use ipnetwork::IpNetwork;
use std::net::{IpAddr, SocketAddr};
use std::str::FromStr;
use crate::device::AllowedIps;
#[cfg(feature = "daita")]
use crate::device::daita::{DaitaHooks, DaitaSettings};
use crate::noise::Tunn;
use crate::noise::errors::WireGuardError;
#[cfg(feature = "daita")]
use crate::packet;
use crate::packet::WgKind;
#[cfg(feature = "daita")]
use crate::tun::MtuWatcher;
#[cfg(feature = "daita")]
use crate::udp::UdpSend;
#[derive(Default, Debug)]
pub struct Endpoint {
pub addr: Option<SocketAddr>,
}
pub struct PeerState {
pub(crate) tunnel: Tunn,
index: u32,
pub(crate) endpoint: Endpoint,
pub(crate) allowed_ips: AllowedIps<()>,
pub(crate) preshared_key: Option<[u8; 32]>,
#[cfg(feature = "daita")]
daita_settings: Option<DaitaSettings>,
#[cfg(feature = "daita")]
pub(crate) daita: Option<DaitaHooks>,
}
#[derive(Copy, Clone, Ord, PartialOrd, Eq, PartialEq, Hash, Debug)]
pub struct AllowedIP {
pub addr: IpAddr,
pub cidr: u8,
}
impl FromStr for AllowedIP {
type Err = String;
fn from_str(s: &str) -> Result<Self, Self::Err> {
let ip: Vec<&str> = s.split('/').collect();
if ip.len() != 2 {
return Err("Invalid IP format".to_owned());
}
let (addr, cidr) = (ip[0].parse::<IpAddr>(), ip[1].parse::<u8>());
match (addr, cidr) {
(Ok(addr @ IpAddr::V4(_)), Ok(cidr)) if cidr <= 32 => Ok(AllowedIP { addr, cidr }),
(Ok(addr @ IpAddr::V6(_)), Ok(cidr)) if cidr <= 128 => Ok(AllowedIP { addr, cidr }),
_ => Err("Invalid IP format".to_owned()),
}
}
}
impl PeerState {
pub fn new(
tunnel: Tunn,
index: u32,
endpoint: Option<SocketAddr>,
allowed_ips: &[IpNetwork],
preshared_key: Option<[u8; 32]>,
#[cfg(feature = "daita")] daita_settings: Option<DaitaSettings>,
) -> PeerState {
Self {
tunnel,
index,
endpoint: Endpoint { addr: endpoint },
allowed_ips: allowed_ips.iter().map(|ip| (ip, ())).collect(),
preshared_key,
#[cfg(feature = "daita")]
daita_settings,
#[cfg(feature = "daita")]
daita: None,
}
}
#[cfg(feature = "daita")]
pub(crate) async fn maybe_start_daita<US: UdpSend + Clone + 'static>(
peer: &std::sync::Arc<tokio::sync::Mutex<PeerState>>,
pool: packet::PacketBufPool,
tun_rx_mtu: MtuWatcher,
udp_tx_v4: US,
udp_tx_v6: US,
) -> Result<(), super::Error> {
let mut peer_g = peer.lock().await;
let Some(daita_settings) = peer_g.daita_settings.clone() else {
return Ok(());
};
peer_g.daita = Some(DaitaHooks::new(
daita_settings,
std::sync::Arc::downgrade(peer),
tun_rx_mtu,
udp_tx_v4,
udp_tx_v6,
pool,
)?);
Ok(())
}
pub fn update_timers(&mut self) -> Result<Option<WgKind>, WireGuardError> {
self.tunnel.update_timers()
}
#[cfg(feature = "daita")]
pub fn daita_settings(&self) -> Option<&DaitaSettings> {
self.daita_settings.as_ref()
}
#[cfg(feature = "daita")]
pub fn daita(&self) -> Option<&DaitaHooks> {
self.daita.as_ref()
}
pub fn endpoint(&self) -> &Endpoint {
&self.endpoint
}
pub fn set_endpoint(&mut self, addr: SocketAddr) {
self.endpoint.addr = Some(addr);
}
pub fn is_allowed_ip<I: Into<IpAddr>>(&self, addr: I) -> bool {
self.allowed_ips.find(addr.into()).is_some()
}
pub fn allowed_ips(&self) -> impl Iterator<Item = IpNetwork> + '_ {
self.allowed_ips.iter().map(|((), network)| network)
}
pub fn time_since_last_handshake(&self) -> Option<std::time::Duration> {
self.tunnel.time_since_last_handshake()
}
pub fn persistent_keepalive(&self) -> Option<u16> {
self.tunnel.persistent_keepalive()
}
pub fn index(&self) -> u32 {
self.index
}
}