]> Cypherpunks.ru repositories - govpn.git/blobdiff - src/cypherpunks.ru/govpn/cmd/govpn-server/conf.go
Add common cypherpunks.ru prefix for govpn Go package names
[govpn.git] / src / cypherpunks.ru / govpn / cmd / govpn-server / conf.go
diff --git a/src/cypherpunks.ru/govpn/cmd/govpn-server/conf.go b/src/cypherpunks.ru/govpn/cmd/govpn-server/conf.go
new file mode 100644 (file)
index 0000000..131eeba
--- /dev/null
@@ -0,0 +1,115 @@
+/*
+GoVPN -- simple secure free software virtual private network daemon
+Copyright (C) 2014-2016 Sergey Matveev <stargrave@stargrave.org>
+
+This program is free software: you can redistribute it and/or modify
+it under the terms of the GNU General Public License as published by
+the Free Software Foundation, either version 3 of the License, or
+(at your option) any later version.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
+
+package main
+
+import (
+       "errors"
+       "io/ioutil"
+       "log"
+       "time"
+
+       "github.com/go-yaml/yaml"
+
+       "cypherpunks.ru/govpn"
+)
+
+const (
+       RefreshRate = time.Minute
+)
+
+var (
+       confs    map[govpn.PeerId]*govpn.PeerConf
+       idsCache *govpn.CipherCache
+)
+
+func confRead() (*map[govpn.PeerId]*govpn.PeerConf, error) {
+       data, err := ioutil.ReadFile(*confPath)
+       if err != nil {
+               return nil, err
+       }
+       confsRaw := new(map[string]govpn.PeerConf)
+       err = yaml.Unmarshal(data, confsRaw)
+       if err != nil {
+               return nil, err
+       }
+
+       confs := make(map[govpn.PeerId]*govpn.PeerConf, len(*confsRaw))
+       for name, pc := range *confsRaw {
+               verifier, err := govpn.VerifierFromString(pc.VerifierRaw)
+               if err != nil {
+                       return nil, errors.New("Unable to decode verifier: " + err.Error())
+               }
+               if pc.Encless {
+                       pc.Noise = true
+               }
+               if pc.MTU == 0 {
+                       pc.MTU = govpn.MTUDefault
+               }
+               if pc.MTU > govpn.MTUMax {
+                       log.Println("MTU value", pc.MTU, "is too high, overriding to", govpn.MTUMax)
+                       pc.MTU = govpn.MTUMax
+               }
+               conf := govpn.PeerConf{
+                       Verifier: verifier,
+                       Id:       verifier.Id,
+                       Name:     name,
+                       Iface:    pc.Iface,
+                       MTU:      pc.MTU,
+                       Up:       pc.Up,
+                       Down:     pc.Down,
+                       Noise:    pc.Noise,
+                       CPR:      pc.CPR,
+                       Encless:  pc.Encless,
+               }
+               if pc.TimeoutInt <= 0 {
+                       pc.TimeoutInt = govpn.TimeoutDefault
+               }
+               conf.Timeout = time.Second * time.Duration(pc.TimeoutInt)
+               confs[*verifier.Id] = &conf
+       }
+       return &confs, nil
+}
+
+func confRefresh() error {
+       newConfs, err := confRead()
+       if err != nil {
+               log.Println("Unable to parse peers configuration:", err)
+               return err
+       }
+       confs = *newConfs
+       ids := make([]govpn.PeerId, 0, len(confs))
+       for peerId, _ := range confs {
+               ids = append(ids, peerId)
+       }
+       idsCache.Update(ids)
+       return nil
+}
+
+func confInit() {
+       idsCache = govpn.NewCipherCache(nil)
+       if err := confRefresh(); err != nil {
+               log.Fatalln(err)
+       }
+       go func() {
+               for {
+                       time.Sleep(RefreshRate)
+                       confRefresh()
+               }
+       }()
+}