
* Readme update, solution for wireguard make in M1 machines, * import file and restore enabled. * xcode_patcher.rb fixed, Now no need to add openVPN framewrok in Embed frameworks manually. * Now xcode_patcher.rb will add OpenVPN Framework to Embed Frameworks in main target, instead of Network extension. * Update iosvpnprotocol.swift * Protocol wasn't detected because it is working on localized description of tunnel, fixed cases. * Code cleanup * Speed issue fixed for wireguard. * GetDeviceIp and bytes(speed of OpenVPN) fixed. *Device IP method wasn't working as expected, so I replaced. and for speed in OpenVPN we need to handle message seperately for bytes. *QR progress added with progressbar and text.
748 lines
29 KiB
Swift
748 lines
29 KiB
Swift
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
import Foundation
|
|
import NetworkExtension
|
|
|
|
let vpnName = "Amnezia WireguardVPN"
|
|
var vpnBundleID = "";
|
|
|
|
@objc class VPNIPAddressRange : NSObject {
|
|
public var address: NSString = ""
|
|
public var networkPrefixLength: UInt8 = 0
|
|
public var isIpv6: Bool = false
|
|
|
|
@objc init(address: NSString, networkPrefixLength: UInt8, isIpv6: Bool) {
|
|
super.init()
|
|
|
|
self.address = address
|
|
self.networkPrefixLength = networkPrefixLength
|
|
self.isIpv6 = isIpv6
|
|
}
|
|
}
|
|
|
|
public class IOSVpnProtocolImpl : NSObject {
|
|
|
|
private var tunnel: NETunnelProviderManager? = nil
|
|
private var stateChangeCallback: ((Bool) -> Void?)? = nil
|
|
private var privateKey : PrivateKey? = nil
|
|
private var deviceIpv4Address: String? = nil
|
|
private var deviceIpv6Address: String? = nil
|
|
private var openVPNConfig: String? = nil
|
|
private var shadowSocksConfig: String? = nil
|
|
|
|
@objc enum ConnectionState: Int { case Error, Connected, Disconnected }
|
|
|
|
@objc init(bundleID: String,
|
|
config: String,
|
|
closure: @escaping (ConnectionState, Date?) -> Void,
|
|
callback: @escaping (Bool) -> Void) {
|
|
super.init()
|
|
Logger.configureGlobal(tagged: "APP", withFilePath: "")
|
|
|
|
print("Config from caller: \(config)")
|
|
|
|
vpnBundleID = bundleID;
|
|
precondition(!vpnBundleID.isEmpty)
|
|
|
|
stateChangeCallback = callback
|
|
self.openVPNConfig = config
|
|
self.shadowSocksConfig = nil
|
|
|
|
NotificationCenter.default.removeObserver(self)
|
|
NotificationCenter.default.addObserver(self,
|
|
selector: #selector(self.vpnStatusDidChange(notification:)),
|
|
name: Notification.Name.NEVPNStatusDidChange,
|
|
object: nil)
|
|
|
|
NETunnelProviderManager.loadAllFromPreferences { [weak self] managers, error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Loading from preference failed: \(error)")
|
|
closure(ConnectionState.Error, nil)
|
|
return
|
|
}
|
|
|
|
if self == nil {
|
|
Logger.global?.log(message: "We are shutting down.")
|
|
return
|
|
}
|
|
|
|
let nsManagers = managers ?? []
|
|
Logger.global?.log(message: "We have received \(nsManagers.count) managers.")
|
|
print("We have received \(nsManagers.count) managers.")
|
|
|
|
let tunnel = nsManagers.first(where: IOSVpnProtocolImpl.isOurManager(_:))
|
|
|
|
// if let name = tunnel?.localizedDescription, name == vpnName {
|
|
// tunnel?.removeFromPreferences(completionHandler: { removeError in
|
|
// if let error = removeError {
|
|
// Logger.global?.log(message: "WireguardVPN Tunnel Remove from Prefs Error: \(error)")
|
|
// closure(ConnectionState.Error, nil)
|
|
// return
|
|
// }
|
|
// })
|
|
// }
|
|
|
|
if tunnel == nil {
|
|
Logger.global?.log(message: "Creating the tunnel")
|
|
print("Creating the tunnel")
|
|
self!.tunnel = NETunnelProviderManager()
|
|
closure(ConnectionState.Disconnected, nil)
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Tunnel already exists")
|
|
print("Tunnel already exists")
|
|
|
|
self!.tunnel = tunnel
|
|
if tunnel?.connection.status == .connected {
|
|
closure(ConnectionState.Connected, tunnel?.connection.connectedDate)
|
|
} else {
|
|
closure(ConnectionState.Disconnected, nil)
|
|
}
|
|
}
|
|
}
|
|
|
|
@objc init(bundleID: String,
|
|
privateKey: Data,
|
|
deviceIpv4Address: String,
|
|
deviceIpv6Address: String,
|
|
closure: @escaping (ConnectionState, Date?) -> Void,
|
|
callback: @escaping (Bool) -> Void) {
|
|
super.init()
|
|
|
|
Logger.configureGlobal(tagged: "APP", withFilePath: "")
|
|
|
|
vpnBundleID = bundleID;
|
|
precondition(!vpnBundleID.isEmpty)
|
|
|
|
stateChangeCallback = callback
|
|
self.privateKey = PrivateKey(rawValue: privateKey)
|
|
self.deviceIpv4Address = deviceIpv4Address
|
|
self.deviceIpv6Address = deviceIpv6Address
|
|
self.openVPNConfig = nil
|
|
self.shadowSocksConfig = nil
|
|
|
|
NotificationCenter.default.removeObserver(self)
|
|
|
|
NotificationCenter.default.addObserver(self, selector: #selector(self.vpnStatusDidChange(notification:)), name: Notification.Name.NEVPNStatusDidChange, object: nil)
|
|
|
|
NETunnelProviderManager.loadAllFromPreferences { [weak self] managers, error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Loading from preference failed: \(error)")
|
|
closure(ConnectionState.Error, nil)
|
|
return
|
|
}
|
|
|
|
if self == nil {
|
|
Logger.global?.log(message: "We are shutting down.")
|
|
return
|
|
}
|
|
|
|
let nsManagers = managers ?? []
|
|
Logger.global?.log(message: "We have received \(nsManagers.count) managers.")
|
|
print("We have received \(nsManagers.count) managers.")
|
|
|
|
let tunnel = nsManagers.first(where: IOSVpnProtocolImpl.isOurManager(_:))
|
|
|
|
// if let name = tunnel?.localizedDescription, name != vpnName {
|
|
// tunnel?.removeFromPreferences(completionHandler: { removeError in
|
|
// if let error = removeError {
|
|
// Logger.global?.log(message: "OpenVpn Tunnel Remove from Prefs Error: \(error)")
|
|
// closure(ConnectionState.Error, nil)
|
|
// return
|
|
// }
|
|
// })
|
|
// }
|
|
|
|
if tunnel == nil {
|
|
Logger.global?.log(message: "Creating the tunnel")
|
|
print("Creating the tunnel")
|
|
self!.tunnel = NETunnelProviderManager()
|
|
closure(ConnectionState.Disconnected, nil)
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Tunnel already exists")
|
|
print("Tunnel already exists")
|
|
|
|
self!.tunnel = tunnel
|
|
|
|
if tunnel?.connection.status == .connected {
|
|
closure(ConnectionState.Connected, tunnel?.connection.connectedDate)
|
|
} else {
|
|
closure(ConnectionState.Disconnected, nil)
|
|
}
|
|
}
|
|
}
|
|
|
|
@objc init(bundleID: String,
|
|
tunnelConfig: String,
|
|
ssConfig: String,
|
|
closure: @escaping (ConnectionState, Date?) -> Void,
|
|
callback: @escaping (Bool) -> Void) {
|
|
super.init()
|
|
|
|
vpnBundleID = bundleID;
|
|
precondition(!vpnBundleID.isEmpty)
|
|
|
|
stateChangeCallback = callback
|
|
self.openVPNConfig = tunnelConfig
|
|
self.shadowSocksConfig = ssConfig
|
|
|
|
NotificationCenter.default.removeObserver(self)
|
|
|
|
NotificationCenter.default.addObserver(self, selector: #selector(self.vpnStatusDidChange(notification:)), name: Notification.Name.NEVPNStatusDidChange, object: nil)
|
|
|
|
NETunnelProviderManager.loadAllFromPreferences { [weak self] managers, error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Loading from preference failed: \(error)")
|
|
closure(ConnectionState.Error, nil)
|
|
return
|
|
}
|
|
|
|
if self == nil {
|
|
Logger.global?.log(message: "We are shutting down.")
|
|
return
|
|
}
|
|
|
|
let nsManagers = managers ?? []
|
|
Logger.global?.log(message: "We have received \(nsManagers.count) managers.")
|
|
print("We have received \(nsManagers.count) managers.")
|
|
|
|
let tunnel = nsManagers.first(where: IOSVpnProtocolImpl.isOurManager(_:))
|
|
|
|
if tunnel == nil {
|
|
Logger.global?.log(message: "Creating the tunnel via shadowsocks")
|
|
print("Creating the tunnel via SS")
|
|
self!.tunnel = NETunnelProviderManager()
|
|
closure(ConnectionState.Disconnected, nil)
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Tunnel already exists")
|
|
print("SS Tunnel already exists")
|
|
|
|
self!.tunnel = tunnel
|
|
|
|
if tunnel?.connection.status == .connected {
|
|
closure(ConnectionState.Connected, tunnel?.connection.connectedDate)
|
|
} else {
|
|
closure(ConnectionState.Disconnected, nil)
|
|
}
|
|
}
|
|
}
|
|
|
|
@objc private func vpnStatusDidChange(notification: Notification) {
|
|
guard let session = (notification.object as? NETunnelProviderSession), tunnel?.connection == session else { return }
|
|
|
|
switch session.status {
|
|
case .connected:
|
|
Logger.global?.log(message: "STATE CHANGED: connected")
|
|
print("STATE CHANGED: connected")
|
|
case .connecting:
|
|
Logger.global?.log(message: "STATE CHANGED: connecting")
|
|
print("STATE CHANGED: connecting")
|
|
case .disconnected:
|
|
Logger.global?.log(message: "STATE CHANGED: disconnected")
|
|
print("STATE CHANGED: disconnected")
|
|
case .disconnecting:
|
|
Logger.global?.log(message: "STATE CHANGED: disconnecting")
|
|
print("STATE CHANGED: disconnecting")
|
|
case .invalid:
|
|
Logger.global?.log(message: "STATE CHANGED: invalid")
|
|
print("STATE CHANGED: invalid")
|
|
case .reasserting:
|
|
Logger.global?.log(message: "STATE CHANGED: reasserting")
|
|
print("STATE CHANGED: reasserting")
|
|
default:
|
|
Logger.global?.log(message: "STATE CHANGED: unknown status")
|
|
print("STATE CHANGED: unknown status")
|
|
}
|
|
|
|
// We care about "unknown" state changes.
|
|
if (session.status != .connected && session.status != .disconnected) {
|
|
return
|
|
}
|
|
|
|
stateChangeCallback?(session.status == .connected)
|
|
}
|
|
|
|
private static func isOurManager(_ manager: NETunnelProviderManager) -> Bool {
|
|
guard
|
|
let proto = manager.protocolConfiguration,
|
|
let tunnelProto = proto as? NETunnelProviderProtocol
|
|
else {
|
|
Logger.global?.log(message: "Ignoring manager because the proto is invalid.")
|
|
return false
|
|
}
|
|
|
|
if (tunnelProto.providerBundleIdentifier == nil) {
|
|
Logger.global?.log(message: "Ignoring manager because the bundle identifier is null.")
|
|
return false
|
|
}
|
|
|
|
if (tunnelProto.providerBundleIdentifier != vpnBundleID) {
|
|
Logger.global?.log(message: "Ignoring manager because the bundle identifier doesn't match.")
|
|
return false;
|
|
}
|
|
|
|
Logger.global?.log(message: "Found the manager with the correct bundle identifier: \(tunnelProto.providerBundleIdentifier!)")
|
|
print("Found the manager with the correct bundle identifier: \(tunnelProto.providerBundleIdentifier!)")
|
|
return true
|
|
}
|
|
|
|
@objc func connect(ssConfig: String,
|
|
ovpnConfig: String,
|
|
failureCallback: @escaping () -> Void) {
|
|
Logger.global?.log(message: "Connecting")
|
|
// assert(tunnel != nil)
|
|
|
|
self.openVPNConfig = ovpnConfig
|
|
self.shadowSocksConfig = ssConfig
|
|
|
|
let addr: String = ovpnConfig
|
|
.splitToArray(separator: "\n", trimmingCharacters: nil)
|
|
.first { $0.starts(with: "remote ") }
|
|
.splitToArray(separator: " ", trimmingCharacters: nil)[1]
|
|
print("server: \(addr)")
|
|
|
|
// Let's remove the previous config if it exists.
|
|
(tunnel?.protocolConfiguration as? NETunnelProviderProtocol)?.destroyConfigurationReference()
|
|
|
|
self.configureTunnel(withShadowSocks: self.shadowSocksConfig, serverAddress: addr, config: self.openVPNConfig, failureCallback: failureCallback)
|
|
}
|
|
|
|
@objc func connect(ovpnConfig: String, failureCallback: @escaping () -> Void) {
|
|
Logger.global?.log(message: "Connecting")
|
|
// assert(tunnel != nil)
|
|
|
|
let addr: String = ovpnConfig
|
|
.splitToArray(separator: "\n", trimmingCharacters: nil)
|
|
.first { $0.starts(with: "remote ") }
|
|
.splitToArray(separator: " ", trimmingCharacters: nil)[1]
|
|
print("server: \(addr)")
|
|
|
|
// Let's remove the previous config if it exists.
|
|
(tunnel?.protocolConfiguration as? NETunnelProviderProtocol)?.destroyConfigurationReference()
|
|
|
|
self.configureOpenVPNTunnel(serverAddress: addr, config: ovpnConfig, failureCallback: failureCallback)
|
|
}
|
|
|
|
@objc func connect(dnsServer: String, serverIpv6Gateway: String, serverPublicKey: String, presharedKey: String, serverIpv4AddrIn: String, serverPort: Int, allowedIPAddressRanges: Array<VPNIPAddressRange>, ipv6Enabled: Bool, reason: Int, failureCallback: @escaping () -> Void) {
|
|
Logger.global?.log(message: "Connecting")
|
|
// assert(tunnel != nil)
|
|
|
|
// Let's remove the previous config if it exists.
|
|
(tunnel?.protocolConfiguration as? NETunnelProviderProtocol)?.destroyConfigurationReference()
|
|
|
|
let keyData = PublicKey(base64Key: serverPublicKey)!
|
|
let dnsServerIP = IPv4Address(dnsServer)
|
|
let ipv6GatewayIP = IPv6Address(serverIpv6Gateway)
|
|
|
|
var peerConfiguration = PeerConfiguration(publicKey: keyData)
|
|
peerConfiguration.preSharedKey = PreSharedKey(base64Key: presharedKey)
|
|
peerConfiguration.endpoint = Endpoint(from: serverIpv4AddrIn + ":\(serverPort )")
|
|
peerConfiguration.allowedIPs = []
|
|
|
|
allowedIPAddressRanges.forEach {
|
|
if (!$0.isIpv6) {
|
|
peerConfiguration.allowedIPs.append(IPAddressRange(address: IPv4Address($0.address as String)!, networkPrefixLength: $0.networkPrefixLength))
|
|
} else if (ipv6Enabled) {
|
|
peerConfiguration.allowedIPs.append(IPAddressRange(address: IPv6Address($0.address as String)!, networkPrefixLength: $0.networkPrefixLength))
|
|
}
|
|
}
|
|
|
|
var peerConfigurations: [PeerConfiguration] = []
|
|
peerConfigurations.append(peerConfiguration)
|
|
|
|
var interface = InterfaceConfiguration(privateKey: privateKey!)
|
|
|
|
if let ipv4Address = IPAddressRange(from: deviceIpv4Address!),
|
|
let ipv6Address = IPAddressRange(from: deviceIpv6Address!) {
|
|
interface.addresses = [ipv4Address]
|
|
if (ipv6Enabled) {
|
|
interface.addresses.append(ipv6Address)
|
|
}
|
|
}
|
|
interface.dns = [ DNSServer(address: dnsServerIP!)]
|
|
interface.mtu = 1412 // 1280
|
|
|
|
if (ipv6Enabled) {
|
|
interface.dns.append(DNSServer(address: ipv6GatewayIP!))
|
|
}
|
|
|
|
let config = TunnelConfiguration(name: vpnName, interface: interface, peers: peerConfigurations)
|
|
|
|
self.configureTunnel(config: config, reason: reason, failureCallback: failureCallback)
|
|
}
|
|
|
|
func configureTunnel(config: TunnelConfiguration, reason: Int, failureCallback: @escaping () -> Void) {
|
|
guard let proto = NETunnelProviderProtocol(tunnelConfiguration: config) else {
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
guard tunnel != nil else { failureCallback(); return }
|
|
proto.providerBundleIdentifier = vpnBundleID
|
|
|
|
tunnel!.protocolConfiguration = proto
|
|
tunnel!.localizedDescription = "Amnezia Wireguard"
|
|
tunnel!.isEnabled = true
|
|
|
|
tunnel!.saveToPreferences { [unowned self] saveError in
|
|
if let error = saveError {
|
|
Logger.global?.log(message: "Connect Tunnel Save Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Saving the tunnel succeeded")
|
|
|
|
self.tunnel!.loadFromPreferences { error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Connect Tunnel Load Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Loading the tunnel succeeded")
|
|
print("Loading the tunnel succeeded")
|
|
|
|
do {
|
|
if (reason == 1 /* ReasonSwitching */) {
|
|
let settings = config.asWgQuickConfig()
|
|
let settingsData = settings.data(using: .utf8)!
|
|
try (self.tunnel!.connection as? NETunnelProviderSession)?
|
|
.sendProviderMessage(settingsData) { data in
|
|
guard let data = data,
|
|
let configString = String(data: data, encoding: .utf8)
|
|
else {
|
|
Logger.global?.log(message: "Failed to convert response to string")
|
|
return
|
|
}
|
|
print("Config sent to NE: \(configString)")
|
|
}
|
|
} else {
|
|
print("starting tunnel")
|
|
try (self.tunnel!.connection as? NETunnelProviderSession)?.startTunnel()
|
|
}
|
|
} catch let error {
|
|
Logger.global?.log(message: "Something went wrong: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func configureTunnel(withShadowSocks ssConfig: String?, serverAddress: String, config: String?, failureCallback: @escaping () -> Void) {
|
|
guard let ss = ssConfig, let ovpn = config else { failureCallback(); return }
|
|
let tunnelProtocol = NETunnelProviderProtocol()
|
|
tunnelProtocol.serverAddress = serverAddress
|
|
tunnelProtocol.providerBundleIdentifier = vpnBundleID
|
|
tunnelProtocol.providerConfiguration = ["ovpn": Data(ovpn.utf8), "ss": Data(ss.utf8)]
|
|
tunnel?.protocolConfiguration = tunnelProtocol
|
|
tunnel?.localizedDescription = "Amnezia ShadowSocks"
|
|
tunnel?.isEnabled = true
|
|
|
|
tunnel?.saveToPreferences { [unowned self] saveError in
|
|
if let error = saveError {
|
|
Logger.global?.log(message: "Connect ShadowSocks Tunnel Save Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Saving ShadowSocks tunnel succeeded")
|
|
|
|
self.tunnel?.loadFromPreferences { error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Connect ShadowSocks Tunnel Load Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Loading the ShadowSocks tunnel succeeded")
|
|
print("Loading the ss tunnel succeeded")
|
|
|
|
do {
|
|
print("starting ss tunnel")
|
|
try self.tunnel?.connection.startVPNTunnel()
|
|
} catch let error {
|
|
Logger.global?.log(message: "Something went wrong: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func configureOpenVPNTunnel(serverAddress: String, config: String, failureCallback: @escaping () -> Void) {
|
|
let tunnelProtocol = NETunnelProviderProtocol()
|
|
tunnelProtocol.serverAddress = serverAddress
|
|
tunnelProtocol.providerBundleIdentifier = vpnBundleID
|
|
tunnelProtocol.providerConfiguration = ["ovpn": Data(config.utf8)]
|
|
tunnel?.protocolConfiguration = tunnelProtocol
|
|
tunnel?.localizedDescription = "Amnezia OpenVPN"
|
|
tunnel?.isEnabled = true
|
|
|
|
tunnel?.saveToPreferences { [unowned self] saveError in
|
|
if let error = saveError {
|
|
Logger.global?.log(message: "Connect OpenVPN Tunnel Save Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Saving the OpenVPN tunnel succeeded")
|
|
|
|
self.tunnel?.loadFromPreferences { error in
|
|
if let error = error {
|
|
Logger.global?.log(message: "Connect OpenVPN Tunnel Load Error: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
|
|
Logger.global?.log(message: "Loading the OpenVPN tunnel succeeded")
|
|
print("Loading the openvpn tunnel succeeded")
|
|
|
|
do {
|
|
print("starting openvpn tunnel")
|
|
try self.tunnel?.connection.startVPNTunnel()
|
|
} catch let error {
|
|
Logger.global?.log(message: "Something went wrong: \(error)")
|
|
failureCallback()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@objc func disconnect() {
|
|
Logger.global?.log(message: "Disconnecting")
|
|
guard tunnel != nil else { return }
|
|
(tunnel!.connection as? NETunnelProviderSession)?.stopTunnel()
|
|
}
|
|
|
|
@objc func checkStatus(callback: @escaping (String, String, String) -> Void) {
|
|
Logger.global?.log(message: "Check status")
|
|
// assert(tunnel != nil)
|
|
print("check status")
|
|
let protoType = (tunnel!.localizedDescription ?? "").toTunnelType
|
|
print(protoType);
|
|
|
|
switch protoType {
|
|
case .wireguard:
|
|
checkWireguardStatus(callback: callback)
|
|
case .openvpn:
|
|
checkOVPNStatus(callback: callback)
|
|
case .shadowsocks:
|
|
checkShadowSocksStatus(callback: callback)
|
|
case .empty:
|
|
break
|
|
}
|
|
|
|
}
|
|
|
|
private func checkShadowSocksStatus(callback: @escaping (String, String, String) -> Void) {
|
|
Logger.global?.log(message: "Check ShadowSocks")
|
|
guard let proto = tunnel?.protocolConfiguration as? NETunnelProviderProtocol else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
guard let ssData = proto.providerConfiguration?["ss"] as? Data,
|
|
let ssConfig = try? JSONSerialization.jsonObject(with: ssData, options: []) as? [String: Any],
|
|
let serverIpv4Gateway = ssConfig["remote_host"] as? String else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
print("server IP: \(serverIpv4Gateway)")
|
|
|
|
let deviceIpv4Address = getWiFiAddress()
|
|
print("device IP: \(serverIpv4Gateway)")
|
|
if deviceIpv4Address == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
guard let session = tunnel?.connection as? NETunnelProviderSession else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
do {
|
|
try session.sendProviderMessage(Data([UInt8(0)])) { [callback] data in
|
|
guard let data = data,
|
|
let configString = String(data: data, encoding: .utf8)
|
|
else {
|
|
Logger.global?.log(message: "Failed to convert data to string")
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
callback("\(serverIpv4Gateway)", "\(deviceIpv4Address!)", configString)
|
|
}
|
|
} catch {
|
|
Logger.global?.log(message: "Failed to retrieve data from session")
|
|
callback("", "", "")
|
|
}
|
|
}
|
|
|
|
private func checkOVPNStatus(callback: @escaping (String, String, String) -> Void) {
|
|
Logger.global?.log(message: "Check OpenVPN")
|
|
guard let proto = tunnel?.protocolConfiguration as? NETunnelProviderProtocol else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
guard let configData = proto.providerConfiguration?["ovpn"] as? Data,
|
|
let ovpnConfig = String(data: configData, encoding: .utf8) else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
let serverIpv4Gateway: String = ovpnConfig
|
|
.splitToArray(separator: "\n", trimmingCharacters: nil)
|
|
.first { $0.starts(with: "remote ") }
|
|
.splitToArray(separator: " ", trimmingCharacters: nil)[1]
|
|
|
|
print("server IP: \(serverIpv4Gateway)")
|
|
|
|
|
|
|
|
let deviceIpv4Address = getWiFiAddress()
|
|
print("device IP: \(deviceIpv4Address)")
|
|
if deviceIpv4Address == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
guard let session = tunnel?.connection as? NETunnelProviderSession else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
do {
|
|
try session.sendProviderMessage(Data([UInt8(0)])) { [callback] data in
|
|
guard let data = data,
|
|
let configString = String(data: data, encoding: .utf8)
|
|
else {
|
|
Logger.global?.log(message: "Failed to convert data to string")
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
callback("\(serverIpv4Gateway)", "\(deviceIpv4Address!)", configString)
|
|
}
|
|
} catch {
|
|
Logger.global?.log(message: "Failed to retrieve data from session")
|
|
callback("", "", "")
|
|
}
|
|
}
|
|
|
|
private func checkWireguardStatus(callback: @escaping (String, String, String) -> Void) {
|
|
Logger.global?.log(message: "Check Wireguard")
|
|
let proto = tunnel!.protocolConfiguration as? NETunnelProviderProtocol
|
|
if proto == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
let tunnelConfiguration = proto?.asTunnelConfiguration()
|
|
if tunnelConfiguration == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
let serverIpv4Gateway = tunnelConfiguration?.interface.dns[0].address
|
|
if serverIpv4Gateway == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
let deviceIpv4Address = tunnelConfiguration?.interface.addresses[0].address
|
|
if deviceIpv4Address == nil {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
guard let session = tunnel?.connection as? NETunnelProviderSession
|
|
else {
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
do {
|
|
try session.sendProviderMessage(Data([UInt8(0)])) { [callback] data in
|
|
guard let data = data,
|
|
let configString = String(data: data, encoding: .utf8)
|
|
else {
|
|
Logger.global?.log(message: "Failed to convert data to string")
|
|
callback("", "", "")
|
|
return
|
|
}
|
|
|
|
callback("\(serverIpv4Gateway!)", "\(deviceIpv4Address!)", configString)
|
|
}
|
|
} catch {
|
|
Logger.global?.log(message: "Failed to retrieve data from session")
|
|
callback("", "", "")
|
|
}
|
|
}
|
|
|
|
func getWiFiAddress() -> String? {
|
|
var address : String?
|
|
|
|
// Get list of all interfaces on the local machine:
|
|
var ifaddr : UnsafeMutablePointer<ifaddrs>?
|
|
guard getifaddrs(&ifaddr) == 0 else { return nil }
|
|
guard let firstAddr = ifaddr else { return nil }
|
|
|
|
// For each interface ...
|
|
for ifptr in sequence(first: firstAddr, next: { $0.pointee.ifa_next }) {
|
|
let interface = ifptr.pointee
|
|
|
|
// Check for IPv4 or IPv6 interface:
|
|
let addrFamily = interface.ifa_addr.pointee.sa_family
|
|
//if addrFamily == UInt8(AF_INET) || addrFamily == UInt8(AF_INET6) { // **ipv6 committed
|
|
if addrFamily == UInt8(AF_INET){
|
|
|
|
// Check interface name:
|
|
let name = String(cString: interface.ifa_name)
|
|
if name == "en0" {
|
|
|
|
// Convert interface address to a human readable string:
|
|
var hostname = [CChar](repeating: 0, count: Int(NI_MAXHOST))
|
|
getnameinfo(interface.ifa_addr, socklen_t(interface.ifa_addr.pointee.sa_len),
|
|
&hostname, socklen_t(hostname.count),
|
|
nil, socklen_t(0), NI_NUMERICHOST)
|
|
address = String(cString: hostname)
|
|
}
|
|
}
|
|
}
|
|
freeifaddrs(ifaddr)
|
|
|
|
return address
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
enum TunnelType: String {
|
|
case wireguard, openvpn, shadowsocks, empty
|
|
}
|
|
|
|
extension String {
|
|
var toTunnelType: TunnelType {
|
|
switch self {
|
|
case "Amnezia Wireguard": return .wireguard
|
|
case "Amnezia OpenVPN": return .openvpn
|
|
case "Amnezia ShadowSocks": return .shadowsocks
|
|
default:
|
|
return .empty
|
|
}
|
|
}
|
|
}
|