2 # Copyright 2016-2017 Dan Luedtke <mail@danrl.com>
3 # Licensed to the public under the Apache License 2.0.
7 logger
-t "wireguard" "error: missing wireguard-tools (${WG})"
11 [ -n "$INCLUDE_ONLY" ] ||
{
17 proto_wireguard_init_config
() {
18 proto_config_add_string
"private_key"
19 proto_config_add_int
"listen_port"
20 proto_config_add_int
"mtu"
21 proto_config_add_string
"fwmark"
26 proto_wireguard_setup_peer
() {
27 local peer_config
="$1"
32 local route_allowed_ips
35 local persistent_keepalive
37 config_get public_key
"${peer_config}" "public_key"
38 config_get preshared_key
"${peer_config}" "preshared_key"
39 config_get allowed_ips
"${peer_config}" "allowed_ips"
40 config_get_bool route_allowed_ips
"${peer_config}" "route_allowed_ips" 0
41 config_get endpoint_host
"${peer_config}" "endpoint_host"
42 config_get endpoint_port
"${peer_config}" "endpoint_port"
43 config_get persistent_keepalive
"${peer_config}" "persistent_keepalive"
45 if [ -z "$public_key" ]; then
46 echo "Skipping peer config $peer_config because public key is not defined."
50 echo "[Peer]" >> "${wg_cfg}"
51 echo "PublicKey=${public_key}" >> "${wg_cfg}"
52 if [ "${preshared_key}" ]; then
53 echo "PresharedKey=${preshared_key}" >> "${wg_cfg}"
55 for allowed_ip
in $allowed_ips; do
56 echo "AllowedIPs=${allowed_ip}" >> "${wg_cfg}"
58 if [ "${endpoint_host}" ]; then
59 case "${endpoint_host}" in
61 endpoint
="[${endpoint_host}]"
64 endpoint
="${endpoint_host}"
67 if [ "${endpoint_port}" ]; then
68 endpoint
="${endpoint}:${endpoint_port}"
70 endpoint
="${endpoint}:51820"
72 echo "Endpoint=${endpoint}" >> "${wg_cfg}"
74 if [ "${persistent_keepalive}" ]; then
75 echo "PersistentKeepalive=${persistent_keepalive}" >> "${wg_cfg}"
78 if [ ${route_allowed_ips} -ne 0 ]; then
79 for allowed_ip
in ${allowed_ips}; do
80 case "${allowed_ip}" in
82 proto_add_ipv6_route
"${allowed_ip%%/*}" "${allowed_ip##*/}"
85 proto_add_ipv4_route
"${allowed_ip%%/*}" "${allowed_ip##*/}"
88 proto_add_ipv6_route
"${allowed_ip%%/*}" "128"
91 proto_add_ipv4_route
"${allowed_ip%%/*}" "32"
98 proto_wireguard_setup
() {
100 local wg_dir
="/tmp/wireguard"
101 local wg_cfg
="${wg_dir}/${config}"
108 config_get private_key
"${config}" "private_key"
109 config_get listen_port
"${config}" "listen_port"
110 config_get addresses
"${config}" "addresses"
111 config_get mtu
"${config}" "mtu"
112 config_get fwmark
"${config}" "fwmark"
113 config_get ip6prefix
"${config}" "ip6prefix"
114 config_get nohostroute
"${config}" "nohostroute"
115 config_get tunlink
"${config}" "tunlink"
117 ip link del dev
"${config}" 2>/dev
/null
118 ip link add dev
"${config}" type wireguard
120 if [ "${mtu}" ]; then
121 ip link
set mtu
"${mtu}" dev
"${config}"
124 proto_init_update
"${config}" 1
128 echo "[Interface]" > "${wg_cfg}"
129 echo "PrivateKey=${private_key}" >> "${wg_cfg}"
130 if [ "${listen_port}" ]; then
131 echo "ListenPort=${listen_port}" >> "${wg_cfg}"
133 if [ "${fwmark}" ]; then
134 echo "FwMark=${fwmark}" >> "${wg_cfg}"
136 config_foreach proto_wireguard_setup_peer
"wireguard_${config}"
138 # apply configuration file
139 ${WG} setconf ${config} "${wg_cfg}"
144 if [ ${WG_RETURN} -ne 0 ]; then
146 proto_setup_failed "${config}"
150 for address in ${addresses}; do
153 proto_add_ipv6_address "${address%%/*}" "${address##*/}"
156 proto_add_ipv4_address "${address%%/*}" "${address##*/}"
159 proto_add_ipv6_address "${address%%/*}" "128"
162 proto_add_ipv4_address "${address%%/*}" "32"
167 for prefix in ${ip6prefix}; do
168 proto_add_ipv6_prefix "$prefix"
171 # endpoint dependency
172 if [ "${nohostroute}" != "1" ]; then
173 wg show "${config}" endpoints | \
174 sed -E 's/\[?([0-9.:a-f]+)\]?:([0-9]+)/\1 \2/' | \
175 while IFS=$'\t ' read -r key address port; do
176 [ -n "${port}" ] || continue
177 proto_add_host_dependency "${config}" "${address}" "${tunlink}"
181 proto_send_update "${config}"
184 proto_wireguard_teardown() {
186 ip link del dev "${config}" >/dev/null 2>&1
189 [ -n "$INCLUDE_ONLY" ] || {
190 add_protocol wireguard