dsnet/reporttypes.go
2020-03-05 23:56:24 +00:00

158 lines
3.8 KiB
Go

package dsnet
import (
"encoding/json"
"io/ioutil"
"net"
"os"
"time"
"github.com/go-playground/validator/v10"
"golang.zx2c4.com/wireguard/wgctrl/wgtypes"
)
type Status int
const (
StatusUnknown = iota
// Host has not been loaded into wireguard yet
StatusSyncRequired
// Host has not transferred anything (not even a keepalive) for 30 seconds
StatusOffline
// Host has transferred something in the last 30 seconds, keepalive counts
StatusOnline
// Host has not connected for 28 days and may be removed
StatusExpired
)
// TODO pending/unknown
func (s Status) String() string {
switch s {
case StatusSyncRequired:
return "syncrequired"
case StatusOffline:
return "offline"
case StatusOnline:
return "online"
case StatusExpired:
return "expired"
default:
return "unknown"
}
}
// note unmarshal not required
func (s Status) MarshalJSON() ([]byte, error) {
return []byte("\"" + s.String() + "\""), nil
}
type DsnetReport struct {
ExternalIP net.IP
InterfaceName string
ListenPort int
// domain to append to hostnames. Relies on separate DNS server for
// resolution. Informational only.
Domain string
IP net.IP
// IP network from which to allocate automatic sequential addresses
// Network is chosen randomly when not specified
Network JSONIPNet
DNS net.IP
Peers []PeerReport
}
func GenerateReport(dev *wgtypes.Device, conf *DsnetConfig, oldReport *DsnetReport) DsnetReport {
wgPeerIndex := make(map[wgtypes.Key]wgtypes.Peer)
peerReports := make([]PeerReport, len(conf.Peers))
for _, peer := range dev.Peers {
wgPeerIndex[peer.PublicKey] = peer
}
for i, peer := range conf.Peers {
wgPeer, known := wgPeerIndex[peer.PublicKey.Key]
status := Status(StatusUnknown)
if !known {
status = StatusSyncRequired
} else if wgPeer.LastHandshakeTime.After(time.Now().Add(-TIMEOUT)) {
status = StatusOnline
// TODO same test but with rx byte data from last report (otherwise
// peer can fake online status by disabling handshake)
} else {
status = StatusOffline
}
peerReports[i] = PeerReport{
Hostname: peer.Hostname,
Owner: peer.Owner,
Description: peer.Description,
IP: peer.IP,
Status: status,
Networks: peer.Networks,
LastHandshakeTime: wgPeer.LastHandshakeTime,
ReceiveBytes: wgPeer.ReceiveBytes,
TransmitBytes: wgPeer.TransmitBytes,
}
}
return DsnetReport{
ExternalIP: conf.ExternalIP,
InterfaceName: conf.InterfaceName,
ListenPort: conf.ListenPort,
Domain: conf.Domain,
IP: conf.IP,
Network: conf.Network,
DNS: conf.DNS,
Peers: peerReports,
}
}
func (report *DsnetReport) MustSave(filename string) {
_json, _ := json.MarshalIndent(report, "", " ")
err := ioutil.WriteFile(filename, _json, 0644)
check(err)
}
func MustLoadDsnetReport() *DsnetReport {
raw, err := ioutil.ReadFile(CONFIG_FILE)
if os.IsNotExist(err) {
return nil
} else if os.IsPermission(err) {
ExitFail("%s cannot be accessed. Check read permissions.", CONFIG_FILE)
} else {
check(err)
}
report := DsnetReport{}
err = json.Unmarshal(raw, &report)
check(err)
err = validator.New().Struct(report)
check(err)
return &report
}
type PeerReport struct {
// Used to update DNS
Hostname string
// username of person running this host/router
Owner string
// Description of what the host is and/or does
Description string
// Internal VPN IP address. Added to AllowedIPs in server config as a /32
IP net.IP
Status Status
// TODO ExternalIP support (Endpoint)
//ExternalIP net.UDPAddr `validate:"required,udp4_addr"`
// TODO support routing additional networks (AllowedIPs)
Networks []JSONIPNet
LastHandshakeTime time.Time
ReceiveBytes int64
TransmitBytes int64
}