diff options
author | Daniil Baturin <daniil@vyos.io> | 2023-12-09 16:31:44 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-12-09 16:31:44 +0000 |
commit | 48e512ffec259d8753a8fd5a0a6a961f332ab8c1 (patch) | |
tree | 43a1213ffb6d4ed5550aaf6397d51752c7082a13 /src | |
parent | 5d42ac22b2dd152327ed7c12d13faf01268dd363 (diff) | |
parent | 2c1c3613567e23e14ce89bbf872e6e9dee16badb (diff) | |
download | vyos-1x-48e512ffec259d8753a8fd5a0a6a961f332ab8c1.tar.gz vyos-1x-48e512ffec259d8753a8fd5a0a6a961f332ab8c1.zip |
Merge pull request #2540 from aapostoliuk/T5413-equuleus
wireguard: T5413: Blocked adding the peer with the router's public key
Diffstat (limited to 'src')
-rwxr-xr-x | src/conf_mode/interfaces-wireguard.py | 8 | ||||
-rwxr-xr-x | src/migration-scripts/interfaces/22-to-23 | 58 |
2 files changed, 65 insertions, 1 deletions
diff --git a/src/conf_mode/interfaces-wireguard.py b/src/conf_mode/interfaces-wireguard.py index b28aa9568..5748bf483 100755 --- a/src/conf_mode/interfaces-wireguard.py +++ b/src/conf_mode/interfaces-wireguard.py @@ -1,6 +1,6 @@ #!/usr/bin/env python3 # -# Copyright (C) 2018-2020 VyOS maintainers and contributors +# Copyright (C) 2018-2023 VyOS maintainers and contributors # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 or later as @@ -28,6 +28,7 @@ from vyos.configverify import verify_bridge_delete from vyos.configverify import verify_mtu_ipv6 from vyos.configverify import verify_bond_bridge_member from vyos.ifconfig import WireGuardIf +from vyos.validate import is_wireguard_key_pair from vyos.util import check_kmod from vyos import ConfigError from vyos import airbag @@ -94,6 +95,11 @@ def verify(wireguard): raise ConfigError('Both Wireguard port and address must be defined ' f'for peer "{tmp}" if either one of them is set!') + if 'disable' not in peer: + with open(wireguard['private_key'], 'r') as file: + private_key = file.read().rstrip() + if is_wireguard_key_pair(private_key, peer['pubkey']): + raise ConfigError(f'Peer "{tmp}" has the same public key as the interface "{wireguard["ifname"]}"') def apply(wireguard): tmp = WireGuardIf(wireguard['ifname']) if 'deleted' in wireguard: diff --git a/src/migration-scripts/interfaces/22-to-23 b/src/migration-scripts/interfaces/22-to-23 new file mode 100755 index 000000000..c3c4ea366 --- /dev/null +++ b/src/migration-scripts/interfaces/22-to-23 @@ -0,0 +1,58 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2023 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +import sys +from vyos.configtree import ConfigTree +from vyos.validate import is_wireguard_key_pair + +if __name__ == '__main__': + if len(sys.argv) < 2: + print("Must specify file name!") + sys.exit(1) + + file_name = sys.argv[1] + + with open(file_name, 'r') as f: + config_file = f.read() + + config = ConfigTree(config_file) + base = ['interfaces', 'wireguard'] + if not config.exists(base): + # Nothing to do + sys.exit(0) + for interface in config.list_nodes(base): + private_key_name = config.return_value( + base + [interface, 'private-key']) + private_key_path = f'/config/auth/wireguard/{private_key_name}/private.key' + with open(private_key_path, 'r') as file: + private_key = file.read().rstrip() + interface_base = base + [interface] + if config.exists(interface_base + ['peer']): + for peer in config.list_nodes(interface_base + ['peer']): + peer_base = interface_base + ['peer', peer] + peer_public_key = config.return_value(peer_base + ['pubkey']) + if config.exists(peer_base + ['pubkey']): + if not config.exists(peer_base + ['disable']) \ + and is_wireguard_key_pair(private_key, + peer_public_key): + config.set(peer_base + ['disable']) + + try: + with open(file_name, 'w') as f: + f.write(config.to_string()) + except OSError as e: + print("Failed to save the modified config: {}".format(e)) + sys.exit(1) |