mirror of
https://git.zx2c4.com/wireguard-go
synced 2024-11-15 01:05:15 +01:00
ef8d6804d7
There are more places where we'll need to add it later, when Go 1.18 comes out with support for it in the "net" package. Also, allowedips still uses slices internally, which might be suboptimal. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
53 lines
1.3 KiB
Go
53 lines
1.3 KiB
Go
//go:build ignore
|
|
// +build ignore
|
|
|
|
/* SPDX-License-Identifier: MIT
|
|
*
|
|
* Copyright (C) 2019-2021 WireGuard LLC. All Rights Reserved.
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"io"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
|
|
"golang.zx2c4.com/go118/netip"
|
|
"golang.zx2c4.com/wireguard/conn"
|
|
"golang.zx2c4.com/wireguard/device"
|
|
"golang.zx2c4.com/wireguard/tun/netstack"
|
|
)
|
|
|
|
func main() {
|
|
tun, tnet, err := netstack.CreateNetTUN(
|
|
[]netip.Addr{netip.MustParseAddr("192.168.4.29")},
|
|
[]netip.Addr{netip.MustParseAddr("8.8.8.8"), netip.MustParseAddr("8.8.4.4")},
|
|
1420,
|
|
)
|
|
if err != nil {
|
|
log.Panic(err)
|
|
}
|
|
dev := device.NewDevice(tun, conn.NewDefaultBind(), device.NewLogger(device.LogLevelVerbose, ""))
|
|
dev.IpcSet(`private_key=a8dac1d8a70a751f0f699fb14ba1cff7b79cf4fbd8f09f44c6e6a90d0369604f
|
|
public_key=25123c5dcd3328ff645e4f2a3fce0d754400d3887a0cb7c56f0267e20fbf3c5b
|
|
endpoint=163.172.161.0:12912
|
|
allowed_ip=0.0.0.0/0
|
|
persistent_keepalive_interval=25
|
|
`)
|
|
dev.Up()
|
|
listener, err := tnet.ListenTCP(&net.TCPAddr{Port: 80})
|
|
if err != nil {
|
|
log.Panicln(err)
|
|
}
|
|
http.HandleFunc("/", func(writer http.ResponseWriter, request *http.Request) {
|
|
log.Printf("> %s - %s - %s", request.RemoteAddr, request.URL.String(), request.UserAgent())
|
|
io.WriteString(writer, "Hello from userspace TCP!")
|
|
})
|
|
err = http.Serve(listener, nil)
|
|
if err != nil {
|
|
log.Panicln(err)
|
|
}
|
|
}
|