proxy_linux.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. //go:build linux && !android
  2. package settings
  3. import (
  4. "context"
  5. "os"
  6. "os/exec"
  7. "strings"
  8. "github.com/sagernet/sing/common"
  9. E "github.com/sagernet/sing/common/exceptions"
  10. F "github.com/sagernet/sing/common/format"
  11. M "github.com/sagernet/sing/common/metadata"
  12. "github.com/sagernet/sing/common/shell"
  13. )
  14. type LinuxSystemProxy struct {
  15. hasGSettings bool
  16. hasKWriteConfig5 bool
  17. sudoUser string
  18. serverAddr M.Socksaddr
  19. supportSOCKS bool
  20. isEnabled bool
  21. }
  22. func NewSystemProxy(ctx context.Context, serverAddr M.Socksaddr, supportSOCKS bool) (*LinuxSystemProxy, error) {
  23. hasGSettings := common.Error(exec.LookPath("gsettings")) == nil
  24. hasKWriteConfig5 := common.Error(exec.LookPath("kwriteconfig5")) == nil
  25. var sudoUser string
  26. if os.Getuid() == 0 {
  27. sudoUser = os.Getenv("SUDO_USER")
  28. }
  29. if !hasGSettings && !hasKWriteConfig5 {
  30. return nil, E.New("unsupported desktop environment")
  31. }
  32. return &LinuxSystemProxy{
  33. hasGSettings: hasGSettings,
  34. hasKWriteConfig5: hasKWriteConfig5,
  35. sudoUser: sudoUser,
  36. serverAddr: serverAddr,
  37. supportSOCKS: supportSOCKS,
  38. }, nil
  39. }
  40. func (p *LinuxSystemProxy) IsEnabled() bool {
  41. return p.isEnabled
  42. }
  43. func (p *LinuxSystemProxy) Enable() error {
  44. if p.hasGSettings {
  45. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy.http", "enabled", "true")
  46. if err != nil {
  47. return err
  48. }
  49. if p.supportSOCKS {
  50. err = p.setGnomeProxy("ftp", "http", "https", "socks")
  51. } else {
  52. err = p.setGnomeProxy("http", "https")
  53. }
  54. if err != nil {
  55. return err
  56. }
  57. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "use-same-proxy", F.ToString(p.supportSOCKS))
  58. if err != nil {
  59. return err
  60. }
  61. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "manual")
  62. if err != nil {
  63. return err
  64. }
  65. }
  66. if p.hasKWriteConfig5 {
  67. err := p.runAsUser("kwriteconfig5", "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "1")
  68. if err != nil {
  69. return err
  70. }
  71. if p.supportSOCKS {
  72. err = p.setKDEProxy("ftp", "http", "https", "socks")
  73. } else {
  74. err = p.setKDEProxy("http", "https")
  75. }
  76. if err != nil {
  77. return err
  78. }
  79. err = p.runAsUser("kwriteconfig5", "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "Authmode", "0")
  80. if err != nil {
  81. return err
  82. }
  83. err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
  84. if err != nil {
  85. return err
  86. }
  87. }
  88. p.isEnabled = true
  89. return nil
  90. }
  91. func (p *LinuxSystemProxy) Disable() error {
  92. if p.hasGSettings {
  93. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "none")
  94. if err != nil {
  95. return err
  96. }
  97. }
  98. if p.hasKWriteConfig5 {
  99. err := p.runAsUser("kwriteconfig5", "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "0")
  100. if err != nil {
  101. return err
  102. }
  103. err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
  104. if err != nil {
  105. return err
  106. }
  107. }
  108. p.isEnabled = false
  109. return nil
  110. }
  111. func (p *LinuxSystemProxy) runAsUser(name string, args ...string) error {
  112. if os.Getuid() != 0 {
  113. return shell.Exec(name, args...).Attach().Run()
  114. } else if p.sudoUser != "" {
  115. return shell.Exec("su", "-", p.sudoUser, "-c", F.ToString(name, " ", strings.Join(args, " "))).Attach().Run()
  116. } else {
  117. return E.New("set system proxy: unable to set as root")
  118. }
  119. }
  120. func (p *LinuxSystemProxy) setGnomeProxy(proxyTypes ...string) error {
  121. for _, proxyType := range proxyTypes {
  122. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "host", p.serverAddr.AddrString())
  123. if err != nil {
  124. return err
  125. }
  126. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "port", F.ToString(p.serverAddr.Port))
  127. if err != nil {
  128. return err
  129. }
  130. }
  131. return nil
  132. }
  133. func (p *LinuxSystemProxy) setKDEProxy(proxyTypes ...string) error {
  134. for _, proxyType := range proxyTypes {
  135. var proxyUrl string
  136. if proxyType == "socks" {
  137. proxyUrl = "socks://" + p.serverAddr.String()
  138. } else {
  139. proxyUrl = "http://" + p.serverAddr.String()
  140. }
  141. err := p.runAsUser(
  142. "kwriteconfig5",
  143. "--file",
  144. "kioslaverc",
  145. "--group",
  146. "Proxy Settings",
  147. "--key", proxyType+"Proxy",
  148. proxyUrl,
  149. )
  150. if err != nil {
  151. return err
  152. }
  153. }
  154. return nil
  155. }