mirror of
https://github.com/passepartoutvpn/wireguard-apple.git
synced 2025-02-01 13:32:13 +00:00
NE: simplify logic
This commit is contained in:
parent
b02754a7bd
commit
cab80f8fc0
@ -16,8 +16,9 @@ enum PacketTunnelProviderError: Error {
|
|||||||
class PacketTunnelProvider: NEPacketTunnelProvider {
|
class PacketTunnelProvider: NEPacketTunnelProvider {
|
||||||
|
|
||||||
private var wgHandle: Int32?
|
private var wgHandle: Int32?
|
||||||
|
|
||||||
private var networkMonitor: NWPathMonitor?
|
private var networkMonitor: NWPathMonitor?
|
||||||
|
private var lastFirstInterface: NWInterface?
|
||||||
|
private var packetTunnelSettingsGenerator: PacketTunnelSettingsGenerator?
|
||||||
|
|
||||||
deinit {
|
deinit {
|
||||||
networkMonitor?.cancel()
|
networkMonitor?.cancel()
|
||||||
@ -65,7 +66,7 @@ class PacketTunnelProvider: NEPacketTunnelProvider {
|
|||||||
}
|
}
|
||||||
assert(endpoints.count == resolvedEndpoints.count)
|
assert(endpoints.count == resolvedEndpoints.count)
|
||||||
|
|
||||||
let packetTunnelSettingsGenerator = PacketTunnelSettingsGenerator(tunnelConfiguration: tunnelConfiguration, resolvedEndpoints: resolvedEndpoints)
|
packetTunnelSettingsGenerator = PacketTunnelSettingsGenerator(tunnelConfiguration: tunnelConfiguration, resolvedEndpoints: resolvedEndpoints)
|
||||||
|
|
||||||
let fileDescriptor = packetFlow.value(forKeyPath: "socket.fileDescriptor") as! Int32 //swiftlint:disable:this force_cast
|
let fileDescriptor = packetFlow.value(forKeyPath: "socket.fileDescriptor") as! Int32 //swiftlint:disable:this force_cast
|
||||||
if fileDescriptor < 0 {
|
if fileDescriptor < 0 {
|
||||||
@ -75,52 +76,23 @@ class PacketTunnelProvider: NEPacketTunnelProvider {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
let wireguardSettings = packetTunnelSettingsGenerator.uapiConfiguration()
|
let wireguardSettings = packetTunnelSettingsGenerator!.uapiConfiguration()
|
||||||
|
|
||||||
var handle: Int32 = -1
|
|
||||||
|
|
||||||
func interfaceDescription(_ interface: NWInterface?) -> String {
|
|
||||||
if let interface = interface {
|
|
||||||
return "\(interface.name) (\(interface.type))"
|
|
||||||
} else {
|
|
||||||
return "None"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
networkMonitor = NWPathMonitor()
|
networkMonitor = NWPathMonitor()
|
||||||
var previousPrimaryNetworkPathInterface = networkMonitor?.currentPath.availableInterfaces.first
|
lastFirstInterface = networkMonitor!.currentPath.availableInterfaces.first
|
||||||
wg_log(.debug, message: "Network path primary interface: \(interfaceDescription(previousPrimaryNetworkPathInterface))")
|
networkMonitor!.pathUpdateHandler = pathUpdate
|
||||||
networkMonitor?.pathUpdateHandler = { path in
|
networkMonitor!.start(queue: DispatchQueue(label: "NetworkMonitor"))
|
||||||
guard handle >= 0 else { return }
|
|
||||||
if path.status == .satisfied {
|
|
||||||
wg_log(.debug, message: "Network change detected, re-establishing sockets and IPs: \(path.availableInterfaces)")
|
|
||||||
let primaryNetworkPathInterface = path.availableInterfaces.first
|
|
||||||
wg_log(.debug, message: "Network path primary interface: \(interfaceDescription(primaryNetworkPathInterface))")
|
|
||||||
let shouldIncludeListenPort = previousPrimaryNetworkPathInterface != primaryNetworkPathInterface
|
|
||||||
let endpointString = packetTunnelSettingsGenerator.endpointUapiConfiguration(shouldIncludeListenPort: shouldIncludeListenPort, currentListenPort: wgGetListenPort(handle))
|
|
||||||
let err = withStringsAsGoStrings(endpointString, call: { return wgSetConfig(handle, $0.0) })
|
|
||||||
if err == -EADDRINUSE {
|
|
||||||
// We expect this to happen only if shouldIncludeListenPort is true
|
|
||||||
let endpointString = packetTunnelSettingsGenerator.endpointUapiConfiguration(shouldIncludeListenPort: shouldIncludeListenPort, currentListenPort: 0)
|
|
||||||
_ = withStringsAsGoStrings(endpointString, call: { return wgSetConfig(handle, $0.0) })
|
|
||||||
}
|
|
||||||
previousPrimaryNetworkPathInterface = primaryNetworkPathInterface
|
|
||||||
}
|
|
||||||
}
|
|
||||||
networkMonitor?.start(queue: DispatchQueue(label: "NetworkMonitor"))
|
|
||||||
|
|
||||||
handle = connect(interfaceName: tunnelConfiguration.interface.name, settings: wireguardSettings, fileDescriptor: fileDescriptor)
|
|
||||||
|
|
||||||
|
let handle = withStringsAsGoStrings(tunnelConfiguration.interface.name, wireguardSettings) { return wgTurnOn($0.0, $0.1, fileDescriptor) }
|
||||||
if handle < 0 {
|
if handle < 0 {
|
||||||
wg_log(.error, staticMessage: "Starting tunnel failed: Could not start WireGuard")
|
wg_log(.error, staticMessage: "Starting tunnel failed: Could not start WireGuard")
|
||||||
errorNotifier.notify(PacketTunnelProviderError.couldNotStartWireGuard)
|
errorNotifier.notify(PacketTunnelProviderError.couldNotStartWireGuard)
|
||||||
startTunnelCompletionHandler(PacketTunnelProviderError.couldNotStartWireGuard)
|
startTunnelCompletionHandler(PacketTunnelProviderError.couldNotStartWireGuard)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
wgHandle = handle
|
wgHandle = handle
|
||||||
|
|
||||||
let networkSettings: NEPacketTunnelNetworkSettings = packetTunnelSettingsGenerator.generateNetworkSettings()
|
let networkSettings: NEPacketTunnelNetworkSettings = packetTunnelSettingsGenerator!.generateNetworkSettings()
|
||||||
setTunnelNetworkSettings(networkSettings) { error in
|
setTunnelNetworkSettings(networkSettings) { error in
|
||||||
if let error = error {
|
if let error = error {
|
||||||
wg_log(.error, staticMessage: "Starting tunnel failed: Error setting network settings.")
|
wg_log(.error, staticMessage: "Starting tunnel failed: Error setting network settings.")
|
||||||
@ -165,8 +137,21 @@ class PacketTunnelProvider: NEPacketTunnelProvider {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private func connect(interfaceName: String, settings: String, fileDescriptor: Int32) -> Int32 {
|
private func pathUpdate(path: Network.NWPath) {
|
||||||
return withStringsAsGoStrings(interfaceName, settings) { return wgTurnOn($0.0, $0.1, fileDescriptor) }
|
guard let handle = wgHandle, let packetTunnelSettingsGenerator = packetTunnelSettingsGenerator else { return }
|
||||||
|
var listenPort: UInt16?
|
||||||
|
if path.availableInterfaces.isEmpty || lastFirstInterface != path.availableInterfaces.first {
|
||||||
|
listenPort = wgGetListenPort(handle)
|
||||||
|
lastFirstInterface = path.availableInterfaces.first
|
||||||
|
}
|
||||||
|
guard path.status == .satisfied else { return }
|
||||||
|
wg_log(.debug, message: "Network change detected, re-establishing sockets and IPs: \(path.availableInterfaces)")
|
||||||
|
let endpointString = packetTunnelSettingsGenerator.endpointUapiConfiguration(currentListenPort: listenPort)
|
||||||
|
let err = withStringsAsGoStrings(endpointString, call: { return wgSetConfig(handle, $0.0) })
|
||||||
|
if err == -EADDRINUSE && listenPort != nil {
|
||||||
|
let endpointString = packetTunnelSettingsGenerator.endpointUapiConfiguration(currentListenPort: 0)
|
||||||
|
_ = withStringsAsGoStrings(endpointString, call: { return wgSetConfig(handle, $0.0) })
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -15,15 +15,11 @@ class PacketTunnelSettingsGenerator {
|
|||||||
self.resolvedEndpoints = resolvedEndpoints
|
self.resolvedEndpoints = resolvedEndpoints
|
||||||
}
|
}
|
||||||
|
|
||||||
func endpointUapiConfiguration(shouldIncludeListenPort: Bool, currentListenPort: UInt16?) -> String {
|
func endpointUapiConfiguration(currentListenPort: UInt16?) -> String {
|
||||||
var wgSettings = ""
|
var wgSettings = ""
|
||||||
|
|
||||||
if shouldIncludeListenPort {
|
if let currentListenPort = currentListenPort {
|
||||||
if let tunnelListenPort = tunnelConfiguration.interface.listenPort {
|
wgSettings.append("listen_port=\(tunnelConfiguration.interface.listenPort ?? currentListenPort)\n")
|
||||||
wgSettings.append("listen_port=\(tunnelListenPort)\n")
|
|
||||||
} else if let currentListenPort = currentListenPort {
|
|
||||||
wgSettings.append("listen_port=\(currentListenPort)\n")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for (index, peer) in tunnelConfiguration.peers.enumerated() {
|
for (index, peer) in tunnelConfiguration.peers.enumerated() {
|
||||||
|
Loading…
Reference in New Issue
Block a user