mirror of
https://github.com/feschber/lan-mouse.git
synced 2026-03-07 20:09:59 +03:00
Compare commits
12 Commits
macos-fix-
...
87a078bce6
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
87a078bce6 | ||
|
|
16c7a57b48 | ||
|
|
a29489cd40 | ||
|
|
18bba183ee | ||
|
|
6d16747c19 | ||
|
|
a987f93133 | ||
|
|
0d96948c26 | ||
|
|
7863e8b110 | ||
|
|
708a40d0da | ||
|
|
3922b45bd9 | ||
|
|
640fa995a4 | ||
|
|
bdafaa07e5 |
4
.github/workflows/cachix.yml
vendored
4
.github/workflows/cachix.yml
vendored
@@ -7,7 +7,7 @@ jobs:
|
||||
matrix:
|
||||
os:
|
||||
- ubuntu-latest
|
||||
- macos-13
|
||||
- macos-15-intel
|
||||
- macos-14
|
||||
name: "Build"
|
||||
runs-on: ${{ matrix.os }}
|
||||
@@ -31,7 +31,7 @@ jobs:
|
||||
run: nix build --print-build-logs --show-trace .#packages.x86_64-linux.lan-mouse
|
||||
|
||||
- name: Build lan-mouse (x86_64-darwin)
|
||||
if: matrix.os == 'macos-13'
|
||||
if: matrix.os == 'macos-15-intel'
|
||||
run: nix build --print-build-logs --show-trace .#packages.x86_64-darwin.lan-mouse
|
||||
|
||||
- name: Build lan-mouse (aarch64-darwin)
|
||||
|
||||
2
.github/workflows/pre-release.yml
vendored
2
.github/workflows/pre-release.yml
vendored
@@ -80,7 +80,7 @@ jobs:
|
||||
path: lan-mouse-windows.zip
|
||||
|
||||
macos-release-build:
|
||||
runs-on: macos-13
|
||||
runs-on: macos-15-intel
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: install dependencies
|
||||
|
||||
2
.github/workflows/rust.yml
vendored
2
.github/workflows/rust.yml
vendored
@@ -94,7 +94,7 @@ jobs:
|
||||
target/debug/*.dll
|
||||
|
||||
build-macos:
|
||||
runs-on: macos-13
|
||||
runs-on: macos-15-intel
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: install dependencies
|
||||
|
||||
2
.github/workflows/tagged-release.yml
vendored
2
.github/workflows/tagged-release.yml
vendored
@@ -76,7 +76,7 @@ jobs:
|
||||
path: lan-mouse-windows.zip
|
||||
|
||||
macos-release-build:
|
||||
runs-on: macos-13
|
||||
runs-on: macos-15-intel
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: install dependencies
|
||||
|
||||
1
Cargo.lock
generated
1
Cargo.lock
generated
@@ -1872,6 +1872,7 @@ dependencies = [
|
||||
"tokio",
|
||||
"tokio-util",
|
||||
"toml",
|
||||
"toml_edit",
|
||||
"webrtc-dtls",
|
||||
"webrtc-util",
|
||||
]
|
||||
|
||||
@@ -38,6 +38,7 @@ shadow-rs = { version = "1.2.0", features = ["metadata"] }
|
||||
|
||||
hickory-resolver = "0.25.2"
|
||||
toml = "0.8"
|
||||
toml_edit = { version = "0.22", features = ["serde"] }
|
||||
serde = { version = "1.0", features = ["derive"] }
|
||||
log = "0.4.20"
|
||||
env_logger = "0.11.3"
|
||||
|
||||
@@ -321,6 +321,9 @@ To do so, use the `daemon` subcommand:
|
||||
```sh
|
||||
lan-mouse daemon
|
||||
```
|
||||
</details>
|
||||
|
||||
## Systemd Service
|
||||
|
||||
In order to start lan-mouse with a graphical session automatically,
|
||||
the [systemd-service](service/lan-mouse.service) can be used:
|
||||
@@ -332,7 +335,9 @@ cp service/lan-mouse.service ~/.config/systemd/user
|
||||
systemctl --user daemon-reload
|
||||
systemctl --user enable --now lan-mouse.service
|
||||
```
|
||||
</details>
|
||||
> [!Important]
|
||||
> Make sure to point `ExecStart=/usr/bin/lan-mouse daemon` to the actual `lan-mouse` binary (in case it is not under `/usr/bin`, e.g. when installed manually.
|
||||
|
||||
|
||||
## Configuration
|
||||
To automatically load clients on startup, the file `$XDG_CONFIG_HOME/lan-mouse/config.toml` is parsed.
|
||||
|
||||
@@ -318,21 +318,47 @@ fn get_events(
|
||||
})))
|
||||
}
|
||||
CGEventType::ScrollWheel => {
|
||||
let v = ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_POINT_DELTA_AXIS_1);
|
||||
let h = ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_POINT_DELTA_AXIS_2);
|
||||
if v != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(PointerEvent::Axis {
|
||||
time: 0,
|
||||
axis: 0, // Vertical
|
||||
value: v as f64,
|
||||
})));
|
||||
}
|
||||
if h != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(PointerEvent::Axis {
|
||||
time: 0,
|
||||
axis: 1, // Horizontal
|
||||
value: h as f64,
|
||||
})));
|
||||
if ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_IS_CONTINUOUS) != 0 {
|
||||
let v =
|
||||
ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_POINT_DELTA_AXIS_1);
|
||||
let h =
|
||||
ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_POINT_DELTA_AXIS_2);
|
||||
if v != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(PointerEvent::Axis {
|
||||
time: 0,
|
||||
axis: 0, // Vertical
|
||||
value: v as f64,
|
||||
})));
|
||||
}
|
||||
if h != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(PointerEvent::Axis {
|
||||
time: 0,
|
||||
axis: 1, // Horizontal
|
||||
value: h as f64,
|
||||
})));
|
||||
}
|
||||
} else {
|
||||
// line based scrolling
|
||||
const LINES_PER_STEP: i32 = 3;
|
||||
const V120_STEPS_PER_LINE: i32 = 120 / LINES_PER_STEP;
|
||||
let v = ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_DELTA_AXIS_1);
|
||||
let h = ev.get_integer_value_field(EventField::SCROLL_WHEEL_EVENT_DELTA_AXIS_2);
|
||||
if v != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(
|
||||
PointerEvent::AxisDiscrete120 {
|
||||
axis: 0, // Vertical
|
||||
value: V120_STEPS_PER_LINE * v as i32,
|
||||
},
|
||||
)));
|
||||
}
|
||||
if h != 0 {
|
||||
result.push(CaptureEvent::Input(Event::Pointer(
|
||||
PointerEvent::AxisDiscrete120 {
|
||||
axis: 1, // Horizontal
|
||||
value: V120_STEPS_PER_LINE * h as i32,
|
||||
},
|
||||
)));
|
||||
}
|
||||
}
|
||||
}
|
||||
_ => (),
|
||||
@@ -427,8 +453,10 @@ fn create_event_tap<'a>(
|
||||
// Returning Drop should stop the event from being processed
|
||||
// but core fundation still returns the event
|
||||
cg_ev.set_type(CGEventType::Null);
|
||||
CallbackResult::Drop
|
||||
} else {
|
||||
CallbackResult::Keep
|
||||
}
|
||||
CallbackResult::Replace(cg_ev.to_owned())
|
||||
};
|
||||
|
||||
let tap = CGEventTap::new(
|
||||
|
||||
@@ -71,6 +71,8 @@ enum CliSubcommand {
|
||||
},
|
||||
/// deauthorize a public key
|
||||
RemoveAuthorizedKey { sha256_fingerprint: String },
|
||||
/// save configuration to file
|
||||
SaveConfig,
|
||||
}
|
||||
|
||||
pub async fn run(args: CliArgs) -> Result<(), CliError> {
|
||||
@@ -162,6 +164,7 @@ async fn execute(cmd: CliSubcommand) -> Result<(), CliError> {
|
||||
tx.request(FrontendRequest::RemoveAuthorizedKey(sha256_fingerprint))
|
||||
.await?
|
||||
}
|
||||
CliSubcommand::SaveConfig => tx.request(FrontendRequest::SaveConfiguration).await?,
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
@@ -253,6 +253,8 @@ pub enum FrontendRequest {
|
||||
RemoveAuthorizedKey(String),
|
||||
/// change the hook command
|
||||
UpdateEnterHook(u64, Option<String>),
|
||||
/// save config file
|
||||
SaveConfiguration,
|
||||
}
|
||||
|
||||
#[derive(Clone, Copy, PartialEq, Eq, Debug, Default, Serialize, Deserialize)]
|
||||
|
||||
@@ -1,18 +1,18 @@
|
||||
# Nix Flake Usage
|
||||
|
||||
## run
|
||||
## Run
|
||||
|
||||
```bash
|
||||
nix run github:feschber/lan-mouse
|
||||
|
||||
# with params
|
||||
# With params
|
||||
nix run github:feschber/lan-mouse -- --help
|
||||
|
||||
```
|
||||
|
||||
## home-manager module
|
||||
## Home-manager module
|
||||
|
||||
add input
|
||||
Add input:
|
||||
|
||||
```nix
|
||||
inputs = {
|
||||
@@ -20,14 +20,27 @@ inputs = {
|
||||
}
|
||||
```
|
||||
|
||||
enable lan-mouse
|
||||
Optional: add [our binary cache](https://app.cachix.org/cache/lan-mouse) to allow a faster package install.
|
||||
|
||||
```nix
|
||||
nixConfig = {
|
||||
extra-substituters = [
|
||||
"https://lan-mouse.cachix.org/"
|
||||
];
|
||||
extra-trusted-public-keys = [
|
||||
"lan-mouse.cachix.org-1:KlE2AEZUgkzNKM7BIzMQo8w9yJYqUpor1CAUNRY6OyM="
|
||||
];
|
||||
};
|
||||
```
|
||||
|
||||
Enable lan-mouse:
|
||||
|
||||
``` nix
|
||||
{
|
||||
inputs,
|
||||
...
|
||||
}: {
|
||||
# add the home manager module
|
||||
# Add the Home Manager module
|
||||
imports = [inputs.lan-mouse.homeManagerModules.default];
|
||||
|
||||
programs.lan-mouse = {
|
||||
|
||||
@@ -362,7 +362,13 @@ impl CaptureTask {
|
||||
}
|
||||
|
||||
async fn release_capture(&mut self, capture: &mut InputCapture) -> Result<(), CaptureError> {
|
||||
self.active_client.take();
|
||||
// If we have an active client, notify them we're leaving
|
||||
if let Some(handle) = self.active_client.take() {
|
||||
log::info!("sending Leave event to client {handle}");
|
||||
if let Err(e) = self.conn.send(ProtoEvent::Leave(0), handle).await {
|
||||
log::warn!("failed to send Leave to client {handle}: {e}");
|
||||
}
|
||||
}
|
||||
capture.release().await
|
||||
}
|
||||
}
|
||||
|
||||
@@ -15,6 +15,15 @@ pub struct ClientManager {
|
||||
}
|
||||
|
||||
impl ClientManager {
|
||||
/// get all clients
|
||||
pub fn clients(&self) -> Vec<(ClientConfig, ClientState)> {
|
||||
self.clients
|
||||
.borrow()
|
||||
.iter()
|
||||
.map(|(_, c)| c.clone())
|
||||
.collect::<Vec<_>>()
|
||||
}
|
||||
|
||||
/// add a new client to this manager
|
||||
pub fn add_client(&self) -> ClientHandle {
|
||||
self.clients.borrow_mut().insert(Default::default()) as ClientHandle
|
||||
|
||||
@@ -11,6 +11,7 @@ use std::path::{Path, PathBuf};
|
||||
use std::{collections::HashSet, io};
|
||||
use thiserror::Error;
|
||||
use toml;
|
||||
use toml_edit::{self, DocumentMut};
|
||||
|
||||
use lan_mouse_cli::CliArgs;
|
||||
use lan_mouse_ipc::{DEFAULT_PORT, Position};
|
||||
@@ -44,7 +45,7 @@ fn default_path() -> Result<PathBuf, VarError> {
|
||||
Ok(PathBuf::from(default_path))
|
||||
}
|
||||
|
||||
#[derive(Serialize, Deserialize, Debug)]
|
||||
#[derive(Serialize, Deserialize, Clone, Debug, Default)]
|
||||
struct ConfigToml {
|
||||
capture_backend: Option<CaptureBackend>,
|
||||
emulation_backend: Option<EmulationBackend>,
|
||||
@@ -274,6 +275,33 @@ impl From<TomlClient> for ConfigClient {
|
||||
}
|
||||
}
|
||||
|
||||
impl From<ConfigClient> for TomlClient {
|
||||
fn from(client: ConfigClient) -> Self {
|
||||
let hostname = client.hostname;
|
||||
let host_name = None;
|
||||
let mut ips = client.ips.into_iter().collect::<Vec<_>>();
|
||||
ips.sort();
|
||||
let ips = Some(ips);
|
||||
let port = if client.port == DEFAULT_PORT {
|
||||
None
|
||||
} else {
|
||||
Some(client.port)
|
||||
};
|
||||
let position = Some(client.pos);
|
||||
let activate_on_startup = if client.active { Some(true) } else { None };
|
||||
let enter_hook = client.enter_hook;
|
||||
Self {
|
||||
hostname,
|
||||
host_name,
|
||||
ips,
|
||||
port,
|
||||
position,
|
||||
activate_on_startup,
|
||||
enter_hook,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Debug, Error)]
|
||||
pub enum ConfigError {
|
||||
#[error(transparent)]
|
||||
@@ -384,4 +412,57 @@ impl Config {
|
||||
.and_then(|c| c.release_bind.clone())
|
||||
.unwrap_or(Vec::from_iter(DEFAULT_RELEASE_KEYS.iter().cloned()))
|
||||
}
|
||||
|
||||
/// set configured clients
|
||||
pub fn set_clients(&mut self, clients: Vec<ConfigClient>) {
|
||||
if clients.is_empty() {
|
||||
return;
|
||||
}
|
||||
if self.config_toml.is_none() {
|
||||
self.config_toml = Default::default();
|
||||
}
|
||||
self.config_toml.as_mut().expect("config").clients =
|
||||
Some(clients.into_iter().map(|c| c.into()).collect::<Vec<_>>());
|
||||
}
|
||||
|
||||
/// set authorized keys
|
||||
pub fn set_authorized_keys(&mut self, fingerprints: HashMap<String, String>) {
|
||||
if fingerprints.is_empty() {
|
||||
return;
|
||||
}
|
||||
if self.config_toml.is_none() {
|
||||
self.config_toml = Default::default();
|
||||
}
|
||||
self.config_toml
|
||||
.as_mut()
|
||||
.expect("config")
|
||||
.authorized_fingerprints = Some(fingerprints);
|
||||
}
|
||||
|
||||
pub fn write_back(&self) -> Result<(), io::Error> {
|
||||
log::info!("writing config to {:?}", &self.config_path);
|
||||
/* load the current configuration file */
|
||||
let current_config = fs::read_to_string(&self.config_path)?;
|
||||
let current_config = current_config.parse::<DocumentMut>().expect("fix me");
|
||||
let _current_config =
|
||||
toml_edit::de::from_document::<ConfigToml>(current_config).expect("fixme");
|
||||
|
||||
/* the new config */
|
||||
let new_config = self.config_toml.clone().unwrap_or_default();
|
||||
// let new_config = toml_edit::ser::to_document::<ConfigToml>(&new_config).expect("fixme");
|
||||
let new_config = toml_edit::ser::to_string_pretty(&new_config).expect("config");
|
||||
|
||||
/*
|
||||
* TODO merge documents => eventually we might want to split this up into clients configured
|
||||
* via the config file and clients managed through the GUI / frontend.
|
||||
* The latter should be saved to $XDG_DATA_HOME instead of $XDG_CONFIG_HOME,
|
||||
* and clients configured through .config could be made permanent.
|
||||
* For now we just override the config file.
|
||||
*/
|
||||
|
||||
/* write new config to file */
|
||||
fs::write(&self.config_path, new_config)?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
@@ -223,14 +223,18 @@ async fn ping_pong(
|
||||
) {
|
||||
loop {
|
||||
let (buf, len) = ProtoEvent::Ping.into();
|
||||
if let Err(e) = conn.send(&buf[..len]).await {
|
||||
log::warn!("{addr}: send error `{e}`, closing connection");
|
||||
let _ = conn.close().await;
|
||||
break;
|
||||
}
|
||||
log::trace!("PING >->->->->- {addr}");
|
||||
|
||||
tokio::time::sleep(Duration::from_millis(500)).await;
|
||||
// send 4 pings, at least one must be answered
|
||||
for _ in 0..4 {
|
||||
if let Err(e) = conn.send(&buf[..len]).await {
|
||||
log::warn!("{addr}: send error `{e}`, closing connection");
|
||||
let _ = conn.close().await;
|
||||
break;
|
||||
}
|
||||
log::trace!("PING >->->->->- {addr}");
|
||||
|
||||
tokio::time::sleep(Duration::from_millis(500)).await;
|
||||
}
|
||||
|
||||
if !ping_response.borrow_mut().remove(&addr) {
|
||||
log::warn!("{addr} did not respond, closing connection");
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
use crate::{
|
||||
capture::{Capture, CaptureType, ICaptureEvent},
|
||||
client::ClientManager,
|
||||
config::Config,
|
||||
config::{Config, ConfigClient},
|
||||
connect::LanMouseConnection,
|
||||
crypto,
|
||||
dns::{DnsEvent, DnsResolver},
|
||||
@@ -39,6 +39,8 @@ pub enum ServiceError {
|
||||
}
|
||||
|
||||
pub struct Service {
|
||||
/// configuration
|
||||
config: Config,
|
||||
/// input capture
|
||||
capture: Capture,
|
||||
/// input emulation
|
||||
@@ -122,6 +124,7 @@ impl Service {
|
||||
|
||||
let port = config.port();
|
||||
let service = Self {
|
||||
config,
|
||||
capture,
|
||||
emulation,
|
||||
frontend_listener,
|
||||
@@ -182,24 +185,73 @@ impl Service {
|
||||
Err(e) => return log::error!("error receiving request: {e}"),
|
||||
};
|
||||
match request {
|
||||
FrontendRequest::Activate(handle, active) => self.set_client_active(handle, active),
|
||||
FrontendRequest::AuthorizeKey(desc, fp) => self.add_authorized_key(desc, fp),
|
||||
FrontendRequest::Activate(handle, active) => {
|
||||
self.set_client_active(handle, active);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::AuthorizeKey(desc, fp) => {
|
||||
self.add_authorized_key(desc, fp);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::ChangePort(port) => self.change_port(port),
|
||||
FrontendRequest::Create => self.add_client(),
|
||||
FrontendRequest::Delete(handle) => self.remove_client(handle),
|
||||
FrontendRequest::Create => {
|
||||
self.add_client();
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::Delete(handle) => {
|
||||
self.remove_client(handle);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::EnableCapture => self.capture.reenable(),
|
||||
FrontendRequest::EnableEmulation => self.emulation.reenable(),
|
||||
FrontendRequest::Enumerate() => self.enumerate(),
|
||||
FrontendRequest::UpdateFixIps(handle, fix_ips) => self.update_fix_ips(handle, fix_ips),
|
||||
FrontendRequest::UpdateHostname(handle, host) => self.update_hostname(handle, host),
|
||||
FrontendRequest::UpdatePort(handle, port) => self.update_port(handle, port),
|
||||
FrontendRequest::UpdatePosition(handle, pos) => self.update_pos(handle, pos),
|
||||
FrontendRequest::UpdateFixIps(handle, fix_ips) => {
|
||||
self.update_fix_ips(handle, fix_ips);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::UpdateHostname(handle, host) => {
|
||||
self.update_hostname(handle, host);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::UpdatePort(handle, port) => {
|
||||
self.update_port(handle, port);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::UpdatePosition(handle, pos) => {
|
||||
self.update_pos(handle, pos);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::ResolveDns(handle) => self.resolve(handle),
|
||||
FrontendRequest::Sync => self.sync_frontend(),
|
||||
FrontendRequest::RemoveAuthorizedKey(key) => self.remove_authorized_key(key),
|
||||
FrontendRequest::RemoveAuthorizedKey(key) => {
|
||||
self.remove_authorized_key(key);
|
||||
self.save_config();
|
||||
}
|
||||
FrontendRequest::UpdateEnterHook(handle, enter_hook) => {
|
||||
self.update_enter_hook(handle, enter_hook)
|
||||
}
|
||||
FrontendRequest::SaveConfiguration => self.save_config(),
|
||||
}
|
||||
}
|
||||
|
||||
fn save_config(&mut self) {
|
||||
let clients = self.client_manager.clients();
|
||||
let clients = clients
|
||||
.into_iter()
|
||||
.map(|(c, s)| ConfigClient {
|
||||
ips: HashSet::from_iter(c.fix_ips),
|
||||
hostname: c.hostname,
|
||||
port: c.port,
|
||||
pos: c.pos,
|
||||
active: s.active,
|
||||
enter_hook: c.cmd,
|
||||
})
|
||||
.collect();
|
||||
self.config.set_clients(clients);
|
||||
let authorized_keys = self.authorized_keys.read().expect("lock").clone();
|
||||
self.config.set_authorized_keys(authorized_keys);
|
||||
if let Err(e) = self.config.write_back() {
|
||||
log::warn!("failed to write config: {e}");
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user