2022-05-12 17:35:25 +08:00
|
|
|
use crate::ipc::Data;
|
2022-10-22 22:19:14 +08:00
|
|
|
use bytes::Bytes;
|
2022-05-12 17:35:25 +08:00
|
|
|
pub use connection::*;
|
2022-11-25 15:22:44 +08:00
|
|
|
#[cfg(not(any(target_os = "android", target_os = "ios")))]
|
|
|
|
use hbb_common::config::Config2;
|
2022-05-12 17:35:25 +08:00
|
|
|
use hbb_common::{
|
|
|
|
allow_err,
|
|
|
|
anyhow::{anyhow, Context},
|
|
|
|
bail,
|
2022-11-13 18:11:13 +08:00
|
|
|
config::{Config, CONNECT_TIMEOUT, RELAY_PORT},
|
2022-05-12 17:35:25 +08:00
|
|
|
log,
|
|
|
|
message_proto::*,
|
2022-07-21 00:50:08 +08:00
|
|
|
protobuf::{Enum, Message as _},
|
2022-05-12 17:35:25 +08:00
|
|
|
rendezvous_proto::*,
|
|
|
|
socket_client,
|
|
|
|
sodiumoxide::crypto::{box_, secretbox, sign},
|
|
|
|
timeout, tokio, ResultType, Stream,
|
|
|
|
};
|
2022-11-13 18:11:13 +08:00
|
|
|
#[cfg(not(any(target_os = "android", target_os = "ios")))]
|
|
|
|
use service::ServiceTmpl;
|
|
|
|
use service::{GenericService, Service, Subscriber};
|
2022-05-12 17:35:25 +08:00
|
|
|
use std::{
|
|
|
|
collections::HashMap,
|
|
|
|
net::SocketAddr,
|
|
|
|
sync::{Arc, Mutex, RwLock, Weak},
|
|
|
|
time::Duration,
|
|
|
|
};
|
2022-07-16 00:45:23 +08:00
|
|
|
|
2022-05-12 17:35:25 +08:00
|
|
|
pub mod audio_service;
|
|
|
|
cfg_if::cfg_if! {
|
|
|
|
if #[cfg(not(any(target_os = "android", target_os = "ios")))] {
|
|
|
|
mod clipboard_service;
|
2022-07-21 00:50:08 +08:00
|
|
|
#[cfg(target_os = "linux")]
|
2022-10-12 11:36:19 +08:00
|
|
|
pub(crate) mod wayland;
|
2022-07-21 00:50:08 +08:00
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
pub mod uinput;
|
2022-10-11 19:52:03 +08:00
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
pub mod dbus;
|
2022-05-12 17:35:25 +08:00
|
|
|
pub mod input_service;
|
|
|
|
} else {
|
|
|
|
mod clipboard_service {
|
|
|
|
pub const NAME: &'static str = "";
|
|
|
|
}
|
|
|
|
pub mod input_service {
|
|
|
|
pub const NAME_CURSOR: &'static str = "";
|
|
|
|
pub const NAME_POS: &'static str = "";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mod connection;
|
2022-11-10 10:27:13 +08:00
|
|
|
#[cfg(windows)]
|
|
|
|
pub mod portable_service;
|
2022-05-12 17:35:25 +08:00
|
|
|
mod service;
|
2022-07-05 22:31:08 +08:00
|
|
|
mod video_qos;
|
2022-05-12 17:35:25 +08:00
|
|
|
pub mod video_service;
|
|
|
|
|
|
|
|
use hbb_common::tcp::new_listener;
|
|
|
|
|
|
|
|
pub type Childs = Arc<Mutex<Vec<std::process::Child>>>;
|
|
|
|
type ConnMap = HashMap<i32, ConnInner>;
|
|
|
|
|
|
|
|
lazy_static::lazy_static! {
|
|
|
|
pub static ref CHILD_PROCESS: Childs = Default::default();
|
2022-11-10 10:27:13 +08:00
|
|
|
pub static ref CONN_COUNT: Arc<Mutex<usize>> = Default::default();
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct Server {
|
|
|
|
connections: ConnMap,
|
|
|
|
services: HashMap<&'static str, Box<dyn Service>>,
|
|
|
|
id_count: i32,
|
|
|
|
}
|
|
|
|
|
|
|
|
pub type ServerPtr = Arc<RwLock<Server>>;
|
|
|
|
pub type ServerPtrWeak = Weak<RwLock<Server>>;
|
|
|
|
|
|
|
|
pub fn new() -> ServerPtr {
|
|
|
|
let mut server = Server {
|
|
|
|
connections: HashMap::new(),
|
|
|
|
services: HashMap::new(),
|
|
|
|
id_count: 0,
|
|
|
|
};
|
|
|
|
server.add_service(Box::new(audio_service::new()));
|
|
|
|
server.add_service(Box::new(video_service::new()));
|
|
|
|
#[cfg(not(any(target_os = "android", target_os = "ios")))]
|
|
|
|
{
|
|
|
|
server.add_service(Box::new(clipboard_service::new()));
|
2022-11-29 16:36:35 +08:00
|
|
|
if !video_service::capture_cursor_embeded() {
|
|
|
|
server.add_service(Box::new(input_service::new_cursor()));
|
|
|
|
server.add_service(Box::new(input_service::new_pos()));
|
|
|
|
}
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|
|
|
|
Arc::new(RwLock::new(server))
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn accept_connection_(server: ServerPtr, socket: Stream, secure: bool) -> ResultType<()> {
|
|
|
|
let local_addr = socket.local_addr();
|
|
|
|
drop(socket);
|
|
|
|
// even we drop socket, below still may fail if not use reuse_addr,
|
|
|
|
// there is TIME_WAIT before socket really released, so sometimes we
|
|
|
|
// see “Only one usage of each socket address is normally permitted” on windows sometimes,
|
|
|
|
let listener = new_listener(local_addr, true).await?;
|
|
|
|
log::info!("Server listening on: {}", &listener.local_addr()?);
|
|
|
|
if let Ok((stream, addr)) = timeout(CONNECT_TIMEOUT, listener.accept()).await? {
|
|
|
|
stream.set_nodelay(true).ok();
|
|
|
|
let stream_addr = stream.local_addr()?;
|
2022-12-27 17:36:53 +08:00
|
|
|
if cfg!(target_os = "macos") {
|
|
|
|
use std::process::Command;
|
2022-12-28 04:26:37 +08:00
|
|
|
Command::new("/usr/bin/caffeinate").arg("-u").arg("-t 5").spawn().expect("failed to execute caffeinate");
|
2022-12-27 17:36:53 +08:00
|
|
|
println!("wake up macos...");
|
|
|
|
}
|
2022-05-12 17:35:25 +08:00
|
|
|
create_tcp_connection(server, Stream::from(stream, stream_addr), addr, secure).await?;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-04-25 12:28:28 +08:00
|
|
|
async fn check_privacy_mode_on(stream: &mut Stream) -> ResultType<()> {
|
|
|
|
if video_service::get_privacy_mode_conn_id() > 0 {
|
|
|
|
let msg_out =
|
2022-07-31 22:31:17 +08:00
|
|
|
crate::common::make_privacy_mode_msg(back_notification::PrivacyModeState::PrvOnByOther);
|
2022-04-25 12:28:28 +08:00
|
|
|
timeout(CONNECT_TIMEOUT, stream.send(&msg_out)).await??;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-05-12 17:35:25 +08:00
|
|
|
pub async fn create_tcp_connection(
|
|
|
|
server: ServerPtr,
|
|
|
|
stream: Stream,
|
|
|
|
addr: SocketAddr,
|
|
|
|
secure: bool,
|
|
|
|
) -> ResultType<()> {
|
|
|
|
let mut stream = stream;
|
2022-04-25 12:28:28 +08:00
|
|
|
check_privacy_mode_on(&mut stream).await?;
|
|
|
|
|
2022-05-12 17:35:25 +08:00
|
|
|
let id = {
|
|
|
|
let mut w = server.write().unwrap();
|
|
|
|
w.id_count += 1;
|
|
|
|
w.id_count
|
|
|
|
};
|
|
|
|
let (sk, pk) = Config::get_key_pair();
|
|
|
|
if secure && pk.len() == sign::PUBLICKEYBYTES && sk.len() == sign::SECRETKEYBYTES {
|
|
|
|
let mut sk_ = [0u8; sign::SECRETKEYBYTES];
|
|
|
|
sk_[..].copy_from_slice(&sk);
|
|
|
|
let sk = sign::SecretKey(sk_);
|
|
|
|
let mut msg_out = Message::new();
|
|
|
|
let (our_pk_b, our_sk_b) = box_::gen_keypair();
|
|
|
|
msg_out.set_signed_id(SignedId {
|
|
|
|
id: sign::sign(
|
|
|
|
&IdPk {
|
|
|
|
id: Config::get_id(),
|
2022-07-16 00:45:23 +08:00
|
|
|
pk: Bytes::from(our_pk_b.0.to_vec()),
|
2022-05-12 17:35:25 +08:00
|
|
|
..Default::default()
|
|
|
|
}
|
|
|
|
.write_to_bytes()
|
|
|
|
.unwrap_or_default(),
|
|
|
|
&sk,
|
2022-10-22 22:19:14 +08:00
|
|
|
)
|
|
|
|
.into(),
|
2022-05-12 17:35:25 +08:00
|
|
|
..Default::default()
|
|
|
|
});
|
|
|
|
timeout(CONNECT_TIMEOUT, stream.send(&msg_out)).await??;
|
|
|
|
match timeout(CONNECT_TIMEOUT, stream.next()).await? {
|
|
|
|
Some(res) => {
|
|
|
|
let bytes = res?;
|
|
|
|
if let Ok(msg_in) = Message::parse_from_bytes(&bytes) {
|
2022-07-14 17:20:01 +08:00
|
|
|
if let Some(message::Union::PublicKey(pk)) = msg_in.union {
|
2022-05-12 17:35:25 +08:00
|
|
|
if pk.asymmetric_value.len() == box_::PUBLICKEYBYTES {
|
|
|
|
let nonce = box_::Nonce([0u8; box_::NONCEBYTES]);
|
|
|
|
let mut pk_ = [0u8; box_::PUBLICKEYBYTES];
|
|
|
|
pk_[..].copy_from_slice(&pk.asymmetric_value);
|
|
|
|
let their_pk_b = box_::PublicKey(pk_);
|
|
|
|
let symmetric_key =
|
|
|
|
box_::open(&pk.symmetric_value, &nonce, &their_pk_b, &our_sk_b)
|
|
|
|
.map_err(|_| {
|
|
|
|
anyhow!("Handshake failed: box decryption failure")
|
|
|
|
})?;
|
|
|
|
if symmetric_key.len() != secretbox::KEYBYTES {
|
|
|
|
bail!("Handshake failed: invalid secret key length from peer");
|
|
|
|
}
|
|
|
|
let mut key = [0u8; secretbox::KEYBYTES];
|
|
|
|
key[..].copy_from_slice(&symmetric_key);
|
|
|
|
stream.set_key(secretbox::Key(key));
|
|
|
|
} else if pk.asymmetric_value.is_empty() {
|
|
|
|
Config::set_key_confirmed(false);
|
|
|
|
log::info!("Force to update pk");
|
|
|
|
} else {
|
|
|
|
bail!("Handshake failed: invalid public sign key length from peer");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
log::error!("Handshake failed: invalid message type");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bail!("Handshake failed: invalid message format");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
bail!("Failed to receive public key");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Connection::start(addr, stream, id, Arc::downgrade(&server)).await;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn accept_connection(
|
|
|
|
server: ServerPtr,
|
|
|
|
socket: Stream,
|
|
|
|
peer_addr: SocketAddr,
|
|
|
|
secure: bool,
|
|
|
|
) {
|
|
|
|
if let Err(err) = accept_connection_(server, socket, secure).await {
|
|
|
|
log::error!("Failed to accept connection from {}: {}", peer_addr, err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn create_relay_connection(
|
|
|
|
server: ServerPtr,
|
|
|
|
relay_server: String,
|
|
|
|
uuid: String,
|
|
|
|
peer_addr: SocketAddr,
|
|
|
|
secure: bool,
|
|
|
|
) {
|
|
|
|
if let Err(err) =
|
|
|
|
create_relay_connection_(server, relay_server, uuid.clone(), peer_addr, secure).await
|
|
|
|
{
|
|
|
|
log::error!(
|
|
|
|
"Failed to create relay connection for {} with uuid {}: {}",
|
|
|
|
peer_addr,
|
|
|
|
uuid,
|
|
|
|
err
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn create_relay_connection_(
|
|
|
|
server: ServerPtr,
|
|
|
|
relay_server: String,
|
|
|
|
uuid: String,
|
|
|
|
peer_addr: SocketAddr,
|
|
|
|
secure: bool,
|
|
|
|
) -> ResultType<()> {
|
|
|
|
let mut stream = socket_client::connect_tcp(
|
|
|
|
crate::check_port(relay_server, RELAY_PORT),
|
|
|
|
Config::get_any_listen_addr(),
|
|
|
|
CONNECT_TIMEOUT,
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
let mut msg_out = RendezvousMessage::new();
|
|
|
|
let mut licence_key = Config::get_option("key");
|
|
|
|
if licence_key.is_empty() {
|
|
|
|
licence_key = crate::platform::get_license_key();
|
|
|
|
}
|
|
|
|
msg_out.set_request_relay(RequestRelay {
|
|
|
|
licence_key,
|
|
|
|
uuid,
|
|
|
|
..Default::default()
|
|
|
|
});
|
|
|
|
stream.send(&msg_out).await?;
|
|
|
|
create_tcp_connection(server, stream, peer_addr, secure).await?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Server {
|
|
|
|
pub fn add_connection(&mut self, conn: ConnInner, noperms: &Vec<&'static str>) {
|
|
|
|
for s in self.services.values() {
|
|
|
|
if !noperms.contains(&s.name()) {
|
|
|
|
s.on_subscribe(conn.clone());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
self.connections.insert(conn.id(), conn);
|
2022-11-10 10:27:13 +08:00
|
|
|
*CONN_COUNT.lock().unwrap() = self.connections.len();
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn remove_connection(&mut self, conn: &ConnInner) {
|
|
|
|
for s in self.services.values() {
|
|
|
|
s.on_unsubscribe(conn.id());
|
|
|
|
}
|
|
|
|
self.connections.remove(&conn.id());
|
2022-11-10 10:27:13 +08:00
|
|
|
*CONN_COUNT.lock().unwrap() = self.connections.len();
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|
|
|
|
|
2022-11-09 17:28:47 +08:00
|
|
|
pub fn close_connections(&mut self) {
|
|
|
|
let conn_inners: Vec<_> = self.connections.values_mut().collect();
|
|
|
|
for c in conn_inners {
|
|
|
|
let mut misc = Misc::new();
|
|
|
|
misc.set_stop_service(true);
|
|
|
|
let mut msg = Message::new();
|
|
|
|
msg.set_misc(misc);
|
|
|
|
c.send(Arc::new(msg));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-12 17:35:25 +08:00
|
|
|
fn add_service(&mut self, service: Box<dyn Service>) {
|
|
|
|
let name = service.name();
|
|
|
|
self.services.insert(name, service);
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn subscribe(&mut self, name: &str, conn: ConnInner, sub: bool) {
|
|
|
|
if let Some(s) = self.services.get(&name) {
|
|
|
|
if s.is_subed(conn.id()) == sub {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if sub {
|
|
|
|
s.on_subscribe(conn.clone());
|
|
|
|
} else {
|
|
|
|
s.on_unsubscribe(conn.id());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Drop for Server {
|
|
|
|
fn drop(&mut self) {
|
|
|
|
for s in self.services.values() {
|
|
|
|
s.join();
|
|
|
|
}
|
2022-07-07 01:27:21 +08:00
|
|
|
#[cfg(target_os = "linux")]
|
2022-07-21 00:50:08 +08:00
|
|
|
wayland::clear();
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn check_zombie() {
|
|
|
|
std::thread::spawn(|| loop {
|
|
|
|
let mut lock = CHILD_PROCESS.lock().unwrap();
|
|
|
|
let mut i = 0;
|
|
|
|
while i != lock.len() {
|
|
|
|
let c = &mut (*lock)[i];
|
|
|
|
if let Ok(Some(_)) = c.try_wait() {
|
|
|
|
lock.remove(i);
|
|
|
|
} else {
|
|
|
|
i += 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
drop(lock);
|
|
|
|
std::thread::sleep(Duration::from_millis(100));
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2022-05-29 04:39:12 +08:00
|
|
|
/// Start the host server that allows the remote peer to control the current machine.
|
2022-10-22 22:19:14 +08:00
|
|
|
///
|
2022-05-29 04:39:12 +08:00
|
|
|
/// # Arguments
|
2022-10-22 22:19:14 +08:00
|
|
|
///
|
2022-05-29 04:39:12 +08:00
|
|
|
/// * `is_server` - Whether the current client is definitely the server.
|
|
|
|
/// If true, the server will be started.
|
|
|
|
/// Otherwise, client will check if there's already a server and start one if not.
|
2022-05-12 17:35:25 +08:00
|
|
|
#[cfg(any(target_os = "android", target_os = "ios"))]
|
|
|
|
#[tokio::main]
|
|
|
|
pub async fn start_server(is_server: bool) {
|
|
|
|
crate::RendezvousMediator::start_all().await;
|
|
|
|
}
|
|
|
|
|
2022-05-29 04:39:12 +08:00
|
|
|
/// Start the host server that allows the remote peer to control the current machine.
|
2022-10-22 22:19:14 +08:00
|
|
|
///
|
2022-05-29 04:39:12 +08:00
|
|
|
/// # Arguments
|
2022-10-22 22:19:14 +08:00
|
|
|
///
|
2022-05-29 04:39:12 +08:00
|
|
|
/// * `is_server` - Whether the current client is definitely the server.
|
|
|
|
/// If true, the server will be started.
|
|
|
|
/// Otherwise, client will check if there's already a server and start one if not.
|
2022-05-12 17:35:25 +08:00
|
|
|
#[cfg(not(any(target_os = "android", target_os = "ios")))]
|
|
|
|
#[tokio::main]
|
|
|
|
pub async fn start_server(is_server: bool) {
|
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
{
|
|
|
|
log::info!("DISPLAY={:?}", std::env::var("DISPLAY"));
|
|
|
|
log::info!("XAUTHORITY={:?}", std::env::var("XAUTHORITY"));
|
|
|
|
}
|
2022-07-08 18:18:58 +08:00
|
|
|
#[cfg(feature = "hwcodec")]
|
|
|
|
{
|
|
|
|
use std::sync::Once;
|
|
|
|
static ONCE: Once = Once::new();
|
|
|
|
ONCE.call_once(|| {
|
|
|
|
scrap::hwcodec::check_config_process(false);
|
|
|
|
})
|
|
|
|
}
|
2022-05-12 17:35:25 +08:00
|
|
|
|
|
|
|
if is_server {
|
|
|
|
std::thread::spawn(move || {
|
|
|
|
if let Err(err) = crate::ipc::start("") {
|
|
|
|
log::error!("Failed to start ipc: {}", err);
|
|
|
|
std::process::exit(-1);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
#[cfg(windows)]
|
|
|
|
crate::platform::windows::bootstrap();
|
|
|
|
input_service::fix_key_down_timeout_loop();
|
2022-11-30 10:28:03 +08:00
|
|
|
#[cfg(target_os = "linux")]
|
|
|
|
if crate::platform::current_is_wayland() {
|
|
|
|
allow_err!(input_service::setup_uinput(0, 1920, 0, 1080).await);
|
|
|
|
}
|
2022-05-12 17:35:25 +08:00
|
|
|
#[cfg(target_os = "macos")]
|
|
|
|
tokio::spawn(async { sync_and_watch_config_dir().await });
|
|
|
|
crate::RendezvousMediator::start_all().await;
|
|
|
|
} else {
|
|
|
|
match crate::ipc::connect(1000, "").await {
|
|
|
|
Ok(mut conn) => {
|
|
|
|
if conn.send(&Data::SyncConfig(None)).await.is_ok() {
|
|
|
|
if let Ok(Some(data)) = conn.next_timeout(1000).await {
|
|
|
|
match data {
|
|
|
|
Data::SyncConfig(Some((config, config2))) => {
|
|
|
|
if Config::set(config) {
|
|
|
|
log::info!("config synced");
|
|
|
|
}
|
|
|
|
if Config2::set(config2) {
|
|
|
|
log::info!("config2 synced");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(err) => {
|
|
|
|
log::info!("server not started (will try to start): {}", err);
|
|
|
|
std::thread::spawn(|| start_server(true));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(target_os = "macos")]
|
|
|
|
async fn sync_and_watch_config_dir() {
|
|
|
|
if crate::platform::is_root() {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut cfg0 = (Config::get(), Config2::get());
|
|
|
|
let mut synced = false;
|
|
|
|
let tries =
|
|
|
|
if std::env::args().len() == 2 && std::env::args().nth(1) == Some("--server".to_owned()) {
|
|
|
|
30
|
|
|
|
} else {
|
|
|
|
3
|
|
|
|
};
|
|
|
|
log::debug!("#tries of ipc service connection: {}", tries);
|
|
|
|
use hbb_common::sleep;
|
|
|
|
for i in 1..=tries {
|
|
|
|
sleep(i as f32 * 0.3).await;
|
|
|
|
match crate::ipc::connect(1000, "_service").await {
|
|
|
|
Ok(mut conn) => {
|
|
|
|
if !synced {
|
|
|
|
if conn.send(&Data::SyncConfig(None)).await.is_ok() {
|
|
|
|
if let Ok(Some(data)) = conn.next_timeout(1000).await {
|
|
|
|
match data {
|
|
|
|
Data::SyncConfig(Some((config, config2))) => {
|
|
|
|
let _chk = crate::ipc::CheckIfRestart::new();
|
|
|
|
if cfg0.0 != config {
|
|
|
|
cfg0.0 = config.clone();
|
|
|
|
Config::set(config);
|
|
|
|
log::info!("sync config from root");
|
|
|
|
}
|
|
|
|
if cfg0.1 != config2 {
|
|
|
|
cfg0.1 = config2.clone();
|
|
|
|
Config2::set(config2);
|
|
|
|
log::info!("sync config2 from root");
|
|
|
|
}
|
|
|
|
synced = true;
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
loop {
|
|
|
|
sleep(0.3).await;
|
|
|
|
let cfg = (Config::get(), Config2::get());
|
|
|
|
if cfg != cfg0 {
|
|
|
|
log::info!("config updated, sync to root");
|
|
|
|
match conn.send(&Data::SyncConfig(Some(cfg.clone()))).await {
|
|
|
|
Err(e) => {
|
|
|
|
log::error!("sync config to root failed: {}", e);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
cfg0 = cfg;
|
|
|
|
conn.next_timeout(1000).await.ok();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(_) => {
|
|
|
|
log::info!("#{} try: failed to connect to ipc_service", i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-06-05 18:02:54 +08:00
|
|
|
log::warn!("skipped config sync");
|
2022-05-12 17:35:25 +08:00
|
|
|
}
|