passepartout-apple/PassepartoutLibrary/Sources/PassepartoutVPNImpl/Extensions/WireGuardSettings+TunnelKit...

139 lines
4.3 KiB
Swift
Raw Normal View History

2022-04-12 13:09:14 +00:00
//
2023-05-24 16:19:47 +00:00
// WireGuardSettings+TunnelKit.swift
2022-04-12 13:09:14 +00:00
// Passepartout
//
// Created by Davide De Rosa on 4/7/22.
2023-03-17 15:56:19 +00:00
// Copyright (c) 2023 Davide De Rosa. All rights reserved.
2022-04-12 13:09:14 +00:00
//
// https://github.com/passepartoutvpn
//
// This file is part of Passepartout.
//
// Passepartout is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Passepartout is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Passepartout. If not, see <http://www.gnu.org/licenses/>.
//
import Foundation
2022-06-23 21:31:01 +00:00
import PassepartoutCore
2023-05-24 16:19:47 +00:00
import PassepartoutVPN
import TunnelKitManager
import TunnelKitWireGuard
2022-04-12 13:09:14 +00:00
2023-05-24 16:19:47 +00:00
extension Profile.WireGuardSettings: TunnelKitConfigurationProviding {
2023-07-02 10:51:50 +00:00
func tunnelKitConfiguration(_ appGroup: String, parameters: VPNConfigurationParameters) -> TunnelKitVPNConfiguration {
2022-04-12 13:09:14 +00:00
var customBuilder = configuration.builder()
// network settings
if parameters.withNetworkSettings {
customBuilder.applyGateway(from: parameters.networkSettings.gateway)
customBuilder.applyDNS(from: parameters.networkSettings.dns)
customBuilder.applyMTU(from: parameters.networkSettings.mtu)
}
2022-04-12 13:09:14 +00:00
let customConfiguration = customBuilder.build()
var cfg = WireGuard.ProviderConfiguration(
parameters.title,
2023-05-24 16:19:47 +00:00
appGroup: appGroup,
2022-04-12 13:09:14 +00:00
configuration: customConfiguration
)
cfg.shouldDebug = true
if let filename = parameters.preferences.tunnelLogPath {
cfg.debugLogPath = vpnPath(with: filename)
}
2022-04-12 13:09:14 +00:00
cfg.debugLogFormat = parameters.preferences.tunnelLogFormat
var extra = NetworkExtensionExtra()
extra.onDemandRules = parameters.onDemandRules
extra.disconnectsOnSleep = !parameters.networkSettings.keepsAliveOnSleep
pp_log.verbose("Configuration:")
pp_log.verbose(cfg)
pp_log.verbose(extra)
return (cfg, extra)
}
}
extension WireGuard.ConfigurationBuilder {
mutating func applyGateway(from settings: Network.GatewaySettings) {
switch settings.choice {
case .automatic:
break
2023-03-17 20:55:47 +00:00
2022-04-12 13:09:14 +00:00
case .manual:
for i in 0..<peersCount {
if settings.isDefaultIPv4 {
addDefaultGatewayIPv4(toPeer: i)
} else {
removeDefaultGatewayIPv4(fromPeer: i)
}
if settings.isDefaultIPv6 {
addDefaultGatewayIPv6(toPeer: i)
} else {
removeDefaultGatewayIPv6(fromPeer: i)
}
}
}
}
mutating func applyDNS(from settings: Network.DNSSettings) {
switch settings.choice {
case .automatic:
break
case .manual:
let isDNSEnabled = settings.configurationType != .disabled
switch settings.configurationType {
case .plain:
break
case .https:
dnsHTTPSURL = settings.dnsHTTPSURL
case .tls:
dnsTLSServerName = settings.dnsTLSServerName
case .disabled:
break
}
if isDNSEnabled {
dnsServers = settings.dnsServers ?? []
2023-03-17 21:16:04 +00:00
var allDomains: [String] = []
if let domain = settings.dnsDomain {
allDomains.insert(domain, at: 0)
}
if let searchDomains = settings.dnsSearchDomains {
allDomains.append(contentsOf: searchDomains)
}
dnsSearchDomains = allDomains.filter { !$0.isEmpty }
} else {
2022-04-12 13:09:14 +00:00
dnsServers = []
dnsSearchDomains = []
}
}
}
mutating func applyMTU(from settings: Network.MTUSettings) {
switch settings.choice {
case .automatic:
break
case .manual:
mtu = UInt16(settings.mtuBytes)
}
}
}