2025-12-02 11:46:24 +07:00
|
|
|
#include "vpnconnection.h"
|
2023-08-30 15:10:44 +05:00
|
|
|
|
2020-12-26 15:03:51 +03:00
|
|
|
#include <QDebug>
|
2024-09-13 13:53:21 +04:00
|
|
|
#include <QEventLoop>
|
2021-01-06 17:12:24 +03:00
|
|
|
#include <QFile>
|
2022-01-22 20:00:06 +03:00
|
|
|
#include <QHostInfo>
|
2021-02-18 15:00:41 +03:00
|
|
|
#include <QJsonObject>
|
2025-12-02 11:46:24 +07:00
|
|
|
#include <QObject>
|
|
|
|
|
#include <QSharedPointer>
|
|
|
|
|
#include <QString>
|
|
|
|
|
#include <QStringList>
|
|
|
|
|
#include <QTimer>
|
2020-12-26 15:03:51 +03:00
|
|
|
|
2021-04-04 23:12:36 +03:00
|
|
|
#include <configurators/cloak_configurator.h>
|
2023-08-28 22:03:28 +03:00
|
|
|
#include <configurators/openvpn_configurator.h>
|
2021-05-07 23:28:37 +03:00
|
|
|
#include <configurators/shadowsocks_configurator.h>
|
2023-08-28 22:03:28 +03:00
|
|
|
#include <configurators/wireguard_configurator.h>
|
2022-02-22 02:08:57 +03:00
|
|
|
|
|
|
|
|
#ifdef AMNEZIA_DESKTOP
|
2023-08-28 22:03:28 +03:00
|
|
|
#include "core/ipcclient.h"
|
|
|
|
|
#include <protocols/wireguardprotocol.h>
|
2022-02-22 02:08:57 +03:00
|
|
|
#endif
|
2021-01-06 17:12:24 +03:00
|
|
|
|
2021-09-30 18:16:41 +03:00
|
|
|
#ifdef Q_OS_ANDROID
|
2023-12-04 18:23:08 +03:00
|
|
|
#include "platforms/android/android_controller.h"
|
2025-12-02 11:46:24 +07:00
|
|
|
#include <QThread>
|
|
|
|
|
|
2021-09-30 18:16:41 +03:00
|
|
|
#endif
|
|
|
|
|
|
2025-08-10 06:12:19 +03:00
|
|
|
#if defined(Q_OS_IOS) || defined(MACOS_NE)
|
2023-08-28 22:03:28 +03:00
|
|
|
#include "platforms/ios/ios_controller.h"
|
2021-11-30 16:56:24 +04:00
|
|
|
#endif
|
|
|
|
|
|
2024-03-28 17:13:48 +00:00
|
|
|
#include "core/networkUtilities.h"
|
2020-12-26 15:03:51 +03:00
|
|
|
#include "vpnconnection.h"
|
|
|
|
|
|
2024-04-01 20:20:02 +07:00
|
|
|
VpnConnection::VpnConnection(std::shared_ptr<Settings> settings, QObject *parent)
|
|
|
|
|
: QObject(parent), m_settings(settings), m_checkTimer(new QTimer(this))
|
2021-12-20 15:43:36 +03:00
|
|
|
{
|
2025-08-10 06:12:19 +03:00
|
|
|
#if defined(Q_OS_IOS) || defined(MACOS_NE)
|
2025-11-30 18:49:16 -08:00
|
|
|
m_checkTimer.setInterval(1000);
|
2026-02-23 11:00:13 +01:00
|
|
|
connect(IosController::Instance(), &IosController::connectionStateChanged, this, &VpnConnection::setConnectionState);
|
2023-08-27 10:46:41 -07:00
|
|
|
connect(IosController::Instance(), &IosController::bytesChanged, this, &VpnConnection::onBytesChanged);
|
|
|
|
|
#endif
|
2021-02-18 15:00:41 +03:00
|
|
|
}
|
2021-02-03 15:42:36 +03:00
|
|
|
|
2021-02-18 15:00:41 +03:00
|
|
|
VpnConnection::~VpnConnection()
|
|
|
|
|
{
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void VpnConnection::onBytesChanged(quint64 receivedBytes, quint64 sentBytes)
|
|
|
|
|
{
|
2022-12-15 18:46:15 +03:00
|
|
|
emit bytesChanged(receivedBytes, sentBytes);
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
2025-05-02 23:54:36 -07:00
|
|
|
void VpnConnection::onKillSwitchModeChanged(bool enabled)
|
|
|
|
|
{
|
|
|
|
|
#ifdef AMNEZIA_DESKTOP
|
2025-12-19 04:09:50 +01:00
|
|
|
IpcClient::withInterface([enabled](QSharedPointer<IpcInterfaceReplica> iface){
|
|
|
|
|
QRemoteObjectPendingReply<bool> reply = iface->refreshKillSwitch(enabled);
|
2026-02-19 13:21:49 +01:00
|
|
|
if (reply.waitForFinished() && reply.returnValue())
|
2025-12-19 04:09:50 +01:00
|
|
|
qDebug() << "VpnConnection::onKillSwitchModeChanged: Killswitch refreshed";
|
|
|
|
|
else
|
|
|
|
|
qWarning() << "VpnConnection::onKillSwitchModeChanged: Failed to execute remote refreshKillSwitch call";
|
|
|
|
|
});
|
2025-05-02 23:54:36 -07:00
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
2023-05-14 21:11:19 +08:00
|
|
|
void VpnConnection::onConnectionStateChanged(Vpn::ConnectionState state)
|
2020-12-26 15:03:51 +03:00
|
|
|
{
|
2022-02-22 02:08:57 +03:00
|
|
|
#ifdef AMNEZIA_DESKTOP
|
2024-10-23 00:33:22 +08:00
|
|
|
auto container = m_settings->defaultContainer(m_settings->defaultServerIndex());
|
2024-09-13 13:53:21 +04:00
|
|
|
|
2025-12-19 04:09:50 +01:00
|
|
|
IpcClient::withInterface([&](QSharedPointer<IpcInterfaceReplica> iface) {
|
2026-02-19 13:21:49 +01:00
|
|
|
switch (state) {
|
|
|
|
|
case Vpn::ConnectionState::Connected: {
|
|
|
|
|
iface->resetIpStack();
|
|
|
|
|
|
|
|
|
|
auto flushDns = iface->flushDns();
|
|
|
|
|
if (flushDns.waitForFinished() && flushDns.returnValue())
|
|
|
|
|
qDebug() << "VpnConnection::onConnectionStateChanged: Successfully flushed DNS";
|
|
|
|
|
else
|
|
|
|
|
qWarning() << "VpnConnection::onConnectionStateChanged: Failed to clear saved routes";
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (!ContainerProps::isAwgContainer(container) &&
|
|
|
|
|
container != DockerContainer::WireGuard) {
|
|
|
|
|
QString dns1 = m_vpnConfiguration.value(config_key::dns1).toString();
|
|
|
|
|
QString dns2 = m_vpnConfiguration.value(config_key::dns2).toString();
|
|
|
|
|
|
|
|
|
|
// TODO: add error code handling for all routeAddList (or rework the code below)
|
|
|
|
|
iface->routeAddList(m_vpnProtocol->vpnGateway(), QStringList() << dns1 << dns2);
|
|
|
|
|
|
|
|
|
|
if (m_settings->isSitesSplitTunnelingEnabled()) {
|
|
|
|
|
iface->routeDeleteList(m_vpnProtocol->vpnGateway(), QStringList() << "0.0.0.0");
|
|
|
|
|
// qDebug() << "VpnConnection::onConnectionStateChanged :: adding custom routes, count:" << forwardIps.size();
|
|
|
|
|
if (m_settings->routeMode() == Settings::VpnOnlyForwardSites) {
|
|
|
|
|
QTimer::singleShot(1000, m_vpnProtocol.data(),
|
|
|
|
|
[this]() { addSitesRoutes(m_vpnProtocol->vpnGateway(), m_settings->routeMode()); });
|
|
|
|
|
} else if (m_settings->routeMode() == Settings::VpnAllExceptSites) {
|
|
|
|
|
iface->routeAddList(m_vpnProtocol->vpnGateway(), QStringList() << "0.0.0.0/1");
|
|
|
|
|
iface->routeAddList(m_vpnProtocol->vpnGateway(), QStringList() << "128.0.0.0/1");
|
|
|
|
|
|
|
|
|
|
iface->routeAddList(m_vpnProtocol->routeGateway(), QStringList() << remoteAddress());
|
|
|
|
|
addSitesRoutes(m_vpnProtocol->routeGateway(), m_settings->routeMode());
|
|
|
|
|
}
|
2024-04-08 16:13:26 +05:00
|
|
|
}
|
2024-01-17 00:34:23 +07:00
|
|
|
}
|
2026-02-19 13:21:49 +01:00
|
|
|
} break;
|
|
|
|
|
case Vpn::ConnectionState::Disconnected:
|
|
|
|
|
case Vpn::ConnectionState::Error: {
|
|
|
|
|
auto flushDns = iface->flushDns();
|
|
|
|
|
if (flushDns.waitForFinished() && flushDns.returnValue())
|
|
|
|
|
qDebug() << "VpnConnection::onConnectionStateChanged: Successfully flushed DNS";
|
|
|
|
|
else
|
|
|
|
|
qWarning() << "VpnConnection::onConnectionStateChanged: Failed to flush DNS";
|
|
|
|
|
|
|
|
|
|
auto clearSavedRoutes = iface->clearSavedRoutes();
|
|
|
|
|
if (clearSavedRoutes.waitForFinished() && clearSavedRoutes.returnValue())
|
|
|
|
|
qDebug() << "VpnConnection::onConnectionStateChanged: Successfully cleared saved routes";
|
|
|
|
|
else
|
|
|
|
|
qWarning() << "VpnConnection::onConnectionStateChanged: Failed to clear saved routes";
|
|
|
|
|
} break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
2021-02-18 15:00:41 +03:00
|
|
|
}
|
2025-12-19 04:09:50 +01:00
|
|
|
});
|
2022-02-22 02:08:57 +03:00
|
|
|
#endif
|
2022-12-12 16:16:12 +04:00
|
|
|
|
2025-08-10 06:12:19 +03:00
|
|
|
#if defined(Q_OS_IOS) || defined(MACOS_NE)
|
2025-12-30 04:45:32 +02:00
|
|
|
if (state == Vpn::ConnectionState::Connected ||
|
|
|
|
|
state == Vpn::ConnectionState::Connecting ||
|
|
|
|
|
state == Vpn::ConnectionState::Reconnecting) {
|
2023-08-08 19:02:41 -07:00
|
|
|
m_checkTimer.start();
|
2023-08-28 22:03:28 +03:00
|
|
|
} else {
|
2023-08-08 19:02:41 -07:00
|
|
|
m_checkTimer.stop();
|
2022-12-12 16:16:12 +04:00
|
|
|
}
|
|
|
|
|
#endif
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
2021-06-12 11:59:36 +03:00
|
|
|
const QString &VpnConnection::remoteAddress() const
|
|
|
|
|
{
|
|
|
|
|
return m_remoteAddress;
|
|
|
|
|
}
|
|
|
|
|
|
2022-01-22 20:00:06 +03:00
|
|
|
void VpnConnection::addSitesRoutes(const QString &gw, Settings::RouteMode mode)
|
|
|
|
|
{
|
2022-02-22 02:08:57 +03:00
|
|
|
#ifdef AMNEZIA_DESKTOP
|
2022-01-22 20:00:06 +03:00
|
|
|
QStringList ips;
|
|
|
|
|
QStringList sites;
|
2022-08-25 12:47:02 +03:00
|
|
|
const QVariantMap &m = m_settings->vpnSites(mode);
|
2022-01-22 20:00:06 +03:00
|
|
|
for (auto i = m.constBegin(); i != m.constEnd(); ++i) {
|
2024-03-27 11:02:34 +00:00
|
|
|
if (NetworkUtilities::checkIpSubnetFormat(i.key())) {
|
2022-01-22 20:00:06 +03:00
|
|
|
ips.append(i.key());
|
2023-08-28 22:03:28 +03:00
|
|
|
} else {
|
2024-03-27 11:02:34 +00:00
|
|
|
if (NetworkUtilities::checkIpSubnetFormat(i.value().toString())) {
|
2022-01-22 20:00:06 +03:00
|
|
|
ips.append(i.value().toString());
|
|
|
|
|
}
|
|
|
|
|
sites.append(i.key());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ips.removeDuplicates();
|
|
|
|
|
|
2025-12-19 04:09:50 +01:00
|
|
|
IpcClient::withInterface([&](QSharedPointer<IpcInterfaceReplica> iface) {
|
|
|
|
|
iface->routeAddList(gw, ips);
|
|
|
|
|
});
|
2022-01-22 20:00:06 +03:00
|
|
|
|
|
|
|
|
// re-resolve domains
|
2023-08-28 22:03:28 +03:00
|
|
|
for (const QString &site : sites) {
|
|
|
|
|
const auto &cbResolv = [this, site, gw, mode, ips](const QHostInfo &hostInfo) {
|
|
|
|
|
const QList<QHostAddress> &addresses = hostInfo.addresses();
|
|
|
|
|
QString ipv4Addr;
|
|
|
|
|
for (const QHostAddress &addr : hostInfo.addresses()) {
|
|
|
|
|
if (addr.protocol() == QAbstractSocket::NetworkLayerProtocol::IPv4Protocol) {
|
|
|
|
|
const QString &ip = addr.toString();
|
|
|
|
|
// qDebug() << "VpnConnection::addSitesRoutes updating site" << site << ip;
|
|
|
|
|
if (!ips.contains(ip)) {
|
2025-12-19 04:09:50 +01:00
|
|
|
IpcClient::withInterface([&gw, &ip](QSharedPointer<IpcInterfaceReplica> iface) {
|
|
|
|
|
iface->routeAddList(gw, QStringList() << ip);
|
|
|
|
|
});
|
2023-08-28 22:03:28 +03:00
|
|
|
m_settings->addVpnSite(mode, site, ip);
|
2022-01-22 20:00:06 +03:00
|
|
|
}
|
2026-02-19 13:21:49 +01:00
|
|
|
IpcClient::withInterface([](QSharedPointer<IpcInterfaceReplica> iface) {
|
|
|
|
|
auto reply = iface->flushDns();
|
|
|
|
|
if (reply.waitForFinished() || !reply.returnValue())
|
|
|
|
|
qWarning() << "VpnConnection::addSitesRoutes: Failed to flush DNS";
|
|
|
|
|
});
|
2023-08-28 22:03:28 +03:00
|
|
|
break;
|
2022-01-22 20:00:06 +03:00
|
|
|
}
|
2023-08-28 22:03:28 +03:00
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
QHostInfo::lookupHost(site, this, cbResolv);
|
2022-01-22 20:00:06 +03:00
|
|
|
}
|
2022-02-22 02:08:57 +03:00
|
|
|
#endif
|
2022-01-22 20:00:06 +03:00
|
|
|
}
|
|
|
|
|
|
2021-02-18 15:00:41 +03:00
|
|
|
QSharedPointer<VpnProtocol> VpnConnection::vpnProtocol() const
|
|
|
|
|
{
|
|
|
|
|
return m_vpnProtocol;
|
|
|
|
|
}
|
|
|
|
|
|
2025-11-30 18:49:16 -08:00
|
|
|
void VpnConnection::disconnectSlots()
|
|
|
|
|
{
|
|
|
|
|
if (m_vpnProtocol) {
|
|
|
|
|
m_vpnProtocol->disconnect();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-01-06 17:12:24 +03:00
|
|
|
ErrorCode VpnConnection::lastError() const
|
2020-12-26 23:17:20 +03:00
|
|
|
{
|
2023-12-22 15:35:24 +03:00
|
|
|
#ifdef Q_OS_ANDROID
|
|
|
|
|
return ErrorCode::AndroidError;
|
|
|
|
|
#endif
|
|
|
|
|
|
2025-12-19 04:09:50 +01:00
|
|
|
if (m_vpnProtocol.isNull()) {
|
2021-01-06 17:12:24 +03:00
|
|
|
return ErrorCode::InternalError;
|
2020-12-26 23:17:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return m_vpnProtocol.data()->lastError();
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-28 22:03:28 +03:00
|
|
|
void VpnConnection::connectToVpn(int serverIndex, const ServerCredentials &credentials, DockerContainer container,
|
2024-04-01 20:20:02 +07:00
|
|
|
const QJsonObject &vpnConfiguration)
|
2021-01-06 17:12:24 +03:00
|
|
|
{
|
2026-02-11 17:44:11 +02:00
|
|
|
qDebug() << QString("Trying to connect to VPN, server index is %1, container is %2, route mode is")
|
2023-08-28 22:03:28 +03:00
|
|
|
.arg(serverIndex)
|
2025-08-10 06:12:19 +03:00
|
|
|
.arg(ContainerProps::containerToString(container))
|
|
|
|
|
<< m_settings->routeMode();
|
2021-10-26 12:59:20 +03:00
|
|
|
|
2024-09-17 01:14:13 +04:00
|
|
|
m_remoteAddress = NetworkUtilities::getIPAddress(credentials.hostName);
|
2026-02-19 13:21:49 +01:00
|
|
|
setConnectionState(Vpn::ConnectionState::Connecting);
|
2021-02-18 15:00:41 +03:00
|
|
|
|
2024-04-25 20:01:00 +07:00
|
|
|
m_vpnConfiguration = vpnConfiguration;
|
|
|
|
|
|
2023-08-27 10:46:41 -07:00
|
|
|
#ifdef AMNEZIA_DESKTOP
|
2021-02-18 15:00:41 +03:00
|
|
|
if (m_vpnProtocol) {
|
|
|
|
|
disconnect(m_vpnProtocol.data(), &VpnProtocol::protocolError, this, &VpnConnection::vpnProtocolError);
|
|
|
|
|
m_vpnProtocol->stop();
|
2021-02-25 18:05:42 +03:00
|
|
|
m_vpnProtocol.reset();
|
2021-02-18 15:00:41 +03:00
|
|
|
}
|
2024-04-25 20:01:00 +07:00
|
|
|
appendKillSwitchConfig();
|
2023-08-27 10:46:41 -07:00
|
|
|
#endif
|
2021-02-18 15:00:41 +03:00
|
|
|
|
2023-10-13 15:45:06 +05:00
|
|
|
appendSplitTunnelingConfig();
|
|
|
|
|
|
2025-08-10 06:12:19 +03:00
|
|
|
#if !defined(Q_OS_ANDROID) && !defined(Q_OS_IOS) && !defined(MACOS_NE)
|
2021-10-04 21:13:07 +03:00
|
|
|
m_vpnProtocol.reset(VpnProtocol::factory(container, m_vpnConfiguration));
|
2021-10-04 19:07:49 +03:00
|
|
|
if (!m_vpnProtocol) {
|
2026-02-19 13:21:49 +01:00
|
|
|
setConnectionState(Vpn::ConnectionState::Error);
|
2021-10-26 12:59:20 +03:00
|
|
|
return;
|
2021-04-04 23:12:36 +03:00
|
|
|
}
|
2021-10-04 19:07:49 +03:00
|
|
|
m_vpnProtocol->prepare();
|
2021-11-30 16:56:24 +04:00
|
|
|
#elif defined Q_OS_ANDROID
|
2023-12-04 18:23:08 +03:00
|
|
|
androidVpnProtocol = createDefaultAndroidVpnProtocol();
|
|
|
|
|
createAndroidConnections();
|
2021-11-26 17:43:02 +03:00
|
|
|
|
2021-10-07 22:52:13 +03:00
|
|
|
m_vpnProtocol.reset(androidVpnProtocol);
|
2025-08-10 06:12:19 +03:00
|
|
|
#elif defined Q_OS_IOS || defined(MACOS_NE)
|
2021-11-30 16:56:24 +04:00
|
|
|
Proto proto = ContainerProps::defaultProtocol(container);
|
2023-08-27 10:46:41 -07:00
|
|
|
IosController::Instance()->connectVpn(proto, m_vpnConfiguration);
|
|
|
|
|
connect(&m_checkTimer, &QTimer::timeout, IosController::Instance(), &IosController::checkStatus);
|
|
|
|
|
return;
|
2021-09-30 18:16:41 +03:00
|
|
|
#endif
|
2020-12-26 15:03:51 +03:00
|
|
|
|
2023-03-15 16:46:59 +03:00
|
|
|
createProtocolConnections();
|
2020-12-26 15:03:51 +03:00
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
if (ErrorCode err = m_vpnProtocol->start(); err != ErrorCode::NoError) {
|
|
|
|
|
setConnectionState(Vpn::ConnectionState::Error);
|
|
|
|
|
emit vpnProtocolError(err);
|
|
|
|
|
}
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
2023-08-28 22:03:28 +03:00
|
|
|
void VpnConnection::createProtocolConnections()
|
|
|
|
|
{
|
2023-03-15 17:46:22 +03:00
|
|
|
connect(m_vpnProtocol.data(), &VpnProtocol::protocolError, this, &VpnConnection::vpnProtocolError);
|
2026-02-19 13:21:49 +01:00
|
|
|
connect(m_vpnProtocol.data(), &VpnProtocol::connectionStateChanged, this, &VpnConnection::setConnectionState);
|
2023-03-15 17:46:22 +03:00
|
|
|
connect(m_vpnProtocol.data(), SIGNAL(bytesChanged(quint64, quint64)), this, SLOT(onBytesChanged(quint64, quint64)));
|
2026-02-19 13:21:49 +01:00
|
|
|
|
|
|
|
|
#ifdef AMNEZIA_DESKTOP
|
|
|
|
|
IpcClient::withInterface([this](QSharedPointer<IpcInterfaceReplica> rep) {
|
|
|
|
|
connect(rep.data(), &IpcInterfaceReplica::networkChanged, this, &VpnConnection::reconnectToVpn, Qt::QueuedConnection);
|
|
|
|
|
connect(rep.data(), &IpcInterfaceReplica::wakeup, this, &VpnConnection::reconnectToVpn, Qt::QueuedConnection);
|
|
|
|
|
});
|
|
|
|
|
#endif
|
2023-03-15 17:46:22 +03:00
|
|
|
}
|
|
|
|
|
|
2024-04-25 20:01:00 +07:00
|
|
|
void VpnConnection::appendKillSwitchConfig()
|
|
|
|
|
{
|
|
|
|
|
m_vpnConfiguration.insert(config_key::killSwitchOption, QVariant(m_settings->isKillSwitchEnabled()).toString());
|
2025-05-02 23:54:36 -07:00
|
|
|
m_vpnConfiguration.insert(config_key::allowedDnsServers, QVariant(m_settings->allowedDnsServers()).toJsonValue());
|
2024-04-25 20:01:00 +07:00
|
|
|
}
|
|
|
|
|
|
2023-10-13 15:45:06 +05:00
|
|
|
void VpnConnection::appendSplitTunnelingConfig()
|
|
|
|
|
{
|
2024-09-13 13:53:21 +04:00
|
|
|
bool allowSiteBasedSplitTunneling = true;
|
|
|
|
|
|
|
|
|
|
// this block is for old native configs and for old self-hosted configs
|
|
|
|
|
auto protocolName = m_vpnConfiguration.value(config_key::vpnproto).toString();
|
|
|
|
|
if (protocolName == ProtocolProps::protoToString(Proto::Awg) || protocolName == ProtocolProps::protoToString(Proto::WireGuard)) {
|
|
|
|
|
allowSiteBasedSplitTunneling = false;
|
|
|
|
|
auto configData = m_vpnConfiguration.value(protocolName + "_config_data").toObject();
|
|
|
|
|
if (configData.value(config_key::allowed_ips).isString()) {
|
|
|
|
|
QJsonArray allowedIpsJsonArray = QJsonArray::fromStringList(configData.value(config_key::allowed_ips).toString().split(", "));
|
|
|
|
|
configData.insert(config_key::allowed_ips, allowedIpsJsonArray);
|
|
|
|
|
m_vpnConfiguration.insert(protocolName + "_config_data", configData);
|
|
|
|
|
} else if (configData.value(config_key::allowed_ips).isUndefined()) {
|
|
|
|
|
auto nativeConfig = configData.value(config_key::config).toString();
|
|
|
|
|
auto nativeConfigLines = nativeConfig.split("\n");
|
|
|
|
|
for (auto &line : nativeConfigLines) {
|
|
|
|
|
if (line.contains("AllowedIPs")) {
|
|
|
|
|
auto allowedIpsString = line.split(" = ");
|
|
|
|
|
if (allowedIpsString.size() < 1) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
QJsonArray allowedIpsJsonArray = QJsonArray::fromStringList(allowedIpsString.at(1).split(", "));
|
|
|
|
|
configData.insert(config_key::allowed_ips, allowedIpsJsonArray);
|
|
|
|
|
m_vpnConfiguration.insert(protocolName + "_config_data", configData);
|
|
|
|
|
break;
|
|
|
|
|
}
|
2024-01-31 21:41:46 +07:00
|
|
|
}
|
2024-01-31 21:29:39 +07:00
|
|
|
}
|
2024-04-26 18:44:27 +05:00
|
|
|
|
2024-09-13 13:53:21 +04:00
|
|
|
if (configData.value(config_key::persistent_keep_alive).isUndefined()) {
|
|
|
|
|
auto nativeConfig = configData.value(config_key::config).toString();
|
|
|
|
|
auto nativeConfigLines = nativeConfig.split("\n");
|
|
|
|
|
for (auto &line : nativeConfigLines) {
|
|
|
|
|
if (line.contains("PersistentKeepalive")) {
|
|
|
|
|
auto persistentKeepaliveString = line.split(" = ");
|
|
|
|
|
if (persistentKeepaliveString.size() < 1) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
configData.insert(config_key::persistent_keep_alive, persistentKeepaliveString.at(1));
|
|
|
|
|
m_vpnConfiguration.insert(protocolName + "_config_data", configData);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
QJsonArray allowedIpsJsonArray = configData.value(config_key::allowed_ips).toArray();
|
|
|
|
|
if (allowedIpsJsonArray.contains("0.0.0.0/0") && allowedIpsJsonArray.contains("::/0")) {
|
|
|
|
|
allowSiteBasedSplitTunneling = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-08-10 06:12:19 +03:00
|
|
|
Settings::RouteMode routeMode = Settings::RouteMode::VpnAllSites;
|
2024-09-13 13:53:21 +04:00
|
|
|
QJsonArray sitesJsonArray;
|
|
|
|
|
if (m_settings->isSitesSplitTunnelingEnabled()) {
|
2025-08-10 06:12:19 +03:00
|
|
|
routeMode = m_settings->routeMode();
|
2024-09-13 13:53:21 +04:00
|
|
|
|
|
|
|
|
if (allowSiteBasedSplitTunneling) {
|
2025-08-10 06:12:19 +03:00
|
|
|
auto sites = m_settings->getVpnIps(routeMode);
|
2024-04-26 18:44:27 +05:00
|
|
|
for (const auto &site : sites) {
|
|
|
|
|
sitesJsonArray.append(site);
|
|
|
|
|
}
|
2023-10-13 15:45:06 +05:00
|
|
|
|
2025-04-10 11:24:33 +04:00
|
|
|
if (sitesJsonArray.isEmpty()) {
|
2025-08-10 06:12:19 +03:00
|
|
|
routeMode = Settings::RouteMode::VpnAllSites;
|
|
|
|
|
} else if (routeMode == Settings::VpnOnlyForwardSites) {
|
2025-04-10 11:24:33 +04:00
|
|
|
// Allow traffic to Amnezia DNS
|
2024-04-26 18:44:27 +05:00
|
|
|
sitesJsonArray.append(m_vpnConfiguration.value(config_key::dns1).toString());
|
|
|
|
|
sitesJsonArray.append(m_vpnConfiguration.value(config_key::dns2).toString());
|
|
|
|
|
}
|
2024-04-08 16:13:26 +05:00
|
|
|
}
|
2023-10-25 22:19:07 +03:00
|
|
|
}
|
|
|
|
|
|
2025-08-10 06:12:19 +03:00
|
|
|
m_vpnConfiguration.insert(config_key::splitTunnelType, routeMode);
|
2024-09-13 13:53:21 +04:00
|
|
|
m_vpnConfiguration.insert(config_key::splitTunnelSites, sitesJsonArray);
|
|
|
|
|
|
2024-04-06 22:29:51 +07:00
|
|
|
Settings::AppsRouteMode appsRouteMode = Settings::AppsRouteMode::VpnAllApps;
|
2024-04-08 16:13:26 +05:00
|
|
|
QJsonArray appsJsonArray;
|
2024-04-25 20:01:00 +07:00
|
|
|
if (m_settings->isAppsSplitTunnelingEnabled()) {
|
2024-04-06 22:29:51 +07:00
|
|
|
appsRouteMode = m_settings->getAppsRouteMode();
|
2024-04-01 18:45:00 +07:00
|
|
|
|
2024-04-08 16:13:26 +05:00
|
|
|
auto apps = m_settings->getVpnApps(appsRouteMode);
|
|
|
|
|
for (const auto &app : apps) {
|
|
|
|
|
appsJsonArray.append(app.appPath.isEmpty() ? app.packageName : app.appPath);
|
|
|
|
|
}
|
2025-04-10 11:24:33 +04:00
|
|
|
|
|
|
|
|
if (appsJsonArray.isEmpty()) {
|
|
|
|
|
appsRouteMode = Settings::AppsRouteMode::VpnAllApps;
|
|
|
|
|
}
|
2024-04-01 18:45:00 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
m_vpnConfiguration.insert(config_key::appSplitTunnelType, appsRouteMode);
|
|
|
|
|
m_vpnConfiguration.insert(config_key::splitTunnelApps, appsJsonArray);
|
2026-02-11 17:44:11 +02:00
|
|
|
|
|
|
|
|
qDebug() << QString("Site split tunneling is %1, route mode is %2")
|
|
|
|
|
.arg(m_settings->isSitesSplitTunnelingEnabled() ? "enabled" : "disabled")
|
|
|
|
|
.arg(routeMode);
|
|
|
|
|
qDebug() << QString("App split tunneling is %1, route mode is %2")
|
|
|
|
|
.arg(m_settings->isAppsSplitTunnelingEnabled() ? "enabled" : "disabled")
|
|
|
|
|
.arg(appsRouteMode);
|
2023-10-13 15:45:06 +05:00
|
|
|
}
|
|
|
|
|
|
2023-03-15 17:46:22 +03:00
|
|
|
#ifdef Q_OS_ANDROID
|
2023-08-28 22:03:28 +03:00
|
|
|
void VpnConnection::restoreConnection()
|
|
|
|
|
{
|
2023-03-15 16:46:59 +03:00
|
|
|
createAndroidConnections();
|
|
|
|
|
|
|
|
|
|
m_vpnProtocol.reset(androidVpnProtocol);
|
|
|
|
|
|
|
|
|
|
createProtocolConnections();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void VpnConnection::createAndroidConnections()
|
|
|
|
|
{
|
2023-12-04 18:23:08 +03:00
|
|
|
androidVpnProtocol = createDefaultAndroidVpnProtocol();
|
2023-03-15 16:46:59 +03:00
|
|
|
|
2023-08-28 22:03:28 +03:00
|
|
|
connect(AndroidController::instance(), &AndroidController::connectionStateChanged, androidVpnProtocol,
|
|
|
|
|
&AndroidVpnProtocol::setConnectionState);
|
2024-09-13 13:53:21 +04:00
|
|
|
connect(AndroidController::instance(), &AndroidController::statisticsUpdated, androidVpnProtocol, &AndroidVpnProtocol::setBytesChanged);
|
2023-03-15 16:46:59 +03:00
|
|
|
}
|
|
|
|
|
|
2023-12-04 18:23:08 +03:00
|
|
|
AndroidVpnProtocol *VpnConnection::createDefaultAndroidVpnProtocol()
|
2023-03-15 16:46:59 +03:00
|
|
|
{
|
2023-12-04 18:23:08 +03:00
|
|
|
return new AndroidVpnProtocol(m_vpnConfiguration);
|
2023-03-15 16:46:59 +03:00
|
|
|
}
|
2023-03-15 17:46:22 +03:00
|
|
|
#endif
|
2023-03-15 16:46:59 +03:00
|
|
|
|
2021-01-09 19:55:16 +03:00
|
|
|
QString VpnConnection::bytesPerSecToText(quint64 bytes)
|
2020-12-26 15:03:51 +03:00
|
|
|
{
|
2021-01-09 19:55:16 +03:00
|
|
|
double mbps = bytes * 8 / 1e6;
|
|
|
|
|
return QString("%1 %2").arg(QString::number(mbps, 'f', 2)).arg(tr("Mbps")); // Mbit/s
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
void VpnConnection::reconnectToVpn() {
|
|
|
|
|
if (m_vpnProtocol.isNull())
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
if (m_connectionState != Vpn::ConnectionState::Connected) {
|
|
|
|
|
qWarning() << QString("Reconnect triggered on %1 during inappropriate state: %2; ignoring slot")
|
|
|
|
|
.arg(QMetaEnum::fromType<Vpn::ConnectionState>().valueToKey(m_connectionState));
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
qDebug() << "Reconnect triggered. Reconnecting to the server";
|
|
|
|
|
|
|
|
|
|
setConnectionState(Vpn::ConnectionState::Reconnecting);
|
|
|
|
|
|
|
|
|
|
m_vpnProtocol->stop();
|
|
|
|
|
if (ErrorCode err = m_vpnProtocol->start(); err != ErrorCode::NoError) {
|
|
|
|
|
setConnectionState(Vpn::ConnectionState::Error);
|
|
|
|
|
emit vpnProtocolError(err);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-12-26 15:03:51 +03:00
|
|
|
void VpnConnection::disconnectFromVpn()
|
|
|
|
|
{
|
2025-12-27 05:09:11 +02:00
|
|
|
#if defined(Q_OS_IOS) || defined(MACOS_NE)
|
|
|
|
|
// iOS/macOS NE use IosController directly; m_vpnProtocol is not set there.
|
|
|
|
|
IosController::Instance()->disconnectVpn();
|
|
|
|
|
disconnect(&m_checkTimer, &QTimer::timeout, IosController::Instance(), &IosController::checkStatus);
|
|
|
|
|
#endif
|
|
|
|
|
|
2025-12-19 04:09:50 +01:00
|
|
|
if (m_vpnProtocol.isNull()) {
|
2026-02-19 13:21:49 +01:00
|
|
|
setConnectionState(Vpn::ConnectionState::Disconnected);
|
2025-12-19 04:09:50 +01:00
|
|
|
return;
|
|
|
|
|
}
|
2025-11-30 18:49:16 -08:00
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
setConnectionState(Vpn::ConnectionState::Disconnecting);
|
2022-02-22 02:08:57 +03:00
|
|
|
|
|
|
|
|
#ifdef Q_OS_ANDROID
|
2025-12-19 04:09:50 +01:00
|
|
|
auto *const connection = new QMetaObject::Connection;
|
|
|
|
|
*connection = connect(AndroidController::instance(), &AndroidController::vpnStateChanged, this,
|
|
|
|
|
[this, connection](AndroidController::ConnectionState state) {
|
|
|
|
|
if (state == AndroidController::ConnectionState::DISCONNECTED) {
|
2026-02-23 08:31:15 +01:00
|
|
|
setConnectionState(Vpn::ConnectionState::Disconnected);
|
2025-12-19 04:09:50 +01:00
|
|
|
disconnect(*connection);
|
|
|
|
|
delete connection;
|
|
|
|
|
}
|
|
|
|
|
});
|
2022-02-22 02:08:57 +03:00
|
|
|
#endif
|
2023-08-23 17:16:40 -04:00
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
m_vpnProtocol->stop();
|
|
|
|
|
|
2025-11-30 18:49:16 -08:00
|
|
|
#if !defined(Q_OS_ANDROID) && !defined(AMNEZIA_DESKTOP)
|
2025-12-19 04:09:50 +01:00
|
|
|
m_vpnProtocol->deleteLater();
|
2023-12-06 16:24:01 +03:00
|
|
|
#endif
|
2025-11-30 18:49:16 -08:00
|
|
|
|
|
|
|
|
m_vpnProtocol = nullptr;
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|
|
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
void VpnConnection::setConnectionState(Vpn::ConnectionState state) {
|
|
|
|
|
onConnectionStateChanged(state);
|
2021-01-15 23:36:35 +03:00
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
if (state == Vpn::Disconnected && m_connectionState == Vpn::Reconnecting)
|
|
|
|
|
return;
|
2020-12-26 15:03:51 +03:00
|
|
|
|
2026-02-19 13:21:49 +01:00
|
|
|
m_connectionState = state;
|
|
|
|
|
emit connectionStateChanged(state);
|
2020-12-26 15:03:51 +03:00
|
|
|
}
|