mirror of
https://github.com/Ysurac/openmptcprouter-vps-admin.git
synced 2025-03-09 15:40:05 +00:00
Add wireguard support
This commit is contained in:
parent
5a96364f77
commit
7458c7ade2
1 changed files with 44 additions and 1 deletions
45
omr-admin.py
45
omr-admin.py
|
@ -1290,6 +1290,15 @@ async def config(userid: Optional[int] = Query(None), serial: Optional[str] = Qu
|
|||
mlvpn_host_ip = '10.255.253.1'
|
||||
mlvpn_client_ip = '10.255.253.2'
|
||||
|
||||
LOG.debug('Get config... wireguard')
|
||||
if os.path.isfile('/etc/wireguard/vpn-server-private.key'):
|
||||
with open('/etc/wireguard/vpn-server-private.key', "rb") as wgkey_file:
|
||||
wireguard_key = wgkey_file.read()
|
||||
else:
|
||||
wireguard_key = ''
|
||||
wireguard_host_ip = '10.255.247.1'
|
||||
wireguard_port = '65311'
|
||||
|
||||
gre_tunnel = False
|
||||
gre_tunnel_conf = []
|
||||
# for tunnel in pathlib.Path('/etc/openmptcprouter-vps-admin/intf').glob('gre-user' + str(userid) + '-ip*'):
|
||||
|
@ -1465,7 +1474,7 @@ async def config(userid: Optional[int] = Query(None), serial: Optional[str] = Qu
|
|||
if '#DNAT net vpn:$OMR_ADDR tcp 1-64999' in line:
|
||||
shorewall_redirect = "disable"
|
||||
LOG.debug('Get config: done')
|
||||
return {'vps': {'kernel': vps_kernel, 'machine': vps_machine, 'omr_version': vps_omr_version, 'loadavg': vps_loadavg, 'uptime': vps_uptime, 'aes': vps_aes}, 'shadowsocks': {'traffic': ss_traffic, 'key': shadowsocks_key, 'port': shadowsocks_port, 'method': shadowsocks_method, 'fast_open': shadowsocks_fast_open, 'reuse_port': shadowsocks_reuse_port, 'no_delay': shadowsocks_no_delay, 'mptcp': shadowsocks_mptcp, 'ebpf': shadowsocks_ebpf, 'obfs': shadowsocks_obfs, 'obfs_plugin': shadowsocks_obfs_plugin, 'obfs_type': shadowsocks_obfs_type}, 'glorytun': {'key': glorytun_key, 'udp': {'host_ip': glorytun_udp_host_ip, 'client_ip': glorytun_udp_client_ip}, 'tcp': {'host_ip': glorytun_tcp_host_ip, 'client_ip': glorytun_tcp_client_ip}, 'port': glorytun_port, 'chacha': glorytun_chacha}, 'dsvpn': {'key': dsvpn_key, 'host_ip': dsvpn_host_ip, 'client_ip': dsvpn_client_ip, 'port': dsvpn_port}, 'openvpn': {'key': openvpn_key, 'client_key': openvpn_client_key, 'client_crt': openvpn_client_crt, 'client_ca': openvpn_client_ca, 'host_ip': openvpn_host_ip, 'client_ip': openvpn_client_ip, 'port': openvpn_port, 'cipher': openvpn_cipher}, 'mlvpn': {'key': mlvpn_key, 'host_ip': mlvpn_host_ip, 'client_ip': mlvpn_client_ip}, 'shorewall': {'redirect_ports': shorewall_redirect}, 'mptcp': {'enabled': mptcp_enabled, 'checksum': mptcp_checksum, 'path_manager': mptcp_path_manager, 'scheduler': mptcp_scheduler, 'syn_retries': mptcp_syn_retries}, 'network': {'congestion_control': congestion_control, 'ipv6_network': ipv6_network, 'ipv6': ipv6_addr, 'ipv4': ipv4_addr, 'domain': vps_domain, 'internet': internet}, 'vpn': {'available': available_vpn, 'current': vpn, 'remoteip': vpn_remote_ip, 'localip': vpn_local_ip, 'rx': vpn_traffic_rx, 'tx': vpn_traffic_tx}, 'iperf': {'user': 'openmptcprouter', 'password': 'openmptcprouter', 'key': iperf3_key}, 'pihole': {'state': pihole}, 'user': {'name': username, 'permission': user_permissions}, 'ip6in4': {'localip': localip6, 'remoteip': remoteip6, 'ula': ula}, 'client2client': {'enabled': client2client, 'lanips': alllanips}, 'gre_tunnel': {'enabled': gre_tunnel, 'config': gre_tunnel_conf}, 'v2ray': {'enabled': v2ray, 'config': v2ray_conf, 'tx': v2ray_tx, 'rx': v2ray_rx}, 'proxy': {'available': available_proxy, 'current': proxy}}
|
||||
return {'vps': {'kernel': vps_kernel, 'machine': vps_machine, 'omr_version': vps_omr_version, 'loadavg': vps_loadavg, 'uptime': vps_uptime, 'aes': vps_aes}, 'shadowsocks': {'traffic': ss_traffic, 'key': shadowsocks_key, 'port': shadowsocks_port, 'method': shadowsocks_method, 'fast_open': shadowsocks_fast_open, 'reuse_port': shadowsocks_reuse_port, 'no_delay': shadowsocks_no_delay, 'mptcp': shadowsocks_mptcp, 'ebpf': shadowsocks_ebpf, 'obfs': shadowsocks_obfs, 'obfs_plugin': shadowsocks_obfs_plugin, 'obfs_type': shadowsocks_obfs_type}, 'glorytun': {'key': glorytun_key, 'udp': {'host_ip': glorytun_udp_host_ip, 'client_ip': glorytun_udp_client_ip}, 'tcp': {'host_ip': glorytun_tcp_host_ip, 'client_ip': glorytun_tcp_client_ip}, 'port': glorytun_port, 'chacha': glorytun_chacha}, 'dsvpn': {'key': dsvpn_key, 'host_ip': dsvpn_host_ip, 'client_ip': dsvpn_client_ip, 'port': dsvpn_port}, 'openvpn': {'key': openvpn_key, 'client_key': openvpn_client_key, 'client_crt': openvpn_client_crt, 'client_ca': openvpn_client_ca, 'host_ip': openvpn_host_ip, 'client_ip': openvpn_client_ip, 'port': openvpn_port, 'cipher': openvpn_cipher},'wireguard': {'key': wireguard_key, 'host_ip': wireguard_host_ip, 'port': wireguard_port}, 'mlvpn': {'key': mlvpn_key, 'host_ip': mlvpn_host_ip, 'client_ip': mlvpn_client_ip}, 'shorewall': {'redirect_ports': shorewall_redirect}, 'mptcp': {'enabled': mptcp_enabled, 'checksum': mptcp_checksum, 'path_manager': mptcp_path_manager, 'scheduler': mptcp_scheduler, 'syn_retries': mptcp_syn_retries}, 'network': {'congestion_control': congestion_control, 'ipv6_network': ipv6_network, 'ipv6': ipv6_addr, 'ipv4': ipv4_addr, 'domain': vps_domain, 'internet': internet}, 'vpn': {'available': available_vpn, 'current': vpn, 'remoteip': vpn_remote_ip, 'localip': vpn_local_ip, 'rx': vpn_traffic_rx, 'tx': vpn_traffic_tx}, 'iperf': {'user': 'openmptcprouter', 'password': 'openmptcprouter', 'key': iperf3_key}, 'pihole': {'state': pihole}, 'user': {'name': username, 'permission': user_permissions}, 'ip6in4': {'localip': localip6, 'remoteip': remoteip6, 'ula': ula}, 'client2client': {'enabled': client2client, 'lanips': alllanips}, 'gre_tunnel': {'enabled': gre_tunnel, 'config': gre_tunnel_conf}, 'v2ray': {'enabled': v2ray, 'config': v2ray_conf, 'tx': v2ray_tx, 'rx': v2ray_rx}, 'proxy': {'available': available_proxy, 'current': proxy}}
|
||||
|
||||
# Set shadowsocks config
|
||||
class OBFSPLUGIN(str, Enum):
|
||||
|
@ -2075,6 +2084,40 @@ def openvpn(*, params: OpenVPN, current_user: User = Depends(get_current_user)):
|
|||
set_lastchange()
|
||||
return {'result': 'done'}
|
||||
|
||||
# Set WireGuard config
|
||||
class WireGuardPeer(BaseModel):
|
||||
ip: str
|
||||
key: str
|
||||
|
||||
class WireGuard(BaseModel):
|
||||
peers: List[WireGuardPeer] = []
|
||||
|
||||
@app.post('/wireguard', summary="Modify Wireguard configuration")
|
||||
def wireguard(*, params: WireGuard, current_user: User = Depends(get_current_user)):
|
||||
wg_config = configparser.ConfigParser()
|
||||
wg_config.read_file(open(r'/etc/wireguard/wg0.conf'))
|
||||
wg_port = wg_config.get('Interface', 'ListenPort')
|
||||
wg_key = wg_config.get('Interface', 'PrivateKey')
|
||||
|
||||
initial_md5 = hashlib.md5(file_as_bytes(open('/etc/wireguard/wg0.conf', 'rb'))).hexdigest()
|
||||
with open(tmpfile, 'a+') as n:
|
||||
n.write('[Interface]\n')
|
||||
n.write('ListenPort = ' + wg_port + '\n')
|
||||
n.write('PrivateKey = ' + wg_key + '\n')
|
||||
for peer in params.peers:
|
||||
n.write('\n')
|
||||
n.write('[Peer]')
|
||||
n.write('PublicKey = ' + peer.key + '\n')
|
||||
n.write('AllowedIPs = ' + peer.ip + '\n')
|
||||
move(tmpfile, '/etc/wireguard/wg0.conf')
|
||||
final_md5 = hashlib.md5(file_as_bytes(open('/etc/wireguard/wg0.conf', 'rb'))).hexdigest()
|
||||
if initial_md5 != final_md5:
|
||||
os.system("wg setconf wg0 /etc/wireguard/wg0.conf")
|
||||
shorewall_add_port(current_user, str(wg_port), 'udp', 'wireguard')
|
||||
set_lastchange()
|
||||
return {'result': 'done'}
|
||||
|
||||
|
||||
class Wanips(BaseModel):
|
||||
ips: str
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue