Compare commits
15 Commits
Author | SHA1 | Date | |
---|---|---|---|
a29f511550 | |||
fe92030438 | |||
80ee221226 | |||
9b0ed5a51b | |||
0d6564448a | |||
ba6342a71f | |||
631b1bf12e | |||
1ca4bd87b8 | |||
f8c7493e0d | |||
15747c6eee | |||
34bfe19158 | |||
ca1b66dc99 | |||
71de2d376c | |||
abe3d0dc33 | |||
a64ec2b5db |
@ -24,6 +24,8 @@ The program will convert IPv4-only wireguard-interfaces to IPv6. It converts and
|
|||||||
|
|
||||||
IPv6-Adresses are generated based on the IPv4-Adress.
|
IPv6-Adresses are generated based on the IPv4-Adress.
|
||||||
|
|
||||||
|
If not filtered out, then default routes (0.0.0.0/0) are handled specially and are converted to the IPv6 default route (::/0).
|
||||||
|
|
||||||
Beware: This program needs `NET_ADMIN` privileges for setting Adresses and to access the wireguard-daemon.
|
Beware: This program needs `NET_ADMIN` privileges for setting Adresses and to access the wireguard-daemon.
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -51,7 +53,8 @@ Variable|Description|Default
|
|||||||
-|-|-
|
-|-|-
|
||||||
`INTERFACE`* | Wireguard-Interface Name |
|
`INTERFACE`* | Wireguard-Interface Name |
|
||||||
`IPV6_FORMAT` | Format to use for converting v4 to v6 <br> The CIDR-Mask gets translated using 128 - 24 - Mask <br> e.g. `10.0.100.5/16` -> `fc12::0a00:6405/96` | `fc12::%02x%02x:%02x%02x/%d`
|
`IPV6_FORMAT` | Format to use for converting v4 to v6 <br> The CIDR-Mask gets translated using 128 - 24 - Mask <br> e.g. `10.0.100.5/16` -> `fc12::0a00:6405/96` | `fc12::%02x%02x:%02x%02x/%d`
|
||||||
`RECHECK_INTERVAL` | Interval in seconds to recheck AllowedIPs entries in case something changed | 300
|
`FILTER_PREFIX` | Prefix to filter for IP-Networks | `100.100`
|
||||||
|
`RECHECK_INTERVAL` | Interval in go-time-format to recheck AllowedIPs entries in case something changed | 5m
|
||||||
|
|
||||||
*\* Required*
|
*\* Required*
|
||||||
|
|
||||||
@ -81,7 +84,7 @@ Restart=always
|
|||||||
RestartSec=30
|
RestartSec=30
|
||||||
|
|
||||||
Environment="INTERFACE=wt0"
|
Environment="INTERFACE=wt0"
|
||||||
Environment="RECHECK_INTERVAL=60"
|
Environment="RECHECK_INTERVAL=60s"
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
13
build/Dockerfile
Normal file
13
build/Dockerfile
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# ---- Build ----
|
||||||
|
FROM golang:1.19-alpine AS build
|
||||||
|
WORKDIR /build
|
||||||
|
# Copy sources
|
||||||
|
ADD . .
|
||||||
|
# Get dependencies
|
||||||
|
RUN go get ./cmd/app
|
||||||
|
# Compile
|
||||||
|
RUN CGO_ENABLED=0 go build -a -o app ./cmd/app
|
||||||
|
|
||||||
|
# ---- Output ----
|
||||||
|
FROM scratch AS export-stage
|
||||||
|
COPY --from=build /build/app .
|
9
build/build-multiarch.sh
Executable file
9
build/build-multiarch.sh
Executable file
@ -0,0 +1,9 @@
|
|||||||
|
PLATFORM="linux/amd64,linux/arm64/v8,linux/arm/v7"
|
||||||
|
EXTRA_ARGS="$@"
|
||||||
|
|
||||||
|
docker buildx build \
|
||||||
|
--platform $PLATFORM \
|
||||||
|
-f $(dirname $0)/Dockerfile \
|
||||||
|
--output out \
|
||||||
|
$EXTRA_ARGS \
|
||||||
|
.
|
7
build/build-ownarch.sh
Executable file
7
build/build-ownarch.sh
Executable file
@ -0,0 +1,7 @@
|
|||||||
|
EXTRA_ARGS="$@"
|
||||||
|
|
||||||
|
docker build \
|
||||||
|
-f $(dirname $0)/Dockerfile \
|
||||||
|
--output out \
|
||||||
|
$EXTRA_ARGS \
|
||||||
|
.
|
@ -4,7 +4,6 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"strconv"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
envChecks "git.ruekov.eu/ruakij/routingtabletowg/lib/environmentchecks"
|
envChecks "git.ruekov.eu/ruakij/routingtabletowg/lib/environmentchecks"
|
||||||
@ -18,16 +17,17 @@ import (
|
|||||||
var envRequired = []string{
|
var envRequired = []string{
|
||||||
"INTERFACE",
|
"INTERFACE",
|
||||||
}
|
}
|
||||||
|
|
||||||
var envDefaults = map[string]string{
|
var envDefaults = map[string]string{
|
||||||
"IPV6_FORMAT": "fc12::%02x%02x:%02x%02x/%d",
|
"IPV6_FORMAT": "fc12::%02x%02x:%02x%02x/%d",
|
||||||
"FILTER_PREFIX": "100.100",
|
"FILTER_PREFIX": "100.100",
|
||||||
"RECHECK_INTERVAL": "300",
|
"RECHECK_INTERVAL": "5m",
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
// Environment-vars
|
// Environment-vars
|
||||||
err := envChecks.HandleRequired(envRequired)
|
err := envChecks.HandleRequired(envRequired)
|
||||||
if(err != nil){
|
if err != nil {
|
||||||
logger.Error.Fatal(err)
|
logger.Error.Fatal(err)
|
||||||
}
|
}
|
||||||
envChecks.HandleDefaults(envDefaults)
|
envChecks.HandleDefaults(envDefaults)
|
||||||
@ -40,7 +40,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
ipv6Format := os.Getenv("IPV6_FORMAT")
|
ipv6Format := os.Getenv("IPV6_FORMAT")
|
||||||
ipv6TestStr := *convertIPv4ToIPv6(&ipv6Format, &net.IPNet{IP: net.IPv4(1,1,1,1), Mask: net.CIDRMask(24, net.IPv4len)})
|
ipv6TestStr := *convertIPv4ToIPv6(&ipv6Format, &net.IPNet{IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, net.IPv4len)})
|
||||||
_, err = netlink.ParseIPNet(ipv6TestStr)
|
_, err = netlink.ParseIPNet(ipv6TestStr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error.Fatalf("IPV6_FORMAT is invalid: %s", err)
|
logger.Error.Fatalf("IPV6_FORMAT is invalid: %s", err)
|
||||||
@ -49,36 +49,9 @@ func main() {
|
|||||||
filterPrefix := os.Getenv("FILTER_PREFIX")
|
filterPrefix := os.Getenv("FILTER_PREFIX")
|
||||||
|
|
||||||
checkIntervalStr := os.Getenv("RECHECK_INTERVAL")
|
checkIntervalStr := os.Getenv("RECHECK_INTERVAL")
|
||||||
checkIntervalSec, err := strconv.Atoi(checkIntervalStr)
|
checkInterval, err := time.ParseDuration(checkIntervalStr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error.Fatalf("Couldn't read RECHECK_INTERVAL '%s': %s", checkIntervalStr, err)
|
logger.Error.Fatalf("Couldn't parse RECHECK_INTERVAL '%s': %s", checkIntervalStr, err)
|
||||||
}
|
|
||||||
checkInterval := time.Second * time.Duration(checkIntervalSec)
|
|
||||||
|
|
||||||
// Get the IPv4 address of the interface
|
|
||||||
addrs, err := netlink.AddrList(netInterface, netlink.FAMILY_V4)
|
|
||||||
if err != nil {
|
|
||||||
logger.Error.Fatal(err)
|
|
||||||
}
|
|
||||||
if(len(addrs) == 0){
|
|
||||||
logger.Error.Fatal("Interface doesnt have IPv4-Adresses")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add the IPv6 address to the interface
|
|
||||||
ipv6Str := *convertIPv4ToIPv6(&ipv6Format, addrs[0].IPNet)
|
|
||||||
ipv6, err := netlink.ParseAddr(ipv6Str)
|
|
||||||
if err != nil {
|
|
||||||
logger.Error.Fatal(err)
|
|
||||||
}
|
|
||||||
logger.Info.Printf("Adding converted %s -> %s to interface", addrs[0].IPNet.String(), ipv6Str)
|
|
||||||
err = netlink.AddrAdd(netInterface, ipv6)
|
|
||||||
if err != nil {
|
|
||||||
switch {
|
|
||||||
case os.IsExist(err):
|
|
||||||
logger.Warn.Println("Address is already set on interface")
|
|
||||||
default:
|
|
||||||
logger.Error.Fatalf("Failed to set address on interface: %v", err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create a WireGuard client
|
// Create a WireGuard client
|
||||||
@ -90,6 +63,44 @@ func main() {
|
|||||||
|
|
||||||
// Loop indefinitely
|
// Loop indefinitely
|
||||||
for {
|
for {
|
||||||
|
// Get the IPv4 addresses of the interface
|
||||||
|
addrs, err := netlink.AddrList(netInterface, netlink.FAMILY_V4)
|
||||||
|
if err != nil {
|
||||||
|
logger.Error.Fatal(err)
|
||||||
|
}
|
||||||
|
processedCount := 0
|
||||||
|
filteredCount := 0
|
||||||
|
for _, addr := range addrs {
|
||||||
|
// Check filter
|
||||||
|
if addr.String()[:len(filterPrefix)] != filterPrefix {
|
||||||
|
filteredCount++
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add the IPv6 address to the interface
|
||||||
|
ipv6Str := *convertIPv4ToIPv6(&ipv6Format, addr.IPNet)
|
||||||
|
ipv6, err := netlink.ParseAddr(ipv6Str)
|
||||||
|
if err != nil {
|
||||||
|
logger.Warn.Printf("failed parsing converted %s -> %s : %s", addr.IPNet.String(), ipv6Str, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Info.Printf("Adding converted %s -> %s to interface", addr.IPNet.String(), ipv6Str)
|
||||||
|
err = netlink.AddrAdd(netInterface, ipv6)
|
||||||
|
if err != nil {
|
||||||
|
switch {
|
||||||
|
case os.IsExist(err):
|
||||||
|
logger.Warn.Println("Address is already set on interface")
|
||||||
|
default:
|
||||||
|
logger.Error.Fatalf("Failed to set address on interface: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
processedCount++
|
||||||
|
}
|
||||||
|
if processedCount != len(addrs) {
|
||||||
|
logger.Warn.Printf("Not all Interface-Addresses were processed. Summary: %d processed, %d filtered, %d failed", processedCount, filteredCount, len(addrs)-processedCount-filteredCount)
|
||||||
|
}
|
||||||
|
|
||||||
// Get the WireGuard peers on the interface
|
// Get the WireGuard peers on the interface
|
||||||
wgDevice, err := client.Device(iface)
|
wgDevice, err := client.Device(iface)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -101,7 +112,7 @@ func main() {
|
|||||||
|
|
||||||
for _, peer := range wgDevice.Peers {
|
for _, peer := range wgDevice.Peers {
|
||||||
// Create slice for 1 expected addition
|
// Create slice for 1 expected addition
|
||||||
var addAllowedIPs = make([]net.IPNet, 0, 1)
|
addAllowedIPs := make([]net.IPNet, 0, 1)
|
||||||
|
|
||||||
// Loop through the allowed-ips and add the ones starting with 100.100
|
// Loop through the allowed-ips and add the ones starting with 100.100
|
||||||
for _, allowedIP := range peer.AllowedIPs {
|
for _, allowedIP := range peer.AllowedIPs {
|
||||||
@ -125,7 +136,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if(len(addAllowedIPs) > 0){
|
if len(addAllowedIPs) > 0 {
|
||||||
// Create peer-config
|
// Create peer-config
|
||||||
peerConfig := wgtypes.PeerConfig{
|
peerConfig := wgtypes.PeerConfig{
|
||||||
PublicKey: peer.PublicKey,
|
PublicKey: peer.PublicKey,
|
||||||
@ -137,11 +148,11 @@ func main() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if(len(wgConfig.Peers) == 0){
|
if len(wgConfig.Peers) == 0 {
|
||||||
logger.Info.Println("No changes, skipping")
|
logger.Info.Println("No changes, skipping")
|
||||||
} else {
|
} else {
|
||||||
err = client.ConfigureDevice(iface, wgConfig)
|
err = client.ConfigureDevice(iface, wgConfig)
|
||||||
if(err != nil){
|
if err != nil {
|
||||||
logger.Error.Fatalf("Error configuring wg-device '%s': %s", iface, err)
|
logger.Error.Fatalf("Error configuring wg-device '%s': %s", iface, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -151,7 +162,15 @@ func main() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func convertIPv4ToIPv6(ipv6Format *string, ipv4 *net.IPNet) (*string) {
|
func convertIPv4ToIPv6(ipv6Format *string, ipv4 *net.IPNet) *string {
|
||||||
|
// Check if this is a default route (0.0.0.0/0)
|
||||||
|
if ipv4.IP.Equal(net.IPv4zero) {
|
||||||
|
if ones, _ := ipv4.Mask.Size(); ones == 0 {
|
||||||
|
defaultRoute := "::/0"
|
||||||
|
return &defaultRoute
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
CIDR, _ := ipv4.Mask.Size()
|
CIDR, _ := ipv4.Mask.Size()
|
||||||
// Run format
|
// Run format
|
||||||
ipv6Str := fmt.Sprintf(*ipv6Format, (*ipv4).IP[0], (*ipv4).IP[1], (*ipv4).IP[2], (*ipv4).IP[3], net.IPv6len*8-(net.IPv4len*8-CIDR))
|
ipv6Str := fmt.Sprintf(*ipv6Format, (*ipv4).IP[0], (*ipv4).IP[1], (*ipv4).IP[2], (*ipv4).IP[3], net.IPv6len*8-(net.IPv4len*8-CIDR))
|
||||||
|
Loading…
x
Reference in New Issue
Block a user