#include "wireguard_configurator.h" #include #include #include #include #include #include #include #include #include #include #include #include "containers/containers_defs.h" #include "core/controllers/serverController.h" #include "core/scripts_registry.h" #include "core/server_defs.h" #include "settings.h" #include "utilities.h" WireguardConfigurator::WireguardConfigurator(std::shared_ptr settings, const QSharedPointer &serverController, bool isAwg, QObject *parent) : ConfiguratorBase(settings, serverController, parent), m_isAwg(isAwg) { m_serverConfigPath = m_isAwg ? amnezia::protocols::awg::serverConfigPath : amnezia::protocols::wireguard::serverConfigPath; m_serverPublicKeyPath = m_isAwg ? amnezia::protocols::awg::serverPublicKeyPath : amnezia::protocols::wireguard::serverPublicKeyPath; m_serverPskKeyPath = m_isAwg ? amnezia::protocols::awg::serverPskKeyPath : amnezia::protocols::wireguard::serverPskKeyPath; m_configTemplate = m_isAwg ? ProtocolScriptType::awg_template : ProtocolScriptType::wireguard_template; m_protocolName = m_isAwg ? config_key::awg : config_key::wireguard; m_defaultPort = m_isAwg ? protocols::wireguard::defaultPort : protocols::awg::defaultPort; } WireguardConfigurator::ConnectionData WireguardConfigurator::genClientKeys() { // TODO review constexpr size_t EDDSA_KEY_LENGTH = 32; ConnectionData connData; unsigned char buff[EDDSA_KEY_LENGTH]; int ret = RAND_priv_bytes(buff, EDDSA_KEY_LENGTH); if (ret <= 0) return connData; EVP_PKEY *pKey = EVP_PKEY_new(); q_check_ptr(pKey); pKey = EVP_PKEY_new_raw_private_key(EVP_PKEY_X25519, NULL, &buff[0], EDDSA_KEY_LENGTH); size_t keySize = EDDSA_KEY_LENGTH; // save private key unsigned char priv[EDDSA_KEY_LENGTH]; EVP_PKEY_get_raw_private_key(pKey, priv, &keySize); connData.clientPrivKey = QByteArray::fromRawData((char *)priv, keySize).toBase64(); // save public key unsigned char pub[EDDSA_KEY_LENGTH]; EVP_PKEY_get_raw_public_key(pKey, pub, &keySize); connData.clientPubKey = QByteArray::fromRawData((char *)pub, keySize).toBase64(); return connData; } QList WireguardConfigurator::getIpsFromConf(const QString &input) { QRegularExpression regex("AllowedIPs = (\\d+\\.\\d+\\.\\d+\\.\\d+)"); QRegularExpressionMatchIterator matchIterator = regex.globalMatch(input); QList ips; while (matchIterator.hasNext()) { QRegularExpressionMatch match = matchIterator.next(); const QString address_string { match.captured(1) }; const QHostAddress address { address_string }; if (address.isNull()) { qWarning() << "Couldn't recognize the ip address: " << address_string; } else { ips << address; } } return ips; } WireguardConfigurator::ConnectionData WireguardConfigurator::prepareWireguardConfig(const ServerCredentials &credentials, DockerContainer container, const QJsonObject &containerConfig, ErrorCode &errorCode) { WireguardConfigurator::ConnectionData connData = WireguardConfigurator::genClientKeys(); connData.host = credentials.hostName; connData.port = containerConfig.value(m_protocolName).toObject().value(config_key::port).toString(m_defaultPort); if (connData.clientPrivKey.isEmpty() || connData.clientPubKey.isEmpty()) { errorCode = ErrorCode::InternalError; return connData; } QString getIpsScript = QString("cat %1 | grep AllowedIPs").arg(m_serverConfigPath); QString stdOut; auto cbReadStdOut = [&](const QString &data, libssh::Client &) { stdOut += data + "\n"; return ErrorCode::NoError; }; errorCode = m_serverController->runContainerScript(credentials, container, getIpsScript, cbReadStdOut); if (errorCode != ErrorCode::NoError) { return connData; } auto ips = getIpsFromConf(stdOut); QHostAddress nextIp = [&] { QHostAddress result; QHostAddress lastIp; if (ips.empty()) { lastIp.setAddress(containerConfig.value(m_protocolName) .toObject() .value(config_key::subnet_address) .toString(protocols::wireguard::defaultSubnetAddress)); } else { lastIp = ips.last(); } quint8 lastOctet = static_cast(lastIp.toIPv4Address()); switch (lastOctet) { case 254: result.setAddress(lastIp.toIPv4Address() + 3); break; case 255: result.setAddress(lastIp.toIPv4Address() + 2); break; default: result.setAddress(lastIp.toIPv4Address() + 1); break; } return result; }(); connData.clientIP = nextIp.toString(); // Get keys connData.serverPubKey = m_serverController->getTextFileFromContainer(container, credentials, m_serverPublicKeyPath, errorCode); connData.serverPubKey.replace("\n", ""); if (errorCode != ErrorCode::NoError) { return connData; } connData.pskKey = m_serverController->getTextFileFromContainer(container, credentials, m_serverPskKeyPath, errorCode); connData.pskKey.replace("\n", ""); if (errorCode != ErrorCode::NoError) { return connData; } // Add client to config QString configPart = QString("[Peer]\n" "PublicKey = %1\n" "PresharedKey = %2\n" "AllowedIPs = %3/32\n\n") .arg(connData.clientPubKey, connData.pskKey, connData.clientIP); errorCode = m_serverController->uploadTextFileToContainer(container, credentials, configPart, m_serverConfigPath, libssh::ScpOverwriteMode::ScpAppendToExisting); if (errorCode != ErrorCode::NoError) { return connData; } QString script = QString("sudo docker exec -i $CONTAINER_NAME bash -c 'wg syncconf wg0 <(wg-quick strip %1)'") .arg(m_serverConfigPath); errorCode = m_serverController->runScript( credentials, m_serverController->replaceVars(script, m_serverController->genVarsForScript(credentials, container))); return connData; } QString WireguardConfigurator::createConfig(const ServerCredentials &credentials, DockerContainer container, const QJsonObject &containerConfig, ErrorCode &errorCode) { QString scriptData = amnezia::scriptData(m_configTemplate, container); QString config = m_serverController->replaceVars( scriptData, m_serverController->genVarsForScript(credentials, container, containerConfig)); ConnectionData connData = prepareWireguardConfig(credentials, container, containerConfig, errorCode); if (errorCode != ErrorCode::NoError) { return ""; } config.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", connData.clientPrivKey); config.replace("$WIREGUARD_CLIENT_IP", connData.clientIP); config.replace("$WIREGUARD_SERVER_PUBLIC_KEY", connData.serverPubKey); config.replace("$WIREGUARD_PSK", connData.pskKey); const QJsonObject &wireguarConfig = containerConfig.value(ProtocolProps::protoToString(Proto::WireGuard)).toObject(); QJsonObject jConfig; jConfig[config_key::config] = config; jConfig[config_key::hostName] = connData.host; jConfig[config_key::port] = connData.port.toInt(); jConfig[config_key::client_priv_key] = connData.clientPrivKey; jConfig[config_key::client_ip] = connData.clientIP; jConfig[config_key::client_pub_key] = connData.clientPubKey; jConfig[config_key::psk_key] = connData.pskKey; jConfig[config_key::server_pub_key] = connData.serverPubKey; jConfig[config_key::mtu] = wireguarConfig.value(config_key::mtu).toString(protocols::wireguard::defaultMtu); jConfig[config_key::persistent_keep_alive] = "25"; QJsonArray allowedIps { "0.0.0.0/0", "::/0" }; jConfig[config_key::allowed_ips] = allowedIps; jConfig[config_key::clientId] = connData.clientPubKey; return QJsonDocument(jConfig).toJson(); } QString WireguardConfigurator::processConfigWithLocalSettings(const QPair &dns, const bool isApiConfig, QString &protocolConfigString) { processConfigWithDnsSettings(dns, protocolConfigString); return protocolConfigString; } QString WireguardConfigurator::processConfigWithExportSettings(const QPair &dns, const bool isApiConfig, QString &protocolConfigString) { processConfigWithDnsSettings(dns, protocolConfigString); return protocolConfigString; }