1
0
mirror of https://github.com/billz/raspap-webgui.git synced 2023-10-10 13:37:24 +02:00
raspap-webgui/includes/wireguard.php

108 lines
3.8 KiB
PHP
Raw Normal View History

2020-04-20 13:53:46 +02:00
<?php
require_once 'includes/status_messages.php';
require_once 'config.php';
/**
* Manage WireGuard configuration
*/
function DisplayWireGuardConfig()
{
$status = new StatusMessages();
if (!RASPI_MONITOR_ENABLED) {
if (isset($_POST['savewgettings'])) {
2020-08-27 00:54:49 +02:00
// Validate input
$good_input = true;
$peer_id = 1;
if (isset($_POST['peer_id'])) {
$peer_id = escapeshellarg($_POST['peer_id']);
2020-04-20 13:53:46 +02:00
}
2020-08-25 23:11:27 +02:00
if (isset($_POST['wg_endpoint'])) {
2020-08-27 00:54:49 +02:00
if (!filter_var($_POST['wg_endpoint'], FILTER_VALIDATE_IP)) {
$status->addMessage('Invalid value for endpoint address', 'danger');
$good_input = false;
} else {
$wg_endpoint = escapeshellarg($_POST['wg_endpoint']);
}
2020-04-20 13:53:46 +02:00
}
2020-08-25 23:11:27 +02:00
if (isset($_POST['wg_allowedips'])) {
2020-08-27 00:54:49 +02:00
if (!filter_var($_POST['wg_allowedips'], FILTER_VALIDATE_IP)) {
$status->addMessage('Invalid value for allowed IPs', 'danger');
$good_input = false;
} else {
$wg_allowedips = escapeshellarg($_POST['wg_allowedips']);
}
2020-08-25 23:11:27 +02:00
}
if (isset($_POST['wg_pkeepalive'])) {
2020-08-27 00:54:49 +02:00
if (strlen($_POST['wg_pkeepalive']) > 4 || !is_numeric($_POST['wg_pkeepalive'])) {
$status->addMessage('Invalid value for persistent keepalive', 'danger');
$good_input = false;
} else {
$wg_pkeepalive = escapeshellarg($_POST['wg_pkeepalive']);
}
2020-08-25 23:11:27 +02:00
}
if (isset($_POST['wg_peerpubkey'])) {
$wg_endpoint = strip_tags(trim($_POST['wg_peerpubkey']));
}
2020-08-27 00:54:49 +02:00
// Save settings
if ($good_input) {
file_put_contents("/tmp/wgdata", $config);
system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_CONFIG, $return);
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
}
2020-08-25 23:11:27 +02:00
if ($return == 0) {
$status->addMessage('Wireguard configuration updated successfully', 'success');
} else {
$status->addMessage('Wireguard configuration failed to be updated.', 'danger');
}
2020-04-20 13:53:46 +02:00
} elseif (isset($_POST['startwg'])) {
$status->addMessage('Attempting to start WireGuard', 'info');
2020-04-22 11:01:31 +02:00
exec('sudo /usr/bin/wg-quick up wg0', $return);
2020-04-20 13:53:46 +02:00
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
} elseif (isset($_POST['stopwg'])) {
$status->addMessage('Attempting to stop WireGuard', 'info');
2020-04-22 11:01:31 +02:00
exec('sudo /usr/bin/wg-quick down wg0', $return);
2020-04-20 13:53:46 +02:00
foreach ($return as $line) {
$status->addMessage($line, 'info');
}
}
}
2020-08-27 00:54:49 +02:00
// fetch wg config
exec('sudo cat '. RASPI_WIREGUARD_CONFIG, $return);
$conf = ParseConfig($return);
$wg_port = $conf['ListenPort'];
$wg_ipaddress = $conf['Address'];
$wg_pubkey = $conf['PublicKey'];
$wg_endpoint = $conf['Endpoint'];
$wg_allowedips = $conf['AllowedIPs'];
$wg_pkeepalive = $conf['PersistentKeepalive'];
2020-04-20 13:53:46 +02:00
2020-08-27 00:54:49 +02:00
// fetch service status
exec('pidof wg-crypt-wg0 | wc -l', $wgstatus);
2020-04-20 13:53:46 +02:00
$serviceStatus = $wgstatus[0] == 0 ? "down" : "up";
2020-04-22 11:01:31 +02:00
$wg_state = ($wgstatus[0] > 0);
2020-04-20 13:53:46 +02:00
echo renderTemplate(
"wireguard", compact(
"status",
2020-04-22 11:01:31 +02:00
"wg_state",
2020-08-25 23:11:27 +02:00
"serviceStatus",
"endpoint_enable",
"peer_id",
2020-08-27 00:54:49 +02:00
"wg_port",
"wg_ipaddress",
"wg_pubkey",
2020-08-25 23:11:27 +02:00
"wg_endpoint",
"wg_allowedips",
2020-08-27 00:54:49 +02:00
"wg_pkeepalive"
2020-04-20 13:53:46 +02:00
)
);
}