diff options
author | 2018-12-11 16:12:04 -0600 | |
---|---|---|
committer | 2018-12-11 16:12:04 -0600 | |
commit | 27265fc22231c5418f28c58b08d43344f10e26cb (patch) | |
tree | 6de72a7a38d7eeedfff32a972dacaf09eea82214 | |
parent | Revert pure-go network monitoring and add wgSetConfig (diff) | |
download | wireguard-apple-27265fc22231c5418f28c58b08d43344f10e26cb.tar.xz wireguard-apple-27265fc22231c5418f28c58b08d43344f10e26cb.zip |
Added an (unfinished) NWPathMonitor implementation for reconnecting on network changes
Signed-off-by: Eric Kuck <eric@bluelinelabs.com>
-rw-r--r-- | .gitignore | 3 | ||||
-rw-r--r-- | WireGuard/WireGuardNetworkExtension/PacketTunnelProvider.swift | 26 | ||||
-rw-r--r-- | WireGuard/WireGuardNetworkExtension/PacketTunnelSettingsGenerator.swift | 14 |
3 files changed, 42 insertions, 1 deletions
@@ -38,3 +38,6 @@ fastlane/screenshots fastlane/test_output Preview.html output + +# Wireguard specific +WireGuard/WireGuard/Config/Developer.xcconfig diff --git a/WireGuard/WireGuardNetworkExtension/PacketTunnelProvider.swift b/WireGuard/WireGuardNetworkExtension/PacketTunnelProvider.swift index 11d8ebc..1a51573 100644 --- a/WireGuard/WireGuardNetworkExtension/PacketTunnelProvider.swift +++ b/WireGuard/WireGuardNetworkExtension/PacketTunnelProvider.swift @@ -1,8 +1,9 @@ // SPDX-License-Identifier: MIT // Copyright © 2018 WireGuard LLC. All Rights Reserved. -import NetworkExtension import Foundation +import Network +import NetworkExtension import os.log enum PacketTunnelProviderError: Error { @@ -20,9 +21,15 @@ class PacketTunnelProvider: NEPacketTunnelProvider { // MARK: Properties private var wgHandle: Int32? + + private var networkMonitor: NWPathMonitor? // MARK: NEPacketTunnelProvider + deinit { + networkMonitor?.cancel() + } + /// Begin the process of establishing the tunnel. override func startTunnel(options: [String: NSObject]?, completionHandler startTunnelCompletionHandler: @escaping (Error?) -> Void) { @@ -106,10 +113,27 @@ class PacketTunnelProvider: NEPacketTunnelProvider { startTunnelCompletionHandler(nil /* No errors */) } } + + networkMonitor = NWPathMonitor() + networkMonitor?.pathUpdateHandler = { path in + if path.status == .satisfied { + let endpointString = packetTunnelSettingsGenerator.endpointFromSettings() + + let endpointGoString = endpointString.withCString { + gostring_t(p: $0, n: endpointString.utf8.count) + } + + wgSetConfig(handle, endpointGoString) + } + } + networkMonitor?.start(queue: DispatchQueue(label: "NetworkMonitor")) } /// Begin the process of stopping the tunnel. override func stopTunnel(with reason: NEProviderStopReason, completionHandler: @escaping () -> Void) { + networkMonitor?.cancel() + networkMonitor = nil + wg_log(.info, staticMessage: "Stopping tunnel") if let handle = wgHandle { wgTurnOff(handle) diff --git a/WireGuard/WireGuardNetworkExtension/PacketTunnelSettingsGenerator.swift b/WireGuard/WireGuardNetworkExtension/PacketTunnelSettingsGenerator.swift index 4007196..906aea9 100644 --- a/WireGuard/WireGuardNetworkExtension/PacketTunnelSettingsGenerator.swift +++ b/WireGuard/WireGuardNetworkExtension/PacketTunnelSettingsGenerator.swift @@ -15,6 +15,20 @@ class PacketTunnelSettingsGenerator { self.resolvedEndpoints = resolvedEndpoints } + func endpointFromSettings() -> String { + var wgSettings = "listen_port=\(tunnelConfiguration.interface.listenPort ?? 0)\n" + + for (i, peer) in tunnelConfiguration.peers.enumerated() { + wgSettings.append("public_key=\(peer.publicKey.hexEncodedString())\n") + if let endpoint = resolvedEndpoints[i] { + if case .name(_, _) = endpoint.host { assert(false, "Endpoint is not resolved") } + wgSettings.append("endpoint=\(endpoint.stringRepresentation())\n") + } + } + + return wgSettings + } + func generateWireGuardSettings() -> String { var wgSettings = "" let privateKey = tunnelConfiguration.interface.privateKey.hexEncodedString() |