Files
clash-proxy/src-tauri/src/core/sysopt.rs

372 lines
12 KiB
Rust
Raw Normal View History

2024-05-26 17:59:39 +08:00
use crate::{
config::{Config, IVerge},
log_err,
};
use anyhow::{anyhow, Result};
2022-04-20 01:44:47 +08:00
use auto_launch::{AutoLaunch, AutoLaunchBuilder};
2022-11-14 01:26:33 +08:00
use once_cell::sync::OnceCell;
use parking_lot::Mutex;
2024-04-13 15:45:50 +08:00
use std::env::current_exe;
2022-04-20 01:44:47 +08:00
use std::sync::Arc;
2024-05-26 17:59:39 +08:00
use sysproxy::{Autoproxy, Sysproxy};
2024-04-13 15:45:50 +08:00
use tauri::async_runtime::Mutex as TokioMutex;
use tokio::time::{sleep, Duration};
2022-04-20 01:44:47 +08:00
pub struct Sysopt {
update_sysproxy: Arc<TokioMutex<bool>>,
reset_sysproxy: Arc<TokioMutex<bool>>,
2022-11-12 11:37:23 +08:00
/// helps to auto launch the app
2022-11-14 01:26:33 +08:00
auto_launch: Arc<Mutex<Option<AutoLaunch>>>,
2022-11-12 11:37:23 +08:00
/// record whether the guard async is running or not
2022-11-14 01:26:33 +08:00
guard_state: Arc<TokioMutex<bool>>,
2022-04-20 01:44:47 +08:00
}
2022-09-11 20:58:55 +08:00
#[cfg(target_os = "windows")]
static DEFAULT_BYPASS: &str = "localhost;127.*;192.168.*;10.*;172.16.*;172.17.*;172.18.*;172.19.*;172.20.*;172.21.*;172.22.*;172.23.*;172.24.*;172.25.*;172.26.*;172.27.*;172.28.*;172.29.*;172.30.*;172.31.*;<local>";
2022-09-11 20:58:55 +08:00
#[cfg(target_os = "linux")]
static DEFAULT_BYPASS: &str = "localhost,127.0.0.1,192.168.0.0/16,10.0.0.0/8,172.16.0.0/12,::1";
2022-09-11 20:58:55 +08:00
#[cfg(target_os = "macos")]
2023-12-01 12:56:18 +08:00
static DEFAULT_BYPASS: &str =
"127.0.0.1,192.168.0.0/16,10.0.0.0/8,172.16.0.0/12,localhost,*.local,*.crashlytics.com,<local>";
2022-09-11 20:58:55 +08:00
2024-06-09 12:45:57 +08:00
fn get_bypass() -> String {
// let bypass = DEFAULT_BYPASS.to_string();
let use_default = Config::verge().latest().use_default_bypass.unwrap_or(true);
2024-06-12 10:00:22 +08:00
let res = {
2024-06-09 12:45:57 +08:00
let verge = Config::verge();
let verge = verge.latest();
verge.system_proxy_bypass.clone()
2024-06-12 10:00:22 +08:00
};
let custom_bypass = match res {
2024-06-09 12:45:57 +08:00
Some(bypass) => bypass,
None => "".to_string(),
};
#[cfg(target_os = "windows")]
let bypass = if custom_bypass.is_empty() {
DEFAULT_BYPASS.to_string()
2024-06-09 12:45:57 +08:00
} else {
if use_default {
format!("{};{}", DEFAULT_BYPASS, custom_bypass)
} else {
custom_bypass
}
2024-06-09 12:45:57 +08:00
};
#[cfg(not(target_os = "windows"))]
let bypass = if custom_bypass.is_empty() {
DEFAULT_BYPASS.to_string()
2024-09-24 20:06:25 +08:00
} else if use_default {
format!("{},{}", DEFAULT_BYPASS, custom_bypass)
2024-06-09 12:45:57 +08:00
} else {
2024-09-24 20:06:25 +08:00
custom_bypass
2024-06-09 12:45:57 +08:00
};
2024-06-12 10:00:22 +08:00
bypass
2024-06-09 12:45:57 +08:00
}
2022-04-20 01:44:47 +08:00
impl Sysopt {
2022-11-14 01:26:33 +08:00
pub fn global() -> &'static Sysopt {
static SYSOPT: OnceCell<Sysopt> = OnceCell::new();
SYSOPT.get_or_init(|| Sysopt {
update_sysproxy: Arc::new(TokioMutex::new(false)),
reset_sysproxy: Arc::new(TokioMutex::new(false)),
2022-11-14 01:26:33 +08:00
auto_launch: Arc::new(Mutex::new(None)),
guard_state: Arc::new(TokioMutex::new(false)),
})
2022-04-20 01:44:47 +08:00
}
pub fn init_guard_sysproxy(&self) -> Result<()> {
self.guard_proxy();
Ok(())
}
2022-11-12 11:37:23 +08:00
/// init the sysproxy
pub fn update_sysproxy(&self) -> Result<()> {
let _ = self.update_sysproxy.lock();
2023-12-01 12:56:18 +08:00
let port = Config::verge()
.latest()
.verge_mixed_port
.unwrap_or(Config::clash().data().get_mixed_port());
2024-05-26 17:59:39 +08:00
let pac_port = IVerge::get_singleton_port();
2022-09-11 20:58:55 +08:00
2024-06-09 12:45:57 +08:00
let (enable, pac) = {
2022-11-16 01:26:41 +08:00
let verge = Config::verge();
let verge = verge.latest();
(
2024-01-10 17:36:35 +08:00
verge.enable_system_proxy.unwrap_or(false),
2024-05-26 17:59:39 +08:00
verge.proxy_auto_config.unwrap_or(false),
2022-11-16 01:26:41 +08:00
)
};
#[cfg(not(target_os = "windows"))]
{
let mut sys = Sysproxy {
enable,
host: String::from("127.0.0.1"),
port,
bypass: get_bypass(),
};
let mut auto = Autoproxy {
enable,
url: format!("http://127.0.0.1:{pac_port}/commands/pac"),
};
if pac {
sys.enable = false;
auto.enable = true;
sys.set_system_proxy()?;
auto.set_auto_proxy()?;
} else {
auto.enable = false;
sys.enable = true;
auto.set_auto_proxy()?;
sys.set_system_proxy()?;
}
}
#[cfg(target_os = "windows")]
{
if !enable {
return self.reset_sysproxy();
}
use crate::core::handle::Handle;
use crate::utils::dirs;
use anyhow::bail;
use tauri_plugin_shell::ShellExt;
let app_handle = Handle::global().app_handle().unwrap();
let binary_path = dirs::app_resources_dir()?;
let sysproxy_exe = binary_path.with_file_name("sysproxy.exe");
if !sysproxy_exe.exists() {
bail!("sysproxy.exe not found");
}
let shell = app_handle.shell();
let output = if pac {
let address = format!("http://{}:{}/pac", "127.0.0.1", port);
let output = tauri::async_runtime::block_on(async move {
shell
.command(sysproxy_exe.as_path().to_str().unwrap())
.args(["opac", address.as_str()])
.output()
.await
.unwrap()
});
output
} else {
let address = format!("{}:{}", "127.0.0.1", port);
let bypass = get_bypass();
let output = tauri::async_runtime::block_on(async move {
shell
.command(sysproxy_exe.as_path().to_str().unwrap())
.args(["global", address.as_str(), bypass.as_ref()])
.output()
.await
.unwrap()
});
output
};
if !output.status.success() {
bail!("sysproxy exe run failed");
}
2022-11-12 11:37:23 +08:00
}
2022-04-20 01:44:47 +08:00
2022-11-12 11:37:23 +08:00
Ok(())
}
2022-11-12 11:37:23 +08:00
/// reset the sysproxy
2022-11-14 01:26:33 +08:00
pub fn reset_sysproxy(&self) -> Result<()> {
let _ = self.reset_sysproxy.lock();
//直接关闭所有代理
#[cfg(not(target_os = "windows"))]
{
let mut sysproxy: Sysproxy = Sysproxy::get_system_proxy()?;
let mut autoproxy = Autoproxy::get_auto_proxy()?;
sysproxy.enable = false;
autoproxy.enable = false;
autoproxy.set_auto_proxy()?;
sysproxy.set_system_proxy()?;
}
2022-11-12 11:37:23 +08:00
#[cfg(target_os = "windows")]
{
use crate::core::handle::Handle;
use crate::utils::dirs;
use anyhow::bail;
use tauri_plugin_shell::ShellExt;
let app_handle = Handle::global().app_handle().unwrap();
let binary_path = dirs::app_resources_dir()?;
let sysproxy_exe = binary_path.with_file_name("sysproxy.exe");
if !sysproxy_exe.exists() {
bail!("sysproxy.exe not found");
}
let shell = app_handle.shell();
let output = tauri::async_runtime::block_on(async move {
shell
.command(sysproxy_exe.as_path().to_str().unwrap())
.args(["set", "1"])
.output()
.await
.unwrap()
});
if !output.status.success() {
bail!("sysproxy exe run failed");
}
}
2024-05-26 19:07:14 +08:00
2022-11-12 11:37:23 +08:00
Ok(())
2022-04-20 01:44:47 +08:00
}
2022-11-12 11:37:23 +08:00
/// init the auto launch
2022-11-14 01:26:33 +08:00
pub fn init_launch(&self) -> Result<()> {
2022-11-12 11:37:23 +08:00
let app_exe = current_exe()?;
2024-04-13 15:45:50 +08:00
// let app_exe = dunce::canonicalize(app_exe)?;
2022-11-12 11:37:23 +08:00
let app_name = app_exe
.file_stem()
.and_then(|f| f.to_str())
.ok_or(anyhow!("failed to get file stem"))?;
let app_path = app_exe
.as_os_str()
.to_str()
.ok_or(anyhow!("failed to get app_path"))?
.to_string();
// fix issue #26
#[cfg(target_os = "windows")]
let app_path = format!("\"{app_path}\"");
// use the /Applications/Clash Verge.app path
#[cfg(target_os = "macos")]
let app_path = (|| -> Option<String> {
let path = std::path::PathBuf::from(&app_path);
let path = path.parent()?.parent()?.parent()?;
let extension = path.extension()?.to_str()?;
match extension == "app" {
true => Some(path.as_os_str().to_str()?.to_string()),
false => None,
}
})()
.unwrap_or(app_path);
2023-02-11 23:19:08 +08:00
#[cfg(target_os = "linux")]
let app_path = {
2023-02-11 23:31:55 +08:00
use crate::core::handle::Handle;
2023-02-11 23:19:08 +08:00
use tauri::Manager;
2024-09-23 23:57:08 +08:00
let app_handle = Handle::global().app_handle();
match app_handle {
2023-03-16 23:45:48 +08:00
Some(app_handle) => {
let appimage = app_handle.env().appimage;
appimage
2023-02-11 23:19:08 +08:00
.and_then(|p| p.to_str().map(|s| s.to_string()))
2023-03-16 23:45:48 +08:00
.unwrap_or(app_path)
}
None => app_path,
}
2023-02-11 23:19:08 +08:00
};
2022-11-12 11:37:23 +08:00
let auto = AutoLaunchBuilder::new()
.set_app_name(app_name)
.set_app_path(&app_path)
.build()?;
2022-11-14 01:26:33 +08:00
*self.auto_launch.lock() = Some(auto);
2022-04-20 01:44:47 +08:00
2022-11-12 11:37:23 +08:00
Ok(())
}
2022-04-20 01:44:47 +08:00
2022-11-12 11:37:23 +08:00
/// update the startup
2022-11-14 01:26:33 +08:00
pub fn update_launch(&self) -> Result<()> {
let auto_launch = self.auto_launch.lock();
2024-01-10 17:36:35 +08:00
let enable = { Config::verge().latest().enable_auto_launch };
2022-11-17 17:07:13 +08:00
let enable = enable.unwrap_or(false);
2022-11-14 01:26:33 +08:00
let auto_launch = auto_launch.as_ref().unwrap();
2022-09-11 20:58:55 +08:00
2022-11-12 11:37:23 +08:00
match enable {
true => auto_launch.enable()?,
2022-11-14 01:26:33 +08:00
false => log_err!(auto_launch.disable()), // 忽略关闭的错误
2022-11-12 11:37:23 +08:00
};
2022-04-20 01:44:47 +08:00
2022-11-12 11:37:23 +08:00
Ok(())
}
fn guard_proxy(&self) {
let _ = self.guard_state.lock();
2022-11-12 11:37:23 +08:00
tauri::async_runtime::spawn(async move {
// default duration is 10s
let mut wait_secs = 10u64;
loop {
sleep(Duration::from_secs(wait_secs)).await;
2024-06-09 12:45:57 +08:00
let (enable, guard, guard_duration, pac) = {
2022-11-16 01:26:41 +08:00
let verge = Config::verge();
let verge = verge.latest();
(
2024-01-10 17:36:35 +08:00
verge.enable_system_proxy.unwrap_or(false),
verge.enable_proxy_guard.unwrap_or(false),
verge.proxy_guard_duration.unwrap_or(10),
2024-05-26 19:07:14 +08:00
verge.proxy_auto_config.unwrap_or(false),
2022-11-16 01:26:41 +08:00
)
};
2022-11-12 11:37:23 +08:00
// stop loop
if !enable || !guard {
continue;
2022-11-12 11:37:23 +08:00
}
// update duration
wait_secs = guard_duration;
log::debug!(target: "app", "try to guard the system proxy");
let sysproxy = Sysproxy::get_system_proxy();
let autoproxy = Autoproxy::get_auto_proxy();
if !sysproxy.is_ok() || !autoproxy.is_ok() {
log::error!(target: "app", "failed to get the system proxy");
continue;
}
let sysproxy_enable = sysproxy.ok().map(|s| s.enable).unwrap_or(false);
let autoproxy_enable = autoproxy.ok().map(|s| s.enable).unwrap_or(false);
if sysproxy_enable || autoproxy_enable {
continue;
}
2023-12-01 12:56:18 +08:00
let port = {
Config::verge()
.latest()
.verge_mixed_port
.unwrap_or(Config::clash().data().get_mixed_port())
};
2024-05-26 19:07:14 +08:00
let pac_port = IVerge::get_singleton_port();
if pac {
let autoproxy = Autoproxy {
enable: true,
url: format!("http://127.0.0.1:{pac_port}/commands/pac"),
};
log_err!(autoproxy.set_auto_proxy());
} else {
let sysproxy = Sysproxy {
enable: true,
host: "127.0.0.1".into(),
port,
2024-06-09 12:45:57 +08:00
bypass: get_bypass(),
2024-05-26 19:07:14 +08:00
};
2024-05-26 19:07:14 +08:00
log_err!(sysproxy.set_system_proxy());
}
2022-11-12 11:37:23 +08:00
}
});
}
2022-04-20 01:44:47 +08:00
}