From 26059788890ed25ab10f6ae01a743b9a37926e69 Mon Sep 17 00:00:00 2001 From: Mykola Baibuz Date: Tue, 17 Jun 2025 05:00:41 -0700 Subject: [PATCH 01/19] fix: allow internet traffic for strict mode with split tunnel (#1654) --- client/platforms/windows/daemon/wireguardutilswindows.cpp | 1 + client/protocols/openvpnprotocol.cpp | 2 +- client/protocols/xrayprotocol.cpp | 2 +- client/ui/qml/Pages2/PageSettingsKillSwitch.qml | 7 ++----- service/server/killswitch.cpp | 3 +++ 5 files changed, 8 insertions(+), 7 deletions(-) diff --git a/client/platforms/windows/daemon/wireguardutilswindows.cpp b/client/platforms/windows/daemon/wireguardutilswindows.cpp index d01ef54a..a5c9c84d 100644 --- a/client/platforms/windows/daemon/wireguardutilswindows.cpp +++ b/client/platforms/windows/daemon/wireguardutilswindows.cpp @@ -130,6 +130,7 @@ bool WireguardUtilsWindows::addInterface(const InterfaceConfig& config) { // Enable the windows firewall NET_IFINDEX ifindex; ConvertInterfaceLuidToIndex(&luid, &ifindex); + m_firewall->allowAllTraffic(); m_firewall->enableInterface(ifindex); } diff --git a/client/protocols/openvpnprotocol.cpp b/client/protocols/openvpnprotocol.cpp index 429b85a6..0bbdbd07 100644 --- a/client/protocols/openvpnprotocol.cpp +++ b/client/protocols/openvpnprotocol.cpp @@ -343,7 +343,7 @@ void OpenVpnProtocol::updateVpnGateway(const QString &line) // killSwitch toggle if (m_vpnLocalAddress == netInterfaces.at(i).addressEntries().at(j).ip().toString()) { if (QVariant(m_configData.value(config_key::killSwitchOption).toString()).toBool()) { - IpcClient::Interface()->enableKillSwitch(QJsonObject(), netInterfaces.at(i).index()); + IpcClient::Interface()->enableKillSwitch(m_configData, netInterfaces.at(i).index()); } m_configData.insert("vpnAdapterIndex", netInterfaces.at(i).index()); m_configData.insert("vpnGateway", m_vpnGateway); diff --git a/client/protocols/xrayprotocol.cpp b/client/protocols/xrayprotocol.cpp index faad8e94..9f26d1e6 100755 --- a/client/protocols/xrayprotocol.cpp +++ b/client/protocols/xrayprotocol.cpp @@ -134,7 +134,7 @@ ErrorCode XrayProtocol::startTun2Sock() // killSwitch toggle if (m_vpnLocalAddress == netInterfaces.at(i).addressEntries().at(j).ip().toString()) { if (QVariant(m_configData.value(config_key::killSwitchOption).toString()).toBool()) { - IpcClient::Interface()->enableKillSwitch(QJsonObject(), netInterfaces.at(i).index()); + IpcClient::Interface()->enableKillSwitch(m_configData, netInterfaces.at(i).index()); } m_configData.insert("vpnAdapterIndex", netInterfaces.at(i).index()); m_configData.insert("vpnGateway", m_vpnGateway); diff --git a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml index 1ffcc8cf..444eb415 100644 --- a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml +++ b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml @@ -81,8 +81,7 @@ PageType { Layout.leftMargin: 16 Layout.rightMargin: 16 - visible: false - enabled: false //SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected + enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected checked: SettingsController.strictKillSwitchEnabled text: qsTr("Strict KillSwitch") @@ -104,9 +103,7 @@ PageType { } } - DividerType { - visible: false - } + DividerType {} LabelWithButtonType { Layout.topMargin: 32 diff --git a/service/server/killswitch.cpp b/service/server/killswitch.cpp index c44bd6a2..447be865 100644 --- a/service/server/killswitch.cpp +++ b/service/server/killswitch.cpp @@ -255,6 +255,9 @@ bool KillSwitch::enablePeerTraffic(const QJsonObject &configStr) { bool KillSwitch::enableKillSwitch(const QJsonObject &configStr, int vpnAdapterIndex) { #ifdef Q_OS_WIN + if (configStr.value("splitTunnelType").toInt() != 0) { + WindowsFirewall::create(this)->allowAllTraffic(); + } return WindowsFirewall::create(this)->enableInterface(vpnAdapterIndex); #endif From 2d22a74b229f322f2489efd097e8793bf47e7300 Mon Sep 17 00:00:00 2001 From: "vladimir.kuznetsov" Date: Fri, 20 Jun 2025 22:18:47 +0800 Subject: [PATCH 02/19] refactoring: added classes for working with server configs --- CMakeLists.txt | 2 +- client/cmake/sources.cmake | 18 ++ client/core/api/apiDefs.h | 5 - client/core/api/apiUtils.cpp | 12 +- client/core/api/apiUtils.h | 2 +- client/core/controllers/coreController.cpp | 3 - client/core/defs.h | 7 + .../models/containers/containerConfig.cpp | 5 + .../core/models/containers/containerConfig.h | 19 ++ .../models/protocols/awgProtocolConfig.cpp | 198 ++++++++++++++++++ .../core/models/protocols/awgProtocolConfig.h | 65 ++++++ .../models/protocols/cloakProtocolConfig.cpp | 43 ++++ .../models/protocols/cloakProtocolConfig.h | 35 ++++ .../protocols/openvpnProtocolConfig.cpp | 83 ++++++++ .../models/protocols/openvpnProtocolConfig.h | 46 ++++ .../core/models/protocols/protocolConfig.cpp | 12 ++ client/core/models/protocols/protocolConfig.h | 16 ++ .../protocols/shadowsocksProtocolConfig.cpp | 39 ++++ .../protocols/shadowsocksProtocolConfig.h | 34 +++ .../protocols/wireguardProtocolConfig.cpp | 120 +++++++++++ .../protocols/wireguardProtocolConfig.h | 58 +++++ .../models/protocols/xrayProtocolConfig.cpp | 43 ++++ .../models/protocols/xrayProtocolConfig.h | 35 ++++ .../core/models/servers/apiV1ServerConfig.cpp | 30 +++ .../core/models/servers/apiV1ServerConfig.h | 17 ++ .../core/models/servers/apiV2ServerConfig.cpp | 125 +++++++++++ .../core/models/servers/apiV2ServerConfig.h | 54 +++++ .../models/servers/selfHostedServerConfig.cpp | 48 +++++ .../models/servers/selfHostedServerConfig.h | 19 ++ client/core/models/servers/serverConfig.cpp | 145 +++++++++++++ client/core/models/servers/serverConfig.h | 32 +++ .../controllers/api/apiConfigsController.cpp | 10 +- client/ui/models/servers_model.cpp | 144 +++++++------ client/ui/models/servers_model.h | 8 +- 34 files changed, 1441 insertions(+), 91 deletions(-) create mode 100644 client/core/models/containers/containerConfig.cpp create mode 100644 client/core/models/containers/containerConfig.h create mode 100644 client/core/models/protocols/awgProtocolConfig.cpp create mode 100644 client/core/models/protocols/awgProtocolConfig.h create mode 100644 client/core/models/protocols/cloakProtocolConfig.cpp create mode 100644 client/core/models/protocols/cloakProtocolConfig.h create mode 100644 client/core/models/protocols/openvpnProtocolConfig.cpp create mode 100644 client/core/models/protocols/openvpnProtocolConfig.h create mode 100644 client/core/models/protocols/protocolConfig.cpp create mode 100644 client/core/models/protocols/protocolConfig.h create mode 100644 client/core/models/protocols/shadowsocksProtocolConfig.cpp create mode 100644 client/core/models/protocols/shadowsocksProtocolConfig.h create mode 100644 client/core/models/protocols/wireguardProtocolConfig.cpp create mode 100644 client/core/models/protocols/wireguardProtocolConfig.h create mode 100644 client/core/models/protocols/xrayProtocolConfig.cpp create mode 100644 client/core/models/protocols/xrayProtocolConfig.h create mode 100644 client/core/models/servers/apiV1ServerConfig.cpp create mode 100644 client/core/models/servers/apiV1ServerConfig.h create mode 100644 client/core/models/servers/apiV2ServerConfig.cpp create mode 100644 client/core/models/servers/apiV2ServerConfig.h create mode 100644 client/core/models/servers/selfHostedServerConfig.cpp create mode 100644 client/core/models/servers/selfHostedServerConfig.h create mode 100644 client/core/models/servers/serverConfig.cpp create mode 100644 client/core/models/servers/serverConfig.h diff --git a/CMakeLists.txt b/CMakeLists.txt index 424dcf3a..a759bd80 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -28,7 +28,7 @@ elseif(${CMAKE_SYSTEM_NAME} STREQUAL "Emscripten") endif() set(QT_BUILD_TOOLS_WHEN_CROSS_COMPILING ON) -set(CMAKE_CXX_STANDARD 17) +set(CMAKE_CXX_STANDARD 20) set(CMAKE_CXX_STANDARD_REQUIRED ON) if(APPLE AND NOT IOS) diff --git a/client/cmake/sources.cmake b/client/cmake/sources.cmake index c3af531a..fe8e37e3 100644 --- a/client/cmake/sources.cmake +++ b/client/cmake/sources.cmake @@ -116,6 +116,7 @@ file(GLOB UI_MODELS_H CONFIGURE_DEPENDS ${CLIENT_ROOT_DIR}/ui/models/services/*.h ${CLIENT_ROOT_DIR}/ui/models/api/*.h ) + file(GLOB UI_MODELS_CPP CONFIGURE_DEPENDS ${CLIENT_ROOT_DIR}/ui/models/*.cpp ${CLIENT_ROOT_DIR}/ui/models/protocols/*.cpp @@ -127,17 +128,33 @@ file(GLOB UI_CONTROLLERS_H CONFIGURE_DEPENDS ${CLIENT_ROOT_DIR}/ui/controllers/*.h ${CLIENT_ROOT_DIR}/ui/controllers/api/*.h ) + file(GLOB UI_CONTROLLERS_CPP CONFIGURE_DEPENDS ${CLIENT_ROOT_DIR}/ui/controllers/*.cpp ${CLIENT_ROOT_DIR}/ui/controllers/api/*.cpp ) +file(GLOB CORE_MODELS_H CONFIGURE_DEPENDS + ${CLIENT_ROOT_DIR}/core/models/*.h + ${CLIENT_ROOT_DIR}/core/models/containers/*.h + ${CLIENT_ROOT_DIR}/core/models/protocols/*.h + ${CLIENT_ROOT_DIR}/core/models/servers/*.h +) + +file(GLOB CORE_MODELS_CPP CONFIGURE_DEPENDS + ${CLIENT_ROOT_DIR}/core/models/*.cpp + ${CLIENT_ROOT_DIR}/core/models/containers/*.cpp + ${CLIENT_ROOT_DIR}/core/models/protocols/*.cpp + ${CLIENT_ROOT_DIR}/core/models/servers/*.cpp +) + set(HEADERS ${HEADERS} ${COMMON_FILES_H} ${PAGE_LOGIC_H} ${CONFIGURATORS_H} ${UI_MODELS_H} ${UI_CONTROLLERS_H} + ${CORE_MODELS_H} ) set(SOURCES ${SOURCES} ${COMMON_FILES_CPP} @@ -145,6 +162,7 @@ set(SOURCES ${SOURCES} ${CONFIGURATORS_CPP} ${UI_MODELS_CPP} ${UI_CONTROLLERS_CPP} + ${CORE_MODELS_CPP} ) if(WIN32) diff --git a/client/core/api/apiDefs.h b/client/core/api/apiDefs.h index 4588ef04..a7b134f0 100644 --- a/client/core/api/apiDefs.h +++ b/client/core/api/apiDefs.h @@ -14,11 +14,6 @@ namespace apiDefs ExternalPremium }; - enum ConfigSource { - Telegram = 1, - AmneziaGateway - }; - namespace key { constexpr QLatin1String configVersion("config_version"); diff --git a/client/core/api/apiUtils.cpp b/client/core/api/apiUtils.cpp index 7f3e6db3..8e5ac28c 100644 --- a/client/core/api/apiUtils.cpp +++ b/client/core/api/apiUtils.cpp @@ -32,8 +32,8 @@ bool apiUtils::isServerFromApi(const QJsonObject &serverConfigObject) { auto configVersion = serverConfigObject.value(apiDefs::key::configVersion).toInt(); switch (configVersion) { - case apiDefs::ConfigSource::Telegram: return true; - case apiDefs::ConfigSource::AmneziaGateway: return true; + case amnezia::ServerConfigType::ApiV1: return true; + case amnezia::ServerConfigType::ApiV2: return true; default: return false; } } @@ -43,7 +43,7 @@ apiDefs::ConfigType apiUtils::getConfigType(const QJsonObject &serverConfigObjec auto configVersion = serverConfigObject.value(apiDefs::key::configVersion).toInt(); switch (configVersion) { - case apiDefs::ConfigSource::Telegram: { + case amnezia::ServerConfigType::ApiV1: { constexpr QLatin1String freeV2Endpoint(FREE_V2_ENDPOINT); constexpr QLatin1String premiumV1Endpoint(PREM_V1_ENDPOINT); @@ -55,7 +55,7 @@ apiDefs::ConfigType apiUtils::getConfigType(const QJsonObject &serverConfigObjec return apiDefs::ConfigType::AmneziaFreeV2; } }; - case apiDefs::ConfigSource::AmneziaGateway: { + case amnezia::ServerConfigType::ApiV2: { constexpr QLatin1String servicePremium("amnezia-premium"); constexpr QLatin1String serviceFree("amnezia-free"); constexpr QLatin1String serviceExternalPremium("external-premium"); @@ -77,9 +77,9 @@ apiDefs::ConfigType apiUtils::getConfigType(const QJsonObject &serverConfigObjec }; } -apiDefs::ConfigSource apiUtils::getConfigSource(const QJsonObject &serverConfigObject) +amnezia::ServerConfigType apiUtils::getConfigSource(const QJsonObject &serverConfigObject) { - return static_cast(serverConfigObject.value(apiDefs::key::configVersion).toInt()); + return static_cast(serverConfigObject.value(apiDefs::key::configVersion).toInt()); } amnezia::ErrorCode apiUtils::checkNetworkReplyErrors(const QList &sslErrors, QNetworkReply *reply) diff --git a/client/core/api/apiUtils.h b/client/core/api/apiUtils.h index 45eaf2de..9e6fdbbe 100644 --- a/client/core/api/apiUtils.h +++ b/client/core/api/apiUtils.h @@ -16,7 +16,7 @@ namespace apiUtils bool isPremiumServer(const QJsonObject &serverConfigObject); apiDefs::ConfigType getConfigType(const QJsonObject &serverConfigObject); - apiDefs::ConfigSource getConfigSource(const QJsonObject &serverConfigObject); + amnezia::ServerConfigType getConfigSource(const QJsonObject &serverConfigObject); amnezia::ErrorCode checkNetworkReplyErrors(const QList &sslErrors, QNetworkReply *reply); diff --git a/client/core/controllers/coreController.cpp b/client/core/controllers/coreController.cpp index 0e72ef1a..a4dbc6d6 100644 --- a/client/core/controllers/coreController.cpp +++ b/client/core/controllers/coreController.cpp @@ -299,13 +299,10 @@ void CoreController::setQmlRoot() void CoreController::initApiCountryModelUpdateHandler() { - // TODO connect(m_serversModel.get(), &ServersModel::updateApiCountryModel, this, [this]() { m_apiCountryModel->updateModel(m_serversModel->getProcessedServerData("apiAvailableCountries").toJsonArray(), m_serversModel->getProcessedServerData("apiServerCountryCode").toString()); }); - connect(m_serversModel.get(), &ServersModel::updateApiServicesModel, this, - [this]() { m_apiServicesModel->updateModel(m_serversModel->getProcessedServerData("apiConfig").toJsonObject()); }); } void CoreController::initContainerModelUpdateHandler() diff --git a/client/core/defs.h b/client/core/defs.h index df6a1342..3d64932a 100644 --- a/client/core/defs.h +++ b/client/core/defs.h @@ -19,6 +19,13 @@ namespace amnezia } }; + enum ServerConfigType + { + SelfHosted, + ApiV1, + ApiV2 + }; + struct InstalledAppInfo { QString appName; QString packageName; diff --git a/client/core/models/containers/containerConfig.cpp b/client/core/models/containers/containerConfig.cpp new file mode 100644 index 00000000..119ff2b6 --- /dev/null +++ b/client/core/models/containers/containerConfig.cpp @@ -0,0 +1,5 @@ +#include "containerConfig.h" + +ContainerConfig::ContainerConfig() +{ +} diff --git a/client/core/models/containers/containerConfig.h b/client/core/models/containers/containerConfig.h new file mode 100644 index 00000000..7207d028 --- /dev/null +++ b/client/core/models/containers/containerConfig.h @@ -0,0 +1,19 @@ +#ifndef CONTAINERCONFIG_H +#define CONTAINERCONFIG_H + +#include +#include +#include + +#include "core/models/protocols/protocolConfig.h" + +class ContainerConfig +{ +public: + ContainerConfig(); + + QString containerName; + QMap> protocolConfigs; +}; + +#endif // CONTAINERCONFIG_H diff --git a/client/core/models/protocols/awgProtocolConfig.cpp b/client/core/models/protocols/awgProtocolConfig.cpp new file mode 100644 index 00000000..f77c0385 --- /dev/null +++ b/client/core/models/protocols/awgProtocolConfig.cpp @@ -0,0 +1,198 @@ +#include "awgProtocolConfig.h" + +#include +#include + +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +AwgProtocolConfig::AwgProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +{ + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.transportProto = protocolConfigObject.value(config_key::transport_proto).toString(); + serverProtocolConfig.subnetAddress = protocolConfigObject.value(config_key::subnet_address).toString(); + + serverProtocolConfig.awgData.junkPacketCount = protocolConfigObject.value(config_key::junkPacketCount).toString(); + serverProtocolConfig.awgData.junkPacketMinSize = protocolConfigObject.value(config_key::junkPacketMinSize).toString(); + serverProtocolConfig.awgData.junkPacketMaxSize = protocolConfigObject.value(config_key::junkPacketMaxSize).toString(); + serverProtocolConfig.awgData.initPacketJunkSize = protocolConfigObject.value(config_key::initPacketJunkSize).toString(); + serverProtocolConfig.awgData.responsePacketJunkSize = protocolConfigObject.value(config_key::responsePacketJunkSize).toString(); + serverProtocolConfig.awgData.initPacketMagicHeader = protocolConfigObject.value(config_key::initPacketMagicHeader).toString(); + serverProtocolConfig.awgData.responsePacketMagicHeader = protocolConfigObject.value(config_key::responsePacketMagicHeader).toString(); + serverProtocolConfig.awgData.underloadPacketMagicHeader = protocolConfigObject.value(config_key::underloadPacketMagicHeader).toString(); + serverProtocolConfig.awgData.transportPacketMagicHeader = protocolConfigObject.value(config_key::transportPacketMagicHeader).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + + clientProtocolConfig.awgData.junkPacketCount = clientProtocolConfigObject.value(config_key::junkPacketCount).toString(); + clientProtocolConfig.awgData.junkPacketMinSize = clientProtocolConfigObject.value(config_key::junkPacketMinSize).toString(); + clientProtocolConfig.awgData.junkPacketMaxSize = clientProtocolConfigObject.value(config_key::junkPacketMaxSize).toString(); + clientProtocolConfig.awgData.initPacketJunkSize = clientProtocolConfigObject.value(config_key::initPacketJunkSize).toString(); + clientProtocolConfig.awgData.responsePacketJunkSize = clientProtocolConfigObject.value(config_key::responsePacketJunkSize).toString(); + clientProtocolConfig.awgData.initPacketMagicHeader = clientProtocolConfigObject.value(config_key::initPacketMagicHeader).toString(); + clientProtocolConfig.awgData.responsePacketMagicHeader = + clientProtocolConfigObject.value(config_key::responsePacketMagicHeader).toString(); + clientProtocolConfig.awgData.underloadPacketMagicHeader = + clientProtocolConfigObject.value(config_key::underloadPacketMagicHeader).toString(); + clientProtocolConfig.awgData.transportPacketMagicHeader = + clientProtocolConfigObject.value(config_key::transportPacketMagicHeader).toString(); + + clientProtocolConfig.clientId = clientProtocolConfigObject.value(config_key::clientId).toString(); + + clientProtocolConfig.wireGuardData.clientIp = clientProtocolConfigObject.value(config_key::client_ip).toString(); + clientProtocolConfig.wireGuardData.clientPrivateKey = clientProtocolConfigObject.value(config_key::client_priv_key).toString(); + clientProtocolConfig.wireGuardData.clientPublicKey = clientProtocolConfigObject.value(config_key::client_pub_key).toString(); + clientProtocolConfig.wireGuardData.persistentKeepAlive = + clientProtocolConfigObject.value(config_key::persistent_keep_alive).toString(); + clientProtocolConfig.wireGuardData.pskKey = clientProtocolConfigObject.value(config_key::psk_key).toString(); + clientProtocolConfig.wireGuardData.serverPubKey = clientProtocolConfigObject.value(config_key::server_pub_key).toString(); + clientProtocolConfig.wireGuardData.mtu = clientProtocolConfigObject.value(config_key::mtu).toString(); + + clientProtocolConfig.hostname = clientProtocolConfigObject.value(config_key::hostName).toString(); + clientProtocolConfig.port = clientProtocolConfigObject.value(config_key::port).toInt(0); + + clientProtocolConfig.nativeConfig = clientProtocolConfigObject.value(config_key::config).toString(); + + if (clientProtocolConfigObject.contains(config_key::allowed_ips) + && clientProtocolConfigObject.value(config_key::allowed_ips).isArray()) { + auto allowedIpsArray = clientProtocolConfigObject.value(config_key::allowed_ips).toArray(); + for (const auto &ip : allowedIpsArray) { + clientProtocolConfig.wireGuardData.allowedIps.append(ip.toString()); + } + } + } +} + +QJsonObject AwgProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.transportProto.isEmpty()) { + json[config_key::transport_proto] = serverProtocolConfig.transportProto; + } + if (!serverProtocolConfig.subnetAddress.isEmpty()) { + json[config_key::subnet_address] = serverProtocolConfig.subnetAddress; + } + + if (!serverProtocolConfig.awgData.junkPacketCount.isEmpty()) { + json[config_key::junkPacketCount] = serverProtocolConfig.awgData.junkPacketCount; + } + if (!serverProtocolConfig.awgData.junkPacketMinSize.isEmpty()) { + json[config_key::junkPacketMinSize] = serverProtocolConfig.awgData.junkPacketMinSize; + } + if (!serverProtocolConfig.awgData.junkPacketMaxSize.isEmpty()) { + json[config_key::junkPacketMaxSize] = serverProtocolConfig.awgData.junkPacketMaxSize; + } + if (!serverProtocolConfig.awgData.initPacketJunkSize.isEmpty()) { + json[config_key::initPacketJunkSize] = serverProtocolConfig.awgData.initPacketJunkSize; + } + if (!serverProtocolConfig.awgData.responsePacketJunkSize.isEmpty()) { + json[config_key::responsePacketJunkSize] = serverProtocolConfig.awgData.responsePacketJunkSize; + } + if (!serverProtocolConfig.awgData.initPacketMagicHeader.isEmpty()) { + json[config_key::initPacketMagicHeader] = serverProtocolConfig.awgData.initPacketMagicHeader; + } + if (!serverProtocolConfig.awgData.responsePacketMagicHeader.isEmpty()) { + json[config_key::responsePacketMagicHeader] = serverProtocolConfig.awgData.responsePacketMagicHeader; + } + if (!serverProtocolConfig.awgData.underloadPacketMagicHeader.isEmpty()) { + json[config_key::underloadPacketMagicHeader] = serverProtocolConfig.awgData.underloadPacketMagicHeader; + } + if (!serverProtocolConfig.awgData.transportPacketMagicHeader.isEmpty()) { + json[config_key::transportPacketMagicHeader] = serverProtocolConfig.awgData.transportPacketMagicHeader; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + + if (!clientProtocolConfig.clientId.isEmpty()) { + clientConfigJson[config_key::clientId] = clientProtocolConfig.clientId; + } + + if (!clientProtocolConfig.awgData.junkPacketCount.isEmpty()) { + clientConfigJson[config_key::junkPacketCount] = clientProtocolConfig.awgData.junkPacketCount; + } + if (!clientProtocolConfig.awgData.junkPacketMinSize.isEmpty()) { + clientConfigJson[config_key::junkPacketMinSize] = clientProtocolConfig.awgData.junkPacketMinSize; + } + if (!clientProtocolConfig.awgData.junkPacketMaxSize.isEmpty()) { + clientConfigJson[config_key::junkPacketMaxSize] = clientProtocolConfig.awgData.junkPacketMaxSize; + } + if (!clientProtocolConfig.awgData.initPacketJunkSize.isEmpty()) { + clientConfigJson[config_key::initPacketJunkSize] = clientProtocolConfig.awgData.initPacketJunkSize; + } + if (!clientProtocolConfig.awgData.responsePacketJunkSize.isEmpty()) { + clientConfigJson[config_key::responsePacketJunkSize] = clientProtocolConfig.awgData.responsePacketJunkSize; + } + if (!clientProtocolConfig.awgData.initPacketMagicHeader.isEmpty()) { + clientConfigJson[config_key::initPacketMagicHeader] = clientProtocolConfig.awgData.initPacketMagicHeader; + } + if (!clientProtocolConfig.awgData.responsePacketMagicHeader.isEmpty()) { + clientConfigJson[config_key::responsePacketMagicHeader] = clientProtocolConfig.awgData.responsePacketMagicHeader; + } + if (!clientProtocolConfig.awgData.underloadPacketMagicHeader.isEmpty()) { + clientConfigJson[config_key::underloadPacketMagicHeader] = clientProtocolConfig.awgData.underloadPacketMagicHeader; + } + if (!clientProtocolConfig.awgData.transportPacketMagicHeader.isEmpty()) { + clientConfigJson[config_key::transportPacketMagicHeader] = clientProtocolConfig.awgData.transportPacketMagicHeader; + } + + if (!clientProtocolConfig.wireGuardData.clientIp.isEmpty()) { + clientConfigJson[config_key::client_ip] = clientProtocolConfig.wireGuardData.clientIp; + } + if (!clientProtocolConfig.wireGuardData.clientPrivateKey.isEmpty()) { + clientConfigJson[config_key::client_priv_key] = clientProtocolConfig.wireGuardData.clientPrivateKey; + } + if (!clientProtocolConfig.wireGuardData.clientPublicKey.isEmpty()) { + clientConfigJson[config_key::client_pub_key] = clientProtocolConfig.wireGuardData.clientPublicKey; + } + if (!clientProtocolConfig.wireGuardData.persistentKeepAlive.isEmpty()) { + clientConfigJson[config_key::persistent_keep_alive] = clientProtocolConfig.wireGuardData.persistentKeepAlive; + } + if (!clientProtocolConfig.wireGuardData.pskKey.isEmpty()) { + clientConfigJson[config_key::psk_key] = clientProtocolConfig.wireGuardData.pskKey; + } + if (!clientProtocolConfig.wireGuardData.serverPubKey.isEmpty()) { + clientConfigJson[config_key::server_pub_key] = clientProtocolConfig.wireGuardData.serverPubKey; + } + if (!clientProtocolConfig.wireGuardData.mtu.isEmpty()) { + clientConfigJson[config_key::mtu] = clientProtocolConfig.wireGuardData.mtu; + } + + if (!clientProtocolConfig.wireGuardData.allowedIps.isEmpty()) { + QJsonArray allowedIpsArray; + for (const auto &ip : clientProtocolConfig.wireGuardData.allowedIps) { + if (!ip.isEmpty()) { + allowedIpsArray.append(ip); + } + } + if (!allowedIpsArray.isEmpty()) { + clientConfigJson[config_key::allowed_ips] = allowedIpsArray; + } + } + + if (!clientProtocolConfig.hostname.isEmpty()) { + clientConfigJson[config_key::hostName] = clientProtocolConfig.hostname; + } + if (clientProtocolConfig.port) { + clientConfigJson[config_key::port] = clientProtocolConfig.port; + } + if (!clientProtocolConfig.nativeConfig.isEmpty()) { + clientConfigJson[config_key::config] = clientProtocolConfig.nativeConfig; + } + + if (!clientConfigJson.isEmpty()) { + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson(QJsonDocument::Compact)); + } + } + + return json; +} diff --git a/client/core/models/protocols/awgProtocolConfig.h b/client/core/models/protocols/awgProtocolConfig.h new file mode 100644 index 00000000..7c4fcf06 --- /dev/null +++ b/client/core/models/protocols/awgProtocolConfig.h @@ -0,0 +1,65 @@ +#ifndef AWGPROTOCOLCONFIG_H +#define AWGPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" +#include "wireguardProtocolConfig.h" + +namespace awg +{ + struct AwgData + { + QString junkPacketCount; + QString junkPacketMinSize; + QString junkPacketMaxSize; + + QString initPacketJunkSize; + QString responsePacketJunkSize; + + QString initPacketMagicHeader; + QString responsePacketMagicHeader; + QString underloadPacketMagicHeader; + QString transportPacketMagicHeader; + }; + + struct ServerProtocolConfig + { + QString port; + QString transportProto; + + QString subnetAddress; + + AwgData awgData; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + + QString clientId; + + wireguard::WireGuardData wireGuardData; + + AwgData awgData; + + QString hostname; + int port; + + QString nativeConfig; + }; +} + +class AwgProtocolConfig : public ProtocolConfig +{ +public: + AwgProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + awg::ServerProtocolConfig serverProtocolConfig; + awg::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // AWGPROTOCOLCONFIG_H diff --git a/client/core/models/protocols/cloakProtocolConfig.cpp b/client/core/models/protocols/cloakProtocolConfig.cpp new file mode 100644 index 00000000..b32e652e --- /dev/null +++ b/client/core/models/protocols/cloakProtocolConfig.cpp @@ -0,0 +1,43 @@ +#include "cloakProtocolConfig.h" + +#include +#include +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +CloakProtocolConfig::CloakProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +{ + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.cipher = protocolConfigObject.value(config_key::cipher).toString(); + serverProtocolConfig.site = protocolConfigObject.value(config_key::site).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + } +} + +QJsonObject CloakProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.cipher.isEmpty()) { + json[config_key::cipher] = serverProtocolConfig.cipher; + } + if (!serverProtocolConfig.site.isEmpty()) { + json[config_key::site] = serverProtocolConfig.site; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson()); + } + + return json; +} diff --git a/client/core/models/protocols/cloakProtocolConfig.h b/client/core/models/protocols/cloakProtocolConfig.h new file mode 100644 index 00000000..191e3f2d --- /dev/null +++ b/client/core/models/protocols/cloakProtocolConfig.h @@ -0,0 +1,35 @@ +#ifndef CLOAKPROTOCOLCONFIG_H +#define CLOAKPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" + +namespace cloak +{ + struct ServerProtocolConfig + { + QString port; + QString cipher; + QString site; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + }; +} + +class CloakProtocolConfig : public ProtocolConfig +{ +public: + CloakProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + cloak::ServerProtocolConfig serverProtocolConfig; + cloak::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // CLOAKPROTOCOLCONFIG_H diff --git a/client/core/models/protocols/openvpnProtocolConfig.cpp b/client/core/models/protocols/openvpnProtocolConfig.cpp new file mode 100644 index 00000000..cf994566 --- /dev/null +++ b/client/core/models/protocols/openvpnProtocolConfig.cpp @@ -0,0 +1,83 @@ +#include "openvpnProtocolConfig.h" + +#include +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +OpenVpnProtocolConfig::OpenVpnProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +{ + serverProtocolConfig.subnetAddress = protocolConfigObject.value(config_key::subnet_address).toString(); + serverProtocolConfig.transportProto = protocolConfigObject.value(config_key::transport_proto).toString(); + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.ncpDisable = protocolConfigObject.value(config_key::ncp_disable).toString(); + serverProtocolConfig.hash = protocolConfigObject.value(config_key::hash).toString(); + serverProtocolConfig.cipher = protocolConfigObject.value(config_key::cipher).toString(); + serverProtocolConfig.tlsAuth = protocolConfigObject.value(config_key::tls_auth).toString(); + serverProtocolConfig.blockOutsideDns = protocolConfigObject.value(config_key::block_outside_dns).toString(); + serverProtocolConfig.additionalClientConfig = protocolConfigObject.value(config_key::additional_client_config).toString(); + serverProtocolConfig.additionalServerConfig = protocolConfigObject.value(config_key::additional_server_config).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + + clientProtocolConfig.clientId = clientProtocolConfigObject.value(config_key::clientId).toString(); + clientProtocolConfig.nativeConfig = clientProtocolConfigObject.value(config_key::config).toString(); + } +} + +QJsonObject OpenVpnProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.subnetAddress.isEmpty()) { + json[config_key::subnet_address] = serverProtocolConfig.subnetAddress; + } + if (!serverProtocolConfig.transportProto.isEmpty()) { + json[config_key::transport_proto] = serverProtocolConfig.transportProto; + } + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.ncpDisable.isEmpty()) { + json[config_key::ncp_disable] = serverProtocolConfig.ncpDisable; + } + if (!serverProtocolConfig.hash.isEmpty()) { + json[config_key::hash] = serverProtocolConfig.hash; + } + if (!serverProtocolConfig.cipher.isEmpty()) { + json[config_key::cipher] = serverProtocolConfig.cipher; + } + if (!serverProtocolConfig.tlsAuth.isEmpty()) { + json[config_key::tls_auth] = serverProtocolConfig.tlsAuth; + } + if (!serverProtocolConfig.blockOutsideDns.isEmpty()) { + json[config_key::block_outside_dns] = serverProtocolConfig.blockOutsideDns; + } + if (!serverProtocolConfig.additionalClientConfig.isEmpty()) { + json[config_key::additional_client_config] = serverProtocolConfig.additionalClientConfig; + } + if (!serverProtocolConfig.additionalServerConfig.isEmpty()) { + json[config_key::additional_server_config] = serverProtocolConfig.additionalServerConfig; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + + if (!clientProtocolConfig.clientId.isEmpty()) { + clientConfigJson[config_key::clientId] = clientProtocolConfig.clientId; + } + if (!clientProtocolConfig.nativeConfig.isEmpty()) { + clientConfigJson[config_key::config] = clientProtocolConfig.nativeConfig; + } + + if (!clientConfigJson.isEmpty()) { + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson()); + } + } + + return json; +} diff --git a/client/core/models/protocols/openvpnProtocolConfig.h b/client/core/models/protocols/openvpnProtocolConfig.h new file mode 100644 index 00000000..0e6d4e6a --- /dev/null +++ b/client/core/models/protocols/openvpnProtocolConfig.h @@ -0,0 +1,46 @@ +#ifndef OPENVPNPROTOCOLCONFIG_H +#define OPENVPNPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" + +namespace openvpn +{ + struct ServerProtocolConfig + { + QString subnetAddress; + QString transportProto; + QString port; + QString ncpDisable; + QString hash; + QString cipher; + QString tlsAuth; + QString blockOutsideDns; + QString additionalClientConfig; + QString additionalServerConfig; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + + QString clientId; + + QString nativeConfig; + }; +} + +class OpenVpnProtocolConfig : public ProtocolConfig +{ +public: + OpenVpnProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + openvpn::ServerProtocolConfig serverProtocolConfig; + openvpn::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // OPENVPNPROTOCOLCONFIG_H diff --git a/client/core/models/protocols/protocolConfig.cpp b/client/core/models/protocols/protocolConfig.cpp new file mode 100644 index 00000000..58b9387d --- /dev/null +++ b/client/core/models/protocols/protocolConfig.cpp @@ -0,0 +1,12 @@ +#include "protocolConfig.h" + +#include + +ProtocolConfig::ProtocolConfig(const QString &protocolName) : protocolName(protocolName) +{ +} + +QJsonObject ProtocolConfig::toJson() const +{ + return QJsonObject(); +} diff --git a/client/core/models/protocols/protocolConfig.h b/client/core/models/protocols/protocolConfig.h new file mode 100644 index 00000000..ce917002 --- /dev/null +++ b/client/core/models/protocols/protocolConfig.h @@ -0,0 +1,16 @@ +#ifndef PROTOCOLCONFIG_H +#define PROTOCOLCONFIG_H + +#include + +class ProtocolConfig +{ +public: + ProtocolConfig(const QString &protocolName); + + QString protocolName; + + virtual QJsonObject toJson() const; +}; + +#endif // PROTOCOLCONFIG_H diff --git a/client/core/models/protocols/shadowsocksProtocolConfig.cpp b/client/core/models/protocols/shadowsocksProtocolConfig.cpp new file mode 100644 index 00000000..e5f9b978 --- /dev/null +++ b/client/core/models/protocols/shadowsocksProtocolConfig.cpp @@ -0,0 +1,39 @@ +#include "shadowsocksProtocolConfig.h" + +#include +#include +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +ShadowsocksProtocolConfig::ShadowsocksProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +{ + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.cipher = protocolConfigObject.value(config_key::cipher).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + } +} + +QJsonObject ShadowsocksProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.cipher.isEmpty()) { + json[config_key::cipher] = serverProtocolConfig.cipher; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson()); + } + + return json; +} diff --git a/client/core/models/protocols/shadowsocksProtocolConfig.h b/client/core/models/protocols/shadowsocksProtocolConfig.h new file mode 100644 index 00000000..3c615f8a --- /dev/null +++ b/client/core/models/protocols/shadowsocksProtocolConfig.h @@ -0,0 +1,34 @@ +#ifndef SHADOWSOCKSPROTOCOLCONFIG_H +#define SHADOWSOCKSPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" + +namespace shadowsocks +{ + struct ServerProtocolConfig + { + QString port; + QString cipher; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + }; +} + +class ShadowsocksProtocolConfig : public ProtocolConfig +{ +public: + ShadowsocksProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + shadowsocks::ServerProtocolConfig serverProtocolConfig; + shadowsocks::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // SHADOWSOCKSPROTOCOLCONFIG_H diff --git a/client/core/models/protocols/wireguardProtocolConfig.cpp b/client/core/models/protocols/wireguardProtocolConfig.cpp new file mode 100644 index 00000000..602cbce5 --- /dev/null +++ b/client/core/models/protocols/wireguardProtocolConfig.cpp @@ -0,0 +1,120 @@ +#include "wireguardProtocolConfig.h" + +#include +#include + +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +WireGuardProtocolConfig::WireGuardProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) + : ProtocolConfig(protocolName) +{ + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.transportProto = protocolConfigObject.value(config_key::transport_proto).toString(); + serverProtocolConfig.subnetAddress = protocolConfigObject.value(config_key::subnet_address).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + + clientProtocolConfig.clientId = clientProtocolConfigObject.value(config_key::clientId).toString(); + + clientProtocolConfig.wireGuardData.clientIp = clientProtocolConfigObject.value(config_key::client_ip).toString(); + clientProtocolConfig.wireGuardData.clientPrivateKey = clientProtocolConfigObject.value(config_key::client_priv_key).toString(); + clientProtocolConfig.wireGuardData.clientPublicKey = clientProtocolConfigObject.value(config_key::client_pub_key).toString(); + clientProtocolConfig.wireGuardData.persistentKeepAlive = + clientProtocolConfigObject.value(config_key::persistent_keep_alive).toString(); + clientProtocolConfig.wireGuardData.pskKey = clientProtocolConfigObject.value(config_key::psk_key).toString(); + clientProtocolConfig.wireGuardData.serverPubKey = clientProtocolConfigObject.value(config_key::server_pub_key).toString(); + clientProtocolConfig.wireGuardData.mtu = clientProtocolConfigObject.value(config_key::mtu).toString(); + + clientProtocolConfig.hostname = clientProtocolConfigObject.value(config_key::hostName).toString(); + clientProtocolConfig.port = clientProtocolConfigObject.value(config_key::port).toInt(0); + + clientProtocolConfig.nativeConfig = clientProtocolConfigObject.value(config_key::config).toString(); + + if (clientProtocolConfigObject.contains(config_key::allowed_ips) + && clientProtocolConfigObject.value(config_key::allowed_ips).isArray()) { + auto allowedIpsArray = clientProtocolConfigObject.value(config_key::allowed_ips).toArray(); + for (const auto &ip : allowedIpsArray) { + clientProtocolConfig.wireGuardData.allowedIps.append(ip.toString()); + } + } + } +} + +QJsonObject WireGuardProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.transportProto.isEmpty()) { + json[config_key::transport_proto] = serverProtocolConfig.transportProto; + } + if (!serverProtocolConfig.subnetAddress.isEmpty()) { + json[config_key::subnet_address] = serverProtocolConfig.subnetAddress; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + + if (!clientProtocolConfig.clientId.isEmpty()) { + clientConfigJson[config_key::clientId] = clientProtocolConfig.clientId; + } + + if (!clientProtocolConfig.wireGuardData.clientIp.isEmpty()) { + clientConfigJson[config_key::client_ip] = clientProtocolConfig.wireGuardData.clientIp; + } + if (!clientProtocolConfig.wireGuardData.clientPrivateKey.isEmpty()) { + clientConfigJson[config_key::client_priv_key] = clientProtocolConfig.wireGuardData.clientPrivateKey; + } + if (!clientProtocolConfig.wireGuardData.clientPublicKey.isEmpty()) { + clientConfigJson[config_key::client_pub_key] = clientProtocolConfig.wireGuardData.clientPublicKey; + } + if (!clientProtocolConfig.wireGuardData.persistentKeepAlive.isEmpty()) { + clientConfigJson[config_key::persistent_keep_alive] = clientProtocolConfig.wireGuardData.persistentKeepAlive; + } + if (!clientProtocolConfig.wireGuardData.pskKey.isEmpty()) { + clientConfigJson[config_key::psk_key] = clientProtocolConfig.wireGuardData.pskKey; + } + if (!clientProtocolConfig.wireGuardData.serverPubKey.isEmpty()) { + clientConfigJson[config_key::server_pub_key] = clientProtocolConfig.wireGuardData.serverPubKey; + } + if (!clientProtocolConfig.wireGuardData.mtu.isEmpty()) { + clientConfigJson[config_key::mtu] = clientProtocolConfig.wireGuardData.mtu; + } + + if (!clientProtocolConfig.wireGuardData.allowedIps.isEmpty()) { + QJsonArray allowedIpsArray; + for (const auto &ip : clientProtocolConfig.wireGuardData.allowedIps) { + if (!ip.isEmpty()) { + allowedIpsArray.append(ip); + } + } + if (!allowedIpsArray.isEmpty()) { + clientConfigJson[config_key::allowed_ips] = allowedIpsArray; + } + } + + if (!clientProtocolConfig.hostname.isEmpty()) { + clientConfigJson[config_key::hostName] = clientProtocolConfig.hostname; + } + if (clientProtocolConfig.port) { + clientConfigJson[config_key::port] = clientProtocolConfig.port; + } + if (!clientProtocolConfig.nativeConfig.isEmpty()) { + clientConfigJson[config_key::config] = clientProtocolConfig.nativeConfig; + } + + if (!clientConfigJson.isEmpty()) { + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson()); + } + } + + return json; +} diff --git a/client/core/models/protocols/wireguardProtocolConfig.h b/client/core/models/protocols/wireguardProtocolConfig.h new file mode 100644 index 00000000..acefafe2 --- /dev/null +++ b/client/core/models/protocols/wireguardProtocolConfig.h @@ -0,0 +1,58 @@ +#ifndef WIREGUARDPROTOCOLCONFIG_H +#define WIREGUARDPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" + +namespace wireguard +{ + struct WireGuardData + { + QStringList allowedIps; + + QString clientIp; + QString clientPrivateKey; + QString clientPublicKey; + QString mtu; + QString persistentKeepAlive; + QString pskKey; + QString serverPubKey; + }; + + struct ServerProtocolConfig + { + QString port; + QString transportProto; + + QString subnetAddress; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + + QString clientId; + + WireGuardData wireGuardData; + + QString hostname; + int port; + + QString nativeConfig; + }; +} + +class WireGuardProtocolConfig : public ProtocolConfig +{ +public: + WireGuardProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + wireguard::ServerProtocolConfig serverProtocolConfig; + wireguard::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // WIREGUARDPROTOCOLCONFIG_H diff --git a/client/core/models/protocols/xrayProtocolConfig.cpp b/client/core/models/protocols/xrayProtocolConfig.cpp new file mode 100644 index 00000000..32ad108a --- /dev/null +++ b/client/core/models/protocols/xrayProtocolConfig.cpp @@ -0,0 +1,43 @@ +#include "xrayProtocolConfig.h" + +#include +#include +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +XrayProtocolConfig::XrayProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +{ + serverProtocolConfig.site = protocolConfigObject.value(config_key::site).toString(); + serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); + serverProtocolConfig.transportProto = protocolConfigObject.value(config_key::transport_proto).toString(); + + auto clientProtocolString = protocolConfigObject.value(config_key::last_config).toString(); + if (!clientProtocolString.isEmpty()) { + clientProtocolConfig.isEmpty = false; + + QJsonObject clientProtocolConfigObject = QJsonDocument::fromJson(clientProtocolString.toUtf8()).object(); + } +} + +QJsonObject XrayProtocolConfig::toJson() const +{ + QJsonObject json; + + if (!serverProtocolConfig.site.isEmpty()) { + json[config_key::site] = serverProtocolConfig.site; + } + if (!serverProtocolConfig.port.isEmpty()) { + json[config_key::port] = serverProtocolConfig.port; + } + if (!serverProtocolConfig.transportProto.isEmpty()) { + json[config_key::transport_proto] = serverProtocolConfig.transportProto; + } + + if (!clientProtocolConfig.isEmpty) { + QJsonObject clientConfigJson; + json[config_key::last_config] = QString(QJsonDocument(clientConfigJson).toJson()); + } + + return json; +} diff --git a/client/core/models/protocols/xrayProtocolConfig.h b/client/core/models/protocols/xrayProtocolConfig.h new file mode 100644 index 00000000..87023954 --- /dev/null +++ b/client/core/models/protocols/xrayProtocolConfig.h @@ -0,0 +1,35 @@ +#ifndef XRAYPROTOCOLCONFIG_H +#define XRAYPROTOCOLCONFIG_H + +#include +#include + +#include "protocolConfig.h" + +namespace xray +{ + struct ServerProtocolConfig + { + QString site; + QString port; + QString transportProto; + }; + + struct ClientProtocolConfig + { + bool isEmpty = true; + }; +} + +class XrayProtocolConfig : public ProtocolConfig +{ +public: + XrayProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + + QJsonObject toJson() const override; + + xray::ServerProtocolConfig serverProtocolConfig; + xray::ClientProtocolConfig clientProtocolConfig; +}; + +#endif // XRAYPROTOCOLCONFIG_H diff --git a/client/core/models/servers/apiV1ServerConfig.cpp b/client/core/models/servers/apiV1ServerConfig.cpp new file mode 100644 index 00000000..363c1d9e --- /dev/null +++ b/client/core/models/servers/apiV1ServerConfig.cpp @@ -0,0 +1,30 @@ +#include "apiV1ServerConfig.h" + +#include +#include + +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +ApiV1ServerConfig::ApiV1ServerConfig(const QJsonObject &serverConfigObject) : ServerConfig(serverConfigObject) +{ + name = serverConfigObject.value(config_key::name).toString(); + description = serverConfigObject.value(config_key::description).toString(); +} + +QJsonObject ApiV1ServerConfig::toJson() const +{ + // Сначала вызываем родительскую функцию для сериализации базовых полей + QJsonObject json = ServerConfig::toJson(); + + // Добавляем свои поля только если они не пустые + if (!name.isEmpty()) { + json[config_key::name] = name; + } + if (!description.isEmpty()) { + json[config_key::description] = description; + } + + return json; +} diff --git a/client/core/models/servers/apiV1ServerConfig.h b/client/core/models/servers/apiV1ServerConfig.h new file mode 100644 index 00000000..c3a9e52b --- /dev/null +++ b/client/core/models/servers/apiV1ServerConfig.h @@ -0,0 +1,17 @@ +#ifndef APIV1SERVERCONFIG_H +#define APIV1SERVERCONFIG_H + +#include "serverConfig.h" + +class ApiV1ServerConfig : public ServerConfig +{ +public: + ApiV1ServerConfig(const QJsonObject &serverConfigObject); + + QJsonObject toJson() const override; + + QString name; + QString description; +}; + +#endif // APIV1SERVERCONFIG_H diff --git a/client/core/models/servers/apiV2ServerConfig.cpp b/client/core/models/servers/apiV2ServerConfig.cpp new file mode 100644 index 00000000..97e27dcb --- /dev/null +++ b/client/core/models/servers/apiV2ServerConfig.cpp @@ -0,0 +1,125 @@ +#include "apiV2ServerConfig.h" + +#include +#include + +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +ApiV2ServerConfig::ApiV2ServerConfig(const QJsonObject &serverConfigObject) : ServerConfig(serverConfigObject) +{ + name = serverConfigObject.value(config_key::name).toString(); + description = serverConfigObject.value(config_key::description).toString(); + + auto apiConfigObject = serverConfigObject.value("api_config").toObject(); + + auto availableCountriesArray = apiConfigObject.value("available_countries").toArray(); + for (const auto &countryValue : availableCountriesArray) { + auto countryObject = countryValue.toObject(); + apiv2::Country country; + country.code = countryObject.value("server_country_code").toString(); + country.name = countryObject.value("server_country_name").toString(); + apiConfig.availableCountries.append(country); + } + + auto subscriptionObject = apiConfigObject.value("subscription").toObject(); + apiConfig.subscription.end_date = subscriptionObject.value("end_date").toString(); + + auto publicKeyObject = apiConfigObject.value("public_key").toObject(); + apiConfig.publicKey.expiresAt = publicKeyObject.value("expires_at").toString(); + + apiConfig.serverCountryCode = apiConfigObject.value("server_country_code").toString(); + apiConfig.serverCountryName = apiConfigObject.value("server_country_name").toString(); + + apiConfig.serviceProtocol = apiConfigObject.value("service_protocol").toString(); + apiConfig.serviceType = apiConfigObject.value("service_type").toString(); + + apiConfig.userCountryCode = apiConfigObject.value("user_country_code").toString(); + + apiConfig.vpnKey = apiConfigObject.value("vpn_key").toString(); +} + +QJsonObject ApiV2ServerConfig::toJson() const +{ + // Сначала вызываем родительскую функцию для сериализации базовых полей + QJsonObject json = ServerConfig::toJson(); + + // Добавляем свои поля только если они не пустые + if (!name.isEmpty()) { + json[config_key::name] = name; + } + if (!description.isEmpty()) { + json[config_key::description] = description; + } + + // Сериализация API конфигурации + QJsonObject apiConfigJson; + + // Сериализация доступных стран только если массив не пустой + if (!apiConfig.availableCountries.isEmpty()) { + QJsonArray availableCountriesArray; + for (const auto &country : apiConfig.availableCountries) { + QJsonObject countryObject; + if (!country.code.isEmpty()) { + countryObject["server_country_code"] = country.code; + } + if (!country.name.isEmpty()) { + countryObject["server_country_name"] = country.name; + } + if (!countryObject.isEmpty()) { + availableCountriesArray.append(countryObject); + } + } + if (!availableCountriesArray.isEmpty()) { + apiConfigJson["available_countries"] = availableCountriesArray; + } + } + + // Сериализация подписки только если есть данные + if (!apiConfig.subscription.end_date.isEmpty()) { + QJsonObject subscriptionObject; + subscriptionObject["end_date"] = apiConfig.subscription.end_date; + apiConfigJson["subscription"] = subscriptionObject; + } + + // Сериализация публичного ключа только если есть данные + if (!apiConfig.publicKey.expiresAt.isEmpty()) { + QJsonObject publicKeyObject; + publicKeyObject["expires_at"] = apiConfig.publicKey.expiresAt; + apiConfigJson["public_key"] = publicKeyObject; + } + + // Сериализация информации о сервере только если не пустая + if (!apiConfig.serverCountryCode.isEmpty()) { + apiConfigJson["server_country_code"] = apiConfig.serverCountryCode; + } + if (!apiConfig.serverCountryName.isEmpty()) { + apiConfigJson["server_country_name"] = apiConfig.serverCountryName; + } + + // Сериализация информации о сервисе только если не пустая + if (!apiConfig.serviceProtocol.isEmpty()) { + apiConfigJson["service_protocol"] = apiConfig.serviceProtocol; + } + if (!apiConfig.serviceType.isEmpty()) { + apiConfigJson["service_type"] = apiConfig.serviceType; + } + + // Сериализация информации о пользователе только если не пустая + if (!apiConfig.userCountryCode.isEmpty()) { + apiConfigJson["user_country_code"] = apiConfig.userCountryCode; + } + + // Сериализация VPN ключа только если не пустой + if (!apiConfig.vpnKey.isEmpty()) { + apiConfigJson["vpn_key"] = apiConfig.vpnKey; + } + + // Добавляем API конфигурацию в основной JSON только если есть данные + if (!apiConfigJson.isEmpty()) { + json["api_config"] = apiConfigJson; + } + + return json; +} diff --git a/client/core/models/servers/apiV2ServerConfig.h b/client/core/models/servers/apiV2ServerConfig.h new file mode 100644 index 00000000..782e82ef --- /dev/null +++ b/client/core/models/servers/apiV2ServerConfig.h @@ -0,0 +1,54 @@ +#ifndef APIV2SERVERCONFIG_H +#define APIV2SERVERCONFIG_H + +#include "serverConfig.h" + +namespace apiv2 +{ + struct Country { + QString code; + QString name; + }; + + struct PublicKey + { + QString expiresAt; + }; + + struct Subscription + { + QString end_date; + }; + + struct ApiConfig { + QVector availableCountries; + + Subscription subscription; + PublicKey publicKey; + + QString serverCountryCode; + QString serverCountryName; + + QString serviceProtocol; + QString serviceType; + + QString userCountryCode; + + QString vpnKey; + }; +} + +class ApiV2ServerConfig : public ServerConfig +{ +public: + ApiV2ServerConfig(const QJsonObject &serverConfigObject); + + QJsonObject toJson() const override; + + QString name; + QString description; + + apiv2::ApiConfig apiConfig; +}; + +#endif // APIV2SERVERCONFIG_H diff --git a/client/core/models/servers/selfHostedServerConfig.cpp b/client/core/models/servers/selfHostedServerConfig.cpp new file mode 100644 index 00000000..b2cf189a --- /dev/null +++ b/client/core/models/servers/selfHostedServerConfig.cpp @@ -0,0 +1,48 @@ +#include "selfHostedServerConfig.h" + +#include +#include + +#include "protocols/protocols_defs.h" + +using namespace amnezia; + +SelfHostedServerConfig::SelfHostedServerConfig(const QJsonObject &serverConfigObject) : ServerConfig(serverConfigObject) +{ + name = serverConfigObject.value(config_key::description).toString(); + if (name.isEmpty()) { + name = serverConfigObject.value(config_key::hostName).toString(); + } + + serverCredentials.hostName = serverConfigObject.value(config_key::hostName).toString(); + serverCredentials.userName = serverConfigObject.value(config_key::userName).toString(); + serverCredentials.secretData = serverConfigObject.value(config_key::password).toString(); + serverCredentials.port = serverConfigObject.value(config_key::port).toInt(22); +} + +QJsonObject SelfHostedServerConfig::toJson() const +{ + // Сначала вызываем родительскую функцию для сериализации базовых полей + QJsonObject json = ServerConfig::toJson(); + + // Добавляем имя только если оно не пустое + if (!name.isEmpty()) { + json[config_key::description] = name; // Используем description как в конструкторе + } + + // Добавляем credentials только если они не пустые + if (!serverCredentials.hostName.isEmpty()) { + json[config_key::hostName] = serverCredentials.hostName; + } + if (!serverCredentials.userName.isEmpty()) { + json[config_key::userName] = serverCredentials.userName; + } + if (!serverCredentials.secretData.isEmpty()) { + json[config_key::password] = serverCredentials.secretData; + } + if (serverCredentials.port != 22) { // Добавляем порт только если не дефолтный + json[config_key::port] = serverCredentials.port; + } + + return json; +} diff --git a/client/core/models/servers/selfHostedServerConfig.h b/client/core/models/servers/selfHostedServerConfig.h new file mode 100644 index 00000000..c11b8aa4 --- /dev/null +++ b/client/core/models/servers/selfHostedServerConfig.h @@ -0,0 +1,19 @@ +#ifndef SELFHOSTEDSERVERCONFIG_H +#define SELFHOSTEDSERVERCONFIG_H + +#include "core/defs.h" +#include "serverConfig.h" + +class SelfHostedServerConfig : public ServerConfig +{ +public: + SelfHostedServerConfig(const QJsonObject &serverConfigObject); + + QJsonObject toJson() const override; + + QString name; + + amnezia::ServerCredentials serverCredentials; +}; + +#endif // SELFHOSTEDSERVERCONFIG_H diff --git a/client/core/models/servers/serverConfig.cpp b/client/core/models/servers/serverConfig.cpp new file mode 100644 index 00000000..977f8763 --- /dev/null +++ b/client/core/models/servers/serverConfig.cpp @@ -0,0 +1,145 @@ +#include "serverConfig.h" + +#include + +#include "apiV1ServerConfig.h" +#include "apiV2ServerConfig.h" +#include "containers/containers_defs.h" +#include "core/models/protocols/awgProtocolConfig.h" +#include "core/models/protocols/cloakProtocolConfig.h" +#include "core/models/protocols/openvpnProtocolConfig.h" +#include "core/models/protocols/protocolConfig.h" +#include "core/models/protocols/shadowsocksProtocolConfig.h" +#include "core/models/protocols/xrayProtocolConfig.h" +#include "protocols/protocols_defs.h" +#include "selfHostedServerConfig.h" + +using namespace amnezia; + +ServerConfig::ServerConfig(const QJsonObject &serverConfigObject) +{ + type = static_cast(serverConfigObject.value(config_key::configVersion).toInt(0)); + + hostName = serverConfigObject.value(config_key::hostName).toString(); + + dns1 = serverConfigObject.value(config_key::dns1).toString(); + dns2 = serverConfigObject.value(config_key::dns2).toString(); + + defaultContainer = serverConfigObject.value(config_key::defaultContainer).toString(); + + auto containers = serverConfigObject.value(config_key::containers).toArray(); + for (const auto &container : std::as_const(containers)) { + auto containerObject = container.toObject(); + + auto containerName = containerObject.value(config_key::container).toString(); + + ContainerConfig containerConfig; + containerConfig.containerName = containerName; + + auto protocols = ContainerProps::protocolsForContainer(ContainerProps::containerFromString(containerName)); + for (const auto &protocol : protocols) { + auto protocolName = ProtocolProps::protoToString(protocol); + auto protocolConfigObject = containerObject.value(protocolName).toObject(); + + switch (protocol) { + case Proto::OpenVpn: { + containerConfig.protocolConfigs.insert(protocolName, + QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::ShadowSocks: { + containerConfig.protocolConfigs.insert( + protocolName, QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::Cloak: { + containerConfig.protocolConfigs.insert(protocolName, + QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::WireGuard: { + containerConfig.protocolConfigs.insert(protocolName, + QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::Awg: { + containerConfig.protocolConfigs.insert(protocolName, + QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::Xray: { + containerConfig.protocolConfigs.insert(protocolName, + QSharedPointer::create(protocolConfigObject, protocolName)); + break; + } + case Proto::Ikev2: break; + case Proto::L2tp: break; + case Proto::SSXray: break; + case Proto::TorWebSite: break; + case Proto::Dns: break; + case Proto::Sftp: break; + case Proto::Socks5Proxy: break; + default: break; + } + } + + containerConfigs.insert(containerName, containerConfig); + } +} + +QSharedPointer ServerConfig::createServerConfig(const QJsonObject &serverConfigObject) +{ + auto type = static_cast(serverConfigObject.value(config_key::configVersion).toInt(0)); + + switch (type) { + case ServerConfigType::SelfHosted: return QSharedPointer::create(serverConfigObject); + case ServerConfigType::ApiV1: return QSharedPointer::create(serverConfigObject); + case ServerConfigType::ApiV2: return QSharedPointer::create(serverConfigObject); + } +} + +QJsonObject ServerConfig::toJson() const +{ + QJsonObject json; + + if (type != ServerConfigType::SelfHosted) { + json[config_key::configVersion] = static_cast(type); + } + + if (!hostName.isEmpty()) { + json[config_key::hostName] = hostName; + } + if (!dns1.isEmpty()) { + json[config_key::dns1] = dns1; + } + if (!dns2.isEmpty()) { + json[config_key::dns2] = dns2; + } + if (!defaultContainer.isEmpty()) { + json[config_key::defaultContainer] = defaultContainer; + } + + if (!containerConfigs.isEmpty()) { + QJsonArray containersArray; + for (const auto &containerConfig : containerConfigs) { + QJsonObject containerObject; + containerObject[config_key::container] = containerConfig.containerName; + + if (!containerConfig.protocolConfigs.isEmpty()) { + for (const auto &protocolConfig : containerConfig.protocolConfigs) { + QJsonObject protocolJson = protocolConfig->toJson(); + if (!protocolJson.isEmpty()) { + containerObject[protocolConfig->protocolName] = protocolJson; + } + } + } + + containersArray.append(containerObject); + } + if (!containersArray.isEmpty()) { + json[config_key::containers] = containersArray; + } + } + + return json; +} diff --git a/client/core/models/servers/serverConfig.h b/client/core/models/servers/serverConfig.h new file mode 100644 index 00000000..5559b507 --- /dev/null +++ b/client/core/models/servers/serverConfig.h @@ -0,0 +1,32 @@ +#ifndef SERVERCONFIG_H +#define SERVERCONFIG_H + +#include +#include +#include + +#include "core/defs.h" +#include "core/models/containers/containerConfig.h" + +class ServerConfig +{ +public: + ServerConfig(const QJsonObject &serverConfigObject); + + virtual QJsonObject toJson() const; + + static QSharedPointer createServerConfig(const QJsonObject &serverConfigObject); + + amnezia::ServerConfigType type; + + QString hostName; + + QString dns1; + QString dns2; + + QString defaultContainer; + + QMap containerConfigs; +}; + +#endif // SERVERCONFIG_H diff --git a/client/ui/controllers/api/apiConfigsController.cpp b/client/ui/controllers/api/apiConfigsController.cpp index 4c58140c..a805dae2 100644 --- a/client/ui/controllers/api/apiConfigsController.cpp +++ b/client/ui/controllers/api/apiConfigsController.cpp @@ -398,16 +398,16 @@ bool ApiConfigsController::isConfigValid() QJsonObject serverConfigObject = m_serversModel->getServerConfig(serverIndex); auto configSource = apiUtils::getConfigSource(serverConfigObject); - if (configSource == apiDefs::ConfigSource::Telegram + if (configSource == amnezia::ServerConfigType::ApiV1 && !m_serversModel->data(serverIndex, ServersModel::Roles::HasInstalledContainers).toBool()) { m_serversModel->removeApiConfig(serverIndex); return updateServiceFromTelegram(serverIndex); - } else if (configSource == apiDefs::ConfigSource::AmneziaGateway + } else if (configSource == amnezia::ServerConfigType::ApiV2 && !m_serversModel->data(serverIndex, ServersModel::Roles::HasInstalledContainers).toBool()) { return updateServiceFromGateway(serverIndex, "", ""); } else if (configSource && m_serversModel->isApiKeyExpired(serverIndex)) { qDebug() << "attempt to update api config by expires_at event"; - if (configSource == apiDefs::ConfigSource::AmneziaGateway) { + if (configSource == amnezia::ServerConfigType::ApiV2) { return updateServiceFromGateway(serverIndex, "", ""); } else { m_serversModel->removeApiConfig(serverIndex); @@ -499,7 +499,7 @@ void ApiConfigsController::fillServerConfig(const QString &protocol, const ApiPa serverConfig[config_key::containers] = newServerConfig.value(config_key::containers); serverConfig[config_key::hostName] = newServerConfig.value(config_key::hostName); - if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { + if (newServerConfig.value(config_key::configVersion).toInt() == amnezia::ServerConfigType::ApiV2) { serverConfig[config_key::configVersion] = newServerConfig.value(config_key::configVersion); serverConfig[config_key::description] = newServerConfig.value(config_key::description); serverConfig[config_key::name] = newServerConfig.value(config_key::name); @@ -512,7 +512,7 @@ void ApiConfigsController::fillServerConfig(const QString &protocol, const ApiPa map.insert(newServerConfig.value(configKey::apiConfig).toObject().toVariantMap()); auto apiConfig = QJsonObject::fromVariantMap(map); - if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { + if (newServerConfig.value(config_key::configVersion).toInt() == amnezia::ServerConfigType::ApiV2) { apiConfig.insert(configKey::serviceInfo, QJsonDocument::fromJson(apiResponseBody).object().value(configKey::serviceInfo).toObject()); } diff --git a/client/ui/models/servers_model.cpp b/client/ui/models/servers_model.cpp index 5a70c16f..f76fea89 100644 --- a/client/ui/models/servers_model.cpp +++ b/client/ui/models/servers_model.cpp @@ -2,6 +2,9 @@ #include "core/api/apiDefs.h" #include "core/controllers/serverController.h" +#include "core/models/servers/apiV1ServerConfig.h" +#include "core/models/servers/apiV2ServerConfig.h" +#include "core/models/servers/selfHostedServerConfig.h" #include "core/networkUtilities.h" #ifdef Q_OS_IOS @@ -24,6 +27,9 @@ namespace constexpr char publicKeyInfo[] = "public_key"; constexpr char expiresAt[] = "expires_at"; } + + using ServerConfigVariant = + std::variant, QSharedPointer, QSharedPointer >; } ServersModel::ServersModel(std::shared_ptr settings, QObject *parent) : m_settings(settings), QAbstractListModel(parent) @@ -91,29 +97,26 @@ bool ServersModel::setData(const int index, const QVariant &value, int role) QVariant ServersModel::data(const QModelIndex &index, int role) const { - if (!index.isValid() || index.row() < 0 || index.row() >= static_cast(m_servers.size())) { + if (!index.isValid() || index.row() < 0 || index.row() >= static_cast(m_servers1.size())) { return QVariant(); } - const QJsonObject server = m_servers.at(index.row()).toObject(); - const auto apiConfig = server.value(configKey::apiConfig).toObject(); - const auto configVersion = server.value(config_key::configVersion).toInt(); + QSharedPointer serverConfig = m_servers1.at(index.row()); + ServerConfigVariant variant; + switch (serverConfig->type) { + case amnezia::ServerConfigType::SelfHosted: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV1: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV2: variant = qSharedPointerCast(serverConfig); break; + } + switch (role) { case NameRole: { - if (configVersion) { - return server.value(config_key::name).toString(); - } - auto name = server.value(config_key::description).toString(); - if (name.isEmpty()) { - return server.value(config_key::hostName).toString(); - } - return name; + return std::visit([](const auto &ptr) -> QString { return ptr->name; }, variant); } case ServerDescriptionRole: { - auto description = getServerDescription(server, index.row()); - return configVersion ? description : description + server.value(config_key::hostName).toString(); + return getServerDescription(index.row()); } - case HostNameRole: return server.value(config_key::hostName).toString(); + case HostNameRole: return serverConfig->hostName; case CredentialsRole: return QVariant::fromValue(serverCredentials(index.row())); case CredentialsLoginRole: return serverCredentials(index.row()).userName; case IsDefaultRole: return index.row() == m_defaultServerIndex; @@ -123,36 +126,28 @@ QVariant ServersModel::data(const QModelIndex &index, int role) const return (!credentials.userName.isEmpty() && !credentials.secretData.isEmpty()); } case ContainsAmneziaDnsRole: { - QString primaryDns = server.value(config_key::dns1).toString(); - return primaryDns == protocols::dns::amneziaDnsIp; + return serverConfig->dns1 == protocols::dns::amneziaDnsIp; } case DefaultContainerRole: { - return ContainerProps::containerFromString(server.value(config_key::defaultContainer).toString()); + return ContainerProps::containerFromString(serverConfig->defaultContainer); } case HasInstalledContainers: { return serverHasInstalledContainers(index.row()); } case IsServerFromTelegramApiRole: { - return server.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::Telegram; + return serverConfig->type == amnezia::ServerConfigType::ApiV1; } case IsServerFromGatewayApiRole: { - return server.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway; - } - case ApiConfigRole: { - return apiConfig; + return serverConfig->type == amnezia::ServerConfigType::ApiV2; } case IsCountrySelectionAvailableRole: { - return !apiConfig.value(configKey::availableCountries).toArray().isEmpty(); + return !qSharedPointerCast(serverConfig)->apiConfig.availableCountries.isEmpty(); } case ApiAvailableCountriesRole: { - return apiConfig.value(configKey::availableCountries).toArray(); + return QVariant::fromValue(qSharedPointerCast(serverConfig)->apiConfig.availableCountries); } case ApiServerCountryCodeRole: { - return apiConfig.value(configKey::serverCountryCode).toString(); - } - case HasAmneziaDns: { - QString primaryDns = server.value(config_key::dns1).toString(); - return primaryDns == protocols::dns::amneziaDnsIp; + return qSharedPointerCast(serverConfig)->apiConfig.serverCountryCode; } } @@ -171,6 +166,25 @@ void ServersModel::resetModel() m_servers = m_settings->serversArray(); m_defaultServerIndex = m_settings->defaultServerIndex(); m_processedServerIndex = m_defaultServerIndex; + + for (auto server : m_servers) { + auto serverConfig = ServerConfig::createServerConfig(server.toObject()); + m_servers1.push_back(serverConfig); + qDebug() << "333"; + qDebug() << server.toObject(); + qDebug() << "333"; + + ServerConfigVariant variant; + switch (serverConfig->type) { + case amnezia::ServerConfigType::SelfHosted: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV1: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV2: variant = qSharedPointerCast(serverConfig); break; + } + qDebug() << "123"; + qDebug() << std::visit([](const auto &ptr) -> QJsonObject { return ptr->toJson(); }, variant); + qDebug() << "123"; + } + endResetModel(); emit defaultServerIndexChanged(m_defaultServerIndex); } @@ -192,34 +206,40 @@ const QString ServersModel::getDefaultServerName() return qvariant_cast(data(m_defaultServerIndex, NameRole)); } -QString ServersModel::getServerDescription(const QJsonObject &server, const int index) const +QString ServersModel::getServerDescription(const int index) const { - const auto configVersion = server.value(config_key::configVersion).toInt(); - const auto apiConfig = server.value(configKey::apiConfig).toObject(); - - QString description; - - if (configVersion && !apiConfig.value(configKey::serverCountryCode).toString().isEmpty()) { - return apiConfig.value(configKey::serverCountryName).toString(); - } else if (configVersion) { - return server.value(config_key::description).toString(); - } else if (data(index, HasWriteAccessRole).toBool()) { - if (m_isAmneziaDnsEnabled && isAmneziaDnsContainerInstalled(index)) { - description += "Amnezia DNS | "; - } - } else { - if (data(index, HasAmneziaDns).toBool()) { - description += "Amnezia DNS | "; + auto serverConfig = m_servers1.at(index); + switch (serverConfig->type) { + case amnezia::ServerConfigType::ApiV1: return qSharedPointerCast(serverConfig)->description; + case amnezia::ServerConfigType::ApiV2: { + auto apiV2ServerConfig = qSharedPointerCast(serverConfig); + if (apiV2ServerConfig->apiConfig.serverCountryCode.isEmpty()) { + return apiV2ServerConfig->description; + } else { + return apiV2ServerConfig->apiConfig.serverCountryName; } } - return description; + case amnezia::ServerConfigType::SelfHosted: { + QString description; + if (data(index, HasWriteAccessRole).toBool()) { + if (m_isAmneziaDnsEnabled && isAmneziaDnsContainerInstalled(index)) { + description += "Amnezia DNS | " + serverConfig->hostName; + } + } else { + if (data(index, ContainsAmneziaDnsRole).toBool()) { + description += "Amnezia DNS | " + serverConfig->hostName; + } + } + return description; + } + } } const QString ServersModel::getDefaultServerDescriptionCollapsed() { const QJsonObject server = m_servers.at(m_defaultServerIndex).toObject(); const auto configVersion = server.value(config_key::configVersion).toInt(); - auto description = getServerDescription(server, m_defaultServerIndex); + auto description = getServerDescription(m_defaultServerIndex); if (configVersion) { return description; } @@ -233,7 +253,7 @@ const QString ServersModel::getDefaultServerDescriptionExpanded() { const QJsonObject server = m_servers.at(m_defaultServerIndex).toObject(); const auto configVersion = server.value(config_key::configVersion).toInt(); - auto description = getServerDescription(server, m_defaultServerIndex); + auto description = getServerDescription(m_defaultServerIndex); if (configVersion) { return description; } @@ -395,7 +415,6 @@ QHash ServersModel::roleNames() const roles[IsServerFromTelegramApiRole] = "isServerFromTelegramApi"; roles[IsServerFromGatewayApiRole] = "isServerFromGatewayApi"; - roles[ApiConfigRole] = "apiConfig"; roles[IsCountrySelectionAvailableRole] = "isCountrySelectionAvailable"; roles[ApiAvailableCountriesRole] = "apiAvailableCountries"; roles[ApiServerCountryCodeRole] = "apiServerCountryCode"; @@ -404,15 +423,8 @@ QHash ServersModel::roleNames() const ServerCredentials ServersModel::serverCredentials(int index) const { - const QJsonObject &s = m_servers.at(index).toObject(); - - ServerCredentials credentials; - credentials.hostName = s.value(config_key::hostName).toString(); - credentials.userName = s.value(config_key::userName).toString(); - credentials.secretData = s.value(config_key::password).toString(); - credentials.port = s.value(config_key::port).toInt(); - - return credentials; + const auto serverConfig = m_servers1.at(index); + return qSharedPointerCast(serverConfig)->serverCredentials; } void ServersModel::updateContainersModel() @@ -670,14 +682,14 @@ bool ServersModel::isServerFromApiAlreadyExists(const QString &userCountryCode, bool ServersModel::serverHasInstalledContainers(const int serverIndex) const { - QJsonObject server = m_servers.at(serverIndex).toObject(); - const auto containers = server.value(config_key::containers).toArray(); - for (auto it = containers.begin(); it != containers.end(); it++) { - auto container = ContainerProps::containerFromString(it->toObject().value(config_key::container).toString()); - if (ContainerProps::containerService(container) == ServiceType::Vpn) { + auto server = m_servers1.at(serverIndex); + const auto containers = server->containerConfigs; + for (const auto &container : containers) { + auto dockerContainer = ContainerProps::containerFromString(container.containerName); + if (ContainerProps::containerService(dockerContainer) == ServiceType::Vpn) { return true; } - if (container == DockerContainer::SSXray) { + if (dockerContainer == DockerContainer::SSXray) { return true; } } diff --git a/client/ui/models/servers_model.h b/client/ui/models/servers_model.h index c4803708..f0649e7d 100644 --- a/client/ui/models/servers_model.h +++ b/client/ui/models/servers_model.h @@ -4,6 +4,7 @@ #include #include "core/controllers/serverController.h" +#include "core/models/servers/serverConfig.h" #include "settings.h" class ServersModel : public QAbstractListModel @@ -36,9 +37,7 @@ public: ApiConfigRole, IsCountrySelectionAvailableRole, ApiAvailableCountriesRole, - ApiServerCountryCodeRole, - - HasAmneziaDns + ApiServerCountryCodeRole }; ServersModel(std::shared_ptr settings, QObject *parent = nullptr); @@ -150,13 +149,14 @@ private: void updateContainersModel(); void updateDefaultServerContainersModel(); - QString getServerDescription(const QJsonObject &server, const int index) const; + QString getServerDescription(const int index) const; bool isAmneziaDnsContainerInstalled(const int serverIndex) const; bool serverHasInstalledContainers(const int serverIndex) const; QJsonArray m_servers; + QVector> m_servers1; std::shared_ptr m_settings; From e152e84ddc949c17754509bcf5b2ddd2a4ebdcf3 Mon Sep 17 00:00:00 2001 From: lunardunno <126363523+lunardunno@users.noreply.github.com> Date: Mon, 23 Jun 2025 06:32:56 +0400 Subject: [PATCH 03/19] feat: docker pull rate limit check (#1657) * Docker pull rate limit * Error code for DockerPullRateLimit * Extended description Error 213 Extended description for the error 213: Docker Pull Rate Limit * empty line removed --- client/core/controllers/serverController.cpp | 2 ++ client/core/defs.h | 1 + client/core/errorstrings.cpp | 1 + 3 files changed, 4 insertions(+) diff --git a/client/core/controllers/serverController.cpp b/client/core/controllers/serverController.cpp index 8ff6b6c8..f86e2865 100644 --- a/client/core/controllers/serverController.cpp +++ b/client/core/controllers/serverController.cpp @@ -460,6 +460,8 @@ ErrorCode ServerController::buildContainerWorker(const ServerCredentials &creden return ErrorCode::ServerDockerOnCgroupsV2; if (stdOut.contains("cgroup mountpoint does not exist")) return ErrorCode::ServerCgroupMountpoint; + if (stdOut.contains("have reached") && stdOut.contains("pull rate limit")) + return ErrorCode::DockerPullRateLimit; return error; } diff --git a/client/core/defs.h b/client/core/defs.h index df6a1342..64f52ce6 100644 --- a/client/core/defs.h +++ b/client/core/defs.h @@ -60,6 +60,7 @@ namespace amnezia ServerUserPasswordRequired = 210, ServerDockerOnCgroupsV2 = 211, ServerCgroupMountpoint = 212, + DockerPullRateLimit = 213, // Ssh connection errors SshRequestDeniedError = 300, diff --git a/client/core/errorstrings.cpp b/client/core/errorstrings.cpp index 7cc46220..bd5ccaba 100644 --- a/client/core/errorstrings.cpp +++ b/client/core/errorstrings.cpp @@ -28,6 +28,7 @@ QString errorString(ErrorCode code) { case(ErrorCode::ServerUserPasswordRequired): errorMessage = QObject::tr("The user's password is required"); break; case(ErrorCode::ServerDockerOnCgroupsV2): errorMessage = QObject::tr("Docker error: runc doesn't work on cgroups v2"); break; case(ErrorCode::ServerCgroupMountpoint): errorMessage = QObject::tr("Server error: cgroup mountpoint does not exist"); break; + case(ErrorCode::DockerPullRateLimit): errorMessage = QObject::tr("Docker error: The pull rate limit has been reached"); break; // Libssh errors case(ErrorCode::SshRequestDeniedError): errorMessage = QObject::tr("SSH request was denied"); break; From 979ab42c5a424ccffb0fa8b843b9fcc517236f9d Mon Sep 17 00:00:00 2001 From: lunardunno <126363523+lunardunno@users.noreply.github.com> Date: Mon, 23 Jun 2025 06:34:40 +0400 Subject: [PATCH 04/19] feat: OpenSUSE support (#1557) * LOCK_FILE for zypper Checking LOCK_FILE for zypper to support OpenSUSE * Installation for OpenSUSE Docker installation support for OpenSUSE * quiet for zypper * LOCK_CMD variable Implementing the LOCK_CMD variable for different OS. * additional exception for "server is busy" * Replacing and with or Replacing && with || * undo changes to serverController * rpm.lock rpm.lock for dnf yum and zypper * LOCK_CMD check for dnf * Added zypper in check_user_in_sudo --- client/core/controllers/serverController.cpp | 2 +- client/server_scripts/check_server_is_busy.sh | 11 ++++++----- client/server_scripts/check_user_in_sudo.sh | 1 + client/server_scripts/install_docker.sh | 1 + 4 files changed, 9 insertions(+), 6 deletions(-) diff --git a/client/core/controllers/serverController.cpp b/client/core/controllers/serverController.cpp index f86e2865..a61a638b 100644 --- a/client/core/controllers/serverController.cpp +++ b/client/core/controllers/serverController.cpp @@ -827,7 +827,7 @@ ErrorCode ServerController::isServerDpkgBusy(const ServerCredentials &credential if (stdOut.contains("Packet manager not found")) return ErrorCode::ServerPacketManagerError; - if (stdOut.contains("fuser not installed")) + if (stdOut.contains("fuser not installed") || stdOut.contains("cat not installed")) return ErrorCode::NoError; if (stdOut.isEmpty()) { diff --git a/client/server_scripts/check_server_is_busy.sh b/client/server_scripts/check_server_is_busy.sh index 4e6a2c26..feddfed3 100644 --- a/client/server_scripts/check_server_is_busy.sh +++ b/client/server_scripts/check_server_is_busy.sh @@ -1,6 +1,7 @@ -if which apt-get > /dev/null 2>&1; then LOCK_FILE="/var/lib/dpkg/lock-frontend";\ -elif which dnf > /dev/null 2>&1; then LOCK_FILE="/var/run/dnf.pid";\ -elif which yum > /dev/null 2>&1; then LOCK_FILE="/var/run/yum.pid";\ -elif which pacman > /dev/null 2>&1; then LOCK_FILE="/var/lib/pacman/db.lck";\ +if which apt-get > /dev/null 2>&1; then LOCK_CMD="fuser"; LOCK_FILE="/var/lib/dpkg/lock-frontend";\ +elif which dnf > /dev/null 2>&1; then LOCK_CMD="fuser"; LOCK_FILE="/var/cache/dnf/* /var/run/dnf/* /var/lib/dnf/* /var/lib/rpm/*";\ +elif which yum > /dev/null 2>&1; then LOCK_CMD="cat"; LOCK_FILE="/var/run/yum.pid";\ +elif which zypper > /dev/null 2>&1; then LOCK_CMD="cat"; LOCK_FILE="/var/run/zypp.pid";\ +elif which pacman > /dev/null 2>&1; then LOCK_CMD="fuser"; LOCK_FILE="/var/lib/pacman/db.lck";\ else echo "Packet manager not found"; echo "Internal error"; exit 1; fi;\ -if command -v fuser > /dev/null 2>&1; then sudo fuser $LOCK_FILE 2>/dev/null; else echo "fuser not installed"; fi +if command -v $LOCK_CMD > /dev/null 2>&1; then sudo $LOCK_CMD $LOCK_FILE 2>/dev/null; else echo "$LOCK_CMD not installed"; fi diff --git a/client/server_scripts/check_user_in_sudo.sh b/client/server_scripts/check_user_in_sudo.sh index 685e6a18..f83f2fd7 100644 --- a/client/server_scripts/check_user_in_sudo.sh +++ b/client/server_scripts/check_user_in_sudo.sh @@ -1,6 +1,7 @@ if which apt-get > /dev/null 2>&1; then pm=$(which apt-get); opt="--version";\ elif which dnf > /dev/null 2>&1; then pm=$(which dnf); opt="--version";\ elif which yum > /dev/null 2>&1; then pm=$(which yum); opt="--version";\ +elif which zypper > /dev/null 2>&1; then pm=$(which zypper); opt="--version";\ elif which pacman > /dev/null 2>&1; then pm=$(which pacman); opt="--version";\ else pm="uname"; opt="-a";\ fi;\ diff --git a/client/server_scripts/install_docker.sh b/client/server_scripts/install_docker.sh index 619b08d6..1e41bb5a 100644 --- a/client/server_scripts/install_docker.sh +++ b/client/server_scripts/install_docker.sh @@ -1,6 +1,7 @@ if which apt-get > /dev/null 2>&1; then pm=$(which apt-get); silent_inst="-yq install"; check_pkgs="-yq update"; docker_pkg="docker.io"; dist="debian";\ elif which dnf > /dev/null 2>&1; then pm=$(which dnf); silent_inst="-yq install"; check_pkgs="-yq check-update"; docker_pkg="docker"; dist="fedora";\ elif which yum > /dev/null 2>&1; then pm=$(which yum); silent_inst="-y -q install"; check_pkgs="-y -q check-update"; docker_pkg="docker"; dist="centos";\ +elif which zypper > /dev/null 2>&1; then pm=$(which zypper); silent_inst="-nq install"; check_pkgs="-nq refresh"; docker_pkg="docker"; dist="opensuse";\ elif which pacman > /dev/null 2>&1; then pm=$(which pacman); silent_inst="-S --noconfirm --noprogressbar --quiet"; check_pkgs="-Sup"; docker_pkg="docker"; dist="archlinux";\ else echo "Packet manager not found"; exit 1; fi;\ echo "Dist: $dist, Packet manager: $pm, Install command: $silent_inst, Check pkgs command: $check_pkgs, Docker pkg: $docker_pkg";\ From 65f60ab9221f8ef023d62e15b5b5db6343371864 Mon Sep 17 00:00:00 2001 From: "vladimir.kuznetsov" Date: Thu, 26 Jun 2025 09:57:29 +0800 Subject: [PATCH 05/19] refactoring: replaced part of the code to work with new config classes --- client/core/controllers/coreController.cpp | 29 +- client/core/controllers/coreController.h | 18 +- .../models/protocols/awgProtocolConfig.cpp | 44 ++ .../core/models/protocols/awgProtocolConfig.h | 9 + .../core/models/protocols/protocolConfig.cpp | 65 ++- client/core/models/protocols/protocolConfig.h | 19 +- .../core/models/servers/apiV1ServerConfig.cpp | 2 - .../core/models/servers/apiV2ServerConfig.cpp | 24 +- .../core/models/servers/apiV2ServerConfig.h | 7 + client/core/models/servers/serverConfig.cpp | 22 + client/core/models/servers/serverConfig.h | 13 + client/ui/controllers/installController.cpp | 61 ++- client/ui/controllers/installController.h | 6 +- client/ui/models/containers_model.cpp | 21 +- client/ui/models/containers_model.h | 7 +- client/ui/models/protocols/awgConfigModel.cpp | 204 +++------ client/ui/models/protocols/awgConfigModel.h | 43 +- client/ui/models/protocols_model.cpp | 149 +++++-- client/ui/models/protocols_model.h | 46 +- client/ui/models/servers_model.cpp | 409 +++++++----------- client/ui/models/servers_model.h | 17 +- .../qml/Pages2/PageSettingsServerProtocol.qml | 17 +- 22 files changed, 637 insertions(+), 595 deletions(-) diff --git a/client/core/controllers/coreController.cpp b/client/core/controllers/coreController.cpp index a4dbc6d6..2a116a29 100644 --- a/client/core/controllers/coreController.cpp +++ b/client/core/controllers/coreController.cpp @@ -54,38 +54,43 @@ void CoreController::initModels() m_appSplitTunnelingModel.reset(new AppSplitTunnelingModel(m_settings, this)); m_engine->rootContext()->setContextProperty("AppSplitTunnelingModel", m_appSplitTunnelingModel.get()); - m_protocolsModel.reset(new ProtocolsModel(m_settings, this)); - m_engine->rootContext()->setContextProperty("ProtocolsModel", m_protocolsModel.get()); - - m_openVpnConfigModel.reset(new OpenVpnConfigModel(this)); + m_openVpnConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("OpenVpnConfigModel", m_openVpnConfigModel.get()); - m_shadowSocksConfigModel.reset(new ShadowSocksConfigModel(this)); + m_shadowSocksConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("ShadowSocksConfigModel", m_shadowSocksConfigModel.get()); - m_cloakConfigModel.reset(new CloakConfigModel(this)); + m_cloakConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("CloakConfigModel", m_cloakConfigModel.get()); - m_wireGuardConfigModel.reset(new WireGuardConfigModel(this)); + m_wireGuardConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("WireGuardConfigModel", m_wireGuardConfigModel.get()); - m_awgConfigModel.reset(new AwgConfigModel(this)); + m_awgConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("AwgConfigModel", m_awgConfigModel.get()); - m_xrayConfigModel.reset(new XrayConfigModel(this)); + m_xrayConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("XrayConfigModel", m_xrayConfigModel.get()); #ifdef Q_OS_WINDOWS - m_ikev2ConfigModel.reset(new Ikev2ConfigModel(this)); + m_ikev2ConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("Ikev2ConfigModel", m_ikev2ConfigModel.get()); #endif - m_sftpConfigModel.reset(new SftpConfigModel(this)); + m_sftpConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("SftpConfigModel", m_sftpConfigModel.get()); - m_socks5ConfigModel.reset(new Socks5ProxyConfigModel(this)); + m_socks5ConfigModel = QSharedPointer::create(this); m_engine->rootContext()->setContextProperty("Socks5ProxyConfigModel", m_socks5ConfigModel.get()); + m_protocolsModel.reset(new ProtocolsModel(m_openVpnConfigModel, m_shadowSocksConfigModel, m_cloakConfigModel, m_wireGuardConfigModel, + m_awgConfigModel, m_xrayConfigModel, +#ifdef Q_OS_WINDOWS + m_ikev2ConfigModel, +#endif + m_sftpConfigModel, m_socks5ConfigModel, this)); + m_engine->rootContext()->setContextProperty("ProtocolsModel", m_protocolsModel.get()); + m_clientManagementModel.reset(new ClientManagementModel(m_settings, this)); m_engine->rootContext()->setContextProperty("ClientManagementModel", m_clientManagementModel.get()); diff --git a/client/core/controllers/coreController.h b/client/core/controllers/coreController.h index 9ae53562..a3b6616d 100644 --- a/client/core/controllers/coreController.h +++ b/client/core/controllers/coreController.h @@ -129,17 +129,17 @@ private: QSharedPointer m_apiAccountInfoModel; QSharedPointer m_apiDevicesModel; - QScopedPointer m_openVpnConfigModel; - QScopedPointer m_shadowSocksConfigModel; - QScopedPointer m_cloakConfigModel; - QScopedPointer m_xrayConfigModel; - QScopedPointer m_wireGuardConfigModel; - QScopedPointer m_awgConfigModel; + QSharedPointer m_openVpnConfigModel; + QSharedPointer m_shadowSocksConfigModel; + QSharedPointer m_cloakConfigModel; + QSharedPointer m_xrayConfigModel; + QSharedPointer m_wireGuardConfigModel; + QSharedPointer m_awgConfigModel; #ifdef Q_OS_WINDOWS - QScopedPointer m_ikev2ConfigModel; + QSharedPointer m_ikev2ConfigModel; #endif - QScopedPointer m_sftpConfigModel; - QScopedPointer m_socks5ConfigModel; + QSharedPointer m_sftpConfigModel; + QSharedPointer m_socks5ConfigModel; }; #endif // CORECONTROLLER_H diff --git a/client/core/models/protocols/awgProtocolConfig.cpp b/client/core/models/protocols/awgProtocolConfig.cpp index f77c0385..9e82cede 100644 --- a/client/core/models/protocols/awgProtocolConfig.cpp +++ b/client/core/models/protocols/awgProtocolConfig.cpp @@ -7,6 +7,10 @@ using namespace amnezia; +AwgProtocolConfig::AwgProtocolConfig(const QString &protocolName) : ProtocolConfig(protocolName) +{ +} + AwgProtocolConfig::AwgProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) { serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); @@ -68,6 +72,12 @@ AwgProtocolConfig::AwgProtocolConfig(const QJsonObject &protocolConfigObject, co } } +AwgProtocolConfig::AwgProtocolConfig(const AwgProtocolConfig &other) : ProtocolConfig(other.protocolName) +{ + serverProtocolConfig = other.serverProtocolConfig; + clientProtocolConfig = other.clientProtocolConfig; +} + QJsonObject AwgProtocolConfig::toJson() const { QJsonObject json; @@ -196,3 +206,37 @@ QJsonObject AwgProtocolConfig::toJson() const return json; } + +bool AwgProtocolConfig::hasEqualServerSettings(const AwgProtocolConfig &other) const +{ + if (serverProtocolConfig.subnetAddress != other.serverProtocolConfig.subnetAddress + || serverProtocolConfig.port != other.serverProtocolConfig.port + || serverProtocolConfig.awgData.junkPacketCount != other.serverProtocolConfig.awgData.junkPacketCount + || serverProtocolConfig.awgData.junkPacketMinSize != other.serverProtocolConfig.awgData.junkPacketMinSize + || serverProtocolConfig.awgData.junkPacketMaxSize != other.serverProtocolConfig.awgData.junkPacketMaxSize + || serverProtocolConfig.awgData.initPacketJunkSize != other.serverProtocolConfig.awgData.initPacketJunkSize + || serverProtocolConfig.awgData.responsePacketJunkSize != other.serverProtocolConfig.awgData.responsePacketJunkSize + || serverProtocolConfig.awgData.initPacketMagicHeader != other.serverProtocolConfig.awgData.initPacketMagicHeader + || serverProtocolConfig.awgData.responsePacketMagicHeader != other.serverProtocolConfig.awgData.responsePacketMagicHeader + || serverProtocolConfig.awgData.underloadPacketMagicHeader != other.serverProtocolConfig.awgData.underloadPacketMagicHeader + || serverProtocolConfig.awgData.transportPacketMagicHeader != other.serverProtocolConfig.awgData.transportPacketMagicHeader) { + return false; + } + return true; +} + +bool AwgProtocolConfig::hasEqualClientSettings(const AwgProtocolConfig &other) const +{ + if (clientProtocolConfig.wireGuardData.mtu != other.clientProtocolConfig.wireGuardData.mtu + || clientProtocolConfig.awgData.junkPacketCount != other.clientProtocolConfig.awgData.junkPacketCount + || clientProtocolConfig.awgData.junkPacketMinSize != other.clientProtocolConfig.awgData.junkPacketMinSize + || clientProtocolConfig.awgData.junkPacketMaxSize != other.clientProtocolConfig.awgData.junkPacketMaxSize) { + return false; + } + return true; +} + +void AwgProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = awg::ClientProtocolConfig(); +} diff --git a/client/core/models/protocols/awgProtocolConfig.h b/client/core/models/protocols/awgProtocolConfig.h index 7c4fcf06..90ef9ba4 100644 --- a/client/core/models/protocols/awgProtocolConfig.h +++ b/client/core/models/protocols/awgProtocolConfig.h @@ -49,15 +49,24 @@ namespace awg QString nativeConfig; }; + + const int messageInitiationSize = 148; + const int messageResponseSize = 92; } class AwgProtocolConfig : public ProtocolConfig { public: + AwgProtocolConfig(const QString &protocolName); AwgProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName); + AwgProtocolConfig(const AwgProtocolConfig &other); QJsonObject toJson() const override; + bool hasEqualServerSettings(const AwgProtocolConfig &other) const; + bool hasEqualClientSettings(const AwgProtocolConfig &other) const; + void clearClientSettings(); + awg::ServerProtocolConfig serverProtocolConfig; awg::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/core/models/protocols/protocolConfig.cpp b/client/core/models/protocols/protocolConfig.cpp index 58b9387d..16e3ea9f 100644 --- a/client/core/models/protocols/protocolConfig.cpp +++ b/client/core/models/protocols/protocolConfig.cpp @@ -1,11 +1,74 @@ #include "protocolConfig.h" -#include +#include "core/models/protocols/awgProtocolConfig.h" +#include "core/models/protocols/cloakProtocolConfig.h" +#include "core/models/protocols/openvpnProtocolConfig.h" +#include "core/models/protocols/protocolConfig.h" +#include "core/models/protocols/shadowsocksProtocolConfig.h" +#include "core/models/protocols/xrayProtocolConfig.h" +#include "protocols/protocols_defs.h" + +using namespace amnezia; ProtocolConfig::ProtocolConfig(const QString &protocolName) : protocolName(protocolName) { } +ProtocolConfigVariant ProtocolConfig::getProtocolConfigVariant(const QSharedPointer &protocolConfig) +{ + ProtocolConfigVariant variant; + auto proto = ProtocolProps::protoFromString(protocolConfig->protocolName); + switch (proto) { + case Proto::OpenVpn: variant = qSharedPointerCast(protocolConfig); break; + case Proto::WireGuard: variant = qSharedPointerCast(protocolConfig); break; + case Proto::ShadowSocks: variant = qSharedPointerCast(protocolConfig); break; + case Proto::Cloak: variant = qSharedPointerCast(protocolConfig); break; + case Proto::Xray: variant = qSharedPointerCast(protocolConfig); break; + case Proto::Awg: variant = qSharedPointerCast(protocolConfig); break; + default: break; + } + return variant; +} + +bool ProtocolConfig::isServerSettingsEqual(const QSharedPointer &other) +{ + auto proto = ProtocolProps::protoFromString(protocolName); + + switch (proto) { + case Proto::OpenVpn: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return false; + } + case Proto::WireGuard: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return false; + } + case Proto::ShadowSocks: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return false; + } + case Proto::Cloak: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return false; + } + case Proto::Xray: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return false; + } + case Proto::Awg: { + auto thisConfig = qSharedPointerCast(QSharedPointer(this)); + auto otherConfig = qSharedPointerCast(other); + return thisConfig->hasEqualServerSettings(*otherConfig.data()); + } + default: return false; + } +} + QJsonObject ProtocolConfig::toJson() const { return QJsonObject(); diff --git a/client/core/models/protocols/protocolConfig.h b/client/core/models/protocols/protocolConfig.h index ce917002..899e6ec0 100644 --- a/client/core/models/protocols/protocolConfig.h +++ b/client/core/models/protocols/protocolConfig.h @@ -2,15 +2,30 @@ #define PROTOCOLCONFIG_H #include +#include +#include + +class OpenVpnProtocolConfig; +class WireGuardProtocolConfig; +class ShadowsocksProtocolConfig; +class CloakProtocolConfig; +class XrayProtocolConfig; +class AwgProtocolConfig; + +using ProtocolConfigVariant = + std::variant, QSharedPointer, QSharedPointer, + QSharedPointer, QSharedPointer, QSharedPointer >; class ProtocolConfig { public: ProtocolConfig(const QString &protocolName); + virtual QJsonObject toJson() const; + + static ProtocolConfigVariant getProtocolConfigVariant(const QSharedPointer &protocolConfig); + bool isServerSettingsEqual(const QSharedPointer &protocolConfig); QString protocolName; - - virtual QJsonObject toJson() const; }; #endif // PROTOCOLCONFIG_H diff --git a/client/core/models/servers/apiV1ServerConfig.cpp b/client/core/models/servers/apiV1ServerConfig.cpp index 363c1d9e..71fc4b7a 100644 --- a/client/core/models/servers/apiV1ServerConfig.cpp +++ b/client/core/models/servers/apiV1ServerConfig.cpp @@ -15,10 +15,8 @@ ApiV1ServerConfig::ApiV1ServerConfig(const QJsonObject &serverConfigObject) : Se QJsonObject ApiV1ServerConfig::toJson() const { - // Сначала вызываем родительскую функцию для сериализации базовых полей QJsonObject json = ServerConfig::toJson(); - // Добавляем свои поля только если они не пустые if (!name.isEmpty()) { json[config_key::name] = name; } diff --git a/client/core/models/servers/apiV2ServerConfig.cpp b/client/core/models/servers/apiV2ServerConfig.cpp index 97e27dcb..19eeb39d 100644 --- a/client/core/models/servers/apiV2ServerConfig.cpp +++ b/client/core/models/servers/apiV2ServerConfig.cpp @@ -38,14 +38,15 @@ ApiV2ServerConfig::ApiV2ServerConfig(const QJsonObject &serverConfigObject) : Se apiConfig.userCountryCode = apiConfigObject.value("user_country_code").toString(); apiConfig.vpnKey = apiConfigObject.value("vpn_key").toString(); + + auto authDataObject = serverConfigObject.value("auth_data").toObject(); + apiConfig.authData.apiKey = authDataObject.value("api_key").toString(); } QJsonObject ApiV2ServerConfig::toJson() const { - // Сначала вызываем родительскую функцию для сериализации базовых полей QJsonObject json = ServerConfig::toJson(); - // Добавляем свои поля только если они не пустые if (!name.isEmpty()) { json[config_key::name] = name; } @@ -53,10 +54,8 @@ QJsonObject ApiV2ServerConfig::toJson() const json[config_key::description] = description; } - // Сериализация API конфигурации QJsonObject apiConfigJson; - // Сериализация доступных стран только если массив не пустой if (!apiConfig.availableCountries.isEmpty()) { QJsonArray availableCountriesArray; for (const auto &country : apiConfig.availableCountries) { @@ -76,21 +75,18 @@ QJsonObject ApiV2ServerConfig::toJson() const } } - // Сериализация подписки только если есть данные if (!apiConfig.subscription.end_date.isEmpty()) { QJsonObject subscriptionObject; subscriptionObject["end_date"] = apiConfig.subscription.end_date; apiConfigJson["subscription"] = subscriptionObject; } - // Сериализация публичного ключа только если есть данные if (!apiConfig.publicKey.expiresAt.isEmpty()) { QJsonObject publicKeyObject; publicKeyObject["expires_at"] = apiConfig.publicKey.expiresAt; apiConfigJson["public_key"] = publicKeyObject; } - // Сериализация информации о сервере только если не пустая if (!apiConfig.serverCountryCode.isEmpty()) { apiConfigJson["server_country_code"] = apiConfig.serverCountryCode; } @@ -98,7 +94,6 @@ QJsonObject ApiV2ServerConfig::toJson() const apiConfigJson["server_country_name"] = apiConfig.serverCountryName; } - // Сериализация информации о сервисе только если не пустая if (!apiConfig.serviceProtocol.isEmpty()) { apiConfigJson["service_protocol"] = apiConfig.serviceProtocol; } @@ -106,17 +101,22 @@ QJsonObject ApiV2ServerConfig::toJson() const apiConfigJson["service_type"] = apiConfig.serviceType; } - // Сериализация информации о пользователе только если не пустая if (!apiConfig.userCountryCode.isEmpty()) { apiConfigJson["user_country_code"] = apiConfig.userCountryCode; } - // Сериализация VPN ключа только если не пустой if (!apiConfig.vpnKey.isEmpty()) { apiConfigJson["vpn_key"] = apiConfig.vpnKey; } - - // Добавляем API конфигурацию в основной JSON только если есть данные + + QJsonObject authDataJson; + if (!apiConfig.authData.apiKey.isEmpty()) { + authDataJson["api_key"] = apiConfig.authData.apiKey; + } + if (!authDataJson.isEmpty()) { + apiConfigJson["auth_data"] = authDataJson; + } + if (!apiConfigJson.isEmpty()) { json["api_config"] = apiConfigJson; } diff --git a/client/core/models/servers/apiV2ServerConfig.h b/client/core/models/servers/apiV2ServerConfig.h index 782e82ef..cb72c612 100644 --- a/client/core/models/servers/apiV2ServerConfig.h +++ b/client/core/models/servers/apiV2ServerConfig.h @@ -20,12 +20,19 @@ namespace apiv2 QString end_date; }; + struct AuthData + { + QString apiKey; + }; + struct ApiConfig { QVector availableCountries; Subscription subscription; PublicKey publicKey; + AuthData authData; + QString serverCountryCode; QString serverCountryName; diff --git a/client/core/models/servers/serverConfig.cpp b/client/core/models/servers/serverConfig.cpp index 977f8763..bf6f184b 100644 --- a/client/core/models/servers/serverConfig.cpp +++ b/client/core/models/servers/serverConfig.cpp @@ -27,6 +27,9 @@ ServerConfig::ServerConfig(const QJsonObject &serverConfigObject) defaultContainer = serverConfigObject.value(config_key::defaultContainer).toString(); + crc = serverConfigObject.value(config_key::crc).toInt(0); + nameOverriddenByUser = serverConfigObject.value(config_key::nameOverriddenByUser).toBool(false); + auto containers = serverConfigObject.value(config_key::containers).toArray(); for (const auto &container : std::as_const(containers)) { auto containerObject = container.toObject(); @@ -98,6 +101,17 @@ QSharedPointer ServerConfig::createServerConfig(const QJsonObject } } +ServerConfigVariant ServerConfig::getServerConfigVariant(const QSharedPointer &serverConfig) +{ + ServerConfigVariant variant; + switch (serverConfig->type) { + case amnezia::ServerConfigType::SelfHosted: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV1: variant = qSharedPointerCast(serverConfig); break; + case amnezia::ServerConfigType::ApiV2: variant = qSharedPointerCast(serverConfig); break; + } + return variant; +} + QJsonObject ServerConfig::toJson() const { QJsonObject json; @@ -143,3 +157,11 @@ QJsonObject ServerConfig::toJson() const return json; } + +void ServerConfig::updateProtocolConfig(const QString &containerName, const QMap> &protocolConfigs) +{ + if (containerConfigs.contains(containerName)) { + ContainerConfig &containerConfig = containerConfigs[containerName]; + containerConfig.protocolConfigs = protocolConfigs; + } +} diff --git a/client/core/models/servers/serverConfig.h b/client/core/models/servers/serverConfig.h index 5559b507..6b0f6ff6 100644 --- a/client/core/models/servers/serverConfig.h +++ b/client/core/models/servers/serverConfig.h @@ -8,6 +8,13 @@ #include "core/defs.h" #include "core/models/containers/containerConfig.h" +class SelfHostedServerConfig; +class ApiV1ServerConfig; +class ApiV2ServerConfig; + +using ServerConfigVariant = + std::variant, QSharedPointer, QSharedPointer >; + class ServerConfig { public: @@ -16,6 +23,9 @@ public: virtual QJsonObject toJson() const; static QSharedPointer createServerConfig(const QJsonObject &serverConfigObject); + static ServerConfigVariant getServerConfigVariant(const QSharedPointer &serverConfig); + + void updateProtocolConfig(const QString &containerName, const QMap> &protocolConfigs); amnezia::ServerConfigType type; @@ -26,6 +36,9 @@ public: QString defaultContainer; + bool nameOverriddenByUser; + int crc; // TODO it makes sense to add for all server types or move it to the api + QMap containerConfigs; }; diff --git a/client/ui/controllers/installController.cpp b/client/ui/controllers/installController.cpp index eab8979a..80ef5090 100755 --- a/client/ui/controllers/installController.cpp +++ b/client/ui/controllers/installController.cpp @@ -8,14 +8,15 @@ #include #include +#include "core/api/apiUtils.h" #include "core/controllers/serverController.h" #include "core/controllers/vpnConfigurationController.h" +#include "core/models/servers/selfHostedServerConfig.h" #include "core/networkUtilities.h" #include "logger.h" #include "ui/models/protocols/awgConfigModel.h" #include "ui/models/protocols/wireguardConfigModel.h" #include "utilities.h" -#include "core/api/apiUtils.h" namespace { @@ -552,28 +553,34 @@ ErrorCode InstallController::getAlreadyInstalledContainers(const ServerCredentia return ErrorCode::NoError; } -void InstallController::updateContainer(QJsonObject config) +void InstallController::updateContainer() { int serverIndex = m_serversModel->getProcessedServerIndex(); - ServerCredentials serverCredentials = - qvariant_cast(m_serversModel->data(serverIndex, ServersModel::Roles::CredentialsRole)); + auto oldServerConfig = m_serversModel->getServerConfig(serverIndex); + auto newServerConfig = QSharedPointer::create(oldServerConfig); + + const DockerContainer container = static_cast(m_containersModel->getProcessedContainerIndex()); + const QString containerName = m_containersModel->getProcessedContainerName(); + auto protocolConfigs = m_protocolModel->getProtocolConfigs(); + newServerConfig->updateProtocolConfig(containerName, protocolConfigs); + + auto oldProtocolConfigs = oldServerConfig->containerConfigs[containerName].protocolConfigs; + auto newProtocolConfigs = newServerConfig->containerConfigs[containerName].protocolConfigs; - const DockerContainer container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - QJsonObject oldContainerConfig = m_containersModel->getContainerConfig(container); ErrorCode errorCode = ErrorCode::NoError; - if (isUpdateDockerContainerRequired(container, oldContainerConfig, config)) { + if (isUpdateDockerContainerRequired(container, oldProtocolConfigs, newProtocolConfigs)) { QSharedPointer serverController(new ServerController(m_settings)); connect(serverController.get(), &ServerController::serverIsBusy, this, &InstallController::serverIsBusy); connect(this, &InstallController::cancelInstallation, serverController.get(), &ServerController::cancelInstallation); - errorCode = serverController->updateContainer(serverCredentials, container, oldContainerConfig, config); + errorCode = serverController->updateContainer(newServerConfig->serverCredentials, container, oldContainerConfig, config); clearCachedProfile(serverController); } if (errorCode == ErrorCode::NoError) { - m_serversModel->updateContainerConfig(container, config); - m_protocolModel->updateModel(config); + m_serversModel->editServer(newServerConfig, serverIndex); + m_protocolModel->updateModel(protocolConfigs); auto defaultContainer = qvariant_cast(m_serversModel->data(serverIndex, ServersModel::Roles::DefaultContainerRole)); if ((serverIndex == m_serversModel->getDefaultServerIndex()) && (container == defaultContainer)) { @@ -607,7 +614,7 @@ void InstallController::removeProcessedServer() int serverIndex = m_serversModel->getProcessedServerIndex(); QString serverName = m_serversModel->data(serverIndex, ServersModel::Roles::NameRole).toString(); - m_serversModel->removeServer(); + m_serversModel->removeProcessedServer(); emit removeProcessedServerFinished(tr("Server '%1' was removed").arg(serverName)); } @@ -913,29 +920,21 @@ bool InstallController::isConfigValid() return true; } -bool InstallController::isUpdateDockerContainerRequired(const DockerContainer container, const QJsonObject &oldConfig, - const QJsonObject &newConfig) +bool InstallController::isUpdateDockerContainerRequired(const DockerContainer container, + const QMap> &oldProtocolConfigs, + const QMap> &newProtocolConfigs) { Proto mainProto = ContainerProps::defaultProtocol(container); - const QJsonObject &oldProtoConfig = oldConfig.value(ProtocolProps::protoToString(mainProto)).toObject(); - const QJsonObject &newProtoConfig = newConfig.value(ProtocolProps::protoToString(mainProto)).toObject(); + const auto oldProtoConfig = oldProtocolConfigs.value(ProtocolProps::protoToString(mainProto)); + const auto newProtoConfig = newProtocolConfigs.value(ProtocolProps::protoToString(mainProto)); - if (container == DockerContainer::Awg) { - const AwgConfig oldConfig(oldProtoConfig); - const AwgConfig newConfig(newProtoConfig); - - if (oldConfig.hasEqualServerSettings(newConfig)) { - return false; - } - } else if (container == DockerContainer::WireGuard) { - const WgConfig oldConfig(oldProtoConfig); - const WgConfig newConfig(newProtoConfig); - - if (oldConfig.hasEqualServerSettings(newConfig)) { - return false; - } + switch (mainProto) { + case Proto::Awg: { + auto newConfig = qSharedPointerCast(oldProtoConfig); + auto oldConfig = qSharedPointerCast(newProtoConfig); + return !newConfig->hasEqualServerSettings(*oldConfig.data()); + } + default: return true; } - - return true; } diff --git a/client/ui/controllers/installController.h b/client/ui/controllers/installController.h index 8e42b5b2..c01c0646 100644 --- a/client/ui/controllers/installController.h +++ b/client/ui/controllers/installController.h @@ -28,7 +28,7 @@ public slots: void scanServerForInstalledContainers(); - void updateContainer(QJsonObject config); + void updateContainer(); void removeProcessedServer(); void rebootProcessedServer(); @@ -94,7 +94,9 @@ private: ErrorCode getAlreadyInstalledContainers(const ServerCredentials &credentials, const QSharedPointer &serverController, QMap &installedContainers); - bool isUpdateDockerContainerRequired(const DockerContainer container, const QJsonObject &oldConfig, const QJsonObject &newConfig); + bool isUpdateDockerContainerRequired(const DockerContainer container, + const QMap> &oldProtocolConfigs, + const QMap> &newProtocolConfigs); QSharedPointer m_serversModel; QSharedPointer m_containersModel; diff --git a/client/ui/models/containers_model.cpp b/client/ui/models/containers_model.cpp index 41d26bc7..817004ae 100644 --- a/client/ui/models/containers_model.cpp +++ b/client/ui/models/containers_model.cpp @@ -2,8 +2,7 @@ #include -ContainersModel::ContainersModel(QObject *parent) - : QAbstractListModel(parent) +ContainersModel::ContainersModel(QObject *parent) : QAbstractListModel(parent) { } @@ -37,7 +36,7 @@ QVariant ContainersModel::data(const QModelIndex &index, int role) const case EasySetupHeaderRole: return ContainerProps::easySetupHeader(container); case EasySetupDescriptionRole: return ContainerProps::easySetupDescription(container); case EasySetupOrderRole: return ContainerProps::easySetupOrder(container); - case IsInstalledRole: return m_containers.contains(container); + case IsInstalledRole: return m_containerConfigs.contains(ContainerProps::containerToString(container)); case IsCurrentlyProcessedRole: return container == static_cast(m_processedContainerIndex); case IsSupportedRole: return ContainerProps::isSupportedByCurrentPlatform(container); case IsShareableRole: return ContainerProps::isShareable(container); @@ -53,14 +52,10 @@ QVariant ContainersModel::data(const int index, int role) const return data(modelIndex, role); } -void ContainersModel::updateModel(const QJsonArray &containers) +void ContainersModel::updateModel(const QMap &containerConfigs) { beginResetModel(); - m_containers.clear(); - for (const QJsonValue &val : containers) { - m_containers.insert(ContainerProps::containerFromString(val.toObject().value(config_key::container).toString()), - val.toObject()); - } + m_containerConfigs = containerConfigs; endResetModel(); } @@ -96,8 +91,8 @@ bool ContainersModel::isServiceContainer(const int containerIndex) bool ContainersModel::hasInstalledServices() { - for (const auto &container : m_containers.keys()) { - if (ContainerProps::containerService(container) == ServiceType::Other) { + for (const auto &containerName : m_containerConfigs.keys()) { + if (ContainerProps::containerService(ContainerProps::containerFromString(containerName)) == ServiceType::Other) { return true; } } @@ -106,8 +101,8 @@ bool ContainersModel::hasInstalledServices() bool ContainersModel::hasInstalledProtocols() { - for (const auto &container : m_containers.keys()) { - if (ContainerProps::containerService(container) == ServiceType::Vpn) { + for (const auto &containerName : m_containerConfigs.keys()) { + if (ContainerProps::containerService(ContainerProps::containerFromString(containerName)) == ServiceType::Vpn) { return true; } } diff --git a/client/ui/models/containers_model.h b/client/ui/models/containers_model.h index 3bd0ddc1..9d1407a1 100644 --- a/client/ui/models/containers_model.h +++ b/client/ui/models/containers_model.h @@ -3,10 +3,9 @@ #include #include -#include -#include #include "containers/containers_defs.h" +#include "core/models/containers/containerConfig.h" class ContainersModel : public QAbstractListModel { @@ -42,7 +41,7 @@ public: QVariant data(const int index, int role) const; public slots: - void updateModel(const QJsonArray &containers); + void updateModel(const QMap &containerConfigs); void setProcessedContainerIndex(int containerIndex); int getProcessedContainerIndex(); @@ -64,7 +63,7 @@ signals: void containersModelUpdated(); private: - QMap m_containers; + QMap m_containerConfigs; int m_processedContainerIndex; }; diff --git a/client/ui/models/protocols/awgConfigModel.cpp b/client/ui/models/protocols/awgConfigModel.cpp index 860c8395..08c8338f 100644 --- a/client/ui/models/protocols/awgConfigModel.cpp +++ b/client/ui/models/protocols/awgConfigModel.cpp @@ -4,7 +4,10 @@ #include "protocols/protocols_defs.h" -AwgConfigModel::AwgConfigModel(QObject *parent) : QAbstractListModel(parent) +AwgConfigModel::AwgConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newAwgProtocolConfig(ProtocolProps::protoToString(Proto::Awg)), + m_oldAwgProtocolConfig(ProtocolProps::protoToString(Proto::Awg)) { } @@ -21,30 +24,42 @@ bool AwgConfigModel::setData(const QModelIndex &index, const QVariant &value, in } switch (role) { - case Roles::SubnetAddressRole: m_serverProtocolConfig.insert(config_key::subnet_address, value.toString()); break; - case Roles::PortRole: m_serverProtocolConfig.insert(config_key::port, value.toString()); break; + case Roles::SubnetAddressRole: m_newAwgProtocolConfig.serverProtocolConfig.subnetAddress = value.toString(); break; + case Roles::PortRole: m_newAwgProtocolConfig.serverProtocolConfig.port = value.toString(); break; - case Roles::ClientMtuRole: m_clientProtocolConfig.insert(config_key::mtu, value.toString()); break; - case Roles::ClientJunkPacketCountRole: m_clientProtocolConfig.insert(config_key::junkPacketCount, value.toString()); break; - case Roles::ClientJunkPacketMinSizeRole: m_clientProtocolConfig.insert(config_key::junkPacketMinSize, value.toString()); break; - case Roles::ClientJunkPacketMaxSizeRole: m_clientProtocolConfig.insert(config_key::junkPacketMaxSize, value.toString()); break; - - case Roles::ServerJunkPacketCountRole: m_serverProtocolConfig.insert(config_key::junkPacketCount, value.toString()); break; - case Roles::ServerJunkPacketMinSizeRole: m_serverProtocolConfig.insert(config_key::junkPacketMinSize, value.toString()); break; - case Roles::ServerJunkPacketMaxSizeRole: m_serverProtocolConfig.insert(config_key::junkPacketMaxSize, value.toString()); break; - case Roles::ServerInitPacketJunkSizeRole: m_serverProtocolConfig.insert(config_key::initPacketJunkSize, value.toString()); break; - case Roles::ServerResponsePacketJunkSizeRole: - m_serverProtocolConfig.insert(config_key::responsePacketJunkSize, value.toString()); + case Roles::ClientMtuRole: m_newAwgProtocolConfig.clientProtocolConfig.wireGuardData.mtu = value.toString(); break; + case Roles::ClientJunkPacketCountRole: m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketCount = value.toString(); break; + case Roles::ClientJunkPacketMinSizeRole: + m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketMinSize = value.toString(); + break; + case Roles::ClientJunkPacketMaxSizeRole: + m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketMaxSize = value.toString(); + break; + + case Roles::ServerJunkPacketCountRole: m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketCount = value.toString(); break; + case Roles::ServerJunkPacketMinSizeRole: + m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketMinSize = value.toString(); + break; + case Roles::ServerJunkPacketMaxSizeRole: + m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketMaxSize = value.toString(); + break; + case Roles::ServerInitPacketJunkSizeRole: + m_newAwgProtocolConfig.serverProtocolConfig.awgData.initPacketJunkSize = value.toString(); + break; + case Roles::ServerResponsePacketJunkSizeRole: + m_newAwgProtocolConfig.serverProtocolConfig.awgData.responsePacketJunkSize = value.toString(); + break; + case Roles::ServerInitPacketMagicHeaderRole: + m_newAwgProtocolConfig.serverProtocolConfig.awgData.initPacketMagicHeader = value.toString(); break; - case Roles::ServerInitPacketMagicHeaderRole: m_serverProtocolConfig.insert(config_key::initPacketMagicHeader, value.toString()); break; case Roles::ServerResponsePacketMagicHeaderRole: - m_serverProtocolConfig.insert(config_key::responsePacketMagicHeader, value.toString()); + m_newAwgProtocolConfig.serverProtocolConfig.awgData.responsePacketMagicHeader = value.toString(); break; case Roles::ServerUnderloadPacketMagicHeaderRole: - m_serverProtocolConfig.insert(config_key::underloadPacketMagicHeader, value.toString()); + m_newAwgProtocolConfig.serverProtocolConfig.awgData.underloadPacketMagicHeader = value.toString(); break; case Roles::ServerTransportPacketMagicHeaderRole: - m_serverProtocolConfig.insert(config_key::transportPacketMagicHeader, value.toString()); + m_newAwgProtocolConfig.serverProtocolConfig.awgData.transportPacketMagicHeader = value.toString(); break; } @@ -59,94 +74,42 @@ QVariant AwgConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::SubnetAddressRole: return m_serverProtocolConfig.value(config_key::subnet_address).toString(); - case Roles::PortRole: return m_serverProtocolConfig.value(config_key::port).toString(); + case Roles::SubnetAddressRole: return m_newAwgProtocolConfig.serverProtocolConfig.subnetAddress; + case Roles::PortRole: return m_newAwgProtocolConfig.serverProtocolConfig.port; - case Roles::ClientMtuRole: return m_clientProtocolConfig.value(config_key::mtu); - case Roles::ClientJunkPacketCountRole: return m_clientProtocolConfig.value(config_key::junkPacketCount); - case Roles::ClientJunkPacketMinSizeRole: return m_clientProtocolConfig.value(config_key::junkPacketMinSize); - case Roles::ClientJunkPacketMaxSizeRole: return m_clientProtocolConfig.value(config_key::junkPacketMaxSize); + case Roles::ClientMtuRole: return m_newAwgProtocolConfig.clientProtocolConfig.wireGuardData.mtu; + case Roles::ClientJunkPacketCountRole: return m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketCount; + case Roles::ClientJunkPacketMinSizeRole: return m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketMinSize; + case Roles::ClientJunkPacketMaxSizeRole: return m_newAwgProtocolConfig.clientProtocolConfig.awgData.junkPacketMaxSize; - case Roles::ServerJunkPacketCountRole: return m_serverProtocolConfig.value(config_key::junkPacketCount); - case Roles::ServerJunkPacketMinSizeRole: return m_serverProtocolConfig.value(config_key::junkPacketMinSize); - case Roles::ServerJunkPacketMaxSizeRole: return m_serverProtocolConfig.value(config_key::junkPacketMaxSize); - case Roles::ServerInitPacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::initPacketJunkSize); - case Roles::ServerResponsePacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::responsePacketJunkSize); - case Roles::ServerInitPacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::initPacketMagicHeader); - case Roles::ServerResponsePacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::responsePacketMagicHeader); - case Roles::ServerUnderloadPacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::underloadPacketMagicHeader); - case Roles::ServerTransportPacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::transportPacketMagicHeader); + case Roles::ServerJunkPacketCountRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketCount; + case Roles::ServerJunkPacketMinSizeRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketMinSize; + case Roles::ServerJunkPacketMaxSizeRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.junkPacketMaxSize; + case Roles::ServerInitPacketJunkSizeRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.initPacketJunkSize; + case Roles::ServerResponsePacketJunkSizeRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.responsePacketJunkSize; + case Roles::ServerInitPacketMagicHeaderRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.initPacketMagicHeader; + case Roles::ServerResponsePacketMagicHeaderRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.responsePacketMagicHeader; + case Roles::ServerUnderloadPacketMagicHeaderRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.underloadPacketMagicHeader; + case Roles::ServerTransportPacketMagicHeaderRole: return m_newAwgProtocolConfig.serverProtocolConfig.awgData.transportPacketMagicHeader; } return QVariant(); } -void AwgConfigModel::updateModel(const QJsonObject &config) +void AwgConfigModel::updateModel(const AwgProtocolConfig awgProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - - QJsonObject serverProtocolConfig = config.value(config_key::awg).toObject(); - - auto defaultTransportProto = ProtocolProps::transportProtoToString(ProtocolProps::defaultTransportProto(Proto::Awg), Proto::Awg); - m_serverProtocolConfig.insert(config_key::transport_proto, - serverProtocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); - m_serverProtocolConfig[config_key::last_config] = serverProtocolConfig.value(config_key::last_config); - m_serverProtocolConfig[config_key::subnet_address] = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); - m_serverProtocolConfig[config_key::port] = serverProtocolConfig.value(config_key::port).toString(protocols::awg::defaultPort); - m_serverProtocolConfig[config_key::junkPacketCount] = - serverProtocolConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount); - m_serverProtocolConfig[config_key::junkPacketMinSize] = - serverProtocolConfig.value(config_key::junkPacketMinSize).toString(protocols::awg::defaultJunkPacketMinSize); - m_serverProtocolConfig[config_key::junkPacketMaxSize] = - serverProtocolConfig.value(config_key::junkPacketMaxSize).toString(protocols::awg::defaultJunkPacketMaxSize); - m_serverProtocolConfig[config_key::initPacketJunkSize] = - serverProtocolConfig.value(config_key::initPacketJunkSize).toString(protocols::awg::defaultInitPacketJunkSize); - m_serverProtocolConfig[config_key::responsePacketJunkSize] = - serverProtocolConfig.value(config_key::responsePacketJunkSize).toString(protocols::awg::defaultResponsePacketJunkSize); - m_serverProtocolConfig[config_key::initPacketMagicHeader] = - serverProtocolConfig.value(config_key::initPacketMagicHeader).toString(protocols::awg::defaultInitPacketMagicHeader); - m_serverProtocolConfig[config_key::responsePacketMagicHeader] = - serverProtocolConfig.value(config_key::responsePacketMagicHeader).toString(protocols::awg::defaultResponsePacketMagicHeader); - m_serverProtocolConfig[config_key::underloadPacketMagicHeader] = - serverProtocolConfig.value(config_key::underloadPacketMagicHeader).toString(protocols::awg::defaultUnderloadPacketMagicHeader); - m_serverProtocolConfig[config_key::transportPacketMagicHeader] = - serverProtocolConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader); - - auto lastConfig = m_serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject clientProtocolConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - m_clientProtocolConfig[config_key::mtu] = clientProtocolConfig[config_key::mtu].toString(protocols::awg::defaultMtu); - m_clientProtocolConfig[config_key::junkPacketCount] = - clientProtocolConfig.value(config_key::junkPacketCount).toString(m_serverProtocolConfig[config_key::junkPacketCount].toString()); - m_clientProtocolConfig[config_key::junkPacketMinSize] = - clientProtocolConfig.value(config_key::junkPacketMinSize).toString(m_serverProtocolConfig[config_key::junkPacketMinSize].toString()); - m_clientProtocolConfig[config_key::junkPacketMaxSize] = - clientProtocolConfig.value(config_key::junkPacketMaxSize).toString(m_serverProtocolConfig[config_key::junkPacketMaxSize].toString()); + m_newAwgProtocolConfig = awgProtocolConfig; + m_oldAwgProtocolConfig = awgProtocolConfig; endResetModel(); } -QJsonObject AwgConfigModel::getConfig() +QSharedPointer AwgConfigModel::getConfig() { - const AwgConfig oldConfig(m_fullConfig.value(config_key::awg).toObject()); - const AwgConfig newConfig(m_serverProtocolConfig); - - if (!oldConfig.hasEqualServerSettings(newConfig)) { - m_serverProtocolConfig.remove(config_key::last_config); - } else { - auto lastConfig = m_serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject jsonConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - jsonConfig[config_key::mtu] = m_clientProtocolConfig[config_key::mtu]; - jsonConfig[config_key::junkPacketCount] = m_clientProtocolConfig[config_key::junkPacketCount]; - jsonConfig[config_key::junkPacketMinSize] = m_clientProtocolConfig[config_key::junkPacketMinSize]; - jsonConfig[config_key::junkPacketMaxSize] = m_clientProtocolConfig[config_key::junkPacketMaxSize]; - - m_serverProtocolConfig[config_key::last_config] = QString(QJsonDocument(jsonConfig).toJson()); + if (m_oldAwgProtocolConfig.hasEqualServerSettings(m_newAwgProtocolConfig)) { + m_newAwgProtocolConfig.clearClientSettings(); } - - m_fullConfig.insert(config_key::awg, m_serverProtocolConfig); - return m_fullConfig; + return QSharedPointer::create(m_newAwgProtocolConfig); } bool AwgConfigModel::isHeadersEqual(const QString &h1, const QString &h2, const QString &h3, const QString &h4) @@ -156,15 +119,12 @@ bool AwgConfigModel::isHeadersEqual(const QString &h1, const QString &h2, const bool AwgConfigModel::isPacketSizeEqual(const int s1, const int s2) { - return (AwgConstant::messageInitiationSize + s1 == AwgConstant::messageResponseSize + s2); + return (awg::messageInitiationSize + s1 == awg::messageResponseSize + s2); } bool AwgConfigModel::isServerSettingsEqual() { - const AwgConfig oldConfig(m_fullConfig.value(config_key::awg).toObject()); - const AwgConfig newConfig(m_serverProtocolConfig); - - return oldConfig.hasEqualServerSettings(newConfig); + return m_oldAwgProtocolConfig.hasEqualServerSettings(m_newAwgProtocolConfig); } QHash AwgConfigModel::roleNames() const @@ -191,53 +151,3 @@ QHash AwgConfigModel::roleNames() const return roles; } - -AwgConfig::AwgConfig(const QJsonObject &serverProtocolConfig) -{ - auto lastConfig = serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject clientProtocolConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - clientMtu = clientProtocolConfig[config_key::mtu].toString(protocols::awg::defaultMtu); - clientJunkPacketCount = clientProtocolConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount); - clientJunkPacketMinSize = clientProtocolConfig.value(config_key::junkPacketMinSize).toString(protocols::awg::defaultJunkPacketMinSize); - clientJunkPacketMaxSize = clientProtocolConfig.value(config_key::junkPacketMaxSize).toString(protocols::awg::defaultJunkPacketMaxSize); - - subnetAddress = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); - port = serverProtocolConfig.value(config_key::port).toString(protocols::awg::defaultPort); - serverJunkPacketCount = serverProtocolConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount); - serverJunkPacketMinSize = serverProtocolConfig.value(config_key::junkPacketMinSize).toString(protocols::awg::defaultJunkPacketMinSize); - serverJunkPacketMaxSize = serverProtocolConfig.value(config_key::junkPacketMaxSize).toString(protocols::awg::defaultJunkPacketMaxSize); - serverInitPacketJunkSize = serverProtocolConfig.value(config_key::initPacketJunkSize).toString(protocols::awg::defaultInitPacketJunkSize); - serverResponsePacketJunkSize = - serverProtocolConfig.value(config_key::responsePacketJunkSize).toString(protocols::awg::defaultResponsePacketJunkSize); - serverInitPacketMagicHeader = - serverProtocolConfig.value(config_key::initPacketMagicHeader).toString(protocols::awg::defaultInitPacketMagicHeader); - serverResponsePacketMagicHeader = - serverProtocolConfig.value(config_key::responsePacketMagicHeader).toString(protocols::awg::defaultResponsePacketMagicHeader); - serverUnderloadPacketMagicHeader = - serverProtocolConfig.value(config_key::underloadPacketMagicHeader).toString(protocols::awg::defaultUnderloadPacketMagicHeader); - serverTransportPacketMagicHeader = - serverProtocolConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader); -} - -bool AwgConfig::hasEqualServerSettings(const AwgConfig &other) const -{ - if (subnetAddress != other.subnetAddress || port != other.port || serverJunkPacketCount != other.serverJunkPacketCount - || serverJunkPacketMinSize != other.serverJunkPacketMinSize || serverJunkPacketMaxSize != other.serverJunkPacketMaxSize - || serverInitPacketJunkSize != other.serverInitPacketJunkSize || serverResponsePacketJunkSize != other.serverResponsePacketJunkSize - || serverInitPacketMagicHeader != other.serverInitPacketMagicHeader - || serverResponsePacketMagicHeader != other.serverResponsePacketMagicHeader - || serverUnderloadPacketMagicHeader != other.serverUnderloadPacketMagicHeader - || serverTransportPacketMagicHeader != other.serverTransportPacketMagicHeader) { - return false; - } - return true; -} - -bool AwgConfig::hasEqualClientSettings(const AwgConfig &other) const -{ - if (clientMtu != other.clientMtu || clientJunkPacketCount != other.clientJunkPacketCount - || clientJunkPacketMinSize != other.clientJunkPacketMinSize || clientJunkPacketMaxSize != other.clientJunkPacketMaxSize) { - return false; - } - return true; -} diff --git a/client/ui/models/protocols/awgConfigModel.h b/client/ui/models/protocols/awgConfigModel.h index c1f8bb27..26363c61 100644 --- a/client/ui/models/protocols/awgConfigModel.h +++ b/client/ui/models/protocols/awgConfigModel.h @@ -5,38 +5,7 @@ #include #include "containers/containers_defs.h" - -namespace AwgConstant { - const int messageInitiationSize = 148; - const int messageResponseSize = 92; -} - -struct AwgConfig -{ - AwgConfig(const QJsonObject &jsonConfig); - - QString subnetAddress; - QString port; - - QString clientMtu; - QString clientJunkPacketCount; - QString clientJunkPacketMinSize; - QString clientJunkPacketMaxSize; - - QString serverJunkPacketCount; - QString serverJunkPacketMinSize; - QString serverJunkPacketMaxSize; - QString serverInitPacketJunkSize; - QString serverResponsePacketJunkSize; - QString serverInitPacketMagicHeader; - QString serverResponsePacketMagicHeader; - QString serverUnderloadPacketMagicHeader; - QString serverTransportPacketMagicHeader; - - bool hasEqualServerSettings(const AwgConfig &other) const; - bool hasEqualClientSettings(const AwgConfig &other) const; - -}; +#include "core/models/protocols/awgProtocolConfig.h" class AwgConfigModel : public QAbstractListModel { @@ -71,8 +40,8 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const AwgProtocolConfig awgProtocolConfig); + QSharedPointer getConfig(); bool isHeadersEqual(const QString &h1, const QString &h2, const QString &h3, const QString &h4); bool isPacketSizeEqual(const int s1, const int s2); @@ -83,10 +52,8 @@ protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_serverProtocolConfig; - QJsonObject m_clientProtocolConfig; - QJsonObject m_fullConfig; + AwgProtocolConfig m_newAwgProtocolConfig; + AwgProtocolConfig m_oldAwgProtocolConfig; }; #endif // AWGCONFIGMODEL_H diff --git a/client/ui/models/protocols_model.cpp b/client/ui/models/protocols_model.cpp index 019b2d2f..6a996ec0 100644 --- a/client/ui/models/protocols_model.cpp +++ b/client/ui/models/protocols_model.cpp @@ -1,14 +1,41 @@ #include "protocols_model.h" -ProtocolsModel::ProtocolsModel(std::shared_ptr settings, QObject *parent) - : m_settings(settings), QAbstractListModel(parent) +#include "core/models/protocols/awgProtocolConfig.h" +#include "core/models/protocols/cloakProtocolConfig.h" +#include "core/models/protocols/openvpnProtocolConfig.h" +#include "core/models/protocols/shadowsocksProtocolConfig.h" +#include "core/models/protocols/wireguardProtocolConfig.h" +#include "core/models/protocols/xrayProtocolConfig.h" + +ProtocolsModel::ProtocolsModel(QObject *parent) : QAbstractListModel(parent) +{ +} + +ProtocolsModel::ProtocolsModel(const QSharedPointer &openVpnConfigModel, + const QSharedPointer &shadowSocksConfigModel, + const QSharedPointer &cloakConfigModel, + const QSharedPointer &wireGuardConfigModel, + const QSharedPointer &awgConfigModel, const QSharedPointer &xrayConfigModel, + const QSharedPointer &ikev2ConfigModel, + const QSharedPointer &sftpConfigModel, + const QSharedPointer &socks5ProxyConfigModel, QObject *parent) + : QAbstractListModel(parent), + m_openVpnConfigModel(openVpnConfigModel), + m_shadowSocksConfigModel(shadowSocksConfigModel), + m_cloakConfigModel(cloakConfigModel), + m_wireGuardConfigModel(wireGuardConfigModel), + m_awgConfigModel(awgConfigModel), + m_xrayConfigModel(xrayConfigModel), + m_ikev2ConfigModel(ikev2ConfigModel), + m_sftpConfigModel(sftpConfigModel), + m_socks5ProxyConfigModel(socks5ProxyConfigModel) { } int ProtocolsModel::rowCount(const QModelIndex &parent) const { Q_UNUSED(parent); - return m_content.size(); + return m_protocolConfigs.size(); } QHash ProtocolsModel::roleNames() const @@ -27,60 +54,102 @@ QHash ProtocolsModel::roleNames() const QVariant ProtocolsModel::data(const QModelIndex &index, int role) const { - if (!index.isValid() || index.row() < 0 || index.row() >= m_content.size()) { + if (!index.isValid() || index.row() < 0 || index.row() >= m_protocolConfigs.size()) { return QVariant(); } + auto protocolConfig = m_protocolConfigs.at(index.row()); + amnezia::Proto protocol = ProtocolProps::protoFromString(protocolConfig->protocolName); + switch (role) { case ProtocolNameRole: { - amnezia::Proto proto = ProtocolProps::protoFromString(m_content.keys().at(index.row())); - return ProtocolProps::protocolHumanNames().value(proto); + return ProtocolProps::protocolHumanNames().value(protocol); } - case ServerProtocolPageRole: - return static_cast(serverProtocolPage(ProtocolProps::protoFromString(m_content.keys().at(index.row())))); - case ClientProtocolPageRole: - return static_cast(clientProtocolPage(ProtocolProps::protoFromString(m_content.keys().at(index.row())))); - case ProtocolIndexRole: return ProtocolProps::protoFromString(m_content.keys().at(index.row())); - case RawConfigRole: { - auto protocolConfig = m_content.value(ContainerProps::containerTypeToString(m_container)).toObject(); - auto lastConfigJsonDoc = - QJsonDocument::fromJson(protocolConfig.value(config_key::last_config).toString().toUtf8()); - auto lastConfigJson = lastConfigJsonDoc.object(); + case ServerProtocolPageRole: return static_cast(serverProtocolPage(protocol)); + case ClientProtocolPageRole: return static_cast(clientProtocolPage(protocol)); + case ProtocolIndexRole: return protocol; + // case RawConfigRole: { + // auto protocolConfig = m_content.value(ContainerProps::containerTypeToString(m_container)).toObject(); + // auto lastConfigJsonDoc = QJsonDocument::fromJson(protocolConfig.value(config_key::last_config).toString().toUtf8()); + // auto lastConfigJson = lastConfigJsonDoc.object(); - QString rawConfig; - QStringList lines = lastConfigJson.value(config_key::config).toString().replace("\r", "").split("\n"); - for (const QString &l : lines) { - rawConfig.append(l + "\n"); - } - return rawConfig; - } + // QString rawConfig; + // QStringList lines = lastConfigJson.value(config_key::config).toString().replace("\r", "").split("\n"); + // for (const QString &l : lines) { + // rawConfig.append(l + "\n"); + // } + // return rawConfig; + // } case IsClientProtocolExistsRole: { - auto protocolConfig = m_content.value(ContainerProps::containerTypeToString(m_container)).toObject(); - auto lastConfigJsonDoc = - QJsonDocument::fromJson(protocolConfig.value(config_key::last_config).toString().toUtf8()); - auto lastConfigJson = lastConfigJsonDoc.object(); - - auto configString = lastConfigJson.value(config_key::config).toString(); - return !configString.isEmpty(); + auto protocolVariant = ProtocolConfig::getProtocolConfigVariant(protocolConfig); + return std::visit([](const auto &ptr) -> bool { return ptr->clientProtocolConfig.isEmpty; }, protocolVariant); } } return QVariant(); } -void ProtocolsModel::updateModel(const QJsonObject &content) +void ProtocolsModel::updateModel(const QMap> &protocolConfigs) { - m_container = ContainerProps::containerFromString(content.value(config_key::container).toString()); - - m_content = content; - m_content.remove(config_key::container); + beginResetModel(); + m_protocolConfigs.clear(); + for (const auto &protocolConfig : protocolConfigs) { + m_protocolConfigs.push_back(protocolConfig); + } + endResetModel(); } -QJsonObject ProtocolsModel::getConfig() +void ProtocolsModel::updateProtocolModel(amnezia::Proto protocol) { - QJsonObject config = m_content; - config.insert(config_key::container, ContainerProps::containerToString(m_container)); - return config; + QSharedPointer protocolConfig; + + for (const auto &config : m_protocolConfigs) { + if (ProtocolProps::protoFromString(config->protocolName) == protocol) { + protocolConfig = config; + break; + } + } + + switch (protocol) { + case Proto::OpenVpn: m_openVpnConfigModel->updateModel(config); break; + case Proto::ShadowSocks: m_shadowSocksConfigModel->updateModel(config); break; + case Proto::Cloak: m_cloakConfigModel->updateModel(config); break; + case Proto::WireGuard: m_wireGuardConfigModel->updateModel(config); break; + case Proto::Awg: m_awgConfigModel->updateModel(config); break; + case Proto::Xray: m_xrayConfigModel->updateModel(config); break; +#ifdef Q_OS_WINDOWS + case Proto::Ikev2: + case Proto::L2tp: m_ikev2ConfigModel->updateModel(config); break; +#endif + case Proto::Sftp: m_sftpConfigModel->updateModel(config); break; + case Proto::Socks5Proxy: m_socks5ProxyConfigModel->updateModel(config); break; + default: break; + } +} + +QMap> ProtocolsModel::getProtocolConfigs() +{ + QMap> protocolConfigs; + + for (const auto &config : m_protocolConfigs) { + switch (ProtocolProps::protoFromString(config->protocolName)) { + case Proto::OpenVpn: protocolConfigs.insert(config->protocolName, m_openVpnConfigModel->getConfig()); break; + case Proto::ShadowSocks: m_shadowSocksConfigModel->updateModel(config); break; + case Proto::Cloak: m_cloakConfigModel->updateModel(config); break; + case Proto::WireGuard: m_wireGuardConfigModel->updateModel(config); break; + case Proto::Awg: protocolConfigs.insert(config->protocolName, m_awgConfigModel->getConfig()); break; + case Proto::Xray: m_xrayConfigModel->updateModel(config); break; +#ifdef Q_OS_WINDOWS + case Proto::Ikev2: + case Proto::L2tp: m_ikev2ConfigModel->updateModel(config); break; +#endif + case Proto::Sftp: m_sftpConfigModel->updateModel(config); break; + case Proto::Socks5Proxy: m_socks5ProxyConfigModel->updateModel(config); break; + default: break; + } + } + + return protocolConfigs; } PageLoader::PageEnum ProtocolsModel::serverProtocolPage(Proto protocol) const @@ -94,7 +163,7 @@ PageLoader::PageEnum ProtocolsModel::serverProtocolPage(Proto protocol) const case Proto::Ikev2: return PageLoader::PageEnum::PageProtocolIKev2Settings; case Proto::L2tp: return PageLoader::PageEnum::PageProtocolIKev2Settings; case Proto::Xray: return PageLoader::PageEnum::PageProtocolXraySettings; - + // non-vpn case Proto::TorWebSite: return PageLoader::PageEnum::PageServiceTorWebsiteSettings; case Proto::Dns: return PageLoader::PageEnum::PageServiceDnsSettings; diff --git a/client/ui/models/protocols_model.h b/client/ui/models/protocols_model.h index 5c52ee86..64599962 100644 --- a/client/ui/models/protocols_model.h +++ b/client/ui/models/protocols_model.h @@ -4,8 +4,19 @@ #include #include -#include "../controllers/pageController.h" -#include "settings.h" +#include "core/models/protocols/protocolConfig.h" +#include "ui/controllers/pageController.h" +#include "ui/models/protocols/awgConfigModel.h" +#include "ui/models/protocols/cloakConfigModel.h" +#include "ui/models/protocols/openvpnConfigModel.h" +#include "ui/models/protocols/shadowsocksConfigModel.h" +#include "ui/models/protocols/wireguardConfigModel.h" +#include "ui/models/protocols/xrayConfigModel.h" +#ifdef Q_OS_WINDOWS + #include "ui/models/protocols/ikev2ConfigModel.h" +#endif +#include "ui/models/services/sftpConfigModel.h" +#include "ui/models/services/socks5ProxyConfigModel.h" class ProtocolsModel : public QAbstractListModel { @@ -20,16 +31,26 @@ public: IsClientProtocolExistsRole }; - ProtocolsModel(std::shared_ptr settings, QObject *parent = nullptr); + ProtocolsModel(QObject *parent = nullptr); + ProtocolsModel(const QSharedPointer &openVpnConfigModel, + const QSharedPointer &shadowSocksConfigModel, + const QSharedPointer &cloakConfigModel, const QSharedPointer &wireGuardConfigModel, + const QSharedPointer &awgConfigModel, const QSharedPointer &xrayConfigModel, +#ifdef Q_OS_WINDOWS + const QSharedPointer &ikev2ConfigModel, +#endif + const QSharedPointer &sftpConfigModel, + const QSharedPointer &socks5ProxyConfigModel, QObject *parent = nullptr); int rowCount(const QModelIndex &parent = QModelIndex()) const override; QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &content); + void updateModel(const QMap> &protocolConfigs); + void updateProtocolModel(amnezia::Proto protocol); - QJsonObject getConfig(); + QMap> getProtocolConfigs(); protected: QHash roleNames() const override; @@ -38,10 +59,19 @@ private: PageLoader::PageEnum serverProtocolPage(Proto protocol) const; PageLoader::PageEnum clientProtocolPage(Proto protocol) const; - std::shared_ptr m_settings; + QVector> m_protocolConfigs; - DockerContainer m_container; - QJsonObject m_content; + QSharedPointer m_openVpnConfigModel; + QSharedPointer m_shadowSocksConfigModel; + QSharedPointer m_cloakConfigModel; + QSharedPointer m_wireGuardConfigModel; + QSharedPointer m_awgConfigModel; + QSharedPointer m_xrayConfigModel; +#ifdef Q_OS_WINDOWS + QSharedPointer m_ikev2ConfigModel; +#endif + QSharedPointer m_sftpConfigModel; + QSharedPointer m_socks5ProxyConfigModel; }; #endif // PROTOCOLS_MODEL_H diff --git a/client/ui/models/servers_model.cpp b/client/ui/models/servers_model.cpp index f76fea89..986ade8a 100644 --- a/client/ui/models/servers_model.cpp +++ b/client/ui/models/servers_model.cpp @@ -5,6 +5,7 @@ #include "core/models/servers/apiV1ServerConfig.h" #include "core/models/servers/apiV2ServerConfig.h" #include "core/models/servers/selfHostedServerConfig.h" +#include "core/models/servers/serverConfig.h" #include "core/networkUtilities.h" #ifdef Q_OS_IOS @@ -27,9 +28,6 @@ namespace constexpr char publicKeyInfo[] = "public_key"; constexpr char expiresAt[] = "expires_at"; } - - using ServerConfigVariant = - std::variant, QSharedPointer, QSharedPointer >; } ServersModel::ServersModel(std::shared_ptr settings, QObject *parent) : m_settings(settings), QAbstractListModel(parent) @@ -39,8 +37,7 @@ ServersModel::ServersModel(std::shared_ptr settings, QObject *parent) connect(this, &ServersModel::defaultServerIndexChanged, this, &ServersModel::defaultServerNameChanged); connect(this, &ServersModel::defaultServerIndexChanged, this, [this](const int serverIndex) { - auto defaultContainer = - ContainerProps::containerFromString(m_servers.at(serverIndex).toObject().value(config_key::defaultContainer).toString()); + auto defaultContainer = ContainerProps::containerFromString(m_servers1.at(serverIndex)->defaultContainer); emit ServersModel::defaultServerDefaultContainerChanged(defaultContainer); emit ServersModel::defaultServerNameChanged(); updateDefaultServerContainersModel(); @@ -53,28 +50,25 @@ ServersModel::ServersModel(std::shared_ptr settings, QObject *parent) int ServersModel::rowCount(const QModelIndex &parent) const { Q_UNUSED(parent); - return static_cast(m_servers.size()); + return static_cast(m_servers1.size()); } bool ServersModel::setData(const QModelIndex &index, const QVariant &value, int role) { - if (!index.isValid() || index.row() < 0 || index.row() >= static_cast(m_servers.size())) { + if (!index.isValid() || index.row() < 0 || index.row() >= static_cast(m_servers1.size())) { return false; } - QJsonObject server = m_servers.at(index.row()).toObject(); - const auto configVersion = server.value(config_key::configVersion).toInt(); + QSharedPointer serverConfig = m_servers1.at(index.row()); + ServerConfigVariant variant = ServerConfig::getServerConfigVariant(serverConfig); switch (role) { case NameRole: { - if (configVersion) { - server.insert(config_key::name, value.toString()); - } else { - server.insert(config_key::description, value.toString()); - } - server.insert(config_key::nameOverriddenByUser, true); - m_settings->editServer(index.row(), server); - m_servers.replace(index.row(), server); + std::visit([&value](const auto &ptr) -> void { ptr->name = value.toString(); }, variant); + serverConfig->nameOverriddenByUser = true; + + m_settings->editServer(index.row(), serverConfig->toJson()); + m_servers1.replace(index.row(), serverConfig); if (index.row() == m_defaultServerIndex) { emit defaultServerNameChanged(); } @@ -102,12 +96,7 @@ QVariant ServersModel::data(const QModelIndex &index, int role) const } QSharedPointer serverConfig = m_servers1.at(index.row()); - ServerConfigVariant variant; - switch (serverConfig->type) { - case amnezia::ServerConfigType::SelfHosted: variant = qSharedPointerCast(serverConfig); break; - case amnezia::ServerConfigType::ApiV1: variant = qSharedPointerCast(serverConfig); break; - case amnezia::ServerConfigType::ApiV2: variant = qSharedPointerCast(serverConfig); break; - } + ServerConfigVariant variant = ServerConfig::getServerConfigVariant(serverConfig); switch (role) { case NameRole: { @@ -163,26 +152,13 @@ QVariant ServersModel::data(const int index, int role) const void ServersModel::resetModel() { beginResetModel(); - m_servers = m_settings->serversArray(); + auto servers = m_settings->serversArray(); m_defaultServerIndex = m_settings->defaultServerIndex(); m_processedServerIndex = m_defaultServerIndex; - for (auto server : m_servers) { + for (auto server : servers) { auto serverConfig = ServerConfig::createServerConfig(server.toObject()); m_servers1.push_back(serverConfig); - qDebug() << "333"; - qDebug() << server.toObject(); - qDebug() << "333"; - - ServerConfigVariant variant; - switch (serverConfig->type) { - case amnezia::ServerConfigType::SelfHosted: variant = qSharedPointerCast(serverConfig); break; - case amnezia::ServerConfigType::ApiV1: variant = qSharedPointerCast(serverConfig); break; - case amnezia::ServerConfigType::ApiV2: variant = qSharedPointerCast(serverConfig); break; - } - qDebug() << "123"; - qDebug() << std::visit([](const auto &ptr) -> QJsonObject { return ptr->toJson(); }, variant); - qDebug() << "123"; } endResetModel(); @@ -237,33 +213,33 @@ QString ServersModel::getServerDescription(const int index) const const QString ServersModel::getDefaultServerDescriptionCollapsed() { - const QJsonObject server = m_servers.at(m_defaultServerIndex).toObject(); - const auto configVersion = server.value(config_key::configVersion).toInt(); + auto serverConfig = m_servers1.at(m_defaultServerIndex); auto description = getServerDescription(m_defaultServerIndex); - if (configVersion) { + auto containerName = ContainerProps::containerFromString(serverConfig->defaultContainer); + + if (serverConfig->type != ServerConfigType::SelfHosted) { return description; } - auto container = ContainerProps::containerFromString(server.value(config_key::defaultContainer).toString()); - - return description += ContainerProps::containerHumanNames().value(container) + " | " + server.value(config_key::hostName).toString(); + return description += ContainerProps::containerHumanNames().value(containerName) + " | " + serverConfig->hostName; } const QString ServersModel::getDefaultServerDescriptionExpanded() { - const QJsonObject server = m_servers.at(m_defaultServerIndex).toObject(); - const auto configVersion = server.value(config_key::configVersion).toInt(); + auto serverConfig = m_servers1.at(m_defaultServerIndex); auto description = getServerDescription(m_defaultServerIndex); - if (configVersion) { + auto containerName = ContainerProps::containerFromString(serverConfig->defaultContainer); + + if (serverConfig->type != ServerConfigType::SelfHosted) { return description; } - return description += server.value(config_key::hostName).toString(); + return description += serverConfig->hostName; } const int ServersModel::getServersCount() { - return m_servers.count(); + return m_servers1.count(); } bool ServersModel::hasServerWithWriteAccess() @@ -325,18 +301,22 @@ bool ServersModel::isDefaultServerHasWriteAccess() return qvariant_cast(data(m_defaultServerIndex, HasWriteAccessRole)); } -void ServersModel::addServer(const QJsonObject &server) +void ServersModel::addServer(const QSharedPointer &serverConfig) { beginResetModel(); - m_settings->addServer(server); - m_servers = m_settings->serversArray(); + m_settings->addServer(serverConfig->toJson()); + auto servers = m_settings->serversArray(); + for (auto server : servers) { + auto serverConfig = ServerConfig::createServerConfig(server.toObject()); + m_servers1.push_back(serverConfig); + } endResetModel(); } -void ServersModel::editServer(const QJsonObject &server, const int serverIndex) +void ServersModel::editServer(const QSharedPointer &serverConfig, const int serverIndex) { - m_settings->editServer(serverIndex, server); - m_servers.replace(serverIndex, m_settings->serversArray().at(serverIndex)); + m_settings->editServer(serverIndex, serverConfig->toJson()); + m_servers1[serverIndex] = serverConfig; emit dataChanged(index(serverIndex, 0), index(serverIndex, 0)); if (serverIndex == m_defaultServerIndex) { @@ -350,30 +330,20 @@ void ServersModel::editServer(const QJsonObject &server, const int serverIndex) } } -void ServersModel::removeServer() +void ServersModel::removeProcessedServer() { - beginResetModel(); - m_settings->removeServer(m_processedServerIndex); - m_servers = m_settings->serversArray(); - - if (m_settings->defaultServerIndex() == m_processedServerIndex) { - setDefaultServerIndex(0); - } else if (m_settings->defaultServerIndex() > m_processedServerIndex) { - setDefaultServerIndex(m_settings->defaultServerIndex() - 1); - } - - if (m_settings->serversCount() == 0) { - setDefaultServerIndex(-1); - } - setProcessedServerIndex(m_defaultServerIndex); - endResetModel(); + removeServer(m_processedServerIndex); } void ServersModel::removeServer(const int serverIndex) { beginResetModel(); m_settings->removeServer(serverIndex); - m_servers = m_settings->serversArray(); + auto servers = m_settings->serversArray(); + for (auto server : servers) { + auto serverConfig = ServerConfig::createServerConfig(server.toObject()); + m_servers1.push_back(serverConfig); + } if (m_settings->defaultServerIndex() == serverIndex) { setDefaultServerIndex(0); @@ -429,84 +399,27 @@ ServerCredentials ServersModel::serverCredentials(int index) const void ServersModel::updateContainersModel() { - auto containers = m_servers.at(m_processedServerIndex).toObject().value(config_key::containers).toArray(); - emit containersUpdated(containers); + auto containerConfigs = m_servers1.at(m_processedServerIndex)->containerConfigs; + emit containersUpdated(containerConfigs); } void ServersModel::updateDefaultServerContainersModel() { - auto containers = m_servers.at(m_defaultServerIndex).toObject().value(config_key::containers).toArray(); - emit defaultServerContainersUpdated(containers); + auto containerConfigs = m_servers1.at(m_defaultServerIndex)->containerConfigs; + emit defaultServerContainersUpdated(containerConfigs); } -QJsonObject ServersModel::getServerConfig(const int serverIndex) +QSharedPointer ServersModel::getServerConfig(const int serverIndex) { - return m_servers.at(serverIndex).toObject(); -} - -void ServersModel::reloadDefaultServerContainerConfig() -{ - QJsonObject server = m_servers.at(m_defaultServerIndex).toObject(); - auto container = ContainerProps::containerFromString(server.value(config_key::defaultContainer).toString()); - - auto containers = server.value(config_key::containers).toArray(); - - auto config = m_settings->containerConfig(m_defaultServerIndex, container); - for (auto i = 0; i < containers.size(); i++) { - auto c = ContainerProps::containerFromString(containers.at(i).toObject().value(config_key::container).toString()); - if (c == container) { - containers.replace(i, config); - break; - } - } - - server.insert(config_key::containers, containers); - editServer(server, m_defaultServerIndex); -} - -void ServersModel::updateContainerConfig(const int containerIndex, const QJsonObject config) -{ - auto container = static_cast(containerIndex); - QJsonObject server = m_servers.at(m_processedServerIndex).toObject(); - - auto containers = server.value(config_key::containers).toArray(); - for (auto i = 0; i < containers.size(); i++) { - auto c = ContainerProps::containerFromString(containers.at(i).toObject().value(config_key::container).toString()); - if (c == container) { - containers.replace(i, config); - break; - } - } - - server.insert(config_key::containers, containers); - editServer(server, m_processedServerIndex); -} - -void ServersModel::addContainerConfig(const int containerIndex, const QJsonObject config) -{ - auto container = static_cast(containerIndex); - QJsonObject server = m_servers.at(m_processedServerIndex).toObject(); - - auto containers = server.value(config_key::containers).toArray(); - containers.push_back(config); - - server.insert(config_key::containers, containers); - - auto defaultContainer = server.value(config_key::defaultContainer).toString(); - if (ContainerProps::containerFromString(defaultContainer) == DockerContainer::None - && ContainerProps::containerService(container) != ServiceType::Other && ContainerProps::isSupportedByCurrentPlatform(container)) { - server.insert(config_key::defaultContainer, ContainerProps::containerToString(container)); - } - - editServer(server, m_processedServerIndex); + return m_servers1.at(serverIndex); } void ServersModel::setDefaultContainer(const int serverIndex, const int containerIndex) { auto container = static_cast(containerIndex); - QJsonObject s = m_servers.at(serverIndex).toObject(); - s.insert(config_key::defaultContainer, ContainerProps::containerToString(container)); - editServer(s, serverIndex); // check + auto serverConfig = m_servers1.at(serverIndex); + serverConfig->defaultContainer = ContainerProps::containerToString(container); + editServer(serverConfig, serverIndex); } const QString ServersModel::getDefaultServerDefaultContainerName() @@ -517,25 +430,19 @@ const QString ServersModel::getDefaultServerDefaultContainerName() ErrorCode ServersModel::removeAllContainers(const QSharedPointer &serverController) { - ErrorCode errorCode = serverController->removeAllContainers(m_settings->serverCredentials(m_processedServerIndex)); if (errorCode == ErrorCode::NoError) { - QJsonObject s = m_servers.at(m_processedServerIndex).toObject(); - s.insert(config_key::containers, {}); - s.insert(config_key::defaultContainer, ContainerProps::containerToString(DockerContainer::None)); - - editServer(s, m_processedServerIndex); + auto serverConfig = m_servers1.at(m_processedServerIndex); + serverConfig->containerConfigs.clear(); + editServer(serverConfig, m_processedServerIndex); } return errorCode; } ErrorCode ServersModel::rebootServer(const QSharedPointer &serverController) { - - auto credentials = m_settings->serverCredentials(m_processedServerIndex); - - ErrorCode errorCode = serverController->rebootServer(credentials); + ErrorCode errorCode = serverController->rebootServer(m_settings->serverCredentials(m_processedServerIndex)); return errorCode; } @@ -548,30 +455,19 @@ ErrorCode ServersModel::removeContainer(const QSharedPointer & ErrorCode errorCode = serverController->removeContainer(credentials, dockerContainer); if (errorCode == ErrorCode::NoError) { - QJsonObject server = m_servers.at(m_processedServerIndex).toObject(); + auto serverConfig = m_servers1.at(m_processedServerIndex); + serverConfig->containerConfigs.remove(ContainerProps::containerToString(dockerContainer)); - auto containers = server.value(config_key::containers).toArray(); - for (auto it = containers.begin(); it != containers.end(); it++) { - if (it->toObject().value(config_key::container).toString() == ContainerProps::containerToString(dockerContainer)) { - containers.erase(it); - break; - } - } - - server.insert(config_key::containers, containers); - - auto defaultContainer = ContainerProps::containerFromString(server.value(config_key::defaultContainer).toString()); + auto defaultContainer = ContainerProps::containerFromString(serverConfig->defaultContainer); if (defaultContainer == containerIndex) { - if (containers.empty()) { - defaultContainer = DockerContainer::None; + if (serverConfig->containerConfigs.empty()) { + serverConfig->defaultContainer = ContainerProps::containerToString(DockerContainer::None); } else { - defaultContainer = - ContainerProps::containerFromString(containers.begin()->toObject().value(config_key::container).toString()); + serverConfig->defaultContainer = serverConfig->containerConfigs.begin()->containerName; } - server.insert(config_key::defaultContainer, ContainerProps::containerToString(defaultContainer)); } - editServer(server, m_processedServerIndex); + editServer(serverConfig, m_processedServerIndex); } return errorCode; } @@ -579,7 +475,9 @@ ErrorCode ServersModel::removeContainer(const QSharedPointer & void ServersModel::clearCachedProfile(const DockerContainer container) { m_settings->clearLastConnectionConfig(m_processedServerIndex, container); - m_servers.replace(m_processedServerIndex, m_settings->server(m_processedServerIndex)); + auto serverConfig = ServerConfig::createServerConfig(m_settings->server(m_processedServerIndex)); + + m_servers1.replace(m_processedServerIndex, serverConfig); if (m_processedServerIndex == m_defaultServerIndex) { updateDefaultServerContainersModel(); } @@ -588,10 +486,9 @@ void ServersModel::clearCachedProfile(const DockerContainer container) bool ServersModel::isAmneziaDnsContainerInstalled(const int serverIndex) const { - QJsonObject server = m_servers.at(serverIndex).toObject(); - auto containers = server.value(config_key::containers).toArray(); - for (auto it = containers.begin(); it != containers.end(); it++) { - if (it->toObject().value(config_key::container).toString() == ContainerProps::containerToString(DockerContainer::Dns)) { + auto serverConfig = m_servers1.at(serverIndex); + for (const auto &container : serverConfig->containerConfigs) { + if (container.containerName == ContainerProps::containerToString(DockerContainer::Dns)) { return true; } } @@ -602,17 +499,16 @@ QPair ServersModel::getDnsPair(int serverIndex) { QPair dns; - const QJsonObject &server = m_servers.at(m_processedServerIndex).toObject(); - const auto containers = server.value(config_key::containers).toArray(); + auto serverConfig = m_servers1.at(serverIndex); bool isDnsContainerInstalled = false; - for (const QJsonValue &container : containers) { - if (ContainerProps::containerFromString(container.toObject().value(config_key::container).toString()) == DockerContainer::Dns) { + for (const auto &container : serverConfig->containerConfigs) { + if (container.containerName == ContainerProps::containerToString(DockerContainer::Dns)) { isDnsContainerInstalled = true; } } - dns.first = server.value(config_key::dns1).toString(); - dns.second = server.value(config_key::dns2).toString(); + dns.first = serverConfig->dns1; + dns.second = serverConfig->dns2; if (dns.first.isEmpty() || !NetworkUtilities::checkIPv4Format(dns.first)) { if (m_isAmneziaDnsEnabled && isDnsContainerInstalled) { @@ -631,18 +527,17 @@ QPair ServersModel::getDnsPair(int serverIndex) QStringList ServersModel::getAllInstalledServicesName(const int serverIndex) { QStringList servicesName; - QJsonObject server = m_servers.at(serverIndex).toObject(); - const auto containers = server.value(config_key::containers).toArray(); - for (auto it = containers.begin(); it != containers.end(); it++) { - auto container = ContainerProps::containerFromString(it->toObject().value(config_key::container).toString()); - if (ContainerProps::containerService(container) == ServiceType::Other) { - if (container == DockerContainer::Dns) { + auto serverConfig = m_servers1.at(serverIndex); + for (const auto &container : serverConfig->containerConfigs) { + auto containerType = ContainerProps::containerFromString(container.containerName); + if (ContainerProps::containerService(containerType) == ServiceType::Other) { + if (containerType == DockerContainer::Dns) { servicesName.append("DNS"); - } else if (container == DockerContainer::Sftp) { + } else if (containerType == DockerContainer::Sftp) { servicesName.append("SFTP"); - } else if (container == DockerContainer::TorWebSite) { + } else if (containerType == DockerContainer::TorWebSite) { servicesName.append("TOR"); - } else if (container == DockerContainer::Socks5Proxy) { + } else if (containerType == DockerContainer::Socks5Proxy) { servicesName.append("SOCKS5"); } } @@ -659,8 +554,8 @@ void ServersModel::toggleAmneziaDns(bool enabled) bool ServersModel::isServerFromApiAlreadyExists(const quint16 crc) { - for (const auto &server : std::as_const(m_servers)) { - if (static_cast(server.toObject().value(config_key::crc).toInt()) == crc) { + for (const auto &server : std::as_const(m_servers1)) { + if (static_cast(server->crc) == crc) { return true; } } @@ -669,11 +564,10 @@ bool ServersModel::isServerFromApiAlreadyExists(const quint16 crc) bool ServersModel::isServerFromApiAlreadyExists(const QString &userCountryCode, const QString &serviceType, const QString &serviceProtocol) { - for (const auto &server : std::as_const(m_servers)) { - const auto apiConfig = server.toObject().value(configKey::apiConfig).toObject(); - if (apiConfig.value(configKey::userCountryCode).toString() == userCountryCode - && apiConfig.value(configKey::serviceType).toString() == serviceType - && apiConfig.value(configKey::serviceProtocol).toString() == serviceProtocol) { + for (const auto &serverConfig : std::as_const(m_servers1)) { + const auto apiV2ServerConfig = qSharedPointerCast(serverConfig); + if (apiV2ServerConfig->apiConfig.userCountryCode == userCountryCode && apiV2ServerConfig->apiConfig.serviceType == serviceType + && apiV2ServerConfig->apiConfig.serviceProtocol == serviceProtocol) { return true; } } @@ -734,27 +628,46 @@ bool ServersModel::setProcessedServerData(const QString &roleString, const QVari bool ServersModel::isDefaultServerDefaultContainerHasSplitTunneling() { - auto server = m_servers.at(m_defaultServerIndex).toObject(); - auto defaultContainer = ContainerProps::containerFromString(server.value(config_key::defaultContainer).toString()); + auto serverConfig = m_servers1.at(m_defaultServerIndex); + auto defaultContainer = ContainerProps::containerFromString(serverConfig->defaultContainer); - auto containers = server.value(config_key::containers).toArray(); - for (auto i = 0; i < containers.size(); i++) { - auto container = containers.at(i).toObject(); - if (container.value(config_key::container).toString() != ContainerProps::containerToString(defaultContainer)) { + for (const auto &container : serverConfig->containerConfigs) { + if (container.containerName != serverConfig->defaultContainer) { continue; } if (defaultContainer == DockerContainer::Awg || defaultContainer == DockerContainer::WireGuard) { - QJsonObject serverProtocolConfig = container.value(ContainerProps::containerTypeToString(defaultContainer)).toObject(); - QString clientProtocolConfigString = serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject clientProtocolConfig = QJsonDocument::fromJson(clientProtocolConfigString.toUtf8()).object(); - return (clientProtocolConfigString.contains("AllowedIPs") && !clientProtocolConfigString.contains("AllowedIPs = 0.0.0.0/0, ::/0")) - || (!clientProtocolConfig.value(config_key::allowed_ips).toArray().isEmpty() - && !clientProtocolConfig.value(config_key::allowed_ips).toArray().contains("0.0.0.0/0")); + auto protocolConfigVariant = ProtocolConfig::getProtocolConfigVariant(container.protocolConfigs[serverConfig->defaultContainer]); + return std::visit( + [](const auto &ptr) -> bool { + if constexpr (requires { + ptr->clientProtocolConfig; + ptr->clientProtocolConfig.wireGuardData; + }) { + const auto nativeConfig = ptr->clientProtocolConfig.nativeConfig; + const auto allowedIps = ptr->clientProtocolConfig.wireGuardData.allowedIps; + + return (nativeConfig.contains("AllowedIPs") && !nativeConfig.contains("AllowedIPs = 0.0.0.0/0, ::/0")) + || (!allowedIps.isEmpty() && !allowedIps.contains("0.0.0.0/0")); + } else { + return false; + } + }, + protocolConfigVariant); } else if (defaultContainer == DockerContainer::Cloak || defaultContainer == DockerContainer::OpenVpn || defaultContainer == DockerContainer::ShadowSocks) { - auto serverProtocolConfig = container.value(ContainerProps::containerTypeToString(DockerContainer::OpenVpn)).toObject(); - QString clientProtocolConfigString = serverProtocolConfig.value(config_key::last_config).toString(); - return !clientProtocolConfigString.isEmpty() && !clientProtocolConfigString.contains("redirect-gateway"); + auto protocolConfigVariant = ProtocolConfig::getProtocolConfigVariant( + container.protocolConfigs[ContainerProps::containerTypeToString(DockerContainer::OpenVpn)]); + return std::visit( + [](const auto &ptr) -> bool { + if constexpr (requires { ptr->clientProtocolConfig; }) { + const auto nativeConfig = ptr->clientProtocolConfig.nativeConfig; + + return (!nativeConfig.isEmpty() && !nativeConfig.contains("redirect-gateway")); + } else { + return false; + } + }, + protocolConfigVariant); } } return false; @@ -767,62 +680,62 @@ bool ServersModel::isServerFromApi(const int serverIndex) bool ServersModel::isApiKeyExpired(const int serverIndex) { - auto serverConfig = m_servers.at(serverIndex).toObject(); - auto apiConfig = serverConfig.value(configKey::apiConfig).toObject(); + // auto serverConfig = m_servers1.at(serverIndex); + // auto apiConfig = serverConfig.value(configKey::apiConfig).toObject(); - auto publicKeyInfo = apiConfig.value(configKey::publicKeyInfo).toObject(); - const QString expiresAt = publicKeyInfo.value(configKey::expiresAt).toString(); - if (expiresAt.isEmpty()) { - publicKeyInfo.insert(configKey::expiresAt, QDateTime::currentDateTimeUtc().addDays(1).toString(Qt::ISODate)); - apiConfig.insert(configKey::publicKeyInfo, publicKeyInfo); - serverConfig.insert(configKey::apiConfig, apiConfig); - editServer(serverConfig, serverIndex); + // auto publicKeyInfo = apiConfig.value(configKey::publicKeyInfo).toObject(); + // const QString expiresAt = publicKeyInfo.value(configKey::expiresAt).toString(); + // if (expiresAt.isEmpty()) { + // publicKeyInfo.insert(configKey::expiresAt, QDateTime::currentDateTimeUtc().addDays(1).toString(Qt::ISODate)); + // apiConfig.insert(configKey::publicKeyInfo, publicKeyInfo); + // serverConfig.insert(configKey::apiConfig, apiConfig); + // editServer(serverConfig, serverIndex); - return false; - } + // return false; + // } - auto expiresAtDateTime = QDateTime::fromString(expiresAt, Qt::ISODate).toUTC(); - if (expiresAtDateTime < QDateTime::currentDateTimeUtc()) { - return true; - } - return false; + // auto expiresAtDateTime = QDateTime::fromString(expiresAt, Qt::ISODate).toUTC(); + // if (expiresAtDateTime < QDateTime::currentDateTimeUtc()) { + // return true; + // } + // return false; } void ServersModel::removeApiConfig(const int serverIndex) { - auto serverConfig = getServerConfig(serverIndex); +// auto serverConfig = m_servers1.at(serverIndex); -#ifdef Q_OS_IOS - QString vpncName = QString("%1 (%2) %3") - .arg(serverConfig[config_key::description].toString()) - .arg(serverConfig[config_key::hostName].toString()) - .arg(serverConfig[config_key::vpnproto].toString()); +// #ifdef Q_OS_IOS +// QString vpncName = QString("%1 (%2) %3") +// .arg(serverConfig[config_key::description].toString()) +// .arg(serverConfig[config_key::hostName].toString()) +// .arg(serverConfig[config_key::vpnproto].toString()); - AmneziaVPN::removeVPNC(vpncName.toStdString()); -#endif +// AmneziaVPN::removeVPNC(vpncName.toStdString()); +// #endif - serverConfig.remove(config_key::dns1); - serverConfig.remove(config_key::dns2); - serverConfig.remove(config_key::containers); - serverConfig.remove(config_key::hostName); +// serverConfig.remove(config_key::dns1); +// serverConfig.remove(config_key::dns2); +// serverConfig.remove(config_key::containers); +// serverConfig.remove(config_key::hostName); - auto apiConfig = serverConfig.value(configKey::apiConfig).toObject(); - apiConfig.remove(configKey::publicKeyInfo); - serverConfig.insert(configKey::apiConfig, apiConfig); +// auto apiConfig = serverConfig.value(configKey::apiConfig).toObject(); +// apiConfig.remove(configKey::publicKeyInfo); +// serverConfig.insert(configKey::apiConfig, apiConfig); - serverConfig.insert(config_key::defaultContainer, ContainerProps::containerToString(DockerContainer::None)); +// serverConfig.insert(config_key::defaultContainer, ContainerProps::containerToString(DockerContainer::None)); - editServer(serverConfig, serverIndex); +// editServer(serverConfig, serverIndex); } const QString ServersModel::getDefaultServerImagePathCollapsed() { - const auto server = m_servers.at(m_defaultServerIndex).toObject(); - const auto apiConfig = server.value(configKey::apiConfig).toObject(); - const auto countryCode = apiConfig.value(configKey::serverCountryCode).toString(); + // const auto server = m_servers.at(m_defaultServerIndex).toObject(); + // const auto apiConfig = server.value(configKey::apiConfig).toObject(); + // const auto countryCode = apiConfig.value(configKey::serverCountryCode).toString(); - if (countryCode.isEmpty()) { - return ""; - } - return QString("qrc:/countriesFlags/images/flagKit/%1.svg").arg(countryCode.toUpper()); + // if (countryCode.isEmpty()) { + // return ""; + // } + // return QString("qrc:/countriesFlags/images/flagKit/%1.svg").arg(countryCode.toUpper()); } diff --git a/client/ui/models/servers_model.h b/client/ui/models/servers_model.h index f0649e7d..447b720e 100644 --- a/client/ui/models/servers_model.h +++ b/client/ui/models/servers_model.h @@ -86,16 +86,12 @@ public slots: const ServerCredentials getProcessedServerCredentials(); const ServerCredentials getServerCredentials(const int index); - void addServer(const QJsonObject &server); - void editServer(const QJsonObject &server, const int serverIndex); - void removeServer(); + void addServer(const QSharedPointer &serverConfig); + void editServer(const QSharedPointer &serverConfig, const int serverIndex); + void removeProcessedServer(); void removeServer(const int serverIndex); - QJsonObject getServerConfig(const int serverIndex); - - void reloadDefaultServerContainerConfig(); - void updateContainerConfig(const int containerIndex, const QJsonObject config); - void addContainerConfig(const int containerIndex, const QJsonObject config); + QSharedPointer getServerConfig(const int serverIndex); void clearCachedProfile(const DockerContainer container); @@ -136,8 +132,8 @@ signals: void defaultServerNameChanged(); void defaultServerDescriptionChanged(); - void containersUpdated(const QJsonArray &containers); - void defaultServerContainersUpdated(const QJsonArray &containers); + void containersUpdated(const QMap &containerConfigs); + void defaultServerContainersUpdated(const QMap &containerConfigs); void defaultServerDefaultContainerChanged(const int containerIndex); void updateApiCountryModel(); @@ -155,7 +151,6 @@ private: bool serverHasInstalledContainers(const int serverIndex) const; - QJsonArray m_servers; QVector> m_servers1; std::shared_ptr m_settings; diff --git a/client/ui/qml/Pages2/PageSettingsServerProtocol.qml b/client/ui/qml/Pages2/PageSettingsServerProtocol.qml index fce9b2a3..706ab091 100644 --- a/client/ui/qml/Pages2/PageSettingsServerProtocol.qml +++ b/client/ui/qml/Pages2/PageSettingsServerProtocol.qml @@ -101,10 +101,7 @@ PageType { clickedFunction: function() { if (isClientProtocolExists) { - switch (protocolIndex) { - case ProtocolEnum.WireGuard: WireGuardConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Awg: AwgConfigModel.updateModel(ProtocolsModel.getConfig()); break; - } + ProtocolsModel.updateProtocolModel(protocolIndex) PageController.goToPage(clientProtocolPage); } else { PageController.showNotificationMessage(qsTr("Click the \"connect\" button to create a connection configuration")) @@ -132,17 +129,7 @@ PageType { visible: delegateContent.isServerSettingsVisible clickedFunction: function() { - switch (protocolIndex) { - case ProtocolEnum.OpenVpn: OpenVpnConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.ShadowSocks: ShadowSocksConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Cloak: CloakConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.WireGuard: WireGuardConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Awg: AwgConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Xray: XrayConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Sftp: SftpConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Ipsec: Ikev2ConfigModel.updateModel(ProtocolsModel.getConfig()); break; - case ProtocolEnum.Socks5Proxy: Socks5ProxyConfigModel.updateModel(ProtocolsModel.getConfig()); break; - } + ProtocolsModel.updateProtocolModel(protocolIndex) PageController.goToPage(serverProtocolPage); } From f0626e2ecabf1115d264834beadc59de35a6559e Mon Sep 17 00:00:00 2001 From: aiamnezia Date: Wed, 2 Jul 2025 06:07:56 +0400 Subject: [PATCH 06/19] fix: delete premium V2 migration link from Free config Settings (#1671) * delete premium V2 update link from Free config Settings * Add debug logs * Add property for checking if server config is premium * remove debug logs --- client/ui/models/servers_model.cpp | 9 ++++++++- client/ui/models/servers_model.h | 5 ++++- client/ui/qml/Pages2/PageSettingsServerData.qml | 4 ++-- 3 files changed, 14 insertions(+), 4 deletions(-) diff --git a/client/ui/models/servers_model.cpp b/client/ui/models/servers_model.cpp index 5a70c16f..22813312 100644 --- a/client/ui/models/servers_model.cpp +++ b/client/ui/models/servers_model.cpp @@ -8,6 +8,8 @@ #include #endif +#include "core/api/apiUtils.h" + namespace { namespace configKey @@ -427,7 +429,7 @@ void ServersModel::updateDefaultServerContainersModel() emit defaultServerContainersUpdated(containers); } -QJsonObject ServersModel::getServerConfig(const int serverIndex) +QJsonObject ServersModel::getServerConfig(const int serverIndex) const { return m_servers.at(serverIndex).toObject(); } @@ -814,3 +816,8 @@ const QString ServersModel::getDefaultServerImagePathCollapsed() } return QString("qrc:/countriesFlags/images/flagKit/%1.svg").arg(countryCode.toUpper()); } + +bool ServersModel::processedServerIsPremium() const +{ + return apiUtils::isPremiumServer(getServerConfig(m_processedServerIndex)); +} diff --git a/client/ui/models/servers_model.h b/client/ui/models/servers_model.h index c4803708..c36b6534 100644 --- a/client/ui/models/servers_model.h +++ b/client/ui/models/servers_model.h @@ -63,6 +63,9 @@ public: Q_PROPERTY(bool isDefaultServerFromApi READ isDefaultServerFromApi NOTIFY defaultServerIndexChanged) Q_PROPERTY(int processedIndex READ getProcessedServerIndex WRITE setProcessedServerIndex NOTIFY processedServerIndexChanged) + Q_PROPERTY(bool processedServerIsPremium READ processedServerIsPremium NOTIFY processedServerChanged) + + bool processedServerIsPremium() const; public slots: void setDefaultServerIndex(const int index); @@ -92,7 +95,7 @@ public slots: void removeServer(); void removeServer(const int serverIndex); - QJsonObject getServerConfig(const int serverIndex); + QJsonObject getServerConfig(const int serverIndex) const; void reloadDefaultServerContainerConfig(); void updateContainerConfig(const int containerIndex, const QJsonObject config); diff --git a/client/ui/qml/Pages2/PageSettingsServerData.qml b/client/ui/qml/Pages2/PageSettingsServerData.qml index 995ca74b..82552958 100644 --- a/client/ui/qml/Pages2/PageSettingsServerData.qml +++ b/client/ui/qml/Pages2/PageSettingsServerData.qml @@ -260,7 +260,7 @@ PageType { LabelWithButtonType { id: labelWithButton6 - visible: ServersModel.getProcessedServerData("isServerFromTelegramApi") + visible: ServersModel.getProcessedServerData("isServerFromTelegramApi") && ServersModel.processedServerIsPremium Layout.fillWidth: true text: qsTr("Switch to the new Amnezia Premium subscription") @@ -273,7 +273,7 @@ PageType { } DividerType { - visible: ServersModel.getProcessedServerData("isServerFromTelegramApi") + visible: ServersModel.getProcessedServerData("isServerFromTelegramApi") && ServersModel.processedServerIsPremium } } } From b0a6bcc05536c9d615b835a790a90d6d42657d1a Mon Sep 17 00:00:00 2001 From: Mitternacht822 Date: Wed, 2 Jul 2025 06:11:22 +0400 Subject: [PATCH 07/19] =?UTF-8?q?fix:=20fixed=20issue=20when=20native=20co?= =?UTF-8?q?nnection=20format=20preserved=20after=20switching=20p=E2=80=A6?= =?UTF-8?q?=20(#1659)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fixed issue when native connection format preserved after switching protocol * moved newly added code into handler section --- client/ui/qml/Pages2/PageShare.qml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/client/ui/qml/Pages2/PageShare.qml b/client/ui/qml/Pages2/PageShare.qml index 48f74acf..0f0976bc 100644 --- a/client/ui/qml/Pages2/PageShare.qml +++ b/client/ui/qml/Pages2/PageShare.qml @@ -429,6 +429,11 @@ PageType { fillConnectionTypeModel() + if (exportTypeSelector.currentIndex >= root.connectionTypesModel.length) { + exportTypeSelector.currentIndex = 0 + exportTypeSelector.text = root.connectionTypesModel[0].name + } + if (accessTypeSelector.currentIndex === 1) { PageController.showBusyIndicator(true) ExportController.updateClientManagementModel(ContainersModel.getProcessedContainerIndex(), From 9dca80de18a9f2b3fd8339044eafc0b44fd91bd6 Mon Sep 17 00:00:00 2001 From: Mitternacht822 Date: Wed, 2 Jul 2025 06:11:52 +0400 Subject: [PATCH 08/19] fix: notification not showing when changed some protocols (#1666) * added notification about disconnecting users after applying changes for SS and Cloak servers pages * added notification about changing protocol data for server and some minor changes --- .../qml/Pages2/PageProtocolCloakSettings.qml | 51 +++++++++++++++---- .../Pages2/PageProtocolOpenVpnSettings.qml | 51 ++++++++++++++----- .../PageProtocolShadowSocksSettings.qml | 49 +++++++++++------- .../Pages2/PageProtocolWireGuardSettings.qml | 2 +- .../qml/Pages2/PageProtocolXraySettings.qml | 42 +++++++++++---- 5 files changed, 146 insertions(+), 49 deletions(-) diff --git a/client/ui/qml/Pages2/PageProtocolCloakSettings.qml b/client/ui/qml/Pages2/PageProtocolCloakSettings.qml index 7a0fafbd..8e5129b0 100644 --- a/client/ui/qml/Pages2/PageProtocolCloakSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolCloakSettings.qml @@ -59,10 +59,13 @@ PageType { model: CloakConfigModel delegate: Item { - implicitWidth: listview.width - implicitHeight: col.implicitHeight + id: delegateItem property alias trafficFromField: trafficFromField + property bool isEnabled: ServersModel.isProcessedServerHasWriteAccess() + + implicitWidth: listview.width + implicitHeight: col.implicitHeight ColumnLayout { id: col @@ -78,7 +81,6 @@ PageType { BaseHeaderType { Layout.fillWidth: true - headerText: qsTr("Cloak settings") } @@ -88,6 +90,8 @@ PageType { Layout.fillWidth: true Layout.topMargin: 32 + enabled: delegateItem.isEnabled + headerText: qsTr("Disguised as traffic from") textField.text: site @@ -104,6 +108,8 @@ PageType { } } } + + checkEmptyText: true } TextFieldWithHeaderType { @@ -112,6 +118,8 @@ PageType { Layout.fillWidth: true Layout.topMargin: 16 + enabled: delegateItem.isEnabled + headerText: qsTr("Port") textField.text: port textField.maximumLength: 5 @@ -122,6 +130,8 @@ PageType { port = textField.text } } + + checkEmptyText: true } DropDownType { @@ -129,6 +139,8 @@ PageType { Layout.fillWidth: true Layout.topMargin: 16 + enabled: delegateItem.isEnabled + descriptionText: qsTr("Cipher") headerText: qsTr("Cipher") @@ -166,25 +178,46 @@ PageType { } BasicButtonType { - id: saveRestartButton + id: saveButton Layout.fillWidth: true Layout.topMargin: 24 Layout.bottomMargin: 24 + enabled: trafficFromField.errorText === "" && + portTextField.errorText === "" + text: qsTr("Save") clickedFunc: function() { forceActiveFocus() - if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { - PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) - return + var headerText = qsTr("Save settings?") + var descriptionText = qsTr("All users with whom you shared a connection with will no longer be able to connect to it.") + var yesButtonText = qsTr("Continue") + var noButtonText = qsTr("Cancel") + + var yesButtonFunction = function() { + if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { + PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) + return + } + + PageController.goToPage(PageEnum.PageSetupWizardInstalling) + InstallController.updateContainer(CloakConfigModel.getConfig()) } - PageController.goToPage(PageEnum.PageSetupWizardInstalling); - InstallController.updateContainer(CloakConfigModel.getConfig()) + var noButtonFunction = function() { + if (!GC.isMobile()) { + saveButton.forceActiveFocus() + } + } + + showQuestionDrawer(headerText, descriptionText, yesButtonText, noButtonText, yesButtonFunction, noButtonFunction) } + + Keys.onEnterPressed: saveButton.clicked() + Keys.onReturnPressed: saveButton.clicked() } } } diff --git a/client/ui/qml/Pages2/PageProtocolOpenVpnSettings.qml b/client/ui/qml/Pages2/PageProtocolOpenVpnSettings.qml index 2e00d54a..62cbd1f6 100644 --- a/client/ui/qml/Pages2/PageProtocolOpenVpnSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolOpenVpnSettings.qml @@ -58,10 +58,13 @@ PageType { model: OpenVpnConfigModel delegate: Item { - implicitWidth: listview.width - implicitHeight: col.implicitHeight + id: delegateItem property alias vpnAddressSubnetTextField: vpnAddressSubnetTextField + property bool isEnabled: ServersModel.isProcessedServerHasWriteAccess() + + implicitWidth: listview.width + implicitHeight: col.implicitHeight ColumnLayout { id: col @@ -77,7 +80,6 @@ PageType { BaseHeaderType { Layout.fillWidth: true - headerText: qsTr("OpenVPN settings") } @@ -87,6 +89,8 @@ PageType { Layout.fillWidth: true Layout.topMargin: 32 + enabled: delegateItem.isEnabled + headerText: qsTr("VPN address subnet") textField.text: subnetAddress @@ -97,6 +101,8 @@ PageType { subnetAddress = textField.text } } + + checkEmptyText: true } ParagraphTextType { @@ -134,7 +140,7 @@ PageType { Layout.topMargin: 40 parentFlickable: fl - enabled: isPortEditable + enabled: delegateItem.isEnabled headerText: qsTr("Port") textField.text: port @@ -146,6 +152,8 @@ PageType { port = textField.text } } + + checkEmptyText: true } SwitcherType { @@ -388,26 +396,45 @@ PageType { } BasicButtonType { - id: saveRestartButton + id: saveButton Layout.fillWidth: true Layout.topMargin: 24 Layout.bottomMargin: 24 + enabled: vpnAddressSubnetTextField.errorText === "" && + portTextField.errorText === "" + text: qsTr("Save") parentFlickable: fl - clickedFunc: function() { + onClicked: function() { forceActiveFocus() - if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { - PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) - return - } + var headerText = qsTr("Save settings?") + var descriptionText = qsTr("All users with whom you shared a connection with will no longer be able to connect to it.") + var yesButtonText = qsTr("Continue") + var noButtonText = qsTr("Cancel") - PageController.goToPage(PageEnum.PageSetupWizardInstalling); - InstallController.updateContainer(OpenVpnConfigModel.getConfig()) + var yesButtonFunction = function() { + if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { + PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) + return + } + + PageController.goToPage(PageEnum.PageSetupWizardInstalling); + InstallController.updateContainer(OpenVpnConfigModel.getConfig()) + } + var noButtonFunction = function() { + if (!GC.isMobile()) { + saveButton.forceActiveFocus() + } + } + showQuestionDrawer(headerText, descriptionText, yesButtonText, noButtonText, yesButtonFunction, noButtonFunction) } + + Keys.onEnterPressed: saveButton.clicked() + Keys.onReturnPressed: saveButton.clicked() } } } diff --git a/client/ui/qml/Pages2/PageProtocolShadowSocksSettings.qml b/client/ui/qml/Pages2/PageProtocolShadowSocksSettings.qml index 63e60dcb..92df3ec7 100644 --- a/client/ui/qml/Pages2/PageProtocolShadowSocksSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolShadowSocksSettings.qml @@ -57,15 +57,13 @@ PageType { model: ShadowSocksConfigModel delegate: Item { + id: delegateItem + + property bool isEnabled: ServersModel.isProcessedServerHasWriteAccess() + implicitWidth: listview.width implicitHeight: col.implicitHeight - property var focusItemId: portTextField.enabled ? - portTextField : - cipherDropDown.enabled ? - cipherDropDown : - saveRestartButton - ColumnLayout { id: col @@ -80,7 +78,6 @@ PageType { BaseHeaderType { Layout.fillWidth: true - headerText: qsTr("Shadowsocks settings") } @@ -90,7 +87,7 @@ PageType { Layout.fillWidth: true Layout.topMargin: 40 - enabled: isPortEditable + enabled: delegateItem.isEnabled headerText: qsTr("Port") textField.text: port @@ -102,6 +99,8 @@ PageType { port = textField.text } } + + checkEmptyText: true } DropDownType { @@ -109,7 +108,7 @@ PageType { Layout.fillWidth: true Layout.topMargin: 20 - enabled: isCipherEditable + enabled: delegateItem.isEnabled descriptionText: qsTr("Cipher") headerText: qsTr("Cipher") @@ -149,27 +148,43 @@ PageType { } BasicButtonType { - id: saveRestartButton + id: saveButton Layout.fillWidth: true Layout.topMargin: 24 Layout.bottomMargin: 24 - enabled: isPortEditable | isCipherEditable + enabled: portTextField.errorText === "" text: qsTr("Save") clickedFunc: function() { forceActiveFocus() - if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { - PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) - return - } + var headerText = qsTr("Save settings?") + var descriptionText = qsTr("All users with whom you shared a connection with will no longer be able to connect to it.") + var yesButtonText = qsTr("Continue") + var noButtonText = qsTr("Cancel") - PageController.goToPage(PageEnum.PageSetupWizardInstalling); - InstallController.updateContainer(ShadowSocksConfigModel.getConfig()) + var yesButtonFunction = function() { + if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { + PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) + return + } + + PageController.goToPage(PageEnum.PageSetupWizardInstalling); + InstallController.updateContainer(ShadowSocksConfigModel.getConfig()) + } + var noButtonFunction = function() { + if (!GC.isMobile()) { + saveButton.forceActiveFocus() + } + } + showQuestionDrawer(headerText, descriptionText, yesButtonText, noButtonText, yesButtonFunction, noButtonFunction) } + + Keys.onEnterPressed: saveButton.clicked() + Keys.onReturnPressed: saveButton.clicked() } } } diff --git a/client/ui/qml/Pages2/PageProtocolWireGuardSettings.qml b/client/ui/qml/Pages2/PageProtocolWireGuardSettings.qml index 7b5180f3..21b35bc1 100644 --- a/client/ui/qml/Pages2/PageProtocolWireGuardSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolWireGuardSettings.qml @@ -152,7 +152,7 @@ PageType { } var noButtonFunction = function() { if (!GC.isMobile()) { - saveRestartButton.forceActiveFocus() + saveButton.forceActiveFocus() } } showQuestionDrawer(headerText, descriptionText, yesButtonText, noButtonText, yesButtonFunction, noButtonFunction) diff --git a/client/ui/qml/Pages2/PageProtocolXraySettings.qml b/client/ui/qml/Pages2/PageProtocolXraySettings.qml index d22e31a2..0bcd14de 100644 --- a/client/ui/qml/Pages2/PageProtocolXraySettings.qml +++ b/client/ui/qml/Pages2/PageProtocolXraySettings.qml @@ -58,7 +58,10 @@ PageType { model: XrayConfigModel delegate: Item { + id: delegateItem + property alias focusItemId: textFieldWithHeaderType.textField + property bool isEnabled: ServersModel.isProcessedServerHasWriteAccess() implicitWidth: listview.width implicitHeight: col.implicitHeight @@ -85,6 +88,8 @@ PageType { Layout.fillWidth: true Layout.topMargin: 32 + enabled: delegateItem.isEnabled + headerText: qsTr("Disguised as traffic from") textField.text: site @@ -101,6 +106,8 @@ PageType { } } } + + checkEmptyText: true } TextFieldWithHeaderType { @@ -130,23 +137,38 @@ PageType { Layout.topMargin: 24 Layout.bottomMargin: 24 + enabled: portTextField.errorText === "" + text: qsTr("Save") - onClicked: { + onClicked: function() { forceActiveFocus() - if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { - PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) - return - } + var headerText = qsTr("Save settings?") + var descriptionText = qsTr("All users with whom you shared a connection with will no longer be able to connect to it.") + var yesButtonText = qsTr("Continue") + var noButtonText = qsTr("Cancel") - PageController.goToPage(PageEnum.PageSetupWizardInstalling); - InstallController.updateContainer(XrayConfigModel.getConfig()) - focusItem.forceActiveFocus() + var yesButtonFunction = function() { + if (ConnectionController.isConnected && ServersModel.getDefaultServerData("defaultContainer") === ContainersModel.getProcessedContainerIndex()) { + PageController.showNotificationMessage(qsTr("Unable change settings while there is an active connection")) + return + } + + PageController.goToPage(PageEnum.PageSetupWizardInstalling); + InstallController.updateContainer(XrayConfigModel.getConfig()) + //focusItem.forceActiveFocus() + } + var noButtonFunction = function() { + if (!GC.isMobile()) { + saveButton.forceActiveFocus() + } + } + showQuestionDrawer(headerText, descriptionText, yesButtonText, noButtonText, yesButtonFunction, noButtonFunction) } - Keys.onEnterPressed: basicButton.clicked() - Keys.onReturnPressed: basicButton.clicked() + Keys.onEnterPressed: saveButton.clicked() + Keys.onReturnPressed: saveButton.clicked() } } } From 127f8ed3bbccf31383504eb2a71396015b3d67fb Mon Sep 17 00:00:00 2001 From: Nethius Date: Wed, 2 Jul 2025 10:14:56 +0800 Subject: [PATCH 09/19] fix: fixed desktop entry version for linux (#1665) --- deploy/installer/config/AmneziaVPN.desktop.in | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/deploy/installer/config/AmneziaVPN.desktop.in b/deploy/installer/config/AmneziaVPN.desktop.in index 2a53074e..03ab570c 100755 --- a/deploy/installer/config/AmneziaVPN.desktop.in +++ b/deploy/installer/config/AmneziaVPN.desktop.in @@ -2,7 +2,7 @@ [Desktop Entry] Type=Application Name=AmneziaVPN -Version=@CMAKE_PROJECT_VERSION@ +Version=1.0 Comment=Client of your self-hosted VPN Exec=AmneziaVPN Icon=/usr/share/pixmaps/AmneziaVPN.png From b34193486300bc951219c655fd2734f6860feb9f Mon Sep 17 00:00:00 2001 From: Mykola Baibuz Date: Tue, 1 Jul 2025 19:16:58 -0700 Subject: [PATCH 10/19] fix: allow secondary DNS usage when AmneziaDNS is disabled (#1583) * Allow secondary DNS usage when AmneziaDNS is disabled * Don't setup secondary DNS for OpenVPN with AmneziaDNS --------- Co-authored-by: vladimir.kuznetsov --- client/configurators/openvpn_configurator.cpp | 12 +++++++++ client/daemon/daemon.cpp | 26 +++++++++++++----- client/daemon/interfaceconfig.cpp | 13 ++++++--- client/daemon/interfaceconfig.h | 3 ++- client/mozilla/localsocketcontroller.cpp | 9 ++++++- .../linux/daemon/wireguardutilslinux.cpp | 5 +++- .../macos/daemon/wireguardutilsmacos.cpp | 27 ++++++++++--------- .../windows/daemon/windowsfirewall.cpp | 23 +++++++++++++--- client/protocols/xrayprotocol.cpp | 7 ++++- service/server/killswitch.cpp | 23 +++++++++++++--- 10 files changed, 116 insertions(+), 32 deletions(-) diff --git a/client/configurators/openvpn_configurator.cpp b/client/configurators/openvpn_configurator.cpp index 6d6603da..f6996320 100644 --- a/client/configurators/openvpn_configurator.cpp +++ b/client/configurators/openvpn_configurator.cpp @@ -118,6 +118,12 @@ QString OpenVpnConfigurator::processConfigWithLocalSettings(const QPairisSitesSplitTunnelingEnabled()) { config.append("\nredirect-gateway def1 ipv6 bypass-dhcp\n"); config.append("block-ipv6\n"); @@ -161,6 +167,12 @@ QString OpenVpnConfigurator::processConfigWithExportSettings(const QPair resolvers; - resolvers.append(QHostAddress(config.m_dnsServer)); + resolvers.append(QHostAddress(config.m_primaryDnsServer)); + if (!config.m_secondaryDnsServer.isEmpty()) { + resolvers.append(QHostAddress(config.m_secondaryDnsServer)); + } // If the DNS is not the Gateway, it's a user defined DNS // thus, not add any other :) - if (config.m_dnsServer == config.m_serverIpv4Gateway) { + if (config.m_primaryDnsServer == config.m_serverIpv4Gateway) { resolvers.append(QHostAddress(config.m_serverIpv6Gateway)); } @@ -279,15 +282,26 @@ bool Daemon::parseConfig(const QJsonObject& obj, InterfaceConfig& config) { config.m_serverIpv4Gateway = obj.value("serverIpv4Gateway").toString(); config.m_serverIpv6Gateway = obj.value("serverIpv6Gateway").toString(); - if (!obj.contains("dnsServer")) { - config.m_dnsServer = QString(); + if (!obj.contains("primaryDnsServer")) { + config.m_primaryDnsServer = QString(); } else { - QJsonValue value = obj.value("dnsServer"); + QJsonValue value = obj.value("primaryDnsServer"); if (!value.isString()) { logger.error() << "dnsServer is not a string"; return false; } - config.m_dnsServer = value.toString(); + config.m_primaryDnsServer = value.toString(); + } + + if (!obj.contains("secondaryDnsServer")) { + config.m_secondaryDnsServer = QString(); + } else { + QJsonValue value = obj.value("secondaryDnsServer"); + if (!value.isString()) { + logger.error() << "dnsServer is not a string"; + return false; + } + config.m_secondaryDnsServer = value.toString(); } if (!obj.contains("hopType")) { diff --git a/client/daemon/interfaceconfig.cpp b/client/daemon/interfaceconfig.cpp index f0adcc92..846cfebe 100644 --- a/client/daemon/interfaceconfig.cpp +++ b/client/daemon/interfaceconfig.cpp @@ -28,7 +28,8 @@ QJsonObject InterfaceConfig::toJson() const { (m_hopType == InterfaceConfig::SingleHop)) { json.insert("serverIpv4Gateway", QJsonValue(m_serverIpv4Gateway)); json.insert("serverIpv6Gateway", QJsonValue(m_serverIpv6Gateway)); - json.insert("dnsServer", QJsonValue(m_dnsServer)); + json.insert("primaryDnsServer", QJsonValue(m_primaryDnsServer)); + json.insert("secondaryDnsServer", QJsonValue(m_secondaryDnsServer)); } QJsonArray allowedIPAddesses; @@ -100,11 +101,15 @@ QString InterfaceConfig::toWgConf(const QMap& extra) const { out << "MTU = " << m_deviceMTU << "\n"; } - if (!m_dnsServer.isNull()) { - QStringList dnsServers(m_dnsServer); + if (!m_primaryDnsServer.isNull()) { + QStringList dnsServers; + dnsServers.append(m_primaryDnsServer); + if (!m_secondaryDnsServer.isNull()) { + dnsServers.append(m_secondaryDnsServer); + } // If the DNS is not the Gateway, it's a user defined DNS // thus, not add any other :) - if (m_dnsServer == m_serverIpv4Gateway) { + if (m_primaryDnsServer == m_serverIpv4Gateway) { dnsServers.append(m_serverIpv6Gateway); } out << "DNS = " << dnsServers.join(", ") << "\n"; diff --git a/client/daemon/interfaceconfig.h b/client/daemon/interfaceconfig.h index ee43a253..6ae400c2 100644 --- a/client/daemon/interfaceconfig.h +++ b/client/daemon/interfaceconfig.h @@ -32,7 +32,8 @@ class InterfaceConfig { QString m_serverIpv4AddrIn; QString m_serverPskKey; QString m_serverIpv6AddrIn; - QString m_dnsServer; + QString m_primaryDnsServer; + QString m_secondaryDnsServer; int m_serverPort = 0; int m_deviceMTU = 1420; QList m_allowedIPAddressRanges; diff --git a/client/mozilla/localsocketcontroller.cpp b/client/mozilla/localsocketcontroller.cpp index afa29c47..67924d47 100644 --- a/client/mozilla/localsocketcontroller.cpp +++ b/client/mozilla/localsocketcontroller.cpp @@ -149,7 +149,14 @@ void LocalSocketController::activate(const QJsonObject &rawConfig) { json.insert("serverPort", wgConfig.value(amnezia::config_key::port).toInt()); json.insert("serverIpv4Gateway", wgConfig.value(amnezia::config_key::hostName)); // json.insert("serverIpv6Gateway", QJsonValue(hop.m_server.ipv6Gateway())); - json.insert("dnsServer", rawConfig.value(amnezia::config_key::dns1)); + + json.insert("primaryDnsServer", rawConfig.value(amnezia::config_key::dns1)); + + // We don't use secondary DNS if primary DNS is AmneziaDNS + if (!rawConfig.value(amnezia::config_key::dns1).toString(). + contains(amnezia::protocols::dns::amneziaDnsIp)) { + json.insert("secondaryDnsServer", rawConfig.value(amnezia::config_key::dns2)); + } QJsonArray jsAllowedIPAddesses; diff --git a/client/platforms/linux/daemon/wireguardutilslinux.cpp b/client/platforms/linux/daemon/wireguardutilslinux.cpp index 0fbb65a8..a12b8582 100644 --- a/client/platforms/linux/daemon/wireguardutilslinux.cpp +++ b/client/platforms/linux/daemon/wireguardutilslinux.cpp @@ -140,7 +140,10 @@ bool WireguardUtilsLinux::addInterface(const InterfaceConfig& config) { } else { if (config.m_killSwitchEnabled) { FirewallParams params { }; - params.dnsServers.append(config.m_dnsServer); + params.dnsServers.append(config.m_primaryDnsServer); + if (!config.m_secondaryDnsServer.isEmpty()) { + params.dnsServers.append(config.m_secondaryDnsServer); + } if (config.m_allowedIPAddressRanges.contains(IPAddress("0.0.0.0/0"))) { params.blockAll = true; if (config.m_excludedAddresses.size()) { diff --git a/client/platforms/macos/daemon/wireguardutilsmacos.cpp b/client/platforms/macos/daemon/wireguardutilsmacos.cpp index 1d8aa6e0..37170f20 100644 --- a/client/platforms/macos/daemon/wireguardutilsmacos.cpp +++ b/client/platforms/macos/daemon/wireguardutilsmacos.cpp @@ -136,26 +136,29 @@ bool WireguardUtilsMacos::addInterface(const InterfaceConfig& config) { if (err != 0) { logger.error() << "Interface configuration failed:" << strerror(err); } else { - if (config.m_killSwitchEnabled) { - FirewallParams params { }; - params.dnsServers.append(config.m_dnsServer); + if (config.m_killSwitchEnabled) { + FirewallParams params { }; + params.dnsServers.append(config.m_primaryDnsServer); + if (!config.m_secondaryDnsServer.isEmpty()) { + params.dnsServers.append(config.m_secondaryDnsServer); + } - if (config.m_allowedIPAddressRanges.contains(IPAddress("0.0.0.0/0"))) { + if (config.m_allowedIPAddressRanges.contains(IPAddress("0.0.0.0/0"))) { params.blockAll = true; if (config.m_excludedAddresses.size()) { - params.allowNets = true; - foreach (auto net, config.m_excludedAddresses) { - params.allowAddrs.append(net.toUtf8()); - } + params.allowNets = true; + foreach (auto net, config.m_excludedAddresses) { + params.allowAddrs.append(net.toUtf8()); + } } - } else { + } else { params.blockNets = true; foreach (auto net, config.m_allowedIPAddressRanges) { - params.blockAddrs.append(net.toString()); + params.blockAddrs.append(net.toString()); } - } - applyFirewallRules(params); } + applyFirewallRules(params); + } } return (err == 0); } diff --git a/client/platforms/windows/daemon/windowsfirewall.cpp b/client/platforms/windows/daemon/windowsfirewall.cpp index 1834452e..2556c417 100644 --- a/client/platforms/windows/daemon/windowsfirewall.cpp +++ b/client/platforms/windows/daemon/windowsfirewall.cpp @@ -291,15 +291,32 @@ bool WindowsFirewall::enablePeerTraffic(const InterfaceConfig& config) { "Block Internet", config.m_serverPublicKey)) { return false; } - if (!config.m_dnsServer.isEmpty()) { - if (!allowTrafficTo(QHostAddress(config.m_dnsServer), 53, HIGH_WEIGHT, + if (!config.m_primaryDnsServer.isEmpty()) { + if (!allowTrafficTo(QHostAddress(config.m_primaryDnsServer), 53, HIGH_WEIGHT, "Allow DNS-Server", config.m_serverPublicKey)) { return false; } // In some cases, we might configure a 2nd DNS server for IPv6, however // this should probably be cleaned up by converting m_dnsServer into // a QStringList instead. - if (config.m_dnsServer == config.m_serverIpv4Gateway) { + if (config.m_primaryDnsServer == config.m_serverIpv4Gateway) { + if (!allowTrafficTo(QHostAddress(config.m_serverIpv6Gateway), 53, + HIGH_WEIGHT, "Allow extra IPv6 DNS-Server", + config.m_serverPublicKey)) { + return false; + } + } + } + + if (!config.m_secondaryDnsServer.isEmpty()) { + if (!allowTrafficTo(QHostAddress(config.m_secondaryDnsServer), 53, HIGH_WEIGHT, + "Allow DNS-Server", config.m_serverPublicKey)) { + return false; + } + // In some cases, we might configure a 2nd DNS server for IPv6, however + // this should probably be cleaned up by converting m_dnsServer into + // a QStringList instead. + if (config.m_secondaryDnsServer == config.m_serverIpv4Gateway) { if (!allowTrafficTo(QHostAddress(config.m_serverIpv6Gateway), 53, HIGH_WEIGHT, "Allow extra IPv6 DNS-Server", config.m_serverPublicKey)) { diff --git a/client/protocols/xrayprotocol.cpp b/client/protocols/xrayprotocol.cpp index 9f26d1e6..84922634 100755 --- a/client/protocols/xrayprotocol.cpp +++ b/client/protocols/xrayprotocol.cpp @@ -98,8 +98,13 @@ ErrorCode XrayProtocol::startTun2Sock() if (vpnState == Vpn::ConnectionState::Connected) { setConnectionState(Vpn::ConnectionState::Connecting); QList dnsAddr; + dnsAddr.push_back(QHostAddress(m_configData.value(config_key::dns1).toString())); - dnsAddr.push_back(QHostAddress(m_configData.value(config_key::dns2).toString())); + // We don't use secondary DNS if primary DNS is AmneziaDNS + if (!m_configData.value(amnezia::config_key::dns1).toString(). + contains(amnezia::protocols::dns::amneziaDnsIp)) { + dnsAddr.push_back(QHostAddress(m_configData.value(config_key::dns2).toString())); + } #ifdef Q_OS_WIN QThread::msleep(8000); #endif diff --git a/service/server/killswitch.cpp b/service/server/killswitch.cpp index 447be865..d0cba03a 100644 --- a/service/server/killswitch.cpp +++ b/service/server/killswitch.cpp @@ -192,7 +192,14 @@ bool KillSwitch::addAllowedRange(const QStringList &ranges) { bool KillSwitch::enablePeerTraffic(const QJsonObject &configStr) { #ifdef Q_OS_WIN InterfaceConfig config; - config.m_dnsServer = configStr.value(amnezia::config_key::dns1).toString(); + + config.m_primaryDnsServer = configStr.value(amnezia::config_key::dns1).toString(); + + // We don't use secondary DNS if primary DNS is AmneziaDNS + if (!config.m_primaryDnsServer.contains(amnezia::protocols::dns::amneziaDnsIp)) { + config.m_secondaryDnsServer = configStr.value(amnezia::config_key::dns2).toString(); + } + config.m_serverPublicKey = "openvpn"; config.m_serverIpv4Gateway = configStr.value("vpnGateway").toString(); config.m_serverIpv4AddrIn = configStr.value("vpnServer").toString(); @@ -307,8 +314,14 @@ bool KillSwitch::enableKillSwitch(const QJsonObject &configStr, int vpnAdapterIn LinuxFirewall::setAnchorEnabled(LinuxFirewall::Both, QStringLiteral("300.allowLAN"), true); LinuxFirewall::setAnchorEnabled(LinuxFirewall::IPv4, QStringLiteral("310.blockDNS"), true); QStringList dnsServers; + dnsServers.append(configStr.value(amnezia::config_key::dns1).toString()); - dnsServers.append(configStr.value(amnezia::config_key::dns2).toString()); + + // We don't use secondary DNS if primary DNS is AmneziaDNS + if (!configStr.value(amnezia::config_key::dns1).toString().contains(amnezia::protocols::dns::amneziaDnsIp)) { + dnsServers.append(configStr.value(amnezia::config_key::dns2).toString()); + } + dnsServers.append("127.0.0.1"); dnsServers.append("127.0.0.53"); @@ -345,7 +358,11 @@ bool KillSwitch::enableKillSwitch(const QJsonObject &configStr, int vpnAdapterIn QStringList dnsServers; dnsServers.append(configStr.value(amnezia::config_key::dns1).toString()); - dnsServers.append(configStr.value(amnezia::config_key::dns2).toString()); + + // We don't use secondary DNS if primary DNS is AmneziaDNS + if (!configStr.value(amnezia::config_key::dns1).toString().contains(amnezia::protocols::dns::amneziaDnsIp)) { + dnsServers.append(configStr.value(amnezia::config_key::dns2).toString()); + } for (auto dns : configStr.value(amnezia::config_key::allowedDnsServers).toArray()) { if (!dns.isString()) { From 4d17e913b52a02d80381b61d94a4a767e9bc00cf Mon Sep 17 00:00:00 2001 From: Yaroslav Date: Thu, 3 Jul 2025 04:51:11 +0300 Subject: [PATCH 11/19] feat: native macos installer distribution (#1633) * Add uninstall option and output pkg Improve installer mode detection Fix macOS installer packaging Fix default selection for uninstall choice Remove obsolete tar handling and clean script copies * Improve macOS build script * fix: update macos firewall and package scripts for better compatibility and cleanup * Add DeveloperID certificate and improve macOS signing script Use keychain option for codesign and restore login keychain to list after signing * Update build_macos.sh * feat: add script to quit GUI application during uninstall on macos * fix: handle macos post-install when app is unpacked into localized folder * fix: improve post_install script to handle missing service plist and provide error logging --- .github/workflows/deploy.yml | 18 +- .../platforms/macos/daemon/macosfirewall.cpp | 14 +- deploy/DeveloperIDG2CA.cer | Bin 0 -> 1090 bytes deploy/build_macos.sh | 258 +++++++++++------- deploy/data/macos/check_install.sh | 5 + deploy/data/macos/check_uninstall.sh | 5 + deploy/data/macos/distribution.xml | 17 ++ deploy/data/macos/distribution_uninstall.xml | 13 + deploy/data/macos/post_install.sh | 41 ++- deploy/data/macos/post_uninstall.sh | 50 ++++ deploy/data/macos/uninstall_conclusion.html | 7 + deploy/data/macos/uninstall_welcome.html | 7 + deploy/installer/config.cmake | 5 - deploy/installer/config/macos.xml.in | 27 -- 14 files changed, 311 insertions(+), 156 deletions(-) create mode 100644 deploy/DeveloperIDG2CA.cer mode change 100755 => 100644 deploy/build_macos.sh create mode 100755 deploy/data/macos/check_install.sh create mode 100755 deploy/data/macos/check_uninstall.sh create mode 100644 deploy/data/macos/distribution.xml create mode 100644 deploy/data/macos/distribution_uninstall.xml create mode 100644 deploy/data/macos/uninstall_conclusion.html create mode 100644 deploy/data/macos/uninstall_welcome.html delete mode 100644 deploy/installer/config/macos.xml.in diff --git a/.github/workflows/deploy.yml b/.github/workflows/deploy.yml index 86779f33..0c9dfb32 100644 --- a/.github/workflows/deploy.yml +++ b/.github/workflows/deploy.yml @@ -255,7 +255,6 @@ jobs: env: # Keep compat with MacOS 10.15 aka Catalina by Qt 6.4 QT_VERSION: 6.4.3 - QIF_VERSION: 4.6 PROD_AGW_PUBLIC_KEY: ${{ secrets.PROD_AGW_PUBLIC_KEY }} PROD_S3_ENDPOINT: ${{ secrets.PROD_S3_ENDPOINT }} DEV_AGW_PUBLIC_KEY: ${{ secrets.DEV_AGW_PUBLIC_KEY }} @@ -283,11 +282,6 @@ jobs: set-env: 'true' extra: '--external 7z --base ${{ env.QT_MIRROR }}' - - name: 'Install Qt Installer Framework ${{ env.QIF_VERSION }}' - run: | - mkdir -pv ${{ runner.temp }}/Qt/Tools/QtInstallerFramework - wget https://qt.amzsvc.com/tools/ifw/${{ env.QIF_VERSION }}.zip - unzip ${{ env.QIF_VERSION }}.zip -d ${{ runner.temp }}/Qt/Tools/QtInstallerFramework/ - name: 'Get sources' uses: actions/checkout@v4 @@ -301,14 +295,13 @@ jobs: - name: 'Build project' run: | export QT_BIN_DIR="${{ runner.temp }}/Qt/${{ env.QT_VERSION }}/macos/bin" - export QIF_BIN_DIR="${{ runner.temp }}/Qt/Tools/QtInstallerFramework/${{ env.QIF_VERSION }}/bin" bash deploy/build_macos.sh - name: 'Upload installer artifact' uses: actions/upload-artifact@v4 with: name: AmneziaVPN_MacOS_old_installer - path: AmneziaVPN.dmg + path: deploy/build/pkg/AmneziaVPN.pkg retention-days: 7 - name: 'Upload unpacked artifact' @@ -325,7 +318,6 @@ jobs: env: QT_VERSION: 6.8.0 - QIF_VERSION: 4.8.1 PROD_AGW_PUBLIC_KEY: ${{ secrets.PROD_AGW_PUBLIC_KEY }} PROD_S3_ENDPOINT: ${{ secrets.PROD_S3_ENDPOINT }} DEV_AGW_PUBLIC_KEY: ${{ secrets.DEV_AGW_PUBLIC_KEY }} @@ -353,11 +345,6 @@ jobs: set-env: 'true' extra: '--external 7z --base ${{ env.QT_MIRROR }}' - - name: 'Install Qt Installer Framework ${{ env.QIF_VERSION }}' - run: | - mkdir -pv ${{ runner.temp }}/Qt/Tools/QtInstallerFramework - wget https://qt.amzsvc.com/tools/ifw/${{ env.QIF_VERSION }}.zip - unzip ${{ env.QIF_VERSION }}.zip -d ${{ runner.temp }}/Qt/Tools/QtInstallerFramework/ - name: 'Get sources' uses: actions/checkout@v4 @@ -371,14 +358,13 @@ jobs: - name: 'Build project' run: | export QT_BIN_DIR="${{ runner.temp }}/Qt/${{ env.QT_VERSION }}/macos/bin" - export QIF_BIN_DIR="${{ runner.temp }}/Qt/Tools/QtInstallerFramework/${{ env.QIF_VERSION }}/bin" bash deploy/build_macos.sh - name: 'Upload installer artifact' uses: actions/upload-artifact@v4 with: name: AmneziaVPN_MacOS_installer - path: AmneziaVPN.dmg + path: deploy/build/pkg/AmneziaVPN.pkg retention-days: 7 - name: 'Upload unpacked artifact' diff --git a/client/platforms/macos/daemon/macosfirewall.cpp b/client/platforms/macos/daemon/macosfirewall.cpp index 0fe51f23..5211c440 100644 --- a/client/platforms/macos/daemon/macosfirewall.cpp +++ b/client/platforms/macos/daemon/macosfirewall.cpp @@ -43,8 +43,16 @@ namespace { #include "macosfirewall.h" -#define ResourceDir qApp->applicationDirPath() + "/pf" -#define DaemonDataDir qApp->applicationDirPath() + "/pf" +#include +#include + +// Read-only rules bundled with the application. +#define ResourceDir (qApp->applicationDirPath() + "/pf") + +// Writable location that does NOT live inside the signed bundle. Using a +// constant path under /Library/Application Support keeps the signature intact +// and is accessible to the root helper. +#define DaemonDataDir QStringLiteral("/Library/Application Support/AmneziaVPN/pf") #include @@ -121,6 +129,8 @@ void MacOSFirewall::install() logger.info() << "Installing PF root anchor"; installRootAnchors(); + // Ensure writable directory exists, then store the token there. + QDir().mkpath(DaemonDataDir); execute(QStringLiteral("pfctl -E 2>&1 | grep -F 'Token : ' | cut -c9- > '%1/pf.token'").arg(DaemonDataDir)); } diff --git a/deploy/DeveloperIDG2CA.cer b/deploy/DeveloperIDG2CA.cer new file mode 100644 index 0000000000000000000000000000000000000000..8cbcf6f46ce8dcd0fb6e55441867a4608c032860 GIT binary patch literal 1090 zcmXqLVzD!5Vpdzg%*4pVBvQYH!T#)Y&#KeSzLS=8RTLj;iFG#MW#iOp^Jx3d%gD&h z%3zRW$Zf#M#vIDRCd?EXY$$9X2;y)Fb2%0iSS&nCU+yalX;MxjO;0c zCPpP>Z!@woFgG#sGXTZ8n3@lXWlhc{<6@_ zAeVa$Zs~tCyBS(Lx(wQVee%4v9DmC6_sxzm_*Wacv6#I#)Z>*hPs%}3Q09g3DcH!m}M zzME}-$);}wYkbz|o;?}o+I{{v$FroX4pX<9$DEPod-(p&(x<&A1GYQN=TcU6b?Bdx zUj1OoE6d9jOHD2wI{m=7UT>Su;iqa>RnM*J)hhopPh{Hk2Vdj$KD}68xZHa2OrI*H z#lG(g1g~CeYi#?H7fwq1S7-2zs_8d`#)~n?ko^>O~S}P zBuwq0phvQHX3=yH`M&5=acZK!OOzXoLyRRCDz!!3*x{YIYWcZo(++VRH_f_`f37RD zIVso6^6S55-|LI6bjZK$IKcnor?K1?f$fK41kGK{SvD+jncI`WTU{$#cV_G457+W- zMXMT?mRx?=Uwf(Jh2ioUN9FH7YKmOf(3s#R_GaGBE{9dpS`QQ3xOxisZ+hvx@ma(w zc&)N$X|k%KGE@HK=&108*Ije(pZQ)tKmPXdw<*i>UG(#PZ7V9c!nRmnw>qJnx@hvN w+Yzt&uIxN=z~GOOl<%%dJSvtmnyePgy!ZUclRbQUTGvOdj=AvX_8Ec00Cez?EdT%j literal 0 HcmV?d00001 diff --git a/deploy/build_macos.sh b/deploy/build_macos.sh old mode 100755 new mode 100644 index 5f6e9786..03f286fc --- a/deploy/build_macos.sh +++ b/deploy/build_macos.sh @@ -1,4 +1,15 @@ #!/bin/bash +# ----------------------------------------------------------------------------- +# Usage: +# Export the required signing credentials before running this script, e.g.: +# export MAC_APP_CERT_PW='pw-for-DeveloperID-Application' +# export MAC_INSTALL_CERT_PW='pw-for-DeveloperID-Installer' +# export MAC_SIGNER_ID='Developer ID Application: Some Company Name (XXXXXXXXXX)' +# export MAC_INSTALLER_SIGNER_ID='Developer ID Installer: Some Company Name (XXXXXXXXXX)' +# export APPLE_DEV_EMAIL='your@email.com' +# export APPLE_DEV_PASSWORD='' +# bash deploy/build_macos.sh [-n] +# ----------------------------------------------------------------------------- echo "Build script started ..." set -o errexit -o nounset @@ -14,10 +25,10 @@ done PROJECT_DIR=$(pwd) DEPLOY_DIR=$PROJECT_DIR/deploy -mkdir -p $DEPLOY_DIR/build -BUILD_DIR=$DEPLOY_DIR/build +mkdir -p "$DEPLOY_DIR/build" +BUILD_DIR="$DEPLOY_DIR/build" -echo "Project dir: ${PROJECT_DIR}" +echo "Project dir: ${PROJECT_DIR}" echo "Build dir: ${BUILD_DIR}" APP_NAME=AmneziaVPN @@ -28,39 +39,45 @@ PLIST_NAME=$APP_NAME.plist OUT_APP_DIR=$BUILD_DIR/client BUNDLE_DIR=$OUT_APP_DIR/$APP_FILENAME +# Prebuilt deployment assets are available via the symlink under deploy/data PREBUILT_DEPLOY_DATA_DIR=$PROJECT_DIR/deploy/data/deploy-prebuilt/macos DEPLOY_DATA_DIR=$PROJECT_DIR/deploy/data/macos -INSTALLER_DATA_DIR=$BUILD_DIR/installer/packages/$APP_DOMAIN/data -INSTALLER_BUNDLE_DIR=$BUILD_DIR/installer/$APP_FILENAME -DMG_FILENAME=$PROJECT_DIR/${APP_NAME}.dmg # Search Qt if [ -z "${QT_VERSION+x}" ]; then -QT_VERSION=6.4.3; -QIF_VERSION=4.6 +QT_VERSION=6.8.3; QT_BIN_DIR=$HOME/Qt/$QT_VERSION/macos/bin -QIF_BIN_DIR=$QT_BIN_DIR/../../../Tools/QtInstallerFramework/$QIF_VERSION/bin fi echo "Using Qt in $QT_BIN_DIR" -echo "Using QIF in $QIF_BIN_DIR" # Checking env -$QT_BIN_DIR/qt-cmake --version +"$QT_BIN_DIR/qt-cmake" --version cmake --version clang -v # Build App echo "Building App..." -cd $BUILD_DIR +cd "$BUILD_DIR" -$QT_BIN_DIR/qt-cmake -S $PROJECT_DIR -B $BUILD_DIR +"$QT_BIN_DIR/qt-cmake" -S "$PROJECT_DIR" -B "$BUILD_DIR" cmake --build . --config release --target all # Build and run tests here +# Create a temporary keychain and import certificates +KEYCHAIN_PATH="$PROJECT_DIR/mac_sign.keychain" +trap 'echo "Cleaning up mac_sign.keychain..."; security delete-keychain "$KEYCHAIN_PATH" 2>/dev/null || true; rm -f "$KEYCHAIN_PATH" 2>/dev/null || true' EXIT +KEYCHAIN=$(security default-keychain -d user | tr -d '"[:space:]"') +security list-keychains -d user -s "$KEYCHAIN_PATH" "$KEYCHAIN" "$(security list-keychains -d user | tr '\n' ' ')" +security create-keychain -p "" "$KEYCHAIN_PATH" +security import "$DEPLOY_DIR/DeveloperIdApplicationCertificate.p12" -k "$KEYCHAIN_PATH" -P "$MAC_APP_CERT_PW" -T /usr/bin/codesign +security import "$DEPLOY_DIR/DeveloperIdInstallerCertificate.p12" -k "$KEYCHAIN_PATH" -P "$MAC_INSTALL_CERT_PW" -T /usr/bin/codesign +security import "$DEPLOY_DIR/DeveloperIDG2CA.cer" -k "$KEYCHAIN_PATH" -T /usr/bin/codesign +security list-keychains -d user -s "$KEYCHAIN_PATH" + echo "____________________________________" echo "............Deploy.................." echo "____________________________________" @@ -69,102 +86,159 @@ echo "____________________________________" echo "Packaging ..." -cp -Rv $PREBUILT_DEPLOY_DATA_DIR/* $BUNDLE_DIR/Contents/macOS -$QT_BIN_DIR/macdeployqt $OUT_APP_DIR/$APP_FILENAME -always-overwrite -qmldir=$PROJECT_DIR -cp -av $BUILD_DIR/service/server/$APP_NAME-service $BUNDLE_DIR/Contents/macOS -cp -Rv $PROJECT_DIR/deploy/data/macos/* $BUNDLE_DIR/Contents/macOS -rm -f $BUNDLE_DIR/Contents/macOS/post_install.sh $BUNDLE_DIR/Contents/macOS/post_uninstall.sh +cp -Rv "$PREBUILT_DEPLOY_DATA_DIR"/* "$BUNDLE_DIR/Contents/macOS" +"$QT_BIN_DIR/macdeployqt" "$OUT_APP_DIR/$APP_FILENAME" -always-overwrite -qmldir="$PROJECT_DIR" +cp -av "$BUILD_DIR/service/server/$APP_NAME-service" "$BUNDLE_DIR/Contents/macOS" +rsync -av --exclude="$PLIST_NAME" --exclude=post_install.sh --exclude=post_uninstall.sh "$DEPLOY_DATA_DIR/" "$BUNDLE_DIR/Contents/macOS/" -if [ "${MAC_CERT_PW+x}" ]; then +if [ "${MAC_APP_CERT_PW+x}" ]; then - CERTIFICATE_P12=$DEPLOY_DIR/PrivacyTechAppleCertDeveloperId.p12 - WWDRCA=$DEPLOY_DIR/WWDRCA.cer - KEYCHAIN=amnezia.build.macos.keychain - TEMP_PASS=tmp_pass + # Path to the p12 that contains the Developer ID *Application* certificate + CERTIFICATE_P12=$DEPLOY_DIR/DeveloperIdApplicationCertificate.p12 - security create-keychain -p $TEMP_PASS $KEYCHAIN || true - security default-keychain -s $KEYCHAIN - security unlock-keychain -p $TEMP_PASS $KEYCHAIN + # Ensure launchd plist is bundled, but place it inside Resources so that + # the bundle keeps a valid structure (nothing but `Contents` at the root). + mkdir -p "$BUNDLE_DIR/Contents/Resources" + cp "$DEPLOY_DATA_DIR/$PLIST_NAME" "$BUNDLE_DIR/Contents/Resources/$PLIST_NAME" - security default-keychain - security list-keychains - - security import $WWDRCA -k $KEYCHAIN -T /usr/bin/codesign || true - security import $CERTIFICATE_P12 -k $KEYCHAIN -P $MAC_CERT_PW -T /usr/bin/codesign || true - - security set-key-partition-list -S apple-tool:,apple: -k $TEMP_PASS $KEYCHAIN - security find-identity -p codesigning + # Show available signing identities (useful for debugging) + security find-identity -p codesigning || true echo "Signing App bundle..." - /usr/bin/codesign --deep --force --verbose --timestamp -o runtime --sign "$MAC_SIGNER_ID" $BUNDLE_DIR - /usr/bin/codesign --verify -vvvv $BUNDLE_DIR || true - spctl -a -vvvv $BUNDLE_DIR || true + /usr/bin/codesign --deep --force --verbose --timestamp -o runtime --keychain "$KEYCHAIN_PATH" --sign "$MAC_SIGNER_ID" "$BUNDLE_DIR" + /usr/bin/codesign --verify -vvvv "$BUNDLE_DIR" || true + spctl -a -vvvv "$BUNDLE_DIR" || true - if [ "${NOTARIZE_APP+x}" ]; then - echo "Notarizing App bundle..." - /usr/bin/ditto -c -k --keepParent $BUNDLE_DIR $PROJECT_DIR/Bundle_to_notarize.zip - xcrun notarytool submit $PROJECT_DIR/Bundle_to_notarize.zip --apple-id $APPLE_DEV_EMAIL --team-id $MAC_TEAM_ID --password $APPLE_DEV_PASSWORD - rm $PROJECT_DIR/Bundle_to_notarize.zip - sleep 300 - xcrun stapler staple $BUNDLE_DIR - xcrun stapler validate $BUNDLE_DIR - spctl -a -vvvv $BUNDLE_DIR || true - fi fi echo "Packaging installer..." -mkdir -p $INSTALLER_DATA_DIR -cp -av $PROJECT_DIR/deploy/installer $BUILD_DIR -cp -av $DEPLOY_DATA_DIR/post_install.sh $INSTALLER_DATA_DIR/post_install.sh -cp -av $DEPLOY_DATA_DIR/post_uninstall.sh $INSTALLER_DATA_DIR/post_uninstall.sh -cp -av $DEPLOY_DATA_DIR/$PLIST_NAME $INSTALLER_DATA_DIR/$PLIST_NAME +PKG_DIR=$BUILD_DIR/pkg +# Remove any stale packaging data from previous runs +rm -rf "$PKG_DIR" +PKG_ROOT=$PKG_DIR/root +SCRIPTS_DIR=$PKG_DIR/scripts +RESOURCES_DIR=$PKG_DIR/resources +INSTALL_PKG=$PKG_DIR/${APP_NAME}_install.pkg +UNINSTALL_PKG=$PKG_DIR/${APP_NAME}_uninstall.pkg +FINAL_PKG=$PKG_DIR/${APP_NAME}.pkg +UNINSTALL_SCRIPTS_DIR=$PKG_DIR/uninstall_scripts -chmod a+x $INSTALLER_DATA_DIR/post_install.sh $INSTALLER_DATA_DIR/post_uninstall.sh +mkdir -p "$PKG_ROOT/Applications" "$SCRIPTS_DIR" "$RESOURCES_DIR" "$UNINSTALL_SCRIPTS_DIR" -cd $BUNDLE_DIR -tar czf $INSTALLER_DATA_DIR/$APP_NAME.tar.gz ./ +cp -R "$BUNDLE_DIR" "$PKG_ROOT/Applications" +# launchd plist is already inside the bundle; no need to add it again after signing +/usr/bin/codesign --deep --force --verbose --timestamp -o runtime --keychain "$KEYCHAIN_PATH" --sign "$MAC_SIGNER_ID" "$PKG_ROOT/Applications/$APP_FILENAME" +/usr/bin/codesign --verify --deep --strict --verbose=4 "$PKG_ROOT/Applications/$APP_FILENAME" || true +cp "$DEPLOY_DATA_DIR/post_install.sh" "$SCRIPTS_DIR/post_install.sh" +cp "$DEPLOY_DATA_DIR/post_uninstall.sh" "$UNINSTALL_SCRIPTS_DIR/postinstall" +mkdir -p "$RESOURCES_DIR/scripts" +cp "$DEPLOY_DATA_DIR/check_install.sh" "$RESOURCES_DIR/scripts/check_install.sh" +cp "$DEPLOY_DATA_DIR/check_uninstall.sh" "$RESOURCES_DIR/scripts/check_uninstall.sh" -echo "Building installer..." -$QIF_BIN_DIR/binarycreator --offline-only -v -c $BUILD_DIR/installer/config/macos.xml -p $BUILD_DIR/installer/packages -f $INSTALLER_BUNDLE_DIR +cat > "$SCRIPTS_DIR/postinstall" <<'EOS' +#!/bin/bash +SCRIPT_DIR="$(dirname "$0")" +bash "$SCRIPT_DIR/post_install.sh" +exit 0 +EOS -if [ "${MAC_CERT_PW+x}" ]; then - echo "Signing installer bundle..." - security unlock-keychain -p $TEMP_PASS $KEYCHAIN - /usr/bin/codesign --deep --force --verbose --timestamp -o runtime --sign "$MAC_SIGNER_ID" $INSTALLER_BUNDLE_DIR - /usr/bin/codesign --verify -vvvv $INSTALLER_BUNDLE_DIR || true +chmod +x "$SCRIPTS_DIR"/* +chmod +x "$UNINSTALL_SCRIPTS_DIR"/* +chmod +x "$RESOURCES_DIR/scripts"/* +cp "$PROJECT_DIR/LICENSE" "$RESOURCES_DIR/LICENSE" - if [ "${NOTARIZE_APP+x}" ]; then - echo "Notarizing installer bundle..." - /usr/bin/ditto -c -k --keepParent $INSTALLER_BUNDLE_DIR $PROJECT_DIR/Installer_bundle_to_notarize.zip - xcrun notarytool submit $PROJECT_DIR/Installer_bundle_to_notarize.zip --apple-id $APPLE_DEV_EMAIL --team-id $MAC_TEAM_ID --password $APPLE_DEV_PASSWORD - rm $PROJECT_DIR/Installer_bundle_to_notarize.zip - sleep 300 - xcrun stapler staple $INSTALLER_BUNDLE_DIR - xcrun stapler validate $INSTALLER_BUNDLE_DIR - spctl -a -vvvv $INSTALLER_BUNDLE_DIR || true - fi +APP_VERSION=$(grep -m1 -E 'project\(' "$PROJECT_DIR/CMakeLists.txt" | sed -E 's/.*VERSION ([0-9.]+).*/\1/') +echo "Building component package $INSTALL_PKG ..." + +# Disable bundle relocation so the app always ends up in /Applications even if +# another copy is lying around somewhere. We do this by letting pkgbuild +# analyse the contents, flipping the BundleIsRelocatable flag to false for every +# bundle it discovers and then feeding that plist back to pkgbuild. + +COMPONENT_PLIST="$PKG_DIR/component.plist" +# Create the component description plist first +pkgbuild --analyze --root "$PKG_ROOT" "$COMPONENT_PLIST" + +# Turn all `BundleIsRelocatable` keys to false (PlistBuddy is available on all +# macOS systems). We first convert to xml1 to ensure predictable formatting. + +# Turn relocation off for every bundle entry in the plist. PlistBuddy cannot +# address keys that contain slashes without quoting, so we iterate through the +# top-level keys it prints. +plutil -convert xml1 "$COMPONENT_PLIST" +for bundle_key in $(/usr/libexec/PlistBuddy -c "Print" "$COMPONENT_PLIST" | awk '/^[ \t]*[A-Za-z0-9].*\.app/ {print $1}'); do + /usr/libexec/PlistBuddy -c "Set :'${bundle_key}':BundleIsRelocatable false" "$COMPONENT_PLIST" || true +done + +# Now build the real payload package with the edited plist so that the final +# PackageInfo contains relocatable="false". +pkgbuild --root "$PKG_ROOT" \ + --identifier "$APP_DOMAIN" \ + --version "$APP_VERSION" \ + --install-location "/" \ + --scripts "$SCRIPTS_DIR" \ + --component-plist "$COMPONENT_PLIST" \ + --sign "$MAC_INSTALLER_SIGNER_ID" \ + "$INSTALL_PKG" + +# Build uninstaller component package +UNINSTALL_COMPONENT_PKG=$PKG_DIR/${APP_NAME}_uninstall_component.pkg +echo "Building uninstaller component package $UNINSTALL_COMPONENT_PKG ..." +pkgbuild --nopayload \ + --identifier "$APP_DOMAIN.uninstall" \ + --version "$APP_VERSION" \ + --scripts "$UNINSTALL_SCRIPTS_DIR" \ + --sign "$MAC_INSTALLER_SIGNER_ID" \ + "$UNINSTALL_COMPONENT_PKG" + +# Wrap uninstaller component in a distribution package for clearer UI +echo "Building uninstaller distribution package $UNINSTALL_PKG ..." +UNINSTALL_RESOURCES=$PKG_DIR/uninstall_resources +rm -rf "$UNINSTALL_RESOURCES" +mkdir -p "$UNINSTALL_RESOURCES" +cp "$DEPLOY_DATA_DIR/uninstall_welcome.html" "$UNINSTALL_RESOURCES" +cp "$DEPLOY_DATA_DIR/uninstall_conclusion.html" "$UNINSTALL_RESOURCES" +productbuild \ + --distribution "$DEPLOY_DATA_DIR/distribution_uninstall.xml" \ + --package-path "$PKG_DIR" \ + --resources "$UNINSTALL_RESOURCES" \ + --sign "$MAC_INSTALLER_SIGNER_ID" \ + "$UNINSTALL_PKG" + +cp "$PROJECT_DIR/deploy/data/macos/distribution.xml" "$PKG_DIR/distribution.xml" + +echo "Creating final installer $FINAL_PKG ..." +productbuild --distribution "$PKG_DIR/distribution.xml" \ + --package-path "$PKG_DIR" \ + --resources "$RESOURCES_DIR" \ + --sign "$MAC_INSTALLER_SIGNER_ID" \ + "$FINAL_PKG" + +if [ "${MAC_INSTALL_CERT_PW+x}" ] && [ "${NOTARIZE_APP+x}" ]; then + echo "Notarizing installer package..." + xcrun notarytool submit "$FINAL_PKG" \ + --apple-id "$APPLE_DEV_EMAIL" \ + --team-id "$MAC_TEAM_ID" \ + --password "$APPLE_DEV_PASSWORD" \ + --wait + + echo "Stapling ticket..." + xcrun stapler staple "$FINAL_PKG" + xcrun stapler validate "$FINAL_PKG" fi -echo "Building DMG installer..." -# Allow Terminal to make changes in Privacy & Security > App Management -hdiutil create -size 256mb -volname AmneziaVPN -srcfolder $BUILD_DIR/installer/$APP_NAME.app -ov -format UDZO $DMG_FILENAME - -if [ "${MAC_CERT_PW+x}" ]; then - echo "Signing DMG installer..." - security unlock-keychain -p $TEMP_PASS $KEYCHAIN - /usr/bin/codesign --deep --force --verbose --timestamp -o runtime --sign "$MAC_SIGNER_ID" $DMG_FILENAME - /usr/bin/codesign --verify -vvvv $DMG_FILENAME || true - - if [ "${NOTARIZE_APP+x}" ]; then - echo "Notarizing DMG installer..." - xcrun notarytool submit $DMG_FILENAME --apple-id $APPLE_DEV_EMAIL --team-id $MAC_TEAM_ID --password $APPLE_DEV_PASSWORD - sleep 300 - xcrun stapler staple $DMG_FILENAME - xcrun stapler validate $DMG_FILENAME - fi +if [ "${MAC_INSTALL_CERT_PW+x}" ]; then + /usr/bin/codesign --verify -vvvv "$FINAL_PKG" || true + spctl -a -vvvv "$FINAL_PKG" || true fi -echo "Finished, artifact is $DMG_FILENAME" +# Sign app bundle +/usr/bin/codesign --deep --force --verbose --timestamp -o runtime --keychain "$KEYCHAIN_PATH" --sign "$MAC_SIGNER_ID" "$BUNDLE_DIR" +spctl -a -vvvv "$BUNDLE_DIR" || true -# restore keychain -security default-keychain -s login.keychain +# Restore login keychain as the only user keychain and delete the temporary keychain +KEYCHAIN="$HOME/Library/Keychains/login.keychain-db" +security list-keychains -d user -s "$KEYCHAIN" +security delete-keychain "$KEYCHAIN_PATH" + +echo "Finished, artifact is $FINAL_PKG" diff --git a/deploy/data/macos/check_install.sh b/deploy/data/macos/check_install.sh new file mode 100755 index 00000000..adf63550 --- /dev/null +++ b/deploy/data/macos/check_install.sh @@ -0,0 +1,5 @@ +#!/bin/bash +if [ -d "/Applications/AmneziaVPN.app" ] || pgrep -x "AmneziaVPN-service" >/dev/null; then + exit 1 +fi +exit 0 diff --git a/deploy/data/macos/check_uninstall.sh b/deploy/data/macos/check_uninstall.sh new file mode 100755 index 00000000..e7a6f7e0 --- /dev/null +++ b/deploy/data/macos/check_uninstall.sh @@ -0,0 +1,5 @@ +#!/bin/bash +if [ -d "/Applications/AmneziaVPN.app" ] || pgrep -x "AmneziaVPN-service" >/dev/null; then + exit 0 +fi +exit 1 diff --git a/deploy/data/macos/distribution.xml b/deploy/data/macos/distribution.xml new file mode 100644 index 00000000..c0a1dc68 --- /dev/null +++ b/deploy/data/macos/distribution.xml @@ -0,0 +1,17 @@ + + + AmneziaVPN Installer + + + + + + + + + + + + AmneziaVPN_install.pkg + AmneziaVPN_uninstall_component.pkg + diff --git a/deploy/data/macos/distribution_uninstall.xml b/deploy/data/macos/distribution_uninstall.xml new file mode 100644 index 00000000..cf8932b9 --- /dev/null +++ b/deploy/data/macos/distribution_uninstall.xml @@ -0,0 +1,13 @@ + + Uninstall AmneziaVPN + + + + + + + + + + AmneziaVPN_uninstall_component.pkg + diff --git a/deploy/data/macos/post_install.sh b/deploy/data/macos/post_install.sh index acd3f93f..053c8e13 100755 --- a/deploy/data/macos/post_install.sh +++ b/deploy/data/macos/post_install.sh @@ -7,29 +7,42 @@ LOG_FOLDER=/var/log/$APP_NAME LOG_FILE="$LOG_FOLDER/post-install.log" APP_PATH=/Applications/$APP_NAME.app -if launchctl list "$APP_NAME-service" &> /dev/null; then - launchctl unload $LAUNCH_DAEMONS_PLIST_NAME - rm -f $LAUNCH_DAEMONS_PLIST_NAME +# Handle new installations unpacked into localized folder +if [ -d "/Applications/${APP_NAME}.localized" ]; then + echo "`date` Detected ${APP_NAME}.localized, migrating to standard path" >> $LOG_FILE + sudo rm -rf "$APP_PATH" + sudo mv "/Applications/${APP_NAME}.localized/${APP_NAME}.app" "$APP_PATH" + sudo rm -rf "/Applications/${APP_NAME}.localized" fi -tar xzf $APP_PATH/$APP_NAME.tar.gz -C $APP_PATH -rm -f $APP_PATH/$APP_NAME.tar.gz -sudo chmod -R a-w $APP_PATH/ -sudo chown -R root $APP_PATH/ -sudo chgrp -R wheel $APP_PATH/ +if launchctl list "$APP_NAME-service" &> /dev/null; then + launchctl unload "$LAUNCH_DAEMONS_PLIST_NAME" + rm -f "$LAUNCH_DAEMONS_PLIST_NAME" +fi + +sudo chmod -R a-w "$APP_PATH/" +sudo chown -R root "$APP_PATH/" +sudo chgrp -R wheel "$APP_PATH/" rm -rf $LOG_FOLDER mkdir -p $LOG_FOLDER echo "`date` Script started" > $LOG_FILE -killall -9 $APP_NAME-service 2>> $LOG_FILE +echo "Requesting ${APP_NAME} to quit gracefully" >> "$LOG_FILE" +osascript -e 'tell application "AmneziaVPN" to quit' -mv -f $APP_PATH/$PLIST_NAME $LAUNCH_DAEMONS_PLIST_NAME 2>> $LOG_FILE -chown root:wheel $LAUNCH_DAEMONS_PLIST_NAME -launchctl load $LAUNCH_DAEMONS_PLIST_NAME +PLIST_SOURCE="$APP_PATH/Contents/Resources/$PLIST_NAME" +if [ -f "$PLIST_SOURCE" ]; then + mv -f "$PLIST_SOURCE" "$LAUNCH_DAEMONS_PLIST_NAME" 2>> $LOG_FILE +else + echo "`date` ERROR: service plist not found at $PLIST_SOURCE" >> $LOG_FILE +fi + +chown root:wheel "$LAUNCH_DAEMONS_PLIST_NAME" +launchctl load "$LAUNCH_DAEMONS_PLIST_NAME" +echo "`date` Launching ${APP_NAME} application" >> $LOG_FILE +open -a "$APP_PATH" 2>> $LOG_FILE || true echo "`date` Service status: $?" >> $LOG_FILE echo "`date` Script finished" >> $LOG_FILE - -#rm -- "$0" diff --git a/deploy/data/macos/post_uninstall.sh b/deploy/data/macos/post_uninstall.sh index de7846db..d6c5cdbd 100755 --- a/deploy/data/macos/post_uninstall.sh +++ b/deploy/data/macos/post_uninstall.sh @@ -9,6 +9,19 @@ SYSTEM_APP_SUPPORT="/Library/Application Support/$APP_NAME" LOG_FOLDER="/var/log/$APP_NAME" CACHES_FOLDER="$HOME/Library/Caches/$APP_NAME" +# Attempt to quit the GUI application if it's currently running +if pgrep -x "$APP_NAME" > /dev/null; then + echo "Quitting $APP_NAME..." + osascript -e 'tell application "'"$APP_NAME"'" to quit' || true + # Wait up to 10 seconds for the app to terminate gracefully + for i in {1..10}; do + if ! pgrep -x "$APP_NAME" > /dev/null; then + break + fi + sleep 1 + done +fi + # Stop the running service if it exists if pgrep -x "${APP_NAME}-service" > /dev/null; then sudo killall -9 "${APP_NAME}-service" @@ -32,3 +45,40 @@ sudo rm -rf "$LOG_FOLDER" # Remove any caches left behind rm -rf "$CACHES_FOLDER" + +# Remove PF data directory created by firewall helper, if present +sudo rm -rf "/Library/Application Support/${APP_NAME}/pf" + +# ---------------- PF firewall cleanup ---------------------- +# Rules are loaded under the anchor "amn" (see macosfirewall.cpp) +# Flush only that anchor to avoid destroying user/system rules. + +PF_ANCHOR="amn" + +### Flush all PF rules, NATs, and tables under our anchor and sub-anchors ### +anchors=$(sudo pfctl -s Anchors 2>/dev/null | awk '/^'"${PF_ANCHOR}"'/ {sub(/\*$/, "", $1); print $1}') +for anc in $anchors; do + echo "Flushing PF anchor $anc" + sudo pfctl -a "$anc" -F all 2>/dev/null || true + # flush tables under this anchor + tables=$(sudo pfctl -s Tables 2>/dev/null | awk '/^'"$anc"'/ {print}') + for tbl in $tables; do + echo "Killing PF table $tbl" + sudo pfctl -t "$tbl" -T kill 2>/dev/null || true + done +done + +### Reload default PF config to restore system rules ### +if [ -f /etc/pf.conf ]; then + echo "Restoring system PF config" + sudo pfctl -f /etc/pf.conf 2>/dev/null || true +fi + +### Disable PF if no rules remain ### +if sudo pfctl -s info 2>/dev/null | grep -q '^Status: Enabled' && \ + ! sudo pfctl -sr 2>/dev/null | grep -q .; then + echo "Disabling PF" + sudo pfctl -d 2>/dev/null || true +fi + +# ----------------------------------------------------------- diff --git a/deploy/data/macos/uninstall_conclusion.html b/deploy/data/macos/uninstall_conclusion.html new file mode 100644 index 00000000..f5b8bb63 --- /dev/null +++ b/deploy/data/macos/uninstall_conclusion.html @@ -0,0 +1,7 @@ + +Uninstall Complete + +

AmneziaVPN has been uninstalled

+

Thank you for using AmneziaVPN. The application and its components have been removed.

+ + \ No newline at end of file diff --git a/deploy/data/macos/uninstall_welcome.html b/deploy/data/macos/uninstall_welcome.html new file mode 100644 index 00000000..9f3d97cb --- /dev/null +++ b/deploy/data/macos/uninstall_welcome.html @@ -0,0 +1,7 @@ + +Uninstall AmneziaVPN + +

Uninstall AmneziaVPN

+

This process will remove AmneziaVPN from your system. Click Continue to proceed.

+ + \ No newline at end of file diff --git a/deploy/installer/config.cmake b/deploy/installer/config.cmake index 13f09986..3c33a33c 100644 --- a/deploy/installer/config.cmake +++ b/deploy/installer/config.cmake @@ -4,11 +4,6 @@ if(WIN32) ${CMAKE_CURRENT_LIST_DIR}/config/windows.xml.in ${CMAKE_BINARY_DIR}/installer/config/windows.xml ) -elseif(APPLE AND NOT IOS) - configure_file( - ${CMAKE_CURRENT_LIST_DIR}/config/macos.xml.in - ${CMAKE_BINARY_DIR}/installer/config/macos.xml - ) elseif(LINUX) set(ApplicationsDir "@ApplicationsDir@") configure_file( diff --git a/deploy/installer/config/macos.xml.in b/deploy/installer/config/macos.xml.in deleted file mode 100644 index 3888d08d..00000000 --- a/deploy/installer/config/macos.xml.in +++ /dev/null @@ -1,27 +0,0 @@ - - - AmneziaVPN - @CMAKE_PROJECT_VERSION@ - AmneziaVPN - AmneziaVPN - AmneziaVPN - /Applications/AmneziaVPN.app - 600 - 380 - Mac - true - true - false - controlscript.js - false - true - false - true - - - https://amneziavpn.org/updates/macos - true - AmneziaVPN - repository for macOS - - - From efcc0b7efc9fd8f15081db44cf48e9ff205cb407 Mon Sep 17 00:00:00 2001 From: Nethius Date: Thu, 3 Jul 2025 09:58:23 +0800 Subject: [PATCH 12/19] feat: xray api support (#1679) * refactoring: moved shared code into reusable functions for ApiConfigsController * feat: add xray support in apiConfigsController * feat: added a temporary switch for the xray protocol on api settings page * feat: added supported protocols field processing * refactoring: moved IsProtocolSelectionSupported to apiAccountInfoModel --- client/core/api/apiDefs.h | 1 + .../controllers/api/apiConfigsController.cpp | 484 ++++++++++-------- .../ui/controllers/api/apiConfigsController.h | 18 +- client/ui/models/api/apiAccountInfoModel.cpp | 11 + client/ui/models/api/apiAccountInfoModel.h | 5 +- .../qml/Pages2/PageSettingsApiServerInfo.qml | 26 + 6 files changed, 330 insertions(+), 215 deletions(-) diff --git a/client/core/api/apiDefs.h b/client/core/api/apiDefs.h index 4588ef04..12c8051f 100644 --- a/client/core/api/apiDefs.h +++ b/client/core/api/apiDefs.h @@ -32,6 +32,7 @@ namespace apiDefs constexpr QLatin1String stackType("stack_type"); constexpr QLatin1String serviceType("service_type"); constexpr QLatin1String cliVersion("cli_version"); + constexpr QLatin1String supportedProtocols("supported_protocols"); constexpr QLatin1String vpnKey("vpn_key"); constexpr QLatin1String config("config"); diff --git a/client/ui/controllers/api/apiConfigsController.cpp b/client/ui/controllers/api/apiConfigsController.cpp index 4c58140c..eb693a9a 100644 --- a/client/ui/controllers/api/apiConfigsController.cpp +++ b/client/ui/controllers/api/apiConfigsController.cpp @@ -18,6 +18,7 @@ namespace { constexpr char cloak[] = "cloak"; constexpr char awg[] = "awg"; + constexpr char vless[] = "vless"; constexpr char apiEndpoint[] = "api_endpoint"; constexpr char accessToken[] = "api_key"; @@ -35,10 +36,6 @@ namespace constexpr char serviceInfo[] = "service_info"; constexpr char serviceProtocol[] = "service_protocol"; - constexpr char aesKey[] = "aes_key"; - constexpr char aesIv[] = "aes_iv"; - constexpr char aesSalt[] = "aes_salt"; - constexpr char apiPayload[] = "api_payload"; constexpr char keyPayload[] = "key_payload"; @@ -47,6 +44,169 @@ namespace constexpr char config[] = "config"; } + + struct ProtocolData + { + OpenVpnConfigurator::ConnectionData certRequest; + + QString wireGuardClientPrivKey; + QString wireGuardClientPubKey; + + QString xrayUuid; + }; + + struct GatewayRequestData + { + QString osVersion; + QString appVersion; + + QString installationUuid; + + QString userCountryCode; + QString serverCountryCode; + QString serviceType; + QString serviceProtocol; + + QJsonObject authData; + + QJsonObject toJsonObject() const + { + QJsonObject obj; + if (!osVersion.isEmpty()) { + obj[configKey::osVersion] = osVersion; + } + if (!appVersion.isEmpty()) { + obj[configKey::appVersion] = appVersion; + } + if (!installationUuid.isEmpty()) { + obj[configKey::uuid] = installationUuid; + } + if (!userCountryCode.isEmpty()) { + obj[configKey::userCountryCode] = userCountryCode; + } + if (!serverCountryCode.isEmpty()) { + obj[configKey::serverCountryCode] = serverCountryCode; + } + if (!serviceType.isEmpty()) { + obj[configKey::serviceType] = serviceType; + } + if (!serviceProtocol.isEmpty()) { + obj[configKey::serviceProtocol] = serviceProtocol; + } + if (!authData.isEmpty()) { + obj[configKey::authData] = authData; + } + return obj; + } + }; + + ProtocolData generateProtocolData(const QString &protocol) + { + ProtocolData protocolData; + if (protocol == configKey::cloak) { + protocolData.certRequest = OpenVpnConfigurator::createCertRequest(); + } else if (protocol == configKey::awg) { + auto connData = WireguardConfigurator::genClientKeys(); + protocolData.wireGuardClientPubKey = connData.clientPubKey; + protocolData.wireGuardClientPrivKey = connData.clientPrivKey; + } else if (protocol == configKey::vless) { + protocolData.xrayUuid = QUuid::createUuid().toString(QUuid::WithoutBraces); + } + + return protocolData; + } + + void appendProtocolDataToApiPayload(const QString &protocol, const ProtocolData &protocolData, QJsonObject &apiPayload) + { + if (protocol == configKey::cloak) { + apiPayload[configKey::certificate] = protocolData.certRequest.request; + } else if (protocol == configKey::awg) { + apiPayload[configKey::publicKey] = protocolData.wireGuardClientPubKey; + } else if (protocol == configKey::vless) { + apiPayload[configKey::publicKey] = protocolData.xrayUuid; + } + } + + ErrorCode fillServerConfig(const QString &protocol, const ProtocolData &apiPayloadData, const QByteArray &apiResponseBody, + QJsonObject &serverConfig) + { + QString data = QJsonDocument::fromJson(apiResponseBody).object().value(config_key::config).toString(); + + data.replace("vpn://", ""); + QByteArray ba = QByteArray::fromBase64(data.toUtf8(), QByteArray::Base64UrlEncoding | QByteArray::OmitTrailingEquals); + + if (ba.isEmpty()) { + qDebug() << "empty vpn key"; + return ErrorCode::ApiConfigEmptyError; + } + + QByteArray ba_uncompressed = qUncompress(ba); + if (!ba_uncompressed.isEmpty()) { + ba = ba_uncompressed; + } + + QString configStr = ba; + if (protocol == configKey::cloak) { + configStr.replace("", "\n"); + configStr.replace("$OPENVPN_PRIV_KEY", apiPayloadData.certRequest.privKey); + } else if (protocol == configKey::awg) { + configStr.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", apiPayloadData.wireGuardClientPrivKey); + auto newServerConfig = QJsonDocument::fromJson(configStr.toUtf8()).object(); + auto containers = newServerConfig.value(config_key::containers).toArray(); + if (containers.isEmpty()) { + qDebug() << "missing containers field"; + return ErrorCode::ApiConfigEmptyError; + } + auto container = containers.at(0).toObject(); + QString containerName = ContainerProps::containerTypeToString(DockerContainer::Awg); + auto serverProtocolConfig = container.value(containerName).toObject(); + auto clientProtocolConfig = + QJsonDocument::fromJson(serverProtocolConfig.value(config_key::last_config).toString().toUtf8()).object(); + serverProtocolConfig[config_key::junkPacketCount] = clientProtocolConfig.value(config_key::junkPacketCount); + serverProtocolConfig[config_key::junkPacketMinSize] = clientProtocolConfig.value(config_key::junkPacketMinSize); + serverProtocolConfig[config_key::junkPacketMaxSize] = clientProtocolConfig.value(config_key::junkPacketMaxSize); + serverProtocolConfig[config_key::initPacketJunkSize] = clientProtocolConfig.value(config_key::initPacketJunkSize); + serverProtocolConfig[config_key::responsePacketJunkSize] = clientProtocolConfig.value(config_key::responsePacketJunkSize); + serverProtocolConfig[config_key::initPacketMagicHeader] = clientProtocolConfig.value(config_key::initPacketMagicHeader); + serverProtocolConfig[config_key::responsePacketMagicHeader] = clientProtocolConfig.value(config_key::responsePacketMagicHeader); + serverProtocolConfig[config_key::underloadPacketMagicHeader] = clientProtocolConfig.value(config_key::underloadPacketMagicHeader); + serverProtocolConfig[config_key::transportPacketMagicHeader] = clientProtocolConfig.value(config_key::transportPacketMagicHeader); + container[containerName] = serverProtocolConfig; + containers.replace(0, container); + newServerConfig[config_key::containers] = containers; + configStr = QString(QJsonDocument(newServerConfig).toJson()); + } + + QJsonObject newServerConfig = QJsonDocument::fromJson(configStr.toUtf8()).object(); + serverConfig[config_key::dns1] = newServerConfig.value(config_key::dns1); + serverConfig[config_key::dns2] = newServerConfig.value(config_key::dns2); + serverConfig[config_key::containers] = newServerConfig.value(config_key::containers); + serverConfig[config_key::hostName] = newServerConfig.value(config_key::hostName); + + if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { + serverConfig[config_key::configVersion] = newServerConfig.value(config_key::configVersion); + serverConfig[config_key::description] = newServerConfig.value(config_key::description); + serverConfig[config_key::name] = newServerConfig.value(config_key::name); + } + + auto defaultContainer = newServerConfig.value(config_key::defaultContainer).toString(); + serverConfig[config_key::defaultContainer] = defaultContainer; + + QVariantMap map = serverConfig.value(configKey::apiConfig).toObject().toVariantMap(); + map.insert(newServerConfig.value(configKey::apiConfig).toObject().toVariantMap()); + auto apiConfig = QJsonObject::fromVariantMap(map); + + if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { + apiConfig.insert(apiDefs::key::supportedProtocols, + QJsonDocument::fromJson(apiResponseBody).object().value(apiDefs::key::supportedProtocols).toArray()); + } + + serverConfig[configKey::apiConfig] = apiConfig; + + qDebug() << serverConfig; + + return ErrorCode::NoError; + } } ApiConfigsController::ApiConfigsController(const QSharedPointer &serversModel, @@ -63,24 +223,26 @@ bool ApiConfigsController::exportNativeConfig(const QString &serverCountryCode, return false; } - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - auto serverConfigObject = m_serversModel->getServerConfig(m_serversModel->getProcessedServerIndex()); auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); - QString protocol = apiConfigObject.value(configKey::serviceProtocol).toString(); - ApiPayloadData apiPayloadData = generateApiPayloadData(protocol); + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + m_settings->getInstallationUuid(true), + apiConfigObject.value(configKey::userCountryCode).toString(), + serverCountryCode, + apiConfigObject.value(configKey::serviceType).toString(), + m_apiServicesModel->getSelectedServiceProtocol(), + serverConfigObject.value(configKey::authData).toObject() }; - QJsonObject apiPayload = fillApiPayload(protocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = apiConfigObject.value(configKey::userCountryCode); - apiPayload[configKey::serverCountryCode] = serverCountryCode; - apiPayload[configKey::serviceType] = apiConfigObject.value(configKey::serviceType); - apiPayload[configKey::authData] = serverConfigObject.value(configKey::authData); - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); + QString protocol = apiConfigObject.value(configKey::serviceProtocol).toString(); + ProtocolData protocolData = generateProtocolData(protocol); + + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); + appendProtocolDataToApiPayload(gatewayRequestData.serviceProtocol, protocolData, apiPayload); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/native_config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/native_config"), apiPayload, responseBody); if (errorCode != ErrorCode::NoError) { emit errorOccurred(errorCode); return false; @@ -88,7 +250,7 @@ bool ApiConfigsController::exportNativeConfig(const QString &serverCountryCode, QJsonObject jsonConfig = QJsonDocument::fromJson(responseBody).object(); QString nativeConfig = jsonConfig.value(configKey::config).toString(); - nativeConfig.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", apiPayloadData.wireGuardClientPrivKey); + nativeConfig.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", protocolData.wireGuardClientPrivKey); SystemController::saveFile(fileName, nativeConfig); return true; @@ -96,24 +258,22 @@ bool ApiConfigsController::exportNativeConfig(const QString &serverCountryCode, bool ApiConfigsController::revokeNativeConfig(const QString &serverCountryCode) { - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - auto serverConfigObject = m_serversModel->getServerConfig(m_serversModel->getProcessedServerIndex()); auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); - QString protocol = apiConfigObject.value(configKey::serviceProtocol).toString(); - ApiPayloadData apiPayloadData = generateApiPayloadData(protocol); + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + m_settings->getInstallationUuid(true), + apiConfigObject.value(configKey::userCountryCode).toString(), + serverCountryCode, + apiConfigObject.value(configKey::serviceType).toString(), + m_apiServicesModel->getSelectedServiceProtocol(), + serverConfigObject.value(configKey::authData).toObject() }; - QJsonObject apiPayload = fillApiPayload(protocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = apiConfigObject.value(configKey::userCountryCode); - apiPayload[configKey::serverCountryCode] = serverCountryCode; - apiPayload[configKey::serviceType] = apiConfigObject.value(configKey::serviceType); - apiPayload[configKey::authData] = serverConfigObject.value(configKey::authData); - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/revoke_native_config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/revoke_native_config"), apiPayload, responseBody); if (errorCode != ErrorCode::NoError && errorCode != ErrorCode::ApiNotFoundError) { emit errorOccurred(errorCode); return false; @@ -144,14 +304,11 @@ void ApiConfigsController::copyVpnKeyToClipboard() bool ApiConfigsController::fillAvailableServices() { - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - QJsonObject apiPayload; apiPayload[configKey::osVersion] = QSysInfo::productType(); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/services"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/services"), apiPayload, responseBody); if (errorCode == ErrorCode::NoError) { if (!responseBody.contains("services")) { errorCode = ErrorCode::ApiServicesMissingError; @@ -170,34 +327,36 @@ bool ApiConfigsController::fillAvailableServices() bool ApiConfigsController::importServiceFromGateway() { - if (m_serversModel->isServerFromApiAlreadyExists(m_apiServicesModel->getCountryCode(), m_apiServicesModel->getSelectedServiceType(), - m_apiServicesModel->getSelectedServiceProtocol())) { + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + m_settings->getInstallationUuid(true), + m_apiServicesModel->getCountryCode(), + "", + m_apiServicesModel->getSelectedServiceType(), + m_apiServicesModel->getSelectedServiceProtocol(), + QJsonObject() }; + + if (m_serversModel->isServerFromApiAlreadyExists(gatewayRequestData.userCountryCode, gatewayRequestData.serviceType, + gatewayRequestData.serviceProtocol)) { emit errorOccurred(ErrorCode::ApiConfigAlreadyAdded); return false; } - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); + ProtocolData protocolData = generateProtocolData(gatewayRequestData.serviceProtocol); - auto installationUuid = m_settings->getInstallationUuid(true); - auto userCountryCode = m_apiServicesModel->getCountryCode(); - auto serviceType = m_apiServicesModel->getSelectedServiceType(); - auto serviceProtocol = m_apiServicesModel->getSelectedServiceProtocol(); - - ApiPayloadData apiPayloadData = generateApiPayloadData(serviceProtocol); - - QJsonObject apiPayload = fillApiPayload(serviceProtocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = userCountryCode; - apiPayload[configKey::serviceType] = serviceType; - apiPayload[configKey::uuid] = installationUuid; - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); + appendProtocolDataToApiPayload(gatewayRequestData.serviceProtocol, protocolData, apiPayload); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/config"), apiPayload, responseBody); QJsonObject serverConfig; if (errorCode == ErrorCode::NoError) { - fillServerConfig(serviceProtocol, apiPayloadData, responseBody, serverConfig); + errorCode = fillServerConfig(gatewayRequestData.serviceProtocol, protocolData, responseBody, serverConfig); + if (errorCode != ErrorCode::NoError) { + emit errorOccurred(errorCode); + return false; + } QJsonObject apiConfig = serverConfig.value(configKey::apiConfig).toObject(); apiConfig.insert(configKey::userCountryCode, m_apiServicesModel->getCountryCode()); @@ -218,39 +377,33 @@ bool ApiConfigsController::importServiceFromGateway() bool ApiConfigsController::updateServiceFromGateway(const int serverIndex, const QString &newCountryCode, const QString &newCountryName, bool reloadServiceConfig) { - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - auto serverConfig = m_serversModel->getServerConfig(serverIndex); auto apiConfig = serverConfig.value(configKey::apiConfig).toObject(); - auto authData = serverConfig.value(configKey::authData).toObject(); - auto installationUuid = m_settings->getInstallationUuid(true); - auto userCountryCode = apiConfig.value(configKey::userCountryCode).toString(); - auto serviceType = apiConfig.value(configKey::serviceType).toString(); - auto serviceProtocol = apiConfig.value(configKey::serviceProtocol).toString(); + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + m_settings->getInstallationUuid(true), + apiConfig.value(configKey::userCountryCode).toString(), + newCountryCode, + apiConfig.value(configKey::serviceType).toString(), + apiConfig.value(configKey::serviceProtocol).toString(), + serverConfig.value(configKey::authData).toObject() }; - ApiPayloadData apiPayloadData = generateApiPayloadData(serviceProtocol); + ProtocolData protocolData = generateProtocolData(gatewayRequestData.serviceProtocol); - QJsonObject apiPayload = fillApiPayload(serviceProtocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = userCountryCode; - apiPayload[configKey::serviceType] = serviceType; - apiPayload[configKey::uuid] = installationUuid; - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); - - if (!newCountryCode.isEmpty()) { - apiPayload[configKey::serverCountryCode] = newCountryCode; - } - if (!authData.isEmpty()) { - apiPayload[configKey::authData] = authData; - } + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); + appendProtocolDataToApiPayload(gatewayRequestData.serviceProtocol, protocolData, apiPayload); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/config"), apiPayload, responseBody); QJsonObject newServerConfig; if (errorCode == ErrorCode::NoError) { - fillServerConfig(serviceProtocol, apiPayloadData, responseBody, newServerConfig); + errorCode = fillServerConfig(gatewayRequestData.serviceProtocol, protocolData, responseBody, newServerConfig); + if (errorCode != ErrorCode::NoError) { + emit errorOccurred(errorCode); + return false; + } QJsonObject newApiConfig = newServerConfig.value(configKey::apiConfig).toObject(); newApiConfig.insert(configKey::userCountryCode, apiConfig.value(configKey::userCountryCode)); @@ -259,7 +412,7 @@ bool ApiConfigsController::updateServiceFromGateway(const int serverIndex, const newApiConfig.insert(apiDefs::key::vpnKey, apiConfig.value(apiDefs::key::vpnKey)); newServerConfig.insert(configKey::apiConfig, newApiConfig); - newServerConfig.insert(configKey::authData, authData); + newServerConfig.insert(configKey::authData, gatewayRequestData.authData); if (serverConfig.value(config_key::nameOverriddenByUser).toBool()) { newServerConfig.insert(config_key::name, serverConfig.value(config_key::name)); @@ -294,10 +447,13 @@ bool ApiConfigsController::updateServiceFromTelegram(const int serverIndex) auto installationUuid = m_settings->getInstallationUuid(true); QString serviceProtocol = serverConfig.value(configKey::protocol).toString(); - ApiPayloadData apiPayloadData = generateApiPayloadData(serviceProtocol); + ProtocolData protocolData = generateProtocolData(serviceProtocol); - QJsonObject apiPayload = fillApiPayload(serviceProtocol, apiPayloadData); + QJsonObject apiPayload; + appendProtocolDataToApiPayload(serviceProtocol, protocolData, apiPayload); apiPayload[configKey::uuid] = installationUuid; + apiPayload[configKey::osVersion] = QSysInfo::productType(); + apiPayload[configKey::appVersion] = QString(APP_VERSION); apiPayload[configKey::accessToken] = serverConfig.value(configKey::accessToken).toString(); apiPayload[configKey::apiEndpoint] = serverConfig.value(configKey::apiEndpoint).toString(); @@ -305,7 +461,11 @@ bool ApiConfigsController::updateServiceFromTelegram(const int serverIndex) ErrorCode errorCode = gatewayController.post(QString("%1v1/proxy_config"), apiPayload, responseBody); if (errorCode == ErrorCode::NoError) { - fillServerConfig(serviceProtocol, apiPayloadData, responseBody, serverConfig); + errorCode = fillServerConfig(serviceProtocol, protocolData, responseBody, serverConfig); + if (errorCode != ErrorCode::NoError) { + emit errorOccurred(errorCode); + return false; + } m_serversModel->editServer(serverConfig, serverIndex); emit updateServerFromApiFinished(); @@ -318,9 +478,6 @@ bool ApiConfigsController::updateServiceFromTelegram(const int serverIndex) bool ApiConfigsController::deactivateDevice() { - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - auto serverIndex = m_serversModel->getProcessedServerIndex(); auto serverConfigObject = m_serversModel->getServerConfig(serverIndex); auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); @@ -329,19 +486,19 @@ bool ApiConfigsController::deactivateDevice() return true; } - QString protocol = apiConfigObject.value(configKey::serviceProtocol).toString(); - ApiPayloadData apiPayloadData = generateApiPayloadData(protocol); + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + m_settings->getInstallationUuid(true), + apiConfigObject.value(configKey::userCountryCode).toString(), + apiConfigObject.value(configKey::serverCountryCode).toString(), + apiConfigObject.value(configKey::serviceType).toString(), + "", + serverConfigObject.value(configKey::authData).toObject() }; - QJsonObject apiPayload = fillApiPayload(protocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = apiConfigObject.value(configKey::userCountryCode); - apiPayload[configKey::serverCountryCode] = apiConfigObject.value(configKey::serverCountryCode); - apiPayload[configKey::serviceType] = apiConfigObject.value(configKey::serviceType); - apiPayload[configKey::authData] = serverConfigObject.value(configKey::authData); - apiPayload[configKey::uuid] = m_settings->getInstallationUuid(true); - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/revoke_config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/revoke_config"), apiPayload, responseBody); if (errorCode != ErrorCode::NoError && errorCode != ErrorCode::ApiNotFoundError) { emit errorOccurred(errorCode); return false; @@ -355,9 +512,6 @@ bool ApiConfigsController::deactivateDevice() bool ApiConfigsController::deactivateExternalDevice(const QString &uuid, const QString &serverCountryCode) { - GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, - m_settings->isStrictKillSwitchEnabled()); - auto serverIndex = m_serversModel->getProcessedServerIndex(); auto serverConfigObject = m_serversModel->getServerConfig(serverIndex); auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); @@ -366,19 +520,19 @@ bool ApiConfigsController::deactivateExternalDevice(const QString &uuid, const Q return true; } - QString protocol = apiConfigObject.value(configKey::serviceProtocol).toString(); - ApiPayloadData apiPayloadData = generateApiPayloadData(protocol); + GatewayRequestData gatewayRequestData { QSysInfo::productType(), + QString(APP_VERSION), + uuid, + apiConfigObject.value(configKey::userCountryCode).toString(), + serverCountryCode, + apiConfigObject.value(configKey::serviceType).toString(), + "", + serverConfigObject.value(configKey::authData).toObject() }; - QJsonObject apiPayload = fillApiPayload(protocol, apiPayloadData); - apiPayload[configKey::userCountryCode] = apiConfigObject.value(configKey::userCountryCode); - apiPayload[configKey::serverCountryCode] = serverCountryCode; - apiPayload[configKey::serviceType] = apiConfigObject.value(configKey::serviceType); - apiPayload[configKey::authData] = serverConfigObject.value(configKey::authData); - apiPayload[configKey::uuid] = uuid; - apiPayload[apiDefs::key::cliVersion] = QString(APP_VERSION); + QJsonObject apiPayload = gatewayRequestData.toJsonObject(); QByteArray responseBody; - ErrorCode errorCode = gatewayController.post(QString("%1v1/revoke_config"), apiPayload, responseBody); + ErrorCode errorCode = executeRequest(QString("%1v1/revoke_config"), apiPayload, responseBody); if (errorCode != ErrorCode::NoError && errorCode != ErrorCode::ApiNotFoundError) { emit errorOccurred(errorCode); return false; @@ -417,108 +571,29 @@ bool ApiConfigsController::isConfigValid() return true; } -ApiConfigsController::ApiPayloadData ApiConfigsController::generateApiPayloadData(const QString &protocol) +void ApiConfigsController::setCurrentProtocol(const QString &protocolName) { - ApiConfigsController::ApiPayloadData apiPayload; - if (protocol == configKey::cloak) { - apiPayload.certRequest = OpenVpnConfigurator::createCertRequest(); - } else if (protocol == configKey::awg) { - auto connData = WireguardConfigurator::genClientKeys(); - apiPayload.wireGuardClientPubKey = connData.clientPubKey; - apiPayload.wireGuardClientPrivKey = connData.clientPrivKey; - } - return apiPayload; + auto serverIndex = m_serversModel->getProcessedServerIndex(); + auto serverConfigObject = m_serversModel->getServerConfig(serverIndex); + auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); + + apiConfigObject[configKey::serviceProtocol] = protocolName; + + serverConfigObject.insert(configKey::apiConfig, apiConfigObject); + + m_serversModel->editServer(serverConfigObject, serverIndex); } -QJsonObject ApiConfigsController::fillApiPayload(const QString &protocol, const ApiPayloadData &apiPayloadData) +bool ApiConfigsController::isVlessProtocol() { - QJsonObject obj; - if (protocol == configKey::cloak) { - obj[configKey::certificate] = apiPayloadData.certRequest.request; - } else if (protocol == configKey::awg) { - obj[configKey::publicKey] = apiPayloadData.wireGuardClientPubKey; + auto serverIndex = m_serversModel->getProcessedServerIndex(); + auto serverConfigObject = m_serversModel->getServerConfig(serverIndex); + auto apiConfigObject = serverConfigObject.value(configKey::apiConfig).toObject(); + + if (apiConfigObject[configKey::serviceProtocol].toString() == "vless") { + return true; } - - obj[configKey::osVersion] = QSysInfo::productType(); - obj[configKey::appVersion] = QString(APP_VERSION); - - return obj; -} - -void ApiConfigsController::fillServerConfig(const QString &protocol, const ApiPayloadData &apiPayloadData, - const QByteArray &apiResponseBody, QJsonObject &serverConfig) -{ - QString data = QJsonDocument::fromJson(apiResponseBody).object().value(config_key::config).toString(); - - data.replace("vpn://", ""); - QByteArray ba = QByteArray::fromBase64(data.toUtf8(), QByteArray::Base64UrlEncoding | QByteArray::OmitTrailingEquals); - - if (ba.isEmpty()) { - emit errorOccurred(ErrorCode::ApiConfigEmptyError); - return; - } - - QByteArray ba_uncompressed = qUncompress(ba); - if (!ba_uncompressed.isEmpty()) { - ba = ba_uncompressed; - } - - QString configStr = ba; - if (protocol == configKey::cloak) { - configStr.replace("", "\n"); - configStr.replace("$OPENVPN_PRIV_KEY", apiPayloadData.certRequest.privKey); - } else if (protocol == configKey::awg) { - configStr.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", apiPayloadData.wireGuardClientPrivKey); - auto newServerConfig = QJsonDocument::fromJson(configStr.toUtf8()).object(); - auto containers = newServerConfig.value(config_key::containers).toArray(); - if (containers.isEmpty()) { - return; // todo process error - } - auto container = containers.at(0).toObject(); - QString containerName = ContainerProps::containerTypeToString(DockerContainer::Awg); - auto containerConfig = container.value(containerName).toObject(); - auto protocolConfig = QJsonDocument::fromJson(containerConfig.value(config_key::last_config).toString().toUtf8()).object(); - containerConfig[config_key::junkPacketCount] = protocolConfig.value(config_key::junkPacketCount); - containerConfig[config_key::junkPacketMinSize] = protocolConfig.value(config_key::junkPacketMinSize); - containerConfig[config_key::junkPacketMaxSize] = protocolConfig.value(config_key::junkPacketMaxSize); - containerConfig[config_key::initPacketJunkSize] = protocolConfig.value(config_key::initPacketJunkSize); - containerConfig[config_key::responsePacketJunkSize] = protocolConfig.value(config_key::responsePacketJunkSize); - containerConfig[config_key::initPacketMagicHeader] = protocolConfig.value(config_key::initPacketMagicHeader); - containerConfig[config_key::responsePacketMagicHeader] = protocolConfig.value(config_key::responsePacketMagicHeader); - containerConfig[config_key::underloadPacketMagicHeader] = protocolConfig.value(config_key::underloadPacketMagicHeader); - containerConfig[config_key::transportPacketMagicHeader] = protocolConfig.value(config_key::transportPacketMagicHeader); - container[containerName] = containerConfig; - containers.replace(0, container); - newServerConfig[config_key::containers] = containers; - configStr = QString(QJsonDocument(newServerConfig).toJson()); - } - - QJsonObject newServerConfig = QJsonDocument::fromJson(configStr.toUtf8()).object(); - serverConfig[config_key::dns1] = newServerConfig.value(config_key::dns1); - serverConfig[config_key::dns2] = newServerConfig.value(config_key::dns2); - serverConfig[config_key::containers] = newServerConfig.value(config_key::containers); - serverConfig[config_key::hostName] = newServerConfig.value(config_key::hostName); - - if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { - serverConfig[config_key::configVersion] = newServerConfig.value(config_key::configVersion); - serverConfig[config_key::description] = newServerConfig.value(config_key::description); - serverConfig[config_key::name] = newServerConfig.value(config_key::name); - } - - auto defaultContainer = newServerConfig.value(config_key::defaultContainer).toString(); - serverConfig[config_key::defaultContainer] = defaultContainer; - - QVariantMap map = serverConfig.value(configKey::apiConfig).toObject().toVariantMap(); - map.insert(newServerConfig.value(configKey::apiConfig).toObject().toVariantMap()); - auto apiConfig = QJsonObject::fromVariantMap(map); - - if (newServerConfig.value(config_key::configVersion).toInt() == apiDefs::ConfigSource::AmneziaGateway) { - apiConfig.insert(configKey::serviceInfo, QJsonDocument::fromJson(apiResponseBody).object().value(configKey::serviceInfo).toObject()); - } - - serverConfig[configKey::apiConfig] = apiConfig; - - return; + return false; } QList ApiConfigsController::getQrCodes() @@ -535,3 +610,10 @@ QString ApiConfigsController::getVpnKey() { return m_vpnKey; } + +ErrorCode ApiConfigsController::executeRequest(const QString &endpoint, const QJsonObject &apiPayload, QByteArray &responseBody) +{ + GatewayController gatewayController(m_settings->getGatewayEndpoint(), m_settings->isDevGatewayEnv(), apiDefs::requestTimeoutMsecs, + m_settings->isStrictKillSwitchEnabled()); + return gatewayController.post(endpoint, apiPayload, responseBody); +} diff --git a/client/ui/controllers/api/apiConfigsController.h b/client/ui/controllers/api/apiConfigsController.h index 2fe981e4..a04a142c 100644 --- a/client/ui/controllers/api/apiConfigsController.h +++ b/client/ui/controllers/api/apiConfigsController.h @@ -35,6 +35,9 @@ public slots: bool isConfigValid(); + void setCurrentProtocol(const QString &protocolName); + bool isVlessProtocol(); + signals: void errorOccurred(ErrorCode errorCode); @@ -46,23 +49,12 @@ signals: void vpnKeyExportReady(); private: - struct ApiPayloadData - { - OpenVpnConfigurator::ConnectionData certRequest; - - QString wireGuardClientPrivKey; - QString wireGuardClientPubKey; - }; - - ApiPayloadData generateApiPayloadData(const QString &protocol); - QJsonObject fillApiPayload(const QString &protocol, const ApiPayloadData &apiPayloadData); - void fillServerConfig(const QString &protocol, const ApiPayloadData &apiPayloadData, const QByteArray &apiResponseBody, - QJsonObject &serverConfig); - QList getQrCodes(); int getQrCodesCount(); QString getVpnKey(); + ErrorCode executeRequest(const QString &endpoint, const QJsonObject &apiPayload, QByteArray &responseBody); + QList m_qrCodes; QString m_vpnKey; diff --git a/client/ui/models/api/apiAccountInfoModel.cpp b/client/ui/models/api/apiAccountInfoModel.cpp index fdd4e2ca..bd3027a4 100644 --- a/client/ui/models/api/apiAccountInfoModel.cpp +++ b/client/ui/models/api/apiAccountInfoModel.cpp @@ -75,6 +75,12 @@ QVariant ApiAccountInfoModel::data(const QModelIndex &index, int role) const } return false; } + case IsProtocolSelectionSupportedRole: { + if (m_accountInfoData.supportedProtocols.size() > 1) { + return true; + } + return false; + } } return QVariant(); @@ -95,6 +101,10 @@ void ApiAccountInfoModel::updateModel(const QJsonObject &accountInfoObject, cons accountInfoData.configType = apiUtils::getConfigType(serverConfig); + for (const auto &protocol : accountInfoObject.value(apiDefs::key::supportedProtocols).toArray()) { + accountInfoData.supportedProtocols.push_back(protocol.toString()); + } + m_accountInfoData = accountInfoData; m_supportInfo = accountInfoObject.value(apiDefs::key::supportInfo).toObject(); @@ -159,6 +169,7 @@ QHash ApiAccountInfoModel::roleNames() const roles[ServiceDescriptionRole] = "serviceDescription"; roles[IsComponentVisibleRole] = "isComponentVisible"; roles[HasExpiredWorkerRole] = "hasExpiredWorker"; + roles[IsProtocolSelectionSupportedRole] = "isProtocolSelectionSupported"; return roles; } diff --git a/client/ui/models/api/apiAccountInfoModel.h b/client/ui/models/api/apiAccountInfoModel.h index ead92488..f0203967 100644 --- a/client/ui/models/api/apiAccountInfoModel.h +++ b/client/ui/models/api/apiAccountInfoModel.h @@ -18,7 +18,8 @@ public: ServiceDescriptionRole, EndDateRole, IsComponentVisibleRole, - HasExpiredWorkerRole + HasExpiredWorkerRole, + IsProtocolSelectionSupportedRole }; explicit ApiAccountInfoModel(QObject *parent = nullptr); @@ -51,6 +52,8 @@ private: int maxDeviceCount; apiDefs::ConfigType configType; + + QStringList supportedProtocols; }; AccountInfoData m_accountInfoData; diff --git a/client/ui/qml/Pages2/PageSettingsApiServerInfo.qml b/client/ui/qml/Pages2/PageSettingsApiServerInfo.qml index 93118755..75832fa6 100644 --- a/client/ui/qml/Pages2/PageSettingsApiServerInfo.qml +++ b/client/ui/qml/Pages2/PageSettingsApiServerInfo.qml @@ -158,6 +158,32 @@ PageType { readonly property bool isVisibleForAmneziaFree: ApiAccountInfoModel.data("isComponentVisible") + SwitcherType { + id: switcher + + readonly property bool isVlessProtocol: ApiConfigsController.isVlessProtocol() + + Layout.fillWidth: true + Layout.topMargin: 24 + Layout.rightMargin: 16 + Layout.leftMargin: 16 + + visible: ApiAccountInfoModel.data("isProtocolSelectionSupported") + + text: qsTr("Use VLESS protocol") + checked: switcher.isVlessProtocol + onToggled: function() { + if (ServersModel.isDefaultServerCurrentlyProcessed() && ConnectionController.isConnected) { + PageController.showNotificationMessage(qsTr("Cannot change protocol during active connection")) + } else { + PageController.showBusyIndicator(true) + ApiConfigsController.setCurrentProtocol(switcher.isVlessProtocol ? "awg" : "vless") + ApiConfigsController.updateServiceFromGateway(ServersModel.processedIndex, "", "", true) + PageController.showBusyIndicator(false) + } + } + } + WarningType { id: warning From d766a001e3eb8d20f9bb4ce644b9c7534aae5373 Mon Sep 17 00:00:00 2001 From: "vladimir.kuznetsov" Date: Thu, 3 Jul 2025 10:20:01 +0800 Subject: [PATCH 13/19] refactoring: all protocol models now work with c++ classes --- .../models/protocols/cloakProtocolConfig.cpp | 15 +++ .../models/protocols/cloakProtocolConfig.h | 3 + .../protocols/openvpnProtocolConfig.cpp | 47 +++++--- .../models/protocols/openvpnProtocolConfig.h | 9 +- .../core/models/protocols/protocolConfig.cpp | 11 +- .../protocols/shadowsocksProtocolConfig.cpp | 14 +++ .../protocols/shadowsocksProtocolConfig.h | 3 + .../protocols/wireguardProtocolConfig.cpp | 14 +++ .../protocols/wireguardProtocolConfig.h | 3 + .../models/protocols/xrayProtocolConfig.cpp | 15 +++ .../models/protocols/xrayProtocolConfig.h | 3 + client/ui/controllers/installController.cpp | 7 +- client/ui/models/containers_model.cpp | 12 -- client/ui/models/containers_model.h | 3 - .../ui/models/protocols/cloakConfigModel.cpp | 46 ++++---- client/ui/models/protocols/cloakConfigModel.h | 12 +- .../models/protocols/openvpnConfigModel.cpp | 107 +++++++----------- .../ui/models/protocols/openvpnConfigModel.h | 12 +- .../protocols/shadowsocksConfigModel.cpp | 46 ++++---- .../models/protocols/shadowsocksConfigModel.h | 12 +- .../models/protocols/wireguardConfigModel.cpp | 88 +++----------- .../models/protocols/wireguardConfigModel.h | 24 +--- .../ui/models/protocols/xrayConfigModel.cpp | 42 +++---- client/ui/models/protocols/xrayConfigModel.h | 12 +- client/ui/models/protocols_model.cpp | 36 +++--- 25 files changed, 301 insertions(+), 295 deletions(-) diff --git a/client/core/models/protocols/cloakProtocolConfig.cpp b/client/core/models/protocols/cloakProtocolConfig.cpp index b32e652e..c5dd916a 100644 --- a/client/core/models/protocols/cloakProtocolConfig.cpp +++ b/client/core/models/protocols/cloakProtocolConfig.cpp @@ -40,4 +40,19 @@ QJsonObject CloakProtocolConfig::toJson() const } return json; +} + +bool CloakProtocolConfig::hasEqualServerSettings(const CloakProtocolConfig &other) const +{ + if (serverProtocolConfig.port != other.serverProtocolConfig.port || + serverProtocolConfig.cipher != other.serverProtocolConfig.cipher || + serverProtocolConfig.site != other.serverProtocolConfig.site) { + return false; + } + return true; +} + +void CloakProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = cloak::ClientProtocolConfig(); } diff --git a/client/core/models/protocols/cloakProtocolConfig.h b/client/core/models/protocols/cloakProtocolConfig.h index 191e3f2d..f82dc34e 100644 --- a/client/core/models/protocols/cloakProtocolConfig.h +++ b/client/core/models/protocols/cloakProtocolConfig.h @@ -28,6 +28,9 @@ public: QJsonObject toJson() const override; + bool hasEqualServerSettings(const CloakProtocolConfig &other) const; + void clearClientSettings(); + cloak::ServerProtocolConfig serverProtocolConfig; cloak::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/core/models/protocols/openvpnProtocolConfig.cpp b/client/core/models/protocols/openvpnProtocolConfig.cpp index cf994566..4b4c8e85 100644 --- a/client/core/models/protocols/openvpnProtocolConfig.cpp +++ b/client/core/models/protocols/openvpnProtocolConfig.cpp @@ -1,20 +1,22 @@ #include "openvpnProtocolConfig.h" -#include #include "protocols/protocols_defs.h" +#include using namespace amnezia; -OpenVpnProtocolConfig::OpenVpnProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) : ProtocolConfig(protocolName) +OpenVpnProtocolConfig::OpenVpnProtocolConfig(const QJsonObject &protocolConfigObject, const QString &protocolName) + : ProtocolConfig(protocolName) { serverProtocolConfig.subnetAddress = protocolConfigObject.value(config_key::subnet_address).toString(); serverProtocolConfig.transportProto = protocolConfigObject.value(config_key::transport_proto).toString(); serverProtocolConfig.port = protocolConfigObject.value(config_key::port).toString(); - serverProtocolConfig.ncpDisable = protocolConfigObject.value(config_key::ncp_disable).toString(); + serverProtocolConfig.ncpDisable = protocolConfigObject.value(config_key::ncp_disable).toBool(protocols::openvpn::defaultNcpDisable); serverProtocolConfig.hash = protocolConfigObject.value(config_key::hash).toString(); serverProtocolConfig.cipher = protocolConfigObject.value(config_key::cipher).toString(); - serverProtocolConfig.tlsAuth = protocolConfigObject.value(config_key::tls_auth).toString(); - serverProtocolConfig.blockOutsideDns = protocolConfigObject.value(config_key::block_outside_dns).toString(); + serverProtocolConfig.tlsAuth = protocolConfigObject.value(config_key::tls_auth).toBool(protocols::openvpn::defaultTlsAuth); + serverProtocolConfig.blockOutsideDns = + protocolConfigObject.value(config_key::block_outside_dns).toBool(protocols::openvpn::defaultBlockOutsideDns); serverProtocolConfig.additionalClientConfig = protocolConfigObject.value(config_key::additional_client_config).toString(); serverProtocolConfig.additionalServerConfig = protocolConfigObject.value(config_key::additional_server_config).toString(); @@ -42,21 +44,15 @@ QJsonObject OpenVpnProtocolConfig::toJson() const if (!serverProtocolConfig.port.isEmpty()) { json[config_key::port] = serverProtocolConfig.port; } - if (!serverProtocolConfig.ncpDisable.isEmpty()) { - json[config_key::ncp_disable] = serverProtocolConfig.ncpDisable; - } + json[config_key::ncp_disable] = serverProtocolConfig.ncpDisable; if (!serverProtocolConfig.hash.isEmpty()) { json[config_key::hash] = serverProtocolConfig.hash; } if (!serverProtocolConfig.cipher.isEmpty()) { json[config_key::cipher] = serverProtocolConfig.cipher; } - if (!serverProtocolConfig.tlsAuth.isEmpty()) { - json[config_key::tls_auth] = serverProtocolConfig.tlsAuth; - } - if (!serverProtocolConfig.blockOutsideDns.isEmpty()) { - json[config_key::block_outside_dns] = serverProtocolConfig.blockOutsideDns; - } + json[config_key::tls_auth] = serverProtocolConfig.tlsAuth; + json[config_key::block_outside_dns] = serverProtocolConfig.blockOutsideDns; if (!serverProtocolConfig.additionalClientConfig.isEmpty()) { json[config_key::additional_client_config] = serverProtocolConfig.additionalClientConfig; } @@ -80,4 +76,25 @@ QJsonObject OpenVpnProtocolConfig::toJson() const } return json; -} +} + +bool OpenVpnProtocolConfig::hasEqualServerSettings(const OpenVpnProtocolConfig &other) const +{ + if (serverProtocolConfig.subnetAddress != other.serverProtocolConfig.subnetAddress + || serverProtocolConfig.transportProto != other.serverProtocolConfig.transportProto + || serverProtocolConfig.port != other.serverProtocolConfig.port + || serverProtocolConfig.ncpDisable != other.serverProtocolConfig.ncpDisable + || serverProtocolConfig.hash != other.serverProtocolConfig.hash || serverProtocolConfig.cipher != other.serverProtocolConfig.cipher + || serverProtocolConfig.tlsAuth != other.serverProtocolConfig.tlsAuth + || serverProtocolConfig.blockOutsideDns != other.serverProtocolConfig.blockOutsideDns + || serverProtocolConfig.additionalClientConfig != other.serverProtocolConfig.additionalClientConfig + || serverProtocolConfig.additionalServerConfig != other.serverProtocolConfig.additionalServerConfig) { + return false; + } + return true; +} + +void OpenVpnProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = openvpn::ClientProtocolConfig(); +} diff --git a/client/core/models/protocols/openvpnProtocolConfig.h b/client/core/models/protocols/openvpnProtocolConfig.h index 0e6d4e6a..89d44754 100644 --- a/client/core/models/protocols/openvpnProtocolConfig.h +++ b/client/core/models/protocols/openvpnProtocolConfig.h @@ -13,11 +13,11 @@ namespace openvpn QString subnetAddress; QString transportProto; QString port; - QString ncpDisable; + bool ncpDisable; QString hash; QString cipher; - QString tlsAuth; - QString blockOutsideDns; + bool tlsAuth; + bool blockOutsideDns; QString additionalClientConfig; QString additionalServerConfig; }; @@ -39,6 +39,9 @@ public: QJsonObject toJson() const override; + bool hasEqualServerSettings(const OpenVpnProtocolConfig &other) const; + void clearClientSettings(); + openvpn::ServerProtocolConfig serverProtocolConfig; openvpn::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/core/models/protocols/protocolConfig.cpp b/client/core/models/protocols/protocolConfig.cpp index 16e3ea9f..eb96c936 100644 --- a/client/core/models/protocols/protocolConfig.cpp +++ b/client/core/models/protocols/protocolConfig.cpp @@ -5,6 +5,7 @@ #include "core/models/protocols/openvpnProtocolConfig.h" #include "core/models/protocols/protocolConfig.h" #include "core/models/protocols/shadowsocksProtocolConfig.h" +#include "core/models/protocols/wireguardProtocolConfig.h" #include "core/models/protocols/xrayProtocolConfig.h" #include "protocols/protocols_defs.h" @@ -38,27 +39,27 @@ bool ProtocolConfig::isServerSettingsEqual(const QSharedPointer case Proto::OpenVpn: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); auto otherConfig = qSharedPointerCast(other); - return false; + return thisConfig->hasEqualServerSettings(*otherConfig.data()); } case Proto::WireGuard: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); auto otherConfig = qSharedPointerCast(other); - return false; + return thisConfig->hasEqualServerSettings(*otherConfig.data()); } case Proto::ShadowSocks: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); auto otherConfig = qSharedPointerCast(other); - return false; + return thisConfig->hasEqualServerSettings(*otherConfig.data()); } case Proto::Cloak: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); auto otherConfig = qSharedPointerCast(other); - return false; + return thisConfig->hasEqualServerSettings(*otherConfig.data()); } case Proto::Xray: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); auto otherConfig = qSharedPointerCast(other); - return false; + return thisConfig->hasEqualServerSettings(*otherConfig.data()); } case Proto::Awg: { auto thisConfig = qSharedPointerCast(QSharedPointer(this)); diff --git a/client/core/models/protocols/shadowsocksProtocolConfig.cpp b/client/core/models/protocols/shadowsocksProtocolConfig.cpp index e5f9b978..30539a9b 100644 --- a/client/core/models/protocols/shadowsocksProtocolConfig.cpp +++ b/client/core/models/protocols/shadowsocksProtocolConfig.cpp @@ -36,4 +36,18 @@ QJsonObject ShadowsocksProtocolConfig::toJson() const } return json; +} + +bool ShadowsocksProtocolConfig::hasEqualServerSettings(const ShadowsocksProtocolConfig &other) const +{ + if (serverProtocolConfig.port != other.serverProtocolConfig.port || + serverProtocolConfig.cipher != other.serverProtocolConfig.cipher) { + return false; + } + return true; +} + +void ShadowsocksProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = shadowsocks::ClientProtocolConfig(); } diff --git a/client/core/models/protocols/shadowsocksProtocolConfig.h b/client/core/models/protocols/shadowsocksProtocolConfig.h index 3c615f8a..1b7480f8 100644 --- a/client/core/models/protocols/shadowsocksProtocolConfig.h +++ b/client/core/models/protocols/shadowsocksProtocolConfig.h @@ -27,6 +27,9 @@ public: QJsonObject toJson() const override; + bool hasEqualServerSettings(const ShadowsocksProtocolConfig &other) const; + void clearClientSettings(); + shadowsocks::ServerProtocolConfig serverProtocolConfig; shadowsocks::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/core/models/protocols/wireguardProtocolConfig.cpp b/client/core/models/protocols/wireguardProtocolConfig.cpp index 602cbce5..c44173d2 100644 --- a/client/core/models/protocols/wireguardProtocolConfig.cpp +++ b/client/core/models/protocols/wireguardProtocolConfig.cpp @@ -118,3 +118,17 @@ QJsonObject WireGuardProtocolConfig::toJson() const return json; } + +bool WireGuardProtocolConfig::hasEqualServerSettings(const WireGuardProtocolConfig &other) const +{ + if (serverProtocolConfig.subnetAddress != other.serverProtocolConfig.subnetAddress || + serverProtocolConfig.port != other.serverProtocolConfig.port) { + return false; + } + return true; +} + +void WireGuardProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = wireguard::ClientProtocolConfig(); +} diff --git a/client/core/models/protocols/wireguardProtocolConfig.h b/client/core/models/protocols/wireguardProtocolConfig.h index acefafe2..7d3f6620 100644 --- a/client/core/models/protocols/wireguardProtocolConfig.h +++ b/client/core/models/protocols/wireguardProtocolConfig.h @@ -51,6 +51,9 @@ public: QJsonObject toJson() const override; + bool hasEqualServerSettings(const WireGuardProtocolConfig &other) const; + void clearClientSettings(); + wireguard::ServerProtocolConfig serverProtocolConfig; wireguard::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/core/models/protocols/xrayProtocolConfig.cpp b/client/core/models/protocols/xrayProtocolConfig.cpp index 32ad108a..00127031 100644 --- a/client/core/models/protocols/xrayProtocolConfig.cpp +++ b/client/core/models/protocols/xrayProtocolConfig.cpp @@ -40,4 +40,19 @@ QJsonObject XrayProtocolConfig::toJson() const } return json; +} + +bool XrayProtocolConfig::hasEqualServerSettings(const XrayProtocolConfig &other) const +{ + if (serverProtocolConfig.site != other.serverProtocolConfig.site || + serverProtocolConfig.port != other.serverProtocolConfig.port || + serverProtocolConfig.transportProto != other.serverProtocolConfig.transportProto) { + return false; + } + return true; +} + +void XrayProtocolConfig::clearClientSettings() +{ + clientProtocolConfig = xray::ClientProtocolConfig(); } diff --git a/client/core/models/protocols/xrayProtocolConfig.h b/client/core/models/protocols/xrayProtocolConfig.h index 87023954..941816fe 100644 --- a/client/core/models/protocols/xrayProtocolConfig.h +++ b/client/core/models/protocols/xrayProtocolConfig.h @@ -28,6 +28,9 @@ public: QJsonObject toJson() const override; + bool hasEqualServerSettings(const XrayProtocolConfig &other) const; + void clearClientSettings(); + xray::ServerProtocolConfig serverProtocolConfig; xray::ClientProtocolConfig clientProtocolConfig; }; diff --git a/client/ui/controllers/installController.cpp b/client/ui/controllers/installController.cpp index 80ef5090..c12beb2d 100755 --- a/client/ui/controllers/installController.cpp +++ b/client/ui/controllers/installController.cpp @@ -80,7 +80,7 @@ void InstallController::install(DockerContainer container, int port, TransportPr int s1 = QRandomGenerator::global()->bounded(15, 150); int s2 = QRandomGenerator::global()->bounded(15, 150); - while (s1 + AwgConstant::messageInitiationSize == s2 + AwgConstant::messageResponseSize) { + while (s1 + awg::messageInitiationSize == s2 + awg::messageResponseSize) { s2 = QRandomGenerator::global()->bounded(15, 150); } @@ -935,6 +935,11 @@ bool InstallController::isUpdateDockerContainerRequired(const DockerContainer co auto oldConfig = qSharedPointerCast(newProtoConfig); return !newConfig->hasEqualServerSettings(*oldConfig.data()); } + case Proto::WireGuard: { + auto newConfig = qSharedPointerCast(oldProtoConfig); + auto oldConfig = qSharedPointerCast(newProtoConfig); + return !newConfig->hasEqualServerSettings(*oldConfig.data()); + } default: return true; } } diff --git a/client/ui/models/containers_model.cpp b/client/ui/models/containers_model.cpp index 817004ae..fa92088d 100644 --- a/client/ui/models/containers_model.cpp +++ b/client/ui/models/containers_model.cpp @@ -24,12 +24,6 @@ QVariant ContainersModel::data(const QModelIndex &index, int role) const case NameRole: return ContainerProps::containerHumanNames().value(container); case DescriptionRole: return ContainerProps::containerDescriptions().value(container); case DetailedDescriptionRole: return ContainerProps::containerDetailedDescriptions().value(container); - case ConfigRole: { - if (container == DockerContainer::None) { - return QJsonObject(); - } - return m_containers.value(container); - } case ServiceTypeRole: return ContainerProps::containerService(container); case DockerContainerRole: return container; case IsEasySetupContainerRole: return ContainerProps::isEasySetupContainer(container); @@ -74,11 +68,6 @@ QString ContainersModel::getProcessedContainerName() return ContainerProps::containerHumanNames().value(static_cast(m_processedContainerIndex)); } -QJsonObject ContainersModel::getContainerConfig(const int containerIndex) -{ - return qvariant_cast(data(index(containerIndex), ConfigRole)); -} - bool ContainersModel::isSupportedByCurrentPlatform(const int containerIndex) { return qvariant_cast(data(index(containerIndex), IsSupportedRole)); @@ -117,7 +106,6 @@ QHash ContainersModel::roleNames() const roles[DetailedDescriptionRole] = "detailedDescription"; roles[ServiceTypeRole] = "serviceType"; roles[DockerContainerRole] = "dockerContainer"; - roles[ConfigRole] = "config"; roles[IsEasySetupContainerRole] = "isEasySetupContainer"; roles[EasySetupHeaderRole] = "easySetupHeader"; diff --git a/client/ui/models/containers_model.h b/client/ui/models/containers_model.h index 9d1407a1..d471c58a 100644 --- a/client/ui/models/containers_model.h +++ b/client/ui/models/containers_model.h @@ -18,7 +18,6 @@ public: DescriptionRole, DetailedDescriptionRole, ServiceTypeRole, - ConfigRole, DockerContainerRole, IsEasySetupContainerRole, @@ -48,8 +47,6 @@ public slots: QString getProcessedContainerName(); - QJsonObject getContainerConfig(const int containerIndex); - bool isSupportedByCurrentPlatform(const int containerIndex); bool isServiceContainer(const int containerIndex); diff --git a/client/ui/models/protocols/cloakConfigModel.cpp b/client/ui/models/protocols/cloakConfigModel.cpp index a9f06f4d..321ec9e6 100644 --- a/client/ui/models/protocols/cloakConfigModel.cpp +++ b/client/ui/models/protocols/cloakConfigModel.cpp @@ -2,7 +2,10 @@ #include "protocols/protocols_defs.h" -CloakConfigModel::CloakConfigModel(QObject *parent) : QAbstractListModel(parent) +CloakConfigModel::CloakConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newCloakProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::Cloak)), + m_oldCloakProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::Cloak)) { } @@ -19,9 +22,9 @@ bool CloakConfigModel::setData(const QModelIndex &index, const QVariant &value, } switch (role) { - case Roles::PortRole: m_protocolConfig.insert(config_key::port, value.toString()); break; - case Roles::CipherRole: m_protocolConfig.insert(config_key::cipher, value.toString()); break; - case Roles::SiteRole: m_protocolConfig.insert(config_key::site, value.toString()); break; + case Roles::PortRole: m_newCloakProtocolConfig.serverProtocolConfig.port = value.toString(); break; + case Roles::CipherRole: m_newCloakProtocolConfig.serverProtocolConfig.cipher = value.toString(); break; + case Roles::SiteRole: m_newCloakProtocolConfig.serverProtocolConfig.site = value.toString(); break; } emit dataChanged(index, index, QList { role }); @@ -35,35 +38,33 @@ QVariant CloakConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::PortRole: return m_protocolConfig.value(config_key::port).toString(protocols::cloak::defaultPort); - case Roles::CipherRole: return m_protocolConfig.value(config_key::cipher).toString(protocols::cloak::defaultCipher); - case Roles::SiteRole: return m_protocolConfig.value(config_key::site).toString(protocols::cloak::defaultRedirSite); + case Roles::PortRole: return m_newCloakProtocolConfig.serverProtocolConfig.port; + case Roles::CipherRole: return m_newCloakProtocolConfig.serverProtocolConfig.cipher; + case Roles::SiteRole: return m_newCloakProtocolConfig.serverProtocolConfig.site; } return QVariant(); } -void CloakConfigModel::updateModel(const QJsonObject &config) +void CloakConfigModel::updateModel(const CloakProtocolConfig cloakProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - QJsonObject protocolConfig = config.value(config_key::cloak).toObject(); - - auto defaultTransportProto = ProtocolProps::transportProtoToString(ProtocolProps::defaultTransportProto(Proto::Cloak), Proto::Cloak); - m_protocolConfig.insert(config_key::transport_proto, protocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); - m_protocolConfig.insert(config_key::cipher, protocolConfig.value(config_key::cipher).toString(protocols::cloak::defaultCipher)); - m_protocolConfig.insert(config_key::port, protocolConfig.value(config_key::port).toString(protocols::cloak::defaultPort)); - m_protocolConfig.insert(config_key::site, protocolConfig.value(config_key::site).toString(protocols::cloak::defaultRedirSite)); - + m_newCloakProtocolConfig = cloakProtocolConfig; + m_oldCloakProtocolConfig = cloakProtocolConfig; endResetModel(); } -QJsonObject CloakConfigModel::getConfig() +QSharedPointer CloakConfigModel::getConfig() { - m_fullConfig.insert(config_key::cloak, m_protocolConfig); - return m_fullConfig; + if (m_oldCloakProtocolConfig.hasEqualServerSettings(m_newCloakProtocolConfig)) { + m_newCloakProtocolConfig.clearClientSettings(); + } + return QSharedPointer::create(m_newCloakProtocolConfig); +} + +bool CloakConfigModel::isServerSettingsEqual() +{ + return m_oldCloakProtocolConfig.hasEqualServerSettings(m_newCloakProtocolConfig); } QHash CloakConfigModel::roleNames() const @@ -76,3 +77,4 @@ QHash CloakConfigModel::roleNames() const return roles; } + diff --git a/client/ui/models/protocols/cloakConfigModel.h b/client/ui/models/protocols/cloakConfigModel.h index 31ff8c53..8de8d305 100644 --- a/client/ui/models/protocols/cloakConfigModel.h +++ b/client/ui/models/protocols/cloakConfigModel.h @@ -5,6 +5,7 @@ #include #include "containers/containers_defs.h" +#include "core/models/protocols/cloakProtocolConfig.h" class CloakConfigModel : public QAbstractListModel { @@ -25,16 +26,17 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const CloakProtocolConfig cloakProtocolConfig); + QSharedPointer getConfig(); + + bool isServerSettingsEqual(); protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_protocolConfig; - QJsonObject m_fullConfig; + CloakProtocolConfig m_newCloakProtocolConfig; + CloakProtocolConfig m_oldCloakProtocolConfig; }; #endif // CLOAKCONFIGMODEL_H diff --git a/client/ui/models/protocols/openvpnConfigModel.cpp b/client/ui/models/protocols/openvpnConfigModel.cpp index a04c2b1a..96f46ba0 100644 --- a/client/ui/models/protocols/openvpnConfigModel.cpp +++ b/client/ui/models/protocols/openvpnConfigModel.cpp @@ -2,7 +2,10 @@ #include "protocols/protocols_defs.h" -OpenVpnConfigModel::OpenVpnConfigModel(QObject *parent) : QAbstractListModel(parent) +OpenVpnConfigModel::OpenVpnConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newOpenVpnProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::OpenVpn)), + m_oldOpenVpnProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::OpenVpn)) { } @@ -19,16 +22,16 @@ bool OpenVpnConfigModel::setData(const QModelIndex &index, const QVariant &value } switch (role) { - case Roles::SubnetAddressRole: m_protocolConfig.insert(amnezia::config_key::subnet_address, value.toString()); break; - case Roles::TransportProtoRole: m_protocolConfig.insert(config_key::transport_proto, value.toString()); break; - case Roles::PortRole: m_protocolConfig.insert(config_key::port, value.toString()); break; - case Roles::AutoNegotiateEncryprionRole: m_protocolConfig.insert(config_key::ncp_disable, !value.toBool()); break; - case Roles::HashRole: m_protocolConfig.insert(config_key::hash, value.toString()); break; - case Roles::CipherRole: m_protocolConfig.insert(config_key::cipher, value.toString()); break; - case Roles::TlsAuthRole: m_protocolConfig.insert(config_key::tls_auth, value.toBool()); break; - case Roles::BlockDnsRole: m_protocolConfig.insert(config_key::block_outside_dns, value.toBool()); break; - case Roles::AdditionalClientCommandsRole: m_protocolConfig.insert(config_key::additional_client_config, value.toString()); break; - case Roles::AdditionalServerCommandsRole: m_protocolConfig.insert(config_key::additional_server_config, value.toString()); break; + case Roles::SubnetAddressRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.subnetAddress = value.toString(); break; + case Roles::TransportProtoRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.transportProto = value.toString(); break; + case Roles::PortRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.port = value.toString(); break; + case Roles::AutoNegotiateEncryprionRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.ncpDisable = !value.toBool(); break; + case Roles::HashRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.hash = value.toString(); break; + case Roles::CipherRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.cipher = value.toString(); break; + case Roles::TlsAuthRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.tlsAuth = value.toBool(); break; + case Roles::BlockDnsRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.blockOutsideDns = value.toBool(); break; + case Roles::AdditionalClientCommandsRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.additionalClientConfig = value.toString(); break; + case Roles::AdditionalServerCommandsRole: m_newOpenVpnProtocolConfig.serverProtocolConfig.additionalServerConfig = value.toString(); break; } emit dataChanged(index, index, QList { role }); @@ -42,72 +45,42 @@ QVariant OpenVpnConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::SubnetAddressRole: - return m_protocolConfig.value(amnezia::config_key::subnet_address).toString(amnezia::protocols::openvpn::defaultSubnetAddress); - case Roles::TransportProtoRole: - return m_protocolConfig.value(config_key::transport_proto).toString(protocols::openvpn::defaultTransportProto); - case Roles::PortRole: return m_protocolConfig.value(config_key::port).toString(protocols::openvpn::defaultPort); - case Roles::AutoNegotiateEncryprionRole: - return !m_protocolConfig.value(config_key::ncp_disable).toBool(protocols::openvpn::defaultNcpDisable); - case Roles::HashRole: return m_protocolConfig.value(config_key::hash).toString(protocols::openvpn::defaultHash); - case Roles::CipherRole: return m_protocolConfig.value(config_key::cipher).toString(protocols::openvpn::defaultCipher); - case Roles::TlsAuthRole: return m_protocolConfig.value(config_key::tls_auth).toBool(protocols::openvpn::defaultTlsAuth); - case Roles::BlockDnsRole: - return m_protocolConfig.value(config_key::block_outside_dns).toBool(protocols::openvpn::defaultBlockOutsideDns); - case Roles::AdditionalClientCommandsRole: - return m_protocolConfig.value(config_key::additional_client_config).toString(protocols::openvpn::defaultAdditionalClientConfig); - case Roles::AdditionalServerCommandsRole: - return m_protocolConfig.value(config_key::additional_server_config).toString(protocols::openvpn::defaultAdditionalServerConfig); - case Roles::IsPortEditable: return m_container == DockerContainer::OpenVpn ? true : false; - case Roles::IsTransportProtoEditable: return m_container == DockerContainer::OpenVpn ? true : false; - case Roles::HasRemoveButton: return m_container == DockerContainer::OpenVpn ? true : false; + case Roles::SubnetAddressRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.subnetAddress; + case Roles::TransportProtoRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.transportProto; + case Roles::PortRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.port; + case Roles::AutoNegotiateEncryprionRole: return !m_newOpenVpnProtocolConfig.serverProtocolConfig.ncpDisable; + case Roles::HashRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.hash; + case Roles::CipherRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.cipher; + case Roles::TlsAuthRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.tlsAuth; + case Roles::BlockDnsRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.blockOutsideDns; + case Roles::AdditionalClientCommandsRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.additionalClientConfig; + case Roles::AdditionalServerCommandsRole: return m_newOpenVpnProtocolConfig.serverProtocolConfig.additionalServerConfig; + case Roles::IsPortEditable: return true; // TODO: implement container check if needed + case Roles::IsTransportProtoEditable: return true; // TODO: implement container check if needed + case Roles::HasRemoveButton: return true; // TODO: implement container check if needed } return QVariant(); } -void OpenVpnConfigModel::updateModel(const QJsonObject &config) +void OpenVpnConfigModel::updateModel(const OpenVpnProtocolConfig openVpnProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - QJsonObject protocolConfig = config.value(config_key::openvpn).toObject(); - - m_protocolConfig.insert( - config_key::subnet_address, - protocolConfig.value(amnezia::config_key::subnet_address).toString(amnezia::protocols::openvpn::defaultSubnetAddress)); - - QString transportProto; - if (m_container == DockerContainer::OpenVpn) { - transportProto = protocolConfig.value(config_key::transport_proto).toString(protocols::openvpn::defaultTransportProto); - } else { - transportProto = "tcp"; - } - - m_protocolConfig.insert(config_key::transport_proto, transportProto); - - m_protocolConfig.insert(config_key::ncp_disable, - protocolConfig.value(config_key::ncp_disable).toBool(protocols::openvpn::defaultNcpDisable)); - m_protocolConfig.insert(config_key::cipher, protocolConfig.value(config_key::cipher).toString(protocols::openvpn::defaultCipher)); - m_protocolConfig.insert(config_key::hash, protocolConfig.value(config_key::hash).toString(protocols::openvpn::defaultHash)); - m_protocolConfig.insert(config_key::block_outside_dns, - protocolConfig.value(config_key::block_outside_dns).toBool(protocols::openvpn::defaultBlockOutsideDns)); - m_protocolConfig.insert(config_key::port, protocolConfig.value(config_key::port).toString(protocols::openvpn::defaultPort)); - m_protocolConfig.insert(config_key::tls_auth, protocolConfig.value(config_key::tls_auth).toBool(protocols::openvpn::defaultTlsAuth)); - m_protocolConfig.insert( - config_key::additional_client_config, - protocolConfig.value(config_key::additional_client_config).toString(protocols::openvpn::defaultAdditionalClientConfig)); - m_protocolConfig.insert( - config_key::additional_server_config, - protocolConfig.value(config_key::additional_server_config).toString(protocols::openvpn::defaultAdditionalServerConfig)); - + m_newOpenVpnProtocolConfig = openVpnProtocolConfig; + m_oldOpenVpnProtocolConfig = openVpnProtocolConfig; endResetModel(); } -QJsonObject OpenVpnConfigModel::getConfig() +QSharedPointer OpenVpnConfigModel::getConfig() { - m_fullConfig.insert(config_key::openvpn, m_protocolConfig); - return m_fullConfig; + if (m_oldOpenVpnProtocolConfig.hasEqualServerSettings(m_newOpenVpnProtocolConfig)) { + m_newOpenVpnProtocolConfig.clearClientSettings(); + } + return QSharedPointer::create(m_newOpenVpnProtocolConfig); +} + +bool OpenVpnConfigModel::isServerSettingsEqual() +{ + return m_oldOpenVpnProtocolConfig.hasEqualServerSettings(m_newOpenVpnProtocolConfig); } QHash OpenVpnConfigModel::roleNames() const diff --git a/client/ui/models/protocols/openvpnConfigModel.h b/client/ui/models/protocols/openvpnConfigModel.h index 0357700c..0105c926 100644 --- a/client/ui/models/protocols/openvpnConfigModel.h +++ b/client/ui/models/protocols/openvpnConfigModel.h @@ -5,6 +5,7 @@ #include #include "containers/containers_defs.h" +#include "core/models/protocols/openvpnProtocolConfig.h" class OpenVpnConfigModel : public QAbstractListModel { @@ -37,16 +38,17 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const OpenVpnProtocolConfig openVpnProtocolConfig); + QSharedPointer getConfig(); + + bool isServerSettingsEqual(); protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_protocolConfig; - QJsonObject m_fullConfig; + OpenVpnProtocolConfig m_newOpenVpnProtocolConfig; + OpenVpnProtocolConfig m_oldOpenVpnProtocolConfig; }; #endif // OPENVPNCONFIGMODEL_H diff --git a/client/ui/models/protocols/shadowsocksConfigModel.cpp b/client/ui/models/protocols/shadowsocksConfigModel.cpp index 769bef20..064bd070 100644 --- a/client/ui/models/protocols/shadowsocksConfigModel.cpp +++ b/client/ui/models/protocols/shadowsocksConfigModel.cpp @@ -2,7 +2,10 @@ #include "protocols/protocols_defs.h" -ShadowSocksConfigModel::ShadowSocksConfigModel(QObject *parent) : QAbstractListModel(parent) +ShadowSocksConfigModel::ShadowSocksConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newShadowsocksProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::ShadowSocks)), + m_oldShadowsocksProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::ShadowSocks)) { } @@ -19,8 +22,8 @@ bool ShadowSocksConfigModel::setData(const QModelIndex &index, const QVariant &v } switch (role) { - case Roles::PortRole: m_protocolConfig.insert(config_key::port, value.toString()); break; - case Roles::CipherRole: m_protocolConfig.insert(config_key::cipher, value.toString()); break; + case Roles::PortRole: m_newShadowsocksProtocolConfig.serverProtocolConfig.port = value.toString(); break; + case Roles::CipherRole: m_newShadowsocksProtocolConfig.serverProtocolConfig.cipher = value.toString(); break; } emit dataChanged(index, index, QList { role }); @@ -34,36 +37,34 @@ QVariant ShadowSocksConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::PortRole: return m_protocolConfig.value(config_key::port).toString(protocols::shadowsocks::defaultPort); - case Roles::CipherRole: return m_protocolConfig.value(config_key::cipher).toString(protocols::shadowsocks::defaultCipher); - case Roles::IsPortEditableRole: return m_container == DockerContainer::ShadowSocks ? true : false; - case Roles::IsCipherEditableRole: return m_container == DockerContainer::ShadowSocks ? true : false; + case Roles::PortRole: return m_newShadowsocksProtocolConfig.serverProtocolConfig.port; + case Roles::CipherRole: return m_newShadowsocksProtocolConfig.serverProtocolConfig.cipher; + case Roles::IsPortEditableRole: return true; // TODO: implement container check if needed + case Roles::IsCipherEditableRole: return true; // TODO: implement container check if needed } return QVariant(); } -void ShadowSocksConfigModel::updateModel(const QJsonObject &config) +void ShadowSocksConfigModel::updateModel(const ShadowsocksProtocolConfig shadowsocksProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - QJsonObject protocolConfig = config.value(config_key::shadowsocks).toObject(); - - auto defaultTransportProto = ProtocolProps::transportProtoToString(ProtocolProps::defaultTransportProto(Proto::ShadowSocks), Proto::ShadowSocks); - m_protocolConfig.insert(config_key::transport_proto, - protocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); - m_protocolConfig.insert(config_key::cipher, protocolConfig.value(config_key::cipher).toString(protocols::shadowsocks::defaultCipher)); - m_protocolConfig.insert(config_key::port, protocolConfig.value(config_key::port).toString(protocols::shadowsocks::defaultPort)); - + m_newShadowsocksProtocolConfig = shadowsocksProtocolConfig; + m_oldShadowsocksProtocolConfig = shadowsocksProtocolConfig; endResetModel(); } -QJsonObject ShadowSocksConfigModel::getConfig() +QSharedPointer ShadowSocksConfigModel::getConfig() { - m_fullConfig.insert(config_key::shadowsocks, m_protocolConfig); - return m_fullConfig; + if (m_oldShadowsocksProtocolConfig.hasEqualServerSettings(m_newShadowsocksProtocolConfig)) { + m_newShadowsocksProtocolConfig.clearClientSettings(); + } + return QSharedPointer::create(m_newShadowsocksProtocolConfig); +} + +bool ShadowSocksConfigModel::isServerSettingsEqual() +{ + return m_oldShadowsocksProtocolConfig.hasEqualServerSettings(m_newShadowsocksProtocolConfig); } QHash ShadowSocksConfigModel::roleNames() const @@ -77,3 +78,4 @@ QHash ShadowSocksConfigModel::roleNames() const return roles; } + diff --git a/client/ui/models/protocols/shadowsocksConfigModel.h b/client/ui/models/protocols/shadowsocksConfigModel.h index 566df768..21b05b31 100644 --- a/client/ui/models/protocols/shadowsocksConfigModel.h +++ b/client/ui/models/protocols/shadowsocksConfigModel.h @@ -5,6 +5,7 @@ #include #include "containers/containers_defs.h" +#include "core/models/protocols/shadowsocksProtocolConfig.h" class ShadowSocksConfigModel : public QAbstractListModel { @@ -26,16 +27,17 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const ShadowsocksProtocolConfig shadowsocksProtocolConfig); + QSharedPointer getConfig(); + + bool isServerSettingsEqual(); protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_protocolConfig; - QJsonObject m_fullConfig; + ShadowsocksProtocolConfig m_newShadowsocksProtocolConfig; + ShadowsocksProtocolConfig m_oldShadowsocksProtocolConfig; }; #endif // SHADOWSOCKSCONFIGMODEL_H diff --git a/client/ui/models/protocols/wireguardConfigModel.cpp b/client/ui/models/protocols/wireguardConfigModel.cpp index 1c8e1341..a8b02272 100644 --- a/client/ui/models/protocols/wireguardConfigModel.cpp +++ b/client/ui/models/protocols/wireguardConfigModel.cpp @@ -4,7 +4,10 @@ #include "protocols/protocols_defs.h" -WireGuardConfigModel::WireGuardConfigModel(QObject *parent) : QAbstractListModel(parent) +WireGuardConfigModel::WireGuardConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newWireGuardProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::WireGuard)), + m_oldWireGuardProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::WireGuard)) { } @@ -21,9 +24,9 @@ bool WireGuardConfigModel::setData(const QModelIndex &index, const QVariant &val } switch (role) { - case Roles::SubnetAddressRole: m_serverProtocolConfig.insert(config_key::subnet_address, value.toString()); break; - case Roles::PortRole: m_serverProtocolConfig.insert(config_key::port, value.toString()); break; - case Roles::ClientMtuRole: m_clientProtocolConfig.insert(config_key::mtu, value.toString()); break; + case Roles::SubnetAddressRole: m_newWireGuardProtocolConfig.serverProtocolConfig.subnetAddress = value.toString(); break; + case Roles::PortRole: m_newWireGuardProtocolConfig.serverProtocolConfig.port = value.toString(); break; + case Roles::ClientMtuRole: m_newWireGuardProtocolConfig.clientProtocolConfig.wireGuardData.mtu = value.toString(); break; } emit dataChanged(index, index, QList { role }); @@ -37,62 +40,33 @@ QVariant WireGuardConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::SubnetAddressRole: return m_serverProtocolConfig.value(config_key::subnet_address).toString(); - case Roles::PortRole: return m_serverProtocolConfig.value(config_key::port).toString(); - case Roles::ClientMtuRole: return m_clientProtocolConfig.value(config_key::mtu); + case Roles::SubnetAddressRole: return m_newWireGuardProtocolConfig.serverProtocolConfig.subnetAddress; + case Roles::PortRole: return m_newWireGuardProtocolConfig.serverProtocolConfig.port; + case Roles::ClientMtuRole: return m_newWireGuardProtocolConfig.clientProtocolConfig.wireGuardData.mtu; } return QVariant(); } -void WireGuardConfigModel::updateModel(const QJsonObject &config) +void WireGuardConfigModel::updateModel(const WireGuardProtocolConfig wireGuardProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - QJsonObject serverProtocolConfig = config.value(config_key::wireguard).toObject(); - - auto defaultTransportProto = - ProtocolProps::transportProtoToString(ProtocolProps::defaultTransportProto(Proto::WireGuard), Proto::WireGuard); - m_serverProtocolConfig.insert(config_key::transport_proto, - serverProtocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); - m_serverProtocolConfig[config_key::last_config] = serverProtocolConfig.value(config_key::last_config); - m_serverProtocolConfig[config_key::subnet_address] = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); - m_serverProtocolConfig[config_key::port] = serverProtocolConfig.value(config_key::port).toString(protocols::wireguard::defaultPort); - - auto lastConfig = m_serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject clientProtocolConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - m_clientProtocolConfig[config_key::mtu] = clientProtocolConfig[config_key::mtu].toString(protocols::wireguard::defaultMtu); - + m_newWireGuardProtocolConfig = wireGuardProtocolConfig; + m_oldWireGuardProtocolConfig = wireGuardProtocolConfig; endResetModel(); } -QJsonObject WireGuardConfigModel::getConfig() +QSharedPointer WireGuardConfigModel::getConfig() { - const WgConfig oldConfig(m_fullConfig.value(config_key::wireguard).toObject()); - const WgConfig newConfig(m_serverProtocolConfig); - - if (!oldConfig.hasEqualServerSettings(newConfig)) { - m_serverProtocolConfig.remove(config_key::last_config); - } else { - auto lastConfig = m_serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject jsonConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - jsonConfig[config_key::mtu] = m_clientProtocolConfig[config_key::mtu]; - - m_serverProtocolConfig[config_key::last_config] = QString(QJsonDocument(jsonConfig).toJson()); + if (m_oldWireGuardProtocolConfig.hasEqualServerSettings(m_newWireGuardProtocolConfig)) { + m_newWireGuardProtocolConfig.clearClientSettings(); } - - m_fullConfig.insert(config_key::wireguard, m_serverProtocolConfig); - return m_fullConfig; + return QSharedPointer::create(m_newWireGuardProtocolConfig); } bool WireGuardConfigModel::isServerSettingsEqual() { - const WgConfig oldConfig(m_fullConfig.value(config_key::wireguard).toObject()); - const WgConfig newConfig(m_serverProtocolConfig); - - return oldConfig.hasEqualServerSettings(newConfig); + return m_oldWireGuardProtocolConfig.hasEqualServerSettings(m_newWireGuardProtocolConfig); } QHash WireGuardConfigModel::roleNames() const @@ -105,29 +79,3 @@ QHash WireGuardConfigModel::roleNames() const return roles; } - -WgConfig::WgConfig(const QJsonObject &serverProtocolConfig) -{ - auto lastConfig = serverProtocolConfig.value(config_key::last_config).toString(); - QJsonObject clientProtocolConfig = QJsonDocument::fromJson(lastConfig.toUtf8()).object(); - clientMtu = clientProtocolConfig[config_key::mtu].toString(protocols::wireguard::defaultMtu); - - subnetAddress = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); - port = serverProtocolConfig.value(config_key::port).toString(protocols::wireguard::defaultPort); -} - -bool WgConfig::hasEqualServerSettings(const WgConfig &other) const -{ - if (subnetAddress != other.subnetAddress || port != other.port) { - return false; - } - return true; -} - -bool WgConfig::hasEqualClientSettings(const WgConfig &other) const -{ - if (clientMtu != other.clientMtu) { - return false; - } - return true; -} diff --git a/client/ui/models/protocols/wireguardConfigModel.h b/client/ui/models/protocols/wireguardConfigModel.h index b1ce2d61..9010d9b4 100644 --- a/client/ui/models/protocols/wireguardConfigModel.h +++ b/client/ui/models/protocols/wireguardConfigModel.h @@ -5,19 +5,7 @@ #include #include "containers/containers_defs.h" - -struct WgConfig -{ - WgConfig(const QJsonObject &jsonConfig); - - QString subnetAddress; - QString port; - QString clientMtu; - - bool hasEqualServerSettings(const WgConfig &other) const; - bool hasEqualClientSettings(const WgConfig &other) const; - -}; +#include "core/models/protocols/wireguardProtocolConfig.h" class WireGuardConfigModel : public QAbstractListModel { @@ -38,8 +26,8 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const WireGuardProtocolConfig wireGuardProtocolConfig); + QSharedPointer getConfig(); bool isServerSettingsEqual(); @@ -47,10 +35,8 @@ protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_serverProtocolConfig; - QJsonObject m_clientProtocolConfig; - QJsonObject m_fullConfig; + WireGuardProtocolConfig m_newWireGuardProtocolConfig; + WireGuardProtocolConfig m_oldWireGuardProtocolConfig; }; #endif // WIREGUARDCONFIGMODEL_H diff --git a/client/ui/models/protocols/xrayConfigModel.cpp b/client/ui/models/protocols/xrayConfigModel.cpp index 3917b544..fdcf15e3 100644 --- a/client/ui/models/protocols/xrayConfigModel.cpp +++ b/client/ui/models/protocols/xrayConfigModel.cpp @@ -2,7 +2,10 @@ #include "protocols/protocols_defs.h" -XrayConfigModel::XrayConfigModel(QObject *parent) : QAbstractListModel(parent) +XrayConfigModel::XrayConfigModel(QObject *parent) + : QAbstractListModel(parent), + m_newXrayProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::Xray)), + m_oldXrayProtocolConfig(QJsonObject(), ProtocolProps::protoToString(Proto::Xray)) { } @@ -19,8 +22,8 @@ bool XrayConfigModel::setData(const QModelIndex &index, const QVariant &value, i } switch (role) { - case Roles::SiteRole: m_protocolConfig.insert(config_key::site, value.toString()); break; - case Roles::PortRole: m_protocolConfig.insert(config_key::port, value.toString()); break; + case Roles::SiteRole: m_newXrayProtocolConfig.serverProtocolConfig.site = value.toString(); break; + case Roles::PortRole: m_newXrayProtocolConfig.serverProtocolConfig.port = value.toString(); break; } emit dataChanged(index, index, QList { role }); @@ -34,34 +37,32 @@ QVariant XrayConfigModel::data(const QModelIndex &index, int role) const } switch (role) { - case Roles::SiteRole: return m_protocolConfig.value(config_key::site).toString(protocols::xray::defaultSite); - case Roles::PortRole: return m_protocolConfig.value(config_key::port).toString(protocols::xray::defaultPort); + case Roles::SiteRole: return m_newXrayProtocolConfig.serverProtocolConfig.site; + case Roles::PortRole: return m_newXrayProtocolConfig.serverProtocolConfig.port; } return QVariant(); } -void XrayConfigModel::updateModel(const QJsonObject &config) +void XrayConfigModel::updateModel(const XrayProtocolConfig xrayProtocolConfig) { beginResetModel(); - m_container = ContainerProps::containerFromString(config.value(config_key::container).toString()); - - m_fullConfig = config; - QJsonObject protocolConfig = config.value(config_key::xray).toObject(); - - auto defaultTransportProto = ProtocolProps::transportProtoToString(ProtocolProps::defaultTransportProto(Proto::Xray), Proto::Xray); - m_protocolConfig.insert(config_key::transport_proto, - protocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); - m_protocolConfig.insert(config_key::port, protocolConfig.value(config_key::port).toString(protocols::xray::defaultPort)); - m_protocolConfig.insert(config_key::site, protocolConfig.value(config_key::site).toString(protocols::xray::defaultSite)); - + m_newXrayProtocolConfig = xrayProtocolConfig; + m_oldXrayProtocolConfig = xrayProtocolConfig; endResetModel(); } -QJsonObject XrayConfigModel::getConfig() +QSharedPointer XrayConfigModel::getConfig() { - m_fullConfig.insert(config_key::xray, m_protocolConfig); - return m_fullConfig; + if (m_oldXrayProtocolConfig.hasEqualServerSettings(m_newXrayProtocolConfig)) { + m_newXrayProtocolConfig.clearClientSettings(); + } + return QSharedPointer::create(m_newXrayProtocolConfig); +} + +bool XrayConfigModel::isServerSettingsEqual() +{ + return m_oldXrayProtocolConfig.hasEqualServerSettings(m_newXrayProtocolConfig); } QHash XrayConfigModel::roleNames() const @@ -73,3 +74,4 @@ QHash XrayConfigModel::roleNames() const return roles; } + diff --git a/client/ui/models/protocols/xrayConfigModel.h b/client/ui/models/protocols/xrayConfigModel.h index 41aac589..519d7fb4 100644 --- a/client/ui/models/protocols/xrayConfigModel.h +++ b/client/ui/models/protocols/xrayConfigModel.h @@ -5,6 +5,7 @@ #include #include "containers/containers_defs.h" +#include "core/models/protocols/xrayProtocolConfig.h" class XrayConfigModel : public QAbstractListModel { @@ -24,16 +25,17 @@ public: QVariant data(const QModelIndex &index, int role = Qt::DisplayRole) const override; public slots: - void updateModel(const QJsonObject &config); - QJsonObject getConfig(); + void updateModel(const XrayProtocolConfig xrayProtocolConfig); + QSharedPointer getConfig(); + + bool isServerSettingsEqual(); protected: QHash roleNames() const override; private: - DockerContainer m_container; - QJsonObject m_protocolConfig; - QJsonObject m_fullConfig; + XrayProtocolConfig m_newXrayProtocolConfig; + XrayProtocolConfig m_oldXrayProtocolConfig; }; #endif // XRAYCONFIGMODEL_H diff --git a/client/ui/models/protocols_model.cpp b/client/ui/models/protocols_model.cpp index 6a996ec0..add32488 100644 --- a/client/ui/models/protocols_model.cpp +++ b/client/ui/models/protocols_model.cpp @@ -16,7 +16,9 @@ ProtocolsModel::ProtocolsModel(const QSharedPointer &openVpn const QSharedPointer &cloakConfigModel, const QSharedPointer &wireGuardConfigModel, const QSharedPointer &awgConfigModel, const QSharedPointer &xrayConfigModel, +#ifdef Q_OS_WINDOWS const QSharedPointer &ikev2ConfigModel, +#endif const QSharedPointer &sftpConfigModel, const QSharedPointer &socks5ProxyConfigModel, QObject *parent) : QAbstractListModel(parent), @@ -26,7 +28,9 @@ ProtocolsModel::ProtocolsModel(const QSharedPointer &openVpn m_wireGuardConfigModel(wireGuardConfigModel), m_awgConfigModel(awgConfigModel), m_xrayConfigModel(xrayConfigModel), +#ifdef Q_OS_WINDOWS m_ikev2ConfigModel(ikev2ConfigModel), +#endif m_sftpConfigModel(sftpConfigModel), m_socks5ProxyConfigModel(socks5ProxyConfigModel) { @@ -111,18 +115,18 @@ void ProtocolsModel::updateProtocolModel(amnezia::Proto protocol) } switch (protocol) { - case Proto::OpenVpn: m_openVpnConfigModel->updateModel(config); break; - case Proto::ShadowSocks: m_shadowSocksConfigModel->updateModel(config); break; - case Proto::Cloak: m_cloakConfigModel->updateModel(config); break; - case Proto::WireGuard: m_wireGuardConfigModel->updateModel(config); break; - case Proto::Awg: m_awgConfigModel->updateModel(config); break; - case Proto::Xray: m_xrayConfigModel->updateModel(config); break; + case Proto::OpenVpn: m_openVpnConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + case Proto::ShadowSocks: m_shadowSocksConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + case Proto::Cloak: m_cloakConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + case Proto::WireGuard: m_wireGuardConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + case Proto::Awg: m_awgConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + case Proto::Xray: m_xrayConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; #ifdef Q_OS_WINDOWS case Proto::Ikev2: - case Proto::L2tp: m_ikev2ConfigModel->updateModel(config); break; + case Proto::L2tp: m_ikev2ConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; #endif - case Proto::Sftp: m_sftpConfigModel->updateModel(config); break; - case Proto::Socks5Proxy: m_socks5ProxyConfigModel->updateModel(config); break; + // case Proto::Sftp: m_sftpConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; + // case Proto::Socks5Proxy: m_socks5ProxyConfigModel->updateModel(*qSharedPointerCast(protocolConfig).data()); break; default: break; } } @@ -134,17 +138,17 @@ QMap> ProtocolsModel::getProtocolConfigs for (const auto &config : m_protocolConfigs) { switch (ProtocolProps::protoFromString(config->protocolName)) { case Proto::OpenVpn: protocolConfigs.insert(config->protocolName, m_openVpnConfigModel->getConfig()); break; - case Proto::ShadowSocks: m_shadowSocksConfigModel->updateModel(config); break; - case Proto::Cloak: m_cloakConfigModel->updateModel(config); break; - case Proto::WireGuard: m_wireGuardConfigModel->updateModel(config); break; + case Proto::ShadowSocks: protocolConfigs.insert(config->protocolName, m_shadowSocksConfigModel->getConfig()); break; + case Proto::Cloak: protocolConfigs.insert(config->protocolName, m_cloakConfigModel->getConfig()); break; + case Proto::WireGuard: protocolConfigs.insert(config->protocolName, m_wireGuardConfigModel->getConfig()); break; case Proto::Awg: protocolConfigs.insert(config->protocolName, m_awgConfigModel->getConfig()); break; - case Proto::Xray: m_xrayConfigModel->updateModel(config); break; + case Proto::Xray: protocolConfigs.insert(config->protocolName, m_xrayConfigModel->getConfig()); break; #ifdef Q_OS_WINDOWS case Proto::Ikev2: - case Proto::L2tp: m_ikev2ConfigModel->updateModel(config); break; + case Proto::L2tp: protocolConfigs.insert(config->protocolName, m_awgConfigModel->getConfig()); break; #endif - case Proto::Sftp: m_sftpConfigModel->updateModel(config); break; - case Proto::Socks5Proxy: m_socks5ProxyConfigModel->updateModel(config); break; + // case Proto::Sftp: protocolConfigs.insert(config->protocolName, m_awgConfigModel->getConfig()); break; + // case Proto::Socks5Proxy: protocolConfigs.insert(config->protocolName, m_awgConfigModel->getConfig()); break; default: break; } } From f8bea71716826fe757be584b655f5d1f8133e6e2 Mon Sep 17 00:00:00 2001 From: "vladimir.kuznetsov" Date: Mon, 7 Jul 2025 10:26:16 +0800 Subject: [PATCH 14/19] chore: temporarily hide the strict killswitch --- client/ui/qml/Pages2/PageSettingsKillSwitch.qml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml index 444eb415..ca1cd0d4 100644 --- a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml +++ b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml @@ -62,7 +62,8 @@ PageType { Layout.leftMargin: 16 Layout.rightMargin: 16 - enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected + visible: false + // enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected checked: !SettingsController.strictKillSwitchEnabled text: qsTr("Soft KillSwitch") @@ -73,7 +74,9 @@ PageType { } } - DividerType {} + DividerType { + visible: false + } VerticalRadioButton { id: strictKillSwitch From 42661618dc060d05794cc0dd503ed03cf579cf5d Mon Sep 17 00:00:00 2001 From: Nethius Date: Mon, 7 Jul 2025 10:44:35 +0800 Subject: [PATCH 15/19] chore: bump version (#1696) --- CMakeLists.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CMakeLists.txt b/CMakeLists.txt index 424dcf3a..fec613de 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -2,7 +2,7 @@ cmake_minimum_required(VERSION 3.25.0 FATAL_ERROR) set(PROJECT AmneziaVPN) -project(${PROJECT} VERSION 4.8.7.2 +project(${PROJECT} VERSION 4.8.8.1 DESCRIPTION "AmneziaVPN" HOMEPAGE_URL "https://amnezia.org/" ) @@ -11,7 +11,7 @@ string(TIMESTAMP CURRENT_DATE "%Y-%m-%d") set(RELEASE_DATE "${CURRENT_DATE}") set(APP_MAJOR_VERSION ${CMAKE_PROJECT_VERSION_MAJOR}.${CMAKE_PROJECT_VERSION_MINOR}.${CMAKE_PROJECT_VERSION_PATCH}) -set(APP_ANDROID_VERSION_CODE 2086) +set(APP_ANDROID_VERSION_CODE 2087) if(${CMAKE_SYSTEM_NAME} STREQUAL "Linux") set(MZ_PLATFORM_NAME "linux") From 2380cd5cfbe75b610c2bba4c3748aef5982f50fa Mon Sep 17 00:00:00 2001 From: Nethius Date: Mon, 7 Jul 2025 12:03:25 +0800 Subject: [PATCH 16/19] feat: amneziawg 1.5 support (#1692) * Version bump 4.2.1.0 * feat: add special handshake params to ui * feat: finish adding params * feat: android/ios & fix qml * chore: fix android impl & update 3rd-prebuilt branch * chore: trigger build with windows build * fix: special handshake params to client * chore: update submodule * feat: s3, s4 * chore: update submodule * feat: s3 s4 cont * fix: kt set * chore: update submodule * feat: add default values for s3, s4 * fix: make new parameters optional * chore: update submodules * chore: restore translation files * fix: fixed awg native config import with new junk * chore: restore translation files * AWG v1.5 Build * refactoring: removed s3 s4 fileds from ui part * chore: update link to amneziawg-apple --------- Co-authored-by: pokamest Co-authored-by: Mark Puha Co-authored-by: albexk Co-authored-by: Mykola Baibuz --- .gitmodules | 1 + client/3rd-prebuilt | 2 +- client/3rd/amneziawg-apple | 2 +- .../vpn/protocol/wireguard/Wireguard.kt | 11 + .../vpn/protocol/wireguard/WireguardConfig.kt | 59 +++++- client/configurators/awg_configurator.cpp | 15 ++ client/core/controllers/serverController.cpp | 18 +- client/daemon/daemon.cpp | 37 +++- client/daemon/interfaceconfig.cpp | 16 ++ client/daemon/interfaceconfig.h | 5 + client/mozilla/localsocketcontroller.cpp | 39 +++- client/platforms/ios/WGConfig.swift | 22 +- client/platforms/ios/ios_controller.mm | 26 ++- .../linux/daemon/wireguardutilslinux.cpp | 16 ++ .../macos/daemon/wireguardutilsmacos.cpp | 16 ++ client/protocols/protocols_defs.h | 23 ++ client/resources.qrc | 1 + client/server_scripts/awg/Dockerfile | 5 +- .../server_scripts/awg/configure_container.sh | 1 + .../controllers/api/apiConfigsController.cpp | 18 ++ client/ui/controllers/importController.cpp | 56 +++-- client/ui/controllers/installController.cpp | 56 ++++- client/ui/models/protocols/awgConfigModel.cpp | 109 +++++++++- client/ui/models/protocols/awgConfigModel.h | 33 ++- client/ui/qml/Components/AwgTextField.qml | 15 ++ .../Pages2/PageProtocolAwgClientSettings.qml | 198 +++++++++++++----- .../ui/qml/Pages2/PageProtocolAwgSettings.qml | 144 +++++-------- 27 files changed, 758 insertions(+), 186 deletions(-) create mode 100644 client/ui/qml/Components/AwgTextField.qml diff --git a/.gitmodules b/.gitmodules index decab9b7..90edb582 100644 --- a/.gitmodules +++ b/.gitmodules @@ -7,6 +7,7 @@ [submodule "client/3rd-prebuilt"] path = client/3rd-prebuilt url = https://github.com/amnezia-vpn/3rd-prebuilt + branch = feature/special-handshake [submodule "client/3rd/amneziawg-apple"] path = client/3rd/amneziawg-apple url = https://github.com/amnezia-vpn/amneziawg-apple diff --git a/client/3rd-prebuilt b/client/3rd-prebuilt index 0f3748ef..840b7b07 160000 --- a/client/3rd-prebuilt +++ b/client/3rd-prebuilt @@ -1 +1 @@ -Subproject commit 0f3748efd7cc04e0c914304b68931f925bed1259 +Subproject commit 840b7b070e6ac8b90dda2fac6e98859b23727c0c diff --git a/client/3rd/amneziawg-apple b/client/3rd/amneziawg-apple index 76e7db55..811af0a8 160000 --- a/client/3rd/amneziawg-apple +++ b/client/3rd/amneziawg-apple @@ -1 +1 @@ -Subproject commit 76e7db556a6d7e2582f9481df91db188a46c009c +Subproject commit 811af0a83b3faeade89a9093a588595666d32066 diff --git a/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/Wireguard.kt b/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/Wireguard.kt index 80cab96d..42a27de4 100644 --- a/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/Wireguard.kt +++ b/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/Wireguard.kt @@ -120,10 +120,21 @@ open class Wireguard : Protocol() { configData.optStringOrNull("Jmax")?.let { setJmax(it.toInt()) } configData.optStringOrNull("S1")?.let { setS1(it.toInt()) } configData.optStringOrNull("S2")?.let { setS2(it.toInt()) } + configData.optStringOrNull("S3")?.let { setS3(it.toInt()) } + configData.optStringOrNull("S4")?.let { setS4(it.toInt()) } configData.optStringOrNull("H1")?.let { setH1(it.toLong()) } configData.optStringOrNull("H2")?.let { setH2(it.toLong()) } configData.optStringOrNull("H3")?.let { setH3(it.toLong()) } configData.optStringOrNull("H4")?.let { setH4(it.toLong()) } + configData.optStringOrNull("I1")?.let { setI1(it) } + configData.optStringOrNull("I2")?.let { setI2(it) } + configData.optStringOrNull("I3")?.let { setI3(it) } + configData.optStringOrNull("I4")?.let { setI4(it) } + configData.optStringOrNull("I5")?.let { setI5(it) } + configData.optStringOrNull("J1")?.let { setJ1(it) } + configData.optStringOrNull("J2")?.let { setJ2(it) } + configData.optStringOrNull("J3")?.let { setJ3(it) } + configData.optStringOrNull("Itime")?.let { setItime(it.toInt()) } } private fun start(config: WireguardConfig, vpnBuilder: Builder, protect: (Int) -> Boolean) { diff --git a/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/WireguardConfig.kt b/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/WireguardConfig.kt index 7ae3d43b..2dfbbae8 100644 --- a/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/WireguardConfig.kt +++ b/client/android/wireguard/src/main/kotlin/org/amnezia/vpn/protocol/wireguard/WireguardConfig.kt @@ -20,10 +20,21 @@ open class WireguardConfig protected constructor( val jmax: Int?, val s1: Int?, val s2: Int?, + val s3: Int?, + val s4: Int?, val h1: Long?, val h2: Long?, val h3: Long?, - val h4: Long? + val h4: Long?, + var i1: String?, + var i2: String?, + var i3: String?, + var i4: String?, + var i5: String?, + var j1: String?, + var j2: String?, + var j3: String?, + var itime: Int? ) : ProtocolConfig(protocolConfigBuilder) { protected constructor(builder: Builder) : this( @@ -39,10 +50,21 @@ open class WireguardConfig protected constructor( builder.jmax, builder.s1, builder.s2, + builder.s3, + builder.s4, builder.h1, builder.h2, builder.h3, - builder.h4 + builder.h4, + builder.i1, + builder.i2, + builder.i3, + builder.i4, + builder.i5, + builder.j1, + builder.j2, + builder.j3, + builder.itime ) fun toWgUserspaceString(): String = with(StringBuilder()) { @@ -61,10 +83,21 @@ open class WireguardConfig protected constructor( appendLine("jmax=$jmax") appendLine("s1=$s1") appendLine("s2=$s2") + s3?.let { appendLine("s3=$it") } + s4?.let { appendLine("s4=$it") } appendLine("h1=$h1") appendLine("h2=$h2") appendLine("h3=$h3") appendLine("h4=$h4") + i1?.let { appendLine("i1=$it") } + i2?.let { appendLine("i2=$it") } + i3?.let { appendLine("i3=$it") } + i4?.let { appendLine("i4=$it") } + i5?.let { appendLine("i5=$it") } + j1?.let { appendLine("j1=$it") } + j2?.let { appendLine("j2=$it") } + j3?.let { appendLine("j3=$it") } + itime?.let { appendLine("itime=$it") } } } @@ -117,10 +150,21 @@ open class WireguardConfig protected constructor( internal var jmax: Int? = null internal var s1: Int? = null internal var s2: Int? = null + internal var s3: Int? = null + internal var s4: Int? = null internal var h1: Long? = null internal var h2: Long? = null internal var h3: Long? = null internal var h4: Long? = null + internal var i1: String? = null + internal var i2: String? = null + internal var i3: String? = null + internal var i4: String? = null + internal var i5: String? = null + internal var j1: String? = null + internal var j2: String? = null + internal var j3: String? = null + internal var itime: Int? = null fun setEndpoint(endpoint: InetEndpoint) = apply { this.endpoint = endpoint } @@ -139,10 +183,21 @@ open class WireguardConfig protected constructor( fun setJmax(jmax: Int) = apply { this.jmax = jmax } fun setS1(s1: Int) = apply { this.s1 = s1 } fun setS2(s2: Int) = apply { this.s2 = s2 } + fun setS3(s3: Int) = apply { this.s3 = s3 } + fun setS4(s4: Int) = apply { this.s4 = s4 } fun setH1(h1: Long) = apply { this.h1 = h1 } fun setH2(h2: Long) = apply { this.h2 = h2 } fun setH3(h3: Long) = apply { this.h3 = h3 } fun setH4(h4: Long) = apply { this.h4 = h4 } + fun setI1(i1: String) = apply { this.i1 = i1 } + fun setI2(i2: String) = apply { this.i2 = i2 } + fun setI3(i3: String) = apply { this.i3 = i3 } + fun setI4(i4: String) = apply { this.i4 = i4 } + fun setI5(i5: String) = apply { this.i5 = i5 } + fun setJ1(j1: String) = apply { this.j1 = j1 } + fun setJ2(j2: String) = apply { this.j2 = j2 } + fun setJ3(j3: String) = apply { this.j3 = j3 } + fun setItime(itime: Int) = apply { this.itime = itime } override fun build(): WireguardConfig = configBuild().run { WireguardConfig(this@Builder) } } diff --git a/client/configurators/awg_configurator.cpp b/client/configurators/awg_configurator.cpp index 21b61ba4..f83acb19 100644 --- a/client/configurators/awg_configurator.cpp +++ b/client/configurators/awg_configurator.cpp @@ -1,4 +1,5 @@ #include "awg_configurator.h" +#include "protocols/protocols_defs.h" #include #include @@ -39,6 +40,20 @@ QString AwgConfigurator::createConfig(const ServerCredentials &credentials, Dock jsonConfig[config_key::responsePacketMagicHeader] = configMap.value(config_key::responsePacketMagicHeader); jsonConfig[config_key::underloadPacketMagicHeader] = configMap.value(config_key::underloadPacketMagicHeader); jsonConfig[config_key::transportPacketMagicHeader] = configMap.value(config_key::transportPacketMagicHeader); + + // jsonConfig[config_key::cookieReplyPacketJunkSize] = configMap.value(config_key::cookieReplyPacketJunkSize); + // jsonConfig[config_key::transportPacketJunkSize] = configMap.value(config_key::transportPacketJunkSize); + + // jsonConfig[config_key::specialJunk1] = configMap.value(amnezia::config_key::specialJunk1); + // jsonConfig[config_key::specialJunk2] = configMap.value(amnezia::config_key::specialJunk2); + // jsonConfig[config_key::specialJunk3] = configMap.value(amnezia::config_key::specialJunk3); + // jsonConfig[config_key::specialJunk4] = configMap.value(amnezia::config_key::specialJunk4); + // jsonConfig[config_key::specialJunk5] = configMap.value(amnezia::config_key::specialJunk5); + // jsonConfig[config_key::controlledJunk1] = configMap.value(amnezia::config_key::controlledJunk1); + // jsonConfig[config_key::controlledJunk2] = configMap.value(amnezia::config_key::controlledJunk2); + // jsonConfig[config_key::controlledJunk3] = configMap.value(amnezia::config_key::controlledJunk3); + // jsonConfig[config_key::specialHandshakeTimeout] = configMap.value(amnezia::config_key::specialHandshakeTimeout); + jsonConfig[config_key::mtu] = containerConfig.value(ProtocolProps::protoToString(Proto::Awg)).toObject().value(config_key::mtu).toString(protocols::awg::defaultMtu); diff --git a/client/core/controllers/serverController.cpp b/client/core/controllers/serverController.cpp index a61a638b..3c24edea 100644 --- a/client/core/controllers/serverController.cpp +++ b/client/core/controllers/serverController.cpp @@ -349,7 +349,7 @@ bool ServerController::isReinstallContainerRequired(DockerContainer container, c if ((oldProtoConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress) != newProtoConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress)) || (oldProtoConfig.value(config_key::port).toString(protocols::awg::defaultPort) - != newProtoConfig.value(config_key::port).toString(protocols::awg::defaultPort)) + != newProtoConfig.value(config_key::port).toString(protocols::awg::defaultPort)) || (oldProtoConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount) != newProtoConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount)) || (oldProtoConfig.value(config_key::junkPacketMinSize).toString(protocols::awg::defaultJunkPacketMinSize) @@ -366,8 +366,13 @@ bool ServerController::isReinstallContainerRequired(DockerContainer container, c != newProtoConfig.value(config_key::responsePacketMagicHeader).toString(protocols::awg::defaultResponsePacketMagicHeader)) || (oldProtoConfig.value(config_key::underloadPacketMagicHeader).toString(protocols::awg::defaultUnderloadPacketMagicHeader) != newProtoConfig.value(config_key::underloadPacketMagicHeader).toString(protocols::awg::defaultUnderloadPacketMagicHeader)) - || (oldProtoConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader) - != newProtoConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader))) + || (oldProtoConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader)) + != newProtoConfig.value(config_key::transportPacketMagicHeader).toString(protocols::awg::defaultTransportPacketMagicHeader)) + // || (oldProtoConfig.value(config_key::cookieReplyPacketJunkSize).toString(protocols::awg::defaultCookieReplyPacketJunkSize) + // != newProtoConfig.value(config_key::cookieReplyPacketJunkSize).toString(protocols::awg::defaultCookieReplyPacketJunkSize)) + // || (oldProtoConfig.value(config_key::transportPacketJunkSize).toString(protocols::awg::defaultTransportPacketJunkSize) + // != newProtoConfig.value(config_key::transportPacketJunkSize).toString(protocols::awg::defaultTransportPacketJunkSize)) + return true; } @@ -375,7 +380,7 @@ bool ServerController::isReinstallContainerRequired(DockerContainer container, c if ((oldProtoConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress) != newProtoConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress)) || (oldProtoConfig.value(config_key::port).toString(protocols::wireguard::defaultPort) - != newProtoConfig.value(config_key::port).toString(protocols::wireguard::defaultPort))) + != newProtoConfig.value(config_key::port).toString(protocols::wireguard::defaultPort))) return true; } @@ -455,7 +460,7 @@ ErrorCode ServerController::buildContainerWorker(const ServerCredentials &creden runScript(credentials, replaceVars(amnezia::scriptData(SharedScriptType::build_container), genVarsForScript(credentials, container, config)), cbReadStdOut, cbReadStdErr); - + if (stdOut.contains("doesn't work on cgroups v2")) return ErrorCode::ServerDockerOnCgroupsV2; if (stdOut.contains("cgroup mountpoint does not exist")) @@ -641,6 +646,9 @@ ServerController::Vars ServerController::genVarsForScript(const ServerCredential vars.append({ { "$UNDERLOAD_PACKET_MAGIC_HEADER", amneziaWireguarConfig.value(config_key::underloadPacketMagicHeader).toString() } }); vars.append({ { "$TRANSPORT_PACKET_MAGIC_HEADER", amneziaWireguarConfig.value(config_key::transportPacketMagicHeader).toString() } }); + vars.append({ { "$COOKIE_REPLY_PACKET_JUNK_SIZE", amneziaWireguarConfig.value(config_key::cookieReplyPacketJunkSize).toString() } }); + vars.append({ { "$TRANSPORT_PACKET_JUNK_SIZE", amneziaWireguarConfig.value(config_key::transportPacketJunkSize).toString() } }); + // Socks5 proxy vars vars.append({ { "$SOCKS5_PROXY_PORT", socks5ProxyConfig.value(config_key::port).toString(protocols::socks5Proxy::defaultPort) } }); auto username = socks5ProxyConfig.value(config_key::userName).toString(); diff --git a/client/daemon/daemon.cpp b/client/daemon/daemon.cpp index 33ec8cbc..2faff0ef 100644 --- a/client/daemon/daemon.cpp +++ b/client/daemon/daemon.cpp @@ -405,6 +405,13 @@ bool Daemon::parseConfig(const QJsonObject& obj, InterfaceConfig& config) { if (!obj.value("S2").isNull()) { config.m_responsePacketJunkSize = obj.value("S2").toString(); } + if (!obj.value("S3").isNull()) { + config.m_cookieReplyPacketJunkSize = obj.value("S3").toString(); + } + if (!obj.value("S4").isNull()) { + config.m_transportPacketJunkSize = obj.value("S4").toString(); + } + if (!obj.value("H1").isNull()) { config.m_initPacketMagicHeader = obj.value("H1").toString(); } @@ -418,6 +425,34 @@ bool Daemon::parseConfig(const QJsonObject& obj, InterfaceConfig& config) { config.m_transportPacketMagicHeader = obj.value("H4").toString(); } + if (!obj.value("I1").isNull()) { + config.m_specialJunk["I1"] = obj.value("I1").toString(); + } + if (!obj.value("I2").isNull()) { + config.m_specialJunk["I2"] = obj.value("I2").toString(); + } + if (!obj.value("I3").isNull()) { + config.m_specialJunk["I3"] = obj.value("I3").toString(); + } + if (!obj.value("I4").isNull()) { + config.m_specialJunk["I4"] = obj.value("I4").toString(); + } + if (!obj.value("I5").isNull()) { + config.m_specialJunk["I5"] = obj.value("I5").toString(); + } + if (!obj.value("J1").isNull()) { + config.m_controlledJunk["J1"] = obj.value("J1").toString(); + } + if (!obj.value("J2").isNull()) { + config.m_controlledJunk["J2"] = obj.value("J2").toString(); + } + if (!obj.value("J3").isNull()) { + config.m_controlledJunk["J3"] = obj.value("J3").toString(); + } + if (!obj.value("Itime").isNull()) { + config.m_specialHandshakeTimeout = obj.value("Itime").toString(); + } + return true; } @@ -460,7 +495,7 @@ bool Daemon::deactivate(bool emitSignals) { m_connections.clear(); // Delete the interface - return wgutils()->deleteInterface(); + return wgutils()->deleteInterface(); } QString Daemon::logs() { diff --git a/client/daemon/interfaceconfig.cpp b/client/daemon/interfaceconfig.cpp index 846cfebe..53da5d36 100644 --- a/client/daemon/interfaceconfig.cpp +++ b/client/daemon/interfaceconfig.cpp @@ -130,6 +130,12 @@ QString InterfaceConfig::toWgConf(const QMap& extra) const { if (!m_responsePacketJunkSize.isNull()) { out << "S2 = " << m_responsePacketJunkSize << "\n"; } + if (!m_cookieReplyPacketJunkSize.isNull()) { + out << "S3 = " << m_cookieReplyPacketJunkSize << "\n"; + } + if (!m_transportPacketJunkSize.isNull()) { + out << "S4 = " << m_transportPacketJunkSize << "\n"; + } if (!m_initPacketMagicHeader.isNull()) { out << "H1 = " << m_initPacketMagicHeader << "\n"; } @@ -143,6 +149,16 @@ QString InterfaceConfig::toWgConf(const QMap& extra) const { out << "H4 = " << m_transportPacketMagicHeader << "\n"; } + for (const QString& key : m_specialJunk.keys()) { + out << key << " = " << m_specialJunk[key] << "\n"; + } + for (const QString& key : m_controlledJunk.keys()) { + out << key << " = " << m_controlledJunk[key] << "\n"; + } + if (!m_specialHandshakeTimeout.isNull()) { + out << "Itime = " << m_specialHandshakeTimeout << "\n"; + } + // If any extra config was provided, append it now. for (const QString& key : extra.keys()) { out << key << " = " << extra[key] << "\n"; diff --git a/client/daemon/interfaceconfig.h b/client/daemon/interfaceconfig.h index 6ae400c2..06288e80 100644 --- a/client/daemon/interfaceconfig.h +++ b/client/daemon/interfaceconfig.h @@ -50,10 +50,15 @@ class InterfaceConfig { QString m_junkPacketMaxSize; QString m_initPacketJunkSize; QString m_responsePacketJunkSize; + QString m_cookieReplyPacketJunkSize; + QString m_transportPacketJunkSize; QString m_initPacketMagicHeader; QString m_responsePacketMagicHeader; QString m_underloadPacketMagicHeader; QString m_transportPacketMagicHeader; + QMap m_specialJunk; + QMap m_controlledJunk; + QString m_specialHandshakeTimeout; QJsonObject toJson() const; QString toWgConf( diff --git a/client/mozilla/localsocketcontroller.cpp b/client/mozilla/localsocketcontroller.cpp index 67924d47..9abab81c 100644 --- a/client/mozilla/localsocketcontroller.cpp +++ b/client/mozilla/localsocketcontroller.cpp @@ -38,7 +38,7 @@ LocalSocketController::LocalSocketController() { m_socket = new QLocalSocket(this); connect(m_socket, &QLocalSocket::connected, this, &LocalSocketController::daemonConnected); - connect(m_socket, &QLocalSocket::disconnected, this, + connect(m_socket, &QLocalSocket::disconnected, this, [&] { errorOccurred(QLocalSocket::PeerClosedError); }); connect(m_socket, &QLocalSocket::errorOccurred, this, &LocalSocketController::errorOccurred); @@ -135,7 +135,7 @@ void LocalSocketController::activate(const QJsonObject &rawConfig) { // set up IPv6 unique-local-address, ULA, with "fd00::/8" prefix, not globally routable. // this will be default IPv6 gateway, OS recognizes that IPv6 link is local and switches to IPv4. - // Otherwise some OSes (Linux) try IPv6 forever and hang. + // Otherwise some OSes (Linux) try IPv6 forever and hang. // https://en.wikipedia.org/wiki/Unique_local_address (RFC 4193) // https://man7.org/linux/man-pages/man5/gai.conf.5.html json.insert("deviceIpv6Address", "fd58:baa6:dead::1"); // simply "dead::1" is globally-routable, don't use it @@ -244,28 +244,61 @@ void LocalSocketController::activate(const QJsonObject &rawConfig) { json.insert(amnezia::config_key::junkPacketMaxSize, wgConfig.value(amnezia::config_key::junkPacketMaxSize)); json.insert(amnezia::config_key::initPacketJunkSize, wgConfig.value(amnezia::config_key::initPacketJunkSize)); json.insert(amnezia::config_key::responsePacketJunkSize, wgConfig.value(amnezia::config_key::responsePacketJunkSize)); + json.insert(amnezia::config_key::cookieReplyPacketJunkSize, wgConfig.value(amnezia::config_key::cookieReplyPacketJunkSize)); + json.insert(amnezia::config_key::transportPacketJunkSize, wgConfig.value(amnezia::config_key::transportPacketJunkSize)); json.insert(amnezia::config_key::initPacketMagicHeader, wgConfig.value(amnezia::config_key::initPacketMagicHeader)); json.insert(amnezia::config_key::responsePacketMagicHeader, wgConfig.value(amnezia::config_key::responsePacketMagicHeader)); json.insert(amnezia::config_key::underloadPacketMagicHeader, wgConfig.value(amnezia::config_key::underloadPacketMagicHeader)); json.insert(amnezia::config_key::transportPacketMagicHeader, wgConfig.value(amnezia::config_key::transportPacketMagicHeader)); + json.insert(amnezia::config_key::specialJunk1, wgConfig.value(amnezia::config_key::specialJunk1)); + json.insert(amnezia::config_key::specialJunk2, wgConfig.value(amnezia::config_key::specialJunk2)); + json.insert(amnezia::config_key::specialJunk3, wgConfig.value(amnezia::config_key::specialJunk3)); + json.insert(amnezia::config_key::specialJunk4, wgConfig.value(amnezia::config_key::specialJunk4)); + json.insert(amnezia::config_key::specialJunk5, wgConfig.value(amnezia::config_key::specialJunk5)); + json.insert(amnezia::config_key::controlledJunk1, wgConfig.value(amnezia::config_key::controlledJunk1)); + json.insert(amnezia::config_key::controlledJunk2, wgConfig.value(amnezia::config_key::controlledJunk2)); + json.insert(amnezia::config_key::controlledJunk3, wgConfig.value(amnezia::config_key::controlledJunk3)); + json.insert(amnezia::config_key::specialHandshakeTimeout, wgConfig.value(amnezia::config_key::specialHandshakeTimeout)); } else if (!wgConfig.value(amnezia::config_key::junkPacketCount).isUndefined() && !wgConfig.value(amnezia::config_key::junkPacketMinSize).isUndefined() && !wgConfig.value(amnezia::config_key::junkPacketMaxSize).isUndefined() && !wgConfig.value(amnezia::config_key::initPacketJunkSize).isUndefined() && !wgConfig.value(amnezia::config_key::responsePacketJunkSize).isUndefined() + && !wgConfig.value(amnezia::config_key::cookieReplyPacketJunkSize).isUndefined() + && !wgConfig.value(amnezia::config_key::transportPacketJunkSize).isUndefined() && !wgConfig.value(amnezia::config_key::initPacketMagicHeader).isUndefined() && !wgConfig.value(amnezia::config_key::responsePacketMagicHeader).isUndefined() && !wgConfig.value(amnezia::config_key::underloadPacketMagicHeader).isUndefined() - && !wgConfig.value(amnezia::config_key::transportPacketMagicHeader).isUndefined()) { + && !wgConfig.value(amnezia::config_key::transportPacketMagicHeader).isUndefined() + && !wgConfig.value(amnezia::config_key::specialJunk1).isUndefined() + && !wgConfig.value(amnezia::config_key::specialJunk2).isUndefined() + && !wgConfig.value(amnezia::config_key::specialJunk3).isUndefined() + && !wgConfig.value(amnezia::config_key::specialJunk4).isUndefined() + && !wgConfig.value(amnezia::config_key::specialJunk5).isUndefined() + && !wgConfig.value(amnezia::config_key::controlledJunk1).isUndefined() + && !wgConfig.value(amnezia::config_key::controlledJunk2).isUndefined() + && !wgConfig.value(amnezia::config_key::controlledJunk3).isUndefined() + && !wgConfig.value(amnezia::config_key::specialHandshakeTimeout).isUndefined()) { json.insert(amnezia::config_key::junkPacketCount, wgConfig.value(amnezia::config_key::junkPacketCount)); json.insert(amnezia::config_key::junkPacketMinSize, wgConfig.value(amnezia::config_key::junkPacketMinSize)); json.insert(amnezia::config_key::junkPacketMaxSize, wgConfig.value(amnezia::config_key::junkPacketMaxSize)); json.insert(amnezia::config_key::initPacketJunkSize, wgConfig.value(amnezia::config_key::initPacketJunkSize)); json.insert(amnezia::config_key::responsePacketJunkSize, wgConfig.value(amnezia::config_key::responsePacketJunkSize)); + json.insert(amnezia::config_key::cookieReplyPacketJunkSize, wgConfig.value(amnezia::config_key::cookieReplyPacketJunkSize)); + json.insert(amnezia::config_key::transportPacketJunkSize, wgConfig.value(amnezia::config_key::transportPacketJunkSize)); json.insert(amnezia::config_key::initPacketMagicHeader, wgConfig.value(amnezia::config_key::initPacketMagicHeader)); json.insert(amnezia::config_key::responsePacketMagicHeader, wgConfig.value(amnezia::config_key::responsePacketMagicHeader)); json.insert(amnezia::config_key::underloadPacketMagicHeader, wgConfig.value(amnezia::config_key::underloadPacketMagicHeader)); json.insert(amnezia::config_key::transportPacketMagicHeader, wgConfig.value(amnezia::config_key::transportPacketMagicHeader)); + json.insert(amnezia::config_key::specialJunk1, wgConfig.value(amnezia::config_key::specialJunk1)); + json.insert(amnezia::config_key::specialJunk2, wgConfig.value(amnezia::config_key::specialJunk2)); + json.insert(amnezia::config_key::specialJunk3, wgConfig.value(amnezia::config_key::specialJunk3)); + json.insert(amnezia::config_key::specialJunk4, wgConfig.value(amnezia::config_key::specialJunk4)); + json.insert(amnezia::config_key::specialJunk5, wgConfig.value(amnezia::config_key::specialJunk5)); + json.insert(amnezia::config_key::controlledJunk1, wgConfig.value(amnezia::config_key::controlledJunk1)); + json.insert(amnezia::config_key::controlledJunk2, wgConfig.value(amnezia::config_key::controlledJunk2)); + json.insert(amnezia::config_key::controlledJunk3, wgConfig.value(amnezia::config_key::controlledJunk3)); + json.insert(amnezia::config_key::specialHandshakeTimeout, wgConfig.value(amnezia::config_key::specialHandshakeTimeout)); } write(json); diff --git a/client/platforms/ios/WGConfig.swift b/client/platforms/ios/WGConfig.swift index e3b67efe..8f693387 100644 --- a/client/platforms/ios/WGConfig.swift +++ b/client/platforms/ios/WGConfig.swift @@ -4,7 +4,10 @@ struct WGConfig: Decodable { let initPacketMagicHeader, responsePacketMagicHeader: String? let underloadPacketMagicHeader, transportPacketMagicHeader: String? let junkPacketCount, junkPacketMinSize, junkPacketMaxSize: String? - let initPacketJunkSize, responsePacketJunkSize: String? + let initPacketJunkSize, responsePacketJunkSize, cookieReplyPacketJunkSize, transportPacketJunkSize: String? + let specialJunk1, specialJunk2, specialJunk3, specialJunk4, specialJunk5: String? + let controlledJunk1, controlledJunk2, controlledJunk3: String? + let specialHandshakeTimeout: String? let dns1: String let dns2: String let mtu: String @@ -23,7 +26,10 @@ struct WGConfig: Decodable { case initPacketMagicHeader = "H1", responsePacketMagicHeader = "H2" case underloadPacketMagicHeader = "H3", transportPacketMagicHeader = "H4" case junkPacketCount = "Jc", junkPacketMinSize = "Jmin", junkPacketMaxSize = "Jmax" - case initPacketJunkSize = "S1", responsePacketJunkSize = "S2" + case initPacketJunkSize = "S1", responsePacketJunkSize = "S2", cookieReplyPacketJunkSize = "S3", transportPacketJunkSize = "S4" + case specialJunk1 = "I1", specialJunk2 = "I2", specialJunk3 = "I3", specialJunk4 = "I4", specialJunk5 = "I5" + case controlledJunk1 = "J1", controlledJunk2 = "J2", controlledJunk3 = "J3" + case specialHandshakeTimeout = "Itime" case dns1 case dns2 case mtu @@ -47,11 +53,21 @@ struct WGConfig: Decodable { Jmax = \(junkPacketMaxSize!) S1 = \(initPacketJunkSize!) S2 = \(responsePacketJunkSize!) + S3 = \(cookieReplyPacketJunkSize!) + S4 = \(transportPacketJunkSize!) H1 = \(initPacketMagicHeader!) H2 = \(responsePacketMagicHeader!) H3 = \(underloadPacketMagicHeader!) H4 = \(transportPacketMagicHeader!) - + I1 = \(specialJunk1!) + I2 = \(specialJunk2!) + I3 = \(specialJunk3!) + I4 = \(specialJunk4!) + I5 = \(specialJunk5!) + J1 = \(controlledJunk1!) + J2 = \(controlledJunk2!) + J3 = \(controlledJunk3!) + Itime = \(specialHandshakeTimeout!) """ } diff --git a/client/platforms/ios/ios_controller.mm b/client/platforms/ios/ios_controller.mm index 85fb50b7..e64c6dce 100644 --- a/client/platforms/ios/ios_controller.mm +++ b/client/platforms/ios/ios_controller.mm @@ -507,6 +507,8 @@ bool IosController::setupWireGuard() wgConfig.insert(config_key::initPacketJunkSize, config[config_key::initPacketJunkSize]); wgConfig.insert(config_key::responsePacketJunkSize, config[config_key::responsePacketJunkSize]); + wgConfig.insert(config_key::cookieReplyPacketJunkSize, config[config_key::cookieReplyPacketJunkSize]); + wgConfig.insert(config_key::transportPacketJunkSize, config[config_key::transportPacketJunkSize]); wgConfig.insert(config_key::junkPacketCount, config[config_key::junkPacketCount]); wgConfig.insert(config_key::junkPacketMinSize, config[config_key::junkPacketMinSize]); @@ -605,11 +607,23 @@ bool IosController::setupAwg() wgConfig.insert(config_key::initPacketJunkSize, config[config_key::initPacketJunkSize]); wgConfig.insert(config_key::responsePacketJunkSize, config[config_key::responsePacketJunkSize]); + wgConfig.insert(config_key::cookieReplyPacketJunkSize, config[config_key::cookieReplyPacketJunkSize]); + wgConfig.insert(config_key::transportPacketJunkSize, config[config_key::transportPacketJunkSize]); wgConfig.insert(config_key::junkPacketCount, config[config_key::junkPacketCount]); wgConfig.insert(config_key::junkPacketMinSize, config[config_key::junkPacketMinSize]); wgConfig.insert(config_key::junkPacketMaxSize, config[config_key::junkPacketMaxSize]); + wgConfig.insert(config_key::specialJunk1, config[config_key::specialJunk1]); + wgConfig.insert(config_key::specialJunk2, config[config_key::specialJunk2]); + wgConfig.insert(config_key::specialJunk3, config[config_key::specialJunk3]); + wgConfig.insert(config_key::specialJunk4, config[config_key::specialJunk4]); + wgConfig.insert(config_key::specialJunk5, config[config_key::specialJunk5]); + wgConfig.insert(config_key::controlledJunk1, config[config_key::controlledJunk1]); + wgConfig.insert(config_key::controlledJunk2, config[config_key::controlledJunk2]); + wgConfig.insert(config_key::controlledJunk3, config[config_key::controlledJunk3]); + wgConfig.insert(config_key::specialHandshakeTimeout, config[config_key::specialHandshakeTimeout]); + QJsonDocument wgConfigDoc(wgConfig); QString wgConfigDocStr(wgConfigDoc.toJson(QJsonDocument::Compact)); @@ -794,9 +808,9 @@ bool IosController::shareText(const QStringList& filesToSend) { if (!qtController) return; UIActivityViewController *activityController = [[UIActivityViewController alloc] initWithActivityItems:sharingItems applicationActivities:nil]; - + __block bool isAccepted = false; - + [activityController setCompletionWithItemsHandler:^(NSString *activityType, BOOL completed, NSArray *returnedItems, NSError *activityError) { isAccepted = completed; emit finished(); @@ -808,11 +822,11 @@ bool IosController::shareText(const QStringList& filesToSend) { popController.sourceView = qtController.view; popController.sourceRect = CGRectMake(100, 100, 100, 100); } - + QEventLoop wait; QObject::connect(this, &IosController::finished, &wait, &QEventLoop::quit); wait.exec(); - + return isAccepted; } @@ -826,7 +840,7 @@ QString IosController::openFile() { if (!qtController) return; [qtController presentViewController:documentPicker animated:YES completion:nil]; - + __block QString filePath; documentPickerDelegate.documentPickerClosedCallback = ^(NSString *path) { @@ -841,7 +855,7 @@ QString IosController::openFile() { QEventLoop wait; QObject::connect(this, &IosController::finished, &wait, &QEventLoop::quit); wait.exec(); - + return filePath; } diff --git a/client/platforms/linux/daemon/wireguardutilslinux.cpp b/client/platforms/linux/daemon/wireguardutilslinux.cpp index a12b8582..cfde73e2 100644 --- a/client/platforms/linux/daemon/wireguardutilslinux.cpp +++ b/client/platforms/linux/daemon/wireguardutilslinux.cpp @@ -121,6 +121,12 @@ bool WireguardUtilsLinux::addInterface(const InterfaceConfig& config) { if (!config.m_responsePacketJunkSize.isEmpty()) { out << "s2=" << config.m_responsePacketJunkSize << "\n"; } + if (!config.m_cookieReplyPacketJunkSize.isEmpty()) { + out << "s3=" << config.m_cookieReplyPacketJunkSize << "\n"; + } + if (!config.m_transportPacketJunkSize.isEmpty()) { + out << "s4=" << config.m_transportPacketJunkSize << "\n"; + } if (!config.m_initPacketMagicHeader.isEmpty()) { out << "h1=" << config.m_initPacketMagicHeader << "\n"; } @@ -134,6 +140,16 @@ bool WireguardUtilsLinux::addInterface(const InterfaceConfig& config) { out << "h4=" << config.m_transportPacketMagicHeader << "\n"; } + for (const QString& key : config.m_specialJunk.keys()) { + out << key.toLower() << "=" << config.m_specialJunk.value(key) << "\n"; + } + for (const QString& key : config.m_controlledJunk.keys()) { + out << key.toLower() << "=" << config.m_controlledJunk.value(key) << "\n"; + } + if (!config.m_specialHandshakeTimeout.isEmpty()) { + out << "itime=" << config.m_specialHandshakeTimeout << "\n"; + } + int err = uapiErrno(uapiCommand(message)); if (err != 0) { logger.error() << "Interface configuration failed:" << strerror(err); diff --git a/client/platforms/macos/daemon/wireguardutilsmacos.cpp b/client/platforms/macos/daemon/wireguardutilsmacos.cpp index 37170f20..cce4afab 100644 --- a/client/platforms/macos/daemon/wireguardutilsmacos.cpp +++ b/client/platforms/macos/daemon/wireguardutilsmacos.cpp @@ -119,6 +119,12 @@ bool WireguardUtilsMacos::addInterface(const InterfaceConfig& config) { if (!config.m_responsePacketJunkSize.isEmpty()) { out << "s2=" << config.m_responsePacketJunkSize << "\n"; } + if (!config.m_cookieReplyPacketJunkSize.isEmpty()) { + out << "s3=" << config.m_cookieReplyPacketJunkSize << "\n"; + } + if (!config.m_transportPacketJunkSize.isEmpty()) { + out << "s4=" << config.m_transportPacketJunkSize << "\n"; + } if (!config.m_initPacketMagicHeader.isEmpty()) { out << "h1=" << config.m_initPacketMagicHeader << "\n"; } @@ -132,6 +138,16 @@ bool WireguardUtilsMacos::addInterface(const InterfaceConfig& config) { out << "h4=" << config.m_transportPacketMagicHeader << "\n"; } + for (const QString& key : config.m_specialJunk.keys()) { + out << key.toLower() << "=" << config.m_specialJunk.value(key) << "\n"; + } + for (const QString& key : config.m_controlledJunk.keys()) { + out << key.toLower() << "=" << config.m_controlledJunk.value(key) << "\n"; + } + if (!config.m_specialHandshakeTimeout.isEmpty()) { + out << "itime=" << config.m_specialHandshakeTimeout << "\n"; + } + int err = uapiErrno(uapiCommand(message)); if (err != 0) { logger.error() << "Interface configuration failed:" << strerror(err); diff --git a/client/protocols/protocols_defs.h b/client/protocols/protocols_defs.h index c2d51454..b4cbb6de 100644 --- a/client/protocols/protocols_defs.h +++ b/client/protocols/protocols_defs.h @@ -72,10 +72,21 @@ namespace amnezia constexpr char junkPacketMaxSize[] = "Jmax"; constexpr char initPacketJunkSize[] = "S1"; constexpr char responsePacketJunkSize[] = "S2"; + constexpr char cookieReplyPacketJunkSize[] = "S3"; + constexpr char transportPacketJunkSize[] = "S4"; constexpr char initPacketMagicHeader[] = "H1"; constexpr char responsePacketMagicHeader[] = "H2"; constexpr char underloadPacketMagicHeader[] = "H3"; constexpr char transportPacketMagicHeader[] = "H4"; + constexpr char specialJunk1[] = "I1"; + constexpr char specialJunk2[] = "I2"; + constexpr char specialJunk3[] = "I3"; + constexpr char specialJunk4[] = "I4"; + constexpr char specialJunk5[] = "I5"; + constexpr char controlledJunk1[] = "J1"; + constexpr char controlledJunk2[] = "J2"; + constexpr char controlledJunk3[] = "J3"; + constexpr char specialHandshakeTimeout[] = "Itime"; constexpr char openvpn[] = "openvpn"; constexpr char wireguard[] = "wireguard"; @@ -216,10 +227,22 @@ namespace amnezia constexpr char defaultJunkPacketMaxSize[] = "30"; constexpr char defaultInitPacketJunkSize[] = "15"; constexpr char defaultResponsePacketJunkSize[] = "18"; + constexpr char defaultCookieReplyPacketJunkSize[] = "20"; + constexpr char defaultTransportPacketJunkSize[] = "23"; + constexpr char defaultInitPacketMagicHeader[] = "1020325451"; constexpr char defaultResponsePacketMagicHeader[] = "3288052141"; constexpr char defaultTransportPacketMagicHeader[] = "2528465083"; constexpr char defaultUnderloadPacketMagicHeader[] = "1766607858"; + constexpr char defaultSpecialJunk1[] = ""; + constexpr char defaultSpecialJunk2[] = ""; + constexpr char defaultSpecialJunk3[] = ""; + constexpr char defaultSpecialJunk4[] = ""; + constexpr char defaultSpecialJunk5[] = ""; + constexpr char defaultControlledJunk1[] = ""; + constexpr char defaultControlledJunk2[] = ""; + constexpr char defaultControlledJunk3[] = ""; + constexpr char defaultSpecialHandshakeTimeout[] = ""; } namespace socks5Proxy diff --git a/client/resources.qrc b/client/resources.qrc index 72eb15c7..54b5846c 100644 --- a/client/resources.qrc +++ b/client/resources.qrc @@ -239,6 +239,7 @@ ui/qml/Components/ApiPremV1MigrationDrawer.qml ui/qml/Components/ApiPremV1SubListDrawer.qml ui/qml/Components/OtpCodeDrawer.qml + ui/qml/Components/AwgTextField.qml images/flagKit/ZW.svg diff --git a/client/server_scripts/awg/Dockerfile b/client/server_scripts/awg/Dockerfile index 8c536fc7..a6118a84 100644 --- a/client/server_scripts/awg/Dockerfile +++ b/client/server_scripts/awg/Dockerfile @@ -10,7 +10,7 @@ RUN mkdir -p /opt/amnezia RUN echo -e "#!/bin/bash\ntail -f /dev/null" > /opt/amnezia/start.sh RUN chmod a+x /opt/amnezia/start.sh -# Tune network +# Tune network RUN echo -e " \n\ fs.file-max = 51200 \n\ \n\ @@ -40,7 +40,8 @@ RUN echo -e " \n\ echo -e " \n\ * soft nofile 51200 \n\ * hard nofile 51200 \n\ - " | sed -e 's/^\s\+//g' | tee -a /etc/security/limits.conf + " | sed -e 's/^\s\+//g' | tee -a /etc/security/limits.conf ENTRYPOINT [ "dumb-init", "/opt/amnezia/start.sh" ] CMD [ "" ] + diff --git a/client/server_scripts/awg/configure_container.sh b/client/server_scripts/awg/configure_container.sh index 2000c965..e327f080 100644 --- a/client/server_scripts/awg/configure_container.sh +++ b/client/server_scripts/awg/configure_container.sh @@ -23,4 +23,5 @@ H1 = $INIT_PACKET_MAGIC_HEADER H2 = $RESPONSE_PACKET_MAGIC_HEADER H3 = $UNDERLOAD_PACKET_MAGIC_HEADER H4 = $TRANSPORT_PACKET_MAGIC_HEADER + EOF diff --git a/client/ui/controllers/api/apiConfigsController.cpp b/client/ui/controllers/api/apiConfigsController.cpp index eb693a9a..0b0a9b92 100644 --- a/client/ui/controllers/api/apiConfigsController.cpp +++ b/client/ui/controllers/api/apiConfigsController.cpp @@ -162,6 +162,9 @@ namespace auto serverProtocolConfig = container.value(containerName).toObject(); auto clientProtocolConfig = QJsonDocument::fromJson(serverProtocolConfig.value(config_key::last_config).toString().toUtf8()).object(); + + //TODO looks like this block can be removed after v1 configs EOL + serverProtocolConfig[config_key::junkPacketCount] = clientProtocolConfig.value(config_key::junkPacketCount); serverProtocolConfig[config_key::junkPacketMinSize] = clientProtocolConfig.value(config_key::junkPacketMinSize); serverProtocolConfig[config_key::junkPacketMaxSize] = clientProtocolConfig.value(config_key::junkPacketMaxSize); @@ -171,6 +174,21 @@ namespace serverProtocolConfig[config_key::responsePacketMagicHeader] = clientProtocolConfig.value(config_key::responsePacketMagicHeader); serverProtocolConfig[config_key::underloadPacketMagicHeader] = clientProtocolConfig.value(config_key::underloadPacketMagicHeader); serverProtocolConfig[config_key::transportPacketMagicHeader] = clientProtocolConfig.value(config_key::transportPacketMagicHeader); + + serverProtocolConfig[config_key::cookieReplyPacketJunkSize] = clientProtocolConfig.value(config_key::cookieReplyPacketJunkSize); + serverProtocolConfig[config_key::transportPacketJunkSize] = clientProtocolConfig.value(config_key::transportPacketJunkSize); + serverProtocolConfig[config_key::specialJunk1] = clientProtocolConfig.value(config_key::specialJunk1); + serverProtocolConfig[config_key::specialJunk2] = clientProtocolConfig.value(config_key::specialJunk2); + serverProtocolConfig[config_key::specialJunk3] = clientProtocolConfig.value(config_key::specialJunk3); + serverProtocolConfig[config_key::specialJunk4] = clientProtocolConfig.value(config_key::specialJunk4); + serverProtocolConfig[config_key::specialJunk5] = clientProtocolConfig.value(config_key::specialJunk5); + serverProtocolConfig[config_key::controlledJunk1] = clientProtocolConfig.value(config_key::controlledJunk1); + serverProtocolConfig[config_key::controlledJunk2] = clientProtocolConfig.value(config_key::controlledJunk2); + serverProtocolConfig[config_key::controlledJunk3] = clientProtocolConfig.value(config_key::controlledJunk3); + serverProtocolConfig[config_key::specialHandshakeTimeout] = clientProtocolConfig.value(config_key::specialHandshakeTimeout); + + // + container[containerName] = serverProtocolConfig; containers.replace(0, container); newServerConfig[config_key::containers] = containers; diff --git a/client/ui/controllers/importController.cpp b/client/ui/controllers/importController.cpp index fdc06120..ea1d5d8e 100644 --- a/client/ui/controllers/importController.cpp +++ b/client/ui/controllers/importController.cpp @@ -12,6 +12,7 @@ #include "core/errorstrings.h" #include "core/qrCodeUtils.h" #include "core/serialization/serialization.h" +#include "protocols/protocols_defs.h" #include "systemController.h" #include "utilities.h" @@ -286,6 +287,19 @@ void ImportController::processNativeWireGuardConfig() clientProtocolConfig[config_key::underloadPacketMagicHeader] = "3"; clientProtocolConfig[config_key::transportPacketMagicHeader] = "4"; + // clientProtocolConfig[config_key::cookieReplyPacketJunkSize] = "0"; + // clientProtocolConfig[config_key::transportPacketJunkSize] = "0"; + + // clientProtocolConfig[config_key::specialJunk1] = ""; + // clientProtocolConfig[config_key::specialJunk2] = ""; + // clientProtocolConfig[config_key::specialJunk3] = ""; + // clientProtocolConfig[config_key::specialJunk4] = ""; + // clientProtocolConfig[config_key::specialJunk5] = ""; + // clientProtocolConfig[config_key::controlledJunk1] = ""; + // clientProtocolConfig[config_key::controlledJunk2] = ""; + // clientProtocolConfig[config_key::controlledJunk3] = ""; + // clientProtocolConfig[config_key::specialHandshakeTimeout] = "0"; + clientProtocolConfig[config_key::isObfuscationEnabled] = true; serverProtocolConfig[config_key::last_config] = QString(QJsonDocument(clientProtocolConfig).toJson()); @@ -438,21 +452,33 @@ QJsonObject ImportController::extractWireGuardConfig(const QString &data) lastConfig[config_key::allowed_ips] = allowedIpsJsonArray; QString protocolName = "wireguard"; - if (!configMap.value(config_key::junkPacketCount).isEmpty() && !configMap.value(config_key::junkPacketMinSize).isEmpty() - && !configMap.value(config_key::junkPacketMaxSize).isEmpty() && !configMap.value(config_key::initPacketJunkSize).isEmpty() - && !configMap.value(config_key::responsePacketJunkSize).isEmpty() && !configMap.value(config_key::initPacketMagicHeader).isEmpty() - && !configMap.value(config_key::responsePacketMagicHeader).isEmpty() - && !configMap.value(config_key::underloadPacketMagicHeader).isEmpty() - && !configMap.value(config_key::transportPacketMagicHeader).isEmpty()) { - lastConfig[config_key::junkPacketCount] = configMap.value(config_key::junkPacketCount); - lastConfig[config_key::junkPacketMinSize] = configMap.value(config_key::junkPacketMinSize); - lastConfig[config_key::junkPacketMaxSize] = configMap.value(config_key::junkPacketMaxSize); - lastConfig[config_key::initPacketJunkSize] = configMap.value(config_key::initPacketJunkSize); - lastConfig[config_key::responsePacketJunkSize] = configMap.value(config_key::responsePacketJunkSize); - lastConfig[config_key::initPacketMagicHeader] = configMap.value(config_key::initPacketMagicHeader); - lastConfig[config_key::responsePacketMagicHeader] = configMap.value(config_key::responsePacketMagicHeader); - lastConfig[config_key::underloadPacketMagicHeader] = configMap.value(config_key::underloadPacketMagicHeader); - lastConfig[config_key::transportPacketMagicHeader] = configMap.value(config_key::transportPacketMagicHeader); + + const QStringList requiredJunkFields = { config_key::junkPacketCount, config_key::junkPacketMinSize, + config_key::junkPacketMaxSize, config_key::initPacketJunkSize, + config_key::responsePacketJunkSize, config_key::initPacketMagicHeader, + config_key::responsePacketMagicHeader, config_key::underloadPacketMagicHeader, + config_key::transportPacketMagicHeader }; + + const QStringList optionalJunkFields = { // config_key::cookieReplyPacketJunkSize, + // config_key::transportPacketJunkSize, + config_key::specialJunk1, config_key::specialJunk2, config_key::specialJunk3, + config_key::specialJunk4, config_key::specialJunk5, config_key::controlledJunk1, + config_key::controlledJunk2, config_key::controlledJunk3, config_key::specialHandshakeTimeout + }; + + bool hasAllRequiredFields = std::all_of(requiredJunkFields.begin(), requiredJunkFields.end(), + [&configMap](const QString &field) { return !configMap.value(field).isEmpty(); }); + if (hasAllRequiredFields) { + for (const QString &field : requiredJunkFields) { + lastConfig[field] = configMap.value(field); + } + + for (const QString &field : optionalJunkFields) { + if (!configMap.value(field).isEmpty()) { + lastConfig[field] = configMap.value(field); + } + } + protocolName = "awg"; m_configType = ConfigTypes::Awg; } diff --git a/client/ui/controllers/installController.cpp b/client/ui/controllers/installController.cpp index eab8979a..d7f9dfbc 100755 --- a/client/ui/controllers/installController.cpp +++ b/client/ui/controllers/installController.cpp @@ -8,6 +8,7 @@ #include #include +#include "core/api/apiUtils.h" #include "core/controllers/serverController.h" #include "core/controllers/vpnConfigurationController.h" #include "core/networkUtilities.h" @@ -15,7 +16,6 @@ #include "ui/models/protocols/awgConfigModel.h" #include "ui/models/protocols/wireguardConfigModel.h" #include "utilities.h" -#include "core/api/apiUtils.h" namespace { @@ -79,12 +79,36 @@ void InstallController::install(DockerContainer container, int port, TransportPr int s1 = QRandomGenerator::global()->bounded(15, 150); int s2 = QRandomGenerator::global()->bounded(15, 150); - while (s1 + AwgConstant::messageInitiationSize == s2 + AwgConstant::messageResponseSize) { + // int s3 = QRandomGenerator::global()->bounded(15, 150); + // int s4 = QRandomGenerator::global()->bounded(15, 150); + + // Ensure all values are unique and don't create equal packet sizes + QSet usedValues; + usedValues.insert(s1); + + while (usedValues.contains(s2) || s1 + AwgConstant::messageInitiationSize == s2 + AwgConstant::messageResponseSize) { s2 = QRandomGenerator::global()->bounded(15, 150); } + usedValues.insert(s2); + + // while (usedValues.contains(s3) + // || s1 + AwgConstant::messageInitiationSize == s3 + AwgConstant::messageCookieReplySize + // || s2 + AwgConstant::messageResponseSize == s3 + AwgConstant::messageCookieReplySize) { + // s3 = QRandomGenerator::global()->bounded(15, 150); + // } + // usedValues.insert(s3); + + // while (usedValues.contains(s4) + // || s1 + AwgConstant::messageInitiationSize == s4 + AwgConstant::messageTransportSize + // || s2 + AwgConstant::messageResponseSize == s4 + AwgConstant::messageTransportSize + // || s3 + AwgConstant::messageCookieReplySize == s4 + AwgConstant::messageTransportSize) { + // s4 = QRandomGenerator::global()->bounded(15, 150); + // } QString initPacketJunkSize = QString::number(s1); QString responsePacketJunkSize = QString::number(s2); + // QString cookieReplyPacketJunkSize = QString::number(s3); + // QString transportPacketJunkSize = QString::number(s4); QSet headersValue; while (headersValue.size() != 4) { @@ -108,6 +132,21 @@ void InstallController::install(DockerContainer container, int port, TransportPr containerConfig[config_key::responsePacketMagicHeader] = responsePacketMagicHeader; containerConfig[config_key::underloadPacketMagicHeader] = underloadPacketMagicHeader; containerConfig[config_key::transportPacketMagicHeader] = transportPacketMagicHeader; + + // TODO: + // containerConfig[config_key::cookieReplyPacketJunkSize] = cookieReplyPacketJunkSize; + // containerConfig[config_key::transportPacketJunkSize] = transportPacketJunkSize; + + // containerConfig[config_key::specialJunk1] = specialJunk1; + // containerConfig[config_key::specialJunk2] = specialJunk2; + // containerConfig[config_key::specialJunk3] = specialJunk3; + // containerConfig[config_key::specialJunk4] = specialJunk4; + // containerConfig[config_key::specialJunk5] = specialJunk5; + // containerConfig[config_key::controlledJunk1] = controlledJunk1; + // containerConfig[config_key::controlledJunk2] = controlledJunk2; + // containerConfig[config_key::controlledJunk3] = controlledJunk3; + // containerConfig[config_key::specialHandshakeTimeout] = specialHandshakeTimeout; + } else if (container == DockerContainer::Sftp) { containerConfig.insert(config_key::userName, protocols::sftp::defaultUserName); containerConfig.insert(config_key::password, Utils::getRandomString(16)); @@ -401,6 +440,19 @@ ErrorCode InstallController::getAlreadyInstalledContainers(const ServerCredentia containerConfig[config_key::transportPacketMagicHeader] = serverConfigMap.value(config_key::transportPacketMagicHeader); + // containerConfig[config_key::cookieReplyPacketJunkSize] = serverConfigMap.value(config_key::cookieReplyPacketJunkSize); + // containerConfig[config_key::transportPacketJunkSize] = serverConfigMap.value(config_key::transportPacketJunkSize); + + // containerConfig[config_key::specialJunk1] = serverConfigMap.value(config_key::specialJunk1); + // containerConfig[config_key::specialJunk2] = serverConfigMap.value(config_key::specialJunk2); + // containerConfig[config_key::specialJunk3] = serverConfigMap.value(config_key::specialJunk3); + // containerConfig[config_key::specialJunk4] = serverConfigMap.value(config_key::specialJunk4); + // containerConfig[config_key::specialJunk5] = serverConfigMap.value(config_key::specialJunk5); + // containerConfig[config_key::controlledJunk1] = serverConfigMap.value(config_key::controlledJunk1); + // containerConfig[config_key::controlledJunk2] = serverConfigMap.value(config_key::controlledJunk2); + // containerConfig[config_key::controlledJunk3] = serverConfigMap.value(config_key::controlledJunk3); + // containerConfig[config_key::specialHandshakeTimeout] = serverConfigMap.value(config_key::specialHandshakeTimeout); + } else if (protocol == Proto::WireGuard) { QString serverConfig = serverController->getTextFileFromContainer(container, credentials, protocols::wireguard::serverConfigPath, errorCode); diff --git a/client/ui/models/protocols/awgConfigModel.cpp b/client/ui/models/protocols/awgConfigModel.cpp index 860c8395..e14a3152 100644 --- a/client/ui/models/protocols/awgConfigModel.cpp +++ b/client/ui/models/protocols/awgConfigModel.cpp @@ -28,7 +28,17 @@ bool AwgConfigModel::setData(const QModelIndex &index, const QVariant &value, in case Roles::ClientJunkPacketCountRole: m_clientProtocolConfig.insert(config_key::junkPacketCount, value.toString()); break; case Roles::ClientJunkPacketMinSizeRole: m_clientProtocolConfig.insert(config_key::junkPacketMinSize, value.toString()); break; case Roles::ClientJunkPacketMaxSizeRole: m_clientProtocolConfig.insert(config_key::junkPacketMaxSize, value.toString()); break; - + case Roles::ClientSpecialJunk1Role: m_clientProtocolConfig.insert(config_key::specialJunk1, value.toString()); break; + case Roles::ClientSpecialJunk2Role: m_clientProtocolConfig.insert(config_key::specialJunk2, value.toString()); break; + case Roles::ClientSpecialJunk3Role: m_clientProtocolConfig.insert(config_key::specialJunk3, value.toString()); break; + case Roles::ClientSpecialJunk4Role: m_clientProtocolConfig.insert(config_key::specialJunk4, value.toString()); break; + case Roles::ClientSpecialJunk5Role: m_clientProtocolConfig.insert(config_key::specialJunk5, value.toString()); break; + case Roles::ClientControlledJunk1Role: m_clientProtocolConfig.insert(config_key::controlledJunk1, value.toString()); break; + case Roles::ClientControlledJunk2Role: m_clientProtocolConfig.insert(config_key::controlledJunk2, value.toString()); break; + case Roles::ClientControlledJunk3Role: m_clientProtocolConfig.insert(config_key::controlledJunk3, value.toString()); break; + case Roles::ClientSpecialHandshakeTimeoutRole: + m_clientProtocolConfig.insert(config_key::specialHandshakeTimeout, value.toString()); + break; case Roles::ServerJunkPacketCountRole: m_serverProtocolConfig.insert(config_key::junkPacketCount, value.toString()); break; case Roles::ServerJunkPacketMinSizeRole: m_serverProtocolConfig.insert(config_key::junkPacketMinSize, value.toString()); break; case Roles::ServerJunkPacketMaxSizeRole: m_serverProtocolConfig.insert(config_key::junkPacketMaxSize, value.toString()); break; @@ -36,6 +46,12 @@ bool AwgConfigModel::setData(const QModelIndex &index, const QVariant &value, in case Roles::ServerResponsePacketJunkSizeRole: m_serverProtocolConfig.insert(config_key::responsePacketJunkSize, value.toString()); break; + // case Roles::ServerCookieReplyPacketJunkSizeRole: + // m_serverProtocolConfig.insert(config_key::cookieReplyPacketJunkSize, value.toString()); + // break; + // case Roles::ServerTransportPacketJunkSizeRole: + // m_serverProtocolConfig.insert(config_key::transportPacketJunkSize, value.toString()); + // break; case Roles::ServerInitPacketMagicHeaderRole: m_serverProtocolConfig.insert(config_key::initPacketMagicHeader, value.toString()); break; case Roles::ServerResponsePacketMagicHeaderRole: m_serverProtocolConfig.insert(config_key::responsePacketMagicHeader, value.toString()); @@ -66,12 +82,23 @@ QVariant AwgConfigModel::data(const QModelIndex &index, int role) const case Roles::ClientJunkPacketCountRole: return m_clientProtocolConfig.value(config_key::junkPacketCount); case Roles::ClientJunkPacketMinSizeRole: return m_clientProtocolConfig.value(config_key::junkPacketMinSize); case Roles::ClientJunkPacketMaxSizeRole: return m_clientProtocolConfig.value(config_key::junkPacketMaxSize); + case Roles::ClientSpecialJunk1Role: return m_clientProtocolConfig.value(config_key::specialJunk1); + case Roles::ClientSpecialJunk2Role: return m_clientProtocolConfig.value(config_key::specialJunk2); + case Roles::ClientSpecialJunk3Role: return m_clientProtocolConfig.value(config_key::specialJunk3); + case Roles::ClientSpecialJunk4Role: return m_clientProtocolConfig.value(config_key::specialJunk4); + case Roles::ClientSpecialJunk5Role: return m_clientProtocolConfig.value(config_key::specialJunk5); + case Roles::ClientControlledJunk1Role: return m_clientProtocolConfig.value(config_key::controlledJunk1); + case Roles::ClientControlledJunk2Role: return m_clientProtocolConfig.value(config_key::controlledJunk2); + case Roles::ClientControlledJunk3Role: return m_clientProtocolConfig.value(config_key::controlledJunk3); + case Roles::ClientSpecialHandshakeTimeoutRole: return m_clientProtocolConfig.value(config_key::specialHandshakeTimeout); case Roles::ServerJunkPacketCountRole: return m_serverProtocolConfig.value(config_key::junkPacketCount); case Roles::ServerJunkPacketMinSizeRole: return m_serverProtocolConfig.value(config_key::junkPacketMinSize); case Roles::ServerJunkPacketMaxSizeRole: return m_serverProtocolConfig.value(config_key::junkPacketMaxSize); case Roles::ServerInitPacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::initPacketJunkSize); case Roles::ServerResponsePacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::responsePacketJunkSize); + // case Roles::ServerCookieReplyPacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::cookieReplyPacketJunkSize); + // case Roles::ServerTransportPacketJunkSizeRole: return m_serverProtocolConfig.value(config_key::transportPacketJunkSize); case Roles::ServerInitPacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::initPacketMagicHeader); case Roles::ServerResponsePacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::responsePacketMagicHeader); case Roles::ServerUnderloadPacketMagicHeaderRole: return m_serverProtocolConfig.value(config_key::underloadPacketMagicHeader); @@ -94,7 +121,8 @@ void AwgConfigModel::updateModel(const QJsonObject &config) m_serverProtocolConfig.insert(config_key::transport_proto, serverProtocolConfig.value(config_key::transport_proto).toString(defaultTransportProto)); m_serverProtocolConfig[config_key::last_config] = serverProtocolConfig.value(config_key::last_config); - m_serverProtocolConfig[config_key::subnet_address] = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); + m_serverProtocolConfig[config_key::subnet_address] = + serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); m_serverProtocolConfig[config_key::port] = serverProtocolConfig.value(config_key::port).toString(protocols::awg::defaultPort); m_serverProtocolConfig[config_key::junkPacketCount] = serverProtocolConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount); @@ -106,6 +134,10 @@ void AwgConfigModel::updateModel(const QJsonObject &config) serverProtocolConfig.value(config_key::initPacketJunkSize).toString(protocols::awg::defaultInitPacketJunkSize); m_serverProtocolConfig[config_key::responsePacketJunkSize] = serverProtocolConfig.value(config_key::responsePacketJunkSize).toString(protocols::awg::defaultResponsePacketJunkSize); + // m_serverProtocolConfig[config_key::cookieReplyPacketJunkSize] = + // serverProtocolConfig.value(config_key::cookieReplyPacketJunkSize).toString(protocols::awg::defaultCookieReplyPacketJunkSize); + // m_serverProtocolConfig[config_key::transportPacketJunkSize] = + // serverProtocolConfig.value(config_key::transportPacketJunkSize).toString(protocols::awg::defaultTransportPacketJunkSize); m_serverProtocolConfig[config_key::initPacketMagicHeader] = serverProtocolConfig.value(config_key::initPacketMagicHeader).toString(protocols::awg::defaultInitPacketMagicHeader); m_serverProtocolConfig[config_key::responsePacketMagicHeader] = @@ -124,6 +156,24 @@ void AwgConfigModel::updateModel(const QJsonObject &config) clientProtocolConfig.value(config_key::junkPacketMinSize).toString(m_serverProtocolConfig[config_key::junkPacketMinSize].toString()); m_clientProtocolConfig[config_key::junkPacketMaxSize] = clientProtocolConfig.value(config_key::junkPacketMaxSize).toString(m_serverProtocolConfig[config_key::junkPacketMaxSize].toString()); + m_clientProtocolConfig[config_key::specialJunk1] = + clientProtocolConfig.value(config_key::specialJunk1).toString(protocols::awg::defaultSpecialJunk1); + m_clientProtocolConfig[config_key::specialJunk2] = + clientProtocolConfig.value(config_key::specialJunk2).toString(protocols::awg::defaultSpecialJunk2); + m_clientProtocolConfig[config_key::specialJunk3] = + clientProtocolConfig.value(config_key::specialJunk3).toString(protocols::awg::defaultSpecialJunk3); + m_clientProtocolConfig[config_key::specialJunk4] = + clientProtocolConfig.value(config_key::specialJunk4).toString(protocols::awg::defaultSpecialJunk4); + m_clientProtocolConfig[config_key::specialJunk5] = + clientProtocolConfig.value(config_key::specialJunk5).toString(protocols::awg::defaultSpecialJunk5); + m_clientProtocolConfig[config_key::controlledJunk1] = + clientProtocolConfig.value(config_key::controlledJunk1).toString(protocols::awg::defaultControlledJunk1); + m_clientProtocolConfig[config_key::controlledJunk2] = + clientProtocolConfig.value(config_key::controlledJunk2).toString(protocols::awg::defaultControlledJunk2); + m_clientProtocolConfig[config_key::controlledJunk3] = + clientProtocolConfig.value(config_key::controlledJunk3).toString(protocols::awg::defaultControlledJunk3); + m_clientProtocolConfig[config_key::specialHandshakeTimeout] = + clientProtocolConfig.value(config_key::specialHandshakeTimeout).toString(protocols::awg::defaultSpecialHandshakeTimeout); endResetModel(); } @@ -141,6 +191,15 @@ QJsonObject AwgConfigModel::getConfig() jsonConfig[config_key::junkPacketCount] = m_clientProtocolConfig[config_key::junkPacketCount]; jsonConfig[config_key::junkPacketMinSize] = m_clientProtocolConfig[config_key::junkPacketMinSize]; jsonConfig[config_key::junkPacketMaxSize] = m_clientProtocolConfig[config_key::junkPacketMaxSize]; + jsonConfig[config_key::specialJunk1] = m_clientProtocolConfig[config_key::specialJunk1]; + jsonConfig[config_key::specialJunk2] = m_clientProtocolConfig[config_key::specialJunk2]; + jsonConfig[config_key::specialJunk3] = m_clientProtocolConfig[config_key::specialJunk3]; + jsonConfig[config_key::specialJunk4] = m_clientProtocolConfig[config_key::specialJunk4]; + jsonConfig[config_key::specialJunk5] = m_clientProtocolConfig[config_key::specialJunk5]; + jsonConfig[config_key::controlledJunk1] = m_clientProtocolConfig[config_key::controlledJunk1]; + jsonConfig[config_key::controlledJunk2] = m_clientProtocolConfig[config_key::controlledJunk2]; + jsonConfig[config_key::controlledJunk3] = m_clientProtocolConfig[config_key::controlledJunk3]; + jsonConfig[config_key::specialHandshakeTimeout] = m_clientProtocolConfig[config_key::specialHandshakeTimeout]; m_serverProtocolConfig[config_key::last_config] = QString(QJsonDocument(jsonConfig).toJson()); } @@ -159,6 +218,17 @@ bool AwgConfigModel::isPacketSizeEqual(const int s1, const int s2) return (AwgConstant::messageInitiationSize + s1 == AwgConstant::messageResponseSize + s2); } +// bool AwgConfigModel::isPacketSizeEqual(const int s1, const int s2, const int s3, const int s4) +// { +// int initSize = AwgConstant::messageInitiationSize + s1; +// int responseSize = AwgConstant::messageResponseSize + s2; +// int cookieSize = AwgConstant::messageCookieReplySize + s3; +// int transportSize = AwgConstant::messageTransportSize + s4; + +// return (initSize == responseSize || initSize == cookieSize || initSize == transportSize || responseSize == cookieSize +// || responseSize == transportSize || cookieSize == transportSize); +// } + bool AwgConfigModel::isServerSettingsEqual() { const AwgConfig oldConfig(m_fullConfig.value(config_key::awg).toObject()); @@ -178,12 +248,24 @@ QHash AwgConfigModel::roleNames() const roles[ClientJunkPacketCountRole] = "clientJunkPacketCount"; roles[ClientJunkPacketMinSizeRole] = "clientJunkPacketMinSize"; roles[ClientJunkPacketMaxSizeRole] = "clientJunkPacketMaxSize"; + roles[ClientSpecialJunk1Role] = "clientSpecialJunk1"; + roles[ClientSpecialJunk2Role] = "clientSpecialJunk2"; + roles[ClientSpecialJunk3Role] = "clientSpecialJunk3"; + roles[ClientSpecialJunk4Role] = "clientSpecialJunk4"; + roles[ClientSpecialJunk5Role] = "clientSpecialJunk5"; + roles[ClientControlledJunk1Role] = "clientControlledJunk1"; + roles[ClientControlledJunk2Role] = "clientControlledJunk2"; + roles[ClientControlledJunk3Role] = "clientControlledJunk3"; + roles[ClientSpecialHandshakeTimeoutRole] = "clientSpecialHandshakeTimeout"; roles[ServerJunkPacketCountRole] = "serverJunkPacketCount"; roles[ServerJunkPacketMinSizeRole] = "serverJunkPacketMinSize"; roles[ServerJunkPacketMaxSizeRole] = "serverJunkPacketMaxSize"; roles[ServerInitPacketJunkSizeRole] = "serverInitPacketJunkSize"; roles[ServerResponsePacketJunkSizeRole] = "serverResponsePacketJunkSize"; + roles[ServerCookieReplyPacketJunkSizeRole] = "serverCookieReplyPacketJunkSize"; + roles[ServerTransportPacketJunkSizeRole] = "serverTransportPacketJunkSize"; + roles[ServerInitPacketMagicHeaderRole] = "serverInitPacketMagicHeader"; roles[ServerResponsePacketMagicHeaderRole] = "serverResponsePacketMagicHeader"; roles[ServerUnderloadPacketMagicHeaderRole] = "serverUnderloadPacketMagicHeader"; @@ -200,6 +282,16 @@ AwgConfig::AwgConfig(const QJsonObject &serverProtocolConfig) clientJunkPacketCount = clientProtocolConfig.value(config_key::junkPacketCount).toString(protocols::awg::defaultJunkPacketCount); clientJunkPacketMinSize = clientProtocolConfig.value(config_key::junkPacketMinSize).toString(protocols::awg::defaultJunkPacketMinSize); clientJunkPacketMaxSize = clientProtocolConfig.value(config_key::junkPacketMaxSize).toString(protocols::awg::defaultJunkPacketMaxSize); + clientSpecialJunk1 = clientProtocolConfig.value(config_key::specialJunk1).toString(protocols::awg::defaultSpecialJunk1); + clientSpecialJunk2 = clientProtocolConfig.value(config_key::specialJunk2).toString(protocols::awg::defaultSpecialJunk2); + clientSpecialJunk3 = clientProtocolConfig.value(config_key::specialJunk3).toString(protocols::awg::defaultSpecialJunk3); + clientSpecialJunk4 = clientProtocolConfig.value(config_key::specialJunk4).toString(protocols::awg::defaultSpecialJunk4); + clientSpecialJunk5 = clientProtocolConfig.value(config_key::specialJunk5).toString(protocols::awg::defaultSpecialJunk5); + clientControlledJunk1 = clientProtocolConfig.value(config_key::controlledJunk1).toString(protocols::awg::defaultControlledJunk1); + clientControlledJunk2 = clientProtocolConfig.value(config_key::controlledJunk2).toString(protocols::awg::defaultControlledJunk2); + clientControlledJunk3 = clientProtocolConfig.value(config_key::controlledJunk3).toString(protocols::awg::defaultControlledJunk3); + clientSpecialHandshakeTimeout = + clientProtocolConfig.value(config_key::specialHandshakeTimeout).toString(protocols::awg::defaultSpecialHandshakeTimeout); subnetAddress = serverProtocolConfig.value(config_key::subnet_address).toString(protocols::wireguard::defaultSubnetAddress); port = serverProtocolConfig.value(config_key::port).toString(protocols::awg::defaultPort); @@ -209,6 +301,10 @@ AwgConfig::AwgConfig(const QJsonObject &serverProtocolConfig) serverInitPacketJunkSize = serverProtocolConfig.value(config_key::initPacketJunkSize).toString(protocols::awg::defaultInitPacketJunkSize); serverResponsePacketJunkSize = serverProtocolConfig.value(config_key::responsePacketJunkSize).toString(protocols::awg::defaultResponsePacketJunkSize); + // serverCookieReplyPacketJunkSize = + // serverProtocolConfig.value(config_key::cookieReplyPacketJunkSize).toString(protocols::awg::defaultCookieReplyPacketJunkSize); + // serverTransportPacketJunkSize = + // serverProtocolConfig.value(config_key::transportPacketJunkSize).toString(protocols::awg::defaultTransportPacketJunkSize); serverInitPacketMagicHeader = serverProtocolConfig.value(config_key::initPacketMagicHeader).toString(protocols::awg::defaultInitPacketMagicHeader); serverResponsePacketMagicHeader = @@ -224,6 +320,8 @@ bool AwgConfig::hasEqualServerSettings(const AwgConfig &other) const if (subnetAddress != other.subnetAddress || port != other.port || serverJunkPacketCount != other.serverJunkPacketCount || serverJunkPacketMinSize != other.serverJunkPacketMinSize || serverJunkPacketMaxSize != other.serverJunkPacketMaxSize || serverInitPacketJunkSize != other.serverInitPacketJunkSize || serverResponsePacketJunkSize != other.serverResponsePacketJunkSize + // || serverCookieReplyPacketJunkSize != other.serverCookieReplyPacketJunkSize + // || serverTransportPacketJunkSize != other.serverTransportPacketJunkSize || serverInitPacketMagicHeader != other.serverInitPacketMagicHeader || serverResponsePacketMagicHeader != other.serverResponsePacketMagicHeader || serverUnderloadPacketMagicHeader != other.serverUnderloadPacketMagicHeader @@ -236,7 +334,12 @@ bool AwgConfig::hasEqualServerSettings(const AwgConfig &other) const bool AwgConfig::hasEqualClientSettings(const AwgConfig &other) const { if (clientMtu != other.clientMtu || clientJunkPacketCount != other.clientJunkPacketCount - || clientJunkPacketMinSize != other.clientJunkPacketMinSize || clientJunkPacketMaxSize != other.clientJunkPacketMaxSize) { + || clientJunkPacketMinSize != other.clientJunkPacketMinSize || clientJunkPacketMaxSize != other.clientJunkPacketMaxSize + || clientSpecialJunk1 != other.clientSpecialJunk1 || clientSpecialJunk2 != other.clientSpecialJunk2 + || clientSpecialJunk3 != other.clientSpecialJunk3 || clientSpecialJunk4 != other.clientSpecialJunk4 + || clientSpecialJunk5 != other.clientSpecialJunk5 || clientControlledJunk1 != other.clientControlledJunk1 + || clientControlledJunk2 != other.clientControlledJunk2 || clientControlledJunk3 != other.clientControlledJunk3 + || clientSpecialHandshakeTimeout != other.clientSpecialHandshakeTimeout) { return false; } return true; diff --git a/client/ui/models/protocols/awgConfigModel.h b/client/ui/models/protocols/awgConfigModel.h index c1f8bb27..0c2374fc 100644 --- a/client/ui/models/protocols/awgConfigModel.h +++ b/client/ui/models/protocols/awgConfigModel.h @@ -6,9 +6,12 @@ #include "containers/containers_defs.h" -namespace AwgConstant { +namespace AwgConstant +{ const int messageInitiationSize = 148; const int messageResponseSize = 92; + const int messageCookieReplySize = 64; + const int messageTransportSize = 32; } struct AwgConfig @@ -22,12 +25,23 @@ struct AwgConfig QString clientJunkPacketCount; QString clientJunkPacketMinSize; QString clientJunkPacketMaxSize; + QString clientSpecialJunk1; + QString clientSpecialJunk2; + QString clientSpecialJunk3; + QString clientSpecialJunk4; + QString clientSpecialJunk5; + QString clientControlledJunk1; + QString clientControlledJunk2; + QString clientControlledJunk3; + QString clientSpecialHandshakeTimeout; QString serverJunkPacketCount; QString serverJunkPacketMinSize; QString serverJunkPacketMaxSize; QString serverInitPacketJunkSize; QString serverResponsePacketJunkSize; + QString serverCookieReplyPacketJunkSize; + QString serverTransportPacketJunkSize; QString serverInitPacketMagicHeader; QString serverResponsePacketMagicHeader; QString serverUnderloadPacketMagicHeader; @@ -35,7 +49,6 @@ struct AwgConfig bool hasEqualServerSettings(const AwgConfig &other) const; bool hasEqualClientSettings(const AwgConfig &other) const; - }; class AwgConfigModel : public QAbstractListModel @@ -51,16 +64,28 @@ public: ClientJunkPacketCountRole, ClientJunkPacketMinSizeRole, ClientJunkPacketMaxSizeRole, + ClientSpecialJunk1Role, + ClientSpecialJunk2Role, + ClientSpecialJunk3Role, + ClientSpecialJunk4Role, + ClientSpecialJunk5Role, + ClientControlledJunk1Role, + ClientControlledJunk2Role, + ClientControlledJunk3Role, + ClientSpecialHandshakeTimeoutRole, ServerJunkPacketCountRole, ServerJunkPacketMinSizeRole, ServerJunkPacketMaxSizeRole, ServerInitPacketJunkSizeRole, ServerResponsePacketJunkSizeRole, + ServerCookieReplyPacketJunkSizeRole, + ServerTransportPacketJunkSizeRole, + ServerInitPacketMagicHeaderRole, ServerResponsePacketMagicHeaderRole, ServerUnderloadPacketMagicHeaderRole, - ServerTransportPacketMagicHeaderRole + ServerTransportPacketMagicHeaderRole, }; explicit AwgConfigModel(QObject *parent = nullptr); @@ -75,7 +100,7 @@ public slots: QJsonObject getConfig(); bool isHeadersEqual(const QString &h1, const QString &h2, const QString &h3, const QString &h4); - bool isPacketSizeEqual(const int s1, const int s2); + bool isPacketSizeEqual(const int s1, const int s2/*, const int s3, const int s4*/); bool isServerSettingsEqual(); diff --git a/client/ui/qml/Components/AwgTextField.qml b/client/ui/qml/Components/AwgTextField.qml new file mode 100644 index 00000000..87b023d9 --- /dev/null +++ b/client/ui/qml/Components/AwgTextField.qml @@ -0,0 +1,15 @@ +pragma ComponentBehavior: Bound + +import QtQuick +import QtQuick.Layouts + +import "../Controls2" + +TextFieldWithHeaderType { + Layout.fillWidth: true + Layout.topMargin: 16 + + textField.validator: IntValidator { bottom: 0 } + + checkEmptyText: true +} diff --git a/client/ui/qml/Pages2/PageProtocolAwgClientSettings.qml b/client/ui/qml/Pages2/PageProtocolAwgClientSettings.qml index b8cf5f93..d97d09e8 100644 --- a/client/ui/qml/Pages2/PageProtocolAwgClientSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolAwgClientSettings.qml @@ -115,14 +115,10 @@ PageType { KeyNavigation.tab: junkPacketCountTextField.textField } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketCountTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: "Jc - Junk packet count" textField.text: clientJunkPacketCount - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== clientJunkPacketCount) { @@ -130,19 +126,13 @@ PageType { } } - checkEmptyText: true - KeyNavigation.tab: junkPacketMinSizeTextField.textField } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketMinSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: "Jmin - Junk packet minimum size" textField.text: clientJunkPacketMinSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== clientJunkPacketMinSize) { @@ -150,28 +140,144 @@ PageType { } } - checkEmptyText: true - KeyNavigation.tab: junkPacketMaxSizeTextField.textField } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketMaxSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: "Jmax - Junk packet maximum size" textField.text: clientJunkPacketMaxSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== clientJunkPacketMaxSize) { clientJunkPacketMaxSize = textField.text } } + } - checkEmptyText: true + AwgTextField { + id: specialJunk1TextField + headerText: qsTr("I1 - First special junk packet") + textField.text: clientSpecialJunk1 + textField.validator: null + checkEmptyText: false + textField.onEditingFinished: { + if (textField.text !== clientSpecialJunk1) { + clientSpecialJunk1 = textField.text + } + } + } + + AwgTextField { + id: specialJunk2TextField + headerText: qsTr("I2 - Second special junk packet") + textField.text: clientSpecialJunk2 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientSpecialJunk2) { + clientSpecialJunk2 = textField.text + } + } + } + + AwgTextField { + id: specialJunk3TextField + headerText: qsTr("I3 - Third special junk packet") + textField.text: clientSpecialJunk3 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientSpecialJunk3) { + clientSpecialJunk3 = textField.text + } + } + } + + AwgTextField { + id: specialJunk4TextField + headerText: qsTr("I4 - Fourth special junk packet") + textField.text: clientSpecialJunk4 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientSpecialJunk4) { + clientSpecialJunk4 = textField.text + } + } + } + + AwgTextField { + id: specialJunk5TextField + headerText: qsTr("I5 - Fifth special junk packet") + textField.text: clientSpecialJunk5 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientSpecialJunk5 ) { + clientSpecialJunk5 = textField.text + } + } + } + + AwgTextField { + id: controlledJunk1TextField + headerText: qsTr("J1 - First controlled junk packet") + textField.text: clientControlledJunk1 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientControlledJunk1) { + clientControlledJunk1 = textField.text + } + } + } + + AwgTextField { + id: controlledJunk2TextField + headerText: qsTr("J2 - Second controlled junk packet") + textField.text: clientControlledJunk2 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientControlledJunk2) { + clientControlledJunk2 = textField.text + } + } + } + + AwgTextField { + id: controlledJunk3TextField + headerText: qsTr("J3 - Third controlled junk packet") + textField.text: clientControlledJunk3 + textField.validator: null + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientControlledJunk3) { + clientControlledJunk3 = textField.text + } + } + } + + AwgTextField { + id: iTimeTextField + headerText: qsTr("Itime - Special handshake timeout") + textField.text: clientSpecialHandshakeTimeout + checkEmptyText: false + + textField.onEditingFinished: { + if (textField.text !== clientSpecialHandshakeTimeout) { + clientSpecialHandshakeTimeout = textField.text + } + } } Header2TextType { @@ -181,82 +287,78 @@ PageType { text: qsTr("Server settings") } - TextFieldWithHeaderType { + AwgTextField { id: portTextField - Layout.fillWidth: true - Layout.topMargin: 8 - enabled: false headerText: qsTr("Port") textField.text: port } - TextFieldWithHeaderType { + AwgTextField { id: initPacketJunkSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - enabled: false headerText: "S1 - Init packet junk size" textField.text: serverInitPacketJunkSize } - TextFieldWithHeaderType { + AwgTextField { id: responsePacketJunkSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - enabled: false headerText: "S2 - Response packet junk size" textField.text: serverResponsePacketJunkSize } - TextFieldWithHeaderType { - id: initPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 + // AwgTextField { + // id: cookieReplyPacketJunkSizeTextField + // enabled: false + // headerText: "S3 - Cookie Reply packet junk size" + // textField.text: serverCookieReplyPacketJunkSize + // } + + // AwgTextField { + // id: transportPacketJunkSizeTextField + // enabled: false + + // headerText: "S4 - Transport packet junk size" + // textField.text: serverTransportPacketJunkSize + // } + + AwgTextField { + id: initPacketMagicHeaderTextField enabled: false headerText: "H1 - Init packet magic header" textField.text: serverInitPacketMagicHeader } - TextFieldWithHeaderType { + AwgTextField { id: responsePacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - enabled: false headerText: "H2 - Response packet magic header" textField.text: serverResponsePacketMagicHeader } - TextFieldWithHeaderType { + AwgTextField { id: underloadPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - enabled: false headerText: "H3 - Underload packet magic header" textField.text: serverUnderloadPacketMagicHeader } - TextFieldWithHeaderType { + AwgTextField { id: transportPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - enabled: false headerText: "H4 - Transport packet magic header" textField.text: serverTransportPacketMagicHeader } + } } } diff --git a/client/ui/qml/Pages2/PageProtocolAwgSettings.qml b/client/ui/qml/Pages2/PageProtocolAwgSettings.qml index e8fd2b94..699ae724 100644 --- a/client/ui/qml/Pages2/PageProtocolAwgSettings.qml +++ b/client/ui/qml/Pages2/PageProtocolAwgSettings.qml @@ -138,184 +138,139 @@ PageType { checkEmptyText: true } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketCountTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("Jc - Junk packet count") textField.text: serverJunkPacketCount - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { - if (textField.text === "") { - textField.text = "0" - } - if (textField.text !== serverJunkPacketCount) { serverJunkPacketCount = textField.text } } - - checkEmptyText: true } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketMinSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("Jmin - Junk packet minimum size") textField.text: serverJunkPacketMinSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverJunkPacketMinSize) { serverJunkPacketMinSize = textField.text } } - - checkEmptyText: true } - TextFieldWithHeaderType { + AwgTextField { id: junkPacketMaxSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("Jmax - Junk packet maximum size") textField.text: serverJunkPacketMaxSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverJunkPacketMaxSize) { serverJunkPacketMaxSize = textField.text } } - - checkEmptyText: true } - TextFieldWithHeaderType { + AwgTextField { id: initPacketJunkSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("S1 - Init packet junk size") textField.text: serverInitPacketJunkSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverInitPacketJunkSize) { serverInitPacketJunkSize = textField.text } } - - checkEmptyText: true - - onActiveFocusChanged: { - if(activeFocus) { - listview.positionViewAtEnd() - } - } } - TextFieldWithHeaderType { + AwgTextField { id: responsePacketJunkSizeTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("S2 - Response packet junk size") textField.text: serverResponsePacketJunkSize - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverResponsePacketJunkSize) { serverResponsePacketJunkSize = textField.text } } - - checkEmptyText: true - - onActiveFocusChanged: { - if(activeFocus) { - listview.positionViewAtEnd() - } - } } - TextFieldWithHeaderType { - id: initPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 + // AwgTextField { + // id: cookieReplyPacketJunkSizeTextField + // headerText: qsTr("S3 - Cookie reply packet junk size") + // textField.text: serverCookieReplyPacketJunkSize + // textField.onEditingFinished: { + // if (textField.text !== serverCookieReplyPacketJunkSize) { + // serverCookieReplyPacketJunkSize = textField.text + // } + // } + // } + + // AwgTextField { + // id: transportPacketJunkSizeTextField + // headerText: qsTr("S4 - Transport packet junk size") + // textField.text: serverTransportPacketJunkSize + + // textField.onEditingFinished: { + // if (textField.text !== serverTransportPacketJunkSize) { + // serverTransportPacketJunkSize = textField.text + // } + // } + // } + + AwgTextField { + id: initPacketMagicHeaderTextField headerText: qsTr("H1 - Init packet magic header") textField.text: serverInitPacketMagicHeader - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverInitPacketMagicHeader) { serverInitPacketMagicHeader = textField.text } } - - checkEmptyText: true } - TextFieldWithHeaderType { + AwgTextField { id: responsePacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("H2 - Response packet magic header") textField.text: serverResponsePacketMagicHeader - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverResponsePacketMagicHeader) { serverResponsePacketMagicHeader = textField.text } } - - checkEmptyText: true } - TextFieldWithHeaderType { - id: transportPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - - headerText: qsTr("H4 - Transport packet magic header") - textField.text: serverTransportPacketMagicHeader - textField.validator: IntValidator { bottom: 0 } - - textField.onEditingFinished: { - if (textField.text !== serverTransportPacketMagicHeader) { - serverTransportPacketMagicHeader = textField.text - } - } - - checkEmptyText: true - } - - TextFieldWithHeaderType { + AwgTextField { id: underloadPacketMagicHeaderTextField - Layout.fillWidth: true - Layout.topMargin: 16 - headerText: qsTr("H3 - Underload packet magic header") textField.text: serverUnderloadPacketMagicHeader - textField.validator: IntValidator { bottom: 0 } textField.onEditingFinished: { if (textField.text !== serverUnderloadPacketMagicHeader) { serverUnderloadPacketMagicHeader = textField.text } } - - checkEmptyText: true } + AwgTextField { + id: transportPacketMagicHeaderTextField + headerText: qsTr("H4 - Transport packet magic header") + textField.text: serverTransportPacketMagicHeader + + textField.onEditingFinished: { + if (textField.text !== serverTransportPacketMagicHeader) { + serverTransportPacketMagicHeader = textField.text + } + } + } + + BasicButtonType { id: saveRestartButton @@ -328,6 +283,8 @@ PageType { responsePacketMagicHeaderTextField.errorText === "" && initPacketMagicHeaderTextField.errorText === "" && responsePacketJunkSizeTextField.errorText === "" && + // cookieReplyHeaderJunkTextField.errorText === "" && + // transportHeaderJunkTextField.errorText === "" && initPacketJunkSizeTextField.errorText === "" && junkPacketMaxSizeTextField.errorText === "" && junkPacketMinSizeTextField.errorText === "" && @@ -360,6 +317,13 @@ PageType { PageController.showErrorMessage(qsTr("The value of the field S1 + message initiation size (148) must not equal S2 + message response size (92)")) return } + // if (AwgConfigModel.isPacketSizeEqual(parseInt(initPacketJunkSizeTextField.textField.text), + // parseInt(responsePacketJunkSizeTextField.textField.text), + // parseInt(cookieReplyPacketJunkSizeTextField.textField.text), + // parseInt(transportPacketJunkSizeTextField.textField.text))) { + // PageController.showErrorMessage(qsTr("The value of the field S1 + message initiation size (148) must not equal S2 + message response size (92) + S3 + cookie reply size (64) + S4 + transport packet size (32)")) + // return + // } } var headerText = qsTr("Save settings?") From 5445e6637b6f126db78c3666828e2f9ed0c5e964 Mon Sep 17 00:00:00 2001 From: Nethius Date: Tue, 8 Jul 2025 14:25:03 +0800 Subject: [PATCH 17/19] chore: minor fixes (#1616) * chore: removed unnecessary qdebug * fix: return soft and hide strict killswitch --- .../ui/controllers/api/apiConfigsController.cpp | 2 -- client/ui/qml/Pages2/PageSettingsKillSwitch.qml | 15 ++++++++------- 2 files changed, 8 insertions(+), 9 deletions(-) diff --git a/client/ui/controllers/api/apiConfigsController.cpp b/client/ui/controllers/api/apiConfigsController.cpp index 0b0a9b92..0f42beb7 100644 --- a/client/ui/controllers/api/apiConfigsController.cpp +++ b/client/ui/controllers/api/apiConfigsController.cpp @@ -221,8 +221,6 @@ namespace serverConfig[configKey::apiConfig] = apiConfig; - qDebug() << serverConfig; - return ErrorCode::NoError; } } diff --git a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml index ca1cd0d4..d6d73b20 100644 --- a/client/ui/qml/Pages2/PageSettingsKillSwitch.qml +++ b/client/ui/qml/Pages2/PageSettingsKillSwitch.qml @@ -62,8 +62,7 @@ PageType { Layout.leftMargin: 16 Layout.rightMargin: 16 - visible: false - // enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected + enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected checked: !SettingsController.strictKillSwitchEnabled text: qsTr("Soft KillSwitch") @@ -74,9 +73,7 @@ PageType { } } - DividerType { - visible: false - } + DividerType {} VerticalRadioButton { id: strictKillSwitch @@ -84,7 +81,9 @@ PageType { Layout.leftMargin: 16 Layout.rightMargin: 16 - enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected + visible: false + enabled: false + // enabled: SettingsController.isKillSwitchEnabled && !ConnectionController.isConnected checked: SettingsController.strictKillSwitchEnabled text: qsTr("Strict KillSwitch") @@ -106,7 +105,9 @@ PageType { } } - DividerType {} + DividerType { + visible: false + } LabelWithButtonType { Layout.topMargin: 32 From 10a107716cf3a566f77e99a56066140e61bdae0b Mon Sep 17 00:00:00 2001 From: Nethius Date: Tue, 8 Jul 2025 15:06:52 +0800 Subject: [PATCH 18/19] fix: fixed awg 1.5 fields processing for ios (#1700) --- client/platforms/ios/WGConfig.swift | 76 ++++++++++++++++++++--------- 1 file changed, 53 insertions(+), 23 deletions(-) diff --git a/client/platforms/ios/WGConfig.swift b/client/platforms/ios/WGConfig.swift index 8f693387..537687f1 100644 --- a/client/platforms/ios/WGConfig.swift +++ b/client/platforms/ios/WGConfig.swift @@ -46,29 +46,59 @@ struct WGConfig: Decodable { } var settings: String { - junkPacketCount == nil ? "" : - """ - Jc = \(junkPacketCount!) - Jmin = \(junkPacketMinSize!) - Jmax = \(junkPacketMaxSize!) - S1 = \(initPacketJunkSize!) - S2 = \(responsePacketJunkSize!) - S3 = \(cookieReplyPacketJunkSize!) - S4 = \(transportPacketJunkSize!) - H1 = \(initPacketMagicHeader!) - H2 = \(responsePacketMagicHeader!) - H3 = \(underloadPacketMagicHeader!) - H4 = \(transportPacketMagicHeader!) - I1 = \(specialJunk1!) - I2 = \(specialJunk2!) - I3 = \(specialJunk3!) - I4 = \(specialJunk4!) - I5 = \(specialJunk5!) - J1 = \(controlledJunk1!) - J2 = \(controlledJunk2!) - J3 = \(controlledJunk3!) - Itime = \(specialHandshakeTimeout!) - """ + guard junkPacketCount != nil else { return "" } + + var settingsLines: [String] = [] + + // Required parameters when junkPacketCount is present + settingsLines.append("Jc = \(junkPacketCount!)") + settingsLines.append("Jmin = \(junkPacketMinSize!)") + settingsLines.append("Jmax = \(junkPacketMaxSize!)") + settingsLines.append("S1 = \(initPacketJunkSize!)") + settingsLines.append("S2 = \(responsePacketJunkSize!)") + + settingsLines.append("H1 = \(initPacketMagicHeader!)") + settingsLines.append("H2 = \(responsePacketMagicHeader!)") + settingsLines.append("H3 = \(underloadPacketMagicHeader!)") + settingsLines.append("H4 = \(transportPacketMagicHeader!)") + + // Optional parameters - only add if not nil and not empty + if let s3 = cookieReplyPacketJunkSize, !s3.isEmpty { + settingsLines.append("S3 = \(s3)") + } + if let s4 = transportPacketJunkSize, !s4.isEmpty { + settingsLines.append("S4 = \(s4)") + } + + if let i1 = specialJunk1, !i1.isEmpty { + settingsLines.append("I1 = \(i1)") + } + if let i2 = specialJunk2, !i2.isEmpty { + settingsLines.append("I2 = \(i2)") + } + if let i3 = specialJunk3, !i3.isEmpty { + settingsLines.append("I3 = \(i3)") + } + if let i4 = specialJunk4, !i4.isEmpty { + settingsLines.append("I4 = \(i4)") + } + if let i5 = specialJunk5, !i5.isEmpty { + settingsLines.append("I5 = \(i5)") + } + if let j1 = controlledJunk1, !j1.isEmpty { + settingsLines.append("J1 = \(j1)") + } + if let j2 = controlledJunk2, !j2.isEmpty { + settingsLines.append("J2 = \(j2)") + } + if let j3 = controlledJunk3, !j3.isEmpty { + settingsLines.append("J3 = \(j3)") + } + if let itime = specialHandshakeTimeout, !itime.isEmpty { + settingsLines.append("Itime = \(itime)") + } + + return settingsLines.joined(separator: "\n") } var str: String {