mirror of
				https://github.com/billz/raspap-webgui.git
				synced 2025-03-01 10:31:47 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			317 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			PHP
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			317 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			PHP
		
	
	
		
			Executable File
		
	
	
	
	
<?php
 | 
						|
 | 
						|
require_once 'config.php';
 | 
						|
 | 
						|
/**
 | 
						|
 * Displays wireguard server & peer configuration
 | 
						|
 */
 | 
						|
function DisplayWireGuardConfig()
 | 
						|
{
 | 
						|
    $status = new \RaspAP\Messages\StatusMessage;
 | 
						|
    $parseFlag = true;
 | 
						|
    if (!RASPI_MONITOR_ENABLED) {
 | 
						|
        $optRules     = $_POST['wgRules'];
 | 
						|
        $optConf      = $_POST['wgCnfOpt'];
 | 
						|
        $optSrvEnable = $_POST['wgSrvEnable'];
 | 
						|
        $optLogEnable = $_POST['wgLogEnable'];
 | 
						|
        if (isset($_POST['savewgsettings']) && $optConf == 'manual' && $optSrvEnable == 1 ) {
 | 
						|
            SaveWireGuardConfig($status);
 | 
						|
        } elseif (isset($_POST['savewgsettings']) && $optConf == 'upload' && is_uploaded_file($_FILES["wgFile"]["tmp_name"])) {
 | 
						|
            SaveWireGuardUpload($status, $_FILES['wgFile'], $optRules);
 | 
						|
        } elseif (isset($_POST['savewgsettings']) && isset($_POST['wg_penabled']) ) {
 | 
						|
            SaveWireGuardConfig($status);
 | 
						|
        } elseif (isset($_POST['startwg'])) {
 | 
						|
            $status->addMessage('Attempting to start WireGuard', 'info');
 | 
						|
            exec('sudo /bin/systemctl start wg-quick@wg0', $return);
 | 
						|
            foreach ($return as $line) {
 | 
						|
                $status->addMessage($line, 'info');
 | 
						|
            }
 | 
						|
        } elseif (isset($_POST['stopwg'])) {
 | 
						|
            $status->addMessage('Attempting to stop WireGuard', 'info');
 | 
						|
            exec('sudo /bin/systemctl stop wg-quick@wg0', $return);
 | 
						|
            foreach ($return as $line) {
 | 
						|
                $status->addMessage($line, 'info');
 | 
						|
            }
 | 
						|
        }
 | 
						|
        CheckWireGuardLog( $optLogEnable, $status );
 | 
						|
    }
 | 
						|
 | 
						|
    // fetch server config
 | 
						|
    exec('sudo cat '. RASPI_WIREGUARD_CONFIG, $return);
 | 
						|
    $conf = ParseConfig($return, $parseFlag);
 | 
						|
    $wg_srvpubkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-server-public.key', $return);
 | 
						|
    $wg_srvport = ($conf['ListenPort'] == '') ? getDefaultNetValue('wireguard','server','ListenPort') : $conf['ListenPort'];
 | 
						|
    $wg_srvipaddress = ($conf['Address'] == '') ? getDefaultNetValue('wireguard','server','Address') : $conf['Address'];
 | 
						|
    $wg_srvdns = ($conf['DNS'] == '') ? getDefaultNetValue('wireguard','server','DNS') : $conf['DNS'];
 | 
						|
    if (is_array($wg_srvdns)) {
 | 
						|
        $wg_srvdns = implode(', ', $wg_srvdns);
 | 
						|
    }
 | 
						|
    $wg_peerpubkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-peer-public.key', $return);
 | 
						|
    if (sizeof($conf) >0) {
 | 
						|
        $wg_senabled = true;
 | 
						|
    }
 | 
						|
 | 
						|
    // fetch client config
 | 
						|
    exec('sudo cat '. RASPI_WIREGUARD_PATH.'client.conf', $preturn);
 | 
						|
    $conf = ParseConfig($preturn, $parseFlag);
 | 
						|
    $wg_pipaddress = ($conf['Address'] == '') ? getDefaultNetValue('wireguard','peer','Address') : $conf['Address'];
 | 
						|
    $wg_plistenport = ($conf['ListenPort'] == '') ? getDefaultNetValue('wireguard','peer','ListenPort') : $conf['ListenPort'];
 | 
						|
    $wg_pendpoint = ($conf['Endpoint'] == '') ? getDefaultNetValue('wireguard','peer','Endpoint') : $conf['Endpoint'];
 | 
						|
    $wg_pallowedips = ($conf['AllowedIPs'] == '') ? getDefaultNetValue('wireguard','peer','AllowedIPs') : $conf['AllowedIPs'];
 | 
						|
    $wg_pkeepalive = ($conf['PersistentKeepalive'] == '') ? getDefaultNetValue('wireguard','peer','PersistentKeepalive') : $conf['PersistentKeepalive'];
 | 
						|
    if (sizeof($conf) >0) {
 | 
						|
        $wg_penabled = true;
 | 
						|
    }
 | 
						|
 | 
						|
    // fetch service status
 | 
						|
    exec('systemctl is-active wg-quick@wg0', $wgstatus);
 | 
						|
    $serviceStatus = $wgstatus[0] == 'inactive' ? "down" : "up";
 | 
						|
    $wg_state = ($wgstatus[0] == 'active' ? true : false );
 | 
						|
    $public_ip = get_public_ip();
 | 
						|
 | 
						|
    echo renderTemplate(
 | 
						|
        "wireguard", compact(
 | 
						|
            "status",
 | 
						|
            "wg_state",
 | 
						|
            "serviceStatus",
 | 
						|
            "public_ip",
 | 
						|
            "optRules",
 | 
						|
            "optLogEnable",
 | 
						|
            "peer_id",
 | 
						|
            "wg_srvpubkey",
 | 
						|
            "wg_srvport",
 | 
						|
            "wg_srvipaddress",
 | 
						|
            "wg_srvdns",
 | 
						|
            "wg_senabled",
 | 
						|
            "wg_penabled",
 | 
						|
            "wg_pipaddress",
 | 
						|
            "wg_plistenport",
 | 
						|
            "wg_peerpubkey",
 | 
						|
            "wg_pendpoint",
 | 
						|
            "wg_pallowedips",
 | 
						|
            "wg_pkeepalive"
 | 
						|
        )
 | 
						|
    );
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * Validates uploaded .conf file, adds iptables post-up and
 | 
						|
 * post-down rules.
 | 
						|
 *
 | 
						|
 * @param  object $status
 | 
						|
 * @param  object $file
 | 
						|
 * @param  boolean $optRules
 | 
						|
 * @return object $status
 | 
						|
 */
 | 
						|
function SaveWireGuardUpload($status, $file, $optRules)
 | 
						|
{
 | 
						|
    define('KB', 1024);
 | 
						|
    $tmp_destdir = '/tmp/';
 | 
						|
    $auth_flag = 0;
 | 
						|
 | 
						|
    try {
 | 
						|
        // If undefined or multiple files, treat as invalid
 | 
						|
        if (!isset($file['error']) || is_array($file['error'])) {
 | 
						|
            throw new RuntimeException('Invalid parameters');
 | 
						|
        }
 | 
						|
 | 
						|
        $upload = \RaspAP\Uploader\FileUpload::factory('wg',$tmp_destdir);
 | 
						|
        $upload->set_max_file_size(64*KB);
 | 
						|
        $upload->set_allowed_mime_types(array('text/plain'));
 | 
						|
        $upload->file($file);
 | 
						|
 | 
						|
        $validation = new validation;
 | 
						|
        $upload->callbacks($validation, array('check_name_length'));
 | 
						|
        $results = $upload->upload();
 | 
						|
 | 
						|
        if (!empty($results['errors'])) {
 | 
						|
            throw new RuntimeException($results['errors'][0]);
 | 
						|
        }
 | 
						|
 | 
						|
        // Valid upload, get file contents
 | 
						|
        $tmp_wgconfig = $results['full_path'];
 | 
						|
        $tmp_contents = file_get_contents($tmp_wgconfig);
 | 
						|
 | 
						|
        // Set iptables rules
 | 
						|
        if (isset($optRules) && !preg_match('/PostUp|PostDown/m',$tmp_contents)) {
 | 
						|
            $rules[] = 'PostUp = '.getDefaultNetValue('wireguard','server','PostUp');
 | 
						|
            $rules[] = 'PostDown = '.getDefaultNetValue('wireguard','server','PostDown');
 | 
						|
            $rules[] = '';
 | 
						|
            $rules = join(PHP_EOL, $rules);
 | 
						|
            $rules = preg_replace('/wlan0/m', $_SESSION['ap_interface'], $rules);
 | 
						|
            $tmp_contents = preg_replace('/^\s*$/ms', $rules, $tmp_contents, 1);
 | 
						|
            file_put_contents($tmp_wgconfig, $tmp_contents);
 | 
						|
        }
 | 
						|
 | 
						|
        // Move processed file from tmp to destination
 | 
						|
        system("sudo mv $tmp_wgconfig ". RASPI_WIREGUARD_CONFIG, $return);
 | 
						|
 | 
						|
        if ($return ==0) {
 | 
						|
            $status->addMessage('WireGuard configuration uploaded successfully', 'info');
 | 
						|
        } else {
 | 
						|
            $status->addMessage('Unable to save WireGuard configuration', 'danger');
 | 
						|
        }
 | 
						|
        return $status;
 | 
						|
 | 
						|
    } catch (RuntimeException $e) {
 | 
						|
        $status->addMessage($e->getMessage(), 'danger');
 | 
						|
        return $status;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * Validate user input, save wireguard configuration
 | 
						|
 *
 | 
						|
 * @param object $status
 | 
						|
 * @return boolean
 | 
						|
 */
 | 
						|
function SaveWireGuardConfig($status)
 | 
						|
{
 | 
						|
    // Set defaults
 | 
						|
    $good_input = true;
 | 
						|
    $peer_id = 1;
 | 
						|
    // Validate server input
 | 
						|
    if ($_POST['wgSrvEnable'] == 1) {
 | 
						|
        if (isset($_POST['wg_srvport'])) {
 | 
						|
            if (strlen($_POST['wg_srvport']) > 5 || !is_numeric($_POST['wg_srvport'])) {
 | 
						|
                $status->addMessage('Invalid value for server local port', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_plistenport'])) {
 | 
						|
            if (strlen($_POST['wg_plistenport']) > 5 || !is_numeric($_POST['wg_plistenport'])) {
 | 
						|
                $status->addMessage('Invalid value for peer local port', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_srvipaddress'])) {
 | 
						|
            if (!validateCidr($_POST['wg_srvipaddress'])) {
 | 
						|
                $status->addMessage('Invalid value for server IP address', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_srvdns'])) {
 | 
						|
            if (!filter_var($_POST['wg_srvdns'],FILTER_VALIDATE_IP)) {
 | 
						|
                $status->addMessage('Invalid value for DNS', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
    // Validate peer input
 | 
						|
    if ($_POST['wg_penabled'] == 1) {
 | 
						|
        if (isset($_POST['wg_pipaddress'])) {
 | 
						|
            if (!validateCidr($_POST['wg_pipaddress'])) {
 | 
						|
                $status->addMessage('Invalid value for peer IP address', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_pendpoint']) && strlen(trim($_POST['wg_pendpoint']) >0 )) {
 | 
						|
            $wg_pendpoint_seg = substr($_POST['wg_pendpoint'],0,strpos($_POST['wg_pendpoint'],':'));
 | 
						|
            $host_port = explode(':', $wg_pendpoint_seg);
 | 
						|
            $hostname = $host_port[0];
 | 
						|
            if (!filter_var($hostname, FILTER_VALIDATE_IP) && 
 | 
						|
                !filter_var($hostname, FILTER_VALIDATE_DOMAIN, FILTER_FLAG_HOSTNAME)) {
 | 
						|
                $status->addMessage('Invalid value for endpoint address', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_pallowedips']) && strlen(trim($_POST['wg_pallowedips']) >0)) {
 | 
						|
            if (!validateCidr($_POST['wg_pallowedips'])) {
 | 
						|
                $status->addMessage('Invalid value for allowed IPs', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
        if (isset($_POST['wg_pkeepalive']) && strlen(trim($_POST['wg_pkeepalive']) >0 )) {
 | 
						|
            if (strlen($_POST['wg_pkeepalive']) > 4 || !is_numeric($_POST['wg_pkeepalive'])) {
 | 
						|
                $status->addMessage('Invalid value for persistent keepalive', 'danger');
 | 
						|
                $good_input = false;
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    // Save settings
 | 
						|
    if ($good_input) {
 | 
						|
        // server (wg0.conf)
 | 
						|
        if ($_POST['wgSrvEnable'] == 1) {
 | 
						|
            // fetch server private key from filesytem
 | 
						|
            $wg_srvprivkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-server-private.key', $return);
 | 
						|
            $config[] = '[Interface]';
 | 
						|
            $config[] = 'Address = '.$_POST['wg_srvipaddress'];
 | 
						|
            $config[] = 'ListenPort = '.$_POST['wg_srvport'];
 | 
						|
            $config[] = 'DNS = '.$_POST['wg_srvdns'];
 | 
						|
            $config[] = 'PrivateKey = '.$wg_srvprivkey;
 | 
						|
            $config[] = 'PostUp = '.getDefaultNetValue('wireguard','server','PostUp');
 | 
						|
            $config[] = 'PostDown = '.getDefaultNetValue('wireguard','server','PostDown');
 | 
						|
            $config[] = '';
 | 
						|
            $config[] = '[Peer]';
 | 
						|
            $config[] = 'PublicKey = '.$_POST['wg-peer'];
 | 
						|
            $config[] = 'AllowedIPs = '.$_POST['wg_pallowedips'];
 | 
						|
            if ($_POST['wg_pkeepalive'] !== '') {
 | 
						|
                $config[] = 'PersistentKeepalive = '.trim($_POST['wg_pkeepalive']);
 | 
						|
            }
 | 
						|
            $config[] = '';
 | 
						|
            $config = join(PHP_EOL, $config);
 | 
						|
 | 
						|
            file_put_contents("/tmp/wgdata", $config);
 | 
						|
            system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_CONFIG, $return);
 | 
						|
        } else {
 | 
						|
            # remove selected conf + keys
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-server-private.key', $return);
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-server-public.key', $return);
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_CONFIG, $return);
 | 
						|
        }
 | 
						|
        // client1 (client.conf)
 | 
						|
        if ($_POST['wg_penabled'] == 1) {
 | 
						|
            // fetch peer private key from filesystem 
 | 
						|
            $wg_peerprivkey = exec('sudo cat '. RASPI_WIREGUARD_PATH .'wg-peer-private.key', $return);
 | 
						|
            $config = [];
 | 
						|
            $config[] = '[Interface]';
 | 
						|
            $config[] = 'Address = '.trim($_POST['wg_pipaddress']);
 | 
						|
            $config[] = 'PrivateKey = '.$wg_peerprivkey;
 | 
						|
            $config[] = 'ListenPort = '.$_POST['wg_plistenport'];
 | 
						|
            $config[] = '';
 | 
						|
            $config[] = '[Peer]';
 | 
						|
            $config[] = 'PublicKey = '.$_POST['wg-server'];
 | 
						|
            $config[] = 'AllowedIPs = '.$_POST['wg_pallowedips'];
 | 
						|
            $config[] = 'Endpoint = '.$_POST['wg_pendpoint'];
 | 
						|
            if ($_POST['wg_pkeepalive'] !== '') {
 | 
						|
                $config[] = 'PersistentKeepalive = '.trim($_POST['wg_pkeepalive']);
 | 
						|
            }
 | 
						|
            $config[] = '';
 | 
						|
            $config = join(PHP_EOL, $config);
 | 
						|
 | 
						|
            file_put_contents("/tmp/wgdata", $config);
 | 
						|
            system('sudo cp /tmp/wgdata '.RASPI_WIREGUARD_PATH.'client.conf', $return);
 | 
						|
        } else {
 | 
						|
             # remove selected conf + keys
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-peer-private.key', $return);
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_PATH .'wg-peer-public.key', $return);
 | 
						|
            system('sudo rm '. RASPI_WIREGUARD_PATH.'client.conf', $return);
 | 
						|
        }
 | 
						|
 | 
						|
        foreach ($return as $line) {
 | 
						|
            $status->addMessage($line, 'info');
 | 
						|
        }
 | 
						|
        if ($return == 0) {
 | 
						|
            $status->addMessage('WireGuard configuration updated successfully', 'success');
 | 
						|
        } else {
 | 
						|
            $status->addMessage('WireGuard configuration failed to be updated', 'danger');
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 *
 | 
						|
 * @return object $status
 | 
						|
 */
 | 
						|
function CheckWireGuardLog( $opt, $status )
 | 
						|
{
 | 
						|
   // handle log option
 | 
						|
    if ( $opt == "1") {
 | 
						|
        exec("sudo journalctl --identifier wg-quick > /tmp/wireguard.log");
 | 
						|
        $status->addMessage('WireGuard debug log updated', 'success');
 | 
						|
    }
 | 
						|
    return $status;
 | 
						|
}
 | 
						|
 |