mirror of
https://github.com/tailscale/tailscale.git
synced 2024-12-04 23:45:34 +00:00
7ee891f5fd
For historical reasons, we ended up with two near-duplicate copies of curve25519 key types, one in the wireguard-go module (wgcfg) and one in the tailscale module (types/wgkey). Then we moved wgcfg to the tailscale module. We can now remove the wgcfg key type in favor of wgkey. Signed-off-by: Josh Bleecher Snyder <josharian@gmail.com>
73 lines
2.0 KiB
Go
73 lines
2.0 KiB
Go
// Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// Package wgcfg has types and a parser for representing WireGuard config.
|
|
package wgcfg
|
|
|
|
import (
|
|
"inet.af/netaddr"
|
|
"tailscale.com/types/wgkey"
|
|
)
|
|
|
|
// EndpointDiscoSuffix is appended to the hex representation of a peer's discovery key
|
|
// and is then the sole wireguard endpoint for peers with a non-zero discovery key.
|
|
// This form is then recognize by magicsock's CreateEndpoint.
|
|
const EndpointDiscoSuffix = ".disco.tailscale:12345"
|
|
|
|
// Config is a WireGuard configuration.
|
|
// It only supports the set of things Tailscale uses.
|
|
type Config struct {
|
|
Name string
|
|
PrivateKey wgkey.Private
|
|
Addresses []netaddr.IPPrefix
|
|
MTU uint16
|
|
DNS []netaddr.IP
|
|
Peers []Peer
|
|
}
|
|
|
|
type Peer struct {
|
|
PublicKey wgkey.Key
|
|
AllowedIPs []netaddr.IPPrefix
|
|
Endpoints string // comma-separated host/port pairs: "1.2.3.4:56,[::]:80"
|
|
PersistentKeepalive uint16
|
|
}
|
|
|
|
// Copy makes a deep copy of Config.
|
|
// The result aliases no memory with the original.
|
|
func (cfg Config) Copy() Config {
|
|
res := cfg
|
|
if res.Addresses != nil {
|
|
res.Addresses = append([]netaddr.IPPrefix{}, res.Addresses...)
|
|
}
|
|
if res.DNS != nil {
|
|
res.DNS = append([]netaddr.IP{}, res.DNS...)
|
|
}
|
|
peers := make([]Peer, 0, len(res.Peers))
|
|
for _, peer := range res.Peers {
|
|
peers = append(peers, peer.Copy())
|
|
}
|
|
res.Peers = peers
|
|
return res
|
|
}
|
|
|
|
// Copy makes a deep copy of Peer.
|
|
// The result aliases no memory with the original.
|
|
func (peer Peer) Copy() Peer {
|
|
res := peer
|
|
if res.AllowedIPs != nil {
|
|
res.AllowedIPs = append([]netaddr.IPPrefix{}, res.AllowedIPs...)
|
|
}
|
|
return res
|
|
}
|
|
|
|
// PeerWithKey returns the Peer with key k and reports whether it was found.
|
|
func (config Config) PeerWithKey(k wgkey.Key) (Peer, bool) {
|
|
for _, p := range config.Peers {
|
|
if p.PublicKey == k {
|
|
return p, true
|
|
}
|
|
}
|
|
return Peer{}, false
|
|
}
|