Compare commits

..

1 Commits

Author SHA1 Message Date
Ferdinand Schober
1c69d4d209 macos: fix scroll capture 2025-11-03 17:19:15 +01:00
16 changed files with 32 additions and 211 deletions

View File

@@ -7,7 +7,7 @@ jobs:
matrix: matrix:
os: os:
- ubuntu-latest - ubuntu-latest
- macos-15-intel - macos-13
- macos-14 - macos-14
name: "Build" name: "Build"
runs-on: ${{ matrix.os }} runs-on: ${{ matrix.os }}
@@ -31,7 +31,7 @@ jobs:
run: nix build --print-build-logs --show-trace .#packages.x86_64-linux.lan-mouse run: nix build --print-build-logs --show-trace .#packages.x86_64-linux.lan-mouse
- name: Build lan-mouse (x86_64-darwin) - name: Build lan-mouse (x86_64-darwin)
if: matrix.os == 'macos-15-intel' if: matrix.os == 'macos-13'
run: nix build --print-build-logs --show-trace .#packages.x86_64-darwin.lan-mouse run: nix build --print-build-logs --show-trace .#packages.x86_64-darwin.lan-mouse
- name: Build lan-mouse (aarch64-darwin) - name: Build lan-mouse (aarch64-darwin)

View File

@@ -80,7 +80,7 @@ jobs:
path: lan-mouse-windows.zip path: lan-mouse-windows.zip
macos-release-build: macos-release-build:
runs-on: macos-15-intel runs-on: macos-13
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v4
- name: install dependencies - name: install dependencies

View File

@@ -94,7 +94,7 @@ jobs:
target/debug/*.dll target/debug/*.dll
build-macos: build-macos:
runs-on: macos-15-intel runs-on: macos-13
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v4
- name: install dependencies - name: install dependencies

View File

@@ -76,7 +76,7 @@ jobs:
path: lan-mouse-windows.zip path: lan-mouse-windows.zip
macos-release-build: macos-release-build:
runs-on: macos-15-intel runs-on: macos-13
steps: steps:
- uses: actions/checkout@v4 - uses: actions/checkout@v4
- name: install dependencies - name: install dependencies

1
Cargo.lock generated
View File

@@ -1872,7 +1872,6 @@ dependencies = [
"tokio", "tokio",
"tokio-util", "tokio-util",
"toml", "toml",
"toml_edit",
"webrtc-dtls", "webrtc-dtls",
"webrtc-util", "webrtc-util",
] ]

View File

@@ -38,7 +38,6 @@ shadow-rs = { version = "1.2.0", features = ["metadata"] }
hickory-resolver = "0.25.2" hickory-resolver = "0.25.2"
toml = "0.8" toml = "0.8"
toml_edit = { version = "0.22", features = ["serde"] }
serde = { version = "1.0", features = ["derive"] } serde = { version = "1.0", features = ["derive"] }
log = "0.4.20" log = "0.4.20"
env_logger = "0.11.3" env_logger = "0.11.3"

View File

@@ -321,9 +321,6 @@ To do so, use the `daemon` subcommand:
```sh ```sh
lan-mouse daemon lan-mouse daemon
``` ```
</details>
## Systemd Service
In order to start lan-mouse with a graphical session automatically, In order to start lan-mouse with a graphical session automatically,
the [systemd-service](service/lan-mouse.service) can be used: the [systemd-service](service/lan-mouse.service) can be used:
@@ -335,9 +332,7 @@ cp service/lan-mouse.service ~/.config/systemd/user
systemctl --user daemon-reload systemctl --user daemon-reload
systemctl --user enable --now lan-mouse.service systemctl --user enable --now lan-mouse.service
``` ```
> [!Important] </details>
> Make sure to point `ExecStart=/usr/bin/lan-mouse daemon` to the actual `lan-mouse` binary (in case it is not under `/usr/bin`, e.g. when installed manually.
## Configuration ## Configuration
To automatically load clients on startup, the file `$XDG_CONFIG_HOME/lan-mouse/config.toml` is parsed. To automatically load clients on startup, the file `$XDG_CONFIG_HOME/lan-mouse/config.toml` is parsed.

View File

@@ -453,10 +453,8 @@ fn create_event_tap<'a>(
// Returning Drop should stop the event from being processed // Returning Drop should stop the event from being processed
// but core fundation still returns the event // but core fundation still returns the event
cg_ev.set_type(CGEventType::Null); cg_ev.set_type(CGEventType::Null);
CallbackResult::Drop
} else {
CallbackResult::Keep
} }
CallbackResult::Replace(cg_ev.to_owned())
}; };
let tap = CGEventTap::new( let tap = CGEventTap::new(

View File

@@ -71,8 +71,6 @@ enum CliSubcommand {
}, },
/// deauthorize a public key /// deauthorize a public key
RemoveAuthorizedKey { sha256_fingerprint: String }, RemoveAuthorizedKey { sha256_fingerprint: String },
/// save configuration to file
SaveConfig,
} }
pub async fn run(args: CliArgs) -> Result<(), CliError> { pub async fn run(args: CliArgs) -> Result<(), CliError> {
@@ -164,7 +162,6 @@ async fn execute(cmd: CliSubcommand) -> Result<(), CliError> {
tx.request(FrontendRequest::RemoveAuthorizedKey(sha256_fingerprint)) tx.request(FrontendRequest::RemoveAuthorizedKey(sha256_fingerprint))
.await? .await?
} }
CliSubcommand::SaveConfig => tx.request(FrontendRequest::SaveConfiguration).await?,
} }
Ok(()) Ok(())
} }

View File

@@ -253,8 +253,6 @@ pub enum FrontendRequest {
RemoveAuthorizedKey(String), RemoveAuthorizedKey(String),
/// change the hook command /// change the hook command
UpdateEnterHook(u64, Option<String>), UpdateEnterHook(u64, Option<String>),
/// save config file
SaveConfiguration,
} }
#[derive(Clone, Copy, PartialEq, Eq, Debug, Default, Serialize, Deserialize)] #[derive(Clone, Copy, PartialEq, Eq, Debug, Default, Serialize, Deserialize)]

View File

@@ -1,18 +1,18 @@
# Nix Flake Usage # Nix Flake Usage
## Run ## run
```bash ```bash
nix run github:feschber/lan-mouse nix run github:feschber/lan-mouse
# With params # with params
nix run github:feschber/lan-mouse -- --help nix run github:feschber/lan-mouse -- --help
``` ```
## Home-manager module ## home-manager module
Add input: add input
```nix ```nix
inputs = { inputs = {
@@ -20,27 +20,14 @@ inputs = {
} }
``` ```
Optional: add [our binary cache](https://app.cachix.org/cache/lan-mouse) to allow a faster package install. enable lan-mouse
```nix
nixConfig = {
extra-substituters = [
"https://lan-mouse.cachix.org/"
];
extra-trusted-public-keys = [
"lan-mouse.cachix.org-1:KlE2AEZUgkzNKM7BIzMQo8w9yJYqUpor1CAUNRY6OyM="
];
};
```
Enable lan-mouse:
``` nix ``` nix
{ {
inputs, inputs,
... ...
}: { }: {
# Add the Home Manager module # add the home manager module
imports = [inputs.lan-mouse.homeManagerModules.default]; imports = [inputs.lan-mouse.homeManagerModules.default];
programs.lan-mouse = { programs.lan-mouse = {

View File

@@ -362,13 +362,7 @@ impl CaptureTask {
} }
async fn release_capture(&mut self, capture: &mut InputCapture) -> Result<(), CaptureError> { async fn release_capture(&mut self, capture: &mut InputCapture) -> Result<(), CaptureError> {
// If we have an active client, notify them we're leaving self.active_client.take();
if let Some(handle) = self.active_client.take() {
log::info!("sending Leave event to client {handle}");
if let Err(e) = self.conn.send(ProtoEvent::Leave(0), handle).await {
log::warn!("failed to send Leave to client {handle}: {e}");
}
}
capture.release().await capture.release().await
} }
} }

View File

@@ -15,15 +15,6 @@ pub struct ClientManager {
} }
impl ClientManager { impl ClientManager {
/// get all clients
pub fn clients(&self) -> Vec<(ClientConfig, ClientState)> {
self.clients
.borrow()
.iter()
.map(|(_, c)| c.clone())
.collect::<Vec<_>>()
}
/// add a new client to this manager /// add a new client to this manager
pub fn add_client(&self) -> ClientHandle { pub fn add_client(&self) -> ClientHandle {
self.clients.borrow_mut().insert(Default::default()) as ClientHandle self.clients.borrow_mut().insert(Default::default()) as ClientHandle

View File

@@ -11,7 +11,6 @@ use std::path::{Path, PathBuf};
use std::{collections::HashSet, io}; use std::{collections::HashSet, io};
use thiserror::Error; use thiserror::Error;
use toml; use toml;
use toml_edit::{self, DocumentMut};
use lan_mouse_cli::CliArgs; use lan_mouse_cli::CliArgs;
use lan_mouse_ipc::{DEFAULT_PORT, Position}; use lan_mouse_ipc::{DEFAULT_PORT, Position};
@@ -45,7 +44,7 @@ fn default_path() -> Result<PathBuf, VarError> {
Ok(PathBuf::from(default_path)) Ok(PathBuf::from(default_path))
} }
#[derive(Serialize, Deserialize, Clone, Debug, Default)] #[derive(Serialize, Deserialize, Debug)]
struct ConfigToml { struct ConfigToml {
capture_backend: Option<CaptureBackend>, capture_backend: Option<CaptureBackend>,
emulation_backend: Option<EmulationBackend>, emulation_backend: Option<EmulationBackend>,
@@ -275,33 +274,6 @@ impl From<TomlClient> for ConfigClient {
} }
} }
impl From<ConfigClient> for TomlClient {
fn from(client: ConfigClient) -> Self {
let hostname = client.hostname;
let host_name = None;
let mut ips = client.ips.into_iter().collect::<Vec<_>>();
ips.sort();
let ips = Some(ips);
let port = if client.port == DEFAULT_PORT {
None
} else {
Some(client.port)
};
let position = Some(client.pos);
let activate_on_startup = if client.active { Some(true) } else { None };
let enter_hook = client.enter_hook;
Self {
hostname,
host_name,
ips,
port,
position,
activate_on_startup,
enter_hook,
}
}
}
#[derive(Debug, Error)] #[derive(Debug, Error)]
pub enum ConfigError { pub enum ConfigError {
#[error(transparent)] #[error(transparent)]
@@ -412,57 +384,4 @@ impl Config {
.and_then(|c| c.release_bind.clone()) .and_then(|c| c.release_bind.clone())
.unwrap_or(Vec::from_iter(DEFAULT_RELEASE_KEYS.iter().cloned())) .unwrap_or(Vec::from_iter(DEFAULT_RELEASE_KEYS.iter().cloned()))
} }
/// set configured clients
pub fn set_clients(&mut self, clients: Vec<ConfigClient>) {
if clients.is_empty() {
return;
}
if self.config_toml.is_none() {
self.config_toml = Default::default();
}
self.config_toml.as_mut().expect("config").clients =
Some(clients.into_iter().map(|c| c.into()).collect::<Vec<_>>());
}
/// set authorized keys
pub fn set_authorized_keys(&mut self, fingerprints: HashMap<String, String>) {
if fingerprints.is_empty() {
return;
}
if self.config_toml.is_none() {
self.config_toml = Default::default();
}
self.config_toml
.as_mut()
.expect("config")
.authorized_fingerprints = Some(fingerprints);
}
pub fn write_back(&self) -> Result<(), io::Error> {
log::info!("writing config to {:?}", &self.config_path);
/* load the current configuration file */
let current_config = fs::read_to_string(&self.config_path)?;
let current_config = current_config.parse::<DocumentMut>().expect("fix me");
let _current_config =
toml_edit::de::from_document::<ConfigToml>(current_config).expect("fixme");
/* the new config */
let new_config = self.config_toml.clone().unwrap_or_default();
// let new_config = toml_edit::ser::to_document::<ConfigToml>(&new_config).expect("fixme");
let new_config = toml_edit::ser::to_string_pretty(&new_config).expect("config");
/*
* TODO merge documents => eventually we might want to split this up into clients configured
* via the config file and clients managed through the GUI / frontend.
* The latter should be saved to $XDG_DATA_HOME instead of $XDG_CONFIG_HOME,
* and clients configured through .config could be made permanent.
* For now we just override the config file.
*/
/* write new config to file */
fs::write(&self.config_path, new_config)?;
Ok(())
}
} }

View File

@@ -223,18 +223,14 @@ async fn ping_pong(
) { ) {
loop { loop {
let (buf, len) = ProtoEvent::Ping.into(); let (buf, len) = ProtoEvent::Ping.into();
if let Err(e) = conn.send(&buf[..len]).await {
// send 4 pings, at least one must be answered log::warn!("{addr}: send error `{e}`, closing connection");
for _ in 0..4 { let _ = conn.close().await;
if let Err(e) = conn.send(&buf[..len]).await { break;
log::warn!("{addr}: send error `{e}`, closing connection");
let _ = conn.close().await;
break;
}
log::trace!("PING >->->->->- {addr}");
tokio::time::sleep(Duration::from_millis(500)).await;
} }
log::trace!("PING >->->->->- {addr}");
tokio::time::sleep(Duration::from_millis(500)).await;
if !ping_response.borrow_mut().remove(&addr) { if !ping_response.borrow_mut().remove(&addr) {
log::warn!("{addr} did not respond, closing connection"); log::warn!("{addr} did not respond, closing connection");

View File

@@ -1,7 +1,7 @@
use crate::{ use crate::{
capture::{Capture, CaptureType, ICaptureEvent}, capture::{Capture, CaptureType, ICaptureEvent},
client::ClientManager, client::ClientManager,
config::{Config, ConfigClient}, config::Config,
connect::LanMouseConnection, connect::LanMouseConnection,
crypto, crypto,
dns::{DnsEvent, DnsResolver}, dns::{DnsEvent, DnsResolver},
@@ -39,8 +39,6 @@ pub enum ServiceError {
} }
pub struct Service { pub struct Service {
/// configuration
config: Config,
/// input capture /// input capture
capture: Capture, capture: Capture,
/// input emulation /// input emulation
@@ -124,7 +122,6 @@ impl Service {
let port = config.port(); let port = config.port();
let service = Self { let service = Self {
config,
capture, capture,
emulation, emulation,
frontend_listener, frontend_listener,
@@ -185,73 +182,24 @@ impl Service {
Err(e) => return log::error!("error receiving request: {e}"), Err(e) => return log::error!("error receiving request: {e}"),
}; };
match request { match request {
FrontendRequest::Activate(handle, active) => { FrontendRequest::Activate(handle, active) => self.set_client_active(handle, active),
self.set_client_active(handle, active); FrontendRequest::AuthorizeKey(desc, fp) => self.add_authorized_key(desc, fp),
self.save_config();
}
FrontendRequest::AuthorizeKey(desc, fp) => {
self.add_authorized_key(desc, fp);
self.save_config();
}
FrontendRequest::ChangePort(port) => self.change_port(port), FrontendRequest::ChangePort(port) => self.change_port(port),
FrontendRequest::Create => { FrontendRequest::Create => self.add_client(),
self.add_client(); FrontendRequest::Delete(handle) => self.remove_client(handle),
self.save_config();
}
FrontendRequest::Delete(handle) => {
self.remove_client(handle);
self.save_config();
}
FrontendRequest::EnableCapture => self.capture.reenable(), FrontendRequest::EnableCapture => self.capture.reenable(),
FrontendRequest::EnableEmulation => self.emulation.reenable(), FrontendRequest::EnableEmulation => self.emulation.reenable(),
FrontendRequest::Enumerate() => self.enumerate(), FrontendRequest::Enumerate() => self.enumerate(),
FrontendRequest::UpdateFixIps(handle, fix_ips) => { FrontendRequest::UpdateFixIps(handle, fix_ips) => self.update_fix_ips(handle, fix_ips),
self.update_fix_ips(handle, fix_ips); FrontendRequest::UpdateHostname(handle, host) => self.update_hostname(handle, host),
self.save_config(); FrontendRequest::UpdatePort(handle, port) => self.update_port(handle, port),
} FrontendRequest::UpdatePosition(handle, pos) => self.update_pos(handle, pos),
FrontendRequest::UpdateHostname(handle, host) => {
self.update_hostname(handle, host);
self.save_config();
}
FrontendRequest::UpdatePort(handle, port) => {
self.update_port(handle, port);
self.save_config();
}
FrontendRequest::UpdatePosition(handle, pos) => {
self.update_pos(handle, pos);
self.save_config();
}
FrontendRequest::ResolveDns(handle) => self.resolve(handle), FrontendRequest::ResolveDns(handle) => self.resolve(handle),
FrontendRequest::Sync => self.sync_frontend(), FrontendRequest::Sync => self.sync_frontend(),
FrontendRequest::RemoveAuthorizedKey(key) => { FrontendRequest::RemoveAuthorizedKey(key) => self.remove_authorized_key(key),
self.remove_authorized_key(key);
self.save_config();
}
FrontendRequest::UpdateEnterHook(handle, enter_hook) => { FrontendRequest::UpdateEnterHook(handle, enter_hook) => {
self.update_enter_hook(handle, enter_hook) self.update_enter_hook(handle, enter_hook)
} }
FrontendRequest::SaveConfiguration => self.save_config(),
}
}
fn save_config(&mut self) {
let clients = self.client_manager.clients();
let clients = clients
.into_iter()
.map(|(c, s)| ConfigClient {
ips: HashSet::from_iter(c.fix_ips),
hostname: c.hostname,
port: c.port,
pos: c.pos,
active: s.active,
enter_hook: c.cmd,
})
.collect();
self.config.set_clients(clients);
let authorized_keys = self.authorized_keys.read().expect("lock").clone();
self.config.set_authorized_keys(authorized_keys);
if let Err(e) = self.config.write_back() {
log::warn!("failed to write config: {e}");
} }
} }