219 lines
6.1 KiB
Rust
219 lines
6.1 KiB
Rust
use crate::exporter_error::PeerEntryParseError;
|
|
use log::debug;
|
|
use std::collections::HashMap;
|
|
use std::convert::TryFrom;
|
|
|
|
#[derive(Debug, Default, Clone)]
|
|
pub(crate) struct PeerEntry<'a> {
|
|
pub public_key: &'a str,
|
|
pub allowed_ips: &'a str,
|
|
pub name: Option<&'a str>,
|
|
}
|
|
|
|
#[inline]
|
|
fn after_char(s: &str, c_split: char) -> &str {
|
|
let mut p: usize = 0;
|
|
for c in s.chars().into_iter() {
|
|
if c == c_split {
|
|
return &s[p + 1..];
|
|
} else {
|
|
p += c.len_utf8();
|
|
}
|
|
}
|
|
s
|
|
}
|
|
|
|
impl<'a> TryFrom<&[&'a str]> for PeerEntry<'a> {
|
|
type Error = PeerEntryParseError;
|
|
|
|
fn try_from(lines: &[&'a str]) -> Result<PeerEntry<'a>, Self::Error> {
|
|
let mut public_key = "";
|
|
let mut allowed_ips = "";
|
|
let mut name = None;
|
|
|
|
for line in lines {
|
|
if line.starts_with("PublicKey") {
|
|
public_key = after_char(line, '=').trim();
|
|
} else if line.starts_with("AllowedIPs") {
|
|
allowed_ips = after_char(line, '=').trim();
|
|
} else if line.starts_with('#') {
|
|
// since the pound sign is 1 byte the below slice will work
|
|
name = Some(line[1..].trim());
|
|
}
|
|
}
|
|
|
|
// Sanity checks
|
|
// If there are more than one PublicKey or AllowedIPs we won't catch it. But
|
|
// WireGuard won't be working either so we can live with this simplification.
|
|
if public_key == "" {
|
|
// we return a owned String for ergonomics. This will allocate but it's ok since it's not supposed
|
|
// to happen :)
|
|
let lines_owned: Vec<String> = lines.iter().map(|line| line.to_string()).collect();
|
|
Err(PeerEntryParseError::PublicKeyNotFound { lines: lines_owned })
|
|
} else if allowed_ips == "" {
|
|
let lines_owned: Vec<String> = lines.iter().map(|line| line.to_string()).collect();
|
|
Err(PeerEntryParseError::AllowedIPsEntryNotFound { lines: lines_owned })
|
|
} else {
|
|
Ok(PeerEntry {
|
|
public_key,
|
|
allowed_ips,
|
|
name, // name can be None
|
|
})
|
|
}
|
|
}
|
|
}
|
|
|
|
pub(crate) type PeerEntryHashMap<'a> = (HashMap<&'a str, PeerEntry<'a>>);
|
|
|
|
pub(crate) fn peer_entry_hashmap_try_from(
|
|
txt: &str,
|
|
) -> Result<PeerEntryHashMap, PeerEntryParseError> {
|
|
let mut hm = HashMap::new();
|
|
|
|
let mut v_blocks = Vec::new();
|
|
let mut cur_block: Option<Vec<&str>> = None;
|
|
|
|
for line in txt.lines().into_iter() {
|
|
if line.starts_with('[') {
|
|
if let Some(inner_cur_block) = cur_block {
|
|
// close the block
|
|
v_blocks.push(inner_cur_block);
|
|
cur_block = None;
|
|
}
|
|
|
|
if line == "[Peer]" {
|
|
// start a new block
|
|
cur_block = Some(Vec::new());
|
|
}
|
|
} else {
|
|
// push the line if we are in a block (only if not empty)
|
|
if let Some(inner_cur_block) = &mut cur_block {
|
|
if line != "" {
|
|
inner_cur_block.push(line);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if let Some(cur_block) = cur_block {
|
|
// we have a leftover block
|
|
v_blocks.push(cur_block);
|
|
}
|
|
|
|
debug!("v_blocks == {:?}", v_blocks);
|
|
|
|
for block in &v_blocks {
|
|
let p: PeerEntry = PeerEntry::try_from(&block as &[&str])?;
|
|
hm.insert(p.public_key, p);
|
|
}
|
|
|
|
debug!("hm == {:?}", hm);
|
|
|
|
Ok(hm)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
|
|
const TEXT: &'static str = "
|
|
ListenPort = 51820
|
|
PrivateKey = my_super_secret_private_key
|
|
# PreUp = iptables -t nat -A POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
# PostDown = iptables -t nat -D POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
|
|
[Peer]
|
|
# OnePlus 6T
|
|
PublicKey = 2S7mA0vEMethCNQrJpJKE81/JmhgtB+tHHLYQhgM6kk=
|
|
AllowedIPs = 10.70.0.2/32
|
|
|
|
[Peer]
|
|
# varch.local (laptop)
|
|
PublicKey = qnoxQoQI8KKMupLnSSureORV0wMmH7JryZNsmGVISzU=
|
|
AllowedIPs = 10.70.0.3/32
|
|
|
|
[Peer]
|
|
# cantarch
|
|
PublicKey = L2UoJZN7RmEKsMmqaJgKG0m1S2Zs2wd2ptAf+kb3008=
|
|
AllowedIPs = 10.70.0.4/32
|
|
|
|
[Peer]
|
|
# frcognoarch
|
|
PublicKey = MdVOIPKt9K2MPj/sO2NlWQbOnFJ6L/qX80mmhQwsUlA=
|
|
AllowedIPs = 10.70.0.50/32
|
|
|
|
[Peer]
|
|
# frcognowin10
|
|
PublicKey = lqYcojJMsIZXMUw1heAFbQHBoKjCEaeo7M1WXDh/KWc=
|
|
AllowedIPs = 10.70.0.40/32
|
|
|
|
[Peer]
|
|
# OnePlus 5T
|
|
PublicKey = 928vO9Lf4+Mo84cWu4k1oRyzf0AR7FTGoPKHGoTMSHk=
|
|
AllowedIPs = 10.70.0.80/32
|
|
";
|
|
|
|
const TEXT_NOPK: &'static str = "
|
|
ListenPort = 51820
|
|
PrivateKey = my_super_secret_private_key
|
|
# PreUp = iptables -t nat -A POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
# PostDown = iptables -t nat -D POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
|
|
[Peer]
|
|
# OnePlus 6T
|
|
PublicKey = 2S7mA0vEMethCNQrJpJKE81/JmhgtB+tHHLYQhgM6kk=
|
|
AllowedIPs = 10.70.0.2/32
|
|
|
|
[Peer]
|
|
# varch.local (laptop)
|
|
AllowedIPs = 10.70.0.3/32
|
|
|
|
[Peer]
|
|
# cantarch
|
|
PublicKey = L2UoJZN7RmEKsMmqaJgKG0m1S2Zs2wd2ptAf+kb3008=
|
|
AllowedIPs = 10.70.0.4/32
|
|
";
|
|
|
|
const TEXT_AIP: &'static str = "
|
|
ListenPort = 51820
|
|
PrivateKey = my_super_secret_private_key
|
|
# PreUp = iptables -t nat -A POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
# PostDown = iptables -t nat -D POSTROUTING -s 10.70.0.0/24 -o enp7s0 -j MASQUERADE
|
|
|
|
[Peer]
|
|
# OnePlus 6T
|
|
PublicKey = 2S7mA0vEMethCNQrJpJKE81/JmhgtB+tHHLYQhgM6kk=
|
|
AllowedIPs = 10.70.0.2/32
|
|
|
|
[Peer]
|
|
# varch.local (laptop)
|
|
AllowedIPs = 10.70.0.3/32
|
|
PublicKey = 6S7mA0vEMethCNQrJpJKE81/JmhgtB+tHHLYQhgM6kk=
|
|
|
|
[Peer]
|
|
# cantarch
|
|
PublicKey = L2UoJZN7RmEKsMmqaJgKG0m1S2Zs2wd2ptAf+kb3008=
|
|
";
|
|
|
|
#[test]
|
|
fn test_parse_ok() {
|
|
let a: PeerEntryHashMap = PeerEntryHashMap::try_from(TEXT).unwrap();
|
|
println!("{:?}", a);
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(
|
|
expected = "PublicKeyNotFound { lines: [\"# varch.local (laptop)\", \"AllowedIPs = 10.70.0.3/32\"] }"
|
|
)]
|
|
fn test_parse_no_public_key() {
|
|
let _: PeerEntryHashMap = PeerEntryHashMap::try_from(TEXT_NOPK).unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(
|
|
expected = "AllowedIPsEntryNotFound { lines: [\"# cantarch\", \"PublicKey = L2UoJZN7RmEKsMmqaJgKG0m1S2Zs2wd2ptAf+kb3008=\"] }"
|
|
)]
|
|
fn test_parse_no_allowed_ips() {
|
|
let _: PeerEntryHashMap = PeerEntryHashMap::try_from(TEXT_AIP).unwrap();
|
|
}
|
|
}
|