passepartout-apple/Passepartout/App/Context/AppContext.swift

185 lines
6.0 KiB
Swift
Raw Normal View History

//
// AppContext.swift
// Passepartout
//
// Created by Davide De Rosa on 3/17/22.
2024-01-14 13:34:21 +00:00
// Copyright (c) 2024 Davide De Rosa. All rights reserved.
//
// https://github.com/passepartoutvpn
//
// This file is part of Passepartout.
//
// Passepartout is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// Passepartout is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with Passepartout. If not, see <http://www.gnu.org/licenses/>.
//
import Combine
import Foundation
2022-06-23 21:31:01 +00:00
import PassepartoutLibrary
@MainActor
2023-05-24 16:19:47 +00:00
final class AppContext {
2023-07-04 20:29:43 +00:00
private let coreContext: CoreContext
let upgradeManager: UpgradeManager
let productManager: ProductManager
2023-03-17 20:55:47 +00:00
let persistenceManager: PersistenceManager
private let reviewer: Reviewer
2023-03-17 20:55:47 +00:00
private var cancellables: Set<AnyCancellable> = []
2023-03-17 20:55:47 +00:00
init(store: KeyValueStore) {
let logger = SwiftyBeaverLogger(
logFile: Constants.Log.App.url,
logLevel: Constants.Log.level,
logFormat: Constants.Log.App.format
)
Passepartout.shared.logger = logger
pp_log.info("Logging to: \(logger.logFile!)")
upgradeManager = UpgradeManager(
store: store,
strategy: DefaultUpgradeManagerStrategy()
)
upgradeManager.migrate(toVersion: Constants.Global.appVersionNumber)
2023-07-04 20:29:43 +00:00
productManager = ProductManager(
inApp: StoreKitInApp<LocalProduct>(),
receiptReader: StoreKitReceiptReader(),
overriddenAppType: Constants.InApp.overriddenAppType,
buildProducts: Constants.InApp.buildProducts
)
persistenceManager = PersistenceManager(
store: store,
ckContainerId: Constants.CloudKit.containerId,
2023-12-16 19:58:54 +00:00
ckSharedContainerId: Constants.CloudKit.sharedContainerId,
ckCoreDataZone: Constants.CloudKit.coreDataZone
)
reviewer = Reviewer()
reviewer.eventCountBeforeRating = Constants.Rating.eventCount
2023-03-17 20:55:47 +00:00
coreContext = CoreContext(persistenceManager: persistenceManager)
// post
2023-03-17 20:55:47 +00:00
2023-07-04 20:29:43 +00:00
configureObjects()
}
var providerManager: ProviderManager {
coreContext.providerManager
}
var profileManager: ProfileManager {
coreContext.profileManager
}
var vpnManager: VPNManager {
coreContext.vpnManager
}
2023-07-02 10:51:50 +00:00
}
2023-03-17 20:55:47 +00:00
2023-07-02 10:51:50 +00:00
private extension AppContext {
2023-07-04 20:29:43 +00:00
func configureObjects() {
2023-12-16 19:58:54 +00:00
coreContext.profileManager.willSaveSharedProfile = { [unowned self] in
willSaveSharedProfile(withNewProfile: $0, existingProfile: $1)
}
coreContext.vpnManager.isOnDemandRulesSupported = {
self.isEligibleForOnDemandRules()
}
2023-12-23 06:59:23 +00:00
coreContext.vpnManager.isNetworkSettingsSupported = {
self.isEligibleForNetworkSettings()
}
2023-12-16 19:58:54 +00:00
coreContext.vpnManager.userData = {
if let expirationDate = $0.connectionExpirationDate {
return [Constants.Tunnel.expirationTimeIntervalKey: expirationDate.timeIntervalSinceReferenceDate]
}
return nil
}
coreContext.vpnManager.currentState.$vpnStatus
.removeDuplicates()
.receive(on: DispatchQueue.main)
2023-09-08 14:20:01 +00:00
.sink { [weak self] in
if $0 == .connected {
pp_log.info("VPN successful connection, report to Reviewer")
2023-09-08 14:20:01 +00:00
self?.reviewer.reportEvent()
}
}.store(in: &cancellables)
}
2023-03-17 20:55:47 +00:00
// eligibility: ignore network settings if ineligible
2023-07-02 10:51:50 +00:00
func isEligibleForNetworkSettings() -> Bool {
guard productManager.isEligible(forFeature: .networkSettings) else {
pp_log.warning("Ignore network settings, not eligible")
return false
}
return true
}
2023-03-17 20:55:47 +00:00
// eligibility: reset on demand rules if no trusted networks
2023-07-02 10:51:50 +00:00
func isEligibleForOnDemandRules() -> Bool {
guard productManager.isEligible(forFeature: .trustedNetworks) else {
pp_log.warning("Ignore on demand rules, not eligible for trusted networks")
return false
}
return true
}
2023-12-16 19:58:54 +00:00
// eligibility: expire restricted TV profiles after N minutes
func willSaveSharedProfile(withNewProfile newProfile: Profile, existingProfile: Profile?) -> Profile {
if let existingProfile {
assert(newProfile.id == existingProfile.id)
}
guard productManager.isEligible(forFeature: .appleTV) else {
2024-01-18 22:55:19 +00:00
var restricted: Profile
2023-12-16 19:58:54 +00:00
let remainingMinutes: Int
let expirationDate: Date
// retain current expiration period if any
2024-01-18 22:55:19 +00:00
if let existingProfile, let currentExpirationDate = existingProfile.connectionExpirationDate {
2023-12-16 19:58:54 +00:00
remainingMinutes = Int(currentExpirationDate.timeIntervalSinceNow / 60.0)
expirationDate = currentExpirationDate
2024-01-18 22:55:19 +00:00
restricted = existingProfile
2023-12-16 19:58:54 +00:00
}
// otherwise, expire in N minutes from now
else {
remainingMinutes = Constants.InApp.tvLimitedMinutes
expirationDate = Date()
.addingTimeInterval(TimeInterval(remainingMinutes) * 60.0)
2024-01-18 22:55:19 +00:00
restricted = newProfile
2023-12-16 19:58:54 +00:00
restricted.connectionExpirationDate = expirationDate
}
if remainingMinutes > 0 {
pp_log.warning("\(newProfile.logDescription): TV connection expires in \(remainingMinutes) minutes (at \(expirationDate))")
} else {
pp_log.warning("\(newProfile.logDescription): TV connection expired at \(expirationDate)")
}
return restricted
}
return newProfile
}
}