aboutsummaryrefslogtreecommitdiffstats
path: root/WireGuard/WireGuard/UI/macOS/View (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-01-14macOS: s/macMenuStatus/macStatus/g;Roopesh Chander2-3/+6
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Manage tunnels: Tunnel detail viewRoopesh Chander6-7/+273
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Manage tunnels: Add a filler buttonRoopesh Chander1-1/+29
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Manage tunnels: Fix list view lookRoopesh Chander1-1/+2
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Manage tunnels: Add buttons to the bottom of the list viewRoopesh Chander1-1/+88
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Manage tunnels window: Tunnels listRoopesh Chander6-1/+240
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Capitalize All Rights ReservedRoopesh Chander1-1/+1
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Show status as disabled menu itemsRoopesh Chander2-1/+68
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Ability to activate / deactivate a tunnelRoopesh Chander2-32/+87
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Ability to import tunnels from fileRoopesh Chander4-9/+82
For now, the open panel shows as a separate window. Later, we'll open it as a sheet on the 'Manage tunnels' window. Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14iOS: Refactor importFromFileRoopesh Chander6-48/+88
So that it can be used in macOS as well Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Add tunnel management menu itemsRoopesh Chander2-0/+24
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Specify app is an 'agent'Roopesh Chander1-0/+2
This hides the app from the Dock, while still enabling the app to come to the foreground if required. Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Create status bar with tunnel namesRoopesh Chander3-6/+56
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Add status bar iconRoopesh Chander4-0/+23
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Remove MainMenu.xibRoopesh Chander5-710/+22
When there's no xib, we should explicitly set the app delegate, so we override NSApplication and set the app delegate in NSApplication.shared Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: NE: Add entitlements for making network connectionsRoopesh Chander1-0/+4
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14Make app groups work on both iOS and macOSRoopesh Chander7-5/+30
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Add Network Extensions capability to appRoopesh Chander2-4/+15
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14iOS: Fix WireGuardNetworkExtensioniOS targetRoopesh Chander2-4/+4
- Rename WireGuardNetworkExtension.entitlements to WireGuardNetworkExtension_iOS.entitlements Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14iOS: Fix WireGuardiOS targetRoopesh Chander3-6/+6
- Move Info.plist and entitlements to WireGuard/UI/iOS/ Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Fix WireGuardmacOS targetRoopesh Chander7-11/+131
- Include non-UI code from iOS while building - Add run scripts - Move files to WireGuard/UI/macOS - Set Swift-Obj-C bridging header Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Fix WireGuardNetworkExtensionmacOS targetRoopesh Chander4-87/+85
- Build using common network extension code - Add run scripts - Set Info.plist to common network extension's Info.plist - Move entitlements to common network extension folder - Remove Xcode-generated macOS network extension code - Set Swift-Obj-C bridging header Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: WireGuardNetworkExtensionmacOS depends on WireGuardGoBridgemacOSRoopesh Chander2-1/+21
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Add WireGuardNetworkExtensionmacOS targetRoopesh Chander4-3/+230
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14macOS: Add WireGuardmacOS targetRoopesh Chander7-1/+957
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14Xcode: Add WireGuardGoBridgemacOS targetRoopesh Chander1-0/+51
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14Move iOS images and storyboard into UI/iOS/ folderRoopesh Chander24-2/+2
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14Xcode: Rename iOS targets to include an 'iOS' suffixRoopesh Chander1-27/+27
But keep the PRODUCT_NAME as 'WireGuard', not 'WireGuardiOS'. Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14xcconfig: Make app id platform-specificRoopesh Chander6-10/+10
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14On-Demand: Add support for macOS-specific valuesRoopesh Chander3-8/+49
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14wireguard-go-bridge: Make CFLAGS_PREFIX work for macOS as wellRoopesh Chander1-1/+1
For macOS, Xcode doesn't set DEPLOYMENT_TARGET_CLANG_FLAG_PREFIX, but does set DEPLOYMENT_TARGET_CLANG_FLAG_NAME. Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-14import Foundation instead of UIKit wherever possibleRoopesh Chander4-4/+4
Signed-off-by: Roopesh Chander <roop@roopc.net>
2019-01-08Version bump0.0.20190107-1Jason A. Donenfeld1-2/+2
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-01-08PacketTunnelSettingsGenerator: use 127.0.0.1 as dummy addressJason A. Donenfeld1-3/+1
It turns out that using 0.0.0.0 somehow conflicts with DNS lookups when CLAT is in use. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-01-07Avoid dynamic MTU calculations for nowJason A. Donenfeld1-5/+11
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-01-07Update copyrightJason A. Donenfeld56-56/+56
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-28Version bump0.0.20181225-2Jason A. Donenfeld1-1/+1
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-28Rework DNS and routes in network extensionJason A. Donenfeld3-92/+77
The DNS resolver prior had useless comments, awful nesting, converted bytes into strings and back into bytes, and generally made no sense. That's been rewritten now. But more fundumentally, this commit made the DNS resolver actually accomplish its objective, by passing AI_ALL to it. It turns out, though, that the Go library isn't actually using GAI in the way we need for parsing IP addresses, so we actually need to do another round, this time with hints flag as zero, so that we get the DNS64 address. Additionally, since we're now binding sockets to interfaces, we can entirely remove the excludedRoutes logic. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-26Version bump0.0.20181225-1Jason A. Donenfeld1-2/+2
A Christmas Special, for TestFlight, and possibly for release if things go well there. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-26NetworkExtension: rescope socket instead of tearing down socketJason A. Donenfeld4-26/+57
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-25minizip: Remove zip encryption codeRoopesh Chander3-105/+0
We can now remove -DNOCRYPT cflag while compiling Signed-off-by: Roopesh Chander <roop@roopc.net>
2018-12-24Tunnel edit: Fix crashRoopesh Chander1-1/+2
This fixes a crash that happens when you: 1. Scroll to the end of the Edit screen 2. Delete a peer 3. Toggle the Activate On Demand switch Signed-off-by: Roopesh Chander <roop@roopc.net>
2018-12-22SwitchCell nitsEric Kuck2-5/+5
Signed-off-by: Eric Kuck <eric@bluelinelabs.com>
2018-12-22Fix typo for simulator buildsEric Kuck1-1/+1
Signed-off-by: Eric Kuck <eric@bluelinelabs.com>
2018-12-23Remove more commentsRoopesh Chander6-41/+2
Signed-off-by: Roopesh Chander <roop@roopc.net>
2018-12-22Rely on availability of fd only after setting network settingsJason A. Donenfeld1-29/+24
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-22Bump to latest wireguard-go releaseJason A. Donenfeld1-0/+0
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-22Retain aggressive socket reestablishment for nowJason A. Donenfeld1-1/+2
This can be reverted once we've done more testing. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-12-22Don't set username on NETunnelProviderProtocolRoopesh Chander1-3/+0
The username corresponds to the Account field in iOS system VPN UI, but if we don't set it, the field is not shown, so setting it isn't really required. Signed-off-by: Roopesh Chander <roop@roopc.net>