2024-05-03 17:07:09 +00:00
|
|
|
# PolyculeNetwork
|
|
|
|
# Copyright (C) 2024 PolyculeConnect
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2024-05-02 09:31:34 +00:00
|
|
|
import os
|
2024-07-30 07:50:47 +00:00
|
|
|
from ipaddress import IPv4Address, IPv4Network
|
2024-05-02 09:31:34 +00:00
|
|
|
import tomllib
|
|
|
|
import jinja2
|
|
|
|
|
|
|
|
|
2024-07-04 12:43:27 +00:00
|
|
|
dry_run = False
|
2024-05-03 17:07:09 +00:00
|
|
|
if dry_run:
|
|
|
|
run = print
|
|
|
|
else:
|
|
|
|
run = os.system
|
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
class Config:
|
|
|
|
def __init__(self, path):
|
|
|
|
with open(path, "rb") as f:
|
|
|
|
data = tomllib.load(f)
|
|
|
|
self.data = data
|
|
|
|
self.networks = data["network"].keys()
|
|
|
|
self.local_network = os.environ.get('LOCAL_NETWORK')
|
|
|
|
self.remote_networks = list(filter(lambda k: k != self.local_network, self.networks))
|
|
|
|
|
|
|
|
self.local_range = str(IPv4Network(data["network"][self.local_network]["local_range"]))
|
|
|
|
self.local_translated_range = str(IPv4Network(data["network"][self.local_network]["local_translated_range"]))
|
|
|
|
self.remote_ranges = [str(IPv4Network(data["network"][net]["local_translated_range"])) for net in self.remote_networks]
|
|
|
|
|
|
|
|
self.dns_servers = []
|
|
|
|
for net in self.networks:
|
|
|
|
for domain in data["network"][net]["dns"].keys():
|
|
|
|
self.dns_servers.append({
|
|
|
|
"ip": data["network"][net]["dns"][domain],
|
|
|
|
"domain": domain,
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def load_firewall(config):
|
2024-07-04 12:43:27 +00:00
|
|
|
run("nft -f templates/rules.nft")
|
2024-05-03 17:07:09 +00:00
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
run(f"nft add element ip filter local_range {{ {config.local_range} }}")
|
|
|
|
run(f"nft add element ip filter local_translated_range {{ {config.local_translated_range} }}")
|
|
|
|
for net in config.remote_ranges:
|
2024-07-04 12:43:27 +00:00
|
|
|
run(f"nft add element ip filter remote_range {{ {net} }}")
|
2024-05-02 09:31:34 +00:00
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
for (loc, trans) in zip(IPv4Network(config.local_range), IPv4Network(config.local_translated_range)):
|
2024-07-04 12:43:27 +00:00
|
|
|
run(f"nft add element ip filter ip_map_snat {{ {loc} : {trans} }}")
|
|
|
|
run(f"nft add element ip filter ip_map_dnat {{ {trans} : {loc} }}")
|
2024-05-02 09:31:34 +00:00
|
|
|
|
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
def load_wireguard(config):
|
2024-05-03 17:07:09 +00:00
|
|
|
with open("templates/wg-pn.conf.j2", "r") as f:
|
|
|
|
env = jinja2.Environment()
|
|
|
|
template = env.from_string(f.read())
|
2024-05-02 09:31:34 +00:00
|
|
|
|
2024-05-03 17:07:09 +00:00
|
|
|
peers = []
|
2024-05-02 09:31:34 +00:00
|
|
|
|
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
for net in config.remote_networks:
|
2024-05-03 17:07:09 +00:00
|
|
|
peer = {
|
2024-07-30 07:50:47 +00:00
|
|
|
"public_key": config.data["network"][net]["public_key"],
|
2024-05-03 17:07:09 +00:00
|
|
|
}
|
2024-05-02 09:31:34 +00:00
|
|
|
|
2024-07-30 07:50:47 +00:00
|
|
|
endpoint = config.data["network"][net].get("endpoint", "")
|
2024-05-03 17:07:09 +00:00
|
|
|
if endpoint != "":
|
|
|
|
peer["endpoint"] = endpoint
|
|
|
|
|
2024-05-02 09:31:34 +00:00
|
|
|
|
2024-07-30 12:55:06 +00:00
|
|
|
peer["allowed_ips"] = config.data["network"][net]["local_translated_range"] + ", " + config.data["network"][net]["wireguard_address"]
|
2024-07-30 07:50:47 +00:00
|
|
|
untranslated_networks = config.data["network"][net].get("untranslated_networks", "")
|
2024-05-03 17:07:09 +00:00
|
|
|
if untranslated_networks != "":
|
|
|
|
peer["allowed_ips"] += ", " + untranslated_networks
|
2024-05-02 09:31:34 +00:00
|
|
|
|
|
|
|
|
2024-05-03 17:07:09 +00:00
|
|
|
peers.append(peer)
|
2024-05-02 09:31:34 +00:00
|
|
|
|
|
|
|
|
2024-05-03 17:07:09 +00:00
|
|
|
with open("wg-pn.conf", "w") as f:
|
|
|
|
f.write(template.render(
|
2024-07-04 12:43:27 +00:00
|
|
|
private_key=os.environ.get('PRIVATE_KEY'),
|
|
|
|
listen_port=os.environ.get('LISTEN_PORT', "51820"),
|
2024-07-30 07:50:47 +00:00
|
|
|
wireguard_address=config.data["network"][config.local_network]["wireguard_address"],
|
2024-05-03 17:07:09 +00:00
|
|
|
peers=peers
|
|
|
|
))
|
2024-05-02 09:31:34 +00:00
|
|
|
|
2024-07-30 12:55:06 +00:00
|
|
|
config = Config("/config/config.toml")
|
2024-07-30 07:50:47 +00:00
|
|
|
load_firewall(config)
|
|
|
|
load_wireguard(config)
|
2024-07-05 13:59:47 +00:00
|
|
|
|
2024-07-30 12:55:06 +00:00
|
|
|
run("wg-quick up ./wg-pn.conf")
|
2024-07-30 07:50:47 +00:00
|
|
|
import dns
|
|
|
|
dns.run(config, port=5353)
|