mirror of
https://github.com/amnezia-vpn/amnezia-client.git
synced 2026-05-08 14:33:23 +00:00
* refactor: move business logic from servers model * refactor: move containersModel initialization * refactor: added protocol ui controller and removed settings class from protocols model * refactor: moved cli management to separate controller * refactor: moved app split to separate controller * refactor: moved site split to separate controller * refactor: moved allowed dns to separate controller * refactor: moved language logic to separate ui controller * refactor: removed Settings from devices model * refactor: moved configs and services api logit to separate core controller * refactor: added a layer with a repository between the storage and controllers * refactor: use child parent system instead of smart pointers for controllers and models initialization * refactor: moved install functions from server controller to install controller * refactor: install controller refactoring * chore: renamed exportController to exportUiController * refactor: separate export controller * refactor: removed VpnConfigurationsController * chore: renamed ServerController to SshSession * refactor: replaced ServerController to SshSession * chore: moved qml controllers to separate folder * chore: include fixes * chore: moved utils from core root to core/utils * chore: include fixes * chore: rename core/utils files to camelCase foramt * chore: include fixes * chore: moved some utils to api and selfhosted folders * chore: include fixes * chore: remove unused file * chore: moved serialization folder to core/utils * chore: include fixes * chore: moved some files from client root to core/utils * chore: include fixes * chore: moved ui utils to ui/utils folder * chore: include fixes * chore: move utils from root to ui/utils * chore: include fixes * chore: moved configurators to core/configurators * chore: include fixes * refactor: moved iap logic from ui controller to core * refactor: moved remaining core logic from ApiConfigsController to SubscriptionController * chore: rename apiNewsController to apiNewsUiController * refactor: moved core logic from news ui controller to core * chore: renamed apiConfigsController to subscriptionUiController * chore: include fixes * refactor: merge ApiSettingsController with SubscriptionUiController * chore: moved ui selfhosted controllers to separate folder * chore: include fixes * chore: rename connectionController to connectiomUiController * refactor: moved core logic from connectionUiController * chore: rename settingsController to settingsUiController * refactor: move core logic from settingsUiController * refactor: moved core controller signal/slot connections to separate class * fix: newsController fixes after refactoring * chore: rename model to camelCase * chore: include fixes * chore: remove unused code * chore: move selfhosted core to separate folder * chore: include fixes * chore: rename importController to importUiController * refactor: move core logic from importUiController * chore: minor fixes * chore: remove prem v1 migration * refactor: remove openvpn over cloak and openvpn over shadowsocks * refactor: removed protocolsForContainer function * refactor: add core models * refactor: replace json with c++ structs for server config * refactor: move getDnsPair to ServerConfigUtils * feat: add admin selfhosted config export test * feat: add multi import test * refactor: use coreController for tests * feat: add few simple tests * chore: qrepos in all core controllers * feat: add test for settings * refactor: remove repo dependency from configurators * chore: moved protocols to core folder * chore: include fixes * refactor: moved containersDefs, defs, apiDefs, protocolsDefs to different places * chore: include fixes * chore: build fixes * chore: build fixes * refactor: remove q repo and interface repo * feat: add test for ui servers model and controller * chore: renamed to camelCase * chore: include fixes * refactor: moved core logic from sites ui controller * fix: fixed api config processing * fix: fixed processed server index processing * refactor: protocol models now use c++ structs instead of json configs * refactor: servers model now use c++ struct instead of json config * fix: fixed default server index processing * fix: fix logs init * fix: fix secure settings load keys * chore: build fixes * fix: fixed clear settings * fix: fixed restore backup * fix: sshSession usage * fix: fixed export functions signatures * fix: return missing part from buildContainerWorker * fix: fixed server description on page home * refactor: add container config helpers functions * refactor: c++ structs instead of json * chore: add dns protocol config struct * refactor: move config utils functions to config structs * feat: add test for selfhosted server setup * refactor: separate resources.qrc * fix: fixed server rename * chore: return nameOverriddenByUser * fix: build fixes * fix: fixed models init * refactor: cleanup models usage * fix: fixed models init * chore: cleanup connections and functions signatures * chore: cleanup updateModel calls * feat: added cache to servers repo * chore: cleanup unused functions * chore: ssxray processing * chore: remove transportProtoWithDefault and portWithDefault functions * chore: removed proto types any and l2tp * refactor: moved some constants * fix: fixed native configs export * refactor: remove json from processConfigWith functions * fix: fixed processed server index usage * fix: qml warning fixes * chore: merge fixes * chore: update tests * fix: fixed xray config processing * fix: fixed split tunneling processing * chore: rename sites controllers and model * chore: rename fixes * chore: minor fixes * chore: remove ability to load backup from "file with connection settings" button * fix: fixed api device revoke * fix: remove full model update when renaming a user * fix: fixed premium/free server rename * fix: fixed selfhosted new server install * fix: fixed updateContainer function * fix: fixed revoke for external premium configs * feat: add native configs qr processing * chore: codestyle fixes * fix: fixed admin config create * chore: again remove ability to load backup from "file with connection settings" button * chore: minor fixes * fix: fixed variables initialization * fix: fixed qml imports * fix: minor fixes * fix: fix vpnConnection function calls * feat: add buckup error handling * fix: fixed admin config revok * fix: fixed selfhosted awg installation * fix: ad visability * feat: add empty check for primary dns * chore: minor fixes
289 lines
12 KiB
C++
289 lines
12 KiB
C++
#include "wireguardConfigurator.h"
|
|
|
|
#include <QDebug>
|
|
#include <QJsonDocument>
|
|
#include <QProcess>
|
|
#include <QRegularExpression>
|
|
#include <QString>
|
|
#include <QTemporaryDir>
|
|
#include <QTemporaryFile>
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rand.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/x509.h>
|
|
|
|
#include "core/utils/containerEnum.h"
|
|
#include "core/utils/containers/containerUtils.h"
|
|
#include "core/utils/protocolEnum.h"
|
|
#include "core/utils/selfhosted/sshSession.h"
|
|
#include "core/utils/selfhosted/scriptsRegistry.h"
|
|
#include "core/utils/protocolEnum.h"
|
|
#include "core/protocols/protocolUtils.h"
|
|
#include "core/utils/constants/configKeys.h"
|
|
#include "core/utils/constants/protocolConstants.h"
|
|
#include "core/utils/utilities.h"
|
|
#include "core/models/containerConfig.h"
|
|
#include "core/models/protocols/wireGuardProtocolConfig.h"
|
|
#include "core/models/protocols/awgProtocolConfig.h"
|
|
#include <QJsonArray>
|
|
|
|
using namespace amnezia;
|
|
|
|
WireguardConfigurator::WireguardConfigurator(SshSession* sshSession, bool isAwg,
|
|
QObject *parent)
|
|
: ConfiguratorBase(sshSession, parent), m_isAwg(isAwg)
|
|
{
|
|
m_serverConfigPath =
|
|
m_isAwg ? amnezia::protocols::awg::serverConfigPath : amnezia::protocols::wireguard::serverConfigPath;
|
|
m_serverPublicKeyPath =
|
|
m_isAwg ? amnezia::protocols::awg::serverPublicKeyPath : amnezia::protocols::wireguard::serverPublicKeyPath;
|
|
m_serverPskKeyPath =
|
|
m_isAwg ? amnezia::protocols::awg::serverPskKeyPath : amnezia::protocols::wireguard::serverPskKeyPath;
|
|
m_configTemplate = m_isAwg ? ProtocolScriptType::awg_template : ProtocolScriptType::wireguard_template;
|
|
|
|
m_protocolName = m_isAwg ? configKey::awg : configKey::wireguard;
|
|
m_defaultPort = m_isAwg ? protocols::awg::defaultPort : protocols::wireguard::defaultPort;
|
|
}
|
|
|
|
WireguardConfigurator::ConnectionData WireguardConfigurator::genClientKeys()
|
|
{
|
|
// TODO review
|
|
constexpr size_t EDDSA_KEY_LENGTH = 32;
|
|
|
|
ConnectionData connData;
|
|
|
|
unsigned char buff[EDDSA_KEY_LENGTH];
|
|
int ret = RAND_priv_bytes(buff, EDDSA_KEY_LENGTH);
|
|
if (ret <= 0)
|
|
return connData;
|
|
|
|
EVP_PKEY *pKey = EVP_PKEY_new();
|
|
q_check_ptr(pKey);
|
|
pKey = EVP_PKEY_new_raw_private_key(EVP_PKEY_X25519, NULL, &buff[0], EDDSA_KEY_LENGTH);
|
|
|
|
size_t keySize = EDDSA_KEY_LENGTH;
|
|
|
|
// save private key
|
|
unsigned char priv[EDDSA_KEY_LENGTH];
|
|
EVP_PKEY_get_raw_private_key(pKey, priv, &keySize);
|
|
connData.clientPrivKey = QByteArray::fromRawData((char *)priv, keySize).toBase64();
|
|
|
|
// save public key
|
|
unsigned char pub[EDDSA_KEY_LENGTH];
|
|
EVP_PKEY_get_raw_public_key(pKey, pub, &keySize);
|
|
connData.clientPubKey = QByteArray::fromRawData((char *)pub, keySize).toBase64();
|
|
|
|
return connData;
|
|
}
|
|
|
|
QList<QHostAddress> WireguardConfigurator::getIpsFromConf(const QString &input)
|
|
{
|
|
QRegularExpression regex("AllowedIPs = (\\d+\\.\\d+\\.\\d+\\.\\d+)");
|
|
QRegularExpressionMatchIterator matchIterator = regex.globalMatch(input);
|
|
|
|
QList<QHostAddress> ips;
|
|
|
|
while (matchIterator.hasNext()) {
|
|
QRegularExpressionMatch match = matchIterator.next();
|
|
const QString address_string { match.captured(1) };
|
|
const QHostAddress address { address_string };
|
|
if (address.isNull()) {
|
|
qWarning() << "Couldn't recognize the ip address: " << address_string;
|
|
} else {
|
|
ips << address;
|
|
}
|
|
}
|
|
|
|
return ips;
|
|
}
|
|
|
|
WireguardConfigurator::ConnectionData WireguardConfigurator::prepareWireguardConfig(const ServerCredentials &credentials,
|
|
DockerContainer container,
|
|
const WireGuardServerConfig* serverConfig,
|
|
const AwgServerConfig* awgServerConfig,
|
|
const DnsSettings &dnsSettings,
|
|
ErrorCode &errorCode)
|
|
{
|
|
WireguardConfigurator::ConnectionData connData = WireguardConfigurator::genClientKeys();
|
|
connData.host = credentials.hostName;
|
|
|
|
QString portStr = m_defaultPort;
|
|
if (serverConfig && !serverConfig->port.isEmpty()) {
|
|
portStr = serverConfig->port;
|
|
} else if (awgServerConfig && !awgServerConfig->port.isEmpty()) {
|
|
portStr = awgServerConfig->port;
|
|
}
|
|
connData.port = portStr;
|
|
|
|
if (connData.clientPrivKey.isEmpty() || connData.clientPubKey.isEmpty()) {
|
|
errorCode = ErrorCode::InternalError;
|
|
return connData;
|
|
}
|
|
|
|
QString configPath = m_serverConfigPath;
|
|
if (container == DockerContainer::Awg) {
|
|
configPath = amnezia::protocols::awg::serverLegacyConfigPath;
|
|
}
|
|
QString getIpsScript = QString("cat %1 | grep AllowedIPs").arg(configPath);
|
|
QString stdOut;
|
|
auto cbReadStdOut = [&](const QString &data, libssh::Client &) {
|
|
stdOut += data + "\n";
|
|
return ErrorCode::NoError;
|
|
};
|
|
|
|
errorCode = m_sshSession->runContainerScript(credentials, container, getIpsScript, cbReadStdOut);
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
auto ips = getIpsFromConf(stdOut);
|
|
|
|
QHostAddress nextIp = [&] {
|
|
QHostAddress result;
|
|
QHostAddress lastIp;
|
|
QString subnetAddress = protocols::wireguard::defaultSubnetAddress;
|
|
if (serverConfig && !serverConfig->subnetAddress.isEmpty()) {
|
|
subnetAddress = serverConfig->subnetAddress;
|
|
} else if (awgServerConfig && !awgServerConfig->subnetAddress.isEmpty()) {
|
|
subnetAddress = awgServerConfig->subnetAddress;
|
|
}
|
|
if (ips.empty()) {
|
|
lastIp.setAddress(subnetAddress);
|
|
} else {
|
|
lastIp = ips.last();
|
|
}
|
|
quint8 lastOctet = static_cast<quint8>(lastIp.toIPv4Address());
|
|
switch (lastOctet) {
|
|
case 254: result.setAddress(lastIp.toIPv4Address() + 3); break;
|
|
case 255: result.setAddress(lastIp.toIPv4Address() + 2); break;
|
|
default: result.setAddress(lastIp.toIPv4Address() + 1); break;
|
|
}
|
|
|
|
return result;
|
|
}();
|
|
|
|
connData.clientIP = nextIp.toString();
|
|
|
|
// Get keys
|
|
connData.serverPubKey =
|
|
m_sshSession->getTextFileFromContainer(container, credentials, m_serverPublicKeyPath, errorCode);
|
|
connData.serverPubKey.replace("\n", "");
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
connData.pskKey = m_sshSession->getTextFileFromContainer(container, credentials, m_serverPskKeyPath, errorCode);
|
|
connData.pskKey.replace("\n", "");
|
|
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
// Add client to config
|
|
QString configPart = QString("[Peer]\n"
|
|
"PublicKey = %1\n"
|
|
"PresharedKey = %2\n"
|
|
"AllowedIPs = %3/32\n\n")
|
|
.arg(connData.clientPubKey, connData.pskKey, connData.clientIP);
|
|
|
|
errorCode = m_sshSession->uploadTextFileToContainer(container, credentials, configPart, configPath,
|
|
libssh::ScpOverwriteMode::ScpAppendToExisting);
|
|
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return connData;
|
|
}
|
|
|
|
bool isAwg = (container == DockerContainer::Awg2);
|
|
QString bin = isAwg ? QStringLiteral("awg") : QStringLiteral("wg");
|
|
QString iface = isAwg ? QStringLiteral("awg0") : QStringLiteral("wg0");
|
|
QString script = QString(
|
|
"sudo docker exec -i $CONTAINER_NAME bash -c '%1 syncconf %2 <(%1-quick strip %3)'").arg(bin, iface, configPath);
|
|
|
|
errorCode = m_sshSession->runScript(
|
|
credentials,
|
|
m_sshSession->replaceVars(script, amnezia::genBaseVars(credentials, container, dnsSettings.primaryDns, dnsSettings.secondaryDns)));
|
|
|
|
return connData;
|
|
}
|
|
|
|
ProtocolConfig WireguardConfigurator::createConfig(const ServerCredentials &credentials, DockerContainer container,
|
|
const ContainerConfig &containerConfig,
|
|
const DnsSettings &dnsSettings,
|
|
ErrorCode &errorCode)
|
|
{
|
|
const WireGuardServerConfig* wireguardServerConfig = nullptr;
|
|
const WireGuardClientConfig* wireguardClientConfig = nullptr;
|
|
const AwgServerConfig* awgServerConfig = nullptr;
|
|
const AwgClientConfig* awgClientConfig = nullptr;
|
|
|
|
if (auto* wireGuardProtocolConfig = containerConfig.getWireGuardProtocolConfig()) {
|
|
wireguardServerConfig = &wireGuardProtocolConfig->serverConfig;
|
|
if (wireGuardProtocolConfig->clientConfig.has_value()) {
|
|
wireguardClientConfig = &wireGuardProtocolConfig->clientConfig.value();
|
|
}
|
|
} else if (auto* awgProtocolConfig = containerConfig.getAwgProtocolConfig()) {
|
|
awgServerConfig = &awgProtocolConfig->serverConfig;
|
|
if (awgProtocolConfig->clientConfig.has_value()) {
|
|
awgClientConfig = &awgProtocolConfig->clientConfig.value();
|
|
}
|
|
}
|
|
|
|
amnezia::ScriptVars vars = amnezia::genBaseVars(credentials, container, dnsSettings.primaryDns, dnsSettings.secondaryDns);
|
|
vars.append(amnezia::genProtocolVarsForContainer(container, containerConfig));
|
|
QString scriptData = amnezia::scriptData(m_configTemplate, container);
|
|
QString config = m_sshSession->replaceVars(scriptData, vars);
|
|
|
|
ConnectionData connData = prepareWireguardConfig(credentials, container, wireguardServerConfig, awgServerConfig, dnsSettings, errorCode);
|
|
if (errorCode != ErrorCode::NoError) {
|
|
return WireGuardProtocolConfig{};
|
|
}
|
|
|
|
config.replace("$WIREGUARD_CLIENT_PRIVATE_KEY", connData.clientPrivKey);
|
|
config.replace("$WIREGUARD_CLIENT_IP", connData.clientIP);
|
|
config.replace("$WIREGUARD_SERVER_PUBLIC_KEY", connData.serverPubKey);
|
|
config.replace("$WIREGUARD_PSK", connData.pskKey);
|
|
|
|
QString mtu = protocols::wireguard::defaultMtu;
|
|
if (wireguardClientConfig && !wireguardClientConfig->mtu.isEmpty()) {
|
|
mtu = wireguardClientConfig->mtu;
|
|
} else if (awgClientConfig && !awgClientConfig->mtu.isEmpty()) {
|
|
mtu = awgClientConfig->mtu;
|
|
}
|
|
|
|
WireGuardProtocolConfig protocolConfig;
|
|
if (wireguardServerConfig) {
|
|
protocolConfig.serverConfig = *wireguardServerConfig;
|
|
}
|
|
|
|
WireGuardClientConfig clientConfig;
|
|
clientConfig.nativeConfig = config;
|
|
clientConfig.hostName = connData.host;
|
|
clientConfig.port = connData.port.toInt();
|
|
clientConfig.clientIp = connData.clientIP;
|
|
clientConfig.clientPrivateKey = connData.clientPrivKey;
|
|
clientConfig.clientPublicKey = connData.clientPubKey;
|
|
clientConfig.serverPublicKey = connData.serverPubKey;
|
|
clientConfig.presharedKey = connData.pskKey;
|
|
clientConfig.clientId = connData.clientPubKey;
|
|
clientConfig.allowedIps = QStringList { "0.0.0.0/0", "::/0" };
|
|
clientConfig.persistentKeepAlive = "25";
|
|
clientConfig.mtu = mtu;
|
|
clientConfig.isObfuscationEnabled = false;
|
|
|
|
protocolConfig.setClientConfig(clientConfig);
|
|
|
|
return protocolConfig;
|
|
}
|
|
|
|
ProtocolConfig WireguardConfigurator::processConfigWithLocalSettings(const ConnectionSettings &settings,
|
|
ProtocolConfig protocolConfig)
|
|
{
|
|
return ConfiguratorBase::processConfigWithLocalSettings(settings, protocolConfig);
|
|
}
|
|
|
|
ProtocolConfig WireguardConfigurator::processConfigWithExportSettings(const ExportSettings &settings,
|
|
ProtocolConfig protocolConfig)
|
|
{
|
|
return ConfiguratorBase::processConfigWithExportSettings(settings, protocolConfig);
|
|
}
|