mirror of
https://gh.catmak.name/https://github.com/mihomo-party-org/mihomo-party
synced 2026-02-10 19:50:28 +08:00
419 lines
14 KiB
TypeScript
419 lines
14 KiB
TypeScript
import { exec, execFile } from 'child_process'
|
||
import { promisify } from 'util'
|
||
import { stat } from 'fs/promises'
|
||
import { existsSync } from 'fs'
|
||
import path from 'path'
|
||
import { app, dialog, ipcMain } from 'electron'
|
||
import { getAppConfig, patchControledMihomoConfig } from '../config'
|
||
import { mihomoCorePath, mihomoCoreDir } from '../utils/dirs'
|
||
import { managerLogger } from '../utils/logger'
|
||
import i18next from '../../shared/i18n'
|
||
|
||
const execPromise = promisify(exec)
|
||
const execFilePromise = promisify(execFile)
|
||
|
||
// 内核名称白名单
|
||
const ALLOWED_CORES = ['mihomo', 'mihomo-alpha', 'mihomo-smart'] as const
|
||
type AllowedCore = (typeof ALLOWED_CORES)[number]
|
||
|
||
export function isValidCoreName(core: string): core is AllowedCore {
|
||
return ALLOWED_CORES.includes(core as AllowedCore)
|
||
}
|
||
|
||
export function validateCorePath(corePath: string): void {
|
||
if (corePath.includes('..')) {
|
||
throw new Error('Invalid core path: directory traversal detected')
|
||
}
|
||
|
||
const dangerousChars = /[;&|`$(){}[\]<>'"\\]/
|
||
if (dangerousChars.test(path.basename(corePath))) {
|
||
throw new Error('Invalid core path: contains dangerous characters')
|
||
}
|
||
|
||
const normalizedPath = path.normalize(path.resolve(corePath))
|
||
const expectedDir = path.normalize(path.resolve(mihomoCoreDir()))
|
||
|
||
if (!normalizedPath.startsWith(expectedDir + path.sep) && normalizedPath !== expectedDir) {
|
||
throw new Error('Invalid core path: not in expected directory')
|
||
}
|
||
}
|
||
|
||
function shellEscape(arg: string): string {
|
||
return "'" + arg.replace(/'/g, "'\\''") + "'"
|
||
}
|
||
|
||
// 会话管理员状态缓存
|
||
let sessionAdminStatus: boolean | null = null
|
||
|
||
export async function initAdminStatus(): Promise<void> {
|
||
if (process.platform === 'win32' && sessionAdminStatus === null) {
|
||
sessionAdminStatus = await checkAdminPrivileges().catch(() => false)
|
||
}
|
||
}
|
||
|
||
export function getSessionAdminStatus(): boolean {
|
||
if (process.platform !== 'win32') {
|
||
return true
|
||
}
|
||
return sessionAdminStatus ?? false
|
||
}
|
||
|
||
export async function checkAdminPrivileges(): Promise<boolean> {
|
||
if (process.platform !== 'win32') {
|
||
return true
|
||
}
|
||
|
||
try {
|
||
await execPromise('chcp 65001 >nul 2>&1 && fltmc', { encoding: 'utf8' })
|
||
managerLogger.info('Admin privileges confirmed via fltmc')
|
||
return true
|
||
} catch (fltmcError: unknown) {
|
||
const errorCode = (fltmcError as { code?: number })?.code || 0
|
||
managerLogger.debug(`fltmc failed with code ${errorCode}, trying net session as fallback`)
|
||
|
||
try {
|
||
await execPromise('chcp 65001 >nul 2>&1 && net session', { encoding: 'utf8' })
|
||
managerLogger.info('Admin privileges confirmed via net session')
|
||
return true
|
||
} catch (netSessionError: unknown) {
|
||
const netErrorCode = (netSessionError as { code?: number })?.code || 0
|
||
managerLogger.debug(
|
||
`Both fltmc and net session failed, no admin privileges. Error codes: fltmc=${errorCode}, net=${netErrorCode}`
|
||
)
|
||
return false
|
||
}
|
||
}
|
||
}
|
||
|
||
export async function checkMihomoCorePermissions(): Promise<boolean> {
|
||
const { core = 'mihomo' } = await getAppConfig()
|
||
const corePath = mihomoCorePath(core)
|
||
|
||
try {
|
||
if (process.platform === 'win32') {
|
||
return await checkAdminPrivileges()
|
||
}
|
||
|
||
if (process.platform === 'darwin' || process.platform === 'linux') {
|
||
const stats = await stat(corePath)
|
||
return (stats.mode & 0o4000) !== 0 && stats.uid === 0
|
||
}
|
||
} catch {
|
||
return false
|
||
}
|
||
|
||
return false
|
||
}
|
||
|
||
export async function checkHighPrivilegeCore(): Promise<boolean> {
|
||
try {
|
||
const { core = 'mihomo' } = await getAppConfig()
|
||
const corePath = mihomoCorePath(core)
|
||
|
||
managerLogger.info(`Checking high privilege core: ${corePath}`)
|
||
|
||
if (process.platform === 'win32') {
|
||
if (!existsSync(corePath)) {
|
||
managerLogger.info('Core file does not exist')
|
||
return false
|
||
}
|
||
|
||
const hasHighPrivilegeProcess = await checkHighPrivilegeMihomoProcess()
|
||
if (hasHighPrivilegeProcess) {
|
||
managerLogger.info('Found high privilege mihomo process running')
|
||
return true
|
||
}
|
||
|
||
const isAdmin = await checkAdminPrivileges()
|
||
managerLogger.info(`Current process admin privileges: ${isAdmin}`)
|
||
return isAdmin
|
||
}
|
||
|
||
if (process.platform === 'darwin' || process.platform === 'linux') {
|
||
managerLogger.info('Non-Windows platform, skipping high privilege core check')
|
||
return false
|
||
}
|
||
} catch (error) {
|
||
managerLogger.error('Failed to check high privilege core', error)
|
||
return false
|
||
}
|
||
|
||
return false
|
||
}
|
||
|
||
async function checkHighPrivilegeMihomoProcess(): Promise<boolean> {
|
||
const mihomoExecutables =
|
||
process.platform === 'win32'
|
||
? ['mihomo.exe', 'mihomo-alpha.exe', 'mihomo-smart.exe']
|
||
: ['mihomo', 'mihomo-alpha', 'mihomo-smart']
|
||
|
||
try {
|
||
if (process.platform === 'win32') {
|
||
for (const executable of mihomoExecutables) {
|
||
try {
|
||
const { stdout } = await execPromise(
|
||
`chcp 65001 >nul 2>&1 && tasklist /FI "IMAGENAME eq ${executable}" /FO CSV`,
|
||
{ encoding: 'utf8' }
|
||
)
|
||
const lines = stdout.split('\n').filter((line) => line.includes(executable))
|
||
|
||
if (lines.length > 0) {
|
||
managerLogger.info(`Found ${lines.length} ${executable} processes running`)
|
||
|
||
for (const line of lines) {
|
||
const parts = line.split(',')
|
||
if (parts.length >= 2) {
|
||
const pid = parts[1].replace(/"/g, '').trim()
|
||
try {
|
||
const { stdout: processInfo } = await execPromise(
|
||
`powershell -NoProfile -Command "[Console]::OutputEncoding = [System.Text.Encoding]::UTF8; Get-Process -Id ${pid} | Select-Object Name,Id,Path,CommandLine | ConvertTo-Json"`,
|
||
{ encoding: 'utf8' }
|
||
)
|
||
const processJson = JSON.parse(processInfo)
|
||
managerLogger.info(`Process ${pid} info: ${processInfo.substring(0, 200)}`)
|
||
|
||
if (processJson.Name.includes('mihomo') && processJson.Path === null) {
|
||
return true
|
||
}
|
||
} catch {
|
||
managerLogger.info(`Cannot get info for process ${pid}, might be high privilege`)
|
||
}
|
||
}
|
||
}
|
||
}
|
||
} catch (error) {
|
||
managerLogger.error(`Failed to check ${executable} processes`, error)
|
||
}
|
||
}
|
||
} else {
|
||
let foundProcesses = false
|
||
|
||
for (const executable of mihomoExecutables) {
|
||
try {
|
||
const { stdout } = await execPromise(`ps aux | grep ${executable} | grep -v grep`)
|
||
const lines = stdout.split('\n').filter((line) => line.trim() && line.includes(executable))
|
||
|
||
if (lines.length > 0) {
|
||
foundProcesses = true
|
||
managerLogger.info(`Found ${lines.length} ${executable} processes running`)
|
||
|
||
for (const line of lines) {
|
||
const parts = line.trim().split(/\s+/)
|
||
if (parts.length >= 1) {
|
||
const user = parts[0]
|
||
managerLogger.info(`${executable} process running as user: ${user}`)
|
||
|
||
if (user === 'root') {
|
||
return true
|
||
}
|
||
}
|
||
}
|
||
}
|
||
} catch {
|
||
// ignore
|
||
}
|
||
}
|
||
|
||
if (!foundProcesses) {
|
||
managerLogger.info('No mihomo processes found running')
|
||
}
|
||
}
|
||
} catch (error) {
|
||
managerLogger.error('Failed to check high privilege mihomo process', error)
|
||
}
|
||
|
||
return false
|
||
}
|
||
|
||
export async function grantTunPermissions(): Promise<void> {
|
||
const { core = 'mihomo' } = await getAppConfig()
|
||
|
||
if (!isValidCoreName(core)) {
|
||
throw new Error(`Invalid core name: ${core}. Allowed values: ${ALLOWED_CORES.join(', ')}`)
|
||
}
|
||
|
||
const corePath = mihomoCorePath(core)
|
||
validateCorePath(corePath)
|
||
|
||
if (process.platform === 'darwin') {
|
||
const escapedPath = shellEscape(corePath)
|
||
const script = `do shell script "chown root:admin ${escapedPath} && chmod +sx ${escapedPath}" with administrator privileges`
|
||
await execFilePromise('osascript', ['-e', script])
|
||
}
|
||
|
||
if (process.platform === 'linux') {
|
||
await execFilePromise('pkexec', ['chown', 'root:root', corePath])
|
||
await execFilePromise('pkexec', ['chmod', '+sx', corePath])
|
||
}
|
||
|
||
if (process.platform === 'win32') {
|
||
throw new Error('Windows platform requires running as administrator')
|
||
}
|
||
}
|
||
|
||
export async function restartAsAdmin(forTun: boolean = true): Promise<void> {
|
||
if (process.platform !== 'win32') {
|
||
throw new Error('This function is only available on Windows')
|
||
}
|
||
|
||
// 先停止 Core,避免新旧进程冲突
|
||
try {
|
||
const { stopCore } = await import('./manager')
|
||
managerLogger.info('Stopping core before admin restart...')
|
||
await stopCore(true)
|
||
// 等待 Core 完全停止
|
||
await new Promise((resolve) => setTimeout(resolve, 500))
|
||
} catch (error) {
|
||
managerLogger.warn('Failed to stop core before restart:', error)
|
||
}
|
||
|
||
const exePath = process.execPath
|
||
const args = process.argv.slice(1).filter((arg) => arg !== '--admin-restart-for-tun')
|
||
const restartArgs = forTun ? [...args, '--admin-restart-for-tun'] : args
|
||
|
||
const escapedExePath = exePath.replace(/'/g, "''")
|
||
const argsString = restartArgs.map((arg) => arg.replace(/'/g, "''")).join("', '")
|
||
|
||
const command =
|
||
restartArgs.length > 0
|
||
? `powershell -NoProfile -Command "Start-Process -FilePath '${escapedExePath}' -ArgumentList '${argsString}' -Verb RunAs -Wait:$false; exit 0"`
|
||
: `powershell -NoProfile -Command "Start-Process -FilePath '${escapedExePath}' -Verb RunAs -Wait:$false; exit 0"`
|
||
|
||
managerLogger.info('Restarting as administrator with command', command)
|
||
|
||
return new Promise((resolve, reject) => {
|
||
exec(command, { windowsHide: true }, (error, _stdout, stderr) => {
|
||
if (error) {
|
||
managerLogger.error('PowerShell execution error', error)
|
||
managerLogger.error('stderr', stderr)
|
||
reject(new Error(`Failed to restart as administrator: ${error.message}`))
|
||
return
|
||
}
|
||
managerLogger.info('PowerShell command executed successfully, quitting app')
|
||
// 立即退出,避免竞态
|
||
app.quit()
|
||
resolve()
|
||
})
|
||
})
|
||
}
|
||
|
||
export async function requestTunPermissions(): Promise<void> {
|
||
if (process.platform === 'win32') {
|
||
await restartAsAdmin()
|
||
} else {
|
||
const hasPermissions = await checkMihomoCorePermissions()
|
||
if (!hasPermissions) {
|
||
await grantTunPermissions()
|
||
}
|
||
}
|
||
}
|
||
|
||
export async function showTunPermissionDialog(): Promise<boolean> {
|
||
managerLogger.info('Preparing TUN permission dialog...')
|
||
|
||
const title = i18next.t('tun.permissions.title') || '需要管理员权限'
|
||
const message =
|
||
i18next.t('tun.permissions.message') ||
|
||
'启用 TUN 模式需要管理员权限,是否现在重启应用获取权限?'
|
||
const confirmText = i18next.t('common.confirm') || '确认'
|
||
const cancelText = i18next.t('common.cancel') || '取消'
|
||
|
||
const choice = dialog.showMessageBoxSync({
|
||
type: 'warning',
|
||
title,
|
||
message,
|
||
buttons: [confirmText, cancelText],
|
||
defaultId: 0,
|
||
cancelId: 1
|
||
})
|
||
|
||
managerLogger.info(`TUN permission dialog choice: ${choice}`)
|
||
return choice === 0
|
||
}
|
||
|
||
export async function showErrorDialog(title: string, message: string): Promise<void> {
|
||
const okText = i18next.t('common.confirm') || '确认'
|
||
|
||
dialog.showMessageBoxSync({
|
||
type: 'error',
|
||
title,
|
||
message,
|
||
buttons: [okText],
|
||
defaultId: 0
|
||
})
|
||
}
|
||
|
||
export async function validateTunPermissionsOnStartup(_restartCore: () => Promise<void>): Promise<void> {
|
||
const { getControledMihomoConfig } = await import('../config')
|
||
const { tun } = await getControledMihomoConfig()
|
||
|
||
if (!tun?.enable) {
|
||
return
|
||
}
|
||
|
||
const hasPermissions = await checkMihomoCorePermissions()
|
||
|
||
if (!hasPermissions) {
|
||
managerLogger.warn('TUN is enabled but insufficient permissions detected, prompting user...')
|
||
const confirmed = await showTunPermissionDialog()
|
||
if (confirmed) {
|
||
await restartAsAdmin()
|
||
return
|
||
}
|
||
|
||
managerLogger.warn('User declined admin restart, auto-disabling TUN...')
|
||
await patchControledMihomoConfig({ tun: { enable: false } })
|
||
|
||
const { mainWindow } = await import('../index')
|
||
mainWindow?.webContents.send('controledMihomoConfigUpdated')
|
||
ipcMain.emit('updateTrayMenu')
|
||
|
||
managerLogger.info('TUN auto-disabled due to insufficient permissions')
|
||
} else {
|
||
managerLogger.info('TUN permissions validated successfully')
|
||
}
|
||
}
|
||
|
||
export async function checkAdminRestartForTun(restartCore: () => Promise<void>): Promise<void> {
|
||
if (process.argv.includes('--admin-restart-for-tun')) {
|
||
managerLogger.info('Detected admin restart for TUN mode, auto-enabling TUN...')
|
||
|
||
try {
|
||
if (process.platform === 'win32') {
|
||
const hasAdminPrivileges = await checkAdminPrivileges()
|
||
if (hasAdminPrivileges) {
|
||
await patchControledMihomoConfig({ tun: { enable: true }, dns: { enable: true } })
|
||
|
||
const { checkAutoRun, enableAutoRun } = await import('../sys/autoRun')
|
||
const autoRunEnabled = await checkAutoRun()
|
||
if (autoRunEnabled) {
|
||
await enableAutoRun()
|
||
}
|
||
|
||
await restartCore()
|
||
|
||
managerLogger.info('TUN mode auto-enabled after admin restart')
|
||
|
||
const { mainWindow } = await import('../index')
|
||
mainWindow?.webContents.send('controledMihomoConfigUpdated')
|
||
ipcMain.emit('updateTrayMenu')
|
||
} else {
|
||
managerLogger.warn('Admin restart detected but no admin privileges found')
|
||
}
|
||
}
|
||
} catch (error) {
|
||
managerLogger.error('Failed to auto-enable TUN after admin restart', error)
|
||
}
|
||
} else {
|
||
await validateTunPermissionsOnStartup(restartCore)
|
||
}
|
||
}
|
||
|
||
export function checkTunPermissions(): Promise<boolean> {
|
||
return checkMihomoCorePermissions()
|
||
}
|
||
|
||
export function manualGrantCorePermition(): Promise<void> {
|
||
return grantTunPermissions()
|
||
}
|