mirror of
https://github.com/amnezia-vpn/amnezia-client.git
synced 2026-05-08 14:33:23 +00:00
* Add network status check for AWG/WG protocol * Use service for PingSender * Cleanup unused code * Use networkchecker for all protocols * fix android build * add delay for ping checker stop * handle for interafe problems on windows * Restart IpcClient after OS suspend * Add DBus network checker for Linux * Use ping check for tun interfce * Windows suspend mode handler * MacOS suspend mode handler draft * Add delay for Linux wakeup reconnect * Add delay for Linux wakeup reconnect * Fix macOS wakeup/sleep prob Fix macOS not receiving wakeup/sleep events * fix done * Update deploy.yml fix CICD * Update vpnconnection.cpp update fix build CICD * Update vpnconnection.cpp update fix build cicd macos * Update deploy.yml fix CICD build macos * Update deploy.yml fix CICD macos * feat: implement SCP write buffer, improve network check and refactor macOS OpenGL support * feat: add tunnel addresses updated signal and handle network check based on gateway and local address availability * refactor: improve IpcClient connection handling and instance management * fix: scp revert. * fix: cmake reverted. * fix: submodules updated --------- Co-authored-by: Mykola Baibuz <mykola.baibuz@gmail.com> Co-authored-by: Yaroslav Yashin <yaroslav.yashin@gmail.com> Co-authored-by: vkamn <vk@amnezia.org>
112 lines
3.4 KiB
C++
112 lines
3.4 KiB
C++
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "windowsdaemon.h"
|
|
|
|
#include <Windows.h>
|
|
#include <qassert.h>
|
|
|
|
#include <QCoreApplication>
|
|
#include <QJsonDocument>
|
|
#include <QJsonObject>
|
|
#include <QJsonValue>
|
|
#include <QLocalSocket>
|
|
#include <QNetworkInterface>
|
|
#include <QTextStream>
|
|
#include <QtGlobal>
|
|
|
|
#include "daemon/daemonerrors.h"
|
|
#include "dnsutilswindows.h"
|
|
#include "leakdetector.h"
|
|
#include "logger.h"
|
|
#include "platforms/windows/daemon/windowsfirewall.h"
|
|
#include "platforms/windows/daemon/windowssplittunnel.h"
|
|
#include "windowsfirewall.h"
|
|
|
|
#include "core/networkUtilities.h"
|
|
|
|
namespace {
|
|
Logger logger("WindowsDaemon");
|
|
}
|
|
|
|
WindowsDaemon::WindowsDaemon() : Daemon(nullptr) {
|
|
MZ_COUNT_CTOR(WindowsDaemon);
|
|
m_firewallManager = WindowsFirewall::create(this);
|
|
Q_ASSERT(m_firewallManager != nullptr);
|
|
|
|
m_wgutils = WireguardUtilsWindows::create(m_firewallManager, this);
|
|
m_dnsutils = new DnsUtilsWindows(this);
|
|
m_splitTunnelManager = WindowsSplitTunnel::create(m_firewallManager);
|
|
|
|
connect(m_wgutils.get(), &WireguardUtilsWindows::backendFailure, this,
|
|
&WindowsDaemon::monitorBackendFailure);
|
|
connect(this, &WindowsDaemon::activationFailure,
|
|
[this]() { m_firewallManager->disableKillSwitch(); });
|
|
}
|
|
|
|
WindowsDaemon::~WindowsDaemon() {
|
|
MZ_COUNT_DTOR(WindowsDaemon);
|
|
logger.debug() << "Daemon released";
|
|
}
|
|
|
|
void WindowsDaemon::prepareActivation(const InterfaceConfig& config, int inetAdapterIndex) {
|
|
// Before creating the interface we need to check which adapter
|
|
// routes to the server endpoint
|
|
if (inetAdapterIndex == 0) {
|
|
auto serveraddr = QHostAddress(config.m_serverIpv4AddrIn);
|
|
m_inetAdapterIndex = NetworkUtilities::AdapterIndexTo(serveraddr);
|
|
} else {
|
|
m_inetAdapterIndex = inetAdapterIndex;
|
|
}
|
|
}
|
|
|
|
void WindowsDaemon::activateSplitTunnel(const InterfaceConfig& config, int vpnAdapterIndex) {
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
m_splitTunnelManager->start(m_inetAdapterIndex, vpnAdapterIndex);
|
|
m_splitTunnelManager->excludeApps(config.m_vpnDisabledApps);
|
|
} else {
|
|
m_splitTunnelManager->stop();
|
|
}
|
|
}
|
|
|
|
bool WindowsDaemon::run(Op op, const InterfaceConfig& config) {
|
|
if (!m_splitTunnelManager) {
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
// The Client has sent us a list of disabled apps, but we failed
|
|
// to init the the split tunnel driver.
|
|
// So let the client know this was not possible
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_INIT_FAILURE);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
if (op == Down) {
|
|
m_splitTunnelManager->stop();
|
|
return true;
|
|
}
|
|
if (config.m_vpnDisabledApps.length() > 0) {
|
|
if (!m_splitTunnelManager->start(m_inetAdapterIndex)) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_START_FAILURE);
|
|
};
|
|
if (!m_splitTunnelManager->excludeApps(config.m_vpnDisabledApps)) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_EXCLUDE_FAILURE);
|
|
};
|
|
// Now the driver should be running (State == 4)
|
|
if (!m_splitTunnelManager->isRunning()) {
|
|
emit backendFailure(DaemonError::ERROR_SPLIT_TUNNEL_START_FAILURE);
|
|
}
|
|
return true;
|
|
}
|
|
m_splitTunnelManager->stop();
|
|
|
|
return true;
|
|
}
|
|
|
|
void WindowsDaemon::monitorBackendFailure() {
|
|
logger.warning() << "Tunnel service is down";
|
|
|
|
emit backendFailure();
|
|
deactivate();
|
|
}
|