Files
Easytier_lkddi/easytier/src/easytier-core.rs
T

860 lines
25 KiB
Rust
Raw Normal View History

2024-10-26 00:04:22 +08:00
#![allow(dead_code)]
2024-10-24 16:21:35 +08:00
#[macro_use]
extern crate rust_i18n;
2023-09-23 01:53:45 +00:00
2024-05-18 20:32:42 +08:00
use std::{
2024-11-08 23:33:17 +08:00
net::{Ipv4Addr, SocketAddr},
2024-05-18 20:32:42 +08:00
path::PathBuf,
};
2024-03-23 00:56:27 +08:00
use anyhow::Context;
2023-09-23 01:53:45 +00:00
use clap::Parser;
2024-05-16 20:16:09 +08:00
use tokio::net::TcpSocket;
2023-09-23 01:53:45 +00:00
2024-10-24 16:21:35 +08:00
use easytier::{
2024-05-07 00:38:05 +08:00
common::{
2024-10-24 16:21:35 +08:00
config::{
ConfigLoader, ConsoleLoggerConfig, FileLoggerConfig, NetworkIdentity, PeerConfig,
TomlConfigLoader, VpnPortalConfig,
},
constants::EASYTIER_VERSION,
global_ctx::{EventBusSubscriber, GlobalCtxEvent},
scoped_task::ScopedTask,
2024-05-07 00:38:05 +08:00
},
launcher,
proto::{self, common::CompressionAlgoPb},
2024-10-26 00:04:22 +08:00
tunnel::udp::UdpTunnelConnector,
2024-10-24 16:21:35 +08:00
utils::{init_logger, setup_panic_handler},
2024-10-26 00:04:22 +08:00
web_client,
2024-03-23 00:56:27 +08:00
};
#[cfg(target_os = "windows")]
windows_service::define_windows_service!(ffi_service_main, win_service_main);
2024-05-03 07:55:00 +08:00
#[cfg(feature = "mimalloc")]
2024-10-24 16:21:35 +08:00
use mimalloc_rust::GlobalMiMalloc;
2024-04-26 23:02:07 +08:00
2024-05-03 07:55:00 +08:00
#[cfg(feature = "mimalloc")]
2024-04-26 23:02:07 +08:00
#[global_allocator]
static GLOBAL_MIMALLOC: GlobalMiMalloc = GlobalMiMalloc;
2023-09-23 01:53:45 +00:00
#[derive(Parser, Debug)]
2024-10-13 12:16:42 +08:00
#[command(name = "easytier-core", author, version = EASYTIER_VERSION , about, long_about = None)]
2023-09-23 01:53:45 +00:00
struct Cli {
2024-10-26 00:04:22 +08:00
#[arg(
short = 'w',
long,
help = t!("core_clap.config_server").to_string()
)]
config_server: Option<String>,
2024-05-07 00:38:05 +08:00
#[arg(
short,
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.config_file").to_string()
2024-05-07 00:38:05 +08:00
)]
config_file: Option<PathBuf>,
2024-03-23 00:56:27 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.network_name").to_string(),
2024-03-23 16:34:48 +08:00
default_value = "default"
2024-03-23 00:56:27 +08:00
)]
2024-03-23 16:34:48 +08:00
network_name: String,
2024-08-08 00:08:59 +08:00
2024-03-23 00:56:27 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.network_secret").to_string(),
2024-03-23 16:34:48 +08:00
default_value = ""
2024-03-23 00:56:27 +08:00
)]
2024-03-23 16:34:48 +08:00
network_secret: String,
2023-09-23 01:53:45 +00:00
2024-05-05 16:18:05 +08:00
#[arg(
short,
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.ipv4").to_string()
2024-05-05 16:18:05 +08:00
)]
2023-09-23 01:53:45 +00:00
ipv4: Option<String>,
2024-05-17 23:16:56 +08:00
#[arg(
short,
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.dhcp").to_string()
2024-05-17 23:16:56 +08:00
)]
dhcp: bool,
2024-08-08 00:08:59 +08:00
#[arg(
short,
long,
help = t!("core_clap.peers").to_string(),
num_args = 0..
)]
2023-09-23 01:53:45 +00:00
peers: Vec<String>,
2024-03-23 00:56:27 +08:00
2024-08-08 00:08:59 +08:00
#[arg(
short,
long,
help = t!("core_clap.external_node").to_string()
)]
2024-03-23 00:56:27 +08:00
external_node: Option<String>,
#[arg(
short = 'n',
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.proxy_networks").to_string()
2024-03-23 00:56:27 +08:00
)]
proxy_networks: Vec<String>,
#[arg(
short,
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.rpc_portal").to_string(),
default_value = "0"
2024-03-23 00:56:27 +08:00
)]
2024-05-16 20:16:09 +08:00
rpc_portal: String,
2024-08-08 00:08:59 +08:00
#[arg(
short,
long,
help = t!("core_clap.listeners").to_string(),
default_values_t = ["11010".to_string()],
num_args = 0..
)]
2024-03-23 00:56:27 +08:00
listeners: Vec<String>,
2024-05-16 20:16:09 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.no_listener").to_string(),
2024-05-16 20:16:09 +08:00
default_value = "false"
)]
no_listener: bool,
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.console_log_level").to_string()
)]
2024-03-23 00:56:27 +08:00
console_log_level: Option<String>,
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.file_log_level").to_string()
)]
2024-03-23 00:56:27 +08:00
file_log_level: Option<String>,
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.file_log_dir").to_string()
)]
2024-03-23 00:56:27 +08:00
file_log_dir: Option<String>,
2024-03-23 16:34:48 +08:00
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.hostname").to_string()
)]
2024-05-08 14:47:22 +08:00
hostname: Option<String>,
2024-03-23 16:34:48 +08:00
#[arg(
short = 'm',
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.instance_name").to_string(),
default_value = "default"
2024-03-23 16:34:48 +08:00
)]
instance_name: String,
2024-03-30 22:15:14 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.vpn_portal").to_string()
2024-03-30 22:15:14 +08:00
)]
vpn_portal: Option<String>,
2024-03-31 21:10:59 +08:00
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.default_protocol").to_string()
)]
2024-03-31 21:10:59 +08:00
default_protocol: Option<String>,
2024-04-25 23:25:37 +08:00
2024-04-27 13:44:59 +08:00
#[arg(
short = 'u',
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.disable_encryption").to_string(),
2024-04-27 13:44:59 +08:00
default_value = "false"
)]
disable_encryption: bool,
2024-04-25 23:25:37 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.multi_thread").to_string(),
2024-04-25 23:25:37 +08:00
default_value = "false"
)]
multi_thread: bool,
2024-04-27 23:10:28 +08:00
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.disable_ipv6").to_string(),
default_value = "false"
)]
2024-04-27 23:10:28 +08:00
disable_ipv6: bool,
2024-05-07 00:38:05 +08:00
2024-08-08 00:08:59 +08:00
#[arg(
long,
help = t!("core_clap.dev_name").to_string()
)]
2024-07-15 00:03:55 +08:00
dev_name: Option<String>,
2024-07-03 15:41:12 +08:00
2024-05-07 00:38:05 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.mtu").to_string()
2024-05-07 00:38:05 +08:00
)]
mtu: Option<u16>,
2024-05-13 20:34:43 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.latency_first").to_string(),
2024-05-13 20:34:43 +08:00
default_value = "false"
)]
latency_first: bool,
2024-05-18 20:32:42 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.exit_nodes").to_string(),
2024-05-18 20:32:42 +08:00
num_args = 0..
)]
exit_nodes: Vec<Ipv4Addr>,
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.enable_exit_node").to_string(),
2024-05-18 20:32:42 +08:00
default_value = "false"
)]
enable_exit_node: bool,
2024-06-10 10:27:24 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.no_tun").to_string(),
2024-06-10 10:27:24 +08:00
default_value = "false"
)]
no_tun: bool,
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.use_smoltcp").to_string(),
2024-07-07 22:08:50 +08:00
default_value = "false"
2024-06-10 10:27:24 +08:00
)]
use_smoltcp: bool,
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.manual_routes").to_string(),
num_args = 0..
)]
manual_routes: Option<Vec<String>>,
2024-08-03 15:12:54 +08:00
// if not in relay_network_whitelist:
// for foreign virtual network, will refuse the incoming connection
// for local virtual network, will refuse relaying tun packet
2024-08-03 15:12:54 +08:00
#[arg(
long,
2024-08-08 00:08:59 +08:00
help = t!("core_clap.relay_network_whitelist").to_string(),
num_args = 0..
2024-08-03 15:12:54 +08:00
)]
relay_network_whitelist: Option<Vec<String>>,
2024-08-10 00:26:54 +08:00
#[arg(
long,
help = t!("core_clap.disable_p2p").to_string(),
default_value = "false"
)]
disable_p2p: bool,
#[arg(
long,
help = t!("core_clap.disable_udp_hole_punching").to_string(),
default_value = "false"
)]
disable_udp_hole_punching: bool,
2024-08-10 00:26:54 +08:00
#[arg(
long,
help = t!("core_clap.relay_all_peer_rpc").to_string(),
default_value = "false"
)]
relay_all_peer_rpc: bool,
2024-08-14 23:26:15 +08:00
#[cfg(feature = "socks5")]
#[arg(
long,
help = t!("core_clap.socks5").to_string()
)]
socks5: Option<u16>,
2024-09-30 15:56:24 +08:00
#[arg(
long,
help = t!("core_clap.ipv6_listener").to_string()
)]
ipv6_listener: Option<String>,
#[arg(
long,
help = t!("core_clap.compression").to_string(),
default_value = "none",
)]
compression: String,
2023-09-23 01:53:45 +00:00
}
2024-08-20 00:38:59 +08:00
rust_i18n::i18n!("locales", fallback = "en");
2024-08-08 00:08:59 +08:00
2024-05-16 20:16:09 +08:00
impl Cli {
2024-11-16 09:01:58 +08:00
fn parse_listeners(no_listener: bool, listeners: Vec<String>) -> anyhow::Result<Vec<String>> {
2024-05-16 20:16:09 +08:00
let proto_port_offset = vec![("tcp", 0), ("udp", 0), ("wg", 1), ("ws", 1), ("wss", 2)];
if no_listener || listeners.is_empty() {
2024-11-16 09:01:58 +08:00
return Ok(vec![]);
2024-05-16 20:16:09 +08:00
}
let origin_listners = listeners;
2024-05-16 20:16:09 +08:00
let mut listeners: Vec<String> = Vec::new();
if origin_listners.len() == 1 {
if let Ok(port) = origin_listners[0].parse::<u16>() {
for (proto, offset) in proto_port_offset {
listeners.push(format!("{}://0.0.0.0:{}", proto, port + offset));
}
2024-11-16 09:01:58 +08:00
return Ok(listeners);
2024-05-16 20:16:09 +08:00
}
}
for l in &origin_listners {
let proto_port: Vec<&str> = l.split(':').collect();
if proto_port.len() > 2 {
if let Ok(url) = l.parse::<url::Url>() {
listeners.push(url.to_string());
} else {
panic!("failed to parse listener: {}", l);
}
} else {
let Some((proto, offset)) = proto_port_offset
.iter()
.find(|(proto, _)| *proto == proto_port[0])
else {
2024-11-16 09:01:58 +08:00
return Err(anyhow::anyhow!("unknown protocol: {}", proto_port[0]));
2024-05-16 20:16:09 +08:00
};
let port = if proto_port.len() == 2 {
proto_port[1].parse::<u16>().unwrap()
} else {
11010 + offset
};
listeners.push(format!("{}://0.0.0.0:{}", proto, port));
}
}
2024-11-16 09:01:58 +08:00
Ok(listeners)
2024-05-16 20:16:09 +08:00
}
fn check_tcp_available(port: u16) -> Option<SocketAddr> {
2024-08-31 14:37:34 +08:00
let s = format!("0.0.0.0:{}", port).parse::<SocketAddr>().unwrap();
2024-05-16 20:16:09 +08:00
TcpSocket::new_v4().unwrap().bind(s).map(|_| s).ok()
}
2024-11-16 09:01:58 +08:00
fn parse_rpc_portal(rpc_portal: String) -> anyhow::Result<SocketAddr> {
if let Ok(port) = rpc_portal.parse::<u16>() {
2024-05-16 20:16:09 +08:00
if port == 0 {
// check tcp 15888 first
for i in 15888..15900 {
if let Some(s) = Cli::check_tcp_available(i) {
2024-11-16 09:01:58 +08:00
return Ok(s);
2024-05-16 20:16:09 +08:00
}
}
2024-11-16 09:01:58 +08:00
return Ok("0.0.0.0:0".parse().unwrap());
2024-05-16 20:16:09 +08:00
}
2024-11-16 09:01:58 +08:00
return Ok(format!("0.0.0.0:{}", port).parse().unwrap());
2024-05-16 20:16:09 +08:00
}
2024-11-16 09:01:58 +08:00
Ok(rpc_portal.parse()?)
2024-05-16 20:16:09 +08:00
}
}
2024-11-16 09:01:58 +08:00
impl TryFrom<&Cli> for TomlConfigLoader {
type Error = anyhow::Error;
fn try_from(cli: &Cli) -> Result<Self, Self::Error> {
2024-05-07 00:38:05 +08:00
if let Some(config_file) = &cli.config_file {
println!(
"NOTICE: loading config file: {:?}, will ignore all command line flags\n",
config_file
);
2024-11-16 09:01:58 +08:00
return Ok(TomlConfigLoader::new(config_file)
.with_context(|| format!("failed to load config file: {:?}", cli.config_file))?);
2024-05-07 00:38:05 +08:00
}
2024-03-23 00:56:27 +08:00
let cfg = TomlConfigLoader::default();
2024-05-07 00:38:05 +08:00
2024-11-16 09:01:58 +08:00
cfg.set_hostname(cli.hostname.clone());
2024-05-08 14:47:22 +08:00
2024-11-16 09:01:58 +08:00
cfg.set_network_identity(NetworkIdentity::new(
cli.network_name.clone(),
cli.network_secret.clone(),
));
2024-03-23 00:56:27 +08:00
2024-05-17 23:16:56 +08:00
cfg.set_dhcp(cli.dhcp);
2024-08-08 22:03:22 +08:00
if let Some(ipv4) = &cli.ipv4 {
2024-11-16 09:01:58 +08:00
cfg.set_ipv4(Some(ipv4.parse().with_context(|| {
format!("failed to parse ipv4 address: {}", ipv4)
})?))
2024-03-23 00:56:27 +08:00
}
2024-11-16 09:01:58 +08:00
let mut peers = Vec::<PeerConfig>::with_capacity(cli.peers.len());
for p in &cli.peers {
peers.push(PeerConfig {
uri: p
.parse()
.with_context(|| format!("failed to parse peer uri: {}", p))?,
});
}
cfg.set_peers(peers);
2024-03-23 00:56:27 +08:00
cfg.set_listeners(
2024-11-16 09:01:58 +08:00
Cli::parse_listeners(cli.no_listener, cli.listeners.clone())?
2024-05-16 20:16:09 +08:00
.into_iter()
.map(|s| s.parse().unwrap())
2024-03-23 00:56:27 +08:00
.collect(),
);
for n in cli.proxy_networks.iter() {
cfg.add_proxy_cidr(
n.parse()
2024-11-16 09:01:58 +08:00
.with_context(|| format!("failed to parse proxy network: {}", n))?,
2024-03-23 00:56:27 +08:00
);
}
2024-11-16 09:01:58 +08:00
cfg.set_rpc_portal(
Cli::parse_rpc_portal(cli.rpc_portal.clone())
.with_context(|| format!("failed to parse rpc portal: {}", cli.rpc_portal))?,
);
2024-03-23 00:56:27 +08:00
2024-11-16 09:01:58 +08:00
if let Some(external_nodes) = cli.external_node.as_ref() {
2024-03-23 00:56:27 +08:00
let mut old_peers = cfg.get_peers();
old_peers.push(PeerConfig {
2024-11-16 09:01:58 +08:00
uri: external_nodes.parse().with_context(|| {
format!("failed to parse external node uri: {}", external_nodes)
})?,
2024-03-23 00:56:27 +08:00
});
cfg.set_peers(old_peers);
}
if cli.console_log_level.is_some() {
cfg.set_console_logger_config(ConsoleLoggerConfig {
2024-11-16 09:01:58 +08:00
level: cli.console_log_level.clone(),
2024-03-23 00:56:27 +08:00
});
}
if cli.file_log_dir.is_some() || cli.file_log_level.is_some() {
cfg.set_file_logger_config(FileLoggerConfig {
level: cli.file_log_level.clone(),
dir: cli.file_log_dir.clone(),
file: Some(format!("easytier-{}", cli.instance_name)),
});
}
2024-11-16 09:01:58 +08:00
cfg.set_inst_name(cli.instance_name.clone());
2024-11-16 09:01:58 +08:00
if let Some(vpn_portal) = cli.vpn_portal.as_ref() {
let url: url::Url = vpn_portal
2024-03-30 22:15:14 +08:00
.parse()
2024-11-16 09:01:58 +08:00
.with_context(|| format!("failed to parse vpn portal url: {}", vpn_portal))?;
let host = url
.host_str()
.ok_or_else(|| anyhow::anyhow!("vpn portal url missing host"))?;
let port = url
.port()
.ok_or_else(|| anyhow::anyhow!("vpn portal url missing port"))?;
let client_cidr = url.path()[1..].parse().with_context(|| {
format!("failed to parse vpn portal client cidr: {}", url.path())
})?;
let wireguard_listen: SocketAddr = format!("{}:{}", host, port).parse().unwrap();
2024-03-30 22:15:14 +08:00
cfg.set_vpn_portal_config(VpnPortalConfig {
2024-11-16 09:01:58 +08:00
wireguard_listen,
client_cidr,
2024-03-30 22:15:14 +08:00
});
}
2024-11-16 09:01:58 +08:00
if let Some(manual_routes) = cli.manual_routes.as_ref() {
let mut routes = Vec::<cidr::Ipv4Cidr>::with_capacity(manual_routes.len());
for r in manual_routes {
routes.push(
r.parse()
.with_context(|| format!("failed to parse route: {}", r))?,
);
}
cfg.set_routes(Some(routes));
}
2024-08-14 23:26:15 +08:00
#[cfg(feature = "socks5")]
if let Some(socks5_proxy) = cli.socks5 {
cfg.set_socks5_portal(Some(
format!("socks5://0.0.0.0:{}", socks5_proxy)
.parse()
.unwrap(),
));
}
2024-04-27 13:44:59 +08:00
let mut f = cfg.get_flags();
2024-03-31 21:10:59 +08:00
if cli.default_protocol.is_some() {
f.default_protocol = cli.default_protocol.as_ref().unwrap().clone();
}
2024-04-27 13:44:59 +08:00
f.enable_encryption = !cli.disable_encryption;
2024-04-27 23:10:28 +08:00
f.enable_ipv6 = !cli.disable_ipv6;
2024-05-13 20:34:43 +08:00
f.latency_first = cli.latency_first;
2024-11-16 09:01:58 +08:00
f.dev_name = cli.dev_name.clone().unwrap_or_default();
2024-05-07 00:38:05 +08:00
if let Some(mtu) = cli.mtu {
2024-11-08 23:33:17 +08:00
f.mtu = mtu as u32;
2024-05-07 00:38:05 +08:00
}
2024-05-18 20:32:42 +08:00
f.enable_exit_node = cli.enable_exit_node;
2024-06-11 09:09:32 +08:00
f.no_tun = cli.no_tun || cfg!(not(feature = "tun"));
2024-06-10 10:27:24 +08:00
f.use_smoltcp = cli.use_smoltcp;
2024-11-16 09:01:58 +08:00
if let Some(wl) = cli.relay_network_whitelist.as_ref() {
f.relay_network_whitelist = wl.join(" ");
2024-08-03 15:12:54 +08:00
}
2024-08-10 00:26:54 +08:00
f.disable_p2p = cli.disable_p2p;
f.relay_all_peer_rpc = cli.relay_all_peer_rpc;
2024-11-16 09:01:58 +08:00
if let Some(ipv6_listener) = cli.ipv6_listener.as_ref() {
2024-09-30 15:56:24 +08:00
f.ipv6_listener = ipv6_listener
.parse()
2024-11-16 09:01:58 +08:00
.with_context(|| format!("failed to parse ipv6 listener: {}", ipv6_listener))?
2024-09-30 15:56:24 +08:00
}
2024-10-19 18:10:02 +08:00
f.multi_thread = cli.multi_thread;
f.data_compress_algo = match cli.compression.as_str() {
"none" => CompressionAlgoPb::None,
"zstd" => CompressionAlgoPb::Zstd,
_ => panic!(
"unknown compression algorithm: {}, supported: none, zstd",
cli.compression
),
}
.into();
2024-04-27 13:44:59 +08:00
cfg.set_flags(f);
2024-03-31 21:10:59 +08:00
2024-05-18 20:32:42 +08:00
cfg.set_exit_nodes(cli.exit_nodes.clone());
2024-11-16 09:01:58 +08:00
Ok(cfg)
2024-03-23 00:56:27 +08:00
}
}
fn print_event(msg: String) {
println!(
"{}: {}",
chrono::Local::now().format("%Y-%m-%d %H:%M:%S"),
msg
);
}
2024-10-24 16:21:35 +08:00
fn peer_conn_info_to_string(p: proto::cli::PeerConnInfo) -> String {
2024-03-23 00:56:27 +08:00
format!(
"my_peer_id: {}, dst_peer_id: {}, tunnel_info: {:?}",
p.my_peer_id, p.peer_id, p.tunnel
)
}
2023-09-23 01:53:45 +00:00
#[tracing::instrument]
2024-10-19 18:10:02 +08:00
pub fn handle_event(mut events: EventBusSubscriber) -> tokio::task::JoinHandle<()> {
2023-09-23 01:53:45 +00:00
tokio::spawn(async move {
while let Ok(e) = events.recv().await {
2024-03-23 00:56:27 +08:00
match e {
GlobalCtxEvent::PeerAdded(p) => {
print_event(format!("new peer added. peer_id: {}", p));
}
GlobalCtxEvent::PeerRemoved(p) => {
print_event(format!("peer removed. peer_id: {}", p));
}
GlobalCtxEvent::PeerConnAdded(p) => {
print_event(format!(
"new peer connection added. conn_info: {}",
peer_conn_info_to_string(p)
));
}
GlobalCtxEvent::PeerConnRemoved(p) => {
print_event(format!(
"peer connection removed. conn_info: {}",
peer_conn_info_to_string(p)
));
}
2024-05-11 22:49:48 +08:00
GlobalCtxEvent::ListenerAddFailed(p, msg) => {
print_event(format!(
"listener add failed. listener: {}, msg: {}",
p, msg
));
}
2024-08-03 12:40:08 +08:00
GlobalCtxEvent::ListenerAcceptFailed(p, msg) => {
print_event(format!(
"listener accept failed. listener: {}, msg: {}",
p, msg
));
}
2024-03-23 00:56:27 +08:00
GlobalCtxEvent::ListenerAdded(p) => {
if p.scheme() == "ring" {
continue;
}
print_event(format!("new listener added. listener: {}", p));
}
GlobalCtxEvent::ConnectionAccepted(local, remote) => {
print_event(format!(
"new connection accepted. local: {}, remote: {}",
local, remote
));
}
GlobalCtxEvent::ConnectionError(local, remote, err) => {
print_event(format!(
"connection error. local: {}, remote: {}, err: {}",
local, remote, err
));
}
GlobalCtxEvent::TunDeviceReady(dev) => {
print_event(format!("tun device ready. dev: {}", dev));
}
GlobalCtxEvent::TunDeviceError(err) => {
print_event(format!("tun device error. err: {}", err));
}
2024-03-23 00:56:27 +08:00
GlobalCtxEvent::Connecting(dst) => {
print_event(format!("connecting to peer. dst: {}", dst));
}
2024-05-05 16:18:05 +08:00
GlobalCtxEvent::ConnectError(dst, ip_version, err) => {
print_event(format!(
"connect to peer error. dst: {}, ip_version: {}, err: {}",
dst, ip_version, err
));
2024-03-23 00:56:27 +08:00
}
2024-03-30 22:15:14 +08:00
GlobalCtxEvent::VpnPortalClientConnected(portal, client_addr) => {
print_event(format!(
"vpn portal client connected. portal: {}, client_addr: {}",
portal, client_addr
));
}
GlobalCtxEvent::VpnPortalClientDisconnected(portal, client_addr) => {
print_event(format!(
"vpn portal client disconnected. portal: {}, client_addr: {}",
portal, client_addr
));
}
2024-05-17 23:16:56 +08:00
GlobalCtxEvent::DhcpIpv4Changed(old, new) => {
print_event(format!("dhcp ip changed. old: {:?}, new: {:?}", old, new));
}
GlobalCtxEvent::DhcpIpv4Conflicted(ip) => {
print_event(format!("dhcp ip conflict. ip: {:?}", ip));
}
2024-03-23 00:56:27 +08:00
}
2023-09-23 01:53:45 +00:00
}
2024-10-19 18:10:02 +08:00
})
2023-09-23 01:53:45 +00:00
}
2024-04-25 23:25:37 +08:00
2024-11-16 09:01:58 +08:00
#[cfg(target_os = "windows")]
fn win_service_set_work_dir(service_name: &std::ffi::OsString) -> anyhow::Result<()> {
use easytier::common::constants::WIN_SERVICE_WORK_DIR_REG_KEY;
use winreg::enums::*;
use winreg::RegKey;
let hklm = RegKey::predef(HKEY_LOCAL_MACHINE);
let key = hklm.open_subkey_with_flags(WIN_SERVICE_WORK_DIR_REG_KEY, KEY_READ)?;
let dir_pat_str = key.get_value::<std::ffi::OsString, _>(service_name)?;
let dir_path = std::fs::canonicalize(dir_pat_str)?;
std::env::set_current_dir(dir_path)?;
Ok(())
}
#[cfg(target_os = "windows")]
2024-11-08 23:33:17 +08:00
fn win_service_event_loop(
stop_notify: std::sync::Arc<tokio::sync::Notify>,
2024-11-16 09:01:58 +08:00
cli: Cli,
2024-11-08 23:33:17 +08:00
status_handle: windows_service::service_control_handler::ServiceStatusHandle,
) {
use std::time::Duration;
2024-11-08 23:33:17 +08:00
use tokio::runtime::Runtime;
use windows_service::service::*;
2024-11-16 09:01:58 +08:00
let normal_status = ServiceStatus {
service_type: ServiceType::OWN_PROCESS,
current_state: ServiceState::Running,
controls_accepted: ServiceControlAccept::STOP,
exit_code: ServiceExitCode::Win32(0),
checkpoint: 0,
wait_hint: Duration::default(),
process_id: None,
};
let error_status = ServiceStatus {
service_type: ServiceType::OWN_PROCESS,
current_state: ServiceState::Stopped,
controls_accepted: ServiceControlAccept::empty(),
exit_code: ServiceExitCode::ServiceSpecific(1u32),
checkpoint: 0,
wait_hint: Duration::default(),
process_id: None,
};
std::thread::spawn(move || {
let rt = Runtime::new().unwrap();
rt.block_on(async move {
tokio::select! {
2024-11-16 09:01:58 +08:00
res = run_main(cli) => {
match res {
Ok(_) => {
status_handle.set_service_status(normal_status).unwrap();
std::process::exit(0);
}
Err(e) => {
status_handle.set_service_status(error_status).unwrap();
eprintln!("error: {}", e);
}
}
},
_ = stop_notify.notified() => {
2024-11-16 09:01:58 +08:00
_ = status_handle.set_service_status(normal_status);
std::process::exit(0);
}
}
});
});
}
#[cfg(target_os = "windows")]
2024-11-16 09:01:58 +08:00
fn win_service_main(arg: Vec<std::ffi::OsString>) {
use std::sync::Arc;
2024-11-08 23:33:17 +08:00
use std::time::Duration;
use tokio::sync::Notify;
2024-11-08 23:33:17 +08:00
use windows_service::service::*;
use windows_service::service_control_handler::*;
2024-11-16 09:01:58 +08:00
_ = win_service_set_work_dir(&arg[0]);
2024-11-16 09:01:58 +08:00
let cli = Cli::parse();
let stop_notify_send = Arc::new(Notify::new());
let stop_notify_recv = Arc::clone(&stop_notify_send);
let event_handler = move |control_event| -> ServiceControlHandlerResult {
match control_event {
2024-11-08 23:33:17 +08:00
ServiceControl::Interrogate => ServiceControlHandlerResult::NoError,
ServiceControl::Stop => {
stop_notify_send.notify_one();
ServiceControlHandlerResult::NoError
}
_ => ServiceControlHandlerResult::NotImplemented,
}
};
let status_handle = register(String::new(), event_handler).expect("register service fail");
let next_status = ServiceStatus {
service_type: ServiceType::OWN_PROCESS,
current_state: ServiceState::Running,
controls_accepted: ServiceControlAccept::STOP,
exit_code: ServiceExitCode::Win32(0),
checkpoint: 0,
wait_hint: Duration::default(),
process_id: None,
};
2024-11-08 23:33:17 +08:00
status_handle
.set_service_status(next_status)
.expect("set service status fail");
2024-08-08 00:08:59 +08:00
2024-11-16 09:01:58 +08:00
win_service_event_loop(stop_notify_recv, cli, status_handle);
}
2024-10-26 00:04:22 +08:00
2024-11-16 09:01:58 +08:00
async fn run_main(cli: Cli) -> anyhow::Result<()> {
let cfg = TomlConfigLoader::try_from(&cli)?;
init_logger(&cfg, false)?;
2024-10-26 00:04:22 +08:00
if cli.config_server.is_some() {
let config_server_url_s = cli.config_server.clone().unwrap();
let config_server_url = match url::Url::parse(&config_server_url_s) {
Ok(u) => u,
2024-12-20 00:21:22 +08:00
Err(_) => format!(
"udp://config-server.easytier.cn:22020/{}",
config_server_url_s
)
.parse()
.unwrap(),
2024-10-26 00:04:22 +08:00
};
let mut c_url = config_server_url.clone();
c_url.set_path("");
let token = config_server_url
.path_segments()
.and_then(|mut x| x.next())
.map(|x| x.to_string())
.unwrap_or_default();
println!(
"Entering config client mode...\n server: {}\n token: {}",
c_url, token,
);
2024-12-20 00:21:22 +08:00
println!("Official config website: https://easytier.cn/web");
2024-10-26 00:04:22 +08:00
if token.is_empty() {
panic!("empty token");
}
let _wc = web_client::WebClient::new(UdpTunnelConnector::new(c_url), token.to_string());
tokio::signal::ctrl_c().await.unwrap();
2024-11-16 09:01:58 +08:00
return Ok(());
2024-10-26 00:04:22 +08:00
}
2024-10-19 18:10:02 +08:00
println!("Starting easytier with config:");
println!("############### TOML ###############\n");
println!("{}", cfg.dump());
println!("-----------------------------------");
let mut l = launcher::NetworkInstance::new(cfg).set_fetch_node_info(false);
let _t = ScopedTask::from(handle_event(l.start().unwrap()));
if let Some(e) = l.wait().await {
2024-11-16 09:01:58 +08:00
anyhow::bail!("launcher error: {}", e);
}
Ok(())
}
#[tokio::main]
async fn main() {
let locale = sys_locale::get_locale().unwrap_or_else(|| String::from("en-US"));
rust_i18n::set_locale(&locale);
setup_panic_handler();
#[cfg(target_os = "windows")]
match windows_service::service_dispatcher::start(String::new(), ffi_service_main) {
Ok(_) => std::thread::park(),
Err(e) => {
let should_panic = if let windows_service::Error::Winapi(ref io_error) = e {
io_error.raw_os_error() != Some(0x427) // ERROR_FAILED_SERVICE_CONTROLLER_CONNECT
} else {
true
};
if should_panic {
panic!("SCM start an error: {}", e);
}
}
};
let cli = Cli::parse();
if let Err(e) = run_main(cli).await {
eprintln!("error: {:?}", e);
std::process::exit(1);
2024-04-25 23:25:37 +08:00
}
}