2025-03-12 11:18:47 +08:00
|
|
|
use tun2proxy::{ArgVerbosity, Args, BoxError};
|
2024-02-01 19:15:32 +08:00
|
|
|
|
2024-10-09 23:54:25 +08:00
|
|
|
fn main() -> Result<(), BoxError> {
|
2024-02-01 19:15:32 +08:00
|
|
|
dotenvy::dotenv().ok();
|
|
|
|
let args = Args::parse_args();
|
|
|
|
|
2024-09-14 22:02:05 +08:00
|
|
|
#[cfg(unix)]
|
|
|
|
if args.daemonize {
|
|
|
|
let stdout = std::fs::File::create("/tmp/tun2proxy.out")?;
|
|
|
|
let stderr = std::fs::File::create("/tmp/tun2proxy.err")?;
|
|
|
|
let daemonize = daemonize::Daemonize::new()
|
|
|
|
.working_directory("/tmp")
|
|
|
|
.umask(0o777)
|
|
|
|
.stdout(stdout)
|
|
|
|
.stderr(stderr)
|
|
|
|
.privileged_action(|| "Executed before drop privileges");
|
|
|
|
let _ = daemonize.start()?;
|
|
|
|
}
|
|
|
|
|
2024-09-14 09:55:27 +08:00
|
|
|
#[cfg(target_os = "windows")]
|
|
|
|
if args.daemonize {
|
|
|
|
tun2proxy::win_svc::start_service()?;
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
2024-10-09 23:54:25 +08:00
|
|
|
let rt = tokio::runtime::Builder::new_multi_thread().enable_all().build()?;
|
|
|
|
rt.block_on(main_async(args))
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn main_async(args: Args) -> Result<(), BoxError> {
|
2025-03-12 11:18:47 +08:00
|
|
|
let ipstack = match args.verbosity {
|
|
|
|
ArgVerbosity::Trace => ArgVerbosity::Debug,
|
|
|
|
_ => args.verbosity,
|
|
|
|
};
|
|
|
|
let default = format!("{:?},hickory_proto=warn,ipstack={:?}", args.verbosity, ipstack);
|
2024-02-01 19:15:32 +08:00
|
|
|
env_logger::Builder::from_env(env_logger::Env::default().default_filter_or(default)).init();
|
|
|
|
|
2024-02-13 10:46:13 +08:00
|
|
|
let shutdown_token = tokio_util::sync::CancellationToken::new();
|
2024-10-09 16:58:37 +08:00
|
|
|
let main_loop_handle = tokio::spawn({
|
2024-02-24 19:24:51 +08:00
|
|
|
let shutdown_token = shutdown_token.clone();
|
|
|
|
async move {
|
2024-04-07 21:12:20 +02:00
|
|
|
#[cfg(target_os = "linux")]
|
2024-04-03 14:26:46 +00:00
|
|
|
if args.unshare && args.socket_transfer_fd.is_none() {
|
|
|
|
if let Err(err) = namespace_proxy_main(args, shutdown_token).await {
|
|
|
|
log::error!("namespace proxy error: {}", err);
|
|
|
|
}
|
2024-04-07 21:12:20 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-06-05 19:51:46 +08:00
|
|
|
unsafe extern "C" fn traffic_cb(status: *const tun2proxy::TrafficStatus, _: *mut std::ffi::c_void) {
|
2025-02-27 13:53:39 +08:00
|
|
|
let status = unsafe { &*status };
|
2024-06-05 19:51:46 +08:00
|
|
|
log::debug!("Traffic: ▲ {} : ▼ {}", status.tx, status.rx);
|
|
|
|
}
|
|
|
|
unsafe { tun2proxy::tun2proxy_set_traffic_status_callback(1, Some(traffic_cb), std::ptr::null_mut()) };
|
|
|
|
|
2025-01-10 18:43:55 +08:00
|
|
|
if let Err(err) = tun2proxy::general_run_async(args, tun::DEFAULT_MTU, cfg!(target_os = "macos"), shutdown_token).await {
|
2024-04-03 22:39:05 +02:00
|
|
|
log::error!("main loop error: {}", err);
|
2024-02-24 19:24:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
2024-02-01 19:15:32 +08:00
|
|
|
|
2024-10-09 16:58:37 +08:00
|
|
|
let ctrlc_fired = std::sync::Arc::new(std::sync::atomic::AtomicBool::new(false));
|
|
|
|
let ctrlc_fired_clone = ctrlc_fired.clone();
|
|
|
|
let ctrlc_handel = ctrlc2::set_async_handler(async move {
|
2024-02-10 17:36:54 +01:00
|
|
|
log::info!("Ctrl-C received, exiting...");
|
2024-10-09 16:58:37 +08:00
|
|
|
ctrlc_fired_clone.store(true, std::sync::atomic::Ordering::SeqCst);
|
2024-02-10 17:36:54 +01:00
|
|
|
shutdown_token.cancel();
|
2024-02-01 19:15:32 +08:00
|
|
|
})
|
|
|
|
.await;
|
|
|
|
|
2024-10-09 16:58:37 +08:00
|
|
|
main_loop_handle.await?;
|
|
|
|
|
|
|
|
if ctrlc_fired.load(std::sync::atomic::Ordering::SeqCst) {
|
|
|
|
log::info!("Ctrl-C fired, waiting the handler to finish...");
|
|
|
|
ctrlc_handel.await.map_err(|err| err.to_string())?;
|
2024-02-01 19:15:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
2024-04-03 14:26:46 +00:00
|
|
|
|
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
async fn namespace_proxy_main(
|
|
|
|
_args: Args,
|
|
|
|
_shutdown_token: tokio_util::sync::CancellationToken,
|
|
|
|
) -> Result<std::process::ExitStatus, tun2proxy::Error> {
|
2025-02-27 13:53:39 +08:00
|
|
|
use nix::fcntl::{OFlag, open};
|
2024-04-07 21:44:50 +02:00
|
|
|
use nix::sys::stat::Mode;
|
2024-04-03 14:26:46 +00:00
|
|
|
use std::os::fd::AsRawFd;
|
|
|
|
|
|
|
|
let (socket, remote_fd) = tun2proxy::socket_transfer::create_transfer_socket_pair().await?;
|
|
|
|
|
2024-04-07 21:44:50 +02:00
|
|
|
let fd = open("/proc/self/exe", OFlag::O_PATH, Mode::empty())?;
|
|
|
|
|
2024-04-03 14:26:46 +00:00
|
|
|
let child = tokio::process::Command::new("unshare")
|
|
|
|
.args("--user --map-current-user --net --mount --keep-caps --kill-child --fork".split(' '))
|
2024-04-07 21:44:50 +02:00
|
|
|
.arg(format!("/proc/self/fd/{}", fd))
|
2024-04-03 14:26:46 +00:00
|
|
|
.arg("--socket-transfer-fd")
|
|
|
|
.arg(remote_fd.as_raw_fd().to_string())
|
|
|
|
.args(std::env::args().skip(1))
|
|
|
|
.kill_on_drop(true)
|
|
|
|
.spawn();
|
|
|
|
|
|
|
|
let mut child = match child {
|
|
|
|
Err(err) if err.kind() == std::io::ErrorKind::NotFound => {
|
|
|
|
log::error!("`unshare(1)` executable wasn't located in PATH.");
|
|
|
|
log::error!("Consider installing linux utils package: `apt install util-linux`");
|
|
|
|
log::error!("Or similar for your distribution.");
|
|
|
|
return Err(err.into());
|
|
|
|
}
|
|
|
|
child => child?,
|
|
|
|
};
|
|
|
|
|
2024-06-01 10:26:16 +00:00
|
|
|
let unshare_pid = child.id().unwrap_or(0);
|
2024-04-03 14:26:46 +00:00
|
|
|
log::info!("The tun proxy is running in unprivileged mode. See `namespaces(7)`.");
|
|
|
|
log::info!("");
|
|
|
|
log::info!("If you need to run a process that relies on root-like capabilities (e.g. `openvpn`)");
|
2024-09-26 10:54:54 +08:00
|
|
|
log::info!("Use `tun2proxy-bin --unshare --setup [...] -- openvpn --config [...]`");
|
2024-04-03 14:26:46 +00:00
|
|
|
log::info!("");
|
|
|
|
log::info!("To run a new process in the created namespace (e.g. a flatpak app)");
|
|
|
|
log::info!(
|
|
|
|
"Use `nsenter --preserve-credentials --user --net --mount --target {} /bin/sh`",
|
2024-06-01 10:26:16 +00:00
|
|
|
unshare_pid
|
2024-04-03 14:26:46 +00:00
|
|
|
);
|
|
|
|
log::info!("");
|
2024-06-01 10:26:16 +00:00
|
|
|
if let Some(pidfile) = _args.unshare_pidfile.as_ref() {
|
|
|
|
log::info!("Writing unshare pid to {}", pidfile);
|
|
|
|
std::fs::write(pidfile, unshare_pid.to_string()).ok();
|
|
|
|
}
|
2024-04-03 14:26:46 +00:00
|
|
|
tokio::spawn(async move { tun2proxy::socket_transfer::process_socket_requests(&socket).await });
|
|
|
|
|
|
|
|
Ok(child.wait().await?)
|
|
|
|
}
|