
* fixed xray port processing * fixed saving port when changing xray settings and saving transport protocol when changing all the protocols settings
134 lines
6.6 KiB
C++
134 lines
6.6 KiB
C++
#include "openvpnConfigModel.h"
|
|
|
|
#include "protocols/protocols_defs.h"
|
|
|
|
OpenVpnConfigModel::OpenVpnConfigModel(QObject *parent) : QAbstractListModel(parent)
|
|
{
|
|
}
|
|
|
|
int OpenVpnConfigModel::rowCount(const QModelIndex &parent) const
|
|
{
|
|
Q_UNUSED(parent);
|
|
return 1;
|
|
}
|
|
|
|
bool OpenVpnConfigModel::setData(const QModelIndex &index, const QVariant &value, int role)
|
|
{
|
|
if (!index.isValid() || index.row() < 0 || index.row() >= ContainerProps::allContainers().size()) {
|
|
return false;
|
|
}
|
|
|
|
switch (role) {
|
|
case Roles::SubnetAddressRole: m_protocolConfig.insert(amnezia::config_key::subnet_address, value.toString()); break;
|
|
case Roles::TransportProtoRole: m_protocolConfig.insert(config_key::transport_proto, value.toString()); break;
|
|
case Roles::PortRole: m_protocolConfig.insert(config_key::port, value.toString()); break;
|
|
case Roles::AutoNegotiateEncryprionRole: m_protocolConfig.insert(config_key::ncp_disable, !value.toBool()); break;
|
|
case Roles::HashRole: m_protocolConfig.insert(config_key::hash, value.toString()); break;
|
|
case Roles::CipherRole: m_protocolConfig.insert(config_key::cipher, value.toString()); break;
|
|
case Roles::TlsAuthRole: m_protocolConfig.insert(config_key::tls_auth, value.toBool()); break;
|
|
case Roles::BlockDnsRole: m_protocolConfig.insert(config_key::block_outside_dns, value.toBool()); break;
|
|
case Roles::AdditionalClientCommandsRole: m_protocolConfig.insert(config_key::additional_client_config, value.toString()); break;
|
|
case Roles::AdditionalServerCommandsRole: m_protocolConfig.insert(config_key::additional_server_config, value.toString()); break;
|
|
}
|
|
|
|
emit dataChanged(index, index, QList { role });
|
|
return true;
|
|
}
|
|
|
|
QVariant OpenVpnConfigModel::data(const QModelIndex &index, int role) const
|
|
{
|
|
if (!index.isValid() || index.row() < 0 || index.row() >= rowCount()) {
|
|
return false;
|
|
}
|
|
|
|
switch (role) {
|
|
case Roles::SubnetAddressRole:
|
|
return m_protocolConfig.value(amnezia::config_key::subnet_address).toString(amnezia::protocols::openvpn::defaultSubnetAddress);
|
|
case Roles::TransportProtoRole:
|
|
return m_protocolConfig.value(config_key::transport_proto).toString(protocols::openvpn::defaultTransportProto);
|
|
case Roles::PortRole: return m_protocolConfig.value(config_key::port).toString(protocols::openvpn::defaultPort);
|
|
case Roles::AutoNegotiateEncryprionRole:
|
|
return !m_protocolConfig.value(config_key::ncp_disable).toBool(protocols::openvpn::defaultNcpDisable);
|
|
case Roles::HashRole: return m_protocolConfig.value(config_key::hash).toString(protocols::openvpn::defaultHash);
|
|
case Roles::CipherRole: return m_protocolConfig.value(config_key::cipher).toString(protocols::openvpn::defaultCipher);
|
|
case Roles::TlsAuthRole: return m_protocolConfig.value(config_key::tls_auth).toBool(protocols::openvpn::defaultTlsAuth);
|
|
case Roles::BlockDnsRole:
|
|
return m_protocolConfig.value(config_key::block_outside_dns).toBool(protocols::openvpn::defaultBlockOutsideDns);
|
|
case Roles::AdditionalClientCommandsRole:
|
|
return m_protocolConfig.value(config_key::additional_client_config).toString(protocols::openvpn::defaultAdditionalClientConfig);
|
|
case Roles::AdditionalServerCommandsRole:
|
|
return m_protocolConfig.value(config_key::additional_server_config).toString(protocols::openvpn::defaultAdditionalServerConfig);
|
|
case Roles::IsPortEditable: return m_container == DockerContainer::OpenVpn ? true : false;
|
|
case Roles::IsTransportProtoEditable: return m_container == DockerContainer::OpenVpn ? true : false;
|
|
case Roles::HasRemoveButton: return m_container == DockerContainer::OpenVpn ? true : false;
|
|
}
|
|
return QVariant();
|
|
}
|
|
|
|
void OpenVpnConfigModel::updateModel(const QJsonObject &config)
|
|
{
|
|
beginResetModel();
|
|
m_container = ContainerProps::containerFromString(config.value(config_key::container).toString());
|
|
|
|
m_fullConfig = config;
|
|
QJsonObject protocolConfig = config.value(config_key::openvpn).toObject();
|
|
|
|
m_protocolConfig.insert(
|
|
config_key::subnet_address,
|
|
protocolConfig.value(amnezia::config_key::subnet_address).toString(amnezia::protocols::openvpn::defaultSubnetAddress));
|
|
|
|
QString transportProto;
|
|
if (m_container == DockerContainer::OpenVpn) {
|
|
transportProto = protocolConfig.value(config_key::transport_proto).toString(protocols::openvpn::defaultTransportProto);
|
|
} else {
|
|
transportProto = "tcp";
|
|
}
|
|
|
|
m_protocolConfig.insert(config_key::transport_proto, transportProto);
|
|
|
|
m_protocolConfig.insert(config_key::ncp_disable,
|
|
protocolConfig.value(config_key::ncp_disable).toBool(protocols::openvpn::defaultNcpDisable));
|
|
m_protocolConfig.insert(config_key::cipher, protocolConfig.value(config_key::cipher).toString(protocols::openvpn::defaultCipher));
|
|
m_protocolConfig.insert(config_key::hash, protocolConfig.value(config_key::hash).toString(protocols::openvpn::defaultHash));
|
|
m_protocolConfig.insert(config_key::block_outside_dns,
|
|
protocolConfig.value(config_key::block_outside_dns).toBool(protocols::openvpn::defaultBlockOutsideDns));
|
|
m_protocolConfig.insert(config_key::port, protocolConfig.value(config_key::port).toString(protocols::openvpn::defaultPort));
|
|
m_protocolConfig.insert(config_key::tls_auth, protocolConfig.value(config_key::tls_auth).toBool(protocols::openvpn::defaultTlsAuth));
|
|
m_protocolConfig.insert(
|
|
config_key::additional_client_config,
|
|
protocolConfig.value(config_key::additional_client_config).toString(protocols::openvpn::defaultAdditionalClientConfig));
|
|
m_protocolConfig.insert(
|
|
config_key::additional_server_config,
|
|
protocolConfig.value(config_key::additional_server_config).toString(protocols::openvpn::defaultAdditionalServerConfig));
|
|
|
|
endResetModel();
|
|
}
|
|
|
|
QJsonObject OpenVpnConfigModel::getConfig()
|
|
{
|
|
m_fullConfig.insert(config_key::openvpn, m_protocolConfig);
|
|
return m_fullConfig;
|
|
}
|
|
|
|
QHash<int, QByteArray> OpenVpnConfigModel::roleNames() const
|
|
{
|
|
QHash<int, QByteArray> roles;
|
|
|
|
roles[SubnetAddressRole] = "subnetAddress";
|
|
roles[TransportProtoRole] = "transportProto";
|
|
roles[PortRole] = "port";
|
|
roles[AutoNegotiateEncryprionRole] = "autoNegotiateEncryprion";
|
|
roles[HashRole] = "hash";
|
|
roles[CipherRole] = "cipher";
|
|
roles[TlsAuthRole] = "tlsAuth";
|
|
roles[BlockDnsRole] = "blockDns";
|
|
roles[AdditionalClientCommandsRole] = "additionalClientCommands";
|
|
roles[AdditionalServerCommandsRole] = "additionalServerCommands";
|
|
|
|
roles[IsPortEditable] = "isPortEditable";
|
|
roles[IsTransportProtoEditable] = "isTransportProtoEditable";
|
|
|
|
roles[HasRemoveButton] = "hasRemoveButton";
|
|
|
|
return roles;
|
|
}
|