From 0ea1df3c192beccad9a5f04d7d6b8d3b4e34a85f Mon Sep 17 00:00:00 2001 From: Nicolas Douma Date: Wed, 2 Oct 2019 21:10:51 +0200 Subject: wg-quick: android: use Binder for setting DNS on Android 10 Signed-off-by: Nicolas Douma --- src/tools/wg-quick/android.c | 828 ---------------------------- src/tools/wg-quick/android/binder_ndk.c | 126 +++++ src/tools/wg-quick/android/binder_ndk.h | 134 +++++ src/tools/wg-quick/android/dnsresolver.c | 272 ++++++++++ src/tools/wg-quick/android/dnsresolver.h | 38 ++ src/tools/wg-quick/android/wg-quick.c | 905 +++++++++++++++++++++++++++++++ 6 files changed, 1475 insertions(+), 828 deletions(-) delete mode 100644 src/tools/wg-quick/android.c create mode 100644 src/tools/wg-quick/android/binder_ndk.c create mode 100644 src/tools/wg-quick/android/binder_ndk.h create mode 100644 src/tools/wg-quick/android/dnsresolver.c create mode 100644 src/tools/wg-quick/android/dnsresolver.h create mode 100644 src/tools/wg-quick/android/wg-quick.c (limited to 'src') diff --git a/src/tools/wg-quick/android.c b/src/tools/wg-quick/android.c deleted file mode 100644 index 880fa1f..0000000 --- a/src/tools/wg-quick/android.c +++ /dev/null @@ -1,828 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* - * Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. - * - * This is a shell script written in C. It very intentionally still functions like - * a shell script, calling out to external executables such as ip(8). - */ - -#define _GNU_SOURCE -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - -#ifndef WG_PACKAGE_NAME -#define WG_PACKAGE_NAME "com.wireguard.android" -#endif -#ifndef WG_CONFIG_SEARCH_PATHS -#define WG_CONFIG_SEARCH_PATHS "/data/misc/wireguard /data/data/" WG_PACKAGE_NAME "/files" -#endif - -#define _printf_(x, y) __attribute__((format(printf, x, y))) -#define _cleanup_(x) __attribute__((cleanup(x))) -#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0])) - -static bool is_exiting = false; - -static void *xmalloc(size_t size) -{ - void *ret = malloc(size); - if (ret) - return ret; - perror("Error: malloc"); - exit(errno); -} - -static void *xcalloc(size_t nmemb, size_t size) -{ - void *ret = calloc(nmemb, size); - if (ret) - return ret; - perror("Error: calloc"); - exit(errno); -} - -static void *xstrdup(const char *str) -{ - char *ret = strdup(str); - if (ret) - return ret; - perror("Error: strdup"); - exit(errno); -} - -static void xregcomp(regex_t *preg, const char *regex, int cflags) -{ - if (regcomp(preg, regex, cflags)) { - fprintf(stderr, "Error: Regex compilation error\n"); - exit(EBADR); - } -} - -static char *concat(char *first, ...) -{ - va_list args; - size_t len = 0; - char *ret; - - va_start(args, first); - for (char *i = first; i; i = va_arg(args, char *)) - len += strlen(i); - va_end(args); - - ret = xmalloc(len + 1); - ret[0] = '\0'; - - va_start(args, first); - for (char *i = first; i; i = va_arg(args, char *)) - strcat(ret, i); - va_end(args); - - return ret; -} - -static char *concat_and_free(char *orig, const char *delim, const char *new_line) -{ - char *ret; - - if (!orig) - ret = xstrdup(new_line); - else - ret = concat(orig, delim, new_line, NULL); - free(orig); - return ret; -} - -struct command_buffer { - char *line; - size_t len; - FILE *stream; -}; - -static void free_command_buffer(struct command_buffer *c) -{ - if (!c) - return; - if (c->stream) - pclose(c->stream); - free(c->line); -} - -static void freep(void *p) -{ - free(*(void **)p); -} -static void fclosep(FILE **f) -{ - if (*f) - fclose(*f); -} -#define _cleanup_free_ _cleanup_(freep) -#define _cleanup_fclose_ _cleanup_(fclosep) -#define _cleanup_regfree_ _cleanup_(regfree) - -#define DEFINE_CMD(name) _cleanup_(free_command_buffer) struct command_buffer name = { 0 }; - -static char *vcmd_ret(struct command_buffer *c, const char *cmd_fmt, va_list args) -{ - _cleanup_free_ char *cmd = NULL; - - if (!c->stream && !cmd_fmt) - return NULL; - if (c->stream && cmd_fmt) - pclose(c->stream); - - if (cmd_fmt) { - if (vasprintf(&cmd, cmd_fmt, args) < 0) { - perror("Error: vasprintf"); - exit(errno); - } - - c->stream = popen(cmd, "r"); - if (!c->stream) { - perror("Error: popen"); - exit(errno); - } - } - errno = 0; - if (getline(&c->line, &c->len, c->stream) < 0) { - if (errno) { - perror("Error: getline"); - exit(errno); - } - return NULL; - } - return c->line; -} - -_printf_(1, 2) static void cmd(const char *cmd_fmt, ...) -{ - _cleanup_free_ char *cmd = NULL; - va_list args; - int ret; - - va_start(args, cmd_fmt); - if (vasprintf(&cmd, cmd_fmt, args) < 0) { - perror("Error: vasprintf"); - exit(errno); - } - va_end(args); - - printf("[#] %s\n", cmd); - ret = system(cmd); - - if (ret < 0) - ret = ESRCH; - else if (ret > 0) - ret = WIFEXITED(ret) ? WEXITSTATUS(ret) : EIO; - - if (ret && !is_exiting) - exit(ret); -} - -_printf_(2, 3) static char *cmd_ret(struct command_buffer *c, const char *cmd_fmt, ...) -{ - va_list args; - char *ret; - - va_start(args, cmd_fmt); - ret = vcmd_ret(c, cmd_fmt, args); - va_end(args); - return ret; -} - -_printf_(1, 2) static void cndc(const char *cmd_fmt, ...) -{ - DEFINE_CMD(c); - int error_code; - char *ret; - va_list args; - _cleanup_free_ char *ndc_fmt = concat("ndc ", cmd_fmt, NULL); - - va_start(args, cmd_fmt); - printf("[#] "); - vprintf(ndc_fmt, args); - printf("\n"); - va_end(args); - - va_start(args, cmd_fmt); - ret = vcmd_ret(&c, ndc_fmt, args); - va_end(args); - - if (!ret) { - fprintf(stderr, "Error: could not call ndc\n"); - exit(ENOSYS); - } - - error_code = atoi(ret); - if (error_code >= 400 && error_code < 600) { - fprintf(stderr, "Error: %s\n", ret); - exit(ENONET); - } -} - -static void auto_su(int argc, char *argv[]) -{ - char *args[argc + 4]; - - if (!getuid()) - return; - - args[0] = "su"; - args[1] = "-p"; - args[2] = "-c"; - memcpy(&args[3], argv, argc * sizeof(*args)); - args[argc + 3] = NULL; - - printf("[$] su -p -c "); - for (int i = 0; i < argc; ++i) - printf("%s%c", argv[i], i == argc - 1 ? '\n' : ' '); - - execvp("su", args); - exit(errno); -} - -static void add_if(const char *iface) -{ - cmd("ip link add %s type wireguard", iface); -} - -static void del_if(const char *iface) -{ - DEFINE_CMD(c_rule); - DEFINE_CMD(c_iptables); - DEFINE_CMD(c_ip6tables); - _cleanup_regfree_ regex_t rule_reg = { 0 }, iptables_reg = { 0 }; - regmatch_t matches[2]; - char *netid = NULL; - _cleanup_free_ char *rule_regex = concat("0xc([0-9a-f]+)/0xcffff lookup ", iface, NULL); - _cleanup_free_ char *iptables_regex = concat("^-A (.* --comment \"wireguard rule ", iface, "\"[^\n]*)\n*$", NULL); - - xregcomp(&rule_reg, rule_regex, REG_EXTENDED); - xregcomp(&iptables_reg, iptables_regex, REG_EXTENDED); - - cmd("ip link del %s", iface); - - for (char *rule = cmd_ret(&c_iptables, "iptables-save"); rule; rule = cmd_ret(&c_iptables, NULL)) { - if (!regexec(&iptables_reg, rule, ARRAY_SIZE(matches), matches, 0)) { - rule[matches[1].rm_eo] = '\0'; - cmd("iptables -D %s", &rule[matches[1].rm_so]); - } - } - for (char *rule = cmd_ret(&c_ip6tables, "ip6tables-save"); rule; rule = cmd_ret(&c_ip6tables, NULL)) { - if (!regexec(&iptables_reg, rule, ARRAY_SIZE(matches), matches, 0)) { - rule[matches[1].rm_eo] = '\0'; - cmd("ip6tables -D %s", &rule[matches[1].rm_so]); - } - } - - for (char *rule = cmd_ret(&c_rule, "ip rule show"); rule; rule = cmd_ret(&c_rule, NULL)) { - if (!regexec(&rule_reg, rule, ARRAY_SIZE(matches), matches, 0)) { - rule[matches[1].rm_eo] = '\0'; - netid = &rule[matches[1].rm_so]; - break; - } - } - if (netid) - cndc("network destroy %lu", strtoul(netid, NULL, 16)); -} - -static bool should_block_ipv6(const char *iface) -{ - DEFINE_CMD(c); - bool has_ipv6 = false, has_all_none = true; - - for (char *endpoint = cmd_ret(&c, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c, NULL)) { - char *start = strchr(endpoint, '\t'); - - if (!start) - continue; - ++start; - if (start[0] != '(') - has_all_none = false; - if (start[0] == '[') - has_ipv6 = true; - } - return !has_ipv6 && !has_all_none; -} - -static uint16_t determine_listen_port(const char *iface) -{ - DEFINE_CMD(c); - unsigned long listen_port = 0; - char *value; - - cmd("ip link set up dev %s", iface); - value = cmd_ret(&c, "wg show %s listen-port", iface); - if (!value) - goto set_back_down; - listen_port = strtoul(value, NULL, 10); - if (listen_port > UINT16_MAX || !listen_port) { - listen_port = 0; - goto set_back_down; - } -set_back_down: - cmd("ip link set down dev %s", iface); - return listen_port; -} - -static void up_if(unsigned int *netid, const char *iface, uint16_t listen_port) -{ - srandom(time(NULL) ^ getpid()); /* Not real randomness. */ - - while (*netid < 4096) - *netid = random() & 0xfffe; - - cmd("wg set %s fwmark 0x20000", iface); - cmd("iptables -I OUTPUT 1 -m mark --mark 0x20000 -j ACCEPT -m comment --comment \"wireguard rule %s\"", iface); - cmd("ip6tables -I OUTPUT 1 -m mark --mark 0x20000 -j ACCEPT -m comment --comment \"wireguard rule %s\"", iface); - if (listen_port) { - cmd("iptables -I INPUT 1 -p udp --dport %u -j ACCEPT -m comment --comment \"wireguard rule %s\"", listen_port, iface); - cmd("ip6tables -I INPUT 1 -p udp --dport %u -j %s -m comment --comment \"wireguard rule %s\"", listen_port, should_block_ipv6(iface) ? "DROP" : "ACCEPT", iface); - } - cndc("interface setcfg %s up", iface); - cndc("network create %u vpn 1 1", *netid); - cndc("network interface add %u %s", *netid, iface); -} - -static int compare_uid(const void *a, const void *b) -{ - return *(const uid_t *)a - *(const uid_t *)b; -} - -static uid_t *get_uid_list(const char *selected_applications) -{ - _cleanup_fclose_ FILE *package_list = NULL; - _cleanup_free_ char *line = NULL; - uid_t package_uid; - size_t line_len = 0, i; - const char *comma, *start; - uid_t *uid_list; - - if (!selected_applications) - return xcalloc(1, sizeof(*uid_list)); - - for (i = 1, comma = selected_applications; comma; comma = strchr(comma + 1, ','), ++i); - uid_list = xcalloc(i, sizeof(*uid_list)); - i = 0; - - package_list = fopen("/data/system/packages.list", "r"); - if (!package_list) { - perror("Error: Unable to open package list"); - exit(errno); - } - - while (getline(&line, &line_len, package_list) >= 0) { - char *package_name, *package_uid_str, *endptr; - - package_name = line; - package_uid_str = strchr(package_name, ' '); - if (!package_uid_str) - continue; - *package_uid_str++ = '\0'; - *strchrnul(package_uid_str, ' ') = '\0'; - package_uid = strtoul(package_uid_str, &endptr, 10); - if (!package_uid || !*package_uid_str || *endptr) - continue; - - for (start = selected_applications; comma = strchrnul(start, ','), *start; start = comma + 1) { - ptrdiff_t token_len = comma - start; - - if (token_len && strlen(package_name) == token_len && !strncmp(start, package_name, token_len)) - uid_list[i++] = package_uid; - } - } - qsort(uid_list, i, sizeof(*uid_list), compare_uid); - return uid_list; -} - -static void set_users(unsigned int netid, const char *excluded_applications) -{ - _cleanup_free_ uid_t *excluded_uids = get_uid_list(excluded_applications); - _cleanup_free_ char *ranges = NULL; - char range[22]; - uid_t start; - - for (start = 0; *excluded_uids; start = *excluded_uids + 1, ++excluded_uids) { - if (start > *excluded_uids - 1) - continue; - else if (start == *excluded_uids - 1) - snprintf(range, sizeof(range), "%u", start); - else - snprintf(range, sizeof(range), "%u-%u", start, *excluded_uids - 1); - ranges = concat_and_free(ranges, " ", range); - } - if (start < 99999) { - snprintf(range, sizeof(range), "%u-99999", start); - ranges = concat_and_free(ranges, " ", range); - } - - cndc("network users add %u %s", netid, ranges); -} - -static void set_dnses(unsigned int netid, const char *dnses) -{ - size_t len = strlen(dnses); - if (len > (1<<16)) - return; - _cleanup_free_ char *mutable = xstrdup(dnses); - _cleanup_free_ char *arglist = xmalloc(len * 4 + 1); - _cleanup_free_ char *arg = xmalloc(len + 4); - - if (!len) - return; - arglist[0] = '\0'; - - for (char *dns = strtok(mutable, ", \t\n"); dns; dns = strtok(NULL, ", \t\n")) { - if (strchr(dns, '\'') || strchr(dns, '\\')) - continue; - snprintf(arg, len + 3, "'%s' ", dns); - strncat(arglist, arg, len * 4 - 1); - } - if (!strlen(arglist)) - return; - cndc("resolver setnetdns %u '' %s", netid, arglist); -} - -static void add_addr(const char *iface, const char *addr) -{ - if (strchr(addr, ':')) { - cndc("interface ipv6 %s enable", iface); - cmd("ip -6 addr add '%s' dev %s", addr, iface); - } else { - _cleanup_free_ char *mut_addr = strdup(addr); - char *slash = strchr(mut_addr, '/'); - unsigned char mask = 32; - - if (slash) { - *slash = '\0'; - mask = atoi(slash + 1); - } - cndc("interface setcfg %s '%s' %u", iface, mut_addr, mask); - } -} - -static void set_addr(const char *iface, const char *addrs) -{ - _cleanup_free_ char *mutable = xstrdup(addrs); - - for (char *addr = strtok(mutable, ", \t\n"); addr; addr = strtok(NULL, ", \t\n")) { - if (strchr(addr, '\'') || strchr(addr, '\\')) - continue; - add_addr(iface, addr); - } -} - -static int get_route_mtu(const char *endpoint) -{ - DEFINE_CMD(c_route); - DEFINE_CMD(c_dev); - regmatch_t matches[2]; - _cleanup_regfree_ regex_t regex_mtu = { 0 }, regex_dev = { 0 }; - char *route, *mtu, *dev; - - xregcomp(®ex_mtu, "mtu ([0-9]+)", REG_EXTENDED); - xregcomp(®ex_dev, "dev ([^ ]+)", REG_EXTENDED); - - if (strcmp(endpoint, "default")) - route = cmd_ret(&c_route, "ip -o route get %s", endpoint); - else - route = cmd_ret(&c_route, "ip -o route show %s", endpoint); - if (!route) - return -1; - - if (!regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) { - route[matches[1].rm_eo] = '\0'; - mtu = &route[matches[1].rm_so]; - } else if (!regexec(®ex_dev, route, ARRAY_SIZE(matches), matches, 0)) { - route[matches[1].rm_eo] = '\0'; - dev = &route[matches[1].rm_so]; - route = cmd_ret(&c_dev, "ip -o link show dev %s", dev); - if (!route) - return -1; - if (regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) - return -1; - route[matches[1].rm_eo] = '\0'; - mtu = &route[matches[1].rm_so]; - } else - return -1; - return atoi(mtu); -} - -static void set_mtu(const char *iface, unsigned int mtu) -{ - DEFINE_CMD(c_endpoints); - _cleanup_regfree_ regex_t regex_endpoint = { 0 }; - regmatch_t matches[2]; - int endpoint_mtu, next_mtu; - - if (mtu) { - cndc("interface setmtu %s %u", iface, mtu); - return; - } - - xregcomp(®ex_endpoint, "^\\[?([a-z0-9:.]+)\\]?:[0-9]+$", REG_EXTENDED); - - endpoint_mtu = get_route_mtu("default"); - if (endpoint_mtu == -1) - endpoint_mtu = 1500; - - for (char *endpoint = cmd_ret(&c_endpoints, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c_endpoints, NULL)) { - if (regexec(®ex_endpoint, endpoint, ARRAY_SIZE(matches), matches, 0)) - continue; - endpoint[matches[1].rm_eo] = '\0'; - endpoint = &endpoint[matches[1].rm_so]; - - next_mtu = get_route_mtu(endpoint); - if (next_mtu > 0 && next_mtu < endpoint_mtu) - endpoint_mtu = next_mtu; - } - - cndc("interface setmtu %s %d", iface, endpoint_mtu - 80); -} - -static void add_route(const char *iface, unsigned int netid, const char *route) -{ - cndc("network route add %u %s %s", netid, iface, route); -} - -static void set_routes(const char *iface, unsigned int netid) -{ - DEFINE_CMD(c); - - for (char *allowedips = cmd_ret(&c, "wg show %s allowed-ips", iface); allowedips; allowedips = cmd_ret(&c, NULL)) { - char *start = strchr(allowedips, '\t'); - - if (!start) - continue; - ++start; - for (char *allowedip = strtok(start, " \n"); allowedip; allowedip = strtok(NULL, " \n")) { - if (!strcmp(allowedip, "(none)")) - continue; - add_route(iface, netid, allowedip); - } - } -} - -static void set_config(const char *iface, const char *config) -{ - FILE *config_writer; - _cleanup_free_ char *cmd = concat("wg setconf ", iface, " /proc/self/fd/0", NULL); - int ret; - - printf("[#] %s\n", cmd); - - config_writer = popen(cmd, "w"); - if (!config_writer) { - perror("Error: popen"); - exit(errno); - } - if (fputs(config, config_writer) < 0) { - perror("Error: fputs"); - exit(errno); - } - ret = pclose(config_writer); - if (ret) - exit(WIFEXITED(ret) ? WEXITSTATUS(ret) : EIO); -} - -static void broadcast_change(void) -{ - const char *pkg = getenv("CALLING_PACKAGE"); - - if (!pkg || strcmp(pkg, WG_PACKAGE_NAME)) - cmd("am broadcast -a com.wireguard.android.action.REFRESH_TUNNEL_STATES " WG_PACKAGE_NAME); -} - -static void print_search_paths(FILE *file, const char *prefix) -{ - _cleanup_free_ char *paths = strdup(WG_CONFIG_SEARCH_PATHS); - - for (char *path = strtok(paths, " "); path; path = strtok(NULL, " ")) - fprintf(file, "%s%s\n", prefix, path); -} - -static void cmd_usage(const char *program) -{ - printf( "Usage: %s [ up | down ] [ CONFIG_FILE | INTERFACE ]\n" - "\n" - " CONFIG_FILE is a configuration file, whose filename is the interface name\n" - " followed by `.conf'. Otherwise, INTERFACE is an interface name, with\n" - " configuration found at:\n\n", program); - print_search_paths(stdout, " - "); - printf( "\n It is to be readable by wg(8)'s `setconf' sub-command, with the exception\n" - " of the following additions to the [Interface] section, which are handled by\n" - " this program:\n\n" - " - Address: may be specified one or more times and contains one or more\n" - " IP addresses (with an optional CIDR mask) to be set for the interface.\n" - " - MTU: an optional MTU for the interface; if unspecified, auto-calculated.\n" - " - DNS: an optional DNS server to use while the device is up.\n" - " - ExcludedApplications: optional applications to exclude from the tunnel.\n\n" - " See wg-quick(8) for more info and examples.\n"); -} - -static char *cleanup_iface = NULL; - -static void cmd_up_cleanup(void) -{ - is_exiting = true; - if (cleanup_iface) - del_if(cleanup_iface); - free(cleanup_iface); -} - -static void cmd_up(const char *iface, const char *config, unsigned int mtu, const char *addrs, const char *dnses, const char *excluded_applications) -{ - DEFINE_CMD(c); - unsigned int netid = 0; - uint16_t listen_port; - - if (cmd_ret(&c, "ip link show dev %s 2>/dev/null", iface)) { - fprintf(stderr, "Error: %s already exists\n", iface); - exit(EEXIST); - } - - cleanup_iface = xstrdup(iface); - atexit(cmd_up_cleanup); - - add_if(iface); - set_config(iface, config); - listen_port = determine_listen_port(iface); - up_if(&netid, iface, listen_port); - set_addr(iface, addrs); - set_dnses(netid, dnses); - set_routes(iface, netid); - set_mtu(iface, mtu); - set_users(netid, excluded_applications); - broadcast_change(); - - free(cleanup_iface); - cleanup_iface = NULL; - exit(EXIT_SUCCESS); -} - -static void cmd_down(const char *iface) -{ - DEFINE_CMD(c); - bool found = false; - - char *ifaces = cmd_ret(&c, "wg show interfaces"); - if (ifaces) { - for (char *eiface = strtok(ifaces, " \n"); eiface; eiface = strtok(NULL, " \n")) { - if (!strcmp(iface, eiface)) { - found = true; - break; - } - } - } - if (!found) { - fprintf(stderr, "Error: %s is not a WireGuard interface\n", iface); - exit(EMEDIUMTYPE); - } - - del_if(iface); - broadcast_change(); - exit(EXIT_SUCCESS); -} - -static void parse_options(char **iface, char **config, unsigned int *mtu, char **addrs, char **dnses, char **excluded_applications, const char *arg) -{ - _cleanup_fclose_ FILE *file = NULL; - _cleanup_free_ char *line = NULL; - _cleanup_free_ char *filename = NULL; - _cleanup_free_ char *paths = strdup(WG_CONFIG_SEARCH_PATHS); - _cleanup_regfree_ regex_t regex_iface = { 0 }, regex_conf = { 0 }; - regmatch_t matches[2]; - struct stat sbuf; - size_t n = 0; - bool in_interface_section = false; - - *iface = *config = *addrs = *dnses = NULL; - *mtu = 0; - - xregcomp(®ex_iface, "^[a-zA-Z0-9_=+.-]{1,15}$", REG_EXTENDED | REG_NOSUB); - xregcomp(®ex_conf, "/?([a-zA-Z0-9_=+.-]{1,15})\\.conf$", REG_EXTENDED); - - if (!regexec(®ex_iface, arg, 0, NULL, 0)) { - for (char *path = strtok(paths, " "); path; path = strtok(NULL, " ")) { - free(filename); - if (asprintf(&filename, "%s/%s.conf", path, arg) < 0) { - perror("Error: asprintf"); - exit(errno); - } - file = fopen(filename, "r"); - if (file) - break; - } - if (!file) { - fprintf(stderr, "Error: Unable to find configuration file for `%s' in:\n", arg); - print_search_paths(stderr, "- "); - exit(errno); - } - } else { - filename = xstrdup(arg); - file = fopen(filename, "r"); - if (!file) { - fprintf(stderr, "Error: Unable to find configuration file at `%s'\n", filename); - exit(errno); - } - } - - if (regexec(®ex_conf, filename, ARRAY_SIZE(matches), matches, 0)) { - fprintf(stderr, "Error: The config file must be a valid interface name, followed by .conf\n"); - exit(EINVAL); - } - - if (fstat(fileno(file), &sbuf) < 0) { - perror("Error: fstat"); - exit(errno); - } - if (sbuf.st_mode & 0007) - fprintf(stderr, "Warning: `%s' is world accessible\n", filename); - - filename[matches[1].rm_eo] = '\0'; - *iface = xstrdup(&filename[matches[1].rm_so]); - - while (getline(&line, &n, file) >= 0) { - size_t len = strlen(line), j = 0; - if (len > (1<<16)) - return; - _cleanup_free_ char *clean = xmalloc(len + 1); - - for (size_t i = 0; i < len; ++i) { - if (!isspace(line[i])) - clean[j++] = line[i]; - } - clean[j] = '\0'; - - if (clean[0] == '[') - in_interface_section = false; - if (!strcasecmp(clean, "[Interface]")) - in_interface_section = true; - if (in_interface_section) { - if (!strncasecmp(clean, "Address=", 8) && j > 8) { - *addrs = concat_and_free(*addrs, ",", clean + 8); - continue; - } else if (!strncasecmp(clean, "DNS=", 4) && j > 4) { - *dnses = concat_and_free(*dnses, ",", clean + 4); - continue; - } else if (!strncasecmp(clean, "ExcludedApplications=", 21) && j > 4) { - *excluded_applications = concat_and_free(*excluded_applications, ",", clean + 21); - continue; - } else if (!strncasecmp(clean, "MTU=", 4) && j > 4) { - *mtu = atoi(clean + 4); - continue; - } - } - *config = concat_and_free(*config, "", line); - } - - if (!*iface) - *iface = xstrdup(""); - if (!*config) - *config = xstrdup(""); - if (!*addrs) - *addrs = xstrdup(""); - if (!*dnses) - *dnses = xstrdup(""); -} - -int main(int argc, char *argv[]) -{ - _cleanup_free_ char *iface = NULL; - _cleanup_free_ char *config = NULL; - _cleanup_free_ char *addrs = NULL; - _cleanup_free_ char *dnses = NULL; - _cleanup_free_ char *excluded_applications = NULL; - unsigned int mtu; - - if (argc == 2 && (!strcmp(argv[1], "help") || !strcmp(argv[1], "--help") || !strcmp(argv[1], "-h"))) - cmd_usage(argv[0]); - else if (argc == 3 && !strcmp(argv[1], "up")) { - auto_su(argc, argv); - parse_options(&iface, &config, &mtu, &addrs, &dnses, &excluded_applications, argv[2]); - cmd_up(iface, config, mtu, addrs, dnses, excluded_applications); - } else if (argc == 3 && !strcmp(argv[1], "down")) { - auto_su(argc, argv); - parse_options(&iface, &config, &mtu, &addrs, &dnses, &excluded_applications, argv[2]); - cmd_down(iface); - } else { - cmd_usage(argv[0]); - return 1; - } - return 0; -} diff --git a/src/tools/wg-quick/android/binder_ndk.c b/src/tools/wg-quick/android/binder_ndk.c new file mode 100644 index 0000000..39a6323 --- /dev/null +++ b/src/tools/wg-quick/android/binder_ndk.c @@ -0,0 +1,126 @@ +#include +#include +#include +#include +#include +#include + +#include "binder_ndk.h" + +static bool binder_available = false; + +bool binder_is_available(void) +{ + return binder_available; +} + +AIBinder_Class *(*AIBinder_Class_define)(const char *interfaceDescriptor, AIBinder_Class_onCreate onCreate, AIBinder_Class_onDestroy onDestroy, AIBinder_Class_onTransact onTransact) __attribute__((warn_unused_result)) = NULL; +bool (*AIBinder_associateClass)(AIBinder *binder, const AIBinder_Class *clazz) = NULL; +void (*AIBinder_decStrong)(AIBinder *binder) = NULL; +binder_status_t (*AIBinder_prepareTransaction)(AIBinder *binder, AParcel **in) = NULL; +binder_status_t (*AIBinder_transact)(AIBinder *binder, transaction_code_t code, AParcel **in, AParcel **out, binder_flags_t flags) = NULL; +binder_status_t (*AIBinder_ping)(AIBinder *binder) = NULL; +binder_status_t (*AIBinder_dump)(AIBinder *binder, int fd, const char **args, uint32_t numArgs) = NULL; +binder_status_t (*AParcel_readStatusHeader)(const AParcel *parcel, AStatus **status) = NULL; +binder_status_t (*AParcel_readBool)(const AParcel *parcel, bool *value) = NULL; +void (*AParcel_delete)(AParcel *parcel) = NULL; +binder_status_t (*AParcel_setDataPosition)(const AParcel *parcel, int32_t position) = NULL; +int32_t (*AParcel_getDataPosition)(const AParcel *parcel) = NULL; +binder_status_t (*AParcel_writeInt32)(AParcel *parcel, int32_t value) = NULL; +binder_status_t (*AParcel_writeStringArray)(AParcel *parcel, const void *arrayData, int32_t length, AParcel_stringArrayElementGetter getter) = NULL; +binder_status_t (*AParcel_writeString)(AParcel *parcel, const char *string, int32_t length) = NULL; +bool (*AStatus_isOk)(const AStatus *status) = NULL; +void (*AStatus_delete)(AStatus *status) = NULL; +binder_exception_t (*AStatus_getExceptionCode)(const AStatus *status) = NULL; +int32_t (*AStatus_getServiceSpecificError)(const AStatus *status) = NULL; +const char* (*AStatus_getMessage)(const AStatus *status) = NULL; +binder_status_t (*AStatus_getStatus)(const AStatus *status) = NULL; +AIBinder *(*AServiceManager_getService)(const char *instance) __attribute__((__warn_unused_result__)) = NULL; + +static __attribute__((__constructor__(65535))) void load_symbols(void) +{ + void *handle = NULL; + if (!(handle = dlopen("libbinder_ndk.so", RTLD_LAZY))) { + fprintf(stderr, "Warning: libbinder_ndk.so is not available\n"); + binder_available = false; + return; + } + else + binder_available = true; + +#define X(symb) ({ \ + if (!((symb) = (__typeof__(symb))dlsym(handle, #symb))) { \ + fprintf(stderr, "Error: unable to import " #symb " from libbinder_ndk.so\n"); \ + exit(ELIBACC); \ + } \ + }) + + X(AIBinder_Class_define); + X(AIBinder_associateClass); + X(AIBinder_decStrong); + X(AIBinder_prepareTransaction); + X(AIBinder_transact); + X(AIBinder_ping); + X(AIBinder_dump); + X(AParcel_readStatusHeader); + X(AParcel_readBool); + X(AParcel_delete); + X(AParcel_setDataPosition); + X(AParcel_getDataPosition); + X(AParcel_writeInt32); + X(AParcel_writeStringArray); + X(AParcel_writeString); + X(AStatus_isOk); + X(AStatus_delete); + X(AStatus_getExceptionCode); + X(AStatus_getServiceSpecificError); + X(AStatus_getMessage); + X(AStatus_getStatus); + X(AServiceManager_getService); +#undef X +} + +void cleanup_binder(AIBinder **binder) +{ + AIBinder_decStrong(*binder); +} + +void cleanup_status(AStatus **status) +{ + AStatus_delete(*status); +} + +void cleanup_parcel(AParcel **parcel) +{ + AParcel_delete(*parcel); +} + +binder_status_t meaningful_binder_status(const AStatus *status_out) +{ + binder_status_t status = STATUS_OK; + binder_exception_t exc_code; + int32_t exc_code_service; + const char *message; + + if (!AStatus_isOk(status_out)) { + exc_code = AStatus_getExceptionCode(status_out); + if (exc_code == EX_TRANSACTION_FAILED) { + status = AStatus_getStatus(status_out); + fprintf(stderr, "Error: transaction failed: %d\n", status); + } + else { + message = AStatus_getMessage(status_out); + + if (exc_code == EX_SERVICE_SPECIFIC) { + exc_code_service = AStatus_getServiceSpecificError(status_out); + fprintf(stderr, "Error: service specific exception code: %d%s%s\n", exc_code_service, message ? ": " : "", message ?: ""); + } + else + fprintf(stderr, "Error: exception code: %d%s%s\n", exc_code, message ? ": " : "", message ?: ""); + + status = STATUS_FAILED_TRANSACTION; + } + } + + return status; +} diff --git a/src/tools/wg-quick/android/binder_ndk.h b/src/tools/wg-quick/android/binder_ndk.h new file mode 100644 index 0000000..55f35eb --- /dev/null +++ b/src/tools/wg-quick/android/binder_ndk.h @@ -0,0 +1,134 @@ +#pragma once + +#include +#include +#include +#include + +#define _cleanup_status_ __attribute__((__cleanup__(cleanup_status))) +#define _cleanup_parcel_ __attribute__((__cleanup__(cleanup_parcel))) +#define _cleanup_binder_ __attribute__((__cleanup__(cleanup_binder))) + +bool binder_is_available(void); + +typedef int32_t binder_status_t; +typedef int32_t binder_exception_t; +typedef uint32_t transaction_code_t; +typedef uint32_t binder_flags_t; + +/* values are from AOSP repository platform/frameworks/native + * in libs/binder/ndk/include_ndk/android/binder_status.h + */ + +enum { + STATUS_OK = 0, + STATUS_UNKNOWN_ERROR = -2147483647 - 1, + STATUS_NO_MEMORY = -ENOMEM, + STATUS_INVALID_OPERATION = -ENOSYS, + STATUS_BAD_VALUE = -EINVAL, + STATUS_BAD_TYPE = STATUS_UNKNOWN_ERROR + 1, + STATUS_NAME_NOT_FOUND = -ENOENT, + STATUS_PERMISSION_DENIED = -EPERM, + STATUS_NO_INIT = -ENODEV, + STATUS_ALREADY_EXISTS = -EEXIST, + STATUS_DEAD_OBJECT = -EPIPE, + STATUS_FAILED_TRANSACTION = STATUS_UNKNOWN_ERROR + 2, + STATUS_BAD_INDEX = -EOVERFLOW, + STATUS_NOT_ENOUGH_DATA = -ENODATA, + STATUS_WOULD_BLOCK = -EWOULDBLOCK, + STATUS_TIMED_OUT = -ETIMEDOUT, + STATUS_UNKNOWN_TRANSACTION = -EBADMSG, + STATUS_FDS_NOT_ALLOWED = STATUS_UNKNOWN_ERROR + 7, + STATUS_UNEXPECTED_NULL = STATUS_UNKNOWN_ERROR + 8 +}; + +enum { + EX_NONE = 0, + EX_SECURITY = -1, + EX_BAD_PARCELABLE = -2, + EX_ILLEGAL_ARGUMENT = -3, + EX_NULL_POINTER = -4, + EX_ILLEGAL_STATE = -5, + EX_NETWORK_MAIN_THREAD = -6, + EX_UNSUPPORTED_OPERATION = -7, + EX_SERVICE_SPECIFIC = -8, + EX_PARCELABLE = -9, + EX_TRANSACTION_FAILED = -129 +}; + +enum { + FLAG_ONEWAY = 0x01, +}; + +enum { + FIRST_CALL_TRANSACTION = 0x00000001, + LAST_CALL_TRANSACTION = 0x00ffffff +}; + +struct AIBinder; +struct AParcel; +struct AStatus; +struct AIBinder_Class; + +typedef struct AIBinder AIBinder; +typedef struct AParcel AParcel; +typedef struct AStatus AStatus; +typedef struct AIBinder_Class AIBinder_Class; + +typedef void *(*AIBinder_Class_onCreate)(void *args); +typedef void (*AIBinder_Class_onDestroy)(void *userData); +typedef binder_status_t (*AIBinder_Class_onTransact)(AIBinder *binder, transaction_code_t code, const AParcel *in, AParcel *out); +typedef const char *(*AParcel_stringArrayElementGetter)(const void *arrayData, size_t index, int32_t *outLength); + +/* function pointers to the libbinder_ndk.so symbols, + * NULL if they cannot be loaded */ +extern AIBinder_Class *(*AIBinder_Class_define)(const char *interfaceDescriptor, AIBinder_Class_onCreate onCreate, AIBinder_Class_onDestroy onDestroy, AIBinder_Class_onTransact onTransact) __attribute__((warn_unused_result)); +extern bool (*AIBinder_associateClass)(AIBinder *binder, const AIBinder_Class *clazz); +extern void (*AIBinder_decStrong)(AIBinder *binder); +extern binder_status_t (*AIBinder_prepareTransaction)(AIBinder *binder, AParcel **in); +extern binder_status_t (*AIBinder_transact)(AIBinder *binder, transaction_code_t code, AParcel **in, AParcel **out, binder_flags_t flags); +extern binder_status_t (*AIBinder_ping)(AIBinder *binder); +extern binder_status_t (*AIBinder_dump)(AIBinder *binder, int fd, const char **args, uint32_t numArgs); +extern binder_status_t (*AParcel_readStatusHeader)(const AParcel *parcel, AStatus **status); +extern binder_status_t (*AParcel_readBool)(const AParcel *parcel, bool *value); +extern void (*AParcel_delete)(AParcel *parcel); +extern binder_status_t (*AParcel_setDataPosition)(const AParcel *parcel, int32_t position); +extern int32_t (*AParcel_getDataPosition)(const AParcel *parcel); +extern binder_status_t (*AParcel_writeInt32)(AParcel *parcel, int32_t value); +extern binder_status_t (*AParcel_writeStringArray)(AParcel *parcel, const void *arrayData, int32_t length, AParcel_stringArrayElementGetter getter); +extern binder_status_t (*AParcel_readStatusHeader)(const AParcel *parcel, AStatus **status); +extern binder_status_t (*AParcel_writeString)(AParcel *parcel, const char *string, int32_t length); +extern bool (*AStatus_isOk)(const AStatus *status); +extern void (*AStatus_delete)(AStatus *status); +extern binder_exception_t (*AStatus_getExceptionCode)(const AStatus *status); +extern int32_t (*AStatus_getServiceSpecificError)(const AStatus *status); +extern const char* (*AStatus_getMessage)(const AStatus *status); +extern binder_status_t (*AStatus_getStatus)(const AStatus *status); +extern AIBinder *(*AServiceManager_getService)(const char *instance) __attribute__((__warn_unused_result__)); + +void cleanup_binder(AIBinder **); +void cleanup_status(AStatus **); +void cleanup_parcel(AParcel **); + +static inline int32_t string_size(const char *str) +{ + return str ? strlen(str) : -1; +} + +static inline int32_t string_array_size(char *const *array) +{ + int32_t size = -1; + if (!array) + return size; + for (size = 0; array[size]; ++size); + return size; +} + +static inline const char *string_array_getter(const void *array_data, size_t index, int32_t *outlength) +{ + const char **array = (const char **)array_data; + *outlength = array[index] ? strlen(array[index]) : -1; + return array[index]; +} + +binder_status_t meaningful_binder_status(const AStatus *status_out); diff --git a/src/tools/wg-quick/android/dnsresolver.c b/src/tools/wg-quick/android/dnsresolver.c new file mode 100644 index 0000000..f07060d --- /dev/null +++ b/src/tools/wg-quick/android/dnsresolver.c @@ -0,0 +1,272 @@ +#include +#include +#include +#include + +#include "dnsresolver.h" +#include "binder_ndk.h" + +#define DNSRESOLVER_DESCRIPTOR "android.net.IDnsResolver" + +static void *on_create() +{ + fprintf(stderr, "Error: on_create called on proxy object\n"); + exit(ENOTSUP); +} + +static void on_destroy() +{ + fprintf(stderr, "Error: on_destroy called on proxy object\n"); + exit(ENOTSUP); +} + +static binder_status_t on_transact() +{ + fprintf(stderr, "Error: on_transact called on a proxy object\n"); + exit(ENOTSUP); +} + +void *dnsresolver_get_handle(void) +{ + if (!binder_is_available()) { + return NULL; + } + + AIBinder *binder; + AIBinder_Class *clazz; + + binder = AServiceManager_getService("dnsresolver"); + if (!binder) + return NULL; + clazz = AIBinder_Class_define(DNSRESOLVER_DESCRIPTOR, &on_create, &on_destroy, &on_transact); + if (!clazz) + goto error; + + if (!AIBinder_associateClass(binder, clazz)) + goto error; + + return binder; +error: + AIBinder_decStrong(binder); + return NULL; +} + +void dnsresolver_dec_ref(void *handle) +{ + AIBinder *const binder = handle; + AIBinder_decStrong(binder); +} + +int32_t dnsresolver_is_alive(void *handle, bool *aidl_return) +{ + AIBinder *const binder = handle; + binder_status_t status; + _cleanup_parcel_ AParcel *parcel_in = NULL; + _cleanup_parcel_ AParcel *parcel_out = NULL; + _cleanup_status_ AStatus *status_out = NULL; + + status = AIBinder_prepareTransaction(binder, &parcel_in); + if (status != STATUS_OK) + return status; + + status = AIBinder_transact(binder, FIRST_CALL_TRANSACTION + 0 /* isAlive */, &parcel_in, &parcel_out, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_readStatusHeader(parcel_out, &status_out); + if (status != STATUS_OK) + return status; + + if (!AStatus_isOk(status_out)) + return meaningful_binder_status(status_out); + + return AParcel_readBool(parcel_out, aidl_return); +} + +int32_t dnsresolver_create_network_cache(void *handle, int32_t netid) +{ + AIBinder *const binder = handle; + binder_status_t status; + _cleanup_parcel_ AParcel *parcel_in = NULL; + _cleanup_parcel_ AParcel *parcel_out = NULL; + _cleanup_status_ AStatus *status_out = NULL; + + status = AIBinder_prepareTransaction(binder, &parcel_in); + if (status != STATUS_OK) + return status; + + status = AParcel_writeInt32(parcel_in, netid); + if (status != STATUS_OK) + return status; + + status = AIBinder_transact(binder, FIRST_CALL_TRANSACTION + 7 /* createNetworkCache */, &parcel_in, &parcel_out, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_readStatusHeader(parcel_out, &status_out); + if (status != STATUS_OK) + return status; + + if (!AStatus_isOk(status_out)) + return meaningful_binder_status(status_out); + + return STATUS_OK; +} + +int32_t dnsresolver_destroy_network_cache(void *handle, int32_t netid) +{ + AIBinder *const binder = handle; + binder_status_t status; + _cleanup_parcel_ AParcel *parcel_in = NULL; + _cleanup_parcel_ AParcel *parcel_out = NULL; + _cleanup_status_ AStatus *status_out = NULL; + + status = AIBinder_prepareTransaction(binder, &parcel_in); + if (status != STATUS_OK) + return status; + + status = AParcel_writeInt32(parcel_in, netid); + if (status != STATUS_OK) + return status; + + status = AIBinder_transact(binder, FIRST_CALL_TRANSACTION + 8 /* destroyNetworkCache */, &parcel_in, &parcel_out, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_readStatusHeader(parcel_out, &status_out); + if (status != STATUS_OK) + return status; + + if (!AStatus_isOk(status_out)) + return meaningful_binder_status(status_out); + + return STATUS_OK; +} + +int32_t dnsresolver_set_log_severity(void *handle, int32_t log_severity) +{ + AIBinder *const binder = handle; + binder_status_t status; + _cleanup_parcel_ AParcel *parcel_in = NULL; + _cleanup_parcel_ AParcel *parcel_out = NULL; + _cleanup_status_ AStatus *status_out = NULL; + + status = AIBinder_prepareTransaction(binder, &parcel_in); + if (status != STATUS_OK) + return status; + + status = AParcel_writeInt32(parcel_in, log_severity); + if (status != STATUS_OK) + return status; + + status = AIBinder_transact(binder, FIRST_CALL_TRANSACTION + 9 /* setLogSeverity */, &parcel_in, &parcel_out, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_readStatusHeader(parcel_out, &status_out); + if (status != STATUS_OK) + return status; + + if (!AStatus_isOk(status_out)) + return meaningful_binder_status(status_out); + + return STATUS_OK; +} + +int32_t dnsresolver_set_resolver_configuration(void *handle, const struct resolver_params *params) +{ + AIBinder *const binder = handle; + binder_status_t status; + _cleanup_parcel_ AParcel *parcel_in = NULL; + _cleanup_parcel_ AParcel *parcel_out = NULL; + _cleanup_status_ AStatus *status_out = NULL; + int32_t start_position, end_position; + + status = AIBinder_prepareTransaction(binder, &parcel_in); + if (status != STATUS_OK) + return status; + + status = AParcel_writeInt32(parcel_in, 1); + if (status != STATUS_OK) + return status; + + start_position = AParcel_getDataPosition(parcel_in); + status = AParcel_writeInt32(parcel_in, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_writeInt32(parcel_in, params->netid); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->sample_validity_seconds); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->success_threshold); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->min_samples); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->max_samples); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->base_timeout_msec); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, params->retry_count); + if (status != STATUS_OK) + return status; + status = AParcel_writeStringArray(parcel_in, params->servers, string_array_size(params->servers), &string_array_getter); + if (status != STATUS_OK) + return status; + status = AParcel_writeStringArray(parcel_in, params->domains, string_array_size(params->domains), &string_array_getter); + if (status != STATUS_OK) + return status; + status = AParcel_writeString(parcel_in, params->tls_name, string_size(params->tls_name)); + if (status != STATUS_OK) + return status; + status = AParcel_writeStringArray(parcel_in, params->tls_servers, string_array_size(params->tls_servers), &string_array_getter); + if (status != STATUS_OK) + return status; + status = AParcel_writeStringArray(parcel_in, params->tls_fingerprints, string_array_size(params->tls_fingerprints), &string_array_getter); + if (status != STATUS_OK) + return status; + + end_position = AParcel_getDataPosition(parcel_in); + status = AParcel_setDataPosition(parcel_in, start_position); + if (status != STATUS_OK) + return status; + status = AParcel_writeInt32(parcel_in, end_position - start_position); + if (status != STATUS_OK) + return status; + status = AParcel_setDataPosition(parcel_in, end_position); + if (status != STATUS_OK) + return status; + + status = AIBinder_transact(binder, FIRST_CALL_TRANSACTION + 2 /* setResolverConfiguration */, &parcel_in, &parcel_out, 0); + if (status != STATUS_OK) + return status; + + status = AParcel_readStatusHeader(parcel_out, &status_out); + if (status != STATUS_OK) + return status; + + return meaningful_binder_status(status_out); +} + +void dnsresolver_dump(void *handle, int fd) +{ + AIBinder *const binder = handle; + AIBinder_dump(binder, fd, NULL, 0); +} + +int32_t dnsresolver_ping(void *handle) +{ + AIBinder *const binder = handle; + return AIBinder_ping(binder); +} + +void cleanup_dnsresolver(void **handle) +{ + dnsresolver_dec_ref(*handle); +} diff --git a/src/tools/wg-quick/android/dnsresolver.h b/src/tools/wg-quick/android/dnsresolver.h new file mode 100644 index 0000000..09519af --- /dev/null +++ b/src/tools/wg-quick/android/dnsresolver.h @@ -0,0 +1,38 @@ +#pragma once + +#include +#include + +#define _cleanup_dnsresolver_ __attribute__((__cleanup__(cleanup_dnsresolver))) + +struct resolver_params { + int32_t netid; + int32_t sample_validity_seconds; + int32_t success_threshold; + int32_t min_samples; + int32_t max_samples; + int32_t base_timeout_msec; + int32_t retry_count; + char **servers; /* NULL terminated array of zero-terminated UTF-8 strings */ + char **domains; /* NULL terminated array of zero-terminated UTF-8 strings */ + char *tls_name; /* zero-terminated UTF-8 string */ + char **tls_servers; /* NULL terminated array of zero-terminated UTF-8 strings */ + char **tls_fingerprints; /* NULL terminated array of zero-terminated UTF-8 strings */ +}; + +/* + * the int32_t return codes below are 0 if there is no error, + * see binder_status_t in binder_ndk.h for the meaning of other values + */ +void *dnsresolver_get_handle(void) __attribute__((__warn_unused_result__)); +void dnsresolver_dec_ref(void *handle); +int32_t dnsresolver_set_resolver_configuration(void *handle, const struct resolver_params *params); +int32_t dnsresolver_create_network_cache(void *handle, int32_t netid); +int32_t dnsresolver_destroy_network_cache(void *handle, int32_t netid); + +int32_t dnsresolver_is_alive(void *handle, bool *result); +int32_t dnsresolver_set_log_severity(void *handle, int32_t log_severity); +void dnsresolver_dump(void *handle, int fd); +int32_t dnsresolver_ping(void *handle); + +void cleanup_dnsresolver(void **handle); diff --git a/src/tools/wg-quick/android/wg-quick.c b/src/tools/wg-quick/android/wg-quick.c new file mode 100644 index 0000000..fcde744 --- /dev/null +++ b/src/tools/wg-quick/android/wg-quick.c @@ -0,0 +1,905 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. + * + * This is a shell script written in C. It very intentionally still functions like + * a shell script, calling out to external executables such as ip(8). + */ + +#define _GNU_SOURCE +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "dnsresolver.h" + +#ifndef WG_PACKAGE_NAME +#define WG_PACKAGE_NAME "com.wireguard.android" +#endif +#ifndef WG_CONFIG_SEARCH_PATHS +#define WG_CONFIG_SEARCH_PATHS "/data/misc/wireguard /data/data/" WG_PACKAGE_NAME "/files" +#endif + +/* + * the following values are default values observed in AOSP + */ +#define WG_DNS_SAMPLE_VALIDITY 1800 /* sec */ +#define WG_DNS_SUCCESS_THRESHOLD 25 +#define WG_DNS_MIN_SAMPLES 8 +#define WG_DNS_MAX_SAMPLES 8 +#define WG_DNS_BASE_TIMEOUT 5000 /* msec */ +#define WG_DNS_RETRY_COUNT 2 + + +#define _printf_(x, y) __attribute__((format(printf, x, y))) +#define _cleanup_(x) __attribute__((cleanup(x))) +#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0])) + +static bool is_exiting = false; + +static void *xmalloc(size_t size) +{ + void *ret = malloc(size); + if (ret) + return ret; + perror("Error: malloc"); + exit(errno); +} + +static void *xcalloc(size_t nmemb, size_t size) +{ + void *ret = calloc(nmemb, size); + if (ret) + return ret; + perror("Error: calloc"); + exit(errno); +} + +static void *xstrdup(const char *str) +{ + char *ret = strdup(str); + if (ret) + return ret; + perror("Error: strdup"); + exit(errno); +} + +static void xregcomp(regex_t *preg, const char *regex, int cflags) +{ + if (regcomp(preg, regex, cflags)) { + fprintf(stderr, "Error: Regex compilation error\n"); + exit(EBADR); + } +} + +static char *concat(char *first, ...) +{ + va_list args; + size_t len = 0; + char *ret; + + va_start(args, first); + for (char *i = first; i; i = va_arg(args, char *)) + len += strlen(i); + va_end(args); + + ret = xmalloc(len + 1); + ret[0] = '\0'; + + va_start(args, first); + for (char *i = first; i; i = va_arg(args, char *)) + strcat(ret, i); + va_end(args); + + return ret; +} + +static char *concat_and_free(char *orig, const char *delim, const char *new_line) +{ + char *ret; + + if (!orig) + ret = xstrdup(new_line); + else + ret = concat(orig, delim, new_line, NULL); + free(orig); + return ret; +} + +struct command_buffer { + char *line; + size_t len; + FILE *stream; +}; + +static void free_command_buffer(struct command_buffer *c) +{ + if (!c) + return; + if (c->stream) + pclose(c->stream); + free(c->line); +} +static void freenularr(void *p) +{ + void **a = *(void ***)p; + if (a) { + for (int i = 0; a[i]; ++i) + free(a[i]); + } + free(a); +} + +static void freep(void *p) +{ + free(*(void **)p); +} +static void fclosep(FILE **f) +{ + if (*f) + fclose(*f); +} +#define _cleanup_free_ _cleanup_(freep) +#define _cleanup_fclose_ _cleanup_(fclosep) +#define _cleanup_regfree_ _cleanup_(regfree) +#define _cleanup_freenularr_ _cleanup_(freenularr) + +#define DEFINE_CMD(name) _cleanup_(free_command_buffer) struct command_buffer name = { 0 }; + +static char *vcmd_ret(struct command_buffer *c, const char *cmd_fmt, va_list args) +{ + _cleanup_free_ char *cmd = NULL; + + if (!c->stream && !cmd_fmt) + return NULL; + if (c->stream && cmd_fmt) + pclose(c->stream); + + if (cmd_fmt) { + if (vasprintf(&cmd, cmd_fmt, args) < 0) { + perror("Error: vasprintf"); + exit(errno); + } + + c->stream = popen(cmd, "r"); + if (!c->stream) { + perror("Error: popen"); + exit(errno); + } + } + errno = 0; + if (getline(&c->line, &c->len, c->stream) < 0) { + if (errno) { + perror("Error: getline"); + exit(errno); + } + return NULL; + } + return c->line; +} + +_printf_(1, 2) static void cmd(const char *cmd_fmt, ...) +{ + _cleanup_free_ char *cmd = NULL; + va_list args; + int ret; + + va_start(args, cmd_fmt); + if (vasprintf(&cmd, cmd_fmt, args) < 0) { + perror("Error: vasprintf"); + exit(errno); + } + va_end(args); + + printf("[#] %s\n", cmd); + ret = system(cmd); + + if (ret < 0) + ret = ESRCH; + else if (ret > 0) + ret = WIFEXITED(ret) ? WEXITSTATUS(ret) : EIO; + + if (ret && !is_exiting) + exit(ret); +} + +_printf_(2, 3) static char *cmd_ret(struct command_buffer *c, const char *cmd_fmt, ...) +{ + va_list args; + char *ret; + + va_start(args, cmd_fmt); + ret = vcmd_ret(c, cmd_fmt, args); + va_end(args); + return ret; +} + +_printf_(1, 2) static void cndc(const char *cmd_fmt, ...) +{ + DEFINE_CMD(c); + int error_code; + char *ret; + va_list args; + _cleanup_free_ char *ndc_fmt = concat("ndc ", cmd_fmt, NULL); + + va_start(args, cmd_fmt); + printf("[#] "); + vprintf(ndc_fmt, args); + printf("\n"); + va_end(args); + + va_start(args, cmd_fmt); + ret = vcmd_ret(&c, ndc_fmt, args); + va_end(args); + + if (!ret) { + fprintf(stderr, "Error: could not call ndc\n"); + exit(ENOSYS); + } + + error_code = atoi(ret); + if (error_code >= 400 && error_code < 600) { + fprintf(stderr, "Error: %s\n", ret); + exit(ENONET); + } +} + +static void auto_su(int argc, char *argv[]) +{ + char *args[argc + 4]; + + if (!getuid()) + return; + + args[0] = "su"; + args[1] = "-p"; + args[2] = "-c"; + memcpy(&args[3], argv, argc * sizeof(*args)); + args[argc + 3] = NULL; + + printf("[$] su -p -c "); + for (int i = 0; i < argc; ++i) + printf("%s%c", argv[i], i == argc - 1 ? '\n' : ' '); + + execvp("su", args); + exit(errno); +} + +static void add_if(const char *iface) +{ + cmd("ip link add %s type wireguard", iface); +} + +static void del_if(const char *iface) +{ + DEFINE_CMD(c_rule); + DEFINE_CMD(c_iptables); + DEFINE_CMD(c_ip6tables); + _cleanup_regfree_ regex_t rule_reg = { 0 }, iptables_reg = { 0 }; + regmatch_t matches[2]; + char *netid = NULL; + _cleanup_free_ char *rule_regex = concat("0xc([0-9a-f]+)/0xcffff lookup ", iface, NULL); + _cleanup_free_ char *iptables_regex = concat("^-A (.* --comment \"wireguard rule ", iface, "\"[^\n]*)\n*$", NULL); + + xregcomp(&rule_reg, rule_regex, REG_EXTENDED); + xregcomp(&iptables_reg, iptables_regex, REG_EXTENDED); + + cmd("ip link del %s", iface); + + for (char *rule = cmd_ret(&c_iptables, "iptables-save"); rule; rule = cmd_ret(&c_iptables, NULL)) { + if (!regexec(&iptables_reg, rule, ARRAY_SIZE(matches), matches, 0)) { + rule[matches[1].rm_eo] = '\0'; + cmd("iptables -D %s", &rule[matches[1].rm_so]); + } + } + for (char *rule = cmd_ret(&c_ip6tables, "ip6tables-save"); rule; rule = cmd_ret(&c_ip6tables, NULL)) { + if (!regexec(&iptables_reg, rule, ARRAY_SIZE(matches), matches, 0)) { + rule[matches[1].rm_eo] = '\0'; + cmd("ip6tables -D %s", &rule[matches[1].rm_so]); + } + } + + for (char *rule = cmd_ret(&c_rule, "ip rule show"); rule; rule = cmd_ret(&c_rule, NULL)) { + if (!regexec(&rule_reg, rule, ARRAY_SIZE(matches), matches, 0)) { + rule[matches[1].rm_eo] = '\0'; + netid = &rule[matches[1].rm_so]; + break; + } + } + if (netid) + cndc("network destroy %lu", strtoul(netid, NULL, 16)); +} + +static bool should_block_ipv6(const char *iface) +{ + DEFINE_CMD(c); + bool has_ipv6 = false, has_all_none = true; + + for (char *endpoint = cmd_ret(&c, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c, NULL)) { + char *start = strchr(endpoint, '\t'); + + if (!start) + continue; + ++start; + if (start[0] != '(') + has_all_none = false; + if (start[0] == '[') + has_ipv6 = true; + } + return !has_ipv6 && !has_all_none; +} + +static uint16_t determine_listen_port(const char *iface) +{ + DEFINE_CMD(c); + unsigned long listen_port = 0; + char *value; + + cmd("ip link set up dev %s", iface); + value = cmd_ret(&c, "wg show %s listen-port", iface); + if (!value) + goto set_back_down; + listen_port = strtoul(value, NULL, 10); + if (listen_port > UINT16_MAX || !listen_port) { + listen_port = 0; + goto set_back_down; + } +set_back_down: + cmd("ip link set down dev %s", iface); + return listen_port; +} + +static void up_if(unsigned int *netid, const char *iface, uint16_t listen_port) +{ + srandom(time(NULL) ^ getpid()); /* Not real randomness. */ + + while (*netid < 4096) + *netid = random() & 0xfffe; + + cmd("wg set %s fwmark 0x20000", iface); + cmd("iptables -I OUTPUT 1 -m mark --mark 0x20000 -j ACCEPT -m comment --comment \"wireguard rule %s\"", iface); + cmd("ip6tables -I OUTPUT 1 -m mark --mark 0x20000 -j ACCEPT -m comment --comment \"wireguard rule %s\"", iface); + if (listen_port) { + cmd("iptables -I INPUT 1 -p udp --dport %u -j ACCEPT -m comment --comment \"wireguard rule %s\"", listen_port, iface); + cmd("ip6tables -I INPUT 1 -p udp --dport %u -j %s -m comment --comment \"wireguard rule %s\"", listen_port, should_block_ipv6(iface) ? "DROP" : "ACCEPT", iface); + } + cndc("interface setcfg %s up", iface); + cndc("network create %u vpn 1 1", *netid); + cndc("network interface add %u %s", *netid, iface); +} + +static int compare_uid(const void *a, const void *b) +{ + return *(const uid_t *)a - *(const uid_t *)b; +} + +static uid_t *get_uid_list(const char *selected_applications) +{ + _cleanup_fclose_ FILE *package_list = NULL; + _cleanup_free_ char *line = NULL; + uid_t package_uid; + size_t line_len = 0, i; + const char *comma, *start; + uid_t *uid_list; + + if (!selected_applications) + return xcalloc(1, sizeof(*uid_list)); + + for (i = 1, comma = selected_applications; comma; comma = strchr(comma + 1, ','), ++i); + uid_list = xcalloc(i, sizeof(*uid_list)); + i = 0; + + package_list = fopen("/data/system/packages.list", "r"); + if (!package_list) { + perror("Error: Unable to open package list"); + exit(errno); + } + + while (getline(&line, &line_len, package_list) >= 0) { + char *package_name, *package_uid_str, *endptr; + + package_name = line; + package_uid_str = strchr(package_name, ' '); + if (!package_uid_str) + continue; + *package_uid_str++ = '\0'; + *strchrnul(package_uid_str, ' ') = '\0'; + package_uid = strtoul(package_uid_str, &endptr, 10); + if (!package_uid || !*package_uid_str || *endptr) + continue; + + for (start = selected_applications; comma = strchrnul(start, ','), *start; start = comma + 1) { + ptrdiff_t token_len = comma - start; + + if (token_len && strlen(package_name) == token_len && !strncmp(start, package_name, token_len)) + uid_list[i++] = package_uid; + } + } + qsort(uid_list, i, sizeof(*uid_list), compare_uid); + return uid_list; +} + +static void set_users(unsigned int netid, const char *excluded_applications) +{ + _cleanup_free_ uid_t *excluded_uids = get_uid_list(excluded_applications); + _cleanup_free_ char *ranges = NULL; + char range[22]; + uid_t start; + + for (start = 0; *excluded_uids; start = *excluded_uids + 1, ++excluded_uids) { + if (start > *excluded_uids - 1) + continue; + else if (start == *excluded_uids - 1) + snprintf(range, sizeof(range), "%u", start); + else + snprintf(range, sizeof(range), "%u-%u", start, *excluded_uids - 1); + ranges = concat_and_free(ranges, " ", range); + } + if (start < 99999) { + snprintf(range, sizeof(range), "%u-99999", start); + ranges = concat_and_free(ranges, " ", range); + } + + cndc("network users add %u %s", netid, ranges); +} + +static void set_dnses(unsigned int netid, const char *dnses) +{ + size_t len = strlen(dnses); + if (len > (1<<16)) + return; + _cleanup_free_ char *mutable = xstrdup(dnses); + _cleanup_free_ char *arglist = xmalloc(len * 4 + 1); + _cleanup_free_ char *arg = xmalloc(len + 4); + _cleanup_freenularr_ char **dns_list = xmalloc(len + 2); + size_t dns_list_size = 0; + _cleanup_free_ char *pretty_dns_list = NULL; + _cleanup_dnsresolver_ void *handle = NULL; + + if (!len) + return; + arglist[0] = '\0'; + + for (char *dns = strtok(mutable, ", \t\n"); dns; dns = strtok(NULL, ", \t\n")) { + if (strchr(dns, '\'') || strchr(dns, '\\')) + continue; + snprintf(arg, len + 3, "'%s' ", dns); + strncat(arglist, arg, len * 4 - 1); + dns_list[dns_list_size++] = xstrdup(dns); + } + dns_list[dns_list_size] = NULL; + + if ((handle = dnsresolver_get_handle())) { + if (!dns_list_size) + return; + + int32_t status; + + printf("[#] ::dnsResolver::createNetworkCache(%u)\n", netid); + status = dnsresolver_create_network_cache(handle, netid); + if (status != 0) { + fprintf(stderr, "Error: unable to create network cache\n"); + exit(ELIBACC); + } + + struct resolver_params params = { + .netid = netid, + .sample_validity_seconds = WG_DNS_SAMPLE_VALIDITY, + .success_threshold = WG_DNS_SUCCESS_THRESHOLD, + .min_samples = WG_DNS_MIN_SAMPLES, + .max_samples = WG_DNS_MAX_SAMPLES, + .base_timeout_msec = WG_DNS_BASE_TIMEOUT, + .retry_count = WG_DNS_RETRY_COUNT, + .servers = dns_list, + .domains = (char *[]){NULL}, + .tls_name = "", + .tls_servers = (char *[]){NULL}, + .tls_fingerprints = (char *[]){NULL} + }; + + for (int i = 0; dns_list[i]; ++i) + pretty_dns_list = concat_and_free(pretty_dns_list, ", ", dns_list[i]); + + printf("[#] ::dnsResolver::setResolverConfiguration(%u, [%s], [], %d, %d, %d, %d, %d, %d, [], [])\n", + netid, pretty_dns_list, WG_DNS_SAMPLE_VALIDITY, WG_DNS_SUCCESS_THRESHOLD, + WG_DNS_MIN_SAMPLES, WG_DNS_MAX_SAMPLES, WG_DNS_BASE_TIMEOUT, WG_DNS_RETRY_COUNT); + + status = dnsresolver_set_resolver_configuration(handle, ¶ms); + + if (status != 0) { + fprintf(stderr, "Error: unable to set DNS servers through Binder"); + printf("[#] ::dnsResolver::destroyNetworkCache(%u)\n", netid); + dnsresolver_destroy_network_cache(handle, netid); + exit(ELIBACC); + } + + return; + } + + if (!strlen(arglist)) + return; + cndc("resolver setnetdns %u '' %s", netid, arglist); +} + +static void add_addr(const char *iface, const char *addr) +{ + if (strchr(addr, ':')) { + cndc("interface ipv6 %s enable", iface); + cmd("ip -6 addr add '%s' dev %s", addr, iface); + } else { + _cleanup_free_ char *mut_addr = strdup(addr); + char *slash = strchr(mut_addr, '/'); + unsigned char mask = 32; + + if (slash) { + *slash = '\0'; + mask = atoi(slash + 1); + } + cndc("interface setcfg %s '%s' %u", iface, mut_addr, mask); + } +} + +static void set_addr(const char *iface, const char *addrs) +{ + _cleanup_free_ char *mutable = xstrdup(addrs); + + for (char *addr = strtok(mutable, ", \t\n"); addr; addr = strtok(NULL, ", \t\n")) { + if (strchr(addr, '\'') || strchr(addr, '\\')) + continue; + add_addr(iface, addr); + } +} + +static int get_route_mtu(const char *endpoint) +{ + DEFINE_CMD(c_route); + DEFINE_CMD(c_dev); + regmatch_t matches[2]; + _cleanup_regfree_ regex_t regex_mtu = { 0 }, regex_dev = { 0 }; + char *route, *mtu, *dev; + + xregcomp(®ex_mtu, "mtu ([0-9]+)", REG_EXTENDED); + xregcomp(®ex_dev, "dev ([^ ]+)", REG_EXTENDED); + + if (strcmp(endpoint, "default")) + route = cmd_ret(&c_route, "ip -o route get %s", endpoint); + else + route = cmd_ret(&c_route, "ip -o route show %s", endpoint); + if (!route) + return -1; + + if (!regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) { + route[matches[1].rm_eo] = '\0'; + mtu = &route[matches[1].rm_so]; + } else if (!regexec(®ex_dev, route, ARRAY_SIZE(matches), matches, 0)) { + route[matches[1].rm_eo] = '\0'; + dev = &route[matches[1].rm_so]; + route = cmd_ret(&c_dev, "ip -o link show dev %s", dev); + if (!route) + return -1; + if (regexec(®ex_mtu, route, ARRAY_SIZE(matches), matches, 0)) + return -1; + route[matches[1].rm_eo] = '\0'; + mtu = &route[matches[1].rm_so]; + } else + return -1; + return atoi(mtu); +} + +static void set_mtu(const char *iface, unsigned int mtu) +{ + DEFINE_CMD(c_endpoints); + _cleanup_regfree_ regex_t regex_endpoint = { 0 }; + regmatch_t matches[2]; + int endpoint_mtu, next_mtu; + + if (mtu) { + cndc("interface setmtu %s %u", iface, mtu); + return; + } + + xregcomp(®ex_endpoint, "^\\[?([a-z0-9:.]+)\\]?:[0-9]+$", REG_EXTENDED); + + endpoint_mtu = get_route_mtu("default"); + if (endpoint_mtu == -1) + endpoint_mtu = 1500; + + for (char *endpoint = cmd_ret(&c_endpoints, "wg show %s endpoints", iface); endpoint; endpoint = cmd_ret(&c_endpoints, NULL)) { + if (regexec(®ex_endpoint, endpoint, ARRAY_SIZE(matches), matches, 0)) + continue; + endpoint[matches[1].rm_eo] = '\0'; + endpoint = &endpoint[matches[1].rm_so]; + + next_mtu = get_route_mtu(endpoint); + if (next_mtu > 0 && next_mtu < endpoint_mtu) + endpoint_mtu = next_mtu; + } + + cndc("interface setmtu %s %d", iface, endpoint_mtu - 80); +} + +static void add_route(const char *iface, unsigned int netid, const char *route) +{ + cndc("network route add %u %s %s", netid, iface, route); +} + +static void set_routes(const char *iface, unsigned int netid) +{ + DEFINE_CMD(c); + + for (char *allowedips = cmd_ret(&c, "wg show %s allowed-ips", iface); allowedips; allowedips = cmd_ret(&c, NULL)) { + char *start = strchr(allowedips, '\t'); + + if (!start) + continue; + ++start; + for (char *allowedip = strtok(start, " \n"); allowedip; allowedip = strtok(NULL, " \n")) { + if (!strcmp(allowedip, "(none)")) + continue; + add_route(iface, netid, allowedip); + } + } +} + +static void set_config(const char *iface, const char *config) +{ + FILE *config_writer; + _cleanup_free_ char *cmd = concat("wg setconf ", iface, " /proc/self/fd/0", NULL); + int ret; + + printf("[#] %s\n", cmd); + + config_writer = popen(cmd, "w"); + if (!config_writer) { + perror("Error: popen"); + exit(errno); + } + if (fputs(config, config_writer) < 0) { + perror("Error: fputs"); + exit(errno); + } + ret = pclose(config_writer); + if (ret) + exit(WIFEXITED(ret) ? WEXITSTATUS(ret) : EIO); +} + +static void broadcast_change(void) +{ + const char *pkg = getenv("CALLING_PACKAGE"); + + if (!pkg || strcmp(pkg, WG_PACKAGE_NAME)) + cmd("am broadcast -a com.wireguard.android.action.REFRESH_TUNNEL_STATES " WG_PACKAGE_NAME); +} + +static void print_search_paths(FILE *file, const char *prefix) +{ + _cleanup_free_ char *paths = strdup(WG_CONFIG_SEARCH_PATHS); + + for (char *path = strtok(paths, " "); path; path = strtok(NULL, " ")) + fprintf(file, "%s%s\n", prefix, path); +} + +static void cmd_usage(const char *program) +{ + printf( "Usage: %s [ up | down ] [ CONFIG_FILE | INTERFACE ]\n" + "\n" + " CONFIG_FILE is a configuration file, whose filename is the interface name\n" + " followed by `.conf'. Otherwise, INTERFACE is an interface name, with\n" + " configuration found at:\n\n", program); + print_search_paths(stdout, " - "); + printf( "\n It is to be readable by wg(8)'s `setconf' sub-command, with the exception\n" + " of the following additions to the [Interface] section, which are handled by\n" + " this program:\n\n" + " - Address: may be specified one or more times and contains one or more\n" + " IP addresses (with an optional CIDR mask) to be set for the interface.\n" + " - MTU: an optional MTU for the interface; if unspecified, auto-calculated.\n" + " - DNS: an optional DNS server to use while the device is up.\n" + " - ExcludedApplications: optional applications to exclude from the tunnel.\n\n" + " See wg-quick(8) for more info and examples.\n"); +} + +static char *cleanup_iface = NULL; + +static void cmd_up_cleanup(void) +{ + is_exiting = true; + if (cleanup_iface) + del_if(cleanup_iface); + free(cleanup_iface); +} + +static void cmd_up(const char *iface, const char *config, unsigned int mtu, const char *addrs, const char *dnses, const char *excluded_applications) +{ + DEFINE_CMD(c); + unsigned int netid = 0; + uint16_t listen_port; + + if (cmd_ret(&c, "ip link show dev %s 2>/dev/null", iface)) { + fprintf(stderr, "Error: %s already exists\n", iface); + exit(EEXIST); + } + + cleanup_iface = xstrdup(iface); + atexit(cmd_up_cleanup); + + add_if(iface); + set_config(iface, config); + listen_port = determine_listen_port(iface); + up_if(&netid, iface, listen_port); + set_addr(iface, addrs); + set_dnses(netid, dnses); + set_routes(iface, netid); + set_mtu(iface, mtu); + set_users(netid, excluded_applications); + broadcast_change(); + + free(cleanup_iface); + cleanup_iface = NULL; + exit(EXIT_SUCCESS); +} + +static void cmd_down(const char *iface) +{ + DEFINE_CMD(c); + bool found = false; + + char *ifaces = cmd_ret(&c, "wg show interfaces"); + if (ifaces) { + for (char *eiface = strtok(ifaces, " \n"); eiface; eiface = strtok(NULL, " \n")) { + if (!strcmp(iface, eiface)) { + found = true; + break; + } + } + } + if (!found) { + fprintf(stderr, "Error: %s is not a WireGuard interface\n", iface); + exit(EMEDIUMTYPE); + } + + del_if(iface); + broadcast_change(); + exit(EXIT_SUCCESS); +} + +static void parse_options(char **iface, char **config, unsigned int *mtu, char **addrs, char **dnses, char **excluded_applications, const char *arg) +{ + _cleanup_fclose_ FILE *file = NULL; + _cleanup_free_ char *line = NULL; + _cleanup_free_ char *filename = NULL; + _cleanup_free_ char *paths = strdup(WG_CONFIG_SEARCH_PATHS); + _cleanup_regfree_ regex_t regex_iface = { 0 }, regex_conf = { 0 }; + regmatch_t matches[2]; + struct stat sbuf; + size_t n = 0; + bool in_interface_section = false; + + *iface = *config = *addrs = *dnses = NULL; + *mtu = 0; + + xregcomp(®ex_iface, "^[a-zA-Z0-9_=+.-]{1,15}$", REG_EXTENDED | REG_NOSUB); + xregcomp(®ex_conf, "/?([a-zA-Z0-9_=+.-]{1,15})\\.conf$", REG_EXTENDED); + + if (!regexec(®ex_iface, arg, 0, NULL, 0)) { + for (char *path = strtok(paths, " "); path; path = strtok(NULL, " ")) { + free(filename); + if (asprintf(&filename, "%s/%s.conf", path, arg) < 0) { + perror("Error: asprintf"); + exit(errno); + } + file = fopen(filename, "r"); + if (file) + break; + } + if (!file) { + fprintf(stderr, "Error: Unable to find configuration file for `%s' in:\n", arg); + print_search_paths(stderr, "- "); + exit(errno); + } + } else { + filename = xstrdup(arg); + file = fopen(filename, "r"); + if (!file) { + fprintf(stderr, "Error: Unable to find configuration file at `%s'\n", filename); + exit(errno); + } + } + + if (regexec(®ex_conf, filename, ARRAY_SIZE(matches), matches, 0)) { + fprintf(stderr, "Error: The config file must be a valid interface name, followed by .conf\n"); + exit(EINVAL); + } + + if (fstat(fileno(file), &sbuf) < 0) { + perror("Error: fstat"); + exit(errno); + } + if (sbuf.st_mode & 0007) + fprintf(stderr, "Warning: `%s' is world accessible\n", filename); + + filename[matches[1].rm_eo] = '\0'; + *iface = xstrdup(&filename[matches[1].rm_so]); + + while (getline(&line, &n, file) >= 0) { + size_t len = strlen(line), j = 0; + if (len > (1<<16)) + return; + _cleanup_free_ char *clean = xmalloc(len + 1); + + for (size_t i = 0; i < len; ++i) { + if (!isspace(line[i])) + clean[j++] = line[i]; + } + clean[j] = '\0'; + + if (clean[0] == '[') + in_interface_section = false; + if (!strcasecmp(clean, "[Interface]")) + in_interface_section = true; + if (in_interface_section) { + if (!strncasecmp(clean, "Address=", 8) && j > 8) { + *addrs = concat_and_free(*addrs, ",", clean + 8); + continue; + } else if (!strncasecmp(clean, "DNS=", 4) && j > 4) { + *dnses = concat_and_free(*dnses, ",", clean + 4); + continue; + } else if (!strncasecmp(clean, "ExcludedApplications=", 21) && j > 4) { + *excluded_applications = concat_and_free(*excluded_applications, ",", clean + 21); + continue; + } else if (!strncasecmp(clean, "MTU=", 4) && j > 4) { + *mtu = atoi(clean + 4); + continue; + } + } + *config = concat_and_free(*config, "", line); + } + + if (!*iface) + *iface = xstrdup(""); + if (!*config) + *config = xstrdup(""); + if (!*addrs) + *addrs = xstrdup(""); + if (!*dnses) + *dnses = xstrdup(""); +} + +int main(int argc, char *argv[]) +{ + _cleanup_free_ char *iface = NULL; + _cleanup_free_ char *config = NULL; + _cleanup_free_ char *addrs = NULL; + _cleanup_free_ char *dnses = NULL; + _cleanup_free_ char *excluded_applications = NULL; + unsigned int mtu; + + if (argc == 2 && (!strcmp(argv[1], "help") || !strcmp(argv[1], "--help") || !strcmp(argv[1], "-h"))) + cmd_usage(argv[0]); + else if (argc == 3 && !strcmp(argv[1], "up")) { + auto_su(argc, argv); + parse_options(&iface, &config, &mtu, &addrs, &dnses, &excluded_applications, argv[2]); + cmd_up(iface, config, mtu, addrs, dnses, excluded_applications); + } else if (argc == 3 && !strcmp(argv[1], "down")) { + auto_su(argc, argv); + parse_options(&iface, &config, &mtu, &addrs, &dnses, &excluded_applications, argv[2]); + cmd_down(iface); + } else { + cmd_usage(argv[0]); + return 1; + } + return 0; +} -- cgit v1.2.3-59-g8ed1b