mirror of
https://github.com/amnezia-vpn/amnezia-client.git
synced 2026-05-17 00:06:05 +03:00
* refactor: move business logic from servers model * refactor: move containersModel initialization * refactor: added protocol ui controller and removed settings class from protocols model * refactor: moved cli management to separate controller * refactor: moved app split to separate controller * refactor: moved site split to separate controller * refactor: moved allowed dns to separate controller * refactor: moved language logic to separate ui controller * refactor: removed Settings from devices model * refactor: moved configs and services api logit to separate core controller * refactor: added a layer with a repository between the storage and controllers * refactor: use child parent system instead of smart pointers for controllers and models initialization * refactor: moved install functions from server controller to install controller * refactor: install controller refactoring * chore: renamed exportController to exportUiController * refactor: separate export controller * refactor: removed VpnConfigurationsController * chore: renamed ServerController to SshSession * refactor: replaced ServerController to SshSession * chore: moved qml controllers to separate folder * chore: include fixes * chore: moved utils from core root to core/utils * chore: include fixes * chore: rename core/utils files to camelCase foramt * chore: include fixes * chore: moved some utils to api and selfhosted folders * chore: include fixes * chore: remove unused file * chore: moved serialization folder to core/utils * chore: include fixes * chore: moved some files from client root to core/utils * chore: include fixes * chore: moved ui utils to ui/utils folder * chore: include fixes * chore: move utils from root to ui/utils * chore: include fixes * chore: moved configurators to core/configurators * chore: include fixes * refactor: moved iap logic from ui controller to core * refactor: moved remaining core logic from ApiConfigsController to SubscriptionController * chore: rename apiNewsController to apiNewsUiController * refactor: moved core logic from news ui controller to core * chore: renamed apiConfigsController to subscriptionUiController * chore: include fixes * refactor: merge ApiSettingsController with SubscriptionUiController * chore: moved ui selfhosted controllers to separate folder * chore: include fixes * chore: rename connectionController to connectiomUiController * refactor: moved core logic from connectionUiController * chore: rename settingsController to settingsUiController * refactor: move core logic from settingsUiController * refactor: moved core controller signal/slot connections to separate class * fix: newsController fixes after refactoring * chore: rename model to camelCase * chore: include fixes * chore: remove unused code * chore: move selfhosted core to separate folder * chore: include fixes * chore: rename importController to importUiController * refactor: move core logic from importUiController * chore: minor fixes * chore: remove prem v1 migration * refactor: remove openvpn over cloak and openvpn over shadowsocks * refactor: removed protocolsForContainer function * refactor: add core models * refactor: replace json with c++ structs for server config * refactor: move getDnsPair to ServerConfigUtils * feat: add admin selfhosted config export test * feat: add multi import test * refactor: use coreController for tests * feat: add few simple tests * chore: qrepos in all core controllers * feat: add test for settings * refactor: remove repo dependency from configurators * chore: moved protocols to core folder * chore: include fixes * refactor: moved containersDefs, defs, apiDefs, protocolsDefs to different places * chore: include fixes * chore: build fixes * chore: build fixes * refactor: remove q repo and interface repo * feat: add test for ui servers model and controller * chore: renamed to camelCase * chore: include fixes * refactor: moved core logic from sites ui controller * fix: fixed api config processing * fix: fixed processed server index processing * refactor: protocol models now use c++ structs instead of json configs * refactor: servers model now use c++ struct instead of json config * fix: fixed default server index processing * fix: fix logs init * fix: fix secure settings load keys * chore: build fixes * fix: fixed clear settings * fix: fixed restore backup * fix: sshSession usage * fix: fixed export functions signatures * fix: return missing part from buildContainerWorker * fix: fixed server description on page home * refactor: add container config helpers functions * refactor: c++ structs instead of json * chore: add dns protocol config struct * refactor: move config utils functions to config structs * feat: add test for selfhosted server setup * refactor: separate resources.qrc * fix: fixed server rename * chore: return nameOverriddenByUser * fix: build fixes * fix: fixed models init * refactor: cleanup models usage * fix: fixed models init * chore: cleanup connections and functions signatures * chore: cleanup updateModel calls * feat: added cache to servers repo * chore: cleanup unused functions * chore: ssxray processing * chore: remove transportProtoWithDefault and portWithDefault functions * chore: removed proto types any and l2tp * refactor: moved some constants * fix: fixed native configs export * refactor: remove json from processConfigWith functions * fix: fixed processed server index usage * fix: qml warning fixes * chore: merge fixes * chore: update tests * fix: fixed xray config processing * fix: fixed split tunneling processing * chore: rename sites controllers and model * chore: rename fixes * chore: minor fixes * chore: remove ability to load backup from "file with connection settings" button * fix: fixed api device revoke * fix: remove full model update when renaming a user * fix: fixed premium/free server rename * fix: fixed selfhosted new server install * fix: fixed updateContainer function * fix: fixed revoke for external premium configs * feat: add native configs qr processing * chore: codestyle fixes * fix: fixed admin config create * chore: again remove ability to load backup from "file with connection settings" button * chore: minor fixes * fix: fixed variables initialization * fix: fixed qml imports * fix: minor fixes * fix: fix vpnConnection function calls * feat: add buckup error handling * fix: fixed admin config revok * fix: fixed selfhosted awg installation * fix: ad visability * feat: add empty check for primary dns * chore: minor fixes
327 lines
12 KiB
C++
327 lines
12 KiB
C++
#include "openVpnConfigurator.h"
|
|
|
|
#include <QDebug>
|
|
#include <QJsonDocument>
|
|
#include <QJsonObject>
|
|
#include <QRegularExpression>
|
|
#include <QProcess>
|
|
#include <QString>
|
|
#include <QTemporaryDir>
|
|
#include <QTemporaryFile>
|
|
#if defined(Q_OS_ANDROID) || defined(Q_OS_IOS)
|
|
#include <QGuiApplication>
|
|
#else
|
|
#include <QApplication>
|
|
#endif
|
|
|
|
#include "core/utils/errorCodes.h"
|
|
#include "core/utils/routeModes.h"
|
|
#include "core/utils/commonStructs.h"
|
|
#include "core/utils/networkUtilities.h"
|
|
#include "core/utils/containerEnum.h"
|
|
#include "core/utils/containers/containerUtils.h"
|
|
#include "core/utils/protocolEnum.h"
|
|
#include "core/utils/selfhosted/sshSession.h"
|
|
#include "core/utils/selfhosted/scriptsRegistry.h"
|
|
#include "core/utils/utilities.h"
|
|
#include "core/models/protocols/openVpnProtocolConfig.h"
|
|
|
|
using namespace amnezia;
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/x509.h>
|
|
|
|
|
|
OpenVpnConfigurator::OpenVpnConfigurator(SshSession* sshSession, QObject *parent)
|
|
: ConfiguratorBase(sshSession, parent)
|
|
{
|
|
}
|
|
|
|
OpenVpnConfigurator::ConnectionData OpenVpnConfigurator::prepareOpenVpnConfig(const ServerCredentials &credentials,
|
|
DockerContainer container,
|
|
const DnsSettings &dnsSettings,
|
|
ErrorCode &errorCode)
|
|
{
|
|
OpenVpnConfigurator::ConnectionData connData = OpenVpnConfigurator::createCertRequest();
|
|
connData.host = credentials.hostName;
|
|
|
|
if (connData.privKey.isEmpty() || connData.request.isEmpty()) {
|
|
errorCode = ErrorCode::OpenSslFailed;
|
|
return connData;
|
|
}
|
|
|
|
QString reqFileName = QString("%1/%2.req").arg(amnezia::protocols::openvpn::clientsDirPath).arg(connData.clientId);
|
|
|
|
errorCode = m_sshSession->uploadTextFileToContainer(container, credentials, connData.request, reqFileName);
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
errorCode = signCert(container, credentials, dnsSettings, connData.clientId);
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
connData.caCert =
|
|
m_sshSession->getTextFileFromContainer(container, credentials, amnezia::protocols::openvpn::caCertPath, errorCode);
|
|
connData.clientCert = m_sshSession->getTextFileFromContainer(
|
|
container, credentials, QString("%1/%2.crt").arg(amnezia::protocols::openvpn::clientCertPath).arg(connData.clientId), errorCode);
|
|
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
connData.taKey = m_sshSession->getTextFileFromContainer(container, credentials, amnezia::protocols::openvpn::taKeyPath, errorCode);
|
|
|
|
if (connData.caCert.isEmpty() || connData.clientCert.isEmpty() || connData.taKey.isEmpty()) {
|
|
errorCode = ErrorCode::SshScpFailureError;
|
|
}
|
|
|
|
return connData;
|
|
}
|
|
|
|
ProtocolConfig OpenVpnConfigurator::createConfig(const ServerCredentials &credentials, DockerContainer container,
|
|
const ContainerConfig &containerConfig,
|
|
const DnsSettings &dnsSettings,
|
|
ErrorCode &errorCode)
|
|
{
|
|
const OpenVpnServerConfig* serverConfig = nullptr;
|
|
if (auto* openVpnProtocolConfig = containerConfig.getOpenVpnProtocolConfig()) {
|
|
serverConfig = &openVpnProtocolConfig->serverConfig;
|
|
}
|
|
|
|
amnezia::ScriptVars vars = amnezia::genBaseVars(credentials, container, dnsSettings.primaryDns, dnsSettings.secondaryDns);
|
|
vars.append(amnezia::genProtocolVarsForContainer(container, containerConfig));
|
|
QString config = m_sshSession->replaceVars(amnezia::scriptData(ProtocolScriptType::openvpn_template, container), vars);
|
|
|
|
ConnectionData connData = prepareOpenVpnConfig(credentials, container, dnsSettings, errorCode);
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return OpenVpnProtocolConfig{};
|
|
}
|
|
|
|
auto sanitizeStaticKey = [](const QString &key) {
|
|
QStringList lines = key.split('\n');
|
|
QStringList filtered;
|
|
filtered.reserve(lines.size());
|
|
for (const QString &line : lines) {
|
|
const QString trimmed = line.trimmed();
|
|
if (trimmed.startsWith('#')) {
|
|
continue;
|
|
}
|
|
filtered.append(line);
|
|
}
|
|
QString result = filtered.join('\n');
|
|
if (!result.endsWith('\n')) {
|
|
result.append('\n');
|
|
}
|
|
return result;
|
|
};
|
|
|
|
config.replace("$OPENVPN_CA_CERT", connData.caCert);
|
|
config.replace("$OPENVPN_CLIENT_CERT", connData.clientCert);
|
|
config.replace("$OPENVPN_PRIV_KEY", connData.privKey);
|
|
|
|
if (config.contains("$OPENVPN_TA_KEY")) {
|
|
config.replace("$OPENVPN_TA_KEY", sanitizeStaticKey(connData.taKey));
|
|
} else {
|
|
config.replace("<tls-auth>", "");
|
|
config.replace("</tls-auth>", "");
|
|
}
|
|
|
|
#ifndef MZ_WINDOWS
|
|
config.replace("block-outside-dns", "");
|
|
#endif
|
|
|
|
OpenVpnProtocolConfig protocolConfig;
|
|
if (serverConfig) {
|
|
protocolConfig.serverConfig = *serverConfig;
|
|
}
|
|
|
|
OpenVpnClientConfig clientConfig;
|
|
clientConfig.nativeConfig = config;
|
|
clientConfig.clientId = connData.clientId;
|
|
clientConfig.blockOutsideDns = false;
|
|
|
|
protocolConfig.setClientConfig(clientConfig);
|
|
|
|
return protocolConfig;
|
|
}
|
|
|
|
ProtocolConfig OpenVpnConfigurator::processConfigWithLocalSettings(const ConnectionSettings &settings,
|
|
ProtocolConfig protocolConfig)
|
|
{
|
|
applyDnsToNativeConfig(settings.dns, protocolConfig);
|
|
|
|
QString config = protocolConfig.nativeConfig();
|
|
|
|
if (!settings.isApiConfig) {
|
|
QRegularExpression regex("redirect-gateway.*");
|
|
config.replace(regex, "");
|
|
|
|
if (settings.dns.primaryDns.contains(protocols::dns::amneziaDnsIp)) {
|
|
QRegularExpression dnsRegex("dhcp-option DNS " + settings.dns.secondaryDns);
|
|
config.replace(dnsRegex, "");
|
|
}
|
|
|
|
if (!settings.splitTunneling.isSitesSplitTunnelingEnabled) {
|
|
config.append("\nredirect-gateway def1 ipv6 bypass-dhcp\n");
|
|
config.append("block-ipv6\n");
|
|
} else if (settings.splitTunneling.routeMode == RouteMode::VpnOnlyForwardSites) {
|
|
// no redirect-gateway
|
|
} else if (settings.splitTunneling.routeMode == RouteMode::VpnAllExceptSites) {
|
|
#if !defined(Q_OS_ANDROID) && !defined(Q_OS_IOS) && !defined(MACOS_NE)
|
|
config.append("\nredirect-gateway ipv6 !ipv4 bypass-dhcp\n");
|
|
#endif
|
|
config.append("block-ipv6\n");
|
|
}
|
|
}
|
|
|
|
#ifndef MZ_WINDOWS
|
|
config.replace("block-outside-dns", "");
|
|
#endif
|
|
|
|
#if (defined(MZ_MACOS) || defined(MZ_LINUX))
|
|
config.append(QString("\nscript-security 2\n"
|
|
"up %1/update-resolv-conf.sh\n"
|
|
"down %1/update-resolv-conf.sh\n")
|
|
.arg(qApp->applicationDirPath()));
|
|
#endif
|
|
|
|
protocolConfig.setNativeConfig(config);
|
|
return protocolConfig;
|
|
}
|
|
|
|
ProtocolConfig OpenVpnConfigurator::processConfigWithExportSettings(const ExportSettings &settings,
|
|
ProtocolConfig protocolConfig)
|
|
{
|
|
applyDnsToNativeConfig(settings.dns, protocolConfig);
|
|
|
|
QString config = protocolConfig.nativeConfig();
|
|
|
|
QRegularExpression regex("redirect-gateway.*");
|
|
config.replace(regex, "");
|
|
|
|
if (settings.dns.primaryDns.contains(protocols::dns::amneziaDnsIp)) {
|
|
QRegularExpression dnsRegex("dhcp-option DNS " + settings.dns.secondaryDns);
|
|
config.replace(dnsRegex, "");
|
|
}
|
|
|
|
config.append("\nredirect-gateway def1 ipv6 bypass-dhcp\n");
|
|
config.append("block-ipv6\n");
|
|
config.replace("block-outside-dns", "");
|
|
|
|
protocolConfig.setNativeConfig(config);
|
|
return protocolConfig;
|
|
}
|
|
|
|
ErrorCode OpenVpnConfigurator::signCert(DockerContainer container, const ServerCredentials &credentials,
|
|
const DnsSettings &dnsSettings, QString clientId)
|
|
{
|
|
QString script_import = QString("sudo docker exec -i %1 bash -c \"cd /opt/amnezia/openvpn && "
|
|
"easyrsa import-req %2/%3.req %3\"")
|
|
.arg(ContainerUtils::containerToString(container))
|
|
.arg(amnezia::protocols::openvpn::clientsDirPath)
|
|
.arg(clientId);
|
|
|
|
QString script_sign = QString("sudo docker exec -i %1 bash -c \"export EASYRSA_BATCH=1; cd /opt/amnezia/openvpn && "
|
|
"easyrsa sign-req client %2\"")
|
|
.arg(ContainerUtils::containerToString(container))
|
|
.arg(clientId);
|
|
|
|
QStringList scriptList { script_import, script_sign };
|
|
QString script = m_sshSession->replaceVars(scriptList.join("\n"), amnezia::genBaseVars(credentials, container, dnsSettings.primaryDns, dnsSettings.secondaryDns));
|
|
|
|
return m_sshSession->runScript(credentials, script);
|
|
}
|
|
|
|
OpenVpnConfigurator::ConnectionData OpenVpnConfigurator::createCertRequest()
|
|
{
|
|
ConnectionData connData;
|
|
connData.clientId = Utils::getRandomString(32);
|
|
|
|
int ret = 0;
|
|
int nVersion = 1;
|
|
|
|
QByteArray clientIdUtf8 = connData.clientId.toUtf8();
|
|
|
|
EVP_PKEY *pKey = EVP_PKEY_new();
|
|
q_check_ptr(pKey);
|
|
RSA *rsa = RSA_generate_key(2048, RSA_F4, nullptr, nullptr);
|
|
q_check_ptr(rsa);
|
|
EVP_PKEY_assign_RSA(pKey, rsa);
|
|
|
|
// 2. set version of x509 req
|
|
X509_REQ *x509_req = X509_REQ_new();
|
|
ret = X509_REQ_set_version(x509_req, nVersion);
|
|
if (ret != 1) {
|
|
qWarning() << "Could not get X509!";
|
|
X509_REQ_free(x509_req);
|
|
EVP_PKEY_free(pKey);
|
|
return connData;
|
|
}
|
|
|
|
// 3. set subject of x509 req
|
|
X509_NAME *x509_name = X509_REQ_get_subject_name(x509_req);
|
|
|
|
X509_NAME_add_entry_by_txt(x509_name, "C", MBSTRING_ASC, (unsigned char *)"ORG", -1, -1, 0);
|
|
X509_NAME_add_entry_by_txt(x509_name, "O", MBSTRING_ASC, (unsigned char *)"", -1, -1, 0);
|
|
X509_NAME_add_entry_by_txt(x509_name, "CN", MBSTRING_ASC, reinterpret_cast<unsigned char const *>(clientIdUtf8.data()),
|
|
clientIdUtf8.size(), -1, 0);
|
|
|
|
// 4. set public key of x509 req
|
|
ret = X509_REQ_set_pubkey(x509_req, pKey);
|
|
if (ret != 1) {
|
|
qWarning() << "Could not set pubkey!";
|
|
X509_REQ_free(x509_req);
|
|
EVP_PKEY_free(pKey);
|
|
return connData;
|
|
}
|
|
|
|
// 5. set sign key of x509 req
|
|
ret = X509_REQ_sign(x509_req, pKey, EVP_sha256()); // return x509_req->signature->length
|
|
if (ret <= 0) {
|
|
qWarning() << "Could not sign request!";
|
|
X509_REQ_free(x509_req);
|
|
EVP_PKEY_free(pKey);
|
|
return connData;
|
|
}
|
|
|
|
// save private key
|
|
BIO *bp_private = BIO_new(BIO_s_mem());
|
|
q_check_ptr(bp_private);
|
|
if (PEM_write_bio_PrivateKey(bp_private, pKey, nullptr, nullptr, 0, nullptr, nullptr) != 1) {
|
|
qFatal("PEM_write_bio_PrivateKey");
|
|
EVP_PKEY_free(pKey);
|
|
BIO_free_all(bp_private);
|
|
X509_REQ_free(x509_req);
|
|
return connData;
|
|
}
|
|
|
|
const char *buffer = nullptr;
|
|
size_t size = BIO_get_mem_data(bp_private, &buffer);
|
|
q_check_ptr(buffer);
|
|
connData.privKey = QByteArray(buffer, size);
|
|
if (connData.privKey.isEmpty()) {
|
|
qFatal("Failed to generate a random private key");
|
|
EVP_PKEY_free(pKey);
|
|
BIO_free_all(bp_private);
|
|
X509_REQ_free(x509_req);
|
|
return connData;
|
|
}
|
|
BIO_free_all(bp_private);
|
|
|
|
// save req
|
|
BIO *bio_req = BIO_new(BIO_s_mem());
|
|
PEM_write_bio_X509_REQ(bio_req, x509_req);
|
|
|
|
BUF_MEM *bio_buf;
|
|
BIO_get_mem_ptr(bio_req, &bio_buf);
|
|
connData.request = QByteArray(bio_buf->data, bio_buf->length);
|
|
BIO_free(bio_req);
|
|
|
|
EVP_PKEY_free(pKey); // this will also free the rsa key
|
|
|
|
return connData;
|
|
}
|