#![cfg(any(target_os = "windows", target_os = "macos", target_os = "linux"))] use crate::{ args::{ArgDns, ArgProxy}, ArgVerbosity, Args, }; use std::os::raw::{c_char, c_int}; use tproxy_config::{TproxyArgs, TUN_GATEWAY, TUN_IPV4, TUN_NETMASK}; use tun2::{AbstractDevice, DEFAULT_MTU as MTU}; static TUN_QUIT: std::sync::Mutex> = std::sync::Mutex::new(None); /// # Safety /// /// Run the tun2proxy component with some arguments. /// Parameters: /// - proxy_url: the proxy url, e.g. "socks5://127.0.0.1:1080" /// - tun: the tun device name, e.g. "utun5" /// - bypass: the bypass IP/CIDR, e.g. "123.45.67.0/24" /// - dns_strategy: the dns strategy, see ArgDns enum /// - root_privilege: whether to run with root privilege /// - verbosity: the verbosity level, see ArgVerbosity enum #[no_mangle] pub unsafe extern "C" fn tun2proxy_with_name_run( proxy_url: *const c_char, tun: *const c_char, bypass: *const c_char, dns_strategy: ArgDns, _root_privilege: bool, verbosity: ArgVerbosity, ) -> c_int { let shutdown_token = tokio_util::sync::CancellationToken::new(); { if let Ok(mut lock) = TUN_QUIT.lock() { if lock.is_some() { return -1; } *lock = Some(shutdown_token.clone()); } else { return -2; } } log::set_max_level(verbosity.into()); if let Err(err) = log::set_boxed_logger(Box::::default()) { log::warn!("set logger error: {}", err); } let proxy_url = std::ffi::CStr::from_ptr(proxy_url).to_str().unwrap(); let proxy = ArgProxy::try_from(proxy_url).unwrap(); let tun = std::ffi::CStr::from_ptr(tun).to_str().unwrap().to_string(); let mut args = Args::default(); args.proxy(proxy).tun(tun).dns(dns_strategy).verbosity(verbosity); #[cfg(target_os = "linux")] args.setup(_root_privilege); if let Ok(bypass) = std::ffi::CStr::from_ptr(bypass).to_str() { args.bypass(bypass.parse().unwrap()); } let main_loop = async move { if let Err(err) = desktop_run_async(args, shutdown_token).await { log::error!("main loop error: {}", err); return Err(err); } Ok(()) }; let exit_code = match tokio::runtime::Builder::new_multi_thread().enable_all().build() { Err(_e) => -3, Ok(rt) => match rt.block_on(main_loop) { Ok(_) => 0, Err(_e) => -4, }, }; exit_code } /// Run the tun2proxy component with some arguments. pub async fn desktop_run_async(args: Args, shutdown_token: tokio_util::sync::CancellationToken) -> std::io::Result<()> { let bypass_ips = args.bypass.clone(); let mut tun_config = tun2::Configuration::default(); tun_config.address(TUN_IPV4).netmask(TUN_NETMASK).mtu(MTU).up(); tun_config.destination(TUN_GATEWAY); #[cfg(unix)] if let Some(fd) = args.tun_fd { tun_config.raw_fd(fd); if let Some(v) = args.close_fd_on_drop { tun_config.close_fd_on_drop(v); }; } else if let Some(ref tun) = args.tun { tun_config.tun_name(tun); } #[cfg(windows)] if let Some(ref tun) = args.tun { tun_config.tun_name(tun); } #[cfg(target_os = "linux")] tun_config.platform_config(|cfg| { #[allow(deprecated)] cfg.packet_information(true); cfg.ensure_root_privileges(args.setup); }); #[cfg(target_os = "windows")] tun_config.platform_config(|cfg| { cfg.device_guid(12324323423423434234_u128); }); #[allow(unused_variables)] let mut tproxy_args = TproxyArgs::new() .tun_dns(args.dns_addr) .proxy_addr(args.proxy.addr) .bypass_ips(&bypass_ips) .ipv6_default_route(args.ipv6_enabled); #[allow(unused_mut, unused_assignments, unused_variables)] let mut setup = true; let device = tun2::create_as_async(&tun_config)?; if let Ok(tun_name) = device.as_ref().tun_name() { tproxy_args = tproxy_args.tun_name(&tun_name); } // TproxyState implements the Drop trait to restore network configuration, // so we we need to assign it to a variable, even if it is not used. let mut _restore: Option = None; #[cfg(target_os = "linux")] { setup = args.setup; } #[cfg(any(target_os = "linux", target_os = "windows", target_os = "macos"))] if setup { _restore = Some(tproxy_config::tproxy_setup(&tproxy_args)?); } #[cfg(target_os = "linux")] { let mut admin_command_args = args.admin_command.iter(); if let Some(command) = admin_command_args.next() { let child = tokio::process::Command::new(command) .args(admin_command_args) .kill_on_drop(true) .spawn(); match child { Err(err) => { log::warn!("Failed to start admin process: {err}"); } Ok(mut child) => { tokio::spawn(async move { if let Err(err) = child.wait().await { log::warn!("Admin process terminated: {err}"); } }); } }; } } let join_handle = tokio::spawn(crate::run(device, MTU, args, shutdown_token)); join_handle.await.map_err(std::io::Error::from)??; Ok::<(), std::io::Error>(()) } /// # Safety /// /// Shutdown the tun2proxy component. #[no_mangle] pub unsafe extern "C" fn tun2proxy_with_name_stop() -> c_int { if let Ok(mut lock) = TUN_QUIT.lock() { if let Some(shutdown_token) = lock.take() { shutdown_token.cancel(); return 0; } } -1 }