proxy_linux.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. //go:build linux && !android
  2. package settings
  3. import (
  4. "context"
  5. "os"
  6. "os/exec"
  7. "strings"
  8. "github.com/sagernet/sing/common"
  9. E "github.com/sagernet/sing/common/exceptions"
  10. F "github.com/sagernet/sing/common/format"
  11. M "github.com/sagernet/sing/common/metadata"
  12. "github.com/sagernet/sing/common/shell"
  13. )
  14. type LinuxSystemProxy struct {
  15. hasGSettings bool
  16. kWriteConfigCmd string
  17. sudoUser string
  18. serverAddr M.Socksaddr
  19. supportSOCKS bool
  20. isEnabled bool
  21. }
  22. func NewSystemProxy(ctx context.Context, serverAddr M.Socksaddr, supportSOCKS bool) (*LinuxSystemProxy, error) {
  23. hasGSettings := common.Error(exec.LookPath("gsettings")) == nil
  24. kWriteConfigCmds := []string{
  25. "kwriteconfig5",
  26. "kwriteconfig6",
  27. }
  28. var kWriteConfigCmd string
  29. for _, cmd := range kWriteConfigCmds {
  30. if common.Error(exec.LookPath(cmd)) == nil {
  31. kWriteConfigCmd = cmd
  32. break
  33. }
  34. }
  35. var sudoUser string
  36. if os.Getuid() == 0 {
  37. sudoUser = os.Getenv("SUDO_USER")
  38. }
  39. if !hasGSettings && kWriteConfigCmd == "" {
  40. return nil, E.New("unsupported desktop environment")
  41. }
  42. return &LinuxSystemProxy{
  43. hasGSettings: hasGSettings,
  44. kWriteConfigCmd: kWriteConfigCmd,
  45. sudoUser: sudoUser,
  46. serverAddr: serverAddr,
  47. supportSOCKS: supportSOCKS,
  48. }, nil
  49. }
  50. func (p *LinuxSystemProxy) IsEnabled() bool {
  51. return p.isEnabled
  52. }
  53. func (p *LinuxSystemProxy) Enable() error {
  54. if p.hasGSettings {
  55. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy.http", "enabled", "true")
  56. if err != nil {
  57. return err
  58. }
  59. if p.supportSOCKS {
  60. err = p.setGnomeProxy("ftp", "http", "https", "socks")
  61. } else {
  62. err = p.setGnomeProxy("http", "https")
  63. }
  64. if err != nil {
  65. return err
  66. }
  67. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "use-same-proxy", F.ToString(p.supportSOCKS))
  68. if err != nil {
  69. return err
  70. }
  71. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "manual")
  72. if err != nil {
  73. return err
  74. }
  75. }
  76. if p.kWriteConfigCmd != "" {
  77. err := p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "1")
  78. if err != nil {
  79. return err
  80. }
  81. if p.supportSOCKS {
  82. err = p.setKDEProxy("ftp", "http", "https", "socks")
  83. } else {
  84. err = p.setKDEProxy("http", "https")
  85. }
  86. if err != nil {
  87. return err
  88. }
  89. err = p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "Authmode", "0")
  90. if err != nil {
  91. return err
  92. }
  93. err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
  94. if err != nil {
  95. return err
  96. }
  97. }
  98. p.isEnabled = true
  99. return nil
  100. }
  101. func (p *LinuxSystemProxy) Disable() error {
  102. if p.hasGSettings {
  103. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy", "mode", "none")
  104. if err != nil {
  105. return err
  106. }
  107. }
  108. if p.kWriteConfigCmd != "" {
  109. err := p.runAsUser(p.kWriteConfigCmd, "--file", "kioslaverc", "--group", "Proxy Settings", "--key", "ProxyType", "0")
  110. if err != nil {
  111. return err
  112. }
  113. err = p.runAsUser("dbus-send", "--type=signal", "/KIO/Scheduler", "org.kde.KIO.Scheduler.reparseSlaveConfiguration", "string:''")
  114. if err != nil {
  115. return err
  116. }
  117. }
  118. p.isEnabled = false
  119. return nil
  120. }
  121. func (p *LinuxSystemProxy) runAsUser(name string, args ...string) error {
  122. if os.Getuid() != 0 {
  123. return shell.Exec(name, args...).Attach().Run()
  124. } else if p.sudoUser != "" {
  125. return shell.Exec("su", "-", p.sudoUser, "-c", F.ToString(name, " ", strings.Join(args, " "))).Attach().Run()
  126. } else {
  127. return E.New("set system proxy: unable to set as root")
  128. }
  129. }
  130. func (p *LinuxSystemProxy) setGnomeProxy(proxyTypes ...string) error {
  131. for _, proxyType := range proxyTypes {
  132. err := p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "host", p.serverAddr.AddrString())
  133. if err != nil {
  134. return err
  135. }
  136. err = p.runAsUser("gsettings", "set", "org.gnome.system.proxy."+proxyType, "port", F.ToString(p.serverAddr.Port))
  137. if err != nil {
  138. return err
  139. }
  140. }
  141. return nil
  142. }
  143. func (p *LinuxSystemProxy) setKDEProxy(proxyTypes ...string) error {
  144. for _, proxyType := range proxyTypes {
  145. var proxyUrl string
  146. if proxyType == "socks" {
  147. proxyUrl = "socks://" + p.serverAddr.String()
  148. } else {
  149. proxyUrl = "http://" + p.serverAddr.String()
  150. }
  151. err := p.runAsUser(
  152. p.kWriteConfigCmd,
  153. "--file",
  154. "kioslaverc",
  155. "--group",
  156. "Proxy Settings",
  157. "--key", proxyType+"Proxy",
  158. proxyUrl,
  159. )
  160. if err != nil {
  161. return err
  162. }
  163. }
  164. return nil
  165. }