summaryrefslogtreecommitdiff
path: root/src/daemon_network.rs
blob: 97349c82607eff684587d47f75442ca1ff3021fe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
use defguard_wireguard_rs::{
    host::Peer, key::Key, InterfaceConfiguration, WGApi, WireguardInterfaceApi,
};
//use log::{debug, error, info, warn};
use std::{
    collections::{BTreeSet, HashMap},
    net::ToSocketAddrs,
    sync::Arc,
};
use tokio::{net::TcpListener, sync::RwLock};

use crate::daemon::*;
use crate::daemon_config::*;

pub async fn add_network(
    name: String,
    privkey: String,
    address: String,
    port: u16,
    peers: &HashMap<Key, PeerConfig>,
) -> Result<(WGApi, BTreeSet<(String, String)>), DaemonError> {
    let mut hostname_pairs = BTreeSet::new();

    let wg = WGApi::new(name.clone(), false)?;
    let defguard_peers = peers
        .iter()
        .map(|(peer_key, p)| Peer {
            public_key: peer_key.clone(),
            preshared_key: p.psk.clone(),
            protocol_version: None,
            endpoint: p
                .endpoint
                .clone()
                .map(|e| match e {
                    Endpoint::Ip(ep) => Some(ep),
                    Endpoint::Domain(s, p) => (s, p)
                        .to_socket_addrs()
                        .ok()
                        .map(|mut it| it.next())
                        .flatten(),
                })
                .flatten(),
            last_handshake: None,
            tx_bytes: 0,
            rx_bytes: 0,
            persistent_keepalive_interval: None,
            allowed_ips: p.ips.iter().map(|(ip_mask, _)| ip_mask.clone()).collect(),
        })
        .collect();
    wg.create_interface()?;
    wg.configure_interface(&InterfaceConfiguration {
        name: name.clone(),
        prvkey: privkey,
        address: address,
        port: port as u32,
        peers: defguard_peers,
    })?;

    peers
        .values()
        .map(|peer| {
            if peer.use_hostnames {
                peer.ips
                    .iter()
                    .map(|(mask, may_dom)| {
                        if let Some(dom) = may_dom {
                            hostname_pairs.insert((format!("{}", mask.ip), dom.clone()));
                        }
                    })
                    .count();
            }
        })
        .count();

    Ok((wg, hostname_pairs))
}

pub async fn run_network(
    state: Arc<RwLock<State>>,
    sock: TcpListener,
    nw_name: String,
) -> Result<(), DaemonError> {
    Ok(())
}