mirror of
https://github.com/therealaleph/MasterHttpRelayVPN-RUST.git
synced 2026-05-17 21:24:48 +03:00
Add Android app with full TUN bridge + two proxy fixes the desktop also wants (#29)
The app is a Kotlin/Compose front-end that reuses the mhrv-rs crate
via JNI. It speaks VpnService to get a TUN fd, hands that to tun2proxy,
and funnels every app's traffic through the in-process SOCKS5 listener —
no per-app proxy setup on the device.
Two fixes in `src/proxy_server.rs` apply to desktop builds too:
* SNI peek via `LazyConfigAcceptor`. When a browser uses DoH (Chrome's
default), tun2proxy hands us a raw IP in the SOCKS5 CONNECT. Minting
a MITM cert for the IP produced `ERR_CERT_COMMON_NAME_INVALID` on
Cloudflare-fronted sites. We now read the ClientHello's SNI first
and use that both as the cert subject and as the upstream host for
the Apps Script relay (fetching `https://<IP>/...` with an IP in the
Host header gets rejected by CF anyway).
* Short-circuit CORS preflight at the MITM boundary. `UrlFetchApp.fetch()`
rejects `OPTIONS` with a Swedish "Ett attribut med ogiltigt värde
har angetts: method" error, which silently broke every fetch()/XHR
preflight and was the root cause of "JS doesn't load" on Discord,
Yahoo, and similar. Since we already terminate the TLS the browser
talks to, answering the preflight with a permissive 204 is safe —
the real request still goes through the relay.
Android-side capabilities (feature-parity with `mhrv-rs-ui` where it
fits on a phone):
* multi-deployment ID editor
* SNI rotation pool + per-SNI "Test" + "Test all" (JNI into scan_sni)
* live logs panel (JNI ring buffer drained on a 500 ms poll)
* Advanced section: verify_ssl, parallel_relay, log_level, upstream_socks5
* CA install flow that matches modern Android's reality: saves
`Downloads/mhrv-ca.crt` via MediaStore, deep-links Security settings,
then verifies post-hoc by fingerprint lookup in AndroidCAStore (the
KeyChain intent dead-ends with a Close-only dialog on Android 11+)
* Start/Stop debounced to dodge an emulator EGL renderer crash on
rapid taps
Theme matches the desktop palette exactly — always-dark, accent
`#4678B4`, card fill `#1C1E22`, 4dp button / 6dp card radii.
No dynamic color, no light scheme: the desktop is always dark and
we follow.
Build wiring:
* `Cargo.toml`: `cdylib` crate-type added; `jni` + `tun2proxy`
scoped to `cfg(target_os = "android")` so desktop builds pay
nothing.
* `src/data_dir.rs`: `set_data_dir()` override so the Android app's
private filesDir replaces the `directories` crate's desktop default.
* `src/android_jni.rs`: JNI entry points for start/stop/exportCa plus
a ring buffer draining to `Native.drainLogs()` and `testSni()` that
wraps `scan_sni::probe_one`.
* Gradle task chain runs `cargo ndk` before each assemble; post-step
normalizes tun2proxy's hash-suffixed cdylib to a stable filename
so `System.loadLibrary("tun2proxy")` works.
Verified end-to-end on an API 34 emulator: ipleak, yahoo, discord,
cloudflare.com all render; TLS is MITM-ed under our user-installed
CA; service survives rapid Stop/Start cycles.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
committed by
GitHub
parent
4cfd9d9652
commit
96d1352728
Generated
+1237
-12
File diff suppressed because it is too large
Load Diff
+17
@@ -8,6 +8,10 @@ license = "MIT"
|
|||||||
[lib]
|
[lib]
|
||||||
name = "mhrv_rs"
|
name = "mhrv_rs"
|
||||||
path = "src/lib.rs"
|
path = "src/lib.rs"
|
||||||
|
# `cdylib` lets the Android app dlopen libmhrv_rs.so via System.loadLibrary.
|
||||||
|
# `rlib` keeps the desktop binaries linking normally — same .rlib is used
|
||||||
|
# for `mhrv-rs` and `mhrv-rs-ui` builds on macOS/Linux/Windows.
|
||||||
|
crate-type = ["rlib", "cdylib"]
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "mhrv-rs"
|
name = "mhrv-rs"
|
||||||
@@ -62,6 +66,19 @@ eframe = { version = "0.28", default-features = false, features = [
|
|||||||
[target.'cfg(unix)'.dependencies]
|
[target.'cfg(unix)'.dependencies]
|
||||||
libc = "0.2"
|
libc = "0.2"
|
||||||
|
|
||||||
|
# Android-only deps: jni gives us the extern "system" wrappers used in
|
||||||
|
# src/android_jni.rs; zero cost on any other platform because the whole
|
||||||
|
# module is `#[cfg(target_os = "android")]`.
|
||||||
|
#
|
||||||
|
# tun2proxy is the TUN <-> SOCKS5 bridge — it reads raw IP packets from the
|
||||||
|
# fd VpnService hands us, runs a userspace TCP/IP stack (smoltcp under the
|
||||||
|
# hood), and funnels every TCP/UDP flow through our local SOCKS5. Without
|
||||||
|
# this, VpnService establishes a TUN device nothing reads from and all
|
||||||
|
# traffic black-holes (symptom: Chrome shows DNS_PROBE_STARTED).
|
||||||
|
[target.'cfg(target_os = "android")'.dependencies]
|
||||||
|
jni = { version = "0.21", default-features = false }
|
||||||
|
tun2proxy = { version = "0.7", default-features = false }
|
||||||
|
|
||||||
[dev-dependencies]
|
[dev-dependencies]
|
||||||
# Used in mitm tests to sanity-check the cert extensions we emit.
|
# Used in mitm tests to sanity-check the cert extensions we emit.
|
||||||
x509-parser = "0.16"
|
x509-parser = "0.16"
|
||||||
|
|||||||
@@ -0,0 +1,8 @@
|
|||||||
|
.gradle/
|
||||||
|
build/
|
||||||
|
app/build/
|
||||||
|
app/src/main/jniLibs/
|
||||||
|
local.properties
|
||||||
|
.idea/
|
||||||
|
*.iml
|
||||||
|
.DS_Store
|
||||||
@@ -0,0 +1,157 @@
|
|||||||
|
import org.gradle.api.tasks.Exec
|
||||||
|
|
||||||
|
plugins {
|
||||||
|
id("com.android.application")
|
||||||
|
id("org.jetbrains.kotlin.android")
|
||||||
|
id("org.jetbrains.kotlin.plugin.compose")
|
||||||
|
}
|
||||||
|
|
||||||
|
android {
|
||||||
|
namespace = "com.therealaleph.mhrv"
|
||||||
|
compileSdk = 34
|
||||||
|
|
||||||
|
defaultConfig {
|
||||||
|
applicationId = "com.therealaleph.mhrv"
|
||||||
|
minSdk = 24 // Android 7.0 — covers 99%+ of live devices.
|
||||||
|
targetSdk = 34
|
||||||
|
versionCode = 1
|
||||||
|
versionName = "0.1.0"
|
||||||
|
|
||||||
|
// Only arm64 for now — we can add armeabi-v7a in a second pass
|
||||||
|
// if field reports need it. Android emulators on Apple Silicon
|
||||||
|
// only run arm64 natively, so keeping things aarch64-only makes
|
||||||
|
// the dev loop fast.
|
||||||
|
ndk {
|
||||||
|
abiFilters += listOf("arm64-v8a")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
buildTypes {
|
||||||
|
release {
|
||||||
|
isMinifyEnabled = false
|
||||||
|
proguardFiles(
|
||||||
|
getDefaultProguardFile("proguard-android-optimize.txt"),
|
||||||
|
"proguard-rules.pro",
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
compileOptions {
|
||||||
|
sourceCompatibility = JavaVersion.VERSION_17
|
||||||
|
targetCompatibility = JavaVersion.VERSION_17
|
||||||
|
}
|
||||||
|
|
||||||
|
kotlinOptions {
|
||||||
|
jvmTarget = "17"
|
||||||
|
}
|
||||||
|
|
||||||
|
buildFeatures {
|
||||||
|
compose = true
|
||||||
|
buildConfig = true
|
||||||
|
}
|
||||||
|
|
||||||
|
// libmhrv_rs.so is produced by `cargo ndk` in the repo root and dropped
|
||||||
|
// under app/src/main/jniLibs/<abi>/. The cargoBuild task below runs
|
||||||
|
// that before each assembleDebug / assembleRelease.
|
||||||
|
sourceSets["main"].jniLibs.srcDirs("src/main/jniLibs")
|
||||||
|
|
||||||
|
packaging {
|
||||||
|
resources.excludes += setOf(
|
||||||
|
"META-INF/AL2.0",
|
||||||
|
"META-INF/LGPL2.1",
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
val composeBom = platform("androidx.compose:compose-bom:2024.06.00")
|
||||||
|
implementation(composeBom)
|
||||||
|
androidTestImplementation(composeBom)
|
||||||
|
|
||||||
|
implementation("androidx.core:core-ktx:1.13.1")
|
||||||
|
implementation("androidx.activity:activity-compose:1.9.0")
|
||||||
|
implementation("androidx.lifecycle:lifecycle-runtime-ktx:2.8.2")
|
||||||
|
implementation("androidx.lifecycle:lifecycle-viewmodel-compose:2.8.2")
|
||||||
|
|
||||||
|
// Compose UI.
|
||||||
|
implementation("androidx.compose.ui:ui")
|
||||||
|
implementation("androidx.compose.ui:ui-graphics")
|
||||||
|
implementation("androidx.compose.ui:ui-tooling-preview")
|
||||||
|
implementation("androidx.compose.material3:material3")
|
||||||
|
implementation("androidx.compose.material:material-icons-extended")
|
||||||
|
|
||||||
|
debugImplementation("androidx.compose.ui:ui-tooling")
|
||||||
|
debugImplementation("androidx.compose.ui:ui-test-manifest")
|
||||||
|
}
|
||||||
|
|
||||||
|
// --------------------------------------------------------------------------
|
||||||
|
// Cross-compile the Rust crate to arm64 Android and drop the .so into the
|
||||||
|
// place Android's packager looks. We hand the work off to `cargo ndk` which
|
||||||
|
// wraps the right CC / AR / linker env vars for us.
|
||||||
|
//
|
||||||
|
// This ties to the `assemble*` task so every debug/release build triggers
|
||||||
|
// a `cargo ndk` — no manual step. In CI we'd cache the target/ dir to
|
||||||
|
// avoid full rebuilds.
|
||||||
|
// --------------------------------------------------------------------------
|
||||||
|
val rustCrateDir = rootProject.projectDir.parentFile
|
||||||
|
val jniLibsDir = file("src/main/jniLibs")
|
||||||
|
|
||||||
|
// After cargo-ndk dumps artifacts into jniLibs/arm64-v8a/, the tun2proxy
|
||||||
|
// cdylib lands as `libtun2proxy-<hash>.so` (rustc's deps/ naming convention,
|
||||||
|
// because tun2proxy is a transitive dep not a root crate). Android's
|
||||||
|
// System.loadLibrary expects a stable name, and the hash changes between
|
||||||
|
// builds, so we normalize it to `libtun2proxy.so` here. Also deletes any
|
||||||
|
// stale hash-suffixed copies from previous builds.
|
||||||
|
fun normalizeTun2proxySo() {
|
||||||
|
val abiDir = file("src/main/jniLibs/arm64-v8a")
|
||||||
|
if (!abiDir.isDirectory) return
|
||||||
|
val hashed = abiDir.listFiles { f -> f.name.matches(Regex("libtun2proxy-[0-9a-f]+\\.so")) }
|
||||||
|
?: emptyArray()
|
||||||
|
// Keep only the newest (release build) and rename it.
|
||||||
|
val newest = hashed.maxByOrNull { it.lastModified() }
|
||||||
|
if (newest != null) {
|
||||||
|
val target = abiDir.resolve("libtun2proxy.so")
|
||||||
|
if (target.exists()) target.delete()
|
||||||
|
newest.copyTo(target, overwrite = true)
|
||||||
|
}
|
||||||
|
hashed.forEach { it.delete() }
|
||||||
|
}
|
||||||
|
|
||||||
|
tasks.register<Exec>("cargoBuildDebug") {
|
||||||
|
group = "build"
|
||||||
|
// Intentionally ALWAYS uses --release. The Rust debug build is 80+MB
|
||||||
|
// of unoptimized object code vs 3MB with release; the 20x APK bloat is
|
||||||
|
// never worth it just for a Rust stack trace you wouldn't see in
|
||||||
|
// logcat anyway. If you need Rust debug symbols, temporarily drop
|
||||||
|
// `--release` below and accept the APK size.
|
||||||
|
description = "Cross-compile mhrv_rs for arm64-v8a (release — same as cargoBuildRelease)"
|
||||||
|
workingDir = rustCrateDir
|
||||||
|
commandLine(
|
||||||
|
"cargo", "ndk",
|
||||||
|
"-t", "arm64-v8a",
|
||||||
|
"-o", jniLibsDir.absolutePath,
|
||||||
|
"build", "--release",
|
||||||
|
)
|
||||||
|
doLast { normalizeTun2proxySo() }
|
||||||
|
}
|
||||||
|
|
||||||
|
tasks.register<Exec>("cargoBuildRelease") {
|
||||||
|
group = "build"
|
||||||
|
description = "Cross-compile mhrv_rs for arm64-v8a (release)"
|
||||||
|
workingDir = rustCrateDir
|
||||||
|
commandLine(
|
||||||
|
"cargo", "ndk",
|
||||||
|
"-t", "arm64-v8a",
|
||||||
|
"-o", jniLibsDir.absolutePath,
|
||||||
|
"build", "--release",
|
||||||
|
)
|
||||||
|
doLast { normalizeTun2proxySo() }
|
||||||
|
}
|
||||||
|
|
||||||
|
// Hook the right cargo task in front of each Android build variant.
|
||||||
|
tasks.configureEach {
|
||||||
|
when (name) {
|
||||||
|
"mergeDebugJniLibFolders" -> dependsOn("cargoBuildDebug")
|
||||||
|
"mergeReleaseJniLibFolders" -> dependsOn("cargoBuildRelease")
|
||||||
|
}
|
||||||
|
}
|
||||||
Vendored
+5
@@ -0,0 +1,5 @@
|
|||||||
|
# Keep our JNI entry points so R8 doesn't strip them in release builds.
|
||||||
|
# These methods are declared `external` in Kotlin — the JNI linker looks
|
||||||
|
# them up by exact name at load time.
|
||||||
|
-keep class com.therealaleph.mhrv.Native { *; }
|
||||||
|
-keep class com.therealaleph.mhrv.MhrvVpnService { *; }
|
||||||
@@ -0,0 +1,54 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
||||||
|
xmlns:tools="http://schemas.android.com/tools">
|
||||||
|
|
||||||
|
<uses-permission android:name="android.permission.INTERNET" />
|
||||||
|
<uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
|
||||||
|
<uses-permission android:name="android.permission.FOREGROUND_SERVICE" />
|
||||||
|
<uses-permission android:name="android.permission.FOREGROUND_SERVICE_SPECIAL_USE" />
|
||||||
|
<uses-permission android:name="android.permission.POST_NOTIFICATIONS" />
|
||||||
|
|
||||||
|
<application
|
||||||
|
android:allowBackup="false"
|
||||||
|
android:dataExtractionRules="@xml/data_extraction_rules"
|
||||||
|
android:fullBackupContent="false"
|
||||||
|
android:icon="@mipmap/ic_launcher"
|
||||||
|
android:label="@string/app_name"
|
||||||
|
android:networkSecurityConfig="@xml/network_security_config"
|
||||||
|
android:supportsRtl="true"
|
||||||
|
android:theme="@style/Theme.Mhrv"
|
||||||
|
tools:targetApi="34">
|
||||||
|
|
||||||
|
<activity
|
||||||
|
android:name=".MainActivity"
|
||||||
|
android:exported="true"
|
||||||
|
android:launchMode="singleTask"
|
||||||
|
android:theme="@style/Theme.Mhrv">
|
||||||
|
<intent-filter>
|
||||||
|
<action android:name="android.intent.action.MAIN" />
|
||||||
|
<category android:name="android.intent.category.LAUNCHER" />
|
||||||
|
</intent-filter>
|
||||||
|
</activity>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
VpnService: Android captures all traffic at the IP layer and feeds
|
||||||
|
it to us via a TUN file descriptor. The android.net.VpnService action
|
||||||
|
is what lets the system show us in the "VPN" section of settings
|
||||||
|
and route through us.
|
||||||
|
-->
|
||||||
|
<service
|
||||||
|
android:name=".MhrvVpnService"
|
||||||
|
android:exported="false"
|
||||||
|
android:permission="android.permission.BIND_VPN_SERVICE"
|
||||||
|
android:foregroundServiceType="specialUse">
|
||||||
|
<intent-filter>
|
||||||
|
<action android:name="android.net.VpnService" />
|
||||||
|
</intent-filter>
|
||||||
|
<property
|
||||||
|
android:name="android.app.PROPERTY_SPECIAL_USE_FGS_SUBTYPE"
|
||||||
|
android:value="vpn_relay" />
|
||||||
|
</service>
|
||||||
|
|
||||||
|
</application>
|
||||||
|
|
||||||
|
</manifest>
|
||||||
@@ -0,0 +1,67 @@
|
|||||||
|
package com.github.shadowsocks.bg
|
||||||
|
|
||||||
|
/**
|
||||||
|
* JNI bridge to the tun2proxy crate's Android entry points.
|
||||||
|
*
|
||||||
|
* The tun2proxy Rust crate (already pulled in as an Android-only dep of
|
||||||
|
* libmhrv_rs) defines its C entry points under this exact package path:
|
||||||
|
* Java_com_github_shadowsocks_bg_Tun2proxy_run
|
||||||
|
* Java_com_github_shadowsocks_bg_Tun2proxy_stop
|
||||||
|
*
|
||||||
|
* That's why this file lives at `com.github.shadowsocks.bg` — we did NOT
|
||||||
|
* pick this package. Renaming it would break the JNI name mangling and
|
||||||
|
* the native functions would fail to resolve at runtime.
|
||||||
|
*
|
||||||
|
* The crate is reusing Shadowsocks-Android's original JNI convention.
|
||||||
|
*
|
||||||
|
* NOTE: the tun2proxy JNI symbols live in libtun2proxy.so (not libmhrv_rs.so).
|
||||||
|
* tun2proxy is pulled in as a Rust dep of mhrv-rs, but because nothing in
|
||||||
|
* mhrv-rs calls these symbols directly, Rust's rlib-level dead-code
|
||||||
|
* elimination drops them from libmhrv_rs.so. The cdylib variant of tun2proxy
|
||||||
|
* (which rustc builds alongside the rlib) retains them, so we ship that .so
|
||||||
|
* separately and load it explicitly here.
|
||||||
|
*/
|
||||||
|
object Tun2proxy {
|
||||||
|
|
||||||
|
init {
|
||||||
|
System.loadLibrary("tun2proxy")
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Start the TUN <-> proxy bridge.
|
||||||
|
*
|
||||||
|
* @param proxyUrl e.g. "socks5://127.0.0.1:1081"
|
||||||
|
* @param tunFd raw fd from VpnService.Builder#establish().detachFd()
|
||||||
|
* @param closeFdOnDrop whether tun2proxy should close the fd on shutdown.
|
||||||
|
* We detach and hand over ownership, so this is true.
|
||||||
|
* @param tunMtu MTU to match the VpnService setMtu() call.
|
||||||
|
* @param verbosity 0=off, 1=error, 2=warn, 3=info, 4=debug, 5=trace.
|
||||||
|
* Logs land in logcat under tag "tun2proxy".
|
||||||
|
* @param dnsStrategy 0=Virtual (fake-IP DNS, tun2proxy resolves via proxy),
|
||||||
|
* 1=OverTcp (UDP DNS tunneled as TCP via proxy),
|
||||||
|
* 2=Direct (DNS goes straight through VpnService.protect).
|
||||||
|
* Virtual is the right default here: app asks DNS for
|
||||||
|
* example.com, gets a fake 198.18.x.y, tries to connect,
|
||||||
|
* tun2proxy intercepts, knows the real hostname, opens
|
||||||
|
* SOCKS5 to our proxy with "example.com:443" as target.
|
||||||
|
* Our proxy does its own resolution via the Apps Script
|
||||||
|
* relay, so this gives us end-to-end name resolution
|
||||||
|
* without leaking plaintext DNS to the ISP.
|
||||||
|
*
|
||||||
|
* Returns 0 on normal shutdown, non-zero on error. BLOCKS until the TUN
|
||||||
|
* is torn down or `stop()` is called — call this from a background thread.
|
||||||
|
*/
|
||||||
|
@JvmStatic
|
||||||
|
external fun run(
|
||||||
|
proxyUrl: String,
|
||||||
|
tunFd: Int,
|
||||||
|
closeFdOnDrop: Boolean,
|
||||||
|
tunMtu: Char,
|
||||||
|
verbosity: Int,
|
||||||
|
dnsStrategy: Int,
|
||||||
|
): Int
|
||||||
|
|
||||||
|
/** Signals the running `run()` to shut down. Idempotent. */
|
||||||
|
@JvmStatic
|
||||||
|
external fun stop(): Int
|
||||||
|
}
|
||||||
@@ -0,0 +1,226 @@
|
|||||||
|
package com.therealaleph.mhrv
|
||||||
|
|
||||||
|
import android.content.ContentValues
|
||||||
|
import android.content.Context
|
||||||
|
import android.content.Intent
|
||||||
|
import android.os.Build
|
||||||
|
import android.os.Environment
|
||||||
|
import android.provider.MediaStore
|
||||||
|
import android.provider.Settings
|
||||||
|
import android.security.KeyChain
|
||||||
|
import android.util.Base64
|
||||||
|
import java.io.File
|
||||||
|
import java.security.KeyStore
|
||||||
|
import java.security.MessageDigest
|
||||||
|
import java.security.cert.CertificateFactory
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Helpers for the MITM-CA install UX.
|
||||||
|
*
|
||||||
|
* The flow has three steps:
|
||||||
|
* 1. `export()` — copy the CA cert from the Rust-managed dir
|
||||||
|
* (`<filesDir>/ca/ca.crt`) to a stable location (`<filesDir>/ca.crt`)
|
||||||
|
* the UI can hand to Android's system picker.
|
||||||
|
* 2. `buildInstallIntent()` — build a `KeyChain.createInstallIntent` loaded
|
||||||
|
* with the cert's DER bytes. Passing the bytes via `EXTRA_CERTIFICATE`
|
||||||
|
* is cleaner than handing Android a file Uri: no content-provider
|
||||||
|
* plumbing, no external-storage permission, and Android resolves the
|
||||||
|
* "VPN and apps" / "Wi-Fi" category on its own.
|
||||||
|
* 3. `isInstalled()` — after the system dialog returns we can't rely on
|
||||||
|
* the `resultCode` (Android 11+ opens a Settings activity that always
|
||||||
|
* returns `RESULT_CANCELED`), so we walk `AndroidCAStore` looking for
|
||||||
|
* a cert whose SHA-256 fingerprint matches ours. That keystore spans
|
||||||
|
* both system and user-installed CAs, so it's the ground truth.
|
||||||
|
*/
|
||||||
|
object CaInstall {
|
||||||
|
private const val CA_FILENAME = "ca.crt"
|
||||||
|
private const val CA_FRIENDLY_NAME = "mhrv-rs MITM CA"
|
||||||
|
|
||||||
|
/** Stable path where the UI stages the exported CA. */
|
||||||
|
fun caFile(ctx: Context): File = File(ctx.filesDir, CA_FILENAME)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Copy the current Rust-side CA cert to a UI-accessible path.
|
||||||
|
* Returns true only if the file exists and is non-empty on return —
|
||||||
|
* Native.exportCa is supposed to do that, but we re-check because a
|
||||||
|
* truncated write would make the install dialog look empty and the
|
||||||
|
* user would have no idea why.
|
||||||
|
*/
|
||||||
|
fun export(ctx: Context): Boolean {
|
||||||
|
val dest = caFile(ctx)
|
||||||
|
if (!Native.exportCa(dest.absolutePath)) return false
|
||||||
|
return dest.exists() && dest.length() > 0
|
||||||
|
}
|
||||||
|
|
||||||
|
/** DER-encoded bytes of the exported CA, or null if export hasn't run. */
|
||||||
|
fun readDer(ctx: Context): ByteArray? {
|
||||||
|
val f = caFile(ctx)
|
||||||
|
if (!f.exists()) return null
|
||||||
|
val raw = try { f.readBytes() } catch (_: Throwable) { return null }
|
||||||
|
return pemToDer(raw) ?: raw // fall back to treating it as DER
|
||||||
|
}
|
||||||
|
|
||||||
|
/** SHA-256 fingerprint of the CA cert (over DER bytes). */
|
||||||
|
fun fingerprint(ctx: Context): ByteArray? {
|
||||||
|
val der = readDer(ctx) ?: return null
|
||||||
|
return sha256(der)
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Pretty-print a fingerprint like "AA:BB:CC:...". */
|
||||||
|
fun fingerprintHex(bytes: ByteArray): String =
|
||||||
|
bytes.joinToString(":") { "%02X".format(it) }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Build the KeyChain install intent. The intent launches the system
|
||||||
|
* certificate picker pre-loaded with our cert — the user confirms a
|
||||||
|
* category (for modern Android that's "VPN and apps" or "Wi-Fi") and
|
||||||
|
* gives it a display name.
|
||||||
|
*/
|
||||||
|
fun buildInstallIntent(ctx: Context): Intent? {
|
||||||
|
val der = readDer(ctx) ?: return null
|
||||||
|
return KeyChain.createInstallIntent()
|
||||||
|
.putExtra(KeyChain.EXTRA_CERTIFICATE, der)
|
||||||
|
.putExtra(KeyChain.EXTRA_NAME, CA_FRIENDLY_NAME)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Save a PEM copy of the CA to the user's Downloads folder so they
|
||||||
|
* can find it in the Files app and pick it from Settings →
|
||||||
|
* Encryption & credentials → Install a certificate → CA certificate.
|
||||||
|
*
|
||||||
|
* On Android 10+ (API 29) this goes through MediaStore so we don't need
|
||||||
|
* WRITE_EXTERNAL_STORAGE. On older Android we fall back to the app's
|
||||||
|
* external files dir — visible via Files app but not in the system
|
||||||
|
* Downloads collection, so the user needs to navigate to
|
||||||
|
* `Android/data/<pkg>/files/Download/` themselves.
|
||||||
|
*
|
||||||
|
* Returns a human-readable location string ("Downloads/mhrv-ca.crt" or
|
||||||
|
* the filesystem path) on success, null on failure.
|
||||||
|
*/
|
||||||
|
fun saveToDownloads(ctx: Context, displayName: String = "mhrv-ca.crt"): String? {
|
||||||
|
val der = readDer(ctx) ?: return null
|
||||||
|
// Rewrap as PEM so users can open the file in a text editor and
|
||||||
|
// verify it's a cert before trusting it — also, the system cert
|
||||||
|
// installer expects PEM or DER but PEM is the more common form
|
||||||
|
// for user-visible files.
|
||||||
|
val pem = derToPem(der)
|
||||||
|
|
||||||
|
return if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.Q) {
|
||||||
|
saveViaMediaStore(ctx, displayName, pem)?.let { "Downloads/$displayName" }
|
||||||
|
} else {
|
||||||
|
// Pre-Q fallback: app-private external storage. Does NOT require
|
||||||
|
// a storage permission. Less discoverable for the user, but
|
||||||
|
// dodging the runtime-permission dance is worth it here — we
|
||||||
|
// can still deep-link Settings and tell them the path.
|
||||||
|
try {
|
||||||
|
val dir = ctx.getExternalFilesDir(Environment.DIRECTORY_DOWNLOADS) ?: return null
|
||||||
|
dir.mkdirs()
|
||||||
|
val f = File(dir, displayName)
|
||||||
|
f.writeBytes(pem)
|
||||||
|
f.absolutePath
|
||||||
|
} catch (_: Throwable) { null }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun saveViaMediaStore(ctx: Context, displayName: String, bytes: ByteArray): Boolean? {
|
||||||
|
val resolver = ctx.contentResolver
|
||||||
|
val values = ContentValues().apply {
|
||||||
|
put(MediaStore.MediaColumns.DISPLAY_NAME, displayName)
|
||||||
|
put(MediaStore.MediaColumns.MIME_TYPE, "application/x-x509-ca-cert")
|
||||||
|
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.Q) {
|
||||||
|
put(MediaStore.MediaColumns.RELATIVE_PATH, Environment.DIRECTORY_DOWNLOADS)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Delete any previous copy with the same name before inserting, so
|
||||||
|
// we don't accumulate `mhrv-ca (1).crt`, `mhrv-ca (2).crt` on repeat
|
||||||
|
// installs (MediaStore appends suffixes instead of overwriting).
|
||||||
|
try {
|
||||||
|
val sel = "${MediaStore.MediaColumns.DISPLAY_NAME}=?"
|
||||||
|
resolver.delete(MediaStore.Downloads.EXTERNAL_CONTENT_URI, sel, arrayOf(displayName))
|
||||||
|
} catch (_: Throwable) { /* best-effort */ }
|
||||||
|
|
||||||
|
val uri = resolver.insert(MediaStore.Downloads.EXTERNAL_CONTENT_URI, values) ?: return null
|
||||||
|
return try {
|
||||||
|
resolver.openOutputStream(uri)?.use { it.write(bytes) } ?: return null
|
||||||
|
true
|
||||||
|
} catch (_: Throwable) { null }
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Intent that opens the system "Security" settings screen. The exact
|
||||||
|
* landing page depends on OEM and Android version:
|
||||||
|
* - Pixel / stock AOSP: Settings → Security
|
||||||
|
* - from there the user navigates Encryption & credentials →
|
||||||
|
* Install a certificate → CA certificate → pick our .crt file.
|
||||||
|
*
|
||||||
|
* We tried KeyChain.createInstallIntent first (nicer flow) but on
|
||||||
|
* Android 11+ that intent just opens a dialog saying "Install CA
|
||||||
|
* certificates in Settings" with a Close button and no path forward —
|
||||||
|
* Google intentionally removed the inline install path. Settings is
|
||||||
|
* the fallback Google themselves point users at.
|
||||||
|
*/
|
||||||
|
fun buildSettingsIntent(): Intent = Intent(Settings.ACTION_SECURITY_SETTINGS)
|
||||||
|
.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* True iff a CA with this SHA-256 fingerprint lives in the
|
||||||
|
* AndroidCAStore (union of system + user-installed CAs). This is how
|
||||||
|
* we verify install success because the picker activity's result code
|
||||||
|
* is not reliable across Android versions.
|
||||||
|
*/
|
||||||
|
fun isInstalled(targetFingerprint: ByteArray): Boolean {
|
||||||
|
return try {
|
||||||
|
val ks = KeyStore.getInstance("AndroidCAStore")
|
||||||
|
ks.load(null)
|
||||||
|
val aliases = ks.aliases()
|
||||||
|
while (aliases.hasMoreElements()) {
|
||||||
|
val alias = aliases.nextElement()
|
||||||
|
val cert = ks.getCertificate(alias) ?: continue
|
||||||
|
val encoded = try { cert.encoded } catch (_: Throwable) { continue }
|
||||||
|
if (sha256(encoded).contentEquals(targetFingerprint)) return true
|
||||||
|
}
|
||||||
|
false
|
||||||
|
} catch (_: Throwable) { false }
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Subject CN of the exported CA, for display. */
|
||||||
|
fun subjectCn(ctx: Context): String? {
|
||||||
|
val der = readDer(ctx) ?: return null
|
||||||
|
return try {
|
||||||
|
val cf = CertificateFactory.getInstance("X.509")
|
||||||
|
val cert = cf.generateCertificate(der.inputStream()) as java.security.cert.X509Certificate
|
||||||
|
val dn = cert.subjectX500Principal.name // RFC 2253, CN=foo,O=bar
|
||||||
|
Regex("""CN=([^,]+)""").find(dn)?.groupValues?.get(1)
|
||||||
|
} catch (_: Throwable) { null }
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun sha256(data: ByteArray): ByteArray =
|
||||||
|
MessageDigest.getInstance("SHA-256").digest(data)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Rewrap DER bytes as PEM. We intentionally produce a textual cert —
|
||||||
|
* the user can `cat` it, the Settings cert picker accepts it, and it
|
||||||
|
* survives any copy/paste or email round-trip without binary mangling.
|
||||||
|
*/
|
||||||
|
private fun derToPem(der: ByteArray): ByteArray {
|
||||||
|
val b64 = Base64.encodeToString(der, Base64.NO_WRAP)
|
||||||
|
val chunks = b64.chunked(64).joinToString("\n")
|
||||||
|
val s = "-----BEGIN CERTIFICATE-----\n$chunks\n-----END CERTIFICATE-----\n"
|
||||||
|
return s.toByteArray(Charsets.US_ASCII)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Accept either DER or PEM bytes; return DER. PEM files carry a base64
|
||||||
|
* payload between -----BEGIN CERTIFICATE----- markers.
|
||||||
|
*/
|
||||||
|
private fun pemToDer(bytes: ByteArray): ByteArray? {
|
||||||
|
val s = try { bytes.toString(Charsets.US_ASCII) } catch (_: Throwable) { return null }
|
||||||
|
if (!s.contains("BEGIN CERTIFICATE")) return null // caller falls back to treating as DER
|
||||||
|
val body = s
|
||||||
|
.substringAfter("-----BEGIN CERTIFICATE-----", "")
|
||||||
|
.substringBefore("-----END CERTIFICATE-----", "")
|
||||||
|
.replace(Regex("\\s+"), "")
|
||||||
|
if (body.isEmpty()) return null
|
||||||
|
return try { Base64.decode(body, Base64.DEFAULT) } catch (_: Throwable) { null }
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,172 @@
|
|||||||
|
package com.therealaleph.mhrv
|
||||||
|
|
||||||
|
import android.content.Context
|
||||||
|
import org.json.JSONArray
|
||||||
|
import org.json.JSONObject
|
||||||
|
import java.io.File
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Config I/O. The source of truth is a JSON file in the app's files dir —
|
||||||
|
* the Rust side parses the same file, so we don't maintain two schemas.
|
||||||
|
*
|
||||||
|
* What the Android UI exposes is a pragmatic subset of the full mhrv-rs
|
||||||
|
* config, but we now track parity with the desktop UI on the dimensions
|
||||||
|
* that actually matter on a phone:
|
||||||
|
* - multiple deployment IDs (round-robin)
|
||||||
|
* - an SNI rotation pool
|
||||||
|
* - log level / verify_ssl / parallel_relay knobs
|
||||||
|
* Anything else gets phone-appropriate defaults.
|
||||||
|
*/
|
||||||
|
data class MhrvConfig(
|
||||||
|
val listenHost: String = "127.0.0.1",
|
||||||
|
val listenPort: Int = 8080,
|
||||||
|
val socks5Port: Int? = 1081,
|
||||||
|
|
||||||
|
/** One Apps Script ID or deployment URL per entry. */
|
||||||
|
val appsScriptUrls: List<String> = emptyList(),
|
||||||
|
val authKey: String = "",
|
||||||
|
|
||||||
|
val frontDomain: String = "www.google.com",
|
||||||
|
/** Rotation pool of SNI hostnames; empty means "let Rust auto-expand". */
|
||||||
|
val sniHosts: List<String> = emptyList(),
|
||||||
|
val googleIp: String = "142.251.36.68",
|
||||||
|
|
||||||
|
val verifySsl: Boolean = true,
|
||||||
|
val logLevel: String = "info",
|
||||||
|
val parallelRelay: Int = 1,
|
||||||
|
val upstreamSocks5: String = "",
|
||||||
|
) {
|
||||||
|
/**
|
||||||
|
* Extract just the deployment ID from either a full
|
||||||
|
* `https://script.google.com/macros/s/<ID>/exec` URL or a bare ID.
|
||||||
|
*
|
||||||
|
* Implementation note (this used to be buggy): never use the chained
|
||||||
|
* `substringBefore(delim, missingDelimiterValue)` form passing the
|
||||||
|
* original input as the fallback. Example of what that caused:
|
||||||
|
* "https://.../macros/s/X/exec"
|
||||||
|
* .substringAfter("/macros/s/", s) -> "X/exec"
|
||||||
|
* .substringBefore("/", s) -> "X"
|
||||||
|
* .substringBefore("?", s) -> FALLBACK fires because
|
||||||
|
* "?" isn't in "X",
|
||||||
|
* returning the ORIGINAL URL
|
||||||
|
* → we'd then save the full URL as the "ID", and on reload the UI
|
||||||
|
* would build `https://.../macros/s/<full-URL>/exec`, producing the
|
||||||
|
* "extra https:// and extra /exec" symptom users reported. Keep the
|
||||||
|
* extraction linear and don't reach for a fallback.
|
||||||
|
*/
|
||||||
|
private fun extractId(input: String): String {
|
||||||
|
var s = input.trim()
|
||||||
|
if (s.isEmpty()) return s
|
||||||
|
val marker = "/macros/s/"
|
||||||
|
val i = s.indexOf(marker)
|
||||||
|
if (i >= 0) s = s.substring(i + marker.length)
|
||||||
|
// Strip /exec or /dev suffix (or any path after the ID).
|
||||||
|
val slash = s.indexOf('/')
|
||||||
|
if (slash >= 0) s = s.substring(0, slash)
|
||||||
|
// Strip query string.
|
||||||
|
val q = s.indexOf('?')
|
||||||
|
if (q >= 0) s = s.substring(0, q)
|
||||||
|
return s.trim()
|
||||||
|
}
|
||||||
|
|
||||||
|
fun toJson(): String {
|
||||||
|
val ids = appsScriptUrls
|
||||||
|
.map { extractId(it) }
|
||||||
|
.filter { it.isNotEmpty() }
|
||||||
|
|
||||||
|
val obj = JSONObject().apply {
|
||||||
|
// `mode` is required — without it serde errors with
|
||||||
|
// "missing field `mode`" and startProxy silently returns 0.
|
||||||
|
put("mode", "apps_script")
|
||||||
|
put("listen_host", listenHost)
|
||||||
|
put("listen_port", listenPort)
|
||||||
|
socks5Port?.let { put("socks5_port", it) }
|
||||||
|
|
||||||
|
put("script_ids", JSONArray().apply { ids.forEach { put(it) } })
|
||||||
|
put("auth_key", authKey)
|
||||||
|
|
||||||
|
put("front_domain", frontDomain)
|
||||||
|
if (sniHosts.isNotEmpty()) {
|
||||||
|
put("sni_hosts", JSONArray().apply { sniHosts.forEach { put(it) } })
|
||||||
|
}
|
||||||
|
put("google_ip", googleIp)
|
||||||
|
|
||||||
|
put("verify_ssl", verifySsl)
|
||||||
|
put("log_level", logLevel)
|
||||||
|
put("parallel_relay", parallelRelay)
|
||||||
|
if (upstreamSocks5.isNotBlank()) {
|
||||||
|
put("upstream_socks5", upstreamSocks5.trim())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Phone-scoped scan defaults. We don't expose these in the UI
|
||||||
|
// because a phone isn't where you'd run a full /16 scan; users
|
||||||
|
// who need it can do that on the desktop UI and paste the IP.
|
||||||
|
put("fetch_ips_from_api", false)
|
||||||
|
put("max_ips_to_scan", 20)
|
||||||
|
}
|
||||||
|
return obj.toString(2)
|
||||||
|
}
|
||||||
|
|
||||||
|
/** Convenience: is there at least one usable deployment ID? */
|
||||||
|
val hasDeploymentId: Boolean get() =
|
||||||
|
appsScriptUrls.any { extractId(it).isNotEmpty() }
|
||||||
|
}
|
||||||
|
|
||||||
|
object ConfigStore {
|
||||||
|
private const val FILE = "config.json"
|
||||||
|
|
||||||
|
fun load(ctx: Context): MhrvConfig {
|
||||||
|
val f = File(ctx.filesDir, FILE)
|
||||||
|
if (!f.exists()) return MhrvConfig()
|
||||||
|
return try {
|
||||||
|
val obj = JSONObject(f.readText())
|
||||||
|
|
||||||
|
val ids = obj.optJSONArray("script_ids")?.let { arr ->
|
||||||
|
buildList { for (i in 0 until arr.length()) add(arr.optString(i)) }
|
||||||
|
}?.filter { it.isNotBlank() }.orEmpty()
|
||||||
|
// For display we turn each ID back into the full URL form —
|
||||||
|
// easier to paste-verify, and the Kotlin side doesn't depend
|
||||||
|
// on it (extractId re-parses on save).
|
||||||
|
val urls = ids.map { "https://script.google.com/macros/s/$it/exec" }
|
||||||
|
|
||||||
|
val sni = obj.optJSONArray("sni_hosts")?.let { arr ->
|
||||||
|
buildList { for (i in 0 until arr.length()) add(arr.optString(i)) }
|
||||||
|
}?.filter { it.isNotBlank() }.orEmpty()
|
||||||
|
|
||||||
|
MhrvConfig(
|
||||||
|
listenHost = obj.optString("listen_host", "127.0.0.1"),
|
||||||
|
listenPort = obj.optInt("listen_port", 8080),
|
||||||
|
socks5Port = obj.optInt("socks5_port", 1081).takeIf { it > 0 },
|
||||||
|
appsScriptUrls = urls,
|
||||||
|
authKey = obj.optString("auth_key", ""),
|
||||||
|
frontDomain = obj.optString("front_domain", "www.google.com"),
|
||||||
|
sniHosts = sni,
|
||||||
|
googleIp = obj.optString("google_ip", "142.251.36.68"),
|
||||||
|
verifySsl = obj.optBoolean("verify_ssl", true),
|
||||||
|
logLevel = obj.optString("log_level", "info"),
|
||||||
|
parallelRelay = obj.optInt("parallel_relay", 1),
|
||||||
|
upstreamSocks5 = obj.optString("upstream_socks5", ""),
|
||||||
|
)
|
||||||
|
} catch (_: Throwable) {
|
||||||
|
MhrvConfig()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fun save(ctx: Context, cfg: MhrvConfig) {
|
||||||
|
val f = File(ctx.filesDir, FILE)
|
||||||
|
f.writeText(cfg.toJson())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Default SNI rotation pool. Mirrors `DEFAULT_GOOGLE_SNI_POOL` from the
|
||||||
|
* Rust `domain_fronter` module — keep the lists in sync, or leave the
|
||||||
|
* user's sniHosts empty and let Rust auto-expand.
|
||||||
|
*/
|
||||||
|
val DEFAULT_SNI_POOL: List<String> = listOf(
|
||||||
|
"www.google.com",
|
||||||
|
"mail.google.com",
|
||||||
|
"drive.google.com",
|
||||||
|
"docs.google.com",
|
||||||
|
"calendar.google.com",
|
||||||
|
)
|
||||||
@@ -0,0 +1,142 @@
|
|||||||
|
package com.therealaleph.mhrv
|
||||||
|
|
||||||
|
import android.Manifest
|
||||||
|
import android.app.Activity
|
||||||
|
import android.content.Intent
|
||||||
|
import android.content.pm.PackageManager
|
||||||
|
import android.net.VpnService
|
||||||
|
import android.os.Build
|
||||||
|
import android.os.Bundle
|
||||||
|
import androidx.activity.ComponentActivity
|
||||||
|
import androidx.activity.compose.rememberLauncherForActivityResult
|
||||||
|
import androidx.activity.compose.setContent
|
||||||
|
import androidx.activity.result.contract.ActivityResultContracts
|
||||||
|
import androidx.compose.runtime.Composable
|
||||||
|
import androidx.compose.runtime.getValue
|
||||||
|
import androidx.compose.runtime.mutableStateOf
|
||||||
|
import androidx.compose.runtime.remember
|
||||||
|
import androidx.compose.runtime.setValue
|
||||||
|
import androidx.core.app.ActivityCompat
|
||||||
|
import androidx.core.content.ContextCompat
|
||||||
|
import com.therealaleph.mhrv.ui.CaInstallOutcome
|
||||||
|
import com.therealaleph.mhrv.ui.HomeScreen
|
||||||
|
import com.therealaleph.mhrv.ui.theme.MhrvTheme
|
||||||
|
|
||||||
|
class MainActivity : ComponentActivity() {
|
||||||
|
|
||||||
|
override fun onCreate(savedInstanceState: Bundle?) {
|
||||||
|
super.onCreate(savedInstanceState)
|
||||||
|
Native.setDataDir(filesDir.absolutePath)
|
||||||
|
|
||||||
|
// Android 13+ needs runtime permission for foreground service
|
||||||
|
// notifications. Ask once at launch — if the user declines the
|
||||||
|
// service still runs, it just won't surface a notification.
|
||||||
|
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.TIRAMISU) {
|
||||||
|
if (ContextCompat.checkSelfPermission(
|
||||||
|
this, Manifest.permission.POST_NOTIFICATIONS,
|
||||||
|
) != PackageManager.PERMISSION_GRANTED
|
||||||
|
) {
|
||||||
|
ActivityCompat.requestPermissions(
|
||||||
|
this,
|
||||||
|
arrayOf(Manifest.permission.POST_NOTIFICATIONS),
|
||||||
|
REQ_NOTIF,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
setContent {
|
||||||
|
MhrvTheme {
|
||||||
|
AppRoot()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun AppRoot() {
|
||||||
|
// The system VpnService.prepare() returns an Intent if the user
|
||||||
|
// hasn't approved VPN access yet; if null, we're already approved
|
||||||
|
// and can start directly.
|
||||||
|
val vpnPrepareLauncher = rememberLauncherForActivityResult(
|
||||||
|
ActivityResultContracts.StartActivityForResult(),
|
||||||
|
) { result ->
|
||||||
|
if (result.resultCode == Activity.RESULT_OK) {
|
||||||
|
startVpnService()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CA install flow. We hold the fingerprint of the cert we fired the
|
||||||
|
// intent with so we can look it up in AndroidCAStore after the
|
||||||
|
// picker returns — the resultCode itself is unreliable on Android
|
||||||
|
// 11+ (the system always returns RESULT_CANCELED from the Settings
|
||||||
|
// shim), so fingerprint verification is our ground truth.
|
||||||
|
var pendingFingerprint by remember { mutableStateOf<ByteArray?>(null) }
|
||||||
|
// Human-readable path where we saved the cert copy (e.g.
|
||||||
|
// "Downloads/mhrv-ca.crt"). Shown in the outcome snackbar so the
|
||||||
|
// user knows where to find it if they need to install manually
|
||||||
|
// or share it.
|
||||||
|
var pendingDownloadPath by remember { mutableStateOf<String?>(null) }
|
||||||
|
var caOutcome by remember { mutableStateOf<CaInstallOutcome?>(null) }
|
||||||
|
|
||||||
|
val installCaLauncher = rememberLauncherForActivityResult(
|
||||||
|
ActivityResultContracts.StartActivityForResult(),
|
||||||
|
) { _ ->
|
||||||
|
val fp = pendingFingerprint
|
||||||
|
caOutcome = when {
|
||||||
|
fp == null -> CaInstallOutcome.Failed("Internal error: no fingerprint")
|
||||||
|
CaInstall.isInstalled(fp) -> CaInstallOutcome.Installed
|
||||||
|
else -> CaInstallOutcome.NotInstalled(pendingDownloadPath)
|
||||||
|
}
|
||||||
|
pendingFingerprint = null
|
||||||
|
pendingDownloadPath = null
|
||||||
|
}
|
||||||
|
|
||||||
|
HomeScreen(
|
||||||
|
onStart = {
|
||||||
|
val prepareIntent = VpnService.prepare(this)
|
||||||
|
if (prepareIntent == null) {
|
||||||
|
startVpnService()
|
||||||
|
} else {
|
||||||
|
vpnPrepareLauncher.launch(prepareIntent)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
onStop = {
|
||||||
|
val i = Intent(this, MhrvVpnService::class.java)
|
||||||
|
.setAction(MhrvVpnService.ACTION_STOP)
|
||||||
|
startService(i)
|
||||||
|
},
|
||||||
|
onInstallCaConfirmed = {
|
||||||
|
// The flow is (1) export cert, (2) copy it to Downloads so
|
||||||
|
// the user can find it in the Files app, (3) deep-link to
|
||||||
|
// Security Settings where they can tap "Install a
|
||||||
|
// certificate". On return we verify via AndroidCAStore.
|
||||||
|
//
|
||||||
|
// We explicitly DO NOT use KeyChain.createInstallIntent —
|
||||||
|
// on Android 11+ that intent just opens a dead-end
|
||||||
|
// "Install in Settings" dialog with no path forward, which
|
||||||
|
// is confusing for users.
|
||||||
|
val fp = CaInstall.fingerprint(this)
|
||||||
|
val downloadPath = CaInstall.saveToDownloads(this)
|
||||||
|
if (fp != null) {
|
||||||
|
pendingFingerprint = fp
|
||||||
|
pendingDownloadPath = downloadPath
|
||||||
|
installCaLauncher.launch(CaInstall.buildSettingsIntent())
|
||||||
|
} else {
|
||||||
|
caOutcome = CaInstallOutcome.Failed(
|
||||||
|
"Couldn't read the CA cert. Tap Start once so the proxy creates it, then try again.",
|
||||||
|
)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
caOutcome = caOutcome,
|
||||||
|
onCaOutcomeConsumed = { caOutcome = null },
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun startVpnService() {
|
||||||
|
val i = Intent(this, MhrvVpnService::class.java)
|
||||||
|
startService(i)
|
||||||
|
}
|
||||||
|
|
||||||
|
companion object {
|
||||||
|
private const val REQ_NOTIF = 42
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,280 @@
|
|||||||
|
package com.therealaleph.mhrv
|
||||||
|
|
||||||
|
import android.app.Notification
|
||||||
|
import android.app.NotificationChannel
|
||||||
|
import android.app.NotificationManager
|
||||||
|
import android.app.PendingIntent
|
||||||
|
import android.content.Intent
|
||||||
|
import android.net.VpnService
|
||||||
|
import android.os.Build
|
||||||
|
import android.os.ParcelFileDescriptor
|
||||||
|
import android.util.Log
|
||||||
|
import androidx.core.app.NotificationCompat
|
||||||
|
import com.github.shadowsocks.bg.Tun2proxy
|
||||||
|
import java.util.concurrent.atomic.AtomicBoolean
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Foreground VpnService that:
|
||||||
|
* 1. Runs the mhrv-rs Rust proxy (HTTP + SOCKS5 on 127.0.0.1).
|
||||||
|
* 2. Establishes a VPN TUN interface capturing all device traffic.
|
||||||
|
* 3. Spawns tun2proxy in a background thread — it reads IP packets from
|
||||||
|
* the TUN fd, runs a userspace TCP/IP stack, and funnels every TCP/UDP
|
||||||
|
* flow through our local SOCKS5. Without step 3 the TUN captures
|
||||||
|
* traffic but nothing reads it → DNS_PROBE_STARTED in Chrome (the
|
||||||
|
* symptom that bit us on the first run).
|
||||||
|
*
|
||||||
|
* Loop-avoidance note: our own proxy's OUTBOUND connections to
|
||||||
|
* google_ip:443 would normally be re-captured by the TUN ("traffic goes in
|
||||||
|
* circles"). We break the loop by excluding this app's UID from the VPN
|
||||||
|
* via `addDisallowedApplication(packageName)`. Everything else on the
|
||||||
|
* device still gets routed through us.
|
||||||
|
*/
|
||||||
|
class MhrvVpnService : VpnService() {
|
||||||
|
|
||||||
|
private var tun: ParcelFileDescriptor? = null
|
||||||
|
private var proxyHandle: Long = 0L
|
||||||
|
private var tun2proxyThread: Thread? = null
|
||||||
|
private val tun2proxyRunning = AtomicBoolean(false)
|
||||||
|
|
||||||
|
override fun onStartCommand(intent: Intent?, flags: Int, startId: Int): Int {
|
||||||
|
Log.i(TAG, "onStartCommand action=${intent?.action ?: "<null>"} startId=$startId")
|
||||||
|
return when (intent?.action) {
|
||||||
|
ACTION_STOP -> {
|
||||||
|
// Drop foreground FIRST — that's what makes the status-bar
|
||||||
|
// key icon disappear and lets the user see "Stop worked"
|
||||||
|
// even if the native teardown below takes a few seconds
|
||||||
|
// (e.g. a dozen in-flight Apps Script requests stuck in
|
||||||
|
// their 30s timeout). The service itself stays alive until
|
||||||
|
// stopSelf + the background thread below finish.
|
||||||
|
try { stopForeground(STOP_FOREGROUND_REMOVE) } catch (t: Throwable) {
|
||||||
|
Log.w(TAG, "stopForeground: ${t.message}")
|
||||||
|
}
|
||||||
|
// Teardown can block on native shutdown (rt.shutdown_timeout
|
||||||
|
// is 5s max, plus 2s for the tun2proxy join). Do it off the
|
||||||
|
// main thread so we don't ANR.
|
||||||
|
Thread({
|
||||||
|
teardown()
|
||||||
|
stopSelf()
|
||||||
|
Log.i(TAG, "teardown done, service stopping")
|
||||||
|
}, "mhrv-teardown").start()
|
||||||
|
START_NOT_STICKY
|
||||||
|
}
|
||||||
|
else -> {
|
||||||
|
startEverything()
|
||||||
|
START_STICKY
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun startEverything() {
|
||||||
|
// 1) Seed native with our app's private dir and boot the proxy.
|
||||||
|
Native.setDataDir(filesDir.absolutePath)
|
||||||
|
|
||||||
|
val cfg = ConfigStore.load(this)
|
||||||
|
if (!cfg.hasDeploymentId || cfg.authKey.isBlank()) {
|
||||||
|
Log.e(TAG, "Config is incomplete — can't start proxy")
|
||||||
|
stopSelf()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Defensive stop: if a previous startEverything left a handle behind
|
||||||
|
// (e.g. the user tapped Start twice, or a Stop path errored out
|
||||||
|
// mid-teardown), release it first. Without this, Native.startProxy
|
||||||
|
// below binds a brand-new listener while the old one still holds
|
||||||
|
// :listenPort → "Address already in use" from the Rust side and the
|
||||||
|
// app looks stuck in a half-configured state.
|
||||||
|
if (proxyHandle != 0L) {
|
||||||
|
Log.w(TAG, "startEverything: stale proxyHandle=$proxyHandle; stopping old proxy first")
|
||||||
|
try { Native.stopProxy(proxyHandle) } catch (_: Throwable) {}
|
||||||
|
proxyHandle = 0L
|
||||||
|
}
|
||||||
|
|
||||||
|
proxyHandle = Native.startProxy(cfg.toJson())
|
||||||
|
if (proxyHandle == 0L) {
|
||||||
|
Log.e(TAG, "Native.startProxy returned 0 — see logcat tag mhrv_rs")
|
||||||
|
stopSelf()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
val socks5Port = cfg.socks5Port ?: (cfg.listenPort + 1)
|
||||||
|
|
||||||
|
// 2) Establish the TUN. Key Builder calls:
|
||||||
|
// - addAddress(10.0.0.2/32): our local IP inside the tunnel.
|
||||||
|
// - addRoute(0.0.0.0/0): capture ALL IPv4 traffic. IPv6 isn't added,
|
||||||
|
// so v6 leaks stay up the normal route — fine for this app.
|
||||||
|
// - addDnsServer(1.1.1.1): DNS queries go to this IP, which ALSO
|
||||||
|
// hits our TUN — tun2proxy intercepts in Virtual DNS mode.
|
||||||
|
// - addDisallowedApplication(packageName): our OWN outbound
|
||||||
|
// connections bypass the TUN. Without this, the proxy's
|
||||||
|
// outbound to google_ip loops back through the TUN forever.
|
||||||
|
// - setBlocking(false): we're going to hand the fd to tun2proxy,
|
||||||
|
// which does its own async I/O.
|
||||||
|
val builder = Builder()
|
||||||
|
.setSession("mhrv-rs")
|
||||||
|
.setMtu(MTU)
|
||||||
|
.addAddress("10.0.0.2", 32)
|
||||||
|
.addRoute("0.0.0.0", 0)
|
||||||
|
.addDnsServer("1.1.1.1")
|
||||||
|
.setBlocking(false)
|
||||||
|
try {
|
||||||
|
builder.addDisallowedApplication(packageName)
|
||||||
|
} catch (e: Throwable) {
|
||||||
|
// Shouldn't happen for our own package, but don't hard-fail.
|
||||||
|
Log.w(TAG, "addDisallowedApplication failed: ${e.message}")
|
||||||
|
}
|
||||||
|
|
||||||
|
val parcelFd = try {
|
||||||
|
builder.establish()
|
||||||
|
} catch (t: Throwable) {
|
||||||
|
Log.e(TAG, "VpnService.establish() failed: ${t.message}")
|
||||||
|
null
|
||||||
|
}
|
||||||
|
|
||||||
|
if (parcelFd == null) {
|
||||||
|
Log.e(TAG, "establish() returned null — is VPN permission granted?")
|
||||||
|
Native.stopProxy(proxyHandle)
|
||||||
|
proxyHandle = 0L
|
||||||
|
stopSelf()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
tun = parcelFd
|
||||||
|
|
||||||
|
// 3) Start tun2proxy on a worker thread. It blocks until stop() or
|
||||||
|
// shutdown. We detach the fd so ownership transfers cleanly; the
|
||||||
|
// ParcelFileDescriptor (`tun`) still holds a reference, so closing
|
||||||
|
// it at teardown reliably tears down the TUN even if tun2proxy
|
||||||
|
// doesn't cleanly exit.
|
||||||
|
val detachedFd = parcelFd.detachFd()
|
||||||
|
tun2proxyRunning.set(true)
|
||||||
|
tun2proxyThread = Thread({
|
||||||
|
try {
|
||||||
|
val rc = Tun2proxy.run(
|
||||||
|
"socks5://127.0.0.1:$socks5Port",
|
||||||
|
detachedFd,
|
||||||
|
/* closeFdOnDrop = */ true,
|
||||||
|
MTU.toChar(),
|
||||||
|
/* verbosity = info */ 3,
|
||||||
|
/* dnsStrategy = virtual */ 0,
|
||||||
|
)
|
||||||
|
Log.i(TAG, "tun2proxy exited rc=$rc")
|
||||||
|
} catch (t: Throwable) {
|
||||||
|
Log.e(TAG, "tun2proxy crashed: ${t.message}", t)
|
||||||
|
} finally {
|
||||||
|
tun2proxyRunning.set(false)
|
||||||
|
}
|
||||||
|
}, "tun2proxy").apply { start() }
|
||||||
|
|
||||||
|
startForeground(NOTIF_ID, buildNotif(cfg.listenPort))
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tear down everything this service owns. Safe to call more than once:
|
||||||
|
* - `Tun2proxy.stop()` is idempotent on its side.
|
||||||
|
* - tun2proxyRunning gating means we skip the stop call when the
|
||||||
|
* worker thread has already exited.
|
||||||
|
* - `tun` and `proxyHandle` are nulled/zeroed after one pass, so a
|
||||||
|
* second call is a no-op.
|
||||||
|
*
|
||||||
|
* Shutdown order matters. Doing it wrong (we did originally) leaves
|
||||||
|
* tun2proxy still forwarding packets into a half-dead Rust runtime
|
||||||
|
* while the runtime is force-aborting its tasks — that's the scenario
|
||||||
|
* that manifested as "Stop crashes the app" when there were in-flight
|
||||||
|
* relay requests piled up against a dead Apps Script deployment. The
|
||||||
|
* correct order is:
|
||||||
|
* 1. Signal tun2proxy to stop (cooperative).
|
||||||
|
* 2. Close the TUN fd — forces tun2proxy's read() to return EBADF.
|
||||||
|
* 3. Join the tun2proxy thread (now it really will exit).
|
||||||
|
* 4. Shut down the Rust proxy runtime (nothing left to forward to).
|
||||||
|
*/
|
||||||
|
private fun teardown() {
|
||||||
|
Log.i(TAG, "teardown: begin (tun2proxy running=${tun2proxyRunning.get()}, proxyHandle=$proxyHandle)")
|
||||||
|
|
||||||
|
// 1. Cooperative stop signal.
|
||||||
|
if (tun2proxyRunning.get()) {
|
||||||
|
try { Tun2proxy.stop() } catch (t: Throwable) {
|
||||||
|
Log.w(TAG, "Tun2proxy.stop: ${t.message}")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2. Close the TUN fd. Since we called detachFd earlier the
|
||||||
|
// ParcelFileDescriptor no longer owns the fd and close() here
|
||||||
|
// is a no-op; the real fd is owned by tun2proxy (closeFdOnDrop
|
||||||
|
// = true), which closes it on return from run().
|
||||||
|
try { tun?.close() } catch (_: Throwable) {}
|
||||||
|
tun = null
|
||||||
|
|
||||||
|
// 3. Join the worker. 4s is enough in the happy case; if tun2proxy
|
||||||
|
// is stuck on something untoward we'd rather move on and force
|
||||||
|
// the runtime shutdown than hang forever.
|
||||||
|
try {
|
||||||
|
tun2proxyThread?.join(4_000)
|
||||||
|
} catch (_: InterruptedException) {}
|
||||||
|
val stillAlive = tun2proxyThread?.isAlive == true
|
||||||
|
tun2proxyThread = null
|
||||||
|
if (stillAlive) {
|
||||||
|
Log.w(TAG, "tun2proxy thread still alive after join timeout — proceeding anyway")
|
||||||
|
}
|
||||||
|
|
||||||
|
// 4. Shut down the Rust proxy. Backed by `rt.shutdown_timeout(3s)`
|
||||||
|
// on the Rust side, so this is bounded even if the runtime
|
||||||
|
// has in-flight tasks (common when the Apps Script relay has
|
||||||
|
// piled up pending 30s timeouts).
|
||||||
|
if (proxyHandle != 0L) {
|
||||||
|
Log.i(TAG, "teardown: stopping proxy handle=$proxyHandle")
|
||||||
|
try { Native.stopProxy(proxyHandle) } catch (t: Throwable) {
|
||||||
|
Log.e(TAG, "Native.stopProxy threw: ${t.message}", t)
|
||||||
|
}
|
||||||
|
proxyHandle = 0L
|
||||||
|
}
|
||||||
|
Log.i(TAG, "teardown: done")
|
||||||
|
}
|
||||||
|
|
||||||
|
override fun onDestroy() {
|
||||||
|
teardown()
|
||||||
|
super.onDestroy()
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun buildNotif(proxyPort: Int): Notification {
|
||||||
|
val mgr = getSystemService(NotificationManager::class.java)
|
||||||
|
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) {
|
||||||
|
val ch = NotificationChannel(
|
||||||
|
CHANNEL_ID,
|
||||||
|
"mhrv-rs",
|
||||||
|
NotificationManager.IMPORTANCE_LOW,
|
||||||
|
).apply {
|
||||||
|
description = "Status of the mhrv-rs VPN"
|
||||||
|
setShowBadge(false)
|
||||||
|
}
|
||||||
|
mgr.createNotificationChannel(ch)
|
||||||
|
}
|
||||||
|
val openIntent = PendingIntent.getActivity(
|
||||||
|
this,
|
||||||
|
0,
|
||||||
|
Intent(this, MainActivity::class.java),
|
||||||
|
PendingIntent.FLAG_IMMUTABLE or PendingIntent.FLAG_UPDATE_CURRENT,
|
||||||
|
)
|
||||||
|
val stopIntent = PendingIntent.getService(
|
||||||
|
this,
|
||||||
|
1,
|
||||||
|
Intent(this, MhrvVpnService::class.java).setAction(ACTION_STOP),
|
||||||
|
PendingIntent.FLAG_IMMUTABLE or PendingIntent.FLAG_UPDATE_CURRENT,
|
||||||
|
)
|
||||||
|
return NotificationCompat.Builder(this, CHANNEL_ID)
|
||||||
|
.setContentTitle("mhrv-rs VPN is active")
|
||||||
|
.setContentText("Routing via SOCKS5 127.0.0.1:${proxyPort + 1}")
|
||||||
|
.setSmallIcon(android.R.drawable.presence_online)
|
||||||
|
.setContentIntent(openIntent)
|
||||||
|
.addAction(android.R.drawable.ic_menu_close_clear_cancel, "Stop", stopIntent)
|
||||||
|
.setOngoing(true)
|
||||||
|
.setCategory(NotificationCompat.CATEGORY_SERVICE)
|
||||||
|
.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
companion object {
|
||||||
|
private const val TAG = "MhrvVpnService"
|
||||||
|
private const val CHANNEL_ID = "mhrv.vpn.status"
|
||||||
|
private const val NOTIF_ID = 0x1001
|
||||||
|
private const val MTU = 1500
|
||||||
|
const val ACTION_STOP = "com.therealaleph.mhrv.STOP"
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,68 @@
|
|||||||
|
package com.therealaleph.mhrv
|
||||||
|
|
||||||
|
/**
|
||||||
|
* JNI bindings for the mhrv_rs Rust crate. The crate is compiled to
|
||||||
|
* libmhrv_rs.so and loaded at app start.
|
||||||
|
*
|
||||||
|
* All methods are blocking on a short-lived native call — the proxy itself
|
||||||
|
* runs on a Rust-side tokio runtime, not on the JVM thread that calls in.
|
||||||
|
* The returned handles are opaque to Kotlin; pass them back to stop() /
|
||||||
|
* statsJson() / etc.
|
||||||
|
*
|
||||||
|
* Thread-safe: the underlying Rust side guards its state with a mutex.
|
||||||
|
*/
|
||||||
|
object Native {
|
||||||
|
|
||||||
|
init {
|
||||||
|
System.loadLibrary("mhrv_rs")
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tell the Rust side where to put config + CA + cache. Must be called
|
||||||
|
* once before any other call. The path we hand over is our app's
|
||||||
|
* private filesDir — guaranteed writable, auto-cleaned on uninstall.
|
||||||
|
*/
|
||||||
|
external fun setDataDir(path: String)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Spin up the proxy. `configJson` is the full config.json contents as
|
||||||
|
* a String. Returns the handle (positive) on success, or 0 on failure
|
||||||
|
* (inspect logcat for the failure reason).
|
||||||
|
*/
|
||||||
|
external fun startProxy(configJson: String): Long
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Stop a running proxy. Idempotent: returns false if the handle is
|
||||||
|
* unknown (e.g. already stopped).
|
||||||
|
*/
|
||||||
|
external fun stopProxy(handle: Long): Boolean
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Copy the MITM CA cert to a destination path. Used by the UI to
|
||||||
|
* surface ca.crt in Downloads so the user can feed it to Android's
|
||||||
|
* system "Install certificate" picker.
|
||||||
|
*/
|
||||||
|
external fun exportCa(destPath: String): Boolean
|
||||||
|
|
||||||
|
/** mhrv_rs crate version. Smoke test for JNI linkage. */
|
||||||
|
external fun version(): String
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Drain the in-memory log ring buffer (populated by the same tracing
|
||||||
|
* subscriber that feeds logcat). Returns a `\n`-joined blob of any
|
||||||
|
* events the UI hasn't seen yet, or an empty string.
|
||||||
|
*
|
||||||
|
* Cheap to call — the Kotlin side polls this on a timer. Single blob
|
||||||
|
* instead of `String[]` because one JNI crossing is much faster than N.
|
||||||
|
*/
|
||||||
|
external fun drainLogs(): String
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Probe a single SNI against `googleIp`. Returns a JSON string of the
|
||||||
|
* form `{"ok":true,"latencyMs":123}` on success or
|
||||||
|
* `{"ok":false,"error":"..."}` on failure.
|
||||||
|
*
|
||||||
|
* BLOCKS (does a TLS handshake); call from a background dispatcher.
|
||||||
|
*/
|
||||||
|
external fun testSni(googleIp: String, sni: String): String
|
||||||
|
}
|
||||||
@@ -0,0 +1,796 @@
|
|||||||
|
package com.therealaleph.mhrv.ui
|
||||||
|
|
||||||
|
import androidx.compose.animation.AnimatedVisibility
|
||||||
|
import androidx.compose.foundation.background
|
||||||
|
import androidx.compose.foundation.layout.*
|
||||||
|
import androidx.compose.foundation.lazy.LazyColumn
|
||||||
|
import androidx.compose.foundation.lazy.items
|
||||||
|
import androidx.compose.foundation.lazy.rememberLazyListState
|
||||||
|
import androidx.compose.foundation.rememberScrollState
|
||||||
|
import androidx.compose.foundation.shape.RoundedCornerShape
|
||||||
|
import androidx.compose.foundation.text.KeyboardOptions
|
||||||
|
import androidx.compose.foundation.verticalScroll
|
||||||
|
import androidx.compose.material.icons.Icons
|
||||||
|
import androidx.compose.material.icons.filled.CheckCircle
|
||||||
|
import androidx.compose.material.icons.filled.ErrorOutline
|
||||||
|
import androidx.compose.material.icons.filled.ExpandLess
|
||||||
|
import androidx.compose.material.icons.filled.ExpandMore
|
||||||
|
import androidx.compose.material.icons.filled.PlayArrow
|
||||||
|
import androidx.compose.material.icons.filled.HourglassBottom
|
||||||
|
import androidx.compose.material3.*
|
||||||
|
import androidx.compose.runtime.*
|
||||||
|
import androidx.compose.runtime.saveable.rememberSaveable
|
||||||
|
import androidx.compose.ui.Alignment
|
||||||
|
import androidx.compose.ui.Modifier
|
||||||
|
import androidx.compose.ui.draw.clip
|
||||||
|
import androidx.compose.ui.platform.LocalContext
|
||||||
|
import androidx.compose.ui.text.font.FontFamily
|
||||||
|
import androidx.compose.ui.text.input.ImeAction
|
||||||
|
import androidx.compose.ui.text.input.KeyboardType
|
||||||
|
import androidx.compose.ui.unit.dp
|
||||||
|
import androidx.compose.ui.unit.sp
|
||||||
|
import com.therealaleph.mhrv.CaInstall
|
||||||
|
import com.therealaleph.mhrv.ConfigStore
|
||||||
|
import com.therealaleph.mhrv.DEFAULT_SNI_POOL
|
||||||
|
import com.therealaleph.mhrv.MhrvConfig
|
||||||
|
import com.therealaleph.mhrv.Native
|
||||||
|
import com.therealaleph.mhrv.ui.theme.OkGreen
|
||||||
|
import kotlinx.coroutines.Dispatchers
|
||||||
|
import kotlinx.coroutines.delay
|
||||||
|
import kotlinx.coroutines.launch
|
||||||
|
import kotlinx.coroutines.withContext
|
||||||
|
import org.json.JSONObject
|
||||||
|
|
||||||
|
/**
|
||||||
|
* UI state returned by the Activity after the CA install flow finishes,
|
||||||
|
* so the screen can show a matching snackbar. Kept as a sum type — a raw
|
||||||
|
* string message would conflate "installed" vs. "failed to export".
|
||||||
|
*/
|
||||||
|
sealed class CaInstallOutcome {
|
||||||
|
object Installed : CaInstallOutcome()
|
||||||
|
/**
|
||||||
|
* Cert not found in the AndroidCAStore after the Settings activity
|
||||||
|
* returned. Carries an optional downloadPath so the snackbar can tell
|
||||||
|
* the user where the file landed (Downloads or app-private external).
|
||||||
|
*/
|
||||||
|
data class NotInstalled(val downloadPath: String?) : CaInstallOutcome()
|
||||||
|
data class Failed(val message: String) : CaInstallOutcome()
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Top-level screen. Intentionally one scrollable page rather than tabs —
|
||||||
|
* first-run users need to see everything (deployment IDs, cert button,
|
||||||
|
* Start) on one surface. Anything that isn't first-run critical lives in
|
||||||
|
* collapsible sections (SNI pool, Advanced, Logs) so the default view
|
||||||
|
* stays short.
|
||||||
|
*/
|
||||||
|
@OptIn(ExperimentalMaterial3Api::class)
|
||||||
|
@Composable
|
||||||
|
fun HomeScreen(
|
||||||
|
onStart: () -> Unit,
|
||||||
|
onStop: () -> Unit,
|
||||||
|
onInstallCaConfirmed: () -> Unit,
|
||||||
|
caOutcome: CaInstallOutcome?,
|
||||||
|
onCaOutcomeConsumed: () -> Unit,
|
||||||
|
) {
|
||||||
|
val ctx = LocalContext.current
|
||||||
|
val scope = rememberCoroutineScope()
|
||||||
|
val snackbar = remember { SnackbarHostState() }
|
||||||
|
|
||||||
|
// Persisted form state. Any edit writes back to disk immediately —
|
||||||
|
// cheap at this write rate, avoids "I tapped Start before saving" bugs.
|
||||||
|
var cfg by remember { mutableStateOf(ConfigStore.load(ctx)) }
|
||||||
|
fun persist(new: MhrvConfig) {
|
||||||
|
cfg = new
|
||||||
|
ConfigStore.save(ctx, new)
|
||||||
|
}
|
||||||
|
|
||||||
|
// CA install dialog visibility.
|
||||||
|
var showInstallDialog by rememberSaveable { mutableStateOf(false) }
|
||||||
|
|
||||||
|
// Cooldown on Start/Stop. Rapid taps during a VPN transition trigger
|
||||||
|
// an emulator-specific EGL renderer crash
|
||||||
|
// (F OpenGLRenderer: EGL_NOT_INITIALIZED during rendering) — the
|
||||||
|
// service survives, but the Compose UI process dies and the app
|
||||||
|
// appears to close. On real hardware this is rare, but debouncing
|
||||||
|
// is useful UX anyway: neither start nor stop is truly instant,
|
||||||
|
// and the user gets no feedback if they tap while one is in flight.
|
||||||
|
var transitionCooldown by remember { mutableStateOf(false) }
|
||||||
|
LaunchedEffect(transitionCooldown) {
|
||||||
|
if (transitionCooldown) {
|
||||||
|
delay(2000)
|
||||||
|
transitionCooldown = false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Surface CA install result as a snackbar. We consume the outcome
|
||||||
|
// after showing so a recomposition doesn't re-trigger it.
|
||||||
|
LaunchedEffect(caOutcome) {
|
||||||
|
val o = caOutcome ?: return@LaunchedEffect
|
||||||
|
val msg = when (o) {
|
||||||
|
is CaInstallOutcome.Installed ->
|
||||||
|
"Certificate installed ✓"
|
||||||
|
is CaInstallOutcome.NotInstalled -> buildString {
|
||||||
|
append("Certificate not yet installed.")
|
||||||
|
if (!o.downloadPath.isNullOrBlank()) {
|
||||||
|
append(" Saved to ${o.downloadPath}. ")
|
||||||
|
append("In Settings: Encryption & credentials → Install a certificate → \"CA certificate\" (not VPN, not Wi-Fi) → pick that file.")
|
||||||
|
} else {
|
||||||
|
append(" Tap Install again to retry.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
is CaInstallOutcome.Failed -> o.message
|
||||||
|
}
|
||||||
|
snackbar.showSnackbar(msg, withDismissAction = true)
|
||||||
|
onCaOutcomeConsumed()
|
||||||
|
}
|
||||||
|
|
||||||
|
Scaffold(
|
||||||
|
topBar = {
|
||||||
|
TopAppBar(
|
||||||
|
title = { Text("mhrv-rs") },
|
||||||
|
actions = {
|
||||||
|
Text(
|
||||||
|
text = "v" + runCatching { Native.version() }.getOrDefault("?"),
|
||||||
|
style = MaterialTheme.typography.labelMedium,
|
||||||
|
modifier = Modifier.padding(end = 12.dp),
|
||||||
|
)
|
||||||
|
},
|
||||||
|
)
|
||||||
|
},
|
||||||
|
snackbarHost = { SnackbarHost(snackbar) },
|
||||||
|
) { inner ->
|
||||||
|
Column(
|
||||||
|
modifier = Modifier
|
||||||
|
.padding(inner)
|
||||||
|
.fillMaxSize()
|
||||||
|
.verticalScroll(rememberScrollState())
|
||||||
|
.padding(16.dp),
|
||||||
|
verticalArrangement = Arrangement.spacedBy(12.dp),
|
||||||
|
) {
|
||||||
|
SectionHeader("Apps Script relay")
|
||||||
|
|
||||||
|
DeploymentIdsField(
|
||||||
|
urls = cfg.appsScriptUrls,
|
||||||
|
onChange = { persist(cfg.copy(appsScriptUrls = it)) },
|
||||||
|
)
|
||||||
|
|
||||||
|
OutlinedTextField(
|
||||||
|
value = cfg.authKey,
|
||||||
|
onValueChange = { persist(cfg.copy(authKey = it)) },
|
||||||
|
label = { Text("auth_key") },
|
||||||
|
singleLine = true,
|
||||||
|
keyboardOptions = KeyboardOptions(imeAction = ImeAction.Next),
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
supportingText = {
|
||||||
|
Text("The shared secret you set in the Apps Script.")
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
Spacer(Modifier.height(4.dp))
|
||||||
|
SectionHeader("Network")
|
||||||
|
|
||||||
|
Row(
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
horizontalArrangement = Arrangement.spacedBy(8.dp),
|
||||||
|
) {
|
||||||
|
OutlinedTextField(
|
||||||
|
value = cfg.googleIp,
|
||||||
|
onValueChange = { persist(cfg.copy(googleIp = it)) },
|
||||||
|
label = { Text("google_ip") },
|
||||||
|
singleLine = true,
|
||||||
|
keyboardOptions = KeyboardOptions(keyboardType = KeyboardType.Uri),
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
)
|
||||||
|
OutlinedTextField(
|
||||||
|
value = cfg.frontDomain,
|
||||||
|
onValueChange = { persist(cfg.copy(frontDomain = it)) },
|
||||||
|
label = { Text("front_domain") },
|
||||||
|
singleLine = true,
|
||||||
|
keyboardOptions = KeyboardOptions(keyboardType = KeyboardType.Uri),
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SNI pool: collapsed by default. Users without a reason to
|
||||||
|
// touch it should leave Rust's auto-expansion to handle it.
|
||||||
|
CollapsibleSection(title = "SNI pool + tester") {
|
||||||
|
SniPoolEditor(
|
||||||
|
cfg = cfg,
|
||||||
|
onChange = ::persist,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Advanced settings: collapsed by default.
|
||||||
|
CollapsibleSection(title = "Advanced") {
|
||||||
|
AdvancedSettings(
|
||||||
|
cfg = cfg,
|
||||||
|
onChange = ::persist,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
Spacer(Modifier.height(8.dp))
|
||||||
|
|
||||||
|
Row(
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
horizontalArrangement = Arrangement.spacedBy(8.dp),
|
||||||
|
) {
|
||||||
|
Button(
|
||||||
|
onClick = {
|
||||||
|
transitionCooldown = true
|
||||||
|
onStart()
|
||||||
|
},
|
||||||
|
enabled = cfg.hasDeploymentId && cfg.authKey.isNotBlank() && !transitionCooldown,
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
) {
|
||||||
|
Text(if (transitionCooldown) "…" else "Start")
|
||||||
|
}
|
||||||
|
OutlinedButton(
|
||||||
|
onClick = {
|
||||||
|
transitionCooldown = true
|
||||||
|
onStop()
|
||||||
|
},
|
||||||
|
enabled = !transitionCooldown,
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
) {
|
||||||
|
Text(if (transitionCooldown) "…" else "Stop")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Spacer(Modifier.height(4.dp))
|
||||||
|
// Secondary accent button — FilledTonalButton reads as a lower-
|
||||||
|
// priority action next to Start/Stop, matching the desktop UI's
|
||||||
|
// visual hierarchy where Install CA is offered as a helper
|
||||||
|
// button rather than the headline action.
|
||||||
|
FilledTonalButton(
|
||||||
|
onClick = { showInstallDialog = true },
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
) {
|
||||||
|
Text("Install MITM certificate")
|
||||||
|
}
|
||||||
|
|
||||||
|
CollapsibleSection(title = "Live logs", initiallyExpanded = false) {
|
||||||
|
LiveLogPane()
|
||||||
|
}
|
||||||
|
|
||||||
|
Spacer(Modifier.height(16.dp))
|
||||||
|
HowToUseCard(cfg.listenPort)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---- CA install confirmation dialog ---------------------------------
|
||||||
|
if (showInstallDialog) {
|
||||||
|
// Export eagerly so we can show the fingerprint in the dialog body
|
||||||
|
// — builds user confidence ("yes, that's the cert I'm trusting")
|
||||||
|
// and gives us a usable failure path if the CA doesn't exist yet.
|
||||||
|
val exported = remember { CaInstall.export(ctx) }
|
||||||
|
val fp = remember(exported) { if (exported) CaInstall.fingerprint(ctx) else null }
|
||||||
|
val cn = remember(exported) { if (exported) CaInstall.subjectCn(ctx) else null }
|
||||||
|
|
||||||
|
AlertDialog(
|
||||||
|
onDismissRequest = { showInstallDialog = false },
|
||||||
|
title = { Text("Install MITM certificate?") },
|
||||||
|
text = {
|
||||||
|
Column(verticalArrangement = Arrangement.spacedBy(8.dp)) {
|
||||||
|
Text(
|
||||||
|
"mhrv-rs creates a local certificate authority so it can decrypt " +
|
||||||
|
"and re-encrypt HTTPS traffic before tunnelling it through the Apps " +
|
||||||
|
"Script relay. Without this CA installed as trusted, apps will show " +
|
||||||
|
"certificate errors."
|
||||||
|
)
|
||||||
|
Text(
|
||||||
|
"On Android 11+ the system removed the inline install path, so " +
|
||||||
|
"tapping Install will: (1) save a PEM copy to Downloads/mhrv-ca.crt, " +
|
||||||
|
"(2) open Security settings. From there navigate to Encryption & " +
|
||||||
|
"credentials → Install a certificate → pick \"CA certificate\" (NOT " +
|
||||||
|
"\"VPN & app user certificate\" or \"Wi-Fi certificate\") → select " +
|
||||||
|
"mhrv-ca.crt from Downloads. If you don't have a screen lock, Android " +
|
||||||
|
"will ask you to add one first."
|
||||||
|
)
|
||||||
|
if (fp != null) {
|
||||||
|
Text("Subject: ${cn ?: "(unknown)"}", style = MaterialTheme.typography.labelMedium)
|
||||||
|
Text(
|
||||||
|
text = "SHA-256: ${CaInstall.fingerprintHex(fp)}",
|
||||||
|
style = MaterialTheme.typography.labelSmall,
|
||||||
|
fontFamily = FontFamily.Monospace,
|
||||||
|
)
|
||||||
|
} else {
|
||||||
|
Text(
|
||||||
|
"Could not read the CA cert yet. Tap Start once so the " +
|
||||||
|
"proxy generates it, then come back.",
|
||||||
|
color = MaterialTheme.colorScheme.error,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
confirmButton = {
|
||||||
|
TextButton(
|
||||||
|
onClick = {
|
||||||
|
showInstallDialog = false
|
||||||
|
if (fp != null) onInstallCaConfirmed()
|
||||||
|
},
|
||||||
|
enabled = fp != null,
|
||||||
|
) { Text("Install") }
|
||||||
|
},
|
||||||
|
dismissButton = {
|
||||||
|
TextButton(onClick = { showInstallDialog = false }) { Text("Cancel") }
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// =========================================================================
|
||||||
|
// Deployment IDs editor (multi-line, one URL/ID per line).
|
||||||
|
// =========================================================================
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun DeploymentIdsField(
|
||||||
|
urls: List<String>,
|
||||||
|
onChange: (List<String>) -> Unit,
|
||||||
|
) {
|
||||||
|
// Treat the list as newline-joined text. Keep trailing newlines so the
|
||||||
|
// cursor behaves naturally while the user is adding a new entry.
|
||||||
|
var raw by remember(urls) { mutableStateOf(urls.joinToString("\n")) }
|
||||||
|
|
||||||
|
OutlinedTextField(
|
||||||
|
value = raw,
|
||||||
|
onValueChange = {
|
||||||
|
raw = it
|
||||||
|
val parsed = it.split("\n").map(String::trim).filter(String::isNotBlank)
|
||||||
|
onChange(parsed)
|
||||||
|
},
|
||||||
|
label = { Text("Deployment URL(s) or script ID(s)") },
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
minLines = 2,
|
||||||
|
maxLines = 6,
|
||||||
|
supportingText = {
|
||||||
|
Text(
|
||||||
|
"One per line. Full URLs (https://script.google.com/macros/s/.../exec) " +
|
||||||
|
"or bare IDs — mix as you like. Multiple IDs are rotated round-robin.",
|
||||||
|
)
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// =========================================================================
|
||||||
|
// SNI pool editor + per-SNI probe.
|
||||||
|
// =========================================================================
|
||||||
|
|
||||||
|
private sealed class ProbeState {
|
||||||
|
object Idle : ProbeState()
|
||||||
|
object InFlight : ProbeState()
|
||||||
|
data class Ok(val latencyMs: Int) : ProbeState()
|
||||||
|
data class Err(val message: String) : ProbeState()
|
||||||
|
}
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun SniPoolEditor(
|
||||||
|
cfg: MhrvConfig,
|
||||||
|
onChange: (MhrvConfig) -> Unit,
|
||||||
|
) {
|
||||||
|
val scope = rememberCoroutineScope()
|
||||||
|
|
||||||
|
// Build the displayed list: union of the default pool + the config's
|
||||||
|
// sniHosts + the current front_domain. Order: front_domain first,
|
||||||
|
// defaults, then user customs. Deduped.
|
||||||
|
val displayed: List<String> = remember(cfg) {
|
||||||
|
val seen = linkedSetOf<String>()
|
||||||
|
if (cfg.frontDomain.isNotBlank()) seen.add(cfg.frontDomain.trim())
|
||||||
|
DEFAULT_SNI_POOL.forEach { seen.add(it) }
|
||||||
|
cfg.sniHosts.forEach { if (it.isNotBlank()) seen.add(it.trim()) }
|
||||||
|
seen.toList()
|
||||||
|
}
|
||||||
|
|
||||||
|
// A host is enabled if it appears in cfg.sniHosts. Empty sniHosts
|
||||||
|
// means "let Rust auto-expand" — we reflect that as "default pool
|
||||||
|
// enabled, customs not".
|
||||||
|
val enabledSet: Set<String> = remember(cfg.sniHosts) {
|
||||||
|
if (cfg.sniHosts.isNotEmpty()) cfg.sniHosts.toSet()
|
||||||
|
else DEFAULT_SNI_POOL.toSet() + setOfNotNull(cfg.frontDomain.takeIf { it.isNotBlank() })
|
||||||
|
}
|
||||||
|
|
||||||
|
val probeState = remember { mutableStateMapOf<String, ProbeState>() }
|
||||||
|
|
||||||
|
fun probe(sni: String) {
|
||||||
|
probeState[sni] = ProbeState.InFlight
|
||||||
|
scope.launch {
|
||||||
|
val json = withContext(Dispatchers.IO) {
|
||||||
|
runCatching { Native.testSni(cfg.googleIp, sni) }.getOrNull()
|
||||||
|
}
|
||||||
|
probeState[sni] = parseProbeResult(json)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Column(verticalArrangement = Arrangement.spacedBy(6.dp)) {
|
||||||
|
Text(
|
||||||
|
"Enabled SNIs are rotated when connecting to google_ip. Leaving all unchecked " +
|
||||||
|
"lets Rust auto-expand the default Google pool.",
|
||||||
|
style = MaterialTheme.typography.bodySmall,
|
||||||
|
color = MaterialTheme.colorScheme.onSurfaceVariant,
|
||||||
|
)
|
||||||
|
|
||||||
|
displayed.forEach { sni ->
|
||||||
|
val enabled = sni in enabledSet
|
||||||
|
SniRow(
|
||||||
|
sni = sni,
|
||||||
|
enabled = enabled,
|
||||||
|
state = probeState[sni] ?: ProbeState.Idle,
|
||||||
|
onToggle = { nowEnabled ->
|
||||||
|
val next = if (nowEnabled) {
|
||||||
|
(cfg.sniHosts.takeIf { it.isNotEmpty() } ?: emptyList()) + sni
|
||||||
|
} else {
|
||||||
|
val current = if (cfg.sniHosts.isNotEmpty()) cfg.sniHosts else enabledSet.toList()
|
||||||
|
current.filter { it != sni }
|
||||||
|
}
|
||||||
|
onChange(cfg.copy(sniHosts = next.distinct()))
|
||||||
|
},
|
||||||
|
onTest = { probe(sni) },
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Custom-add row.
|
||||||
|
var custom by remember { mutableStateOf("") }
|
||||||
|
Row(
|
||||||
|
verticalAlignment = Alignment.CenterVertically,
|
||||||
|
horizontalArrangement = Arrangement.spacedBy(6.dp),
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
) {
|
||||||
|
OutlinedTextField(
|
||||||
|
value = custom,
|
||||||
|
onValueChange = { custom = it },
|
||||||
|
label = { Text("Add custom SNI") },
|
||||||
|
singleLine = true,
|
||||||
|
keyboardOptions = KeyboardOptions(keyboardType = KeyboardType.Uri),
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
)
|
||||||
|
TextButton(
|
||||||
|
onClick = {
|
||||||
|
val s = custom.trim()
|
||||||
|
if (s.isNotEmpty()) {
|
||||||
|
val next = (cfg.sniHosts.takeIf { it.isNotEmpty() } ?: enabledSet.toList()) + s
|
||||||
|
onChange(cfg.copy(sniHosts = next.distinct()))
|
||||||
|
custom = ""
|
||||||
|
}
|
||||||
|
},
|
||||||
|
enabled = custom.isNotBlank(),
|
||||||
|
) { Text("Add") }
|
||||||
|
}
|
||||||
|
|
||||||
|
TextButton(
|
||||||
|
onClick = { displayed.forEach { probe(it) } },
|
||||||
|
modifier = Modifier.align(Alignment.End),
|
||||||
|
) { Text("Test all") }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun SniRow(
|
||||||
|
sni: String,
|
||||||
|
enabled: Boolean,
|
||||||
|
state: ProbeState,
|
||||||
|
onToggle: (Boolean) -> Unit,
|
||||||
|
onTest: () -> Unit,
|
||||||
|
) {
|
||||||
|
Column(modifier = Modifier.fillMaxWidth()) {
|
||||||
|
Row(
|
||||||
|
verticalAlignment = Alignment.CenterVertically,
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
) {
|
||||||
|
Checkbox(checked = enabled, onCheckedChange = onToggle)
|
||||||
|
Text(
|
||||||
|
sni,
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
style = MaterialTheme.typography.bodyMedium,
|
||||||
|
)
|
||||||
|
ProbeBadge(state)
|
||||||
|
Spacer(Modifier.width(4.dp))
|
||||||
|
TextButton(onClick = onTest, enabled = state !is ProbeState.InFlight) {
|
||||||
|
Text("Test")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Show the error reason on its own line when the probe failed —
|
||||||
|
// a red dot with no explanation was confusing ("SNI test also
|
||||||
|
// fails despite having internet"). Common reasons: "dns: ..." or
|
||||||
|
// "connect: ...".
|
||||||
|
if (state is ProbeState.Err) {
|
||||||
|
Text(
|
||||||
|
text = state.message,
|
||||||
|
color = MaterialTheme.colorScheme.error,
|
||||||
|
style = MaterialTheme.typography.labelSmall,
|
||||||
|
modifier = Modifier.padding(start = 48.dp, bottom = 4.dp),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun ProbeBadge(state: ProbeState) {
|
||||||
|
when (state) {
|
||||||
|
is ProbeState.Idle -> {}
|
||||||
|
is ProbeState.InFlight -> {
|
||||||
|
CircularProgressIndicator(
|
||||||
|
modifier = Modifier.size(14.dp),
|
||||||
|
strokeWidth = 2.dp,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
is ProbeState.Ok -> {
|
||||||
|
Row(verticalAlignment = Alignment.CenterVertically) {
|
||||||
|
// Same green the desktop UI uses for OK status (OK_GREEN
|
||||||
|
// in src/bin/ui.rs line 510) — kept in sync via Theme.kt.
|
||||||
|
Icon(
|
||||||
|
Icons.Default.CheckCircle, null,
|
||||||
|
tint = OkGreen,
|
||||||
|
modifier = Modifier.size(16.dp),
|
||||||
|
)
|
||||||
|
Spacer(Modifier.width(2.dp))
|
||||||
|
Text("${state.latencyMs} ms", style = MaterialTheme.typography.labelSmall)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
is ProbeState.Err -> {
|
||||||
|
Icon(
|
||||||
|
Icons.Default.ErrorOutline, state.message,
|
||||||
|
tint = MaterialTheme.colorScheme.error,
|
||||||
|
modifier = Modifier.size(16.dp),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private fun parseProbeResult(json: String?): ProbeState {
|
||||||
|
if (json.isNullOrBlank()) return ProbeState.Err("no response")
|
||||||
|
return try {
|
||||||
|
val obj = JSONObject(json)
|
||||||
|
if (obj.optBoolean("ok", false)) {
|
||||||
|
ProbeState.Ok(obj.optInt("latencyMs", -1))
|
||||||
|
} else {
|
||||||
|
ProbeState.Err(obj.optString("error", "failed"))
|
||||||
|
}
|
||||||
|
} catch (_: Throwable) {
|
||||||
|
ProbeState.Err("bad json")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// =========================================================================
|
||||||
|
// Advanced settings.
|
||||||
|
// =========================================================================
|
||||||
|
|
||||||
|
@OptIn(ExperimentalMaterial3Api::class)
|
||||||
|
@Composable
|
||||||
|
private fun AdvancedSettings(
|
||||||
|
cfg: MhrvConfig,
|
||||||
|
onChange: (MhrvConfig) -> Unit,
|
||||||
|
) {
|
||||||
|
Column(verticalArrangement = Arrangement.spacedBy(10.dp)) {
|
||||||
|
// verify_ssl
|
||||||
|
Row(
|
||||||
|
verticalAlignment = Alignment.CenterVertically,
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
) {
|
||||||
|
Column(modifier = Modifier.weight(1f)) {
|
||||||
|
Text("Verify upstream TLS", style = MaterialTheme.typography.bodyMedium)
|
||||||
|
Text(
|
||||||
|
"Off disables cert checks for the Google edge. Only useful for debugging.",
|
||||||
|
style = MaterialTheme.typography.labelSmall,
|
||||||
|
color = MaterialTheme.colorScheme.onSurfaceVariant,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
Switch(
|
||||||
|
checked = cfg.verifySsl,
|
||||||
|
onCheckedChange = { onChange(cfg.copy(verifySsl = it)) },
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// log_level dropdown
|
||||||
|
var expanded by remember { mutableStateOf(false) }
|
||||||
|
val levels = listOf("trace", "debug", "info", "warn", "error", "off")
|
||||||
|
ExposedDropdownMenuBox(
|
||||||
|
expanded = expanded,
|
||||||
|
onExpandedChange = { expanded = !expanded },
|
||||||
|
) {
|
||||||
|
OutlinedTextField(
|
||||||
|
value = cfg.logLevel,
|
||||||
|
onValueChange = {},
|
||||||
|
readOnly = true,
|
||||||
|
label = { Text("log_level") },
|
||||||
|
trailingIcon = { ExposedDropdownMenuDefaults.TrailingIcon(expanded = expanded) },
|
||||||
|
modifier = Modifier.fillMaxWidth().menuAnchor(),
|
||||||
|
)
|
||||||
|
ExposedDropdownMenu(
|
||||||
|
expanded = expanded,
|
||||||
|
onDismissRequest = { expanded = false },
|
||||||
|
) {
|
||||||
|
levels.forEach { lvl ->
|
||||||
|
DropdownMenuItem(
|
||||||
|
text = { Text(lvl) },
|
||||||
|
onClick = {
|
||||||
|
onChange(cfg.copy(logLevel = lvl))
|
||||||
|
expanded = false
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// parallel_relay slider
|
||||||
|
Column {
|
||||||
|
Text(
|
||||||
|
"parallel_relay: ${cfg.parallelRelay}",
|
||||||
|
style = MaterialTheme.typography.bodyMedium,
|
||||||
|
)
|
||||||
|
Slider(
|
||||||
|
value = cfg.parallelRelay.toFloat(),
|
||||||
|
onValueChange = { onChange(cfg.copy(parallelRelay = it.toInt().coerceIn(1, 5))) },
|
||||||
|
valueRange = 1f..5f,
|
||||||
|
steps = 3, // yields 1,2,3,4,5 positions
|
||||||
|
)
|
||||||
|
Text(
|
||||||
|
"Fan-out per request. 1 is normal; bump to 2-3 on lossy links.",
|
||||||
|
style = MaterialTheme.typography.labelSmall,
|
||||||
|
color = MaterialTheme.colorScheme.onSurfaceVariant,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
OutlinedTextField(
|
||||||
|
value = cfg.upstreamSocks5,
|
||||||
|
onValueChange = { onChange(cfg.copy(upstreamSocks5 = it)) },
|
||||||
|
label = { Text("upstream_socks5 (optional)") },
|
||||||
|
placeholder = { Text("host:port") },
|
||||||
|
singleLine = true,
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
supportingText = {
|
||||||
|
Text("If set, route upstream via this SOCKS5. Leave blank for direct.")
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// =========================================================================
|
||||||
|
// Live log pane — polls Native.drainLogs() on a 500ms tick.
|
||||||
|
// =========================================================================
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun LiveLogPane() {
|
||||||
|
val lines = remember { mutableStateListOf<String>() }
|
||||||
|
val listState = rememberLazyListState()
|
||||||
|
val scope = rememberCoroutineScope()
|
||||||
|
|
||||||
|
// Pull from the ring buffer periodically. We pull even while the
|
||||||
|
// section is collapsed (cheap), so re-expanding shows fresh tail.
|
||||||
|
LaunchedEffect(Unit) {
|
||||||
|
while (true) {
|
||||||
|
val blob = withContext(Dispatchers.IO) {
|
||||||
|
runCatching { Native.drainLogs() }.getOrNull()
|
||||||
|
}
|
||||||
|
if (!blob.isNullOrEmpty()) {
|
||||||
|
blob.split("\n").forEach { if (it.isNotBlank()) lines.add(it) }
|
||||||
|
// Cap the visible list so we don't grow unboundedly.
|
||||||
|
while (lines.size > 500) lines.removeAt(0)
|
||||||
|
// Follow tail.
|
||||||
|
if (lines.isNotEmpty()) {
|
||||||
|
listState.scrollToItem(lines.size - 1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
delay(500)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Column(verticalArrangement = Arrangement.spacedBy(4.dp)) {
|
||||||
|
Row(verticalAlignment = Alignment.CenterVertically) {
|
||||||
|
Text(
|
||||||
|
"${lines.size} lines",
|
||||||
|
style = MaterialTheme.typography.labelSmall,
|
||||||
|
color = MaterialTheme.colorScheme.onSurfaceVariant,
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
)
|
||||||
|
TextButton(onClick = { lines.clear() }) { Text("Clear") }
|
||||||
|
}
|
||||||
|
Surface(
|
||||||
|
color = MaterialTheme.colorScheme.surfaceVariant,
|
||||||
|
shape = RoundedCornerShape(8.dp),
|
||||||
|
modifier = Modifier.fillMaxWidth().heightIn(min = 160.dp, max = 320.dp),
|
||||||
|
) {
|
||||||
|
LazyColumn(
|
||||||
|
state = listState,
|
||||||
|
modifier = Modifier.padding(8.dp),
|
||||||
|
) {
|
||||||
|
items(lines) { line ->
|
||||||
|
Text(
|
||||||
|
line,
|
||||||
|
style = MaterialTheme.typography.bodySmall,
|
||||||
|
fontFamily = FontFamily.Monospace,
|
||||||
|
fontSize = 11.sp,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// =========================================================================
|
||||||
|
// Small shared pieces.
|
||||||
|
// =========================================================================
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun SectionHeader(text: String) {
|
||||||
|
Text(
|
||||||
|
text = text,
|
||||||
|
style = MaterialTheme.typography.titleMedium,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Minimal disclosure widget. Compose has no stock "expandable card" in
|
||||||
|
* Material3 yet, so we build it from a clickable header + AnimatedVisibility
|
||||||
|
* wrapping the content.
|
||||||
|
*/
|
||||||
|
@Composable
|
||||||
|
private fun CollapsibleSection(
|
||||||
|
title: String,
|
||||||
|
initiallyExpanded: Boolean = false,
|
||||||
|
content: @Composable ColumnScope.() -> Unit,
|
||||||
|
) {
|
||||||
|
var expanded by rememberSaveable(title) { mutableStateOf(initiallyExpanded) }
|
||||||
|
OutlinedCard(modifier = Modifier.fillMaxWidth()) {
|
||||||
|
Column(modifier = Modifier.padding(horizontal = 12.dp, vertical = 8.dp)) {
|
||||||
|
Row(
|
||||||
|
verticalAlignment = Alignment.CenterVertically,
|
||||||
|
modifier = Modifier.fillMaxWidth(),
|
||||||
|
) {
|
||||||
|
Text(
|
||||||
|
title,
|
||||||
|
style = MaterialTheme.typography.titleSmall,
|
||||||
|
modifier = Modifier.weight(1f),
|
||||||
|
)
|
||||||
|
TextButton(onClick = { expanded = !expanded }) {
|
||||||
|
Icon(
|
||||||
|
if (expanded) Icons.Default.ExpandLess else Icons.Default.ExpandMore,
|
||||||
|
contentDescription = if (expanded) "Collapse" else "Expand",
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
AnimatedVisibility(visible = expanded) {
|
||||||
|
Column(
|
||||||
|
modifier = Modifier.padding(top = 4.dp, bottom = 8.dp),
|
||||||
|
verticalArrangement = Arrangement.spacedBy(8.dp),
|
||||||
|
content = content,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
private fun HowToUseCard(listenPort: Int) {
|
||||||
|
OutlinedCard(modifier = Modifier.fillMaxWidth()) {
|
||||||
|
Column(modifier = Modifier.padding(16.dp), verticalArrangement = Arrangement.spacedBy(8.dp)) {
|
||||||
|
Text("How to use", style = MaterialTheme.typography.titleMedium)
|
||||||
|
Text(
|
||||||
|
"1. Paste one or more Apps Script deployment URLs (or bare IDs) and your auth_key.\n" +
|
||||||
|
"2. Tap Install MITM certificate. Confirm the dialog — the cert is saved to " +
|
||||||
|
"Downloads/mhrv-ca.crt and Security settings opens. Navigate: Encryption & " +
|
||||||
|
"credentials → Install a certificate → \"CA certificate\" (NOT \"VPN & app user " +
|
||||||
|
"certificate\" or \"Wi-Fi\"). Pick mhrv-ca.crt from Downloads. You'll be asked to " +
|
||||||
|
"set a screen lock if you don't have one (Android requirement).\n" +
|
||||||
|
"3. Before tapping Start, expand \"SNI pool + tester\" and hit \"Test all\". If " +
|
||||||
|
"every entry times out, your google_ip is unreachable — replace it with one that " +
|
||||||
|
"resolves locally (e.g. `nslookup www.google.com` on any working device).\n" +
|
||||||
|
"4. Tap Start. Accept the VPN prompt. The full TUN bridge routes every app on the " +
|
||||||
|
"device through the proxy — no per-app setup needed.\n" +
|
||||||
|
"5. If Chrome shows \"504 Relay timeout\": your Apps Script deployment isn't " +
|
||||||
|
"responding. Redeploy the script, grab the new /exec URL, and paste it above. " +
|
||||||
|
"Watch Live logs for \"Relay timeout\" vs \"connect:\" errors to tell which layer " +
|
||||||
|
"is failing.\n" +
|
||||||
|
"\n" +
|
||||||
|
"Known limitation — Cloudflare Turnstile (\"Verify you are human\") will loop " +
|
||||||
|
"endlessly on most CF-protected sites. Every Apps Script request uses a rotating " +
|
||||||
|
"Google-datacenter egress IP + a fixed \"Google-Apps-Script\" User-Agent + a " +
|
||||||
|
"Google TLS fingerprint. The cf_clearance cookie is bound to the (IP, UA, JA3) " +
|
||||||
|
"tuple the challenge was solved against, so the NEXT request — from a different " +
|
||||||
|
"egress IP — gets re-challenged. Nothing in this app can fix that; it's inherent " +
|
||||||
|
"to Apps Script as a relay. Sites that only gate the initial page load (not every " +
|
||||||
|
"request) will work after one solve.",
|
||||||
|
style = MaterialTheme.typography.bodyMedium,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,97 @@
|
|||||||
|
package com.therealaleph.mhrv.ui.theme
|
||||||
|
|
||||||
|
import androidx.compose.foundation.shape.RoundedCornerShape
|
||||||
|
import androidx.compose.material3.MaterialTheme
|
||||||
|
import androidx.compose.material3.Shapes
|
||||||
|
import androidx.compose.material3.darkColorScheme
|
||||||
|
import androidx.compose.runtime.Composable
|
||||||
|
import androidx.compose.ui.graphics.Color
|
||||||
|
import androidx.compose.ui.unit.dp
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Visual theme tuned to match the desktop `mhrv-rs-ui` eframe UI pixel-for-pixel
|
||||||
|
* where Compose semantics allow. The canonical source lives in `src/bin/ui.rs`
|
||||||
|
* — these constants are the same `egui::Color32` values, re-expressed as
|
||||||
|
* `Color(0xAARRGGBB)`. If you change a value here and not there (or vice
|
||||||
|
* versa) the two builds will drift visibly.
|
||||||
|
*
|
||||||
|
* Deliberate choices:
|
||||||
|
* - ALWAYS dark. The desktop UI is always dark (`egui::Visuals::dark()`),
|
||||||
|
* so Android follows. Neither light mode nor Android 12+ dynamic color
|
||||||
|
* is respected — matching the desktop trumps blending with the user's
|
||||||
|
* wallpaper here.
|
||||||
|
* - Card corners 6.dp, button corners 4.dp, matching the eframe
|
||||||
|
* `.rounding(6.0)` / `.rounding(4.0)` pairs in the desktop code.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Exact palette from src/bin/ui.rs (line 508+).
|
||||||
|
// ACCENT / ACCENT_HOVER
|
||||||
|
val AccentBlue = Color(0xFF4678B4)
|
||||||
|
val AccentHover = Color(0xFF5A91CD)
|
||||||
|
// OK_GREEN / ERR_RED
|
||||||
|
val OkGreen = Color(0xFF50B464)
|
||||||
|
val ErrRed = Color(0xFFDC6E6E)
|
||||||
|
|
||||||
|
// Card fill and stroke used by section containers in the desktop UI.
|
||||||
|
val CardFill = Color(0xFF1C1E22)
|
||||||
|
val CardStroke = Color(0xFF32363C)
|
||||||
|
|
||||||
|
// Backdrop slightly darker than cards so containers pop off the page —
|
||||||
|
// egui's default dark background sits right around this value.
|
||||||
|
val BgDark = Color(0xFF111317)
|
||||||
|
|
||||||
|
// Text shades — `egui::Color32::from_gray(200)` etc.
|
||||||
|
val TextPrimary = Color(0xFFC8C8C8)
|
||||||
|
val TextSecondary = Color(0xFF8C8C8C)
|
||||||
|
val TextLabel = Color(0xFFB4B4B4)
|
||||||
|
|
||||||
|
private val MhrvDark = darkColorScheme(
|
||||||
|
primary = AccentBlue,
|
||||||
|
onPrimary = Color.White,
|
||||||
|
primaryContainer = AccentHover,
|
||||||
|
onPrimaryContainer = Color.White,
|
||||||
|
|
||||||
|
secondary = OkGreen,
|
||||||
|
onSecondary = Color.Black,
|
||||||
|
|
||||||
|
tertiary = OkGreen,
|
||||||
|
onTertiary = Color.Black,
|
||||||
|
|
||||||
|
error = ErrRed,
|
||||||
|
onError = Color.White,
|
||||||
|
|
||||||
|
background = BgDark,
|
||||||
|
onBackground = TextPrimary,
|
||||||
|
|
||||||
|
surface = CardFill,
|
||||||
|
onSurface = TextPrimary,
|
||||||
|
|
||||||
|
surfaceVariant = CardFill,
|
||||||
|
onSurfaceVariant = TextSecondary,
|
||||||
|
|
||||||
|
outline = CardStroke,
|
||||||
|
outlineVariant = CardStroke,
|
||||||
|
)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Material3 consumes Shapes through component defaults (Button uses
|
||||||
|
* `shapes.full`, Card uses `shapes.medium`, etc.). Mapping every size to
|
||||||
|
* tight rounded-rectangles keeps the whole app visually consistent with
|
||||||
|
* the desktop's squared-off controls instead of Material's default pills.
|
||||||
|
*/
|
||||||
|
private val MhrvShapes = Shapes(
|
||||||
|
extraSmall = RoundedCornerShape(4.dp),
|
||||||
|
small = RoundedCornerShape(4.dp),
|
||||||
|
medium = RoundedCornerShape(6.dp),
|
||||||
|
large = RoundedCornerShape(6.dp),
|
||||||
|
extraLarge = RoundedCornerShape(8.dp),
|
||||||
|
)
|
||||||
|
|
||||||
|
@Composable
|
||||||
|
fun MhrvTheme(content: @Composable () -> Unit) {
|
||||||
|
MaterialTheme(
|
||||||
|
colorScheme = MhrvDark,
|
||||||
|
shapes = MhrvShapes,
|
||||||
|
content = content,
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<!--
|
||||||
|
Vector launcher icon. Simple monogram "M" in the mhrv-rs accent color.
|
||||||
|
Using a vector keeps the APK small and adapts to any density.
|
||||||
|
-->
|
||||||
|
<vector xmlns:android="http://schemas.android.com/apk/res/android"
|
||||||
|
android:width="108dp"
|
||||||
|
android:height="108dp"
|
||||||
|
android:viewportWidth="108"
|
||||||
|
android:viewportHeight="108">
|
||||||
|
<path
|
||||||
|
android:fillColor="#4678B4"
|
||||||
|
android:pathData="M30,30 L30,78 L38,78 L38,46 L54,70 L70,46 L70,78 L78,78 L78,30 L70,30 L54,56 L38,30 Z" />
|
||||||
|
</vector>
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<adaptive-icon xmlns:android="http://schemas.android.com/apk/res/android">
|
||||||
|
<background android:drawable="@android:color/black" />
|
||||||
|
<foreground android:drawable="@drawable/ic_launcher_foreground" />
|
||||||
|
</adaptive-icon>
|
||||||
@@ -0,0 +1,5 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<adaptive-icon xmlns:android="http://schemas.android.com/apk/res/android">
|
||||||
|
<background android:drawable="@android:color/black" />
|
||||||
|
<foreground android:drawable="@drawable/ic_launcher_foreground" />
|
||||||
|
</adaptive-icon>
|
||||||
@@ -0,0 +1,4 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<resources>
|
||||||
|
<string name="app_name">mhrv-rs</string>
|
||||||
|
</resources>
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<resources>
|
||||||
|
<!--
|
||||||
|
Compose owns the runtime theme. This is only the pre-Compose splash
|
||||||
|
state (while the activity is starting) — set to a plain dark
|
||||||
|
background so you don't see a flash of white before the first frame.
|
||||||
|
-->
|
||||||
|
<style name="Theme.Mhrv" parent="android:Theme.Material.NoActionBar">
|
||||||
|
<item name="android:windowBackground">@android:color/black</item>
|
||||||
|
<item name="android:statusBarColor">@android:color/black</item>
|
||||||
|
</style>
|
||||||
|
</resources>
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<data-extraction-rules>
|
||||||
|
<cloud-backup>
|
||||||
|
<exclude domain="root" />
|
||||||
|
</cloud-backup>
|
||||||
|
<device-transfer>
|
||||||
|
<exclude domain="root" />
|
||||||
|
</device-transfer>
|
||||||
|
</data-extraction-rules>
|
||||||
@@ -0,0 +1,24 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<network-security-config>
|
||||||
|
<!--
|
||||||
|
We explicitly trust user-installed CAs for this app's own outbound
|
||||||
|
requests. This lets us talk to our OWN local MITM proxy (which signs
|
||||||
|
leaf certs with the CA we generate). Without this declaration, on
|
||||||
|
Android 7+ apps ignore user CAs — which is the whole pain point
|
||||||
|
users hit when trying to use mhrv-rs from the phone.
|
||||||
|
|
||||||
|
The system default (cleartextTrafficPermitted=false) stays. Plain
|
||||||
|
HTTP is not allowed except to localhost, which the VpnService loop
|
||||||
|
uses.
|
||||||
|
-->
|
||||||
|
<base-config cleartextTrafficPermitted="false">
|
||||||
|
<trust-anchors>
|
||||||
|
<certificates src="system" />
|
||||||
|
<certificates src="user" />
|
||||||
|
</trust-anchors>
|
||||||
|
</base-config>
|
||||||
|
<domain-config cleartextTrafficPermitted="true">
|
||||||
|
<domain includeSubdomains="false">127.0.0.1</domain>
|
||||||
|
<domain includeSubdomains="false">localhost</domain>
|
||||||
|
</domain-config>
|
||||||
|
</network-security-config>
|
||||||
@@ -0,0 +1,6 @@
|
|||||||
|
// Top-level build file. Versions are pinned here and inherited by :app.
|
||||||
|
plugins {
|
||||||
|
id("com.android.application") version "8.5.0" apply false
|
||||||
|
id("org.jetbrains.kotlin.android") version "2.0.0" apply false
|
||||||
|
id("org.jetbrains.kotlin.plugin.compose") version "2.0.0" apply false
|
||||||
|
}
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
org.gradle.jvmargs=-Xmx2048m -Dfile.encoding=UTF-8
|
||||||
|
org.gradle.parallel=true
|
||||||
|
org.gradle.caching=true
|
||||||
|
android.useAndroidX=true
|
||||||
|
kotlin.code.style=official
|
||||||
|
android.nonTransitiveRClass=true
|
||||||
|
# Pinned below SDK 35 for now — Android 14 (API 34) is fine for an app
|
||||||
|
# this simple; bumping later is a one-line change once we know the
|
||||||
|
# minimum-device-tested set.
|
||||||
BIN
Binary file not shown.
@@ -0,0 +1,7 @@
|
|||||||
|
distributionBase=GRADLE_USER_HOME
|
||||||
|
distributionPath=wrapper/dists
|
||||||
|
distributionUrl=https\://services.gradle.org/distributions/gradle-8.9-bin.zip
|
||||||
|
networkTimeout=10000
|
||||||
|
validateDistributionUrl=true
|
||||||
|
zipStoreBase=GRADLE_USER_HOME
|
||||||
|
zipStorePath=wrapper/dists
|
||||||
+248
@@ -0,0 +1,248 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
#
|
||||||
|
# Copyright © 2015 the original authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
|
||||||
|
##############################################################################
|
||||||
|
#
|
||||||
|
# Gradle start up script for POSIX generated by Gradle.
|
||||||
|
#
|
||||||
|
# Important for running:
|
||||||
|
#
|
||||||
|
# (1) You need a POSIX-compliant shell to run this script. If your /bin/sh is
|
||||||
|
# noncompliant, but you have some other compliant shell such as ksh or
|
||||||
|
# bash, then to run this script, type that shell name before the whole
|
||||||
|
# command line, like:
|
||||||
|
#
|
||||||
|
# ksh Gradle
|
||||||
|
#
|
||||||
|
# Busybox and similar reduced shells will NOT work, because this script
|
||||||
|
# requires all of these POSIX shell features:
|
||||||
|
# * functions;
|
||||||
|
# * expansions «$var», «${var}», «${var:-default}», «${var+SET}»,
|
||||||
|
# «${var#prefix}», «${var%suffix}», and «$( cmd )»;
|
||||||
|
# * compound commands having a testable exit status, especially «case»;
|
||||||
|
# * various built-in commands including «command», «set», and «ulimit».
|
||||||
|
#
|
||||||
|
# Important for patching:
|
||||||
|
#
|
||||||
|
# (2) This script targets any POSIX shell, so it avoids extensions provided
|
||||||
|
# by Bash, Ksh, etc; in particular arrays are avoided.
|
||||||
|
#
|
||||||
|
# The "traditional" practice of packing multiple parameters into a
|
||||||
|
# space-separated string is a well documented source of bugs and security
|
||||||
|
# problems, so this is (mostly) avoided, by progressively accumulating
|
||||||
|
# options in "$@", and eventually passing that to Java.
|
||||||
|
#
|
||||||
|
# Where the inherited environment variables (DEFAULT_JVM_OPTS, JAVA_OPTS,
|
||||||
|
# and GRADLE_OPTS) rely on word-splitting, this is performed explicitly;
|
||||||
|
# see the in-line comments for details.
|
||||||
|
#
|
||||||
|
# There are tweaks for specific operating systems such as AIX, CygWin,
|
||||||
|
# Darwin, MinGW, and NonStop.
|
||||||
|
#
|
||||||
|
# (3) This script is generated from the Groovy template
|
||||||
|
# https://github.com/gradle/gradle/blob/2d6327017519d23b96af35865dc997fcb544fb40/platforms/jvm/plugins-application/src/main/resources/org/gradle/api/internal/plugins/unixStartScript.txt
|
||||||
|
# within the Gradle project.
|
||||||
|
#
|
||||||
|
# You can find Gradle at https://github.com/gradle/gradle/.
|
||||||
|
#
|
||||||
|
##############################################################################
|
||||||
|
|
||||||
|
# Attempt to set APP_HOME
|
||||||
|
|
||||||
|
# Resolve links: $0 may be a link
|
||||||
|
app_path=$0
|
||||||
|
|
||||||
|
# Need this for daisy-chained symlinks.
|
||||||
|
while
|
||||||
|
APP_HOME=${app_path%"${app_path##*/}"} # leaves a trailing /; empty if no leading path
|
||||||
|
[ -h "$app_path" ]
|
||||||
|
do
|
||||||
|
ls=$( ls -ld "$app_path" )
|
||||||
|
link=${ls#*' -> '}
|
||||||
|
case $link in #(
|
||||||
|
/*) app_path=$link ;; #(
|
||||||
|
*) app_path=$APP_HOME$link ;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
# This is normally unused
|
||||||
|
# shellcheck disable=SC2034
|
||||||
|
APP_BASE_NAME=${0##*/}
|
||||||
|
# Discard cd standard output in case $CDPATH is set (https://github.com/gradle/gradle/issues/25036)
|
||||||
|
APP_HOME=$( cd -P "${APP_HOME:-./}" > /dev/null && printf '%s\n' "$PWD" ) || exit
|
||||||
|
|
||||||
|
# Use the maximum available, or set MAX_FD != -1 to use that value.
|
||||||
|
MAX_FD=maximum
|
||||||
|
|
||||||
|
warn () {
|
||||||
|
echo "$*"
|
||||||
|
} >&2
|
||||||
|
|
||||||
|
die () {
|
||||||
|
echo
|
||||||
|
echo "$*"
|
||||||
|
echo
|
||||||
|
exit 1
|
||||||
|
} >&2
|
||||||
|
|
||||||
|
# OS specific support (must be 'true' or 'false').
|
||||||
|
cygwin=false
|
||||||
|
msys=false
|
||||||
|
darwin=false
|
||||||
|
nonstop=false
|
||||||
|
case "$( uname )" in #(
|
||||||
|
CYGWIN* ) cygwin=true ;; #(
|
||||||
|
Darwin* ) darwin=true ;; #(
|
||||||
|
MSYS* | MINGW* ) msys=true ;; #(
|
||||||
|
NONSTOP* ) nonstop=true ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# Determine the Java command to use to start the JVM.
|
||||||
|
if [ -n "$JAVA_HOME" ] ; then
|
||||||
|
if [ -x "$JAVA_HOME/jre/sh/java" ] ; then
|
||||||
|
# IBM's JDK on AIX uses strange locations for the executables
|
||||||
|
JAVACMD=$JAVA_HOME/jre/sh/java
|
||||||
|
else
|
||||||
|
JAVACMD=$JAVA_HOME/bin/java
|
||||||
|
fi
|
||||||
|
if [ ! -x "$JAVACMD" ] ; then
|
||||||
|
die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
JAVACMD=java
|
||||||
|
if ! command -v java >/dev/null 2>&1
|
||||||
|
then
|
||||||
|
die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Increase the maximum file descriptors if we can.
|
||||||
|
if ! "$cygwin" && ! "$darwin" && ! "$nonstop" ; then
|
||||||
|
case $MAX_FD in #(
|
||||||
|
max*)
|
||||||
|
# In POSIX sh, ulimit -H is undefined. That's why the result is checked to see if it worked.
|
||||||
|
# shellcheck disable=SC2039,SC3045
|
||||||
|
MAX_FD=$( ulimit -H -n ) ||
|
||||||
|
warn "Could not query maximum file descriptor limit"
|
||||||
|
esac
|
||||||
|
case $MAX_FD in #(
|
||||||
|
'' | soft) :;; #(
|
||||||
|
*)
|
||||||
|
# In POSIX sh, ulimit -n is undefined. That's why the result is checked to see if it worked.
|
||||||
|
# shellcheck disable=SC2039,SC3045
|
||||||
|
ulimit -n "$MAX_FD" ||
|
||||||
|
warn "Could not set maximum file descriptor limit to $MAX_FD"
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Collect all arguments for the java command, stacking in reverse order:
|
||||||
|
# * args from the command line
|
||||||
|
# * the main class name
|
||||||
|
# * -classpath
|
||||||
|
# * -D...appname settings
|
||||||
|
# * --module-path (only if needed)
|
||||||
|
# * DEFAULT_JVM_OPTS, JAVA_OPTS, and GRADLE_OPTS environment variables.
|
||||||
|
|
||||||
|
# For Cygwin or MSYS, switch paths to Windows format before running java
|
||||||
|
if "$cygwin" || "$msys" ; then
|
||||||
|
APP_HOME=$( cygpath --path --mixed "$APP_HOME" )
|
||||||
|
|
||||||
|
JAVACMD=$( cygpath --unix "$JAVACMD" )
|
||||||
|
|
||||||
|
# Now convert the arguments - kludge to limit ourselves to /bin/sh
|
||||||
|
for arg do
|
||||||
|
if
|
||||||
|
case $arg in #(
|
||||||
|
-*) false ;; # don't mess with options #(
|
||||||
|
/?*) t=${arg#/} t=/${t%%/*} # looks like a POSIX filepath
|
||||||
|
[ -e "$t" ] ;; #(
|
||||||
|
*) false ;;
|
||||||
|
esac
|
||||||
|
then
|
||||||
|
arg=$( cygpath --path --ignore --mixed "$arg" )
|
||||||
|
fi
|
||||||
|
# Roll the args list around exactly as many times as the number of
|
||||||
|
# args, so each arg winds up back in the position where it started, but
|
||||||
|
# possibly modified.
|
||||||
|
#
|
||||||
|
# NB: a `for` loop captures its iteration list before it begins, so
|
||||||
|
# changing the positional parameters here affects neither the number of
|
||||||
|
# iterations, nor the values presented in `arg`.
|
||||||
|
shift # remove old arg
|
||||||
|
set -- "$@" "$arg" # push replacement arg
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
# Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
DEFAULT_JVM_OPTS='"-Xmx64m" "-Xms64m"'
|
||||||
|
|
||||||
|
# Collect all arguments for the java command:
|
||||||
|
# * DEFAULT_JVM_OPTS, JAVA_OPTS, and optsEnvironmentVar are not allowed to contain shell fragments,
|
||||||
|
# and any embedded shellness will be escaped.
|
||||||
|
# * For example: A user cannot expect ${Hostname} to be expanded, as it is an environment variable and will be
|
||||||
|
# treated as '${Hostname}' itself on the command line.
|
||||||
|
|
||||||
|
set -- \
|
||||||
|
"-Dorg.gradle.appname=$APP_BASE_NAME" \
|
||||||
|
-jar "$APP_HOME/gradle/wrapper/gradle-wrapper.jar" \
|
||||||
|
"$@"
|
||||||
|
|
||||||
|
# Stop when "xargs" is not available.
|
||||||
|
if ! command -v xargs >/dev/null 2>&1
|
||||||
|
then
|
||||||
|
die "xargs is not available"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Use "xargs" to parse quoted args.
|
||||||
|
#
|
||||||
|
# With -n1 it outputs one arg per line, with the quotes and backslashes removed.
|
||||||
|
#
|
||||||
|
# In Bash we could simply go:
|
||||||
|
#
|
||||||
|
# readarray ARGS < <( xargs -n1 <<<"$var" ) &&
|
||||||
|
# set -- "${ARGS[@]}" "$@"
|
||||||
|
#
|
||||||
|
# but POSIX shell has neither arrays nor command substitution, so instead we
|
||||||
|
# post-process each arg (as a line of input to sed) to backslash-escape any
|
||||||
|
# character that might be a shell metacharacter, then use eval to reverse
|
||||||
|
# that process (while maintaining the separation between arguments), and wrap
|
||||||
|
# the whole thing up as a single "set" statement.
|
||||||
|
#
|
||||||
|
# This will of course break if any of these variables contains a newline or
|
||||||
|
# an unmatched quote.
|
||||||
|
#
|
||||||
|
|
||||||
|
eval "set -- $(
|
||||||
|
printf '%s\n' "$DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS" |
|
||||||
|
xargs -n1 |
|
||||||
|
sed ' s~[^-[:alnum:]+,./:=@_]~\\&~g; ' |
|
||||||
|
tr '\n' ' '
|
||||||
|
)" '"$@"'
|
||||||
|
|
||||||
|
exec "$JAVACMD" "$@"
|
||||||
Vendored
+93
@@ -0,0 +1,93 @@
|
|||||||
|
@rem
|
||||||
|
@rem Copyright 2015 the original author or authors.
|
||||||
|
@rem
|
||||||
|
@rem Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
@rem you may not use this file except in compliance with the License.
|
||||||
|
@rem You may obtain a copy of the License at
|
||||||
|
@rem
|
||||||
|
@rem https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
@rem
|
||||||
|
@rem Unless required by applicable law or agreed to in writing, software
|
||||||
|
@rem distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
@rem WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
@rem See the License for the specific language governing permissions and
|
||||||
|
@rem limitations under the License.
|
||||||
|
@rem
|
||||||
|
@rem SPDX-License-Identifier: Apache-2.0
|
||||||
|
@rem
|
||||||
|
|
||||||
|
@if "%DEBUG%"=="" @echo off
|
||||||
|
@rem ##########################################################################
|
||||||
|
@rem
|
||||||
|
@rem Gradle startup script for Windows
|
||||||
|
@rem
|
||||||
|
@rem ##########################################################################
|
||||||
|
|
||||||
|
@rem Set local scope for the variables with windows NT shell
|
||||||
|
if "%OS%"=="Windows_NT" setlocal
|
||||||
|
|
||||||
|
set DIRNAME=%~dp0
|
||||||
|
if "%DIRNAME%"=="" set DIRNAME=.
|
||||||
|
@rem This is normally unused
|
||||||
|
set APP_BASE_NAME=%~n0
|
||||||
|
set APP_HOME=%DIRNAME%
|
||||||
|
|
||||||
|
@rem Resolve any "." and ".." in APP_HOME to make it shorter.
|
||||||
|
for %%i in ("%APP_HOME%") do set APP_HOME=%%~fi
|
||||||
|
|
||||||
|
@rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
set DEFAULT_JVM_OPTS="-Xmx64m" "-Xms64m"
|
||||||
|
|
||||||
|
@rem Find java.exe
|
||||||
|
if defined JAVA_HOME goto findJavaFromJavaHome
|
||||||
|
|
||||||
|
set JAVA_EXE=java.exe
|
||||||
|
%JAVA_EXE% -version >NUL 2>&1
|
||||||
|
if %ERRORLEVEL% equ 0 goto execute
|
||||||
|
|
||||||
|
echo. 1>&2
|
||||||
|
echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. 1>&2
|
||||||
|
echo. 1>&2
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the 1>&2
|
||||||
|
echo location of your Java installation. 1>&2
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:findJavaFromJavaHome
|
||||||
|
set JAVA_HOME=%JAVA_HOME:"=%
|
||||||
|
set JAVA_EXE=%JAVA_HOME%/bin/java.exe
|
||||||
|
|
||||||
|
if exist "%JAVA_EXE%" goto execute
|
||||||
|
|
||||||
|
echo. 1>&2
|
||||||
|
echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% 1>&2
|
||||||
|
echo. 1>&2
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the 1>&2
|
||||||
|
echo location of your Java installation. 1>&2
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:execute
|
||||||
|
@rem Setup the command line
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@rem Execute Gradle
|
||||||
|
"%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -jar "%APP_HOME%\gradle\wrapper\gradle-wrapper.jar" %*
|
||||||
|
|
||||||
|
:end
|
||||||
|
@rem End local scope for the variables with windows NT shell
|
||||||
|
if %ERRORLEVEL% equ 0 goto mainEnd
|
||||||
|
|
||||||
|
:fail
|
||||||
|
rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of
|
||||||
|
rem the _cmd.exe /c_ return code!
|
||||||
|
set EXIT_CODE=%ERRORLEVEL%
|
||||||
|
if %EXIT_CODE% equ 0 set EXIT_CODE=1
|
||||||
|
if not ""=="%GRADLE_EXIT_CONSOLE%" exit %EXIT_CODE%
|
||||||
|
exit /b %EXIT_CODE%
|
||||||
|
|
||||||
|
:mainEnd
|
||||||
|
if "%OS%"=="Windows_NT" endlocal
|
||||||
|
|
||||||
|
:omega
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
pluginManagement {
|
||||||
|
repositories {
|
||||||
|
google {
|
||||||
|
content {
|
||||||
|
includeGroupByRegex("com\\.android.*")
|
||||||
|
includeGroupByRegex("com\\.google.*")
|
||||||
|
includeGroupByRegex("androidx.*")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
mavenCentral()
|
||||||
|
gradlePluginPortal()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
dependencyResolutionManagement {
|
||||||
|
repositoriesMode.set(RepositoriesMode.FAIL_ON_PROJECT_REPOS)
|
||||||
|
repositories {
|
||||||
|
google()
|
||||||
|
mavenCentral()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
rootProject.name = "mhrv-android"
|
||||||
|
include(":app")
|
||||||
@@ -0,0 +1,385 @@
|
|||||||
|
//! JNI entry points for the Android app.
|
||||||
|
//!
|
||||||
|
//! The app (Kotlin) calls `Native.setDataDir()` once, then `Native.startProxy()`
|
||||||
|
//! with the full config.json payload and gets back a handle (u64). Later the
|
||||||
|
//! app calls `stopProxy(handle)` to stop, `statsJson(handle)` to poll, or
|
||||||
|
//! `exportCa(dest)` to copy the MITM CA cert to a path the app can hand to
|
||||||
|
//! Android's system "install certificate" dialog.
|
||||||
|
//!
|
||||||
|
//! The proxy runs on an internal tokio runtime that we own (1 worker thread
|
||||||
|
//! minimum) — we don't piggyback on the JVM thread that calls in.
|
||||||
|
//!
|
||||||
|
//! SAFETY: every `extern "system"` entry point catches panics so they never
|
||||||
|
//! unwind across the JNI boundary (UB otherwise).
|
||||||
|
|
||||||
|
#![cfg(target_os = "android")]
|
||||||
|
|
||||||
|
use std::collections::VecDeque;
|
||||||
|
use std::panic::AssertUnwindSafe;
|
||||||
|
use std::path::PathBuf;
|
||||||
|
use std::sync::atomic::{AtomicU64, Ordering};
|
||||||
|
use std::sync::{Arc, Mutex, OnceLock};
|
||||||
|
|
||||||
|
use jni::objects::{JClass, JString};
|
||||||
|
use jni::sys::{jboolean, jlong, jstring, JNI_FALSE, JNI_TRUE};
|
||||||
|
use jni::JNIEnv;
|
||||||
|
use tokio::runtime::Runtime;
|
||||||
|
use tokio::sync::{oneshot, Mutex as AsyncMutex};
|
||||||
|
|
||||||
|
use crate::config::Config;
|
||||||
|
use crate::mitm::{MitmCertManager, CA_CERT_FILE};
|
||||||
|
use crate::proxy_server::ProxyServer;
|
||||||
|
|
||||||
|
/// Running-proxy record. The JNI handle is the index into a slot map we
|
||||||
|
/// keep in a lazy-initialized global — we can't round-trip a Rust pointer
|
||||||
|
/// through `jlong` safely if the JVM compacts, but we can hand out an
|
||||||
|
/// integer key.
|
||||||
|
struct Running {
|
||||||
|
/// Dropping this sends the shutdown signal. Optional so we can `take()`
|
||||||
|
/// it in stop().
|
||||||
|
shutdown: Option<oneshot::Sender<()>>,
|
||||||
|
/// Own the runtime so it outlives the server. Dropped last.
|
||||||
|
rt: Option<Runtime>,
|
||||||
|
}
|
||||||
|
|
||||||
|
static HANDLE_COUNTER: AtomicU64 = AtomicU64::new(1);
|
||||||
|
|
||||||
|
fn slot_map() -> &'static Mutex<std::collections::HashMap<u64, Running>> {
|
||||||
|
static SLOTS: OnceLock<Mutex<std::collections::HashMap<u64, Running>>> = OnceLock::new();
|
||||||
|
SLOTS.get_or_init(|| Mutex::new(std::collections::HashMap::new()))
|
||||||
|
}
|
||||||
|
|
||||||
|
// ---------------------------------------------------------------------------
|
||||||
|
// Logging bridge.
|
||||||
|
//
|
||||||
|
// We fan each tracing event out two ways:
|
||||||
|
// 1. `__android_log_write` — lands in `adb logcat` under tag `mhrv_rs`.
|
||||||
|
// 2. An in-memory ring buffer the Kotlin UI drains via `Native.drainLogs()`.
|
||||||
|
// The first path was enough to get past "startProxy returned 0 — silent
|
||||||
|
// failure"; the second path gives the user a live log panel without making
|
||||||
|
// them attach a debugger.
|
||||||
|
// ---------------------------------------------------------------------------
|
||||||
|
|
||||||
|
extern "C" {
|
||||||
|
fn __android_log_write(prio: i32, tag: *const std::os::raw::c_char, text: *const std::os::raw::c_char) -> i32;
|
||||||
|
}
|
||||||
|
|
||||||
|
const ANDROID_LOG_INFO: i32 = 4;
|
||||||
|
const LOG_RING_CAP: usize = 500;
|
||||||
|
|
||||||
|
fn log_ring() -> &'static Mutex<VecDeque<String>> {
|
||||||
|
static RING: OnceLock<Mutex<VecDeque<String>>> = OnceLock::new();
|
||||||
|
RING.get_or_init(|| Mutex::new(VecDeque::with_capacity(LOG_RING_CAP)))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// MakeWriter that forwards each write to `__android_log_write` AND to the
|
||||||
|
/// in-memory ring buffer. One line per write call; we trim the trailing
|
||||||
|
/// newline that tracing-subscriber appends so logcat doesn't show blank
|
||||||
|
/// rows between every event.
|
||||||
|
struct LogcatWriter;
|
||||||
|
|
||||||
|
impl std::io::Write for LogcatWriter {
|
||||||
|
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
||||||
|
// Skip empty writes — tracing occasionally flushes a bare "\n".
|
||||||
|
if buf.is_empty() { return Ok(0); }
|
||||||
|
let trimmed = if buf.ends_with(b"\n") { &buf[..buf.len() - 1] } else { buf };
|
||||||
|
|
||||||
|
// logcat side.
|
||||||
|
let mut cstr = Vec::with_capacity(trimmed.len() + 1);
|
||||||
|
cstr.extend_from_slice(trimmed);
|
||||||
|
cstr.push(0);
|
||||||
|
static TAG: &[u8] = b"mhrv_rs\0";
|
||||||
|
unsafe {
|
||||||
|
__android_log_write(
|
||||||
|
ANDROID_LOG_INFO,
|
||||||
|
TAG.as_ptr() as *const std::os::raw::c_char,
|
||||||
|
cstr.as_ptr() as *const std::os::raw::c_char,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
// ring-buffer side. Best-effort UTF-8; if there are invalid bytes
|
||||||
|
// we'd rather show replacement chars than drop the line entirely.
|
||||||
|
if let Ok(mut g) = log_ring().lock() {
|
||||||
|
if g.len() >= LOG_RING_CAP {
|
||||||
|
g.pop_front();
|
||||||
|
}
|
||||||
|
let line = String::from_utf8_lossy(trimmed).into_owned();
|
||||||
|
g.push_back(line);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(buf.len())
|
||||||
|
}
|
||||||
|
fn flush(&mut self) -> std::io::Result<()> { Ok(()) }
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<'a> tracing_subscriber::fmt::MakeWriter<'a> for LogcatWriter {
|
||||||
|
type Writer = LogcatWriter;
|
||||||
|
fn make_writer(&'a self) -> Self::Writer { LogcatWriter }
|
||||||
|
}
|
||||||
|
|
||||||
|
fn install_logging_once() {
|
||||||
|
use std::sync::Once;
|
||||||
|
static ONCE: Once = Once::new();
|
||||||
|
ONCE.call_once(|| {
|
||||||
|
let filter = tracing_subscriber::EnvFilter::try_from_default_env()
|
||||||
|
.unwrap_or_else(|_| tracing_subscriber::EnvFilter::new("info"));
|
||||||
|
let _ = tracing_subscriber::fmt()
|
||||||
|
.with_env_filter(filter)
|
||||||
|
.with_target(false)
|
||||||
|
.with_ansi(false)
|
||||||
|
.with_writer(LogcatWriter)
|
||||||
|
.try_init();
|
||||||
|
|
||||||
|
let _ = rustls::crypto::ring::default_provider().install_default();
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Helper: JString -> String, defaulting to "" on any failure.
|
||||||
|
fn jstring_to_string(env: &mut JNIEnv, s: &JString) -> String {
|
||||||
|
env.get_string(s)
|
||||||
|
.map(|j| j.into())
|
||||||
|
.unwrap_or_else(|_| String::new())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn safe<F: FnOnce() -> R + std::panic::UnwindSafe, R>(default: R, f: F) -> R {
|
||||||
|
std::panic::catch_unwind(f).unwrap_or(default)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Build a throwaway tokio runtime for one-shot blocking calls from JNI.
|
||||||
|
/// Small, single-worker — sufficient for probes and cert ops.
|
||||||
|
fn one_shot_runtime() -> Option<Runtime> {
|
||||||
|
tokio::runtime::Builder::new_current_thread()
|
||||||
|
.enable_all()
|
||||||
|
.build()
|
||||||
|
.ok()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.setDataDir(String)` — must be called once, before `startProxy`.
|
||||||
|
/// The Kotlin side passes `context.filesDir.absolutePath`.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_setDataDir(
|
||||||
|
mut env: JNIEnv,
|
||||||
|
_class: JClass,
|
||||||
|
path: JString,
|
||||||
|
) {
|
||||||
|
let _ = safe((), AssertUnwindSafe(|| {
|
||||||
|
install_logging_once();
|
||||||
|
let p = jstring_to_string(&mut env, &path);
|
||||||
|
if !p.is_empty() {
|
||||||
|
crate::data_dir::set_data_dir(PathBuf::from(p));
|
||||||
|
}
|
||||||
|
}));
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.startProxy(String configJson)` -> `long` handle (0 on failure).
|
||||||
|
/// The config is parsed and validated; on success the proxy server is
|
||||||
|
/// spawned on its own tokio runtime and a non-zero handle returned.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_startProxy(
|
||||||
|
mut env: JNIEnv,
|
||||||
|
_class: JClass,
|
||||||
|
config_json: JString,
|
||||||
|
) -> jlong {
|
||||||
|
safe(0i64, AssertUnwindSafe(|| {
|
||||||
|
install_logging_once();
|
||||||
|
|
||||||
|
let json = jstring_to_string(&mut env, &config_json);
|
||||||
|
let config: Config = match serde_json::from_str(&json) {
|
||||||
|
Ok(c) => c,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("android: invalid config json: {}", e);
|
||||||
|
return 0i64;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Try to build the runtime first — if allocation fails we want to
|
||||||
|
// know before spinning up anything stateful.
|
||||||
|
let rt = match tokio::runtime::Builder::new_multi_thread()
|
||||||
|
.worker_threads(2)
|
||||||
|
.enable_all()
|
||||||
|
.thread_name("mhrv-worker")
|
||||||
|
.build()
|
||||||
|
{
|
||||||
|
Ok(r) => r,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("android: tokio runtime build failed: {}", e);
|
||||||
|
return 0i64;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let base = crate::data_dir::data_dir();
|
||||||
|
let mitm = match MitmCertManager::new_in(&base) {
|
||||||
|
Ok(m) => m,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("android: MITM CA init failed: {}", e);
|
||||||
|
return 0i64;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
let mitm = Arc::new(AsyncMutex::new(mitm));
|
||||||
|
|
||||||
|
let server = match ProxyServer::new(&config, mitm) {
|
||||||
|
Ok(s) => s,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("android: ProxyServer::new failed: {}", e);
|
||||||
|
return 0i64;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let (tx, rx) = oneshot::channel::<()>();
|
||||||
|
|
||||||
|
rt.spawn(async move {
|
||||||
|
if let Err(e) = server.run(rx).await {
|
||||||
|
tracing::error!("android: proxy server exited: {}", e);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
let handle = HANDLE_COUNTER.fetch_add(1, Ordering::Relaxed);
|
||||||
|
slot_map().lock().unwrap().insert(
|
||||||
|
handle,
|
||||||
|
Running {
|
||||||
|
shutdown: Some(tx),
|
||||||
|
rt: Some(rt),
|
||||||
|
},
|
||||||
|
);
|
||||||
|
handle as jlong
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.stopProxy(long handle)` -> boolean. Idempotent: calling on an
|
||||||
|
/// unknown handle returns false quietly.
|
||||||
|
///
|
||||||
|
/// Uses `Runtime::shutdown_timeout` instead of letting `drop(rt)` block
|
||||||
|
/// synchronously. `drop(rt)` waits forever for tokio tasks to finish, and
|
||||||
|
/// if ANY task is stuck (in-flight TLS handshake, retrying HTTP request,
|
||||||
|
/// blocked read) the whole thing deadlocks — which is exactly what caused
|
||||||
|
/// the reported "Stop doesn't disconnect; subsequent Start fails with
|
||||||
|
/// Address already in use" bug. 3s is enough for a cooperative server to
|
||||||
|
/// unwind; anything slower, we force-kill (the listener socket is released
|
||||||
|
/// as part of the forced shutdown).
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_stopProxy(
|
||||||
|
_env: JNIEnv,
|
||||||
|
_class: JClass,
|
||||||
|
handle: jlong,
|
||||||
|
) -> jboolean {
|
||||||
|
safe(JNI_FALSE, AssertUnwindSafe(|| {
|
||||||
|
let mut map = slot_map().lock().unwrap();
|
||||||
|
let Some(mut running) = map.remove(&(handle as u64)) else {
|
||||||
|
return JNI_FALSE;
|
||||||
|
};
|
||||||
|
if let Some(tx) = running.shutdown.take() {
|
||||||
|
let _ = tx.send(());
|
||||||
|
}
|
||||||
|
// Release the map lock BEFORE shutting the runtime down so concurrent
|
||||||
|
// JNI callers (stats queries, etc.) don't stall behind us.
|
||||||
|
drop(map);
|
||||||
|
if let Some(rt) = running.rt.take() {
|
||||||
|
tracing::info!("android: stopProxy handle={} — shutting runtime down", handle);
|
||||||
|
rt.shutdown_timeout(std::time::Duration::from_secs(5));
|
||||||
|
tracing::info!("android: stopProxy handle={} — runtime shutdown complete", handle);
|
||||||
|
}
|
||||||
|
JNI_TRUE
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.exportCa(String destPath)` -> boolean. Writes the MITM CA's
|
||||||
|
/// public cert to the given path. Init-safe: creates the CA on first call
|
||||||
|
/// if it doesn't exist yet.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_exportCa(
|
||||||
|
mut env: JNIEnv,
|
||||||
|
_class: JClass,
|
||||||
|
dest: JString,
|
||||||
|
) -> jboolean {
|
||||||
|
safe(JNI_FALSE, AssertUnwindSafe(|| {
|
||||||
|
install_logging_once();
|
||||||
|
let dest_path = jstring_to_string(&mut env, &dest);
|
||||||
|
if dest_path.is_empty() {
|
||||||
|
return JNI_FALSE;
|
||||||
|
}
|
||||||
|
let base = crate::data_dir::data_dir();
|
||||||
|
if MitmCertManager::new_in(&base).is_err() {
|
||||||
|
return JNI_FALSE;
|
||||||
|
}
|
||||||
|
let src = base.join(CA_CERT_FILE);
|
||||||
|
match std::fs::copy(&src, &dest_path) {
|
||||||
|
Ok(_) => JNI_TRUE,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("android: CA export to {} failed: {}", dest_path, e);
|
||||||
|
JNI_FALSE
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.version()` -> String. Trivial smoke test for the JNI linkage.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_version<'a>(
|
||||||
|
env: JNIEnv<'a>,
|
||||||
|
_class: JClass,
|
||||||
|
) -> jstring {
|
||||||
|
let v = env!("CARGO_PKG_VERSION");
|
||||||
|
env.new_string(v).map(|s| s.into_raw()).unwrap_or(std::ptr::null_mut())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.drainLogs()` -> String. Returns the full ring buffer as a single
|
||||||
|
/// `\n`-joined blob, then clears it. We return one String rather than an
|
||||||
|
/// array because it's one JNI call vs. N — the Kotlin side splits on `\n`
|
||||||
|
/// for display. Empty string when there's nothing to read.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_drainLogs<'a>(
|
||||||
|
env: JNIEnv<'a>,
|
||||||
|
_class: JClass,
|
||||||
|
) -> jstring {
|
||||||
|
let out = safe(String::new(), AssertUnwindSafe(|| {
|
||||||
|
let mut g = match log_ring().lock() {
|
||||||
|
Ok(g) => g,
|
||||||
|
Err(_) => return String::new(),
|
||||||
|
};
|
||||||
|
let lines: Vec<String> = g.drain(..).collect();
|
||||||
|
lines.join("\n")
|
||||||
|
}));
|
||||||
|
env.new_string(out).map(|s| s.into_raw()).unwrap_or(std::ptr::null_mut())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// `Native.testSni(googleIp, sni)` -> String. Returns a small JSON blob
|
||||||
|
/// like `{"ok":true,"latencyMs":123}` or `{"ok":false,"error":"..."}`.
|
||||||
|
/// Blocking call — Kotlin side should invoke on a background coroutine.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "system" fn Java_com_therealaleph_mhrv_Native_testSni<'a>(
|
||||||
|
mut env: JNIEnv<'a>,
|
||||||
|
_class: JClass,
|
||||||
|
google_ip: JString,
|
||||||
|
sni: JString,
|
||||||
|
) -> jstring {
|
||||||
|
let result_json = safe(r#"{"ok":false,"error":"panic"}"#.to_string(), AssertUnwindSafe(|| {
|
||||||
|
install_logging_once();
|
||||||
|
let ip = jstring_to_string(&mut env, &google_ip);
|
||||||
|
let s = jstring_to_string(&mut env, &sni);
|
||||||
|
if ip.is_empty() || s.is_empty() {
|
||||||
|
return r#"{"ok":false,"error":"empty google_ip or sni"}"#.to_string();
|
||||||
|
}
|
||||||
|
let Some(rt) = one_shot_runtime() else {
|
||||||
|
return r#"{"ok":false,"error":"tokio init failed"}"#.to_string();
|
||||||
|
};
|
||||||
|
let probe = rt.block_on(crate::scan_sni::probe_one(&ip, &s));
|
||||||
|
match (probe.latency_ms, probe.error) {
|
||||||
|
(Some(ms), _) => {
|
||||||
|
tracing::info!("sni_probe: {} via {} ok in {}ms", s, ip, ms);
|
||||||
|
format!(r#"{{"ok":true,"latencyMs":{}}}"#, ms)
|
||||||
|
}
|
||||||
|
(None, Some(e)) => {
|
||||||
|
// Surface the reason in logcat too — otherwise users see a
|
||||||
|
// red dot in the UI with no path to diagnose. Common causes:
|
||||||
|
// - "dns: ..." -> system resolver can't reach DNS
|
||||||
|
// - "connect: ..." -> TCP to google_ip:443 blocked
|
||||||
|
// - "handshake: ..." -> TLS fail (cert, ALPN, etc.)
|
||||||
|
tracing::warn!("sni_probe: {} via {} FAIL: {}", s, ip, e);
|
||||||
|
let cleaned = e.replace('\\', "\\\\").replace('"', "\\\"");
|
||||||
|
format!(r#"{{"ok":false,"error":"{}"}}"#, cleaned)
|
||||||
|
}
|
||||||
|
_ => r#"{"ok":false,"error":"unknown"}"#.to_string(),
|
||||||
|
}
|
||||||
|
}));
|
||||||
|
env.new_string(result_json).map(|s| s.into_raw()).unwrap_or(std::ptr::null_mut())
|
||||||
|
}
|
||||||
@@ -1,7 +1,21 @@
|
|||||||
use std::path::{Path, PathBuf};
|
use std::path::{Path, PathBuf};
|
||||||
|
use std::sync::OnceLock;
|
||||||
|
|
||||||
const APP_NAME: &str = "mhrv-rs";
|
const APP_NAME: &str = "mhrv-rs";
|
||||||
|
|
||||||
|
/// Global override. On Android the app sets this to its private files dir
|
||||||
|
/// before any other mhrv-rs code runs — avoids `directories` crate returning
|
||||||
|
/// a questionable path inside `/data/data/...` that the app may not own.
|
||||||
|
/// On desktop platforms nobody sets this and the normal fallback applies.
|
||||||
|
static DATA_DIR_OVERRIDE: OnceLock<PathBuf> = OnceLock::new();
|
||||||
|
|
||||||
|
/// Set the data directory. Takes effect ONLY on the first call — later
|
||||||
|
/// calls are no-ops (OnceLock semantics). Intended for Android's JNI init
|
||||||
|
/// path; don't call from desktop builds.
|
||||||
|
pub fn set_data_dir(path: PathBuf) {
|
||||||
|
let _ = DATA_DIR_OVERRIDE.set(path);
|
||||||
|
}
|
||||||
|
|
||||||
/// Returns the platform-appropriate user-data directory for this app, creating
|
/// Returns the platform-appropriate user-data directory for this app, creating
|
||||||
/// it if necessary. Falls back to the current directory if the dir can't be
|
/// it if necessary. Falls back to the current directory if the dir can't be
|
||||||
/// determined (rare).
|
/// determined (rare).
|
||||||
@@ -9,7 +23,13 @@ const APP_NAME: &str = "mhrv-rs";
|
|||||||
/// - macOS: `~/Library/Application Support/mhrv-rs`
|
/// - macOS: `~/Library/Application Support/mhrv-rs`
|
||||||
/// - Linux: `~/.config/mhrv-rs` (or `$XDG_CONFIG_HOME/mhrv-rs`)
|
/// - Linux: `~/.config/mhrv-rs` (or `$XDG_CONFIG_HOME/mhrv-rs`)
|
||||||
/// - Windows: `%APPDATA%\mhrv-rs`
|
/// - Windows: `%APPDATA%\mhrv-rs`
|
||||||
|
/// - Android: whatever the app passed to `set_data_dir()` (typically the
|
||||||
|
/// app's private `filesDir`).
|
||||||
pub fn data_dir() -> PathBuf {
|
pub fn data_dir() -> PathBuf {
|
||||||
|
if let Some(p) = DATA_DIR_OVERRIDE.get() {
|
||||||
|
let _ = std::fs::create_dir_all(p);
|
||||||
|
return p.clone();
|
||||||
|
}
|
||||||
let dir = directories::ProjectDirs::from("", "", APP_NAME)
|
let dir = directories::ProjectDirs::from("", "", APP_NAME)
|
||||||
.map(|d| d.config_dir().to_path_buf())
|
.map(|d| d.config_dir().to_path_buf())
|
||||||
.unwrap_or_else(|| PathBuf::from("."));
|
.unwrap_or_else(|| PathBuf::from("."));
|
||||||
|
|||||||
@@ -12,3 +12,6 @@ pub mod scan_ips;
|
|||||||
pub mod scan_sni;
|
pub mod scan_sni;
|
||||||
pub mod test_cmd;
|
pub mod test_cmd;
|
||||||
pub mod update_check;
|
pub mod update_check;
|
||||||
|
|
||||||
|
#[cfg(target_os = "android")]
|
||||||
|
pub mod android_jni;
|
||||||
|
|||||||
+108
-22
@@ -8,7 +8,8 @@ use tokio_rustls::rustls::client::danger::{
|
|||||||
};
|
};
|
||||||
use tokio_rustls::rustls::pki_types::{CertificateDer, ServerName, UnixTime};
|
use tokio_rustls::rustls::pki_types::{CertificateDer, ServerName, UnixTime};
|
||||||
use tokio_rustls::rustls::{ClientConfig, DigitallySignedStruct, SignatureScheme};
|
use tokio_rustls::rustls::{ClientConfig, DigitallySignedStruct, SignatureScheme};
|
||||||
use tokio_rustls::{TlsAcceptor, TlsConnector};
|
use tokio_rustls::rustls::server::Acceptor;
|
||||||
|
use tokio_rustls::{LazyConfigAcceptor, TlsAcceptor, TlsConnector};
|
||||||
|
|
||||||
use crate::config::Config;
|
use crate::config::Config;
|
||||||
use crate::domain_fronter::DomainFronter;
|
use crate::domain_fronter::DomainFronter;
|
||||||
@@ -725,42 +726,85 @@ async fn run_mitm_then_relay(
|
|||||||
mitm: Arc<Mutex<MitmCertManager>>,
|
mitm: Arc<Mutex<MitmCertManager>>,
|
||||||
fronter: &DomainFronter,
|
fronter: &DomainFronter,
|
||||||
) {
|
) {
|
||||||
tracing::info!("MITM TLS -> {}:{}", host, port);
|
// Peek the TLS ClientHello BEFORE minting the MITM cert. When the client
|
||||||
|
// resolves the hostname itself (DoH in Chrome/Firefox) and hands us a raw
|
||||||
let server_config = {
|
// IP via SOCKS5, the only place the real hostname lives is the SNI. If we
|
||||||
let mut m = mitm.lock().await;
|
// mint a cert for the IP, Chrome rejects with ERR_CERT_COMMON_NAME_INVALID
|
||||||
match m.get_server_config(host) {
|
// — the IP isn't in the cert's SAN. Reading SNI up front and using it as
|
||||||
Ok(c) => c,
|
// both the cert subject and the upstream Host for the Apps Script relay
|
||||||
Err(e) => {
|
// is what unblocks Cloudflare-fronted sites and any browser on Android
|
||||||
tracing::error!("cert gen failed for {}: {}", host, e);
|
// where DoH is the default.
|
||||||
return;
|
let start = match LazyConfigAcceptor::new(Acceptor::default(), sock).await {
|
||||||
}
|
Ok(s) => s,
|
||||||
}
|
|
||||||
};
|
|
||||||
let acceptor = TlsAcceptor::from(server_config);
|
|
||||||
|
|
||||||
let mut tls = match acceptor.accept(sock).await {
|
|
||||||
Ok(t) => t,
|
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
tracing::debug!("TLS accept failed for {}: {}", host, e);
|
tracing::debug!("TLS ClientHello peek failed for {}: {}", host, e);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
// Keep-alive loop: read HTTP requests from the decrypted stream.
|
let sni_hostname = start.client_hello().server_name().map(String::from);
|
||||||
// scheme=https because we MITM-terminated TLS.
|
|
||||||
|
// Effective host: SNI when present and looks like a hostname (anything
|
||||||
|
// other than a bare IPv4 literal — IP SNIs exist for weird setups but
|
||||||
|
// minting a cert for them still triggers ERR_CERT_COMMON_NAME_INVALID,
|
||||||
|
// so we fall through to the raw host in that case).
|
||||||
|
let effective_host: String = match sni_hostname.as_deref() {
|
||||||
|
Some(s) if !looks_like_ip(s) && !s.is_empty() => s.to_string(),
|
||||||
|
_ => host.to_string(),
|
||||||
|
};
|
||||||
|
|
||||||
|
tracing::info!(
|
||||||
|
"MITM TLS -> {}:{} (socks_host={}, sni={})",
|
||||||
|
effective_host,
|
||||||
|
port,
|
||||||
|
host,
|
||||||
|
sni_hostname.as_deref().unwrap_or("<none>"),
|
||||||
|
);
|
||||||
|
|
||||||
|
let server_config = {
|
||||||
|
let mut m = mitm.lock().await;
|
||||||
|
match m.get_server_config(&effective_host) {
|
||||||
|
Ok(c) => c,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::error!("cert gen failed for {}: {}", effective_host, e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let mut tls = match start.into_stream(server_config).await {
|
||||||
|
Ok(t) => t,
|
||||||
|
Err(e) => {
|
||||||
|
tracing::debug!("TLS accept failed for {}: {}", effective_host, e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Keep-alive loop: read HTTP requests from the decrypted stream. Pass the
|
||||||
|
// SNI-derived hostname so the Apps Script relay fetches
|
||||||
|
// `https://<real hostname>/path` instead of `https://<raw IP>/path` — the
|
||||||
|
// latter would produce an IP-in-Host request that Cloudflare/etc. reject
|
||||||
|
// outright.
|
||||||
loop {
|
loop {
|
||||||
match handle_mitm_request(&mut tls, host, port, fronter, "https").await {
|
match handle_mitm_request(&mut tls, &effective_host, port, fronter, "https").await {
|
||||||
Ok(true) => continue,
|
Ok(true) => continue,
|
||||||
Ok(false) => break,
|
Ok(false) => break,
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
tracing::debug!("MITM handler error for {}: {}", host, e);
|
tracing::debug!("MITM handler error for {}: {}", effective_host, e);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// True if `s` parses as an IPv4 or IPv6 literal. Used to decide whether
|
||||||
|
/// a string is a hostname we should mint a MITM leaf cert for — IP SANs
|
||||||
|
/// need their own cert extension and we don't bother emitting those,
|
||||||
|
/// so fall back to the SOCKS5-provided target in that case.
|
||||||
|
fn looks_like_ip(s: &str) -> bool {
|
||||||
|
s.parse::<std::net::IpAddr>().is_ok()
|
||||||
|
}
|
||||||
|
|
||||||
// ---------- Plain HTTP relay on a raw TCP stream (port 80 targets) ----------
|
// ---------- Plain HTTP relay on a raw TCP stream (port 80 targets) ----------
|
||||||
|
|
||||||
async fn relay_http_stream_raw(
|
async fn relay_http_stream_raw(
|
||||||
@@ -959,6 +1003,48 @@ where
|
|||||||
format!("{}://{}:{}{}", scheme, host, port, path)
|
format!("{}://{}:{}{}", scheme, host, port, path)
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Short-circuit CORS preflight at the MITM boundary.
|
||||||
|
//
|
||||||
|
// Apps Script's UrlFetchApp.fetch() only accepts methods {get, delete,
|
||||||
|
// patch, post, put} — OPTIONS triggers the Swedish-localized
|
||||||
|
// "Ett attribut med ogiltigt värde har angetts: method" error, which
|
||||||
|
// kills every XHR/fetch preflight and is the root cause of "JS doesn't
|
||||||
|
// load" on sites like Discord, Yahoo finance widgets, etc.
|
||||||
|
//
|
||||||
|
// Answering the preflight ourselves is safe: we already terminate the
|
||||||
|
// TLS for the browser (we minted the cert), so it's legitimate for us
|
||||||
|
// to own the wire-level conversation. CORS is a browser-side
|
||||||
|
// protection, not a network security one — responding 204 with
|
||||||
|
// permissive ACL headers just tells the browser the *subsequent* real
|
||||||
|
// request is allowed, and that real request still goes through the
|
||||||
|
// Apps Script relay where the origin server gets final say on content.
|
||||||
|
// The origin header is echoed (not "*") so Credentials-true responses
|
||||||
|
// stay spec-valid.
|
||||||
|
if method.eq_ignore_ascii_case("OPTIONS") {
|
||||||
|
tracing::info!("preflight 204 {} (short-circuit, no relay)", url);
|
||||||
|
let origin = header_value(&headers, "origin").unwrap_or("*");
|
||||||
|
let acrm = header_value(&headers, "access-control-request-method")
|
||||||
|
.unwrap_or("GET, POST, PUT, DELETE, PATCH, OPTIONS, HEAD");
|
||||||
|
let acrh = header_value(&headers, "access-control-request-headers").unwrap_or("*");
|
||||||
|
let resp = format!(
|
||||||
|
"HTTP/1.1 204 No Content\r\n\
|
||||||
|
Access-Control-Allow-Origin: {origin}\r\n\
|
||||||
|
Access-Control-Allow-Methods: {acrm}\r\n\
|
||||||
|
Access-Control-Allow-Headers: {acrh}\r\n\
|
||||||
|
Access-Control-Allow-Credentials: true\r\n\
|
||||||
|
Access-Control-Max-Age: 86400\r\n\
|
||||||
|
Vary: Origin, Access-Control-Request-Method, Access-Control-Request-Headers\r\n\
|
||||||
|
Content-Length: 0\r\n\
|
||||||
|
\r\n",
|
||||||
|
);
|
||||||
|
stream.write_all(resp.as_bytes()).await?;
|
||||||
|
stream.flush().await?;
|
||||||
|
let connection_close = headers
|
||||||
|
.iter()
|
||||||
|
.any(|(k, v)| k.eq_ignore_ascii_case("connection") && v.eq_ignore_ascii_case("close"));
|
||||||
|
return Ok(!connection_close);
|
||||||
|
}
|
||||||
|
|
||||||
tracing::info!("relay {} {}", method, url);
|
tracing::info!("relay {} {}", method, url);
|
||||||
|
|
||||||
let response = fronter.relay(&method, &url, &headers, &body).await;
|
let response = fronter.relay(&method, &url, &headers, &body).await;
|
||||||
|
|||||||
Reference in New Issue
Block a user