1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119
|
// SPDX-License-Identifier: MIT
use futures::StreamExt;
use genetlink::new_connection;
use netlink_packet_core::{
NetlinkMessage, NetlinkPayload, NLM_F_DUMP, NLM_F_REQUEST,
};
use netlink_packet_generic::GenlMessage;
use netlink_packet_wireguard::{
nlas::{WgAllowedIpAttrs, WgDeviceAttrs, WgPeerAttrs},
Wireguard, WireguardCmd,
};
use std::env::args;
#[tokio::main]
async fn main() {
env_logger::init();
let argv: Vec<String> = args().collect();
if argv.len() < 2 {
eprintln!("Usage: get_wireguard_info <ifname>");
return;
}
let (connection, mut handle, _) = new_connection().unwrap();
tokio::spawn(connection);
let genlmsg: GenlMessage<Wireguard> =
GenlMessage::from_payload(Wireguard {
cmd: WireguardCmd::GetDevice,
nlas: vec![WgDeviceAttrs::IfName(argv[1].clone())],
});
let mut nlmsg = NetlinkMessage::from(genlmsg);
nlmsg.header.flags = NLM_F_REQUEST | NLM_F_DUMP;
let mut res = handle.request(nlmsg).await.unwrap();
while let Some(result) = res.next().await {
let rx_packet = result.unwrap();
match rx_packet.payload {
NetlinkPayload::InnerMessage(genlmsg) => {
print_wg_payload(genlmsg.payload);
}
NetlinkPayload::Error(e) => {
eprintln!("Error: {:?}", e.to_io());
}
_ => (),
};
}
}
fn print_wg_payload(wg: Wireguard) {
for nla in &wg.nlas {
match nla {
WgDeviceAttrs::IfIndex(v) => println!("IfIndex: {}", v),
WgDeviceAttrs::IfName(v) => println!("IfName: {}", v),
WgDeviceAttrs::PrivateKey(_) => println!("PrivateKey: (hidden)"),
WgDeviceAttrs::PublicKey(v) => {
println!("PublicKey: {}", base64::encode(v))
}
WgDeviceAttrs::ListenPort(v) => println!("ListenPort: {}", v),
WgDeviceAttrs::Fwmark(v) => println!("Fwmark: {}", v),
WgDeviceAttrs::Peers(nlas) => {
for peer in nlas {
println!("Peer: ");
print_wg_peer(peer);
}
}
_ => (),
}
}
}
fn print_wg_peer(nlas: &[WgPeerAttrs]) {
for nla in nlas {
match nla {
WgPeerAttrs::PublicKey(v) => {
println!(" PublicKey: {}", base64::encode(v))
}
WgPeerAttrs::PresharedKey(_) => {
println!(" PresharedKey: (hidden)")
}
WgPeerAttrs::Endpoint(v) => println!(" Endpoint: {}", v),
WgPeerAttrs::PersistentKeepalive(v) => {
println!(" PersistentKeepalive: {}", v)
}
WgPeerAttrs::LastHandshake(v) => {
println!(" LastHandshake: {:?}", v)
}
WgPeerAttrs::RxBytes(v) => println!(" RxBytes: {}", v),
WgPeerAttrs::TxBytes(v) => println!(" TxBytes: {}", v),
WgPeerAttrs::AllowedIps(nlas) => {
for ip in nlas {
print_wg_allowedip(ip);
}
}
_ => (),
}
}
}
fn print_wg_allowedip(nlas: &[WgAllowedIpAttrs]) -> Option<()> {
let ipaddr = nlas.iter().find_map(|nla| {
if let WgAllowedIpAttrs::IpAddr(addr) = nla {
Some(*addr)
} else {
None
}
})?;
let cidr = nlas.iter().find_map(|nla| {
if let WgAllowedIpAttrs::Cidr(cidr) = nla {
Some(*cidr)
} else {
None
}
})?;
println!(" AllowedIp: {}/{}", ipaddr, cidr);
Some(())
}
|