mirror of
https://github.com/rustdesk/rustdesk.git
synced 2026-03-07 12:20:03 +03:00
Compare commits
9 Commits
cd7e3e4505
...
port-forwa
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a563976239 | ||
|
|
3b225b7c6c | ||
|
|
fc80106a8b | ||
|
|
24deed80f5 | ||
|
|
732b250815 | ||
|
|
157dbdc543 | ||
|
|
6ba23683d5 | ||
|
|
80a5865db3 | ||
|
|
9cb6f38aea |
@@ -269,7 +269,7 @@ impl KeyboardControllable for Enigo {
|
||||
for pos in 0..mod_len {
|
||||
let rpos = mod_len - 1 - pos;
|
||||
if flag & (0x0001 << rpos) != 0 {
|
||||
self.key_up(modifiers[pos]);
|
||||
self.key_up(modifiers[rpos]);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -298,7 +298,18 @@ impl KeyboardControllable for Enigo {
|
||||
}
|
||||
|
||||
fn key_up(&mut self, key: Key) {
|
||||
keybd_event(KEYEVENTF_KEYUP, self.key_to_keycode(key), 0);
|
||||
match key {
|
||||
Key::Layout(c) => {
|
||||
let code = self.get_layoutdependent_keycode(c);
|
||||
if code as u16 != 0xFFFF {
|
||||
let vk = code & 0x00FF;
|
||||
keybd_event(KEYEVENTF_KEYUP, vk, 0);
|
||||
}
|
||||
}
|
||||
_ => {
|
||||
keybd_event(KEYEVENTF_KEYUP, self.key_to_keycode(key), 0);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn get_key_state(&mut self, key: Key) -> bool {
|
||||
|
||||
Submodule libs/hbb_common updated: 5e07db7444...48c37de3e6
@@ -6,15 +6,13 @@ if [ "$1" = configure ]; then
|
||||
|
||||
INITSYS=$(ls -al /proc/1/exe | awk -F' ' '{print $NF}' | awk -F'/' '{print $NF}')
|
||||
ln -f -s /usr/share/rustdesk/rustdesk /usr/bin/rustdesk
|
||||
|
||||
|
||||
if [ "systemd" == "$INITSYS" ]; then
|
||||
|
||||
if [ -e /etc/systemd/system/rustdesk.service ]; then
|
||||
rm /etc/systemd/system/rustdesk.service /usr/lib/systemd/system/rustdesk.service /usr/lib/systemd/user/rustdesk.service >/dev/null 2>&1
|
||||
fi
|
||||
version=$(python3 -V 2>&1 | grep -Po '(?<=Python )(.+)')
|
||||
parsedVersion=$(echo "${version//./}")
|
||||
mkdir -p /usr/lib/systemd/system/
|
||||
mkdir -p /usr/lib/systemd/system/
|
||||
cp /usr/share/rustdesk/files/systemd/rustdesk.service /usr/lib/systemd/system/rustdesk.service
|
||||
# try fix error in Ubuntu 18.04
|
||||
# Failed to reload rustdesk.service: Unit rustdesk.service is not loaded properly: Exec format error.
|
||||
|
||||
@@ -42,9 +42,16 @@ static PRIVILEGES_SCRIPTS_DIR: Dir =
|
||||
include_dir!("$CARGO_MANIFEST_DIR/src/platform/privileges_scripts");
|
||||
static mut LATEST_SEED: i32 = 0;
|
||||
|
||||
// Using a fixed temporary directory for updates is preferable to
|
||||
// using one that includes the custom client name.
|
||||
const UPDATE_TEMP_DIR: &str = "/tmp/.rustdeskupdate";
|
||||
#[inline]
|
||||
fn get_update_temp_dir() -> PathBuf {
|
||||
let euid = unsafe { hbb_common::libc::geteuid() };
|
||||
Path::new("/tmp").join(format!(".rustdeskupdate-{}", euid))
|
||||
}
|
||||
|
||||
#[inline]
|
||||
fn get_update_temp_dir_string() -> String {
|
||||
get_update_temp_dir().to_string_lossy().into_owned()
|
||||
}
|
||||
|
||||
/// Global mutex to serialize CoreGraphics cursor operations.
|
||||
/// This prevents race conditions between cursor visibility (hide depth tracking)
|
||||
@@ -285,21 +292,6 @@ fn update_daemon_agent(agent_plist_file: String, update_source_dir: String, sync
|
||||
_ => {
|
||||
let installed = std::path::Path::new(&agent_plist_file).exists();
|
||||
log::info!("Agent file {} installed: {}", &agent_plist_file, installed);
|
||||
if installed {
|
||||
// Unload first, or load may not work if already loaded.
|
||||
// We hope that the load operation can immediately trigger a start.
|
||||
std::process::Command::new("launchctl")
|
||||
.args(&["unload", "-w", &agent_plist_file])
|
||||
.stdin(Stdio::null())
|
||||
.stdout(Stdio::null())
|
||||
.stderr(Stdio::null())
|
||||
.status()
|
||||
.ok();
|
||||
let status = std::process::Command::new("launchctl")
|
||||
.args(&["load", "-w", &agent_plist_file])
|
||||
.status();
|
||||
log::info!("launch server, status: {:?}", &status);
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
@@ -418,7 +410,9 @@ pub fn set_cursor_pos(x: i32, y: i32) -> bool {
|
||||
let _guard = match CG_CURSOR_MUTEX.try_lock() {
|
||||
Ok(guard) => guard,
|
||||
Err(std::sync::TryLockError::WouldBlock) => {
|
||||
log::error!("[BUG] set_cursor_pos: CG_CURSOR_MUTEX is already held - potential deadlock!");
|
||||
log::error!(
|
||||
"[BUG] set_cursor_pos: CG_CURSOR_MUTEX is already held - potential deadlock!"
|
||||
);
|
||||
debug_assert!(false, "Re-entrant call to set_cursor_pos detected");
|
||||
return false;
|
||||
}
|
||||
@@ -825,7 +819,8 @@ pub fn quit_gui() {
|
||||
|
||||
#[inline]
|
||||
pub fn try_remove_temp_update_dir(dir: Option<&str>) {
|
||||
let target_path = Path::new(dir.unwrap_or(UPDATE_TEMP_DIR));
|
||||
let target_path_buf = dir.map(PathBuf::from).unwrap_or_else(get_update_temp_dir);
|
||||
let target_path = target_path_buf.as_path();
|
||||
if target_path.exists() {
|
||||
std::fs::remove_dir_all(target_path).ok();
|
||||
}
|
||||
@@ -901,25 +896,28 @@ end run
|
||||
}
|
||||
|
||||
pub fn update_from_dmg(dmg_path: &str) -> ResultType<()> {
|
||||
let update_temp_dir = get_update_temp_dir_string();
|
||||
println!("Starting update from DMG: {}", dmg_path);
|
||||
extract_dmg(dmg_path, UPDATE_TEMP_DIR)?;
|
||||
extract_dmg(dmg_path, &update_temp_dir)?;
|
||||
println!("DMG extracted");
|
||||
update_extracted(UPDATE_TEMP_DIR)?;
|
||||
update_extracted(&update_temp_dir)?;
|
||||
println!("Update process started");
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn update_to(_file: &str) -> ResultType<()> {
|
||||
update_extracted(UPDATE_TEMP_DIR)?;
|
||||
let update_temp_dir = get_update_temp_dir_string();
|
||||
update_extracted(&update_temp_dir)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn extract_update_dmg(file: &str) {
|
||||
let update_temp_dir = get_update_temp_dir_string();
|
||||
let mut evt: HashMap<&str, String> =
|
||||
HashMap::from([("name", "extract-update-dmg".to_string())]);
|
||||
match extract_dmg(file, UPDATE_TEMP_DIR) {
|
||||
match extract_dmg(file, &update_temp_dir) {
|
||||
Ok(_) => {
|
||||
log::info!("Extracted dmg file to {}", UPDATE_TEMP_DIR);
|
||||
log::info!("Extracted dmg file to {}", update_temp_dir);
|
||||
}
|
||||
Err(e) => {
|
||||
evt.insert("err", e.to_string());
|
||||
|
||||
@@ -14,8 +14,12 @@ on run {daemon_file, agent_file, user, cur_pid, source_dir}
|
||||
set write_daemon_plist to "echo " & quoted form of daemon_file & " > " & daemon_plist & " && chown root:wheel " & daemon_plist & ";"
|
||||
set write_agent_plist to "echo " & quoted form of agent_file & " > " & agent_plist & " && chown root:wheel " & agent_plist & ";"
|
||||
set load_service to "launchctl load -w " & daemon_plist & ";"
|
||||
set agent_label_cmd to "agent_label=$(basename " & quoted form of agent_plist & " .plist);"
|
||||
set bootstrap_agent to "if [ -n \"$uid\" ]; then launchctl bootstrap gui/$uid " & quoted form of agent_plist & " 2>/dev/null || launchctl bootstrap user/$uid " & quoted form of agent_plist & " 2>/dev/null || launchctl load -w " & quoted form of agent_plist & " || true; else launchctl load -w " & quoted form of agent_plist & " || true; fi;"
|
||||
set kickstart_agent to "if [ -n \"$uid\" ]; then launchctl kickstart -k gui/$uid/$agent_label 2>/dev/null || launchctl kickstart -k user/$uid/$agent_label 2>/dev/null || true; fi;"
|
||||
set load_agent to agent_label_cmd & bootstrap_agent & kickstart_agent
|
||||
|
||||
set sh to "set -e;" & resolve_uid & unload_agent & unload_service & kill_others & copy_files & write_daemon_plist & write_agent_plist & load_service
|
||||
set sh to "set -e;" & resolve_uid & unload_agent & unload_service & kill_others & copy_files & write_daemon_plist & write_agent_plist & load_service & load_agent
|
||||
|
||||
do shell script sh with prompt "RustDesk wants to update itself" with administrator privileges
|
||||
end run
|
||||
|
||||
@@ -560,7 +560,9 @@ impl Connection {
|
||||
match data {
|
||||
ipc::Data::Authorize => {
|
||||
conn.require_2fa.take();
|
||||
conn.send_logon_response().await;
|
||||
if !conn.send_logon_response_and_keep_alive().await {
|
||||
break;
|
||||
}
|
||||
if conn.port_forward_socket.is_some() {
|
||||
break;
|
||||
}
|
||||
@@ -1338,9 +1340,66 @@ impl Connection {
|
||||
crate::post_request(url, v.to_string(), "").await
|
||||
}
|
||||
|
||||
async fn send_logon_response(&mut self) {
|
||||
fn normalize_port_forward_target(pf: &mut PortForward) -> (String, bool) {
|
||||
let mut is_rdp = false;
|
||||
if pf.host == "RDP" && pf.port == 0 {
|
||||
pf.host = "localhost".to_owned();
|
||||
pf.port = 3389;
|
||||
is_rdp = true;
|
||||
}
|
||||
if pf.host.is_empty() {
|
||||
pf.host = "localhost".to_owned();
|
||||
}
|
||||
(format!("{}:{}", pf.host, pf.port), is_rdp)
|
||||
}
|
||||
|
||||
async fn connect_port_forward_if_needed(&mut self) -> bool {
|
||||
if self.port_forward_socket.is_some() {
|
||||
return true;
|
||||
}
|
||||
let Some(login_request::Union::PortForward(pf)) = self.lr.union.as_ref() else {
|
||||
return true;
|
||||
};
|
||||
let mut pf = pf.clone();
|
||||
let (mut addr, is_rdp) = Self::normalize_port_forward_target(&mut pf);
|
||||
self.port_forward_address = addr.clone();
|
||||
match timeout(3000, TcpStream::connect(&addr)).await {
|
||||
Ok(Ok(sock)) => {
|
||||
self.port_forward_socket = Some(Framed::new(sock, BytesCodec::new()));
|
||||
true
|
||||
}
|
||||
Ok(Err(e)) => {
|
||||
log::warn!("Port forward connect failed for {}: {}", addr, e);
|
||||
if is_rdp {
|
||||
addr = "RDP".to_owned();
|
||||
}
|
||||
self.send_login_error(format!(
|
||||
"Failed to access remote {}. Please make sure it is reachable/open.",
|
||||
addr
|
||||
))
|
||||
.await;
|
||||
false
|
||||
}
|
||||
Err(e) => {
|
||||
log::warn!("Port forward connect timed out for {}: {}", addr, e);
|
||||
if is_rdp {
|
||||
addr = "RDP".to_owned();
|
||||
}
|
||||
self.send_login_error(format!(
|
||||
"Failed to access remote {}. Please make sure it is reachable/open.",
|
||||
addr
|
||||
))
|
||||
.await;
|
||||
false
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Returns whether this connection should be kept alive.
|
||||
// `true` does not necessarily mean authorization succeeded (e.g. REQUIRE_2FA case).
|
||||
async fn send_logon_response_and_keep_alive(&mut self) -> bool {
|
||||
if self.authorized {
|
||||
return;
|
||||
return true;
|
||||
}
|
||||
if self.require_2fa.is_some() && !self.is_recent_session(true) && !self.from_switch {
|
||||
self.require_2fa.as_ref().map(|totp| {
|
||||
@@ -1371,7 +1430,11 @@ impl Connection {
|
||||
}
|
||||
});
|
||||
self.send_login_error(crate::client::REQUIRE_2FA).await;
|
||||
return;
|
||||
// Keep the connection alive so the client can continue with 2FA.
|
||||
return true;
|
||||
}
|
||||
if !self.connect_port_forward_if_needed().await {
|
||||
return false;
|
||||
}
|
||||
self.authorized = true;
|
||||
let (conn_type, auth_conn_type) = if self.file_transfer.is_some() {
|
||||
@@ -1494,7 +1557,7 @@ impl Connection {
|
||||
res.set_peer_info(pi);
|
||||
msg_out.set_login_response(res);
|
||||
self.send(msg_out).await;
|
||||
return;
|
||||
return true;
|
||||
}
|
||||
#[cfg(target_os = "linux")]
|
||||
if self.is_remote() {
|
||||
@@ -1517,7 +1580,7 @@ impl Connection {
|
||||
let mut msg_out = Message::new();
|
||||
msg_out.set_login_response(res);
|
||||
self.send(msg_out).await;
|
||||
return;
|
||||
return true;
|
||||
}
|
||||
}
|
||||
#[allow(unused_mut)]
|
||||
@@ -1671,6 +1734,7 @@ impl Connection {
|
||||
self.try_sub_monitor_services();
|
||||
}
|
||||
}
|
||||
true
|
||||
}
|
||||
|
||||
fn try_sub_camera_displays(&mut self) {
|
||||
@@ -2178,33 +2242,8 @@ impl Connection {
|
||||
sleep(1.).await;
|
||||
return false;
|
||||
}
|
||||
let mut is_rdp = false;
|
||||
if pf.host == "RDP" && pf.port == 0 {
|
||||
pf.host = "localhost".to_owned();
|
||||
pf.port = 3389;
|
||||
is_rdp = true;
|
||||
}
|
||||
if pf.host.is_empty() {
|
||||
pf.host = "localhost".to_owned();
|
||||
}
|
||||
let mut addr = format!("{}:{}", pf.host, pf.port);
|
||||
self.port_forward_address = addr.clone();
|
||||
match timeout(3000, TcpStream::connect(&addr)).await {
|
||||
Ok(Ok(sock)) => {
|
||||
self.port_forward_socket = Some(Framed::new(sock, BytesCodec::new()));
|
||||
}
|
||||
_ => {
|
||||
if is_rdp {
|
||||
addr = "RDP".to_owned();
|
||||
}
|
||||
self.send_login_error(format!(
|
||||
"Failed to access remote {}, please make sure if it is open",
|
||||
addr
|
||||
))
|
||||
.await;
|
||||
return false;
|
||||
}
|
||||
}
|
||||
let (addr, _is_rdp) = Self::normalize_port_forward_target(&mut pf);
|
||||
self.port_forward_address = addr;
|
||||
}
|
||||
_ => {
|
||||
if !self.check_privacy_mode_on().await {
|
||||
@@ -2235,9 +2274,7 @@ impl Connection {
|
||||
// `is_logon_ui()` is a fallback for logon UI detection on Windows.
|
||||
#[cfg(target_os = "windows")]
|
||||
let is_logon = || {
|
||||
crate::platform::is_prelogin()
|
||||
|| crate::platform::is_locked()
|
||||
|| {
|
||||
crate::platform::is_prelogin() || crate::platform::is_locked() || {
|
||||
match crate::platform::is_logon_ui() {
|
||||
Ok(result) => result,
|
||||
Err(e) => {
|
||||
@@ -2276,7 +2313,9 @@ impl Connection {
|
||||
if err_msg.is_empty() {
|
||||
#[cfg(target_os = "linux")]
|
||||
self.linux_headless_handle.wait_desktop_cm_ready().await;
|
||||
self.send_logon_response().await;
|
||||
if !self.send_logon_response_and_keep_alive().await {
|
||||
return false;
|
||||
}
|
||||
self.try_start_cm(lr.my_id.clone(), lr.my_name.clone(), self.authorized);
|
||||
} else {
|
||||
self.send_login_error(err_msg).await;
|
||||
@@ -2312,7 +2351,9 @@ impl Connection {
|
||||
if err_msg.is_empty() {
|
||||
#[cfg(target_os = "linux")]
|
||||
self.linux_headless_handle.wait_desktop_cm_ready().await;
|
||||
self.send_logon_response().await;
|
||||
if !self.send_logon_response_and_keep_alive().await {
|
||||
return false;
|
||||
}
|
||||
self.try_start_cm(lr.my_id, lr.my_name, self.authorized);
|
||||
} else {
|
||||
self.send_login_error(err_msg).await;
|
||||
@@ -2330,7 +2371,9 @@ impl Connection {
|
||||
self.update_failure(failure, true, 1);
|
||||
self.require_2fa.take();
|
||||
raii::AuthedConnID::set_session_2fa(self.session_key());
|
||||
self.send_logon_response().await;
|
||||
if !self.send_logon_response_and_keep_alive().await {
|
||||
return false;
|
||||
}
|
||||
self.try_start_cm(
|
||||
self.lr.my_id.to_owned(),
|
||||
self.lr.my_name.to_owned(),
|
||||
@@ -2381,7 +2424,9 @@ impl Connection {
|
||||
if let Some((_instant, uuid_old)) = uuid_old {
|
||||
if uuid == uuid_old {
|
||||
self.from_switch = true;
|
||||
self.send_logon_response().await;
|
||||
if !self.send_logon_response_and_keep_alive().await {
|
||||
return false;
|
||||
}
|
||||
self.try_start_cm(
|
||||
lr.my_id.clone(),
|
||||
lr.my_name.clone(),
|
||||
@@ -5347,9 +5392,8 @@ mod raii {
|
||||
}
|
||||
|
||||
pub fn check_wake_lock_on_setting_changed() {
|
||||
let current = config::Config::get_bool_option(
|
||||
keys::OPTION_KEEP_AWAKE_DURING_INCOMING_SESSIONS,
|
||||
);
|
||||
let current =
|
||||
config::Config::get_bool_option(keys::OPTION_KEEP_AWAKE_DURING_INCOMING_SESSIONS);
|
||||
let cached = *WAKELOCK_KEEP_AWAKE_OPTION.lock().unwrap();
|
||||
if cached != Some(current) {
|
||||
Self::check_wake_lock();
|
||||
|
||||
@@ -809,7 +809,7 @@ fn record_key_is_control_key(record_key: u64) -> bool {
|
||||
|
||||
#[inline]
|
||||
fn record_key_is_chr(record_key: u64) -> bool {
|
||||
record_key < KEY_CHAR_START
|
||||
record_key >= KEY_CHAR_START
|
||||
}
|
||||
|
||||
#[inline]
|
||||
@@ -1513,6 +1513,27 @@ fn get_control_key_value(key_event: &KeyEvent) -> i32 {
|
||||
}
|
||||
}
|
||||
|
||||
#[inline]
|
||||
fn has_hotkey_modifiers(key_event: &KeyEvent) -> bool {
|
||||
key_event.modifiers.iter().any(|ck| {
|
||||
let v = ck.value();
|
||||
v == ControlKey::Control.value()
|
||||
|| v == ControlKey::RControl.value()
|
||||
|| v == ControlKey::Meta.value()
|
||||
|| v == ControlKey::RWin.value()
|
||||
|| {
|
||||
#[cfg(any(target_os = "windows", target_os = "linux"))]
|
||||
{
|
||||
v == ControlKey::Alt.value() || v == ControlKey::RAlt.value()
|
||||
}
|
||||
#[cfg(target_os = "macos")]
|
||||
{
|
||||
false
|
||||
}
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
fn release_unpressed_modifiers(en: &mut Enigo, key_event: &KeyEvent) {
|
||||
let ck_value = get_control_key_value(key_event);
|
||||
fix_modifiers(&key_event.modifiers[..], en, ck_value);
|
||||
@@ -1572,7 +1593,7 @@ fn need_to_uppercase(en: &mut Enigo) -> bool {
|
||||
get_modifier_state(Key::Shift, en) || get_modifier_state(Key::CapsLock, en)
|
||||
}
|
||||
|
||||
fn process_chr(en: &mut Enigo, chr: u32, down: bool) {
|
||||
fn process_chr(en: &mut Enigo, chr: u32, down: bool, _hotkey: bool) {
|
||||
// On Wayland with uinput mode, use clipboard for character input
|
||||
#[cfg(target_os = "linux")]
|
||||
if !crate::platform::linux::is_x11() && wayland_use_uinput() {
|
||||
@@ -1587,6 +1608,16 @@ fn process_chr(en: &mut Enigo, chr: u32, down: bool) {
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(any(target_os = "macos", target_os = "windows"))]
|
||||
if !_hotkey {
|
||||
if down {
|
||||
if let Ok(chr) = char::try_from(chr) {
|
||||
en.key_sequence(&chr.to_string());
|
||||
}
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
let key = char_value_to_key(chr);
|
||||
|
||||
if down {
|
||||
@@ -1856,7 +1887,7 @@ fn legacy_keyboard_mode(evt: &KeyEvent) {
|
||||
|
||||
let record_key = chr as u64 + KEY_CHAR_START;
|
||||
record_pressed_key(KeysDown::EnigoKey(record_key), down);
|
||||
process_chr(&mut en, chr, down)
|
||||
process_chr(&mut en, chr, down, has_hotkey_modifiers(evt))
|
||||
}
|
||||
Some(key_event::Union::Unicode(chr)) => {
|
||||
// Same as Chr: release Shift for Unicode input
|
||||
|
||||
Reference in New Issue
Block a user