaling remove data: %v", err) return } // Find the peer to remove var peerToRemove *SiteConfig var newSites []SiteConfig for _, site := range wgData.Sites { if site.SiteId == removeData.SiteId { peerToRemove = &site } else { newSites = append(newSites, site) } } if peerToRemove == nil { logger.Error("Peer with site ID %d not found", removeData.SiteId) return } // Remove the peer from WireGuard if dev != nil { if err := RemovePeer(dev, removeData.SiteId, peerToRemove.PublicKey); err != nil { logger.Error("Failed to remove peer: %v", err) // Send error response if needed return } // Remove successful logger.Info("Successfully removed peer for site %d", removeData.SiteId) // Update WgData to remove the peer wgData.Sites = newSites } else { logger.Error("WireGuard device not initialized") } }) olm.RegisterHandler("olm/terminate", func(msg websocket.WSMessage) { logger.Info("Received terminate message") olm.Close() }) olm.OnConnect(func() error { publicKey := privateKey.PublicKey() logger.Debug("Public key: %s", publicKey) go keepSendingRegistration(olm, publicKey.String()) go keepSendingPing(olm) if httpServer != nil { httpServer.SetConnectionStatus(true) } logger.Info("Sent registration message") return nil }) olm.OnTokenUpdate(func(token string) { olmToken = token }) // Connect to the WebSocket server if err := olm.Connect(); err != nil { logger.Fatal("Failed to connect to server: %v", err) } defer olm.Close() go keepSendingUDPHolePunch(endpoint, id, sourcePort) // Wait for interrupt signal sigCh := make(chan os.Signal, 1) signal.Notify(sigCh, syscall.SIGINT, syscall.SIGTERM) <-sigCh select { case <-stopHolepunch: // Channel already closed, do nothing default: close(stopHolepunch) } select { case <-stopRegister: // Channel already closed default: close(stopRegister) } select { case <-stopPing: // Channel already closed default: close(stopPing) } uapi.Close() dev.Close() }