
* cherry-pick 4dfcad96506fb5b88c5bb27342b6d9413fc361c9 from mozilla upstream * cherry-pick a95fa8c088b9edaff2de18751336942c2d145a9a from mozilla * cherry-pick commit 4fc1ebbad86a9abcafdc761725a7afd811c8d2d3 from mozilla * cherry-pick 4dfcad96506fb5b88c5bb27342b6d9413fc361c9 from mozilla upstream * cherry-pick 22de4fcbd454c64ff496c3380eeaeeb6afff4d64 from mozilla upstream * cherry-pick 649673be561b66c96367adf379da1545f8838763 from mozilla upstream * cherry-pick 41bdad34517d0ddaef32139482e5505d92e4b533 from mozilla upstream * cherry-pick f6e49a85538eaa230d3a8634fa7600966132ccab from mozilla upstream * cherry-pick 86c585387efa0a09c7937dfe799a90a666404fcd from mozilla upstream * cherry-pick a18c1fac740469ca3566751b74a16227518630c4 from mozilla upstream * fixed missing ; * added excludeLocalNetworks() for linux * build fixes on windows after cherry-picks * Add rules for excluded sites splittunell mode * Fix app splittunell when ipv6 is not setup * Fix Linux build --------- Co-authored-by: Mykola Baibuz <mykola.baibuz@gmail.com>
112 lines
3.5 KiB
C++
112 lines
3.5 KiB
C++
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "windowsdaemon.h"
|
|
|
|
#include <Windows.h>
|
|
#include <qassert.h>
|
|
|
|
#include <QCoreApplication>
|
|
#include <QJsonDocument>
|
|
#include <QJsonObject>
|
|
#include <QJsonValue>
|
|
#include <QLocalSocket>
|
|
#include <QNetworkInterface>
|
|
#include <QTextStream>
|
|
#include <QtGlobal>
|
|
|
|
#include "daemon/daemonerrors.h"
|
|
#include "dnsutilswindows.h"
|
|
#include "leakdetector.h"
|
|
#include "logger.h"
|
|
#include "platforms/windows/daemon/windowsfirewall.h"
|
|
#include "platforms/windows/daemon/windowssplittunnel.h"
|
|
#include "platforms/windows/windowscommons.h"
|
|
#include "windowsfirewall.h"
|
|
|
|
#include "core/networkUtilities.h"
|
|
|
|
namespace {
|
|
Logger logger("WindowsDaemon");
|
|
}
|
|
|
|
WindowsDaemon::WindowsDaemon() : Daemon(nullptr) {
|
|
MZ_COUNT_CTOR(WindowsDaemon);
|
|
m_firewallManager = WindowsFirewall::create(this);
|
|
Q_ASSERT(m_firewallManager != nullptr);
|
|
|
|
m_wgutils = WireguardUtilsWindows::create(m_firewallManager, this);
|
|
m_dnsutils = new DnsUtilsWindows(this);
|
|
m_splitTunnelManager = WindowsSplitTunnel::create(m_firewallManager);
|
|
|
|
connect(m_wgutils.get(), &WireguardUtilsWindows::backendFailure, this,
|
|
&WindowsDaemon::monitorBackendFailure);
|
|
connect(this, &WindowsDaemon::activationFailure,
|
|
[this]() { m_firewallManager->disableKillSwitch(); });
|
|
}
|
|
|
|
WindowsDaemon::~WindowsDaemon() {
|
|
MZ_COUNT_DTOR(WindowsDaemon);
|
|
logger.debug() << "Daemon released";
|
|
}
|
|
|
|
void WindowsDaemon::prepareActivation(const InterfaceConfig& config, int inetAdapterIndex) {
|
|
// Before creating the interface we need to check which adapter
|
|
// routes to the server endpoint
|
|
if (inetAdapterIndex == 0) {
|
|
auto serveraddr = QHostAddress(config.m_serverIpv4AddrIn);
|
|
m_inetAdapterIndex = NetworkUtilities::AdapterIndexTo(serveraddr);
|
|
} else {
|
|
m_inetAdapterIndex = inetAdapterIndex;
|
|
}
|
|
}
|
|
|
|
void WindowsDaemon::activateSplitTunnel(const InterfaceConfig& config, int vpnAdapterIndex) {
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
m_splitTunnelManager->start(m_inetAdapterIndex, vpnAdapterIndex);
|
|
m_splitTunnelManager->excludeApps(config.m_vpnDisabledApps);
|
|
} else {
|
|
m_splitTunnelManager->stop();
|
|
}
|
|
}
|
|
|
|
bool WindowsDaemon::run(Op op, const InterfaceConfig& config) {
|
|
if (!m_splitTunnelManager) {
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
// The Client has sent us a list of disabled apps, but we failed
|
|
// to init the the split tunnel driver.
|
|
// So let the client know this was not possible
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_INIT_FAILURE);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
if (op == Down) {
|
|
m_splitTunnelManager->stop();
|
|
return true;
|
|
}
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
if (!m_splitTunnelManager->start(m_inetAdapterIndex)) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_START_FAILURE);
|
|
};
|
|
if (!m_splitTunnelManager->excludeApps(config.m_vpnDisabledApps)) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_EXCLUDE_FAILURE);
|
|
};
|
|
// Now the driver should be running (State == 4)
|
|
if (!m_splitTunnelManager->isRunning()) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_START_FAILURE);
|
|
}
|
|
return true;
|
|
}
|
|
m_splitTunnelManager->stop();
|
|
|
|
return true;
|
|
}
|
|
|
|
void WindowsDaemon::monitorBackendFailure() {
|
|
logger.warning() << "Tunnel service is down";
|
|
|
|
emit backendFailure();
|
|
deactivate();
|
|
}
|