123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322 |
- use crate::{config::Config, log_err};
- use anyhow::{anyhow, Result};
- use auto_launch::{AutoLaunch, AutoLaunchBuilder};
- use once_cell::sync::OnceCell;
- use parking_lot::Mutex;
- use std::env::current_exe;
- use std::sync::Arc;
- use sysproxy::Sysproxy;
- use tauri::async_runtime::Mutex as TokioMutex;
- pub struct Sysopt {
- /// current system proxy setting
- cur_sysproxy: Arc<Mutex<Option<Sysproxy>>>,
- /// record the original system proxy
- /// recover it when exit
- old_sysproxy: Arc<Mutex<Option<Sysproxy>>>,
- /// helps to auto launch the app
- auto_launch: Arc<Mutex<Option<AutoLaunch>>>,
- /// record whether the guard async is running or not
- guard_state: Arc<TokioMutex<bool>>,
- }
- #[cfg(target_os = "windows")]
- static DEFAULT_BYPASS: &str = "localhost;127.*;192.168.*;10.*;172.16.*;172.17.*;172.18.*;172.19.*;172.20.*;172.21.*;172.22.*;172.23.*;172.24.*;172.25.*;172.26.*;172.27.*;172.28.*;172.29.*;172.30.*;172.31.*;<local>";
- #[cfg(target_os = "linux")]
- static DEFAULT_BYPASS: &str = "localhost,127.0.0.1,192.168.0.0/16,10.0.0.0/8,172.16.0.0/12,::1";
- #[cfg(target_os = "macos")]
- static DEFAULT_BYPASS: &str =
- "127.0.0.1,192.168.0.0/16,10.0.0.0/8,172.16.0.0/12,localhost,*.local,*.crashlytics.com,<local>";
- impl Sysopt {
- pub fn global() -> &'static Sysopt {
- static SYSOPT: OnceCell<Sysopt> = OnceCell::new();
- SYSOPT.get_or_init(|| Sysopt {
- cur_sysproxy: Arc::new(Mutex::new(None)),
- old_sysproxy: Arc::new(Mutex::new(None)),
- auto_launch: Arc::new(Mutex::new(None)),
- guard_state: Arc::new(TokioMutex::new(false)),
- })
- }
- /// init the sysproxy
- pub fn init_sysproxy(&self) -> Result<()> {
- let port = Config::verge()
- .latest()
- .verge_mixed_port
- .unwrap_or(Config::clash().data().get_mixed_port());
- let (enable, bypass) = {
- let verge = Config::verge();
- let verge = verge.latest();
- (
- verge.enable_system_proxy.unwrap_or(false),
- verge.system_proxy_bypass.clone(),
- )
- };
- let current = Sysproxy {
- enable,
- host: String::from("127.0.0.1"),
- port,
- bypass: match bypass {
- Some(bypass) => {
- if bypass.is_empty() {
- DEFAULT_BYPASS.into()
- } else {
- bypass
- }
- }
- None => DEFAULT_BYPASS.into(),
- },
- };
- if enable {
- let old = Sysproxy::get_system_proxy().ok();
- current.set_system_proxy()?;
- *self.old_sysproxy.lock() = old;
- *self.cur_sysproxy.lock() = Some(current);
- }
- // run the system proxy guard
- self.guard_proxy();
- Ok(())
- }
- /// update the system proxy
- pub fn update_sysproxy(&self) -> Result<()> {
- let mut cur_sysproxy = self.cur_sysproxy.lock();
- let old_sysproxy = self.old_sysproxy.lock();
- if cur_sysproxy.is_none() || old_sysproxy.is_none() {
- drop(cur_sysproxy);
- drop(old_sysproxy);
- return self.init_sysproxy();
- }
- let (enable, bypass) = {
- let verge = Config::verge();
- let verge = verge.latest();
- (
- verge.enable_system_proxy.unwrap_or(false),
- verge.system_proxy_bypass.clone(),
- )
- };
- let mut sysproxy = cur_sysproxy.take().unwrap();
- sysproxy.enable = enable;
- sysproxy.bypass = match bypass {
- Some(bypass) => {
- if bypass.is_empty() {
- DEFAULT_BYPASS.into()
- } else {
- bypass
- }
- }
- None => DEFAULT_BYPASS.into(),
- };
- let port = Config::verge()
- .latest()
- .verge_mixed_port
- .unwrap_or(Config::clash().data().get_mixed_port());
- sysproxy.port = port;
- sysproxy.set_system_proxy()?;
- *cur_sysproxy = Some(sysproxy);
- Ok(())
- }
- /// reset the sysproxy
- pub fn reset_sysproxy(&self) -> Result<()> {
- let mut cur_sysproxy = self.cur_sysproxy.lock();
- let mut old_sysproxy = self.old_sysproxy.lock();
- let cur_sysproxy = cur_sysproxy.take();
- if let Some(mut old) = old_sysproxy.take() {
- // 如果原代理和当前代理 端口一致,就disable关闭,否则就恢复原代理设置
- // 当前没有设置代理的时候,不确定旧设置是否和当前一致,全关了
- let port_same = cur_sysproxy.map_or(true, |cur| old.port == cur.port);
- if old.enable && port_same {
- old.enable = false;
- log::info!(target: "app", "reset proxy by disabling the original proxy");
- } else {
- log::info!(target: "app", "reset proxy to the original proxy");
- }
- old.set_system_proxy()?;
- } else if let Some(mut cur @ Sysproxy { enable: true, .. }) = cur_sysproxy {
- // 没有原代理,就按现在的代理设置disable即可
- log::info!(target: "app", "reset proxy by disabling the current proxy");
- cur.enable = false;
- cur.set_system_proxy()?;
- } else {
- log::info!(target: "app", "reset proxy with no action");
- }
- Ok(())
- }
- /// init the auto launch
- pub fn init_launch(&self) -> Result<()> {
- let app_exe = current_exe()?;
- // let app_exe = dunce::canonicalize(app_exe)?;
- let app_name = app_exe
- .file_stem()
- .and_then(|f| f.to_str())
- .ok_or(anyhow!("failed to get file stem"))?;
- let app_path = app_exe
- .as_os_str()
- .to_str()
- .ok_or(anyhow!("failed to get app_path"))?
- .to_string();
- // fix issue #26
- #[cfg(target_os = "windows")]
- let app_path = format!("\"{app_path}\"");
- // use the /Applications/Clash Verge.app path
- #[cfg(target_os = "macos")]
- let app_path = (|| -> Option<String> {
- let path = std::path::PathBuf::from(&app_path);
- let path = path.parent()?.parent()?.parent()?;
- let extension = path.extension()?.to_str()?;
- match extension == "app" {
- true => Some(path.as_os_str().to_str()?.to_string()),
- false => None,
- }
- })()
- .unwrap_or(app_path);
- // fix #403
- #[cfg(target_os = "linux")]
- let app_path = {
- use crate::core::handle::Handle;
- use tauri::Manager;
- let handle = Handle::global();
- match handle.app_handle.lock().as_ref() {
- Some(app_handle) => {
- let appimage = app_handle.env().appimage;
- appimage
- .and_then(|p| p.to_str().map(|s| s.to_string()))
- .unwrap_or(app_path)
- }
- None => app_path,
- }
- };
- let auto = AutoLaunchBuilder::new()
- .set_app_name(app_name)
- .set_app_path(&app_path)
- .build()?;
- *self.auto_launch.lock() = Some(auto);
- Ok(())
- }
- /// update the startup
- pub fn update_launch(&self) -> Result<()> {
- let auto_launch = self.auto_launch.lock();
- if auto_launch.is_none() {
- drop(auto_launch);
- return self.init_launch();
- }
- let enable = { Config::verge().latest().enable_auto_launch };
- let enable = enable.unwrap_or(false);
- let auto_launch = auto_launch.as_ref().unwrap();
- match enable {
- true => auto_launch.enable()?,
- false => log_err!(auto_launch.disable()), // 忽略关闭的错误
- };
- Ok(())
- }
- /// launch a system proxy guard
- /// read config from file directly
- pub fn guard_proxy(&self) {
- use tokio::time::{sleep, Duration};
- let guard_state = self.guard_state.clone();
- tauri::async_runtime::spawn(async move {
- // if it is running, exit
- let mut state = guard_state.lock().await;
- if *state {
- return;
- }
- *state = true;
- drop(state);
- // default duration is 10s
- let mut wait_secs = 10u64;
- loop {
- sleep(Duration::from_secs(wait_secs)).await;
- let (enable, guard, guard_duration, bypass) = {
- let verge = Config::verge();
- let verge = verge.latest();
- (
- verge.enable_system_proxy.unwrap_or(false),
- verge.enable_proxy_guard.unwrap_or(false),
- verge.proxy_guard_duration.unwrap_or(10),
- verge.system_proxy_bypass.clone(),
- )
- };
- // stop loop
- if !enable || !guard {
- break;
- }
- // update duration
- wait_secs = guard_duration;
- log::debug!(target: "app", "try to guard the system proxy");
- let port = {
- Config::verge()
- .latest()
- .verge_mixed_port
- .unwrap_or(Config::clash().data().get_mixed_port())
- };
- let sysproxy = Sysproxy {
- enable: true,
- host: "127.0.0.1".into(),
- port,
- bypass: match bypass {
- Some(bypass) => {
- if bypass.is_empty() {
- DEFAULT_BYPASS.into()
- } else {
- bypass
- }
- }
- None => DEFAULT_BYPASS.into(),
- },
- };
- log_err!(sysproxy.set_system_proxy());
- }
- let mut state = guard_state.lock().await;
- *state = false;
- drop(state);
- });
- }
- }
|