| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110 | package wireguardimport (	"context"	"errors"	"fmt"	"net/netip"	"strings"	"github.com/xtls/xray-core/common"	"github.com/xtls/xray-core/common/log"	"golang.zx2c4.com/wireguard/device")var wgLogger = &device.Logger{	Verbosef: func(format string, args ...any) {		log.Record(&log.GeneralMessage{			Severity: log.Severity_Debug,			Content:  fmt.Sprintf(format, args...),		})	},	Errorf: func(format string, args ...any) {		log.Record(&log.GeneralMessage{			Severity: log.Severity_Error,			Content:  fmt.Sprintf(format, args...),		})	},}func init() {	common.Must(common.RegisterConfig((*DeviceConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {		deviceConfig := config.(*DeviceConfig)		if deviceConfig.IsClient {			return New(ctx, deviceConfig)		} else {			return NewServer(ctx, deviceConfig)		}	}))}// convert endpoint string to netip.Addrfunc parseEndpoints(conf *DeviceConfig) ([]netip.Addr, bool, bool, error) {	var hasIPv4, hasIPv6 bool	endpoints := make([]netip.Addr, len(conf.Endpoint))	for i, str := range conf.Endpoint {		var addr netip.Addr		if strings.Contains(str, "/") {			prefix, err := netip.ParsePrefix(str)			if err != nil {				return nil, false, false, err			}			addr = prefix.Addr()			if prefix.Bits() != addr.BitLen() {				return nil, false, false, errors.New("interface address subnet should be /32 for IPv4 and /128 for IPv6")			}		} else {			var err error			addr, err = netip.ParseAddr(str)			if err != nil {				return nil, false, false, err			}		}		endpoints[i] = addr		if addr.Is4() {			hasIPv4 = true		} else if addr.Is6() {			hasIPv6 = true		}	}	return endpoints, hasIPv4, hasIPv6, nil}// serialize the config into an IPC requestfunc createIPCRequest(conf *DeviceConfig) string {	var request strings.Builder	request.WriteString(fmt.Sprintf("private_key=%s\n", conf.SecretKey))	if !conf.IsClient {		// placeholder, we'll handle actual port listening on Xray		request.WriteString("listen_port=1337\n")	}	for _, peer := range conf.Peers {		if peer.PublicKey != "" {			request.WriteString(fmt.Sprintf("public_key=%s\n", peer.PublicKey))		}		if peer.PreSharedKey != "" {			request.WriteString(fmt.Sprintf("preshared_key=%s\n", peer.PreSharedKey))		}		if peer.Endpoint != "" {			request.WriteString(fmt.Sprintf("endpoint=%s\n", peer.Endpoint))		}		for _, ip := range peer.AllowedIps {			request.WriteString(fmt.Sprintf("allowed_ip=%s\n", ip))		}		if peer.KeepAlive != 0 {			request.WriteString(fmt.Sprintf("persistent_keepalive_interval=%d\n", peer.KeepAlive))		}	}	return request.String()[:request.Len()]}
 |