diff options
-rw-r--r-- | Android.mk | 6 | ||||
-rw-r--r-- | standalone/Makefile | 13 | ||||
-rw-r--r-- | standalone/bash/.gitignore | 2 | ||||
-rw-r--r-- | standalone/bash/Android.mk | 23 | ||||
-rwxr-xr-x | standalone/bash/fetch.sh | 14 | ||||
-rw-r--r-- | standalone/installer.sh | 17 | ||||
-rw-r--r-- | wg-quick.bash | 187 | ||||
-rw-r--r-- | wg-quick.c | 615 |
8 files changed, 625 insertions, 252 deletions
@@ -43,10 +43,10 @@ ALL_DEFAULT_INSTALLED_MODULES += wg include $(BUILD_EXECUTABLE) include $(CLEAR_VARS) +LOCAL_SRC_FILES := wg-quick.c +LOCAL_CFLAGS := -O3 -std=gnu11 -Wall -pedantic -Wno-missing-field-initializers -Wno-sign-compare LOCAL_MODULE := wg-quick LOCAL_MODULE_PATH := $(TARGET_OUT_OPTIONAL_EXECUTABLES) -LOCAL_SRC_FILES := wg-quick.bash -LOCAL_REQUIRED_MODULES := bash wg LOCAL_MODULE_CLASS := EXECUTABLES ALL_DEFAULT_INSTALLED_MODULES += wg-quick -include $(BUILD_PREBUILT) +include $(BUILD_EXECUTABLE) diff --git a/standalone/Makefile b/standalone/Makefile index 1a8f70f..1e49b07 100644 --- a/standalone/Makefile +++ b/standalone/Makefile @@ -9,20 +9,15 @@ all: wireguard-tools.zip clean: rm -rf build wireguard-tools.zip -wg-build: +wg-build: ../wg-quick.c ndk-build NDK_PROJECT_PATH=$(PWD)/build APP_BUILD_SCRIPT=$(PWD)/../Android.mk APP_PLATFORM=21 -bash-build: - ndk-build NDK_PROJECT_PATH=$(PWD)/build APP_BUILD_SCRIPT=$(PWD)/bash/Android.mk APP_PLATFORM=21 IN_THE_RIGHT_PLACE=yes-yes-i-am +$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg build/libs/$(ARCH)/wg-quick): wg-build -$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg): wg-build -$(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/libncurses.so build/libs/$(ARCH)/bash): bash-build - -wireguard-tools.zip: $(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/libncurses.so build/libs/$(ARCH)/bash build/libs/$(ARCH)/wg) installer.sh ../wg-quick.bash addonsd.sh +wireguard-tools.zip: $(foreach ARCH,$(ARCHS),build/libs/$(ARCH)/wg-quick build/libs/$(ARCH)/wg) installer.sh addonsd.sh rm -rf $@ build/zip build/*.zip - mkdir -p build/zip build/zip/addon.d build/zip/scripts build/zip/META-INF/com/google/android + mkdir -p build/zip build/zip/addon.d build/zip/META-INF/com/google/android ln -frs build/libs build/zip/arch - ln -frs ../wg-quick.bash build/zip/scripts/wg-quick ln -frs addonsd.sh build/zip/addon.d/40-wireguard.sh ln -frs installer.sh build/zip/META-INF/com/google/android/update-binary touch build/zip/META-INF/com/google/android/updater-script diff --git a/standalone/bash/.gitignore b/standalone/bash/.gitignore deleted file mode 100644 index 1993ef8..0000000 --- a/standalone/bash/.gitignore +++ /dev/null @@ -1,2 +0,0 @@ -android_external_bash-cm-14.1 -android_external_libncurses-cm-14.1 diff --git a/standalone/bash/Android.mk b/standalone/bash/Android.mk deleted file mode 100644 index 937e56c..0000000 --- a/standalone/bash/Android.mk +++ /dev/null @@ -1,23 +0,0 @@ -ifeq ($(IN_THE_RIGHT_PLACE),yes-yes-i-am) -THIS_DIR := $(call my-dir) - -# AOSP build system things: -define all-c-files-under -$(call all-named-files-under,*.c,$(1)) -endef -define all-named-files-under -$(call find-files-in-subdirs,$(LOCAL_PATH),"$(1)",$(2)) -endef -define find-files-in-subdirs -$(sort $(patsubst ./%,%, \ - $(shell cd $(1) ; \ - find -L $(3) -name $(2) -and -not -name ".*") \ - )) -endef - -$(shell cd $(THIS_DIR) && ./fetch.sh ) -include $(THIS_DIR)/android_external_libncurses-cm-14.1/Android.mk -include $(THIS_DIR)/android_external_bash-cm-14.1/Android.mk -__ndk_modules.bash.CFLAGS += -D'getdtablesize()=sysconf(_SC_OPEN_MAX)' -__ndk_modules.builtins.CFLAGS += -D'getdtablesize()=sysconf(_SC_OPEN_MAX)' -endif diff --git a/standalone/bash/fetch.sh b/standalone/bash/fetch.sh deleted file mode 100755 index b1b77e8..0000000 --- a/standalone/bash/fetch.sh +++ /dev/null @@ -1,14 +0,0 @@ -#!/bin/sh -set -e - -if [ ! -d android_external_bash-cm-14.1 ]; then - curl -L -o bash.zip https://github.com/LineageOS/android_external_bash/archive/cm-14.1.zip - unzip bash.zip - rm bash.zip -fi - -if [ ! -d android_external_libncurses-cm-14.1 ]; then - curl -L -o ncurses.zip https://github.com/LineageOS/android_external_libncurses/archive/cm-14.1.zip - unzip ncurses.zip - rm ncurses.zip -fi diff --git a/standalone/installer.sh b/standalone/installer.sh index 59a44f8..84dacdc 100644 --- a/standalone/installer.sh +++ b/standalone/installer.sh @@ -55,22 +55,11 @@ rm -rf /tmp/wireguard mkdir -p /tmp/wireguard print "Extracting files" unzip -d /tmp/wireguard "$ZIP" -[ -f /tmp/wireguard/arch/$ARCH/wg ] || die "Not available for device's ABI" -print "Copying WireGuard tools" -cp /tmp/wireguard/scripts/wg-quick /tmp/wireguard/arch/$(getprop ro.product.cpu.abi)/wg /system/xbin/ +[ -d /tmp/wireguard/arch/$ARCH ] || die "Not available for device's ABI" +print "Installing WireGuard tools" +cp /tmp/wireguard/arch/$(getprop ro.product.cpu.abi)/* /system/xbin/ cp /tmp/wireguard/addon.d/40-wireguard.sh /system/addon.d/ chmod 755 /system/xbin/wg /system/xbin/wg-quick /system/addon.d/40-wireguard.sh -if [ ! -f /system/xbin/bash ]; then - print "Installing bash" - cp /tmp/wireguard/arch/$ARCH/bash /system/xbin/ - chmod 755 /system/xbin/bash - if [ -d /system/lib64 -a ! -f /system/lib64/libncurses.so ]; then - cp /tmp/wireguard/arch/$ARCH/libncurses.so /system/lib64/ - elif [ ! -d /system/lib64 -a ! -f /system/lib/libncurses.so ]; then - cp /tmp/wireguard/arch/$ARCH/libncurses.so /system/lib/ - fi -fi - mkdir -pm 700 /data/misc/wireguard print "Success! Be sure your kernel has the WireGuard module enabled." diff --git a/wg-quick.bash b/wg-quick.bash deleted file mode 100644 index 164e553..0000000 --- a/wg-quick.bash +++ /dev/null @@ -1,187 +0,0 @@ -#!/system/xbin/bash -# SPDX-License-Identifier: GPL-2.0 -# -# Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. - -set -e -o pipefail -shopt -s extglob -export LC_ALL=C - -SELF="$(readlink -f "${BASH_SOURCE[0]}")" -export PATH="${SELF%/*}:$PATH" - -WG_CONFIG="" -INTERFACE="" -NETID=0 -ADDRESSES=( ) -MTU="" -DNS=( ) -CONFIG_FILE="" -PROGRAM="${0##*/}" -ARGS=( "$@" ) - -parse_options() { - local interface_section=0 line key value - CONFIG_FILE="$1" - [[ $CONFIG_FILE =~ ^[a-zA-Z0-9_=+.-]{1,16}$ ]] && CONFIG_FILE="/data/misc/wireguard/$CONFIG_FILE.conf" - [[ -e $CONFIG_FILE ]] || die "\`$CONFIG_FILE' does not exist" - [[ $CONFIG_FILE =~ /?([a-zA-Z0-9_=+.-]{1,16})\.conf$ ]] || die "The config file must be a valid interface name, followed by .conf" - ((($(stat -c '%#a' "$CONFIG_FILE") & 0007) == 0)) || echo "Warning: \`$CONFIG_FILE' is world accessible" >&2 - INTERFACE="${BASH_REMATCH[1]}" - shopt -s nocasematch - while read -r line || [[ -n $line ]]; do - key="${line%%=*}"; key="${key##*([[:space:]])}"; key="${key%%*([[:space:]])}" - value="${line#*=}"; value="${value##*([[:space:]])}"; value="${value%%*([[:space:]])}" - [[ $key == "["* ]] && interface_section=0 - [[ $key == "[Interface]" ]] && interface_section=1 - if [[ $interface_section -eq 1 ]]; then - case "$key" in - Address) ADDRESSES+=( ${value//,/ } ); continue ;; - MTU) MTU="$value"; continue ;; - DNS) DNS+=( ${value//,/ } ); continue ;; - esac - fi - WG_CONFIG+="$line"$'\n' - done < "$CONFIG_FILE" - shopt -u nocasematch -} - -cmd() { - echo "[#] $*" >&2 - "$@" -} - -cndc() { - local out="$(cmd ndc "$@")" - [[ $out == *200\ 0* ]] || { echo "$out"; return 1; } -} - -die() { - echo "$PROGRAM: $*" >&2 - exit 1 -} - -auto_su() { - [[ $UID == 0 ]] || exec su -p -c "'$SELF' ${ARGS[*]}" -} - -add_if() { - cmd ip link add "$INTERFACE" type wireguard -} - -del_if() { - cmd ip link del "$INTERFACE" - [[ $(ip rule show) =~ 0xc([0-9a-f]+)/0xcffff\ lookup\ $INTERFACE ]] && cndc network destroy $(( 0x${BASH_REMATCH[1]} )); -} - -up_if() { - while [[ $NETID -lt 4096 ]]; do - NETID="$RANDOM" - done - cmd wg set "$INTERFACE" fwmark 0x20000 - cndc interface setcfg "$INTERFACE" up - cndc network create "$NETID" vpn 1 1 - cndc network interface add "$NETID" "$INTERFACE" - cndc network users add "$NETID" 0-99999 -} - -set_dns() { - [[ ${#DNS[@]} -eq 0 ]] || cndc resolver setnetdns "$NETID" "" "${DNS[@]}" -} - -add_addr() { - if [[ $1 == *:* ]]; then - cndc interface ipv6 "$INTERFACE" enable - cmd ip -6 addr add "$1" dev "$INTERFACE" - else - local ip="${1%%/*}" mask=32 - [[ $1 == */* ]] && mask="${1##*/}" - cndc interface setcfg "$INTERFACE" "$ip" "$mask" - fi -} - -set_mtu() { - local mtu=0 endpoint output - if [[ -n $MTU ]]; then - cndc interface setmtu "$INTERFACE" "$MTU" - return - fi - while read -r _ endpoint; do - [[ $endpoint =~ ^\[?([a-z0-9:.]+)\]?:[0-9]+$ ]] || continue - output="$(ip route get "${BASH_REMATCH[1]}" || true)" - [[ ( $output =~ mtu\ ([0-9]+) || ( $output =~ dev\ ([^ ]+) && $(ip link show dev "${BASH_REMATCH[1]}") =~ mtu\ ([0-9]+) ) ) && ${BASH_REMATCH[1]} -gt $mtu ]] && mtu="${BASH_REMATCH[1]}" - done < <(wg show "$INTERFACE" endpoints) - if [[ $mtu -eq 0 ]]; then - read -r output < <(ip route show default || true) || true - [[ ( $output =~ mtu\ ([0-9]+) || ( $output =~ dev\ ([^ ]+) && $(ip link show dev "${BASH_REMATCH[1]}") =~ mtu\ ([0-9]+) ) ) && ${BASH_REMATCH[1]} -gt $mtu ]] && mtu="${BASH_REMATCH[1]}" - fi - [[ $mtu -gt 0 ]] || mtu=1500 - cndc interface setmtu "$INTERFACE" $(( mtu - 80 )) -} - -add_route() { - cndc network route add "$NETID" "$INTERFACE" "$1" -} - -set_config() { - cmd wg setconf "$INTERFACE" <(echo "$WG_CONFIG") -} - -cmd_usage() { - cat >&2 <<-_EOF - Usage: $PROGRAM [ up | down ] [ CONFIG_FILE | INTERFACE ] - - CONFIG_FILE is a configuration file, whose filename is the interface name - followed by \`.conf'. Otherwise, INTERFACE is an interface name, with - configuration found at /data/misc/wireguard/INTERFACE.conf. It is to be readable - by wg(8)'s \`setconf' sub-command, with the exception of the following additions - to the [Interface] section, which are handled by $PROGRAM: - - - Address: may be specified one or more times and contains one or more - IP addresses (with an optional CIDR mask) to be set for the interface. - - MTU: an optional MTU for the interface; if unspecified, auto-calculated. - - DNS: an optional DNS server to use while the device is up. - - See wg-quick(8) for more info and examples. - _EOF -} - -cmd_up() { - local i - [[ -z $(ip link show dev "$INTERFACE" 2>/dev/null) ]] || die "\`$INTERFACE' already exists" - trap 'del_if; exit' INT TERM EXIT - add_if - set_config - set_mtu - for i in "${ADDRESSES[@]}"; do - add_addr "$i" - done - up_if - set_dns - for i in $(while read -r _ i; do for i in $i; do [[ $i =~ ^[0-9a-z:.]+/[0-9]+$ ]] && echo "$i"; done; done < <(wg show "$INTERFACE" allowed-ips) | sort -nr -k 2 -t /); do - [[ $(ip route get "$i" 2>/dev/null) == *dev\ $INTERFACE\ * ]] || add_route "$i" - done - trap - INT TERM EXIT -} - -cmd_down() { - [[ " $(wg show interfaces) " == *" $INTERFACE "* ]] || die "\`$INTERFACE' is not a WireGuard interface" - del_if -} - -if [[ $# -eq 1 && ( $1 == --help || $1 == -h || $1 == help ) ]]; then - cmd_usage -elif [[ $# -eq 2 && $1 == up ]]; then - auto_su - parse_options "$2" - cmd_up -elif [[ $# -eq 2 && $1 == down ]]; then - auto_su - parse_options "$2" - cmd_down -else - cmd_usage - exit 1 -fi - -exit 0 diff --git a/wg-quick.c b/wg-quick.c new file mode 100644 index 0000000..0e3cb3d --- /dev/null +++ b/wg-quick.c @@ -0,0 +1,615 @@ +/* SPDX-License-Identifier: GPL-2.0 + * + * Copyright (C) 2015-2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. + * + * This is a shell script written in C. It very intentionally still functions like + * a shell script, calling out to external executables such as ip(8). + */ + +#include <stdlib.h> +#include <stdio.h> +#include <stdbool.h> +#include <string.h> +#include <strings.h> +#include <stdarg.h> +#include <ctype.h> +#include <time.h> +#include <unistd.h> +#include <errno.h> +#include <regex.h> +#include <sys/types.h> +#include <sys/stat.h> +#include <sys/param.h> + +#define _printf_(x, y) __attribute__((format(printf, x, y))) +#define _cleanup_(x) __attribute__((cleanup(x))) +#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0])) + +static bool is_exiting = false; + +static void *xmalloc(size_t size) +{ + void *ret = malloc(size); + if (ret) + return ret; + perror("Error: malloc"); + exit(errno); +} + +static void *xstrdup(const char *str) +{ + char *ret = strdup(str); + if (ret) + return ret; + perror("Error: strdup"); + exit(errno); +} + +static void xregcomp(regex_t *preg, const char *regex, int cflags) +{ + char error[4096]; + int ret; + + ret = regcomp(preg, regex, cflags); + if (!ret) + return; + regerror(ret, preg, error, sizeof(error)); + fprintf(stderr, "Error: Regex compilation error: %s\n", error); + exit(88); +} + +static char *concat(char *first, ...) +{ + va_list args; + size_t len = 0; + char *ret; + + va_start(args, first); + for (char *i = first; i; i = va_arg(args, char *)) + len += strlen(i); + va_end(args); + + ret = xmalloc(len + 1); + ret[0] = 0; + + va_start(args, first); + for (char *i = first; i; i = va_arg(args, char *)) + strcat(ret, i); + va_end(args); + + return ret; +} + +struct command_buffer { + char *line; + size_t len; + FILE *stream; +}; + +static void free_command_buffer(struct command_buffer *c) +{ + if (!c) + return; + if (c->stream) + pclose(c->stream); + free(c->line); +} + +static void freep(void *p) +{ + free(*(void **)p); +} +static void fclosep(FILE **f) +{ + if (*f) + fclose(*f); +} +#define _cleanup_free_ _cleanup_(freep) +#define _cleanup_fclose_ _cleanup_(fclosep) + +#define DEFINE_CMD(name) _cleanup_(free_command_buffer) struct command_buffer name = { 0 }; + +static char *vcmd_ret(struct command_buffer *c, const char *cmd_fmt, va_list args) +{ + char cmd[8192]; + + if (!c->stream && !cmd_fmt) + return NULL; + if (c->stream && cmd_fmt) + pclose(c->stream); + + if (cmd_fmt) { + if (vsnprintf(cmd, sizeof(cmd), cmd_fmt, args) >= sizeof(cmd)) { + errno = E2BIG; + perror("Error: vsnprintf"); + exit(errno); + } + + c->stream = popen(cmd, "r"); + if (!c->stream) { + perror("Error: popen"); + exit(errno); + } + } + if (getline(&c->line, &c->len, c->stream) < 0) { + if (errno) { + perror("Error: getline"); + exit(errno); + } + return NULL; + } + return c->line; +} + +_printf_(1, 2) static void cmd(const char *cmd_fmt, ...) +{ + char cmd[8192]; + va_list args; + int ret; + + va_start(args, cmd_fmt); + if (vsnprintf(cmd, sizeof(cmd), cmd_fmt, args) >= sizeof(cmd)) { + errno = E2BIG; + perror("Error: vsnprintf"); + exit(errno); + } + va_end(args); + + printf("[#] %s\n", cmd); + ret = system(cmd); + + if (ret && !is_exiting) + exit(ret); +} + +_printf_(2, 3) static char *cmd_ret(struct command_buffer *c, const char *cmd_fmt, ...) +{ + va_list args; + char *ret; + + va_start(args, cmd_fmt); + ret = vcmd_ret(c, cmd_fmt, args); + va_end(args); + return ret; +} + +_printf_(1, 2) static void cndc(const char *cmd_fmt, ...) +{ + DEFINE_CMD(c); + char *ret; + va_list args; + _cleanup_free_ char *ndc_fmt = concat("ndc ", cmd_fmt, NULL); + + va_start(args, cmd_fmt); + printf("[#] "); + vprintf(ndc_fmt, args); + printf("\n"); + va_end(args); + + va_start(args, cmd_fmt); + ret = vcmd_ret(&c, ndc_fmt, args); + va_end(args); + + if (!ret || !strstr(ret, "200 0")) { + if (ret) + fprintf(stderr, "Error: %s\n", ret); + exit(29); + } +} + +static void auto_su(int argc, char *argv[]) +{ + char *args[argc + 4]; + + if (!getuid()) + return; + + args[0] = "su"; + args[1] = "-p"; + args[2] = "-c"; + memcpy(&args[3], argv, argc * sizeof(*args)); + args[argc + 3] = NULL; + + printf("[$] su -p -c wg-quick\n"); + execvp("su", args); + exit(errno); +} + +static void add_if(const char *iface) +{ + cmd("ip link add %s type wireguard", iface); +} + +static void del_if(const char *iface) +{ + DEFINE_CMD(c); + regex_t reg; + char *netid = NULL; + _cleanup_free_ char *regex = concat("0xc([0-9a-f]+)/0xcffff lookup ", iface, NULL); + + xregcomp(®, regex, REG_EXTENDED); + + cmd("ip link del %s", iface); + for (char *ret = cmd_ret(&c, "ip rule show"); ret; ret = cmd_ret(&c, NULL)) { + regmatch_t matches[2]; + + if (!regexec(®, ret, ARRAY_SIZE(matches), matches, 0)) { + ret[matches[1].rm_eo] = 0; + netid = &ret[matches[1].rm_so]; + break; + } + } + + if (netid) + cndc("network destroy %lu", strtoul(netid, NULL, 16)); +} + +static void up_if(unsigned int *netid, const char *iface) +{ + srandom(time(NULL) ^ getpid()); /* Not real randomness. */ + + while (*netid < 4096) + *netid = random() & 0xfffe; + + cmd("wg set %s fwmark 0x20000", iface); + cndc("interface setcfg %s up", iface); + cndc("network create %u vpn 1 1", *netid); + cndc("network interface add %u %s", *netid, iface); + cndc("network users add %u 0-99999", *netid); +} + +static void set_dnses(unsigned int netid, const char *dnses) +{ + size_t len = strlen(dnses); + _cleanup_free_ char *mutable = xstrdup(dnses); + _cleanup_free_ char *arglist = xmalloc(len * 4 + 1); + _cleanup_free_ char *arg = xmalloc(len + 4); + + if (!len) + return; + arglist[0] = 0; + + for (char *dns = strtok(mutable, ", \t\n"); dns; dns = strtok(NULL, ", \t\n")) { + if (strchr(dns, '\'') || strchr(dns, '\\')) + continue; + snprintf(arg, len + 3, "'%s' ", dns); + strncat(arglist, arg, len * 4 - 1); + } + if (!strlen(arglist)) + return; + cndc("resolver setnetdns %u '' %s", netid, arglist); +} + +static void add_addr(const char *iface, const char *addr) +{ + if (strchr(addr, ':')) { + cndc("interface ipv6 %s enable", iface); + cmd("ip -6 addr add '%s' dev %s", addr, iface); + } else { + _cleanup_free_ char *mutable = strdup(addr); + char *slash = strchr(mutable, '/'); + unsigned char mask = 32; + + if (slash) { + *slash = 0; + mask = atoi(slash + 1); + } + cndc("interface setcfg %s '%s' %u", iface, mutable, mask); + } +} + +static void set_addr(const char *iface, const char *addrs) +{ + _cleanup_free_ char *mutable = xstrdup(addrs); + + for (char *addr = strtok(mutable, ", \t\n"); addr; addr = strtok(NULL, ", \t\n")) { + if (strchr(addr, '\'') || strchr(addr, '\\')) + continue; + add_addr(iface, addr); + } +} + +static int get_route_mtu(const char *endpoint) +{ + DEFINE_CMD(c_route); + DEFINE_CMD(c_dev); + regmatch_t matches[2]; + regex_t regex_mtu, regex_dev; + char *route, *mtu, *dev; + + xregcomp(®ex_mtu, "mtu ([0-9]+)", REG_EXTENDED); + xregcomp(®ex_dev, "dev ([^ ]+)", REG_EXTENDED); + + if (strcmp(endpoint, "default")) + route = cmd_ret(&c_route, "ip -o route get %s", endpoint); + else + route = cmd_ret(&c_route, "ip -o route show %s", endpoint); + if (!route) + return -1; + + if (!regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) { + route[matches[1].rm_eo] = 0; + mtu = &route[matches[1].rm_so]; + } else if (!regexec(®ex_dev, route, ARRAY_SIZE(matches), matches, 0)) { + route[matches[1].rm_eo] = 0; + dev = &route[matches[1].rm_so]; + route = cmd_ret(&c_dev, "ip -o link show dev %s", dev); + if (!route) + return -1; + if (regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) + return -1; + route[matches[1].rm_eo] = 0; + mtu = &route[matches[1].rm_so]; + } else + return -1; + return atoi(mtu); +} + +static void set_mtu(const char *iface, unsigned int mtu) +{ + DEFINE_CMD(c_endpoints); + regex_t regex_endpoint; + int endpoint_mtu; + + if (mtu) { + cndc("interface setmtu %s %u", iface, mtu); + return; + } + + xregcomp(®ex_endpoint, "^\\[?([a-z0-9:.]+)\\]?:[0-9]+$", REG_EXTENDED); + + endpoint_mtu = get_route_mtu("default"); + if (endpoint_mtu == -1) + endpoint_mtu = 1500; + + for (char *endpoint = cmd_ret(&c_endpoints, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c_endpoints, NULL)) { + regmatch_t matches[2]; + unsigned int next_mtu; + + if (regexec(®ex_endpoint, endpoint, ARRAY_SIZE(matches), matches, 0)) + continue; + endpoint[matches[1].rm_eo] = 0; + endpoint = &endpoint[matches[1].rm_so]; + + next_mtu = get_route_mtu(endpoint); + if (next_mtu > 0 && next_mtu < endpoint_mtu) + endpoint_mtu = next_mtu; + } + + cndc("interface setmtu %s %d", iface, endpoint_mtu - 80); +} + +static void add_route(const char *iface, unsigned int netid, const char *route) +{ + cndc("network route add %u %s %s", netid, iface, route); +} + +static void set_routes(const char *iface, unsigned int netid) +{ + DEFINE_CMD(c); + + for (char *allowedips = cmd_ret(&c, "wg show %s allowed-ips", iface); allowedips; allowedips = cmd_ret(&c, NULL)) { + char *start = strchr(allowedips, '\t'); + if (!start) + continue; + ++start; + for (char *allowedip = strtok(start, " \n"); allowedip; allowedip = strtok(NULL, " \n")) + add_route(iface, netid, allowedip); + } +} + +static void set_config(const char *iface, const char *config) +{ + FILE *config_writer; + _cleanup_free_ char *cmd = concat("wg setconf ", iface, " /proc/self/fd/0", NULL); + + printf("[#] %s\n", cmd); + + config_writer = popen(cmd, "w"); + if (!config_writer) { + perror("Error: popen"); + exit(errno); + } + if (fputs(config, config_writer) < 0) { + perror("Error: fputs"); + exit(errno); + } + pclose(config_writer); +} + +static void cmd_usage(const char *program) +{ + printf( "Usage: %s [ up | down ] [ CONFIG_FILE | INTERFACE ]\n" + "\n" + " CONFIG_FILE is a configuration file, whose filename is the interface name\n" + " followed by `.conf'. Otherwise, INTERFACE is an interface name, with\n" + " configuration found at /data/misc/wireguard/INTERFACE.conf. It is to be readable\n" + " by wg(8)'s `setconf' sub-command, with the exception of the following additions\n" + " to the [Interface] section, which are handled by %s:\n" + "\n" + " - Address: may be specified one or more times and contains one or more\n" + " IP addresses (with an optional CIDR mask) to be set for the interface.\n" + " - MTU: an optional MTU for the interface; if unspecified, auto-calculated.\n" + " - DNS: an optional DNS server to use while the device is up.\n" + "\n" + "See wg-quick(8) for more info and examples.\n", program, program); +} + +static char *cleanup_iface = NULL; + +static void cmd_up_cleanup(void) +{ + is_exiting = true; + if (cleanup_iface) + del_if(cleanup_iface); + free(cleanup_iface); +} + +static void cmd_up(const char *iface, const char *config, unsigned int mtu, const char *addrs, const char *dnses) +{ + DEFINE_CMD(c); + unsigned int netid = 0; + + if (cmd_ret(&c, "ip link show dev %s 2>/dev/null", iface)) { + fprintf(stderr, "Error: %s already exists\n", iface); + exit(92); + } + + cleanup_iface = xstrdup(iface); + atexit(cmd_up_cleanup); + + add_if(iface); + set_config(iface, config); + set_mtu(iface, mtu); + set_addr(iface, addrs); + up_if(&netid, iface); + set_dnses(netid, dnses); + set_routes(iface, netid); + + free(cleanup_iface); + cleanup_iface = NULL; + exit(0); +} + +static void cmd_down(const char *iface) +{ + DEFINE_CMD(c); + bool found = false; + + char *ifaces = cmd_ret(&c, "wg show interfaces"); + if (ifaces) { + for (char *eiface = strtok(ifaces, " \n"); eiface; eiface = strtok(NULL, " \n")) { + if (!strcmp(iface, eiface)) { + found = true; + break; + } + } + } + if (!found) { + fprintf(stderr, "Error: %s is not a WireGuard interface\n", iface); + exit(43); + } + + del_if(iface); + exit(0); +} + +static char *concat_and_free(char *orig, const char *delim, const char *new_line) +{ + char *ret; + + if (!orig) + ret = xstrdup(new_line); + else + ret = concat(orig, delim, new_line, NULL); + free(orig); + return ret; +} + +static void parse_options(char **iface, char **config, unsigned int *mtu, char **addrs, char **dnses, const char *arg) +{ + _cleanup_fclose_ FILE *file = NULL; + char filename[PATH_MAX + 1], *line = NULL; + regex_t regex_iface, regex_conf; + regmatch_t matches[2]; + struct stat sbuf; + size_t n = 0; + bool in_interface_section = false; + + *iface = *config = *addrs = *dnses = NULL; + *mtu = 0; + + xregcomp(®ex_iface, "^[a-zA-Z0-9_=+.-]{1,16}$", REG_EXTENDED | REG_NOSUB); + xregcomp(®ex_conf, "/?([a-zA-Z0-9_=+.-]{1,16})\\.conf$", REG_EXTENDED); + + filename[sizeof(filename) - 1] = 0; + if (!regexec(®ex_iface, arg, 0, NULL, 0)) + snprintf(filename, sizeof(filename) - 1, "/data/misc/wireguard/%s.conf", arg); + else + strncpy(filename, arg, sizeof(filename) - 1); + + file = fopen(filename, "r"); + if (!file) { + fprintf(stderr, "Error: Unable to open configuration file `%s': %s\n", filename, strerror(errno)); + exit(errno); + } + + if (regexec(®ex_conf, filename, ARRAY_SIZE(matches), matches, 0)) { + fprintf(stderr, "Error: The config file must be a valid interface name, followed by .conf\n"); + exit(77); + } + + if (fstat(fileno(file), &sbuf) < 0) { + perror("Error: fstat"); + exit(errno); + } + if (sbuf.st_mode & 0007) + fprintf(stderr, "Warning: `%s' is world accessible\n", filename); + + filename[matches[1].rm_eo] = 0; + *iface = xstrdup(&filename[matches[1].rm_so]); + + while (getline(&line, &n, file) >= 0) { + size_t len = strlen(line), j = 0; + _cleanup_free_ char *clean = xmalloc(len + 1); + + for (size_t i = 0; i < len; ++i) { + if (!isspace(line[i])) + clean[j++] = line[i]; + } + clean[j] = 0; + len = strlen(clean); + + if (clean[0] == '[') + in_interface_section = false; + if (!strcasecmp(clean, "[Interface]")) + in_interface_section = true; + if (in_interface_section) { + if (!strncasecmp(clean, "Address=", 8) && len > 8) { + *addrs = concat_and_free(*addrs, ",", clean + 8); + continue; + } else if (!strncasecmp(clean, "DNS=", 4) && len > 4) { + *dnses = concat_and_free(*dnses, ",", clean + 4); + continue; + } else if (!strncasecmp(clean, "MTU=", 4) && len > 4) { + *mtu = atoi(clean + 4); + continue; + } + } + *config = concat_and_free(*config, "", line); + } + + if (!*iface) + *iface = xstrdup(""); + if (!*config) + *config = xstrdup(""); + if (!*addrs) + *addrs = xstrdup(""); + if (!*dnses) + *dnses = xstrdup(""); +} + +int main(int argc, char *argv[]) +{ + _cleanup_free_ char *iface = NULL; + _cleanup_free_ char *config = NULL; + _cleanup_free_ char *addrs = NULL; + _cleanup_free_ char *dnses = NULL; + unsigned int mtu; + + if (argc == 2 && (!strcmp(argv[1], "help") || !strcmp(argv[1], "--help") || !strcmp(argv[1], "-h"))) + cmd_usage(argv[0]); + else if (argc == 3 && !strcmp(argv[1], "up")) { + auto_su(argc, argv); + parse_options(&iface, &config, &mtu, &addrs, &dnses, argv[2]); + cmd_up(iface, config, mtu, addrs, dnses); + } else if (argc == 3 && !strcmp(argv[1], "down")) { + auto_su(argc, argv); + parse_options(&iface, &config, &mtu, &addrs, &dnses, argv[2]); + cmd_down(iface); + } else { + cmd_usage(argv[0]); + return 1; + } + return 0; +} |