passepartout-apple/PassepartoutLibrary/Sources/PassepartoutVPNImpl/Extensions/OpenVPNSettings+TunnelKit.s...

179 lines
5.5 KiB
Swift
Raw Normal View History

2022-04-12 13:09:14 +00:00
//
2023-05-24 16:19:47 +00:00
// OpenVPNSettings+TunnelKit.swift
2022-04-12 13:09:14 +00:00
// Passepartout
//
// Created by Davide De Rosa on 4/7/22.
2024-01-14 13:34:21 +00:00
// Copyright (c) 2024 Davide De Rosa. All rights reserved.
2022-04-12 13:09:14 +00:00
//
// https://github.com/passepartoutvpn
//
// This file is part of Passepartout.
//
// Passepartout is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Passepartout is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Passepartout. If not, see <http://www.gnu.org/licenses/>.
//
import Foundation
2022-06-23 21:31:01 +00:00
import PassepartoutCore
2023-05-24 16:19:47 +00:00
import PassepartoutVPN
import TunnelKitManager
import TunnelKitOpenVPN
2022-04-12 13:09:14 +00:00
2023-05-24 16:19:47 +00:00
extension Profile.OpenVPNSettings: TunnelKitConfigurationProviding {
2023-07-02 10:51:50 +00:00
func tunnelKitConfiguration(_ appGroup: String, parameters: VPNConfigurationParameters) -> TunnelKitVPNConfiguration {
2022-04-12 13:09:14 +00:00
var customBuilder = configuration.builder()
// tolerate widest range of certificates
customBuilder.tlsSecurityLevel = 0
// custom endpoint
if let endpoint = customEndpoint {
customBuilder.remotes = [endpoint]
}
// network settings
if parameters.withNetworkSettings {
customBuilder.applyGateway(from: parameters.networkSettings.gateway)
customBuilder.applyDNS(from: parameters.networkSettings.dns)
customBuilder.applyProxy(from: parameters.networkSettings.proxy)
customBuilder.applyMTU(from: parameters.networkSettings.mtu)
}
2022-04-12 13:09:14 +00:00
let customConfiguration = customBuilder.build()
var cfg = OpenVPN.ProviderConfiguration(
parameters.title,
2023-05-24 16:19:47 +00:00
appGroup: appGroup,
2022-04-12 13:09:14 +00:00
configuration: customConfiguration
)
cfg.username = parameters.username
2022-04-12 13:09:14 +00:00
cfg.shouldDebug = true
if let filename = parameters.preferences.tunnelLogPath {
cfg.debugLogPath = vpnPath(with: filename)
}
2022-04-12 13:09:14 +00:00
cfg.debugLogFormat = parameters.preferences.tunnelLogFormat
cfg.masksPrivateData = parameters.preferences.masksPrivateData
2023-03-17 20:55:47 +00:00
2022-04-12 13:09:14 +00:00
var extra = NetworkExtensionExtra()
extra.passwordReference = parameters.passwordReference
extra.onDemandRules = parameters.onDemandRules
extra.disconnectsOnSleep = !parameters.networkSettings.keepsAliveOnSleep
2023-12-16 19:58:54 +00:00
extra.userData = parameters.userData
2022-04-12 13:09:14 +00:00
pp_log.verbose("Configuration:")
pp_log.verbose(cfg)
pp_log.verbose(extra)
return (cfg, extra)
}
}
extension OpenVPN.ConfigurationBuilder {
mutating func applyGateway(from settings: Network.GatewaySettings) {
switch settings.choice {
case .automatic:
break
2023-03-17 20:55:47 +00:00
2022-04-12 13:09:14 +00:00
case .manual:
appendNoPullMask(.routes)
2022-04-12 13:09:14 +00:00
var policies: [OpenVPN.RoutingPolicy] = []
if settings.isDefaultIPv4 {
policies.append(.IPv4)
}
if settings.isDefaultIPv6 {
policies.append(.IPv6)
}
routingPolicies = policies
}
}
mutating func applyDNS(from settings: Network.DNSSettings) {
switch settings.choice {
case .automatic:
break
case .manual:
appendNoPullMask(.dns)
let isDNSEnabled = settings.configurationType != .disabled
self.isDNSEnabled = isDNSEnabled
2022-04-12 13:09:14 +00:00
switch settings.configurationType {
case .plain:
dnsProtocol = .plain
case .https:
dnsProtocol = .https
2022-04-12 13:09:14 +00:00
dnsHTTPSURL = settings.dnsHTTPSURL
case .tls:
dnsProtocol = .tls
2022-04-12 13:09:14 +00:00
dnsTLSServerName = settings.dnsTLSServerName
case .disabled:
break
}
2023-03-17 20:55:47 +00:00
if isDNSEnabled {
dnsServers = settings.dnsServers?.filter { !$0.isEmpty }
2023-03-17 21:16:04 +00:00
dnsDomain = settings.dnsDomain
2022-04-12 13:09:14 +00:00
searchDomains = settings.dnsSearchDomains
}
}
}
mutating func applyProxy(from settings: Network.ProxySettings) {
switch settings.choice {
case .automatic:
break
case .manual:
appendNoPullMask(.proxy)
isProxyEnabled = settings.configurationType != .disabled
2022-04-12 13:09:14 +00:00
switch settings.configurationType {
case .manual:
httpProxy = settings.proxyServer
httpsProxy = settings.proxyServer
proxyBypassDomains = settings.proxyBypassDomains?.filter { !$0.isEmpty }
proxyAutoConfigurationURL = nil
2023-03-17 20:55:47 +00:00
case .pac:
httpProxy = nil
httpsProxy = nil
proxyBypassDomains = nil
proxyAutoConfigurationURL = settings.proxyAutoConfigurationURL
2023-03-17 20:55:47 +00:00
case .disabled:
break
2022-04-12 13:09:14 +00:00
}
}
}
2023-03-17 20:55:47 +00:00
2022-04-12 13:09:14 +00:00
mutating func applyMTU(from settings: Network.MTUSettings) {
switch settings.choice {
case .automatic:
break
case .manual:
mtu = settings.mtuBytes
}
}
2023-03-17 20:55:47 +00:00
private mutating func appendNoPullMask(_ mask: OpenVPN.PullMask) {
if noPullMask == nil {
noPullMask = []
}
noPullMask?.append(mask)
}
2022-04-12 13:09:14 +00:00
}