raspap-webgui-mirror/includes/wireguard.php

169 lines
6.5 KiB
PHP
Raw Normal View History

2020-04-20 11:53:46 +00:00
<?php
require_once 'includes/status_messages.php';
require_once 'config.php';
/**
2021-03-04 23:06:27 +00:00
* Displays wireguard server & peer configuration
2020-04-20 11:53:46 +00:00
*/
function DisplayWireGuardConfig()
{
$status = new StatusMessages();
if (!RASPI_MONITOR_ENABLED) {
2020-08-28 22:42:55 +00:00
if (isset($_POST['savewgsettings'])) {
2021-03-04 23:06:27 +00:00
SaveWireGuardConfig($status);
2020-04-20 11:53:46 +00:00
} elseif (isset($_POST['startwg'])) {
$status->addMessage('Attempting to start WireGuard', 'info');
2020-04-22 09:01:31 +00:00
exec('sudo /usr/bin/wg-quick up wg0', $return);
2020-04-20 11:53:46 +00:00
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
} elseif (isset($_POST['stopwg'])) {
$status->addMessage('Attempting to stop WireGuard', 'info');
2020-04-22 09:01:31 +00:00
exec('sudo /usr/bin/wg-quick down wg0', $return);
2020-04-20 11:53:46 +00:00
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
}
}
2020-08-26 22:54:49 +00:00
// fetch wg config
exec('sudo cat '. RASPI_WIREGUARD_CONFIG, $return);
$conf = ParseConfig($return);
2021-02-24 18:07:19 +00:00
$wg_srvpubkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-server-public.key', $return);
2021-02-24 08:48:07 +00:00
$wg_srvport = ($conf['ListenPort'] == '') ? getDefaultNetValue('wireguard','server','ListenPort') : $conf['ListenPort'];
$wg_srvipaddress = ($conf['Address'] == '') ? getDefaultNetValue('wireguard','server','Address') : $conf['Address'];
2021-02-24 09:12:31 +00:00
$wg_pendpoint = ($conf['Endpoint'] == '') ? getDefaultNetValue('wireguard','peer','Endpoint') : $conf['Endpoint'];
$wg_pallowedips = ($conf['AllowedIPs'] == '') ? getDefaultNetValue('wireguard','peer','AllowedIPs') : $conf['AllowedIPs'];
$wg_pkeepalive = ($conf['PersistentKeepalive'] == '') ? getDefaultNetValue('wireguard','peer','PersistentKeepalive') : $conf['PersistentKeepalive'];
2021-02-24 18:07:19 +00:00
$wg_peerpubkey = $conf['PublicKey'];
2020-08-26 22:54:49 +00:00
// fetch service status
exec('pidof wg-crypt-wg0 | wc -l', $wgstatus);
2020-04-20 11:53:46 +00:00
$serviceStatus = $wgstatus[0] == 0 ? "down" : "up";
2020-04-22 09:01:31 +00:00
$wg_state = ($wgstatus[0] > 0);
2020-04-20 11:53:46 +00:00
echo renderTemplate(
"wireguard", compact(
"status",
2020-04-22 09:01:31 +00:00
"wg_state",
2020-08-25 21:11:27 +00:00
"serviceStatus",
2020-09-05 18:27:38 +00:00
"wg_log",
2020-08-25 21:11:27 +00:00
"endpoint_enable",
"peer_id",
2021-02-24 18:07:19 +00:00
"wg_srvpubkey",
2021-02-24 08:48:07 +00:00
"wg_srvport",
"wg_srvipaddress",
2021-02-24 18:07:19 +00:00
"wg_peerpubkey",
2021-02-24 09:12:31 +00:00
"wg_pendpoint",
"wg_pallowedips",
2020-08-26 22:54:49 +00:00
"wg_pkeepalive"
2020-04-20 11:53:46 +00:00
)
);
}
2021-03-04 23:06:27 +00:00
/**
* Validate user input, save wireguard configuration
*
* @param object $status
* @return boolean
*/
function SaveWireGuardConfig($status)
{
// Set defaults
$good_input = true;
$peer_id = 1;
// Validate input
if (isset($_POST['wg_srvport'])) {
if (strlen($_POST['wg_srvport']) > 5 || !is_numeric($_POST['wg_srvport'])) {
$status->addMessage('Invalid value for port number', 'danger');
$good_input = false;
}
}
if (isset($_POST['wg_srvipaddress'])) {
if (!validateCidr($_POST['wg_srvipaddress'])) {
$status->addMessage('Invalid value for IP address', 'danger');
$good_input = false;
}
}
if (isset($_POST['wg_pendpoint']) && strlen(trim($_POST['wg_pendpoint']) >0 )) {
if (!validateCidr($_POST['wg_pendpoint'])) {
$status->addMessage('Invalid value for endpoint address', 'danger');
$good_input = false;
}
}
if (isset($_POST['wg_pallowedips'])) {
if (!validateCidr($_POST['wg_pallowedips'])) {
$status->addMessage('Invalid value for allowed IPs', 'danger');
$good_input = false;
}
}
if (isset($_POST['wg_pkeepalive']) && strlen(trim($_POST['wg_pkeepalive']) >0 )) {
if (strlen($_POST['wg_pkeepalive']) > 4 || !is_numeric($_POST['wg_pkeepalive'])) {
$status->addMessage('Invalid value for persistent keepalive', 'danger');
$good_input = false;
}
}
// Save settings
if ($good_input) {
// fetch private keys from filesytem
$wg_srvprivkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-server-private.key', $return);
$wg_peerprivkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-peer-private.key', $return);
2021-03-04 23:06:27 +00:00
// server (wg0.conf)
$config[] = '[Interface]';
$config[] = 'Address = '.$_POST['wg_srvipaddress'];
$config[] = 'ListenPort = '.$_POST['wg_srvport'];
$config[] = 'PrivateKey = '.$wg_srvprivkey;
2021-03-04 23:06:27 +00:00
$config[] = 'PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE';
$config[] = 'PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o wlan0 -j MASQUERADE';
$config[] = '';
$config[] = '[Peer]';
$config[] = 'PublicKey = '.$_POST['wg-peer'];
if ($_POST['wg_pendpoint'] !== '') {
$config[] = 'Endpoint = '.trim($_POST['wg_pendpoint']);
}
$config[] = 'AllowedIPs = '.$_POST['wg_pallowedips'];
if ($_POST['wg_pkeepalive'] !== '') {
$config[] = 'PersistentKeepalive = '.trim($_POST['wg_pkeepalive']);
}
$config[] = '';
$config = join(PHP_EOL, $config);
file_put_contents("/tmp/wgdata", $config);
system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_CONFIG, $return);
// client1 (client.conf)
$config = [];
$config[] = '[Interface]';
if ($_POST['wg_pendpoint'] !== '') {
$config[] = 'Address = '.trim($_POST['wg_pendpoint']);
}
$config[] = 'PrivateKey = '.$wg_peerprivkey;
2021-03-04 23:06:27 +00:00
$config[] = '';
$config[] = '[Peer]';
$config[] = 'PublicKey = '.$_POST['wg-server'];
$config[] = 'AllowedIPs = '.$_POST['wg_pallowedips'];
$config[] = 'Endpoint = '.$_POST['wg_srvipaddress'];
$config[] = '';
$config = join(PHP_EOL, $config);
file_put_contents("/tmp/wgdata", $config);
system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_PATH.'client.conf', $return);
// handle log option
if ($_POST['wg_log'] == "1") {
exec("sudo /bin/systemctl status wg-quick@wg0 | sudo tee /tmp/wireguard.log > /dev/null");
}
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
if ($return == 0) {
$status->addMessage('Wireguard configuration updated successfully', 'success');
} else {
$status->addMessage('Wireguard configuration failed to be updated.', 'danger');
}
}
}