92 lines
3.9 KiB
Swift
92 lines
3.9 KiB
Swift
//
|
|
// PacketTunnelProvider.swift
|
|
// WireGuardNetworkExtension
|
|
//
|
|
// Created by Jeroen Leenarts on 19-06-18.
|
|
// Copyright © 2018 Jason A. Donenfeld <Jason@zx2c4.com>. All rights reserved.
|
|
//
|
|
|
|
import NetworkExtension
|
|
import os.log
|
|
|
|
enum PacketTunnelProviderError: Error {
|
|
case tunnelSetupFailed
|
|
}
|
|
|
|
/// A packet tunnel provider object.
|
|
class PacketTunnelProvider: NEPacketTunnelProvider {
|
|
|
|
// MARK: Properties
|
|
|
|
/// A reference to the WireGuard wrapper object.
|
|
let wireGuardWrapper = WireGuardGoWrapper()
|
|
|
|
// MARK: NEPacketTunnelProvider
|
|
|
|
/// Begin the process of establishing the tunnel.
|
|
override func startTunnel(options: [String: NSObject]?, completionHandler: @escaping (Error?) -> Void) {
|
|
os_log("Starting tunnel", log: Log.general, type: .info)
|
|
|
|
let config = self.protocolConfiguration as! NETunnelProviderProtocol // swiftlint:disable:this force_cast
|
|
let interfaceName = config.providerConfiguration![PCKeys.title.rawValue]! as! String // swiftlint:disable:this force_cast
|
|
let mtu = config.providerConfiguration![PCKeys.mtu.rawValue] as? NSNumber
|
|
let settings = config.providerConfiguration![PCKeys.settings.rawValue]! as! String // swiftlint:disable:this force_cast
|
|
let endpoints = config.providerConfiguration?[PCKeys.endpoints.rawValue] as? String ?? ""
|
|
let addresses = (config.providerConfiguration?[PCKeys.addresses.rawValue] as? String ?? "").split(separator: ",")
|
|
|
|
settings.split(separator: "\n").forEach {os_log("Tunnel config: %{public}s", log: Log.general, type: .info, String($0))}
|
|
|
|
if wireGuardWrapper.turnOn(withInterfaceName: interfaceName, settingsString: settings) {
|
|
// Success
|
|
//TODO: Hardcoded values for addresses
|
|
let ipv4Settings = NEIPv4Settings(addresses: ["10.50.10.171"], subnetMasks: ["255.255.224.0"])
|
|
//TODO: Hardcoded values for allowed ips
|
|
ipv4Settings.includedRoutes = [NEIPv4Route(destinationAddress: "0.0.0.0", subnetMask: "0.0.0.0")]
|
|
ipv4Settings.excludedRoutes = endpoints.split(separator: ",").compactMap { $0.split(separator: ":").first}.map {NEIPv4Route(destinationAddress: String($0), subnetMask: "255.255.255.255")}
|
|
|
|
//TODO IPv6 settings
|
|
let newSettings = NEPacketTunnelNetworkSettings(tunnelRemoteAddress: "149.248.160.60")
|
|
newSettings.ipv4Settings = ipv4Settings
|
|
newSettings.tunnelOverheadBytes = 80
|
|
if let dns = config.providerConfiguration?["dns"] as? String {
|
|
var splitDnsEntries = dns.split(separator: ",").map {String($0)}
|
|
let dnsSettings = NEDNSSettings(servers: splitDnsEntries)
|
|
newSettings.dnsSettings = dnsSettings
|
|
}
|
|
if let mtu = mtu {
|
|
newSettings.mtu = mtu
|
|
}
|
|
|
|
setTunnelNetworkSettings(newSettings) { [weak self](error) in
|
|
completionHandler(error)
|
|
self?.wireGuardWrapper.configured = true
|
|
}
|
|
|
|
} else {
|
|
completionHandler(PacketTunnelProviderError.tunnelSetupFailed)
|
|
wireGuardWrapper.configured = false
|
|
}
|
|
}
|
|
|
|
/// Begin the process of stopping the tunnel.
|
|
override func stopTunnel(with reason: NEProviderStopReason, completionHandler: @escaping () -> Void) {
|
|
os_log("Stopping tunnel", log: Log.general, type: .info)
|
|
|
|
wireGuardWrapper.turnOff()
|
|
completionHandler()
|
|
}
|
|
|
|
/// Handle IPC messages from the app.
|
|
override func handleAppMessage(_ messageData: Data, completionHandler: ((Data?) -> Void)?) {
|
|
guard let messageString = NSString(data: messageData, encoding: String.Encoding.utf8.rawValue) else {
|
|
completionHandler?(nil)
|
|
return
|
|
}
|
|
|
|
os_log("Got a message from the app: %s", log: Log.general, type: .info, messageString)
|
|
|
|
let responseData = "Hello app".data(using: String.Encoding.utf8)
|
|
completionHandler?(responseData)
|
|
}
|
|
}
|