mirror of
https://github.com/passepartoutvpn/wireguard-apple.git
synced 2024-12-27 12:02:36 +00:00
44c4df1cd5
macOS freaks out if you try to explicitly route to 0.0.0.0/8 in its includedRoutes parameter. Even though 0.0.0.0/8 isn't RFC1918, it is marked in RFC6890 as "this host on this network", so removing it from the Internet routes makes sense semantically too. This commit changes 0.0.0.0/5 into: - 1.0.0.0/8 - 2.0.0.0/8 - 3.0.0.0/8 - 4.0.0.0/6 Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
700 lines
30 KiB
Swift
700 lines
30 KiB
Swift
// SPDX-License-Identifier: MIT
|
|
// Copyright © 2018-2020 WireGuard LLC. All Rights Reserved.
|
|
|
|
import Foundation
|
|
|
|
class TunnelViewModel {
|
|
|
|
enum InterfaceField: CaseIterable {
|
|
case name
|
|
case privateKey
|
|
case publicKey
|
|
case generateKeyPair
|
|
case addresses
|
|
case listenPort
|
|
case mtu
|
|
case dns
|
|
case status
|
|
case toggleStatus
|
|
|
|
var localizedUIString: String {
|
|
switch self {
|
|
case .name: return tr("tunnelInterfaceName")
|
|
case .privateKey: return tr("tunnelInterfacePrivateKey")
|
|
case .publicKey: return tr("tunnelInterfacePublicKey")
|
|
case .generateKeyPair: return tr("tunnelInterfaceGenerateKeypair")
|
|
case .addresses: return tr("tunnelInterfaceAddresses")
|
|
case .listenPort: return tr("tunnelInterfaceListenPort")
|
|
case .mtu: return tr("tunnelInterfaceMTU")
|
|
case .dns: return tr("tunnelInterfaceDNS")
|
|
case .status: return tr("tunnelInterfaceStatus")
|
|
case .toggleStatus: return ""
|
|
}
|
|
}
|
|
}
|
|
|
|
static let interfaceFieldsWithControl: Set<InterfaceField> = [
|
|
.generateKeyPair
|
|
]
|
|
|
|
enum PeerField: CaseIterable {
|
|
case publicKey
|
|
case preSharedKey
|
|
case endpoint
|
|
case persistentKeepAlive
|
|
case allowedIPs
|
|
case rxBytes
|
|
case txBytes
|
|
case lastHandshakeTime
|
|
case excludePrivateIPs
|
|
case deletePeer
|
|
|
|
var localizedUIString: String {
|
|
switch self {
|
|
case .publicKey: return tr("tunnelPeerPublicKey")
|
|
case .preSharedKey: return tr("tunnelPeerPreSharedKey")
|
|
case .endpoint: return tr("tunnelPeerEndpoint")
|
|
case .persistentKeepAlive: return tr("tunnelPeerPersistentKeepalive")
|
|
case .allowedIPs: return tr("tunnelPeerAllowedIPs")
|
|
case .rxBytes: return tr("tunnelPeerRxBytes")
|
|
case .txBytes: return tr("tunnelPeerTxBytes")
|
|
case .lastHandshakeTime: return tr("tunnelPeerLastHandshakeTime")
|
|
case .excludePrivateIPs: return tr("tunnelPeerExcludePrivateIPs")
|
|
case .deletePeer: return tr("deletePeerButtonTitle")
|
|
}
|
|
}
|
|
}
|
|
|
|
static let peerFieldsWithControl: Set<PeerField> = [
|
|
.excludePrivateIPs, .deletePeer
|
|
]
|
|
|
|
static let keyLengthInBase64 = 44
|
|
|
|
struct Changes {
|
|
enum FieldChange: Equatable {
|
|
case added
|
|
case removed
|
|
case modified(newValue: String)
|
|
}
|
|
|
|
var interfaceChanges: [InterfaceField: FieldChange]
|
|
var peerChanges: [(peerIndex: Int, changes: [PeerField: FieldChange])]
|
|
var peersRemovedIndices: [Int]
|
|
var peersInsertedIndices: [Int]
|
|
}
|
|
|
|
class InterfaceData {
|
|
var scratchpad = [InterfaceField: String]()
|
|
var fieldsWithError = Set<InterfaceField>()
|
|
var validatedConfiguration: InterfaceConfiguration?
|
|
var validatedName: String?
|
|
|
|
subscript(field: InterfaceField) -> String {
|
|
get {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
return scratchpad[field] ?? ""
|
|
}
|
|
set(stringValue) {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
validatedConfiguration = nil
|
|
validatedName = nil
|
|
if stringValue.isEmpty {
|
|
scratchpad.removeValue(forKey: field)
|
|
} else {
|
|
scratchpad[field] = stringValue
|
|
}
|
|
if field == .privateKey {
|
|
if stringValue.count == TunnelViewModel.keyLengthInBase64,
|
|
let privateKey = PrivateKey(base64Key: stringValue) {
|
|
scratchpad[.publicKey] = privateKey.publicKey.base64Key
|
|
} else {
|
|
scratchpad.removeValue(forKey: .publicKey)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func populateScratchpad() {
|
|
guard let config = validatedConfiguration else { return }
|
|
guard let name = validatedName else { return }
|
|
scratchpad = TunnelViewModel.InterfaceData.createScratchPad(from: config, name: name)
|
|
}
|
|
|
|
private static func createScratchPad(from config: InterfaceConfiguration, name: String) -> [InterfaceField: String] {
|
|
var scratchpad = [InterfaceField: String]()
|
|
scratchpad[.name] = name
|
|
scratchpad[.privateKey] = config.privateKey.base64Key
|
|
scratchpad[.publicKey] = config.privateKey.publicKey.base64Key
|
|
if !config.addresses.isEmpty {
|
|
scratchpad[.addresses] = config.addresses.map { $0.stringRepresentation }.joined(separator: ", ")
|
|
}
|
|
if let listenPort = config.listenPort {
|
|
scratchpad[.listenPort] = String(listenPort)
|
|
}
|
|
if let mtu = config.mtu {
|
|
scratchpad[.mtu] = String(mtu)
|
|
}
|
|
if !config.dns.isEmpty || !config.dnsSearch.isEmpty {
|
|
var dns = config.dns.map { $0.stringRepresentation }
|
|
dns.append(contentsOf: config.dnsSearch)
|
|
scratchpad[.dns] = dns.joined(separator: ", ")
|
|
}
|
|
return scratchpad
|
|
}
|
|
|
|
func save() -> SaveResult<(String, InterfaceConfiguration)> {
|
|
if let config = validatedConfiguration, let name = validatedName {
|
|
return .saved((name, config))
|
|
}
|
|
fieldsWithError.removeAll()
|
|
guard let name = scratchpad[.name]?.trimmingCharacters(in: .whitespacesAndNewlines), (!name.isEmpty) else {
|
|
fieldsWithError.insert(.name)
|
|
return .error(tr("alertInvalidInterfaceMessageNameRequired"))
|
|
}
|
|
guard let privateKeyString = scratchpad[.privateKey] else {
|
|
fieldsWithError.insert(.privateKey)
|
|
return .error(tr("alertInvalidInterfaceMessagePrivateKeyRequired"))
|
|
}
|
|
guard let privateKey = PrivateKey(base64Key: privateKeyString) else {
|
|
fieldsWithError.insert(.privateKey)
|
|
return .error(tr("alertInvalidInterfaceMessagePrivateKeyInvalid"))
|
|
}
|
|
var config = InterfaceConfiguration(privateKey: privateKey)
|
|
var errorMessages = [String]()
|
|
if let addressesString = scratchpad[.addresses] {
|
|
var addresses = [IPAddressRange]()
|
|
for addressString in addressesString.splitToArray(trimmingCharacters: .whitespacesAndNewlines) {
|
|
if let address = IPAddressRange(from: addressString) {
|
|
addresses.append(address)
|
|
} else {
|
|
fieldsWithError.insert(.addresses)
|
|
errorMessages.append(tr("alertInvalidInterfaceMessageAddressInvalid"))
|
|
}
|
|
}
|
|
config.addresses = addresses
|
|
}
|
|
if let listenPortString = scratchpad[.listenPort] {
|
|
if let listenPort = UInt16(listenPortString) {
|
|
config.listenPort = listenPort
|
|
} else {
|
|
fieldsWithError.insert(.listenPort)
|
|
errorMessages.append(tr("alertInvalidInterfaceMessageListenPortInvalid"))
|
|
}
|
|
}
|
|
if let mtuString = scratchpad[.mtu] {
|
|
if let mtu = UInt16(mtuString), mtu >= 576 {
|
|
config.mtu = mtu
|
|
} else {
|
|
fieldsWithError.insert(.mtu)
|
|
errorMessages.append(tr("alertInvalidInterfaceMessageMTUInvalid"))
|
|
}
|
|
}
|
|
if let dnsString = scratchpad[.dns] {
|
|
var dnsServers = [DNSServer]()
|
|
var dnsSearch = [String]()
|
|
for dnsServerString in dnsString.splitToArray(trimmingCharacters: .whitespacesAndNewlines) {
|
|
if let dnsServer = DNSServer(from: dnsServerString) {
|
|
dnsServers.append(dnsServer)
|
|
} else {
|
|
dnsSearch.append(dnsServerString)
|
|
}
|
|
}
|
|
config.dns = dnsServers
|
|
config.dnsSearch = dnsSearch
|
|
}
|
|
|
|
guard errorMessages.isEmpty else { return .error(errorMessages.first!) }
|
|
|
|
validatedConfiguration = config
|
|
validatedName = name
|
|
return .saved((name, config))
|
|
}
|
|
|
|
func filterFieldsWithValueOrControl(interfaceFields: [InterfaceField]) -> [InterfaceField] {
|
|
return interfaceFields.filter { field in
|
|
if TunnelViewModel.interfaceFieldsWithControl.contains(field) {
|
|
return true
|
|
}
|
|
return !self[field].isEmpty
|
|
}
|
|
}
|
|
|
|
func applyConfiguration(other: InterfaceConfiguration, otherName: String) -> [InterfaceField: Changes.FieldChange] {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
let otherScratchPad = InterfaceData.createScratchPad(from: other, name: otherName)
|
|
var changes = [InterfaceField: Changes.FieldChange]()
|
|
for field in InterfaceField.allCases {
|
|
switch (scratchpad[field] ?? "", otherScratchPad[field] ?? "") {
|
|
case ("", ""):
|
|
break
|
|
case ("", _):
|
|
changes[field] = .added
|
|
case (_, ""):
|
|
changes[field] = .removed
|
|
case (let this, let other):
|
|
if this != other {
|
|
changes[field] = .modified(newValue: other)
|
|
}
|
|
}
|
|
}
|
|
scratchpad = otherScratchPad
|
|
return changes
|
|
}
|
|
}
|
|
|
|
class PeerData {
|
|
var index: Int
|
|
var scratchpad = [PeerField: String]()
|
|
var fieldsWithError = Set<PeerField>()
|
|
var validatedConfiguration: PeerConfiguration?
|
|
var publicKey: PublicKey? {
|
|
if let validatedConfiguration = validatedConfiguration {
|
|
return validatedConfiguration.publicKey
|
|
}
|
|
if let scratchPadPublicKey = scratchpad[.publicKey] {
|
|
return PublicKey(base64Key: scratchPadPublicKey)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
private(set) var shouldAllowExcludePrivateIPsControl = false
|
|
private(set) var shouldStronglyRecommendDNS = false
|
|
private(set) var excludePrivateIPsValue = false
|
|
fileprivate var numberOfPeers = 0
|
|
|
|
init(index: Int) {
|
|
self.index = index
|
|
}
|
|
|
|
subscript(field: PeerField) -> String {
|
|
get {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
return scratchpad[field] ?? ""
|
|
}
|
|
set(stringValue) {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
validatedConfiguration = nil
|
|
if stringValue.isEmpty {
|
|
scratchpad.removeValue(forKey: field)
|
|
} else {
|
|
scratchpad[field] = stringValue
|
|
}
|
|
if field == .allowedIPs {
|
|
updateExcludePrivateIPsFieldState()
|
|
}
|
|
}
|
|
}
|
|
|
|
func populateScratchpad() {
|
|
guard let config = validatedConfiguration else { return }
|
|
scratchpad = TunnelViewModel.PeerData.createScratchPad(from: config)
|
|
updateExcludePrivateIPsFieldState()
|
|
}
|
|
|
|
private static func createScratchPad(from config: PeerConfiguration) -> [PeerField: String] {
|
|
var scratchpad = [PeerField: String]()
|
|
scratchpad[.publicKey] = config.publicKey.base64Key
|
|
if let preSharedKey = config.preSharedKey?.base64Key {
|
|
scratchpad[.preSharedKey] = preSharedKey
|
|
}
|
|
if !config.allowedIPs.isEmpty {
|
|
scratchpad[.allowedIPs] = config.allowedIPs.map { $0.stringRepresentation }.joined(separator: ", ")
|
|
}
|
|
if let endpoint = config.endpoint {
|
|
scratchpad[.endpoint] = endpoint.stringRepresentation
|
|
}
|
|
if let persistentKeepAlive = config.persistentKeepAlive {
|
|
scratchpad[.persistentKeepAlive] = String(persistentKeepAlive)
|
|
}
|
|
if let rxBytes = config.rxBytes {
|
|
scratchpad[.rxBytes] = prettyBytes(rxBytes)
|
|
}
|
|
if let txBytes = config.txBytes {
|
|
scratchpad[.txBytes] = prettyBytes(txBytes)
|
|
}
|
|
if let lastHandshakeTime = config.lastHandshakeTime {
|
|
scratchpad[.lastHandshakeTime] = prettyTimeAgo(timestamp: lastHandshakeTime)
|
|
}
|
|
return scratchpad
|
|
}
|
|
|
|
func save() -> SaveResult<PeerConfiguration> {
|
|
if let validatedConfiguration = validatedConfiguration {
|
|
return .saved(validatedConfiguration)
|
|
}
|
|
fieldsWithError.removeAll()
|
|
guard let publicKeyString = scratchpad[.publicKey] else {
|
|
fieldsWithError.insert(.publicKey)
|
|
return .error(tr("alertInvalidPeerMessagePublicKeyRequired"))
|
|
}
|
|
guard let publicKey = PublicKey(base64Key: publicKeyString) else {
|
|
fieldsWithError.insert(.publicKey)
|
|
return .error(tr("alertInvalidPeerMessagePublicKeyInvalid"))
|
|
}
|
|
var config = PeerConfiguration(publicKey: publicKey)
|
|
var errorMessages = [String]()
|
|
if let preSharedKeyString = scratchpad[.preSharedKey] {
|
|
if let preSharedKey = PreSharedKey(base64Key: preSharedKeyString) {
|
|
config.preSharedKey = preSharedKey
|
|
} else {
|
|
fieldsWithError.insert(.preSharedKey)
|
|
errorMessages.append(tr("alertInvalidPeerMessagePreSharedKeyInvalid"))
|
|
}
|
|
}
|
|
if let allowedIPsString = scratchpad[.allowedIPs] {
|
|
var allowedIPs = [IPAddressRange]()
|
|
for allowedIPString in allowedIPsString.splitToArray(trimmingCharacters: .whitespacesAndNewlines) {
|
|
if let allowedIP = IPAddressRange(from: allowedIPString) {
|
|
allowedIPs.append(allowedIP)
|
|
} else {
|
|
fieldsWithError.insert(.allowedIPs)
|
|
errorMessages.append(tr("alertInvalidPeerMessageAllowedIPsInvalid"))
|
|
}
|
|
}
|
|
config.allowedIPs = allowedIPs
|
|
}
|
|
if let endpointString = scratchpad[.endpoint] {
|
|
if let endpoint = Endpoint(from: endpointString) {
|
|
config.endpoint = endpoint
|
|
} else {
|
|
fieldsWithError.insert(.endpoint)
|
|
errorMessages.append(tr("alertInvalidPeerMessageEndpointInvalid"))
|
|
}
|
|
}
|
|
if let persistentKeepAliveString = scratchpad[.persistentKeepAlive] {
|
|
if let persistentKeepAlive = UInt16(persistentKeepAliveString) {
|
|
config.persistentKeepAlive = persistentKeepAlive
|
|
} else {
|
|
fieldsWithError.insert(.persistentKeepAlive)
|
|
errorMessages.append(tr("alertInvalidPeerMessagePersistentKeepaliveInvalid"))
|
|
}
|
|
}
|
|
|
|
guard errorMessages.isEmpty else { return .error(errorMessages.first!) }
|
|
|
|
validatedConfiguration = config
|
|
return .saved(config)
|
|
}
|
|
|
|
func filterFieldsWithValueOrControl(peerFields: [PeerField]) -> [PeerField] {
|
|
return peerFields.filter { field in
|
|
if TunnelViewModel.peerFieldsWithControl.contains(field) {
|
|
return true
|
|
}
|
|
return (!self[field].isEmpty)
|
|
}
|
|
}
|
|
|
|
static let ipv4DefaultRouteString = "0.0.0.0/0"
|
|
static let ipv4DefaultRouteModRFC1918String = [ // Set of all non-private IPv4 IPs
|
|
"1.0.0.0/8", "2.0.0.0/8", "3.0.0.0/8", "4.0.0.0/6", "8.0.0.0/7", "11.0.0.0/8",
|
|
"12.0.0.0/6", "16.0.0.0/4", "32.0.0.0/3", "64.0.0.0/2", "128.0.0.0/3",
|
|
"160.0.0.0/5", "168.0.0.0/6", "172.0.0.0/12", "172.32.0.0/11", "172.64.0.0/10",
|
|
"172.128.0.0/9", "173.0.0.0/8", "174.0.0.0/7", "176.0.0.0/4", "192.0.0.0/9",
|
|
"192.128.0.0/11", "192.160.0.0/13", "192.169.0.0/16", "192.170.0.0/15",
|
|
"192.172.0.0/14", "192.176.0.0/12", "192.192.0.0/10", "193.0.0.0/8",
|
|
"194.0.0.0/7", "196.0.0.0/6", "200.0.0.0/5", "208.0.0.0/4"
|
|
]
|
|
|
|
static func excludePrivateIPsFieldStates(isSinglePeer: Bool, allowedIPs: Set<String>) -> (shouldAllowExcludePrivateIPsControl: Bool, excludePrivateIPsValue: Bool) {
|
|
guard isSinglePeer else {
|
|
return (shouldAllowExcludePrivateIPsControl: false, excludePrivateIPsValue: false)
|
|
}
|
|
let allowedIPStrings = Set<String>(allowedIPs)
|
|
if allowedIPStrings.contains(TunnelViewModel.PeerData.ipv4DefaultRouteString) {
|
|
return (shouldAllowExcludePrivateIPsControl: true, excludePrivateIPsValue: false)
|
|
} else if allowedIPStrings.isSuperset(of: TunnelViewModel.PeerData.ipv4DefaultRouteModRFC1918String) {
|
|
return (shouldAllowExcludePrivateIPsControl: true, excludePrivateIPsValue: true)
|
|
} else {
|
|
return (shouldAllowExcludePrivateIPsControl: false, excludePrivateIPsValue: false)
|
|
}
|
|
}
|
|
|
|
func updateExcludePrivateIPsFieldState() {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
let allowedIPStrings = Set<String>(scratchpad[.allowedIPs].splitToArray(trimmingCharacters: .whitespacesAndNewlines))
|
|
(shouldAllowExcludePrivateIPsControl, excludePrivateIPsValue) = TunnelViewModel.PeerData.excludePrivateIPsFieldStates(isSinglePeer: numberOfPeers == 1, allowedIPs: allowedIPStrings)
|
|
shouldStronglyRecommendDNS = allowedIPStrings.contains(TunnelViewModel.PeerData.ipv4DefaultRouteString) || allowedIPStrings.isSuperset(of: TunnelViewModel.PeerData.ipv4DefaultRouteModRFC1918String)
|
|
}
|
|
|
|
static func normalizedIPAddressRangeStrings(_ list: [String]) -> [String] {
|
|
return list.compactMap { IPAddressRange(from: $0) }.map { $0.stringRepresentation }
|
|
}
|
|
|
|
static func modifiedAllowedIPs(currentAllowedIPs: [String], excludePrivateIPs: Bool, dnsServers: [String], oldDNSServers: [String]?) -> [String] {
|
|
let normalizedDNSServers = normalizedIPAddressRangeStrings(dnsServers)
|
|
let normalizedOldDNSServers = oldDNSServers == nil ? normalizedDNSServers : normalizedIPAddressRangeStrings(oldDNSServers!)
|
|
let ipv6Addresses = normalizedIPAddressRangeStrings(currentAllowedIPs.filter { $0.contains(":") })
|
|
if excludePrivateIPs {
|
|
return ipv6Addresses + TunnelViewModel.PeerData.ipv4DefaultRouteModRFC1918String + normalizedDNSServers
|
|
} else {
|
|
return ipv6Addresses.filter { !normalizedOldDNSServers.contains($0) } + [TunnelViewModel.PeerData.ipv4DefaultRouteString]
|
|
}
|
|
}
|
|
|
|
func excludePrivateIPsValueChanged(isOn: Bool, dnsServers: String, oldDNSServers: String? = nil) {
|
|
let allowedIPStrings = scratchpad[.allowedIPs].splitToArray(trimmingCharacters: .whitespacesAndNewlines)
|
|
let dnsServerStrings = dnsServers.splitToArray(trimmingCharacters: .whitespacesAndNewlines)
|
|
let oldDNSServerStrings = oldDNSServers?.splitToArray(trimmingCharacters: .whitespacesAndNewlines)
|
|
let modifiedAllowedIPStrings = TunnelViewModel.PeerData.modifiedAllowedIPs(currentAllowedIPs: allowedIPStrings, excludePrivateIPs: isOn, dnsServers: dnsServerStrings, oldDNSServers: oldDNSServerStrings)
|
|
scratchpad[.allowedIPs] = modifiedAllowedIPStrings.joined(separator: ", ")
|
|
validatedConfiguration = nil
|
|
excludePrivateIPsValue = isOn
|
|
}
|
|
|
|
func applyConfiguration(other: PeerConfiguration) -> [PeerField: Changes.FieldChange] {
|
|
if scratchpad.isEmpty {
|
|
populateScratchpad()
|
|
}
|
|
let otherScratchPad = PeerData.createScratchPad(from: other)
|
|
var changes = [PeerField: Changes.FieldChange]()
|
|
for field in PeerField.allCases {
|
|
switch (scratchpad[field] ?? "", otherScratchPad[field] ?? "") {
|
|
case ("", ""):
|
|
break
|
|
case ("", _):
|
|
changes[field] = .added
|
|
case (_, ""):
|
|
changes[field] = .removed
|
|
case (let this, let other):
|
|
if this != other {
|
|
changes[field] = .modified(newValue: other)
|
|
}
|
|
}
|
|
}
|
|
scratchpad = otherScratchPad
|
|
return changes
|
|
}
|
|
}
|
|
|
|
enum SaveResult<Configuration> {
|
|
case saved(Configuration)
|
|
case error(String)
|
|
}
|
|
|
|
private(set) var interfaceData: InterfaceData
|
|
private(set) var peersData: [PeerData]
|
|
|
|
init(tunnelConfiguration: TunnelConfiguration?) {
|
|
let interfaceData = InterfaceData()
|
|
var peersData = [PeerData]()
|
|
if let tunnelConfiguration = tunnelConfiguration {
|
|
interfaceData.validatedConfiguration = tunnelConfiguration.interface
|
|
interfaceData.validatedName = tunnelConfiguration.name
|
|
for (index, peerConfiguration) in tunnelConfiguration.peers.enumerated() {
|
|
let peerData = PeerData(index: index)
|
|
peerData.validatedConfiguration = peerConfiguration
|
|
peersData.append(peerData)
|
|
}
|
|
}
|
|
let numberOfPeers = peersData.count
|
|
for peerData in peersData {
|
|
peerData.numberOfPeers = numberOfPeers
|
|
peerData.updateExcludePrivateIPsFieldState()
|
|
}
|
|
self.interfaceData = interfaceData
|
|
self.peersData = peersData
|
|
}
|
|
|
|
func appendEmptyPeer() {
|
|
let peer = PeerData(index: peersData.count)
|
|
peersData.append(peer)
|
|
for peer in peersData {
|
|
peer.numberOfPeers = peersData.count
|
|
peer.updateExcludePrivateIPsFieldState()
|
|
}
|
|
}
|
|
|
|
func deletePeer(peer: PeerData) {
|
|
let removedPeer = peersData.remove(at: peer.index)
|
|
assert(removedPeer.index == peer.index)
|
|
for peer in peersData[peer.index ..< peersData.count] {
|
|
assert(peer.index > 0)
|
|
peer.index -= 1
|
|
}
|
|
for peer in peersData {
|
|
peer.numberOfPeers = peersData.count
|
|
peer.updateExcludePrivateIPsFieldState()
|
|
}
|
|
}
|
|
|
|
func updateDNSServersInAllowedIPsIfRequired(oldDNSServers: String, newDNSServers: String) -> Bool {
|
|
guard peersData.count == 1, let firstPeer = peersData.first else { return false }
|
|
guard firstPeer.shouldAllowExcludePrivateIPsControl && firstPeer.excludePrivateIPsValue else { return false }
|
|
let allowedIPStrings = firstPeer[.allowedIPs].splitToArray(trimmingCharacters: .whitespacesAndNewlines)
|
|
let oldDNSServerStrings = TunnelViewModel.PeerData.normalizedIPAddressRangeStrings(oldDNSServers.splitToArray(trimmingCharacters: .whitespacesAndNewlines))
|
|
let newDNSServerStrings = TunnelViewModel.PeerData.normalizedIPAddressRangeStrings(newDNSServers.splitToArray(trimmingCharacters: .whitespacesAndNewlines))
|
|
let updatedAllowedIPStrings = allowedIPStrings.filter { !oldDNSServerStrings.contains($0) } + newDNSServerStrings
|
|
firstPeer[.allowedIPs] = updatedAllowedIPStrings.joined(separator: ", ")
|
|
return true
|
|
}
|
|
|
|
func save() -> SaveResult<TunnelConfiguration> {
|
|
let interfaceSaveResult = interfaceData.save()
|
|
let peerSaveResults = peersData.map { $0.save() } // Save all, to help mark erroring fields in red
|
|
switch interfaceSaveResult {
|
|
case .error(let errorMessage):
|
|
return .error(errorMessage)
|
|
case .saved(let interfaceConfiguration):
|
|
var peerConfigurations = [PeerConfiguration]()
|
|
peerConfigurations.reserveCapacity(peerSaveResults.count)
|
|
for peerSaveResult in peerSaveResults {
|
|
switch peerSaveResult {
|
|
case .error(let errorMessage):
|
|
return .error(errorMessage)
|
|
case .saved(let peerConfiguration):
|
|
peerConfigurations.append(peerConfiguration)
|
|
}
|
|
}
|
|
|
|
let peerPublicKeysArray = peerConfigurations.map { $0.publicKey }
|
|
let peerPublicKeysSet = Set<PublicKey>(peerPublicKeysArray)
|
|
if peerPublicKeysArray.count != peerPublicKeysSet.count {
|
|
return .error(tr("alertInvalidPeerMessagePublicKeyDuplicated"))
|
|
}
|
|
|
|
let tunnelConfiguration = TunnelConfiguration(name: interfaceConfiguration.0, interface: interfaceConfiguration.1, peers: peerConfigurations)
|
|
return .saved(tunnelConfiguration)
|
|
}
|
|
}
|
|
|
|
func asWgQuickConfig() -> String? {
|
|
let saveResult = save()
|
|
if case .saved(let tunnelConfiguration) = saveResult {
|
|
return tunnelConfiguration.asWgQuickConfig()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
@discardableResult
|
|
func applyConfiguration(other: TunnelConfiguration) -> Changes {
|
|
// Replaces current data with data from other TunnelConfiguration, ignoring any changes in peer ordering.
|
|
|
|
let interfaceChanges = interfaceData.applyConfiguration(other: other.interface, otherName: other.name ?? "")
|
|
|
|
var peerChanges = [(peerIndex: Int, changes: [PeerField: Changes.FieldChange])]()
|
|
for otherPeer in other.peers {
|
|
if let peersDataIndex = peersData.firstIndex(where: { $0.publicKey == otherPeer.publicKey }) {
|
|
let peerData = peersData[peersDataIndex]
|
|
let changes = peerData.applyConfiguration(other: otherPeer)
|
|
if !changes.isEmpty {
|
|
peerChanges.append((peerIndex: peersDataIndex, changes: changes))
|
|
}
|
|
}
|
|
}
|
|
|
|
var removedPeerIndices = [Int]()
|
|
for (index, peerData) in peersData.enumerated().reversed() {
|
|
if let peerPublicKey = peerData.publicKey, !other.peers.contains(where: { $0.publicKey == peerPublicKey}) {
|
|
removedPeerIndices.append(index)
|
|
peersData.remove(at: index)
|
|
}
|
|
}
|
|
|
|
var addedPeerIndices = [Int]()
|
|
for otherPeer in other.peers {
|
|
if !peersData.contains(where: { $0.publicKey == otherPeer.publicKey }) {
|
|
addedPeerIndices.append(peersData.count)
|
|
let peerData = PeerData(index: peersData.count)
|
|
peerData.validatedConfiguration = otherPeer
|
|
peersData.append(peerData)
|
|
}
|
|
}
|
|
|
|
for (index, peer) in peersData.enumerated() {
|
|
peer.index = index
|
|
peer.numberOfPeers = peersData.count
|
|
peer.updateExcludePrivateIPsFieldState()
|
|
}
|
|
|
|
return Changes(interfaceChanges: interfaceChanges, peerChanges: peerChanges, peersRemovedIndices: removedPeerIndices, peersInsertedIndices: addedPeerIndices)
|
|
}
|
|
}
|
|
|
|
private func prettyBytes(_ bytes: UInt64) -> String {
|
|
switch bytes {
|
|
case 0..<1024:
|
|
return "\(bytes) B"
|
|
case 1024 ..< (1024 * 1024):
|
|
return String(format: "%.2f", Double(bytes) / 1024) + " KiB"
|
|
case 1024 ..< (1024 * 1024 * 1024):
|
|
return String(format: "%.2f", Double(bytes) / (1024 * 1024)) + " MiB"
|
|
case 1024 ..< (1024 * 1024 * 1024 * 1024):
|
|
return String(format: "%.2f", Double(bytes) / (1024 * 1024 * 1024)) + " GiB"
|
|
default:
|
|
return String(format: "%.2f", Double(bytes) / (1024 * 1024 * 1024 * 1024)) + " TiB"
|
|
}
|
|
}
|
|
|
|
private func prettyTimeAgo(timestamp: Date) -> String {
|
|
let now = Date()
|
|
let timeInterval = Int64(now.timeIntervalSince(timestamp))
|
|
switch timeInterval {
|
|
case ..<0: return tr("tunnelHandshakeTimestampSystemClockBackward")
|
|
case 0: return tr("tunnelHandshakeTimestampNow")
|
|
default:
|
|
return tr(format: "tunnelHandshakeTimestampAgo (%@)", prettyTime(secondsLeft: timeInterval))
|
|
}
|
|
}
|
|
|
|
private func prettyTime(secondsLeft: Int64) -> String {
|
|
var left = secondsLeft
|
|
var timeStrings = [String]()
|
|
let years = left / (365 * 24 * 60 * 60)
|
|
left = left % (365 * 24 * 60 * 60)
|
|
let days = left / (24 * 60 * 60)
|
|
left = left % (24 * 60 * 60)
|
|
let hours = left / (60 * 60)
|
|
left = left % (60 * 60)
|
|
let minutes = left / 60
|
|
let seconds = left % 60
|
|
|
|
#if os(iOS)
|
|
if years > 0 {
|
|
return years == 1 ? tr(format: "tunnelHandshakeTimestampYear (%d)", years) : tr(format: "tunnelHandshakeTimestampYears (%d)", years)
|
|
}
|
|
if days > 0 {
|
|
return days == 1 ? tr(format: "tunnelHandshakeTimestampDay (%d)", days) : tr(format: "tunnelHandshakeTimestampDays (%d)", days)
|
|
}
|
|
if hours > 0 {
|
|
let hhmmss = String(format: "%02d:%02d:%02d", hours, minutes, seconds)
|
|
return tr(format: "tunnelHandshakeTimestampHours hh:mm:ss (%@)", hhmmss)
|
|
}
|
|
if minutes > 0 {
|
|
let mmss = String(format: "%02d:%02d", minutes, seconds)
|
|
return tr(format: "tunnelHandshakeTimestampMinutes mm:ss (%@)", mmss)
|
|
}
|
|
return seconds == 1 ? tr(format: "tunnelHandshakeTimestampSecond (%d)", seconds) : tr(format: "tunnelHandshakeTimestampSeconds (%d)", seconds)
|
|
#elseif os(macOS)
|
|
if years > 0 {
|
|
timeStrings.append(years == 1 ? tr(format: "tunnelHandshakeTimestampYear (%d)", years) : tr(format: "tunnelHandshakeTimestampYears (%d)", years))
|
|
}
|
|
if days > 0 {
|
|
timeStrings.append(days == 1 ? tr(format: "tunnelHandshakeTimestampDay (%d)", days) : tr(format: "tunnelHandshakeTimestampDays (%d)", days))
|
|
}
|
|
if hours > 0 {
|
|
timeStrings.append(hours == 1 ? tr(format: "tunnelHandshakeTimestampHour (%d)", hours) : tr(format: "tunnelHandshakeTimestampHours (%d)", hours))
|
|
}
|
|
if minutes > 0 {
|
|
timeStrings.append(minutes == 1 ? tr(format: "tunnelHandshakeTimestampMinute (%d)", minutes) : tr(format: "tunnelHandshakeTimestampMinutes (%d)", minutes))
|
|
}
|
|
if seconds > 0 {
|
|
timeStrings.append(seconds == 1 ? tr(format: "tunnelHandshakeTimestampSecond (%d)", seconds) : tr(format: "tunnelHandshakeTimestampSeconds (%d)", seconds))
|
|
}
|
|
return timeStrings.joined(separator: ", ")
|
|
#endif
|
|
}
|