Merge pull request #334 from Mr-Update/patch-14

Small corrections
This commit is contained in:
RustDesk 2023-11-09 23:00:44 +08:00 committed by GitHub
commit f78ef834d2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 69 additions and 50 deletions

View File

@ -10,14 +10,15 @@ Der RustDesk-Client wird auf Geräten verwendet, um sich mit unserem RustDesk-Se
### Unterstützte Plattformen
- Microsoft Windows
- macOS
- Debian-Ableger (Ubuntu, Mint usw.)
- Redhat-Ableger (Centos, Rocky usw.)
- Debian-Ableger (Ubuntu ≥ 16, Linux Mint usw.)
- Red Hat-Ableger (CentOS, Fedora ≥ 18, Rocky usw.)
- Arch Linux/Manjaro
- openSUSE
- NixOS
- AppImage / Flatpak
- Android
- iOS (keine Unterstützung bei der Kontrolle)
- Web (1.1.9 Beta)
- Web
### Installation
@ -39,32 +40,56 @@ Aktivieren Sie die angeforderten Berechtigungen und folgen Sie den Aufforderunge
#### Linux
Bitte beachten Sie die unten stehenden Anweisungen zur Installation für die verschiedenen Linux-Varianten, alle Installationsprogramme befinden sich auf GitHub.
Bitte beachten Sie die unten stehenden Anweisungen zur Installation für die verschiedenen Linux-Varianten. Installationsprogramme sind auf GitHub oder im Repository der jeweiligen Distribution verfügbar.
#### Debian-Ableger (≥ 16)
##### Debian-Ableger
```sh
# Bitte ignorieren Sie den falschen Bericht zur Festplattennutzung
sudo apt install -fy ./rustdesk-<version>.deb
```
#### CentOS/Fedora (≥ 18)
##### Red Hat-Ableger
```sh
sudo yum localinstall ./rustdesk-<version>.rpm
```
#### Arch Linux/Manjaro
##### Arch Linux/Manjaro
```sh
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
```
#### openSUSE (≥ Leap 15.0)
##### openSUSE (≥ Leap 15.0)
```sh
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm
```
##### Nix / NixOS (≥ 22.05)
Geben Sie temporär eine Shell ein, in der `rustdesk` bereit zur Ausführung ist:
```sh
nix shell nixpkgs#rustdesk
```
Installation im aktuellen Benutzerprofil:
```sh
nix profile install nixpkgs#rustdesk
```
Um systemweit in NixOS zu installieren, führen Sie `nixos-rebuild switch --flake /etc/nixos` aus, nachdem Sie `configuration.nix` bearbeitet haben:
```
environment.systemPackages = with pkgs; [
...
rustdesk
];
```
#### Android
Installieren Sie die APK von unserem GitHub. Weitere Informationen finden Sie auf der [Android-Seite](https://rustdesk.com/docs/de/client/android/).
@ -112,4 +137,3 @@ Wenn Sie einen Client manuell einrichten, können Sie die Datei `RustDesk2.toml`
Zusätzliche erweiterte Parameter finden Sie [hier](https://github.com/rustdesk/rustdesk/blob/bdc5cded221af9697eb29aa30babce75e987fcc9/src/core_main.rs#L242).
{{% children depth="1" showhidden="true" %}}

View File

@ -10,14 +10,15 @@ The RustDesk Client is used on devices to connect via our RustDesk Server either
### Supported Platforms
- Microsoft Windows
- macOS
- Debian Derivatives (Ubuntu, Mint, etc.)
- Redhat Derivatives (Centos, Rocky, etc.)
- Debian Derivatives (Ubuntu ≥ 16, Linux Mint, etc.)
- Red Hat Derivatives (CentOS, Fedora ≥ 18, Rocky Linux, etc.)
- Arch Linux/Manjaro
- openSUSE
- NixOS
- AppImage / Flatpak
- Android
- iOS (not support being controlled)
- Web (1.1.9 Beta)
- Web
### Installation
@ -41,14 +42,14 @@ Enable permissions requested and follow prompts on the left hand side of RustDes
Please see below instructions to install for the various "flavours" of Linux (installers are on GitHub or available from a distro's repository).
##### Debian Derivatives (>= 16)
##### Debian Derivatives
```sh
# please ignore the wrong disk usage report
sudo apt install -fy ./rustdesk-<version>.deb
```
##### CentOS/Fedora (>= 18)
##### Red Hat Derivatives
```sh
sudo yum localinstall ./rustdesk-<version>.rpm
@ -60,13 +61,13 @@ sudo yum localinstall ./rustdesk-<version>.rpm
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
```
##### openSUSE (>= Leap 15.0)
##### openSUSE ( Leap 15.0)
```sh
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm
```
##### Nix / NixOS (>= 22.05)
##### Nix / NixOS ( 22.05)
Temporary enter a shell with `rustdesk` ready to run:
@ -121,7 +122,7 @@ You can manually setup a client. To do this:
1. Click on Settings.
2. Click on Network.
3. Click Unlock Network Settings.
4. Enter your ID, Relay, API (if using pro) servers and your key.
4. Enter your ID, Relay, API (if using pro server) and your key.
![](/docs/en/client/images/network-settings.png)
@ -136,4 +137,3 @@ If you manually setup a client, you can retrieve the `RustDesk2.toml` (in the us
Additional Advanced parameters can be found [here](https://github.com/rustdesk/rustdesk/blob/bdc5cded221af9697eb29aa30babce75e987fcc9/src/core_main.rs#L242).
{{% children depth="1" showhidden="true" %}}

View File

@ -24,7 +24,7 @@ In `Mouse mode`,you can also trigger the remote device's `Right Mouse` with a `T
### File Transfer (Android)
> Requires RustDesk >= 1.1.9
> Requires RustDesk 1.1.9
In the device list on the home page, select the device.

View File

@ -53,7 +53,7 @@ The default type of the RustDesk service is `init_t`, which is determined by [th
**Caution**: Modifying the default type means that the policies of other services may also change. Please use this method with caution!
Edit the rule file rustdesk.te:
Edit the rule file `rustdesk.te`:
```text
module rustdesk 1.0;
@ -91,17 +91,17 @@ allow init_t pulseaudio_home_t:file { read write open lock };
allow init_t session_dbusd_tmp_t:sock_file write;
allow init_t unconfined_dbusd_t:unix_stream_socket connectto;
#!!!! This avc can be allowed using the boolean 'nis_enabled'
#!!!! This AVC can be allowed using the boolean 'nis_enabled'
allow init_t ephemeral_port_t:tcp_socket name_connect;
#!!!! This avc can be allowed using the boolean 'domain_can_mmap_files'
#!!!! This AVC can be allowed using the boolean 'domain_can_mmap_files'
allow init_t sudo_exec_t:file map;
#============= init_t wayland ==============
#============= init_t Wayland ==============
allow init_t event_device_t:chr_file { open read write };
#!!!! This avc can be allowed using the boolean 'domain_can_mmap_files'
#!!!! This AVC can be allowed using the boolean 'domain_can_mmap_files'
allow init_t user_tmp_t:file map;
```
@ -541,7 +541,7 @@ gen_require(`
###############################################################################
#
# Part 1. The following rules are mainly from the open source `init.te`
# Part 1. The following rules are mainly from the open source `init.te`.
# https://github.com/fedora-selinux/selinux-policy/blob/rawhide/policy/modules/system/init.te
#
# Note: Part 1 will probably be mostly the same as Part 3. But it's acceptable for now.
@ -559,7 +559,7 @@ typeattribute rustdesk_t init_script_domain_type;
########################################
# Use capabilities. old rule:
# Use capabilities, old rule:
allow rustdesk_t self:capability ~{ audit_control audit_write sys_module };
allow rustdesk_t self:capability2 ~{ mac_admin mac_override };
allow rustdesk_t self:cap_userns all_cap_userns_perms;
@ -623,7 +623,7 @@ allow rustdesk_t machineid_t:file mounton;
allow rustdesk_t initctl_t:fifo_file manage_fifo_file_perms;
dev_filetrans(rustdesk_t, initctl_t, fifo_file)
# Modify utmp.
# Modify utmp
allow rustdesk_t initrc_var_run_t:file { rw_file_perms setattr };
kernel_read_system_state(rustdesk_t)
@ -641,7 +641,7 @@ kernel_read_all_proc(rustdesk_t)
kernel_list_all_proc(rustdesk_t)
kernel_mounton_all_proc(rustdesk_t)
# There is bug in kernel in 4.16 where lot of domains requesting module_request, for now dontauditing
# There is bug in kernel 4.16 where lot of domains requesting module_request, for now dontauditing
kernel_dontaudit_request_load_module(rustdesk_t)
corecmd_exec_chroot(rustdesk_t)
@ -693,11 +693,11 @@ files_manage_all_locks(rustdesk_t)
files_manage_etc_runtime_files(rustdesk_t)
files_manage_etc_symlinks(rustdesk_t)
files_etc_filetrans_etc_runtime(rustdesk_t, file)
# Run /etc/X11/prefdm:
# Run /etc/X11/prefdm
files_exec_etc_files(rustdesk_t)
files_read_usr_files(rustdesk_t)
files_write_root_dirs(rustdesk_t)
# file descriptors inherited from the rootfs:
# file descriptors inherited from the rootfs
files_dontaudit_rw_root_files(rustdesk_t)
files_dontaudit_rw_root_chr_files(rustdesk_t)
files_dontaudit_mounton_modules_object(rustdesk_t)
@ -760,7 +760,7 @@ term_watch_reads_unallocated_ttys(rustdesk_t)
term_watch_user_ttys(rustdesk_t)
term_watch_reads_user_ttys(rustdesk_t)
# Run init scripts.
# Run init scripts
init_domtrans_script(rustdesk_t)
init_exec_notrans_direct_init_entry(rustdesk_t)
@ -1050,7 +1050,7 @@ allow rustdesk_t pulseaudio_home_t:file { read open write lock };
allow rustdesk_t user_fonts_cache_t:dir { add_name remove_name } ;
allow rustdesk_t user_fonts_cache_t:file { create open read write lock unlink };
#!!!! This avc can be allowed using the boolean 'nis_enabled'
#!!!! This AVC can be allowed using the boolean 'nis_enabled'
allow rustdesk_t unreserved_port_t:tcp_socket name_connect;
allow rustdesk_t xserver_port_t:tcp_socket name_connect;
allow rustdesk_t xserver_t:unix_stream_socket connectto;
@ -1797,9 +1797,9 @@ system_u:system_r:rustdesk_t:s0 110565 ? 00:00:00 rustdesk
You can use the `sepolicy generate` command:
```sh
$ # install deps
$ # install dependencies
$ sudo dnf install -y rpm rpm-build binutils
$ # generate
$ # generate policy
$ sepolicy generate --init /usr/lib/rustdesk/rustdesk
$ tree
.
@ -1813,14 +1813,12 @@ $
$
$ # generate rpm package rustdesk_selinux-1.0-1.fc38.src.rpm
$ sudo ./rustdesk.sh
$ # install
$ # install package
$ sudo dnf install -y rustdesk_selinux-1.0-1.fc38.src.rpm
$ # restart the service
$ sudo systemctl restart rustdesk
```
### Troubleshooting
#### Iteratively Add Policies
```sh
@ -1836,4 +1834,3 @@ $ make clean && make && sudo make install-policy
- [SELinux/Tutorials](https://wiki.gentoo.org/wiki/SELinux/Tutorials)
- [SELinux Policy module installation](https://fedoraproject.org/wiki/SELinux/IndependentPolicy#SELinux_Policy_module_installation)
- [How to create SELinux custom policy rpm package](https://lukas-vrabec.com/index.php/2015/07/07/how-to-create-selinux-custom-policy-rpm-package/)

View File

@ -5,14 +5,14 @@ weight: 4
### Installation
#### Ubuntu (>= 16)
#### Ubuntu ( 16)
```sh
# please ignore the wrong disk usage report
sudo apt install -fy ./rustdesk-<version>.deb
```
#### CentOS/Fedora (>= 18)
#### CentOS/Fedora ( 18)
```sh
sudo yum localinstall ./rustdesk-<version>.rpm
@ -24,7 +24,7 @@ sudo yum localinstall ./rustdesk-<version>.rpm
sudo pacman -U ./rustdesk-<version>.pkg.tar.zst
```
#### openSUSE (>= Leap 15.0)
#### openSUSE ( Leap 15.0)
```sh
sudo zypper install --allow-unsigned-rpm ./rustdesk-<version>-suse.rpm

View File

@ -19,7 +19,7 @@ You only need to do this if you want to change the default server and public key
The server URL and key you are using is hidden from other users on GitHub however they can download your client and connect to your server. If you require a fully private repo you can import the RustDesk Client repo using https://github.com/new/import. **If you use a private repo you have limited amounts of builds you can create per month, if you need more you will need to have a paid GitHub account.**
{{% /notice %}}
On your fork you just created go to "Settings -> Secrets and variables -> Actions".
On your fork you just created go to "Settings → Secrets and variables → Actions".
Click "New repository secret", for the name put RENDEZVOUS_SERVER, for the secret put your servers name/ip address.
@ -31,7 +31,7 @@ Click "Add secret".
### Enable workflows
On your fork you just created go to "Settings -> Actions -> General".
On your fork you just created go to "Settings → Actions → General".
On the right, select "Allow all actions and reusable workflows".
@ -43,7 +43,7 @@ Finally you can click "Run workflow" to build the RustDesk Clients for all of th
### Enable upload permissions for workflows
On your fork you just created go to "Settings -> Actions -> General".
On your fork you just created go to "Settings → Actions → General".
Scroll down and under Workflow permissions enable "Read and write permissions".

View File

@ -42,7 +42,7 @@ Click on above `Advanced Settings`.
{{% notice note %}}
Synology's OS is Debian based, so host net (--net=host) works fine, we do not need to map ports with `-p` option.
`192.168.16.98` is an internal IP used here for demonstration only, please set it to a public IP when you deploy (or you can use your DDNS address if you have configured one in "Control Panel -> Connectivity -> DDNS") and don't forget to open ports on your router and your Synology firewall if this is enabled ("Control Panel -> Connectivity -> Firewall")!
`192.168.16.98` is an internal IP used here for demonstration only, please set it to a public IP when you deploy (or you can use your DDNS address if you have configured one in "Control Panel → Connectivity → DDNS") and don't forget to open ports on your router and your Synology firewall if this is enabled ("Control Panel → Connectivity → Firewall")!
{{% /notice %}}
@ -70,4 +70,3 @@ Please repeat above `hbbs` steps, but name the container `hbbr` and command (for
### Retrieve your Key
Browse to the folder setup before using File Station, download `id_ed25519.pub` and open with a text editor to via your key.

View File

@ -81,10 +81,9 @@ Gmail in this example
### Assign Device Users and Groups to Devices
The User is the RustDesk User logged in on the device or assigned to the device by clicking `Edit` next to the device, click in the `User` box and drop-down to select your user, this will auto assign the group based on the group the user as been assigned to.
This can also be done via the API at command line on deployment or later by calling the RustDesk executable followed by `--assign --token <generatedtoken> --user_name <username>`. You need to go to "Settings -> Tokens -> Create" and create a token with Device permissions first to do this. An example of this on windows would be `"C:\Program Files\RustDesk\rustdesk.exe" --assign --token <generatedtoken> --user_name <newuser>`.
This can also be done via the API at command line on deployment or later by calling the RustDesk executable followed by `--assign --token <generatedtoken> --user_name <username>`. You need to go to "Settings → Tokens → Create" and create a token with Device permissions first to do this. An example of this on windows would be `"C:\Program Files\RustDesk\rustdesk.exe" --assign --token <generatedtoken> --user_name <newuser>`.
### Searching for a device
1. Go to Devices.
2. In the Device Name Search Field type in the name and click `Query` or hit <kbd>Enter</kbd>.
3. To use a wildcard add `%` at the start, end or both of the search term.

View File

@ -7,7 +7,7 @@ weight: 6
Install Docker with this [guide](https://docs.docker.com/engine/install) to ensure its the most up to date!
Run the following commands (s6 image may need ./data:/data instead of ./data:/root):
Run the following commands (s6 image may need `./data:/data` instead of `./data:/root`):
```sh
sudo docker image pull rustdesk/rustdesk-server-pro

View File

@ -48,4 +48,4 @@ Note: No http / https before the addresses they are automatically handled. A
If you have an error 500.52 add the mentioned variables: [IIS acting as reverse proxy: Where the problems start](https://techcommunity.microsoft.com/t5/iis-support-blog/iis-acting-as-reverse-proxy-where-the-problems-start/ba-p/846259).
You maybe need to change your SSL Settings to "Require SSL -> Ignore".
You maybe need to change your SSL Settings to "Require SSL Ignore".