| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176 | 
							- //go:build linux && !android
 
- package settings
 
- import (
 
- 	"context"
 
- 	"os"
 
- 	"os/exec"
 
- 	"strings"
 
- 	"github.com/sagernet/sing/common"
 
- 	E "github.com/sagernet/sing/common/exceptions"
 
- 	F "github.com/sagernet/sing/common/format"
 
- 	M "github.com/sagernet/sing/common/metadata"
 
- 	"github.com/sagernet/sing/common/shell"
 
- )
 
- type LinuxSystemProxy struct {
 
- 	hasGSettings    bool
 
- 	kWriteConfigCmd string
 
- 	sudoUser        string
 
- 	serverAddr      M.Socksaddr
 
- 	supportSOCKS    bool
 
- 	isEnabled       bool
 
- }
 
- func NewSystemProxy(ctx context.Context, serverAddr M.Socksaddr, supportSOCKS bool) (*LinuxSystemProxy, error) {
 
- 	hasGSettings := common.Error(exec.LookPath("gsettings")) == nil
 
- 	kWriteConfigCmds := []string{
 
- 		"kwriteconfig5",
 
- 		"kwriteconfig6",
 
- 	}
 
- 	var kWriteConfigCmd string
 
- 	for _, cmd := range kWriteConfigCmds {
 
- 		if common.Error(exec.LookPath(cmd)) == nil {
 
- 			kWriteConfigCmd = cmd
 
- 			break
 
- 		}
 
- 	}
 
- 	var sudoUser string
 
- 	if os.Getuid() == 0 {
 
- 		sudoUser = os.Getenv("SUDO_USER")
 
- 	}
 
- 	if !hasGSettings && kWriteConfigCmd == "" {
 
- 		return nil, E.New("unsupported desktop environment")
 
- 	}
 
- 	return &LinuxSystemProxy{
 
- 		hasGSettings:    hasGSettings,
 
- 		kWriteConfigCmd: kWriteConfigCmd,
 
- 		sudoUser:        sudoUser,
 
- 		serverAddr:      serverAddr,
 
- 		supportSOCKS:    supportSOCKS,
 
- 	}, nil
 
- }
 
- func (p *LinuxSystemProxy) IsEnabled() bool {
 
- 	return p.isEnabled
 
- }
 
- func (p *LinuxSystemProxy) Enable() error {
 
- 	if p.hasGSettings {
 
- 		err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy.http", "enabled", "true")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		if p.supportSOCKS {
 
- 			err = p.setGnomeProxy("ftp", "http", "https", "socks")
 
- 		} else {
 
- 			err = p.setGnomeProxy("http", "https")
 
- 		}
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "use-same-proxy", F.ToString(p.supportSOCKS))
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "manual")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	if p.kWriteConfigCmd != "" {
 
- 		err := p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "1")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		if p.supportSOCKS {
 
- 			err = p.setKDEProxy("ftp", "http", "https", "socks")
 
- 		} else {
 
- 			err = p.setKDEProxy("http", "https")
 
- 		}
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "Authmode", "0")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	p.isEnabled = true
 
- 	return nil
 
- }
 
- func (p *LinuxSystemProxy) Disable() error {
 
- 	if p.hasGSettings {
 
- 		err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "none")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	if p.kWriteConfigCmd != "" {
 
- 		err := p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "0")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	p.isEnabled = false
 
- 	return nil
 
- }
 
- func (p *LinuxSystemProxy) runAsUser(name string, args ...string) error {
 
- 	if os.Getuid() != 0 {
 
- 		return shell.Exec(name, args...).Attach().Run()
 
- 	} else if p.sudoUser != "" {
 
- 		return shell.Exec("su", "-", p.sudoUser, "-c", F.ToString(name, " ", strings.Join(args, " "))).Attach().Run()
 
- 	} else {
 
- 		return E.New("set system proxy: unable to set as root")
 
- 	}
 
- }
 
- func (p *LinuxSystemProxy) setGnomeProxy(proxyTypes ...string) error {
 
- 	for _, proxyType := range proxyTypes {
 
- 		err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "host", p.serverAddr.AddrString())
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 		err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "port", F.ToString(p.serverAddr.Port))
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
- func (p *LinuxSystemProxy) setKDEProxy(proxyTypes ...string) error {
 
- 	for _, proxyType := range proxyTypes {
 
- 		var proxyUrl string
 
- 		if proxyType == "socks" {
 
- 			proxyUrl = "socks://" + p.serverAddr.String()
 
- 		} else {
 
- 			proxyUrl = "http://" + p.serverAddr.String()
 
- 		}
 
- 		err := p.runAsUser(
 
- 			p.kWriteConfigCmd,
 
- 			"--file",
 
- 			"kioslaverc",
 
- 			"--group",
 
- 			"Proxy Settings",
 
- 			"--key", proxyType+"Proxy",
 
- 			proxyUrl,
 
- 		)
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	return nil
 
- }
 
 
  |