m2geval / rust /cursor-free-everyday_block_bench.jsonl
Tswatery's picture
Add files using upload-large-folder tool
f18999e verified
{"repo_name": "cursor-free-everyday", "file_name": "/cursor-free-everyday/reset_machine.rs", "inference_info": {"prefix_code": "use colored::*;\nuse directories::{BaseDirs, UserDirs};\nuse is_elevated::is_elevated;\nuse serde::{Deserialize, Serialize};\nuse serde_json::Value;\nuse std::collections::HashMap;\nuse std::env;\nuse std::fs;\nuse std::io::{self, Write};\nuse std::path::{Path, PathBuf};\nuse std::process::{Command, Stdio};\nuse sysinfo::{System};\nuse uuid::Uuid;\nuse winreg::enums::*;\nuse winreg::RegKey;\nuse chrono::Local;\nuse rand::{thread_rng, Rng, distributions::Alphanumeric};\n\n// Color definitions (approximated from PowerShell)\nconst RED: &str = \"red\";\nconst GREEN: &str = \"green\";\nconst YELLOW: &str = \"yellow\";\nconst BLUE: &str = \"blue\";\n// const NC: &str = \"clear\"; // `colored` crate handles reset implicitly or via `.normal()`\n\n// Max retries and wait time for process termination\nconst MAX_RETRIES: u32 = 5;\nconst WAIT_TIME_SECONDS: u64 = 1;\n\n// Configuration file paths\nfn get_storage_file_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir(); // Typically %APPDATA% or ~/.config\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"storage.json\"))\n } else {\n None\n }\n}\n\nfn get_backup_dir_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir();\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"backups\"))\n } else {\n None\n }\n}\n\nfn get_cursor_package_path() -> Option<PathBuf> {\n ", "suffix_code": "\n None\n}\n\nfn get_cursor_updater_path() -> Option<PathBuf> {\n if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n Some(local_app_data_dir.join(\"cursor-updater\"))\n } else {\n None\n }\n}\n\n\nfn press_enter_to_exit(exit_code: i32) {\n print!(\"Press Enter to exit...\");\n io::stdout().flush().unwrap();\n let mut buffer = String::new();\n io::stdin().read_line(&mut buffer).unwrap();\n std::process::exit(exit_code);\n}\n\nfn main() {\n // Set output encoding to UTF-8 (Rust strings are UTF-8 by default, console might need setup on Windows)\n // On Windows, `chcp 65001` might be needed in the terminal before running for full UTF-8 display.\n // The script itself cannot reliably change the parent console's encoding.\n\n // Check administrator privileges\n if !is_elevated() {\n println!(\"{}\", \"[ERROR] Please run this script as administrator\".color(RED));\n println!(\"Right-click the executable and select 'Run as administrator'\");\n press_enter_to_exit(1);\n }\n\n // Display Logo\n // Using simple print for now, can be enhanced\n Command::new(\"cmd\").args(&[\"/c\", \"cls\"]).status().unwrap(); // Clear screen on Windows\n\n println!(\"{}\", r#\"\n β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— \n β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘\n β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•\n\n\"#.bright_cyan());\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"Cursor Device ID Modifier Tool\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\" {}\", \"Free tool for Cursor device ID management\".color(YELLOW));\n println!(\" {}\", \"[IMPORTANT] This is a free community tool\".color(YELLOW));\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"QQηΎ€: 951642519 (亀桁/下载纯免费θ‡ͺεŠ¨θ΄¦ε·εˆ‡ζ’ε·₯ε…·)\".color(YELLOW));\n println!(\"\");\n\n // Get and display Cursor version\n let cursor_version = get_cursor_version();\n match &cursor_version {\n Some(version) => println!(\"{} Current Cursor version: v{}\", \"[INFO]\".color(GREEN), version),\n None => {\n println!(\"{} Unable to detect Cursor version\", \"[WARNING]\".color(YELLOW));\n println!(\"{} Please ensure Cursor is properly installed\", \"[TIP]\".color(YELLOW));\n }\n }\n println!(\"\");\n\n println!(\"{} Latest 0.45.x (supported)\", \"[IMPORTANT NOTE]\".color(YELLOW));\n println!(\"\");\n\n // Check and close Cursor processes\n println!(\"{} Checking Cursor processes...\", \"[INFO]\".color(GREEN));\n close_cursor_process(\"Cursor\");\n close_cursor_process(\"cursor\");\n println!(\"\");\n\n let storage_file_path = match get_storage_file_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for storage file.\".color(RED));\n press_enter_to_exit(1);\n unreachable!(); // press_enter_to_exit exits\n }\n };\n // println!(\"Storage file path: {:?}\", storage_file_path);\n\n let backup_dir_path = match get_backup_dir_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for backup directory.\".color(RED));\n press_enter_to_exit(1);\n unreachable!();\n }\n };\n // println!(\"Backup dir path: {:?}\", backup_dir_path);\n\n // Create backup directory\n if !backup_dir_path.exists() {\n match fs::create_dir_all(&backup_dir_path) {\n Ok(_) => println!(\"{} Created backup directory at {:?}\", \"[INFO]\".color(GREEN), backup_dir_path),\n Err(e) => {\n println!(\"{} Failed to create backup directory at {:?}: {}\", \"[ERROR]\".color(RED), backup_dir_path, e);\n press_enter_to_exit(1);\n }\n }\n }\n\n // Backup existing configuration\n if storage_file_path.exists() {\n println!(\"{} Backing up configuration file...\", \"[INFO]\".color(GREEN));\n let backup_name = format!(\"storage.json.backup_{}\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir_path.join(backup_name);\n match fs::copy(&storage_file_path, &backup_file_path) {\n Ok(_) => println!(\"{} Configuration backed up to {:?}\", \"[INFO]\".color(GREEN), backup_file_path),\n Err(e) => {\n println!(\"{} Failed to backup configuration file to {:?}: {}\", \"[ERROR]\".color(RED), backup_file_path, e);\n // Decide if this is a fatal error or a warning\n }\n }\n } else {\n println!(\"{} No existing configuration file found at {:?} to back up.\", \"[INFO]\".color(GREEN), storage_file_path);\n }\n println!(\"\");\n\n // Generate new IDs\n println!(\"{} Generating new IDs...\", \"[INFO]\".color(GREEN));\n let mac_machine_id = new_standard_machine_id();\n let uuid_str = Uuid::new_v4().to_string();\n let prefix_hex = \"auth0|user_\".as_bytes().iter().map(|b| format!(\"{:02x}\", b)).collect::<String>();\n let random_part = get_random_hex(32);\n let machine_id = format!(\"{}{}\", prefix_hex, random_part);\n let sqm_id = format!(\"{{{}}}\", Uuid::new_v4().to_string().to_uppercase());\n\n // println!(\"Generated MAC_MACHINE_ID: {}\", mac_machine_id);\n // println!(\"Generated UUID_STR: {}\", uuid_str);\n // println!(\"Generated MACHINE_ID: {}\", machine_id);\n // println!(\"Generated SQM_ID: {}\", sqm_id);\n // println!(\"\");\n\n // Update MachineGuid in registry\n let mut machine_guid_updated = false;\n if cfg!(target_os = \"windows\") { // Only run on Windows\n machine_guid_updated = update_machine_guid(&backup_dir_path);\n } else {\n println!(\"{} Skipping MachineGuid update (not on Windows)\", \"[INFO]\".color(YELLOW));\n }\n\n // Create or update configuration file\n println!(\"{} Updating configuration...\", \"[INFO]\".color(GREEN));\n let storage_update_successful = update_storage_file(\n &storage_file_path,\n &machine_id,\n &mac_machine_id,\n &uuid_str, // This was $UUID in PowerShell, which corresponds to devDeviceId\n &sqm_id\n );\n\n if storage_update_successful {\n println!(\"{} Configuration updated successfully.\", \"[INFO]\".color(GREEN));\n // Display results\n println!(\"\");\n println!(\"{} Configuration updated details:\", \"[INFO]\".color(GREEN));\n println!(\"{} machineId: {}\", \"[DEBUG]\".color(BLUE), machine_id);\n println!(\"{} macMachineId: {}\", \"[DEBUG]\".color(BLUE), mac_machine_id);\n println!(\"{} devDeviceId: {}\", \"[DEBUG]\".color(BLUE), uuid_str);\n println!(\"{} sqmId: {}\", \"[DEBUG]\".color(BLUE), sqm_id);\n } else {\n println!(\"{} Main operation failed to update storage file.\", \"[ERROR]\".color(RED));\n // The PS script has an alternative method here, which is complex.\n // For now, we'll just indicate failure.\n press_enter_to_exit(1);\n }\n println!(\"\");\n\n // Display file tree structure\n println!(\"{} File structure:\", \"[INFO]\".color(GREEN));\n if let Some(user_dirs) = UserDirs::new() {\n // %APPDATA%\\Cursor\\User is not directly available via UserDirs or BaseDirs in a cross-platform way for this specific structure.\n // We'll construct it based on APPDATA which UserDirs doesn't directly give, BaseDirs::config_dir() is the closest.\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir_equivalent = base_dirs.config_dir(); // This is platform specific, e.g. %APPDATA% on Windows\n println!(\"{}\", app_data_dir_equivalent.join(\"Cursor\").join(\"User\").display().to_string().color(BLUE));\n }\n } else {\n println!(\"{} Could not determine APPDATA path for display.\", \"[WARNING]\".color(YELLOW));\n }\n println!(\"β”œβ”€β”€ globalStorage\");\n println!(\"β”‚ β”œβ”€β”€ storage.json (modified)\");\n println!(\"β”‚ └── backups\");\n\n // List backup files\n match fs::read_dir(&backup_dir_path) {\n Ok(entries) => {\n let mut backup_files_found = false;\n for entry in entries {\n if let Ok(entry) = entry {\n if entry.path().is_file() {\n println!(\"β”‚ └── {}\", entry.file_name().to_string_lossy());\n backup_files_found = true;\n }\n }\n }\n if !backup_files_found {\n println!(\"β”‚ └── (empty)\");\n }\n }\n Err(e) => {\n println!(\"β”‚ └── (Error reading backups: {})\", e);\n }\n }\n println!(\"\");\n\n // Display completion message\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\"\");\n println!(\"{} Please restart Cursor to apply new configuration\", \"[INFO]\".color(GREEN));\n println!(\"\");\n\n press_enter_to_exit(0);\n}\n\nfn get_random_hex(length: usize) -> String {\n thread_rng()\n .sample_iter(&Alphanumeric)\n .take(length)\n .map(char::from)\n .collect::<String>()\n .to_lowercase() // PowerShell version produces lowercase hex\n}\n\nfn new_standard_machine_id() -> String {\n // Template: xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\n // y is one of 8, 9, a, b\n let mut rng = thread_rng();\n let mut id = String::with_capacity(36);\n for (i, char_template) in \"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\".chars().enumerate() {\n if char_template == '-' || char_template == '4' {\n id.push(char_template);\n } else if char_template == 'x' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(0..16)));\n } else if char_template == 'y' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(8..12))); // 8, 9, a, b\n }\n }\n id\n}\n\n#[derive(Deserialize)]\nstruct PackageJson {\n version: String,\n}\n\nfn get_cursor_version() -> Option<String> {\n if let Some(package_path) = get_cursor_package_path() {\n if package_path.exists() {\n match fs::read_to_string(&package_path) {\n Ok(contents) => match serde_json::from_str::<PackageJson>(&contents) {\n Ok(json) => Some(json.version),\n Err(e) => {\n println!(\"{} Failed to parse package.json: {}\", \"[ERROR]\".color(RED), e);\n None\n }\n },\n Err(e) => {\n println!(\"{} Failed to read package.json at {:?}: {}\", \"[ERROR]\".color(RED), package_path, e);\n None\n }\n }\n } else {\n println!(\"{} package.json not found at {:?}\", \"[WARNING]\".color(YELLOW), package_path);\n None\n }\n } else {\n println!(\"{} Could not determine path to Cursor's package.json\", \"[WARNING]\".color(YELLOW));\n None\n }\n}\n\nfn close_cursor_process(process_name: &str) {\n let mut sys = System::new_all();\n sys.refresh_processes();\n\n let processes_to_kill: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if !processes_to_kill.is_empty() {\n println!(\"{} Found {} running\", \"[WARNING]\".color(YELLOW), process_name);\n for p in &processes_to_kill {\n println!(\" PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n\n println!(\"{} Attempting to close {}...\", \"[WARNING]\".color(YELLOW), process_name);\n for p in processes_to_kill {\n if !p.kill() { // kill() sends SIGKILL by default on Unix, TerminateProcess on Windows\n println!(\"{} Failed to send termination signal to {} (PID: {}). Trying to wait...\", \"[ERROR]\".color(RED), process_name, p.pid());\n }\n }\n\n let mut retry_count = 0;\n loop {\n sys.refresh_processes();\n let still_running: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if still_running.is_empty() {\n break;\n }\n\n retry_count += 1;\n if retry_count >= MAX_RETRIES {\n println!(\"{} Unable to close {} after {} attempts\", \"[ERROR]\".color(RED), process_name, MAX_RETRIES);\n for p in still_running {\n println!(\" Still running - PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n println!(\"{} Please close the process manually and try again\", \"[ERROR]\".color(RED));\n press_enter_to_exit(1);\n }\n\n println!(\"{} Waiting for process to close, attempt {}/{}...\", \"[WARNING]\".color(YELLOW), retry_count, MAX_RETRIES);\n std::thread::sleep(std::time::Duration::from_secs(WAIT_TIME_SECONDS));\n }\n println!(\"{} {} successfully closed\", \"[INFO]\".color(GREEN), process_name);\n }\n}\n\n#[cfg(target_os = \"windows\")]\nfn update_machine_guid(backup_dir: &Path) -> bool {\n println!(\"{} Updating MachineGuid in registry...\", \"[INFO]\".color(GREEN));\n let hklm = RegKey::predef(HKEY_LOCAL_MACHINE);\n let reg_path = \"SOFTWARE\\\\Microsoft\\\\Cryptography\";\n let reg_key_name = \"MachineGuid\";\n let full_reg_key_path_for_export = \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Cryptography\";\n\n let crypto_key = match hklm.open_subkey_with_flags(reg_path, KEY_READ | KEY_WRITE) {\n Ok(key) => key,\n Err(e) => {\n println!(\"{} Failed to open registry key '{}': {}. Ensure you have admin rights.\", \"[ERROR]\".color(RED), reg_path, e);\n return false;\n }\n };\n\n let current_guid_val: Result<String, _> = crypto_key.get_value(reg_key_name);\n let original_guid = match current_guid_val {\n Ok(guid) => {\n println!(\"{} Current registry value:\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, guid);\n guid\n }\n Err(e) => {\n println!(\"{} Unable to get current {}: {}. This might indicate a problem or the value might not exist.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Proceeding to set a new one if it doesn't exist, or fail if it's a permission issue.\n String::new() // Or handle as a more critical error if needed.\n }\n };\n\n if !backup_dir.exists() {\n if let Err(e) = fs::create_dir_all(backup_dir) {\n println!(\"{} Failed to create backup directory for registry backup: {}. Proceeding without registry backup.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let backup_file_name = format!(\"MachineGuid_{}.reg\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir.join(&backup_file_name);\n let backup_command_str = format!(\"reg.exe export \\\"{}\\\" \\\"{}\\\" /y\", full_reg_key_path_for_export, backup_file_path.display());\n \n println!(\"{} Attempting to backup registry key to: {:?}\", \"[INFO]\".color(GREEN), backup_file_path);\n match Command::new(\"cmd\").args(&[\"/C\", &backup_command_str]).status() {\n Ok(status) if status.success() => {\n println!(\"{} Registry key backed up successfully.\", \"[INFO]\".color(GREEN));\n }\n Ok(status) => {\n println!(\"{} Registry backup command finished with status: {}. Check permissions or if reg.exe is available.\", \"[WARNING]\".color(YELLOW), status);\n }\n Err(e) => {\n println!(\"{} Failed to execute registry backup command: {}. Proceeding with caution.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let new_guid = Uuid::new_v4().to_string();\n match crypto_key.set_value(reg_key_name, &new_guid) {\n Ok(_) => {\n println!(\"{} Registry value {} set to: {}\", \"[INFO]\".color(GREEN), reg_key_name, new_guid);\n // Verification\n let verify_guid: Result<String, _> = crypto_key.get_value(reg_key_name);\n match verify_guid {\n Ok(val) if val == new_guid => {\n println!(\"{} Registry update verified successfully.\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, new_guid);\n true\n }\n Ok(val) => {\n println!(\"{} Registry verification failed: Updated value ({}) does not match expected value ({}).\", \"[ERROR]\".color(RED), val, new_guid);\n // Attempt restore\n false // Placeholder for restore logic\n }\n Err(e) => {\n println!(\"{} Failed to verify registry update: {}.\", \"[ERROR]\".color(RED), e);\n false // Placeholder for restore logic\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to set registry value {}: {}.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Attempt restore if original_guid was present and backup_file_path exists\n if !original_guid.is_empty() && backup_file_path.exists() {\n println!(\"{} Attempting to restore registry from backup: {:?}\", \"[YELLOW]\".color(YELLOW), backup_file_path);\n let restore_command_str = format!(\"reg.exe import \\\"{}\\\"\", backup_file_path.display());\n match Command::new(\"cmd\").args(&[\"/C\", &restore_command_str]).status() {\n Ok(status) if status.success() => println!(\"{} Registry restored successfully from backup.\", \"[INFO]\".color(GREEN)),\n Ok(status) => println!(\"{} Registry restore command failed with status: {}. Manual restore may be needed from {:?}\", \"[ERROR]\".color(RED), status, backup_file_path),\n Err(re) => println!(\"{} Failed to execute registry restore command: {}. Manual restore needed from {:?}\", \"[ERROR]\".color(RED), re, backup_file_path),\n }\n }\n false\n }\n }\n}\n\nfn update_storage_file(\n storage_file_path: &Path,\n machine_id: &str,\n mac_machine_id: &str,\n dev_device_id: &str,\n sqm_id: &str,\n) -> bool {\n if !storage_file_path.exists() {\n println!(\"{} Configuration file not found: {:?}\", \"[ERROR]\".color(RED), storage_file_path);\n println!(\"{} Please install and run Cursor once before using this script\", \"[TIP]\".color(YELLOW));\n return false;\n }\n\n let original_content = match fs::read_to_string(storage_file_path) {\n Ok(content) => content,\n Err(e) => {\n println!(\"{} Failed to read configuration file {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n return false;\n }\n };\n\n let mut config: Value = match serde_json::from_str(&original_content) {\n Ok(json_value) => json_value,\n Err(e) => {\n println!(\"{} Failed to parse configuration file JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content is not applicable here as we haven't written yet\n return false;\n }\n };\n\n // Ensure the path to telemetry values exists or create it\n // serde_json::Value uses `pointer_mut` for this kind of access.\n // Example: /telemetry/machineId\n // We need to ensure `config[\"telemetry\"]` is an object.\n if !config.get(\"telemetry\").map_or(false, |v| v.is_object()) {\n if config.as_object_mut().is_some() { // Check if config itself is an object\n config[\"telemetry\"] = serde_json::json!({});\n } else {\n println!(\"{} Configuration root is not a JSON object. Cannot set telemetry.\", \"[ERROR]\".color(RED));\n return false;\n }\n }\n \n // Update specific values\n // Using .get_mut(\"telemetry\") and then working with the resulting Option<&mut Value>\n if let Some(telemetry) = config.get_mut(\"telemetry\") {\n if let Some(telemetry_obj) = telemetry.as_object_mut() {\n telemetry_obj.insert(\"machineId\".to_string(), Value::String(machine_id.to_string()));\n telemetry_obj.insert(\"macMachineId\".to_string(), Value::String(mac_machine_id.to_string()));\n telemetry_obj.insert(\"devDeviceId\".to_string(), Value::String(dev_device_id.to_string()));\n telemetry_obj.insert(\"sqmId\".to_string(), Value::String(sqm_id.to_string()));\n } else {\n println!(\"{} 'telemetry' field is not an object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n } else {\n // This case should ideally be covered by the creation logic above.\n println!(\"{} Failed to access or create 'telemetry' object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n \n match serde_json::to_string_pretty(&config) { // Using pretty for readability, PowerShell does compact\n Ok(updated_json) => {\n match fs::write(storage_file_path, updated_json.as_bytes()) { // .as_bytes() for UTF-8\n Ok(_) => {\n println!(\"{} Configuration file updated successfully at {:?}\", \"[INFO]\".color(GREEN), storage_file_path);\n true\n }\n Err(e) => {\n println!(\"{} Failed to write updated configuration to {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n // Attempt to restore original content\n if fs::write(storage_file_path, original_content.as_bytes()).is_err() {\n println!(\"{} CRITICAL: Failed to restore original content to {:?} after write error.\", \"[ERROR]\".color(RED), storage_file_path);\n }\n false\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to serialize updated configuration to JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content if we had changed it in memory (not the case here with direct write path)\n // No need to restore file if serialization failed before writing.\n false\n }\n }\n}\n", "middle_code": "if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n let primary_path = local_app_data_dir.join(\"Programs\").join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if primary_path.exists() {\n return Some(primary_path);\n }\n let alt_path = local_app_data_dir.join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if alt_path.exists() {\n return Some(alt_path);\n }\n }", "code_description": null, "fill_type": "BLOCK_TYPE", "language_type": "rust", "sub_task_type": "if_statement"}, "context_code": [], "task_instance_info": {"created_time": "2025-08-21 01:50:39", "created_task_model": "DeepSeek-R1", "code_description": "This code segment functions to: Locate and verify the existence of a configuration file within multiple potential installation directories, returning the first valid path found."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```rust\n[TASK_BEGIN]\nfn get_cursor_package_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let local_app_data = base_dirs.data_local_dir();\n Some(local_app_data\n .join(\"Programs\")\n .join(\"Cursor\")\n .join(\"resources\")\n .join(\"app\")\n .join(\"package.json\"))\n } else {\n None\n }\n}\n[TASK_END]\n```", "inference_time": "2025-08-21 01-50-51"}, "editdistance_info": {"edit_distance": 22.4138, "calculate_time": "2025-08-21 01:50:51", "true_code_clean": "if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n let primary_path = local_app_data_dir.join(\"Programs\").join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if primary_path.exists() {\n return Some(primary_path);\n }\n let alt_path = local_app_data_dir.join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if alt_path.exists() {\n return Some(alt_path);\n }\n }", "predict_code_clean": "fn get_cursor_package_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let local_app_data = base_dirs.data_local_dir();\n Some(local_app_data\n .join(\"Programs\")\n .join(\"Cursor\")\n .join(\"resources\")\n .join(\"app\")\n .join(\"package.json\"))\n } else {\n None\n }\n}"}}
{"repo_name": "cursor-free-everyday", "file_name": "/cursor-free-everyday/reset_machine.rs", "inference_info": {"prefix_code": "use colored::*;\nuse directories::{BaseDirs, UserDirs};\nuse is_elevated::is_elevated;\nuse serde::{Deserialize, Serialize};\nuse serde_json::Value;\nuse std::collections::HashMap;\nuse std::env;\nuse std::fs;\nuse std::io::{self, Write};\nuse std::path::{Path, PathBuf};\nuse std::process::{Command, Stdio};\nuse sysinfo::{System};\nuse uuid::Uuid;\nuse winreg::enums::*;\nuse winreg::RegKey;\nuse chrono::Local;\nuse rand::{thread_rng, Rng, distributions::Alphanumeric};\n\n// Color definitions (approximated from PowerShell)\nconst RED: &str = \"red\";\nconst GREEN: &str = \"green\";\nconst YELLOW: &str = \"yellow\";\nconst BLUE: &str = \"blue\";\n// const NC: &str = \"clear\"; // `colored` crate handles reset implicitly or via `.normal()`\n\n// Max retries and wait time for process termination\nconst MAX_RETRIES: u32 = 5;\nconst WAIT_TIME_SECONDS: u64 = 1;\n\n// Configuration file paths\nfn get_storage_file_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir(); // Typically %APPDATA% or ~/.config\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"storage.json\"))\n } else {\n None\n }\n}\n\nfn get_backup_dir_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir();\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"backups\"))\n } else {\n None\n }\n}\n\nfn get_cursor_package_path() -> Option<PathBuf> {\n if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n let primary_path = local_app_data_dir.join(\"Programs\").join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if primary_path.exists() {\n return Some(primary_path);\n }\n let alt_path = local_app_data_dir.join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if alt_path.exists() {\n return Some(alt_path);\n }\n }\n None\n}\n\nfn get_cursor_updater_path() -> Option<PathBuf> {\n if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n Some(local_app_data_dir.join(\"cursor-updater\"))\n } else {\n None\n }\n}\n\n\nfn press_enter_to_exit(exit_code: i32) {\n print!(\"Press Enter to exit...\");\n io::stdout().flush().unwrap();\n let mut buffer = String::new();\n io::stdin().read_line(&mut buffer).unwrap();\n std::process::exit(exit_code);\n}\n\nfn main() {\n // Set output encoding to UTF-8 (Rust strings are UTF-8 by default, console might need setup on Windows)\n // On Windows, `chcp 65001` might be needed in the terminal before running for full UTF-8 display.\n // The script itself cannot reliably change the parent console's encoding.\n\n // Check administrator privileges\n if !is_elevated() {\n println!(\"{}\", \"[ERROR] Please run this script as administrator\".color(RED));\n println!(\"Right-click the executable and select 'Run as administrator'\");\n press_enter_to_exit(1);\n }\n\n // Display Logo\n // Using simple print for now, can be enhanced\n Command::new(\"cmd\").args(&[\"/c\", \"cls\"]).status().unwrap(); // Clear screen on Windows\n\n println!(\"{}\", r#\"\n β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— \n β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘\n β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•\n\n\"#.bright_cyan());\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"Cursor Device ID Modifier Tool\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\" {}\", \"Free tool for Cursor device ID management\".color(YELLOW));\n println!(\" {}\", \"[IMPORTANT] This is a free community tool\".color(YELLOW));\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"QQηΎ€: 951642519 (亀桁/下载纯免费θ‡ͺεŠ¨θ΄¦ε·εˆ‡ζ’ε·₯ε…·)\".color(YELLOW));\n println!(\"\");\n\n // Get and display Cursor version\n let cursor_version = get_cursor_version();\n match &cursor_version {\n Some(version) => println!(\"{} Current Cursor version: v{}\", \"[INFO]\".color(GREEN), version),\n None => {\n println!(\"{} Unable to detect Cursor version\", \"[WARNING]\".color(YELLOW));\n println!(\"{} Please ensure Cursor is properly installed\", \"[TIP]\".color(YELLOW));\n }\n }\n println!(\"\");\n\n println!(\"{} Latest 0.45.x (supported)\", \"[IMPORTANT NOTE]\".color(YELLOW));\n println!(\"\");\n\n // Check and close Cursor processes\n println!(\"{} Checking Cursor processes...\", \"[INFO]\".color(GREEN));\n close_cursor_process(\"Cursor\");\n close_cursor_process(\"cursor\");\n println!(\"\");\n\n let storage_file_path = match get_storage_file_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for storage file.\".color(RED));\n press_enter_to_exit(1);\n unreachable!(); // press_enter_to_exit exits\n }\n };\n // println!(\"Storage file path: {:?}\", storage_file_path);\n\n let backup_dir_path = match get_backup_dir_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for backup directory.\".color(RED));\n press_enter_to_exit(1);\n unreachable!();\n }\n };\n // println!(\"Backup dir path: {:?}\", backup_dir_path);\n\n // Create backup directory\n if !backup_dir_path.exists() {\n match fs::create_dir_all(&backup_dir_path) {\n Ok(_) => println!(\"{} Created backup directory at {:?}\", \"[INFO]\".color(GREEN), backup_dir_path),\n Err(e) => {\n println!(\"{} Failed to create backup directory at {:?}: {}\", \"[ERROR]\".color(RED), backup_dir_path, e);\n press_enter_to_exit(1);\n }\n }\n }\n\n // Backup existing configuration\n ", "suffix_code": "\n println!(\"\");\n\n // Generate new IDs\n println!(\"{} Generating new IDs...\", \"[INFO]\".color(GREEN));\n let mac_machine_id = new_standard_machine_id();\n let uuid_str = Uuid::new_v4().to_string();\n let prefix_hex = \"auth0|user_\".as_bytes().iter().map(|b| format!(\"{:02x}\", b)).collect::<String>();\n let random_part = get_random_hex(32);\n let machine_id = format!(\"{}{}\", prefix_hex, random_part);\n let sqm_id = format!(\"{{{}}}\", Uuid::new_v4().to_string().to_uppercase());\n\n // println!(\"Generated MAC_MACHINE_ID: {}\", mac_machine_id);\n // println!(\"Generated UUID_STR: {}\", uuid_str);\n // println!(\"Generated MACHINE_ID: {}\", machine_id);\n // println!(\"Generated SQM_ID: {}\", sqm_id);\n // println!(\"\");\n\n // Update MachineGuid in registry\n let mut machine_guid_updated = false;\n if cfg!(target_os = \"windows\") { // Only run on Windows\n machine_guid_updated = update_machine_guid(&backup_dir_path);\n } else {\n println!(\"{} Skipping MachineGuid update (not on Windows)\", \"[INFO]\".color(YELLOW));\n }\n\n // Create or update configuration file\n println!(\"{} Updating configuration...\", \"[INFO]\".color(GREEN));\n let storage_update_successful = update_storage_file(\n &storage_file_path,\n &machine_id,\n &mac_machine_id,\n &uuid_str, // This was $UUID in PowerShell, which corresponds to devDeviceId\n &sqm_id\n );\n\n if storage_update_successful {\n println!(\"{} Configuration updated successfully.\", \"[INFO]\".color(GREEN));\n // Display results\n println!(\"\");\n println!(\"{} Configuration updated details:\", \"[INFO]\".color(GREEN));\n println!(\"{} machineId: {}\", \"[DEBUG]\".color(BLUE), machine_id);\n println!(\"{} macMachineId: {}\", \"[DEBUG]\".color(BLUE), mac_machine_id);\n println!(\"{} devDeviceId: {}\", \"[DEBUG]\".color(BLUE), uuid_str);\n println!(\"{} sqmId: {}\", \"[DEBUG]\".color(BLUE), sqm_id);\n } else {\n println!(\"{} Main operation failed to update storage file.\", \"[ERROR]\".color(RED));\n // The PS script has an alternative method here, which is complex.\n // For now, we'll just indicate failure.\n press_enter_to_exit(1);\n }\n println!(\"\");\n\n // Display file tree structure\n println!(\"{} File structure:\", \"[INFO]\".color(GREEN));\n if let Some(user_dirs) = UserDirs::new() {\n // %APPDATA%\\Cursor\\User is not directly available via UserDirs or BaseDirs in a cross-platform way for this specific structure.\n // We'll construct it based on APPDATA which UserDirs doesn't directly give, BaseDirs::config_dir() is the closest.\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir_equivalent = base_dirs.config_dir(); // This is platform specific, e.g. %APPDATA% on Windows\n println!(\"{}\", app_data_dir_equivalent.join(\"Cursor\").join(\"User\").display().to_string().color(BLUE));\n }\n } else {\n println!(\"{} Could not determine APPDATA path for display.\", \"[WARNING]\".color(YELLOW));\n }\n println!(\"β”œβ”€β”€ globalStorage\");\n println!(\"β”‚ β”œβ”€β”€ storage.json (modified)\");\n println!(\"β”‚ └── backups\");\n\n // List backup files\n match fs::read_dir(&backup_dir_path) {\n Ok(entries) => {\n let mut backup_files_found = false;\n for entry in entries {\n if let Ok(entry) = entry {\n if entry.path().is_file() {\n println!(\"β”‚ └── {}\", entry.file_name().to_string_lossy());\n backup_files_found = true;\n }\n }\n }\n if !backup_files_found {\n println!(\"β”‚ └── (empty)\");\n }\n }\n Err(e) => {\n println!(\"β”‚ └── (Error reading backups: {})\", e);\n }\n }\n println!(\"\");\n\n // Display completion message\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\"\");\n println!(\"{} Please restart Cursor to apply new configuration\", \"[INFO]\".color(GREEN));\n println!(\"\");\n\n press_enter_to_exit(0);\n}\n\nfn get_random_hex(length: usize) -> String {\n thread_rng()\n .sample_iter(&Alphanumeric)\n .take(length)\n .map(char::from)\n .collect::<String>()\n .to_lowercase() // PowerShell version produces lowercase hex\n}\n\nfn new_standard_machine_id() -> String {\n // Template: xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\n // y is one of 8, 9, a, b\n let mut rng = thread_rng();\n let mut id = String::with_capacity(36);\n for (i, char_template) in \"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\".chars().enumerate() {\n if char_template == '-' || char_template == '4' {\n id.push(char_template);\n } else if char_template == 'x' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(0..16)));\n } else if char_template == 'y' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(8..12))); // 8, 9, a, b\n }\n }\n id\n}\n\n#[derive(Deserialize)]\nstruct PackageJson {\n version: String,\n}\n\nfn get_cursor_version() -> Option<String> {\n if let Some(package_path) = get_cursor_package_path() {\n if package_path.exists() {\n match fs::read_to_string(&package_path) {\n Ok(contents) => match serde_json::from_str::<PackageJson>(&contents) {\n Ok(json) => Some(json.version),\n Err(e) => {\n println!(\"{} Failed to parse package.json: {}\", \"[ERROR]\".color(RED), e);\n None\n }\n },\n Err(e) => {\n println!(\"{} Failed to read package.json at {:?}: {}\", \"[ERROR]\".color(RED), package_path, e);\n None\n }\n }\n } else {\n println!(\"{} package.json not found at {:?}\", \"[WARNING]\".color(YELLOW), package_path);\n None\n }\n } else {\n println!(\"{} Could not determine path to Cursor's package.json\", \"[WARNING]\".color(YELLOW));\n None\n }\n}\n\nfn close_cursor_process(process_name: &str) {\n let mut sys = System::new_all();\n sys.refresh_processes();\n\n let processes_to_kill: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if !processes_to_kill.is_empty() {\n println!(\"{} Found {} running\", \"[WARNING]\".color(YELLOW), process_name);\n for p in &processes_to_kill {\n println!(\" PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n\n println!(\"{} Attempting to close {}...\", \"[WARNING]\".color(YELLOW), process_name);\n for p in processes_to_kill {\n if !p.kill() { // kill() sends SIGKILL by default on Unix, TerminateProcess on Windows\n println!(\"{} Failed to send termination signal to {} (PID: {}). Trying to wait...\", \"[ERROR]\".color(RED), process_name, p.pid());\n }\n }\n\n let mut retry_count = 0;\n loop {\n sys.refresh_processes();\n let still_running: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if still_running.is_empty() {\n break;\n }\n\n retry_count += 1;\n if retry_count >= MAX_RETRIES {\n println!(\"{} Unable to close {} after {} attempts\", \"[ERROR]\".color(RED), process_name, MAX_RETRIES);\n for p in still_running {\n println!(\" Still running - PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n println!(\"{} Please close the process manually and try again\", \"[ERROR]\".color(RED));\n press_enter_to_exit(1);\n }\n\n println!(\"{} Waiting for process to close, attempt {}/{}...\", \"[WARNING]\".color(YELLOW), retry_count, MAX_RETRIES);\n std::thread::sleep(std::time::Duration::from_secs(WAIT_TIME_SECONDS));\n }\n println!(\"{} {} successfully closed\", \"[INFO]\".color(GREEN), process_name);\n }\n}\n\n#[cfg(target_os = \"windows\")]\nfn update_machine_guid(backup_dir: &Path) -> bool {\n println!(\"{} Updating MachineGuid in registry...\", \"[INFO]\".color(GREEN));\n let hklm = RegKey::predef(HKEY_LOCAL_MACHINE);\n let reg_path = \"SOFTWARE\\\\Microsoft\\\\Cryptography\";\n let reg_key_name = \"MachineGuid\";\n let full_reg_key_path_for_export = \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Cryptography\";\n\n let crypto_key = match hklm.open_subkey_with_flags(reg_path, KEY_READ | KEY_WRITE) {\n Ok(key) => key,\n Err(e) => {\n println!(\"{} Failed to open registry key '{}': {}. Ensure you have admin rights.\", \"[ERROR]\".color(RED), reg_path, e);\n return false;\n }\n };\n\n let current_guid_val: Result<String, _> = crypto_key.get_value(reg_key_name);\n let original_guid = match current_guid_val {\n Ok(guid) => {\n println!(\"{} Current registry value:\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, guid);\n guid\n }\n Err(e) => {\n println!(\"{} Unable to get current {}: {}. This might indicate a problem or the value might not exist.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Proceeding to set a new one if it doesn't exist, or fail if it's a permission issue.\n String::new() // Or handle as a more critical error if needed.\n }\n };\n\n if !backup_dir.exists() {\n if let Err(e) = fs::create_dir_all(backup_dir) {\n println!(\"{} Failed to create backup directory for registry backup: {}. Proceeding without registry backup.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let backup_file_name = format!(\"MachineGuid_{}.reg\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir.join(&backup_file_name);\n let backup_command_str = format!(\"reg.exe export \\\"{}\\\" \\\"{}\\\" /y\", full_reg_key_path_for_export, backup_file_path.display());\n \n println!(\"{} Attempting to backup registry key to: {:?}\", \"[INFO]\".color(GREEN), backup_file_path);\n match Command::new(\"cmd\").args(&[\"/C\", &backup_command_str]).status() {\n Ok(status) if status.success() => {\n println!(\"{} Registry key backed up successfully.\", \"[INFO]\".color(GREEN));\n }\n Ok(status) => {\n println!(\"{} Registry backup command finished with status: {}. Check permissions or if reg.exe is available.\", \"[WARNING]\".color(YELLOW), status);\n }\n Err(e) => {\n println!(\"{} Failed to execute registry backup command: {}. Proceeding with caution.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let new_guid = Uuid::new_v4().to_string();\n match crypto_key.set_value(reg_key_name, &new_guid) {\n Ok(_) => {\n println!(\"{} Registry value {} set to: {}\", \"[INFO]\".color(GREEN), reg_key_name, new_guid);\n // Verification\n let verify_guid: Result<String, _> = crypto_key.get_value(reg_key_name);\n match verify_guid {\n Ok(val) if val == new_guid => {\n println!(\"{} Registry update verified successfully.\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, new_guid);\n true\n }\n Ok(val) => {\n println!(\"{} Registry verification failed: Updated value ({}) does not match expected value ({}).\", \"[ERROR]\".color(RED), val, new_guid);\n // Attempt restore\n false // Placeholder for restore logic\n }\n Err(e) => {\n println!(\"{} Failed to verify registry update: {}.\", \"[ERROR]\".color(RED), e);\n false // Placeholder for restore logic\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to set registry value {}: {}.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Attempt restore if original_guid was present and backup_file_path exists\n if !original_guid.is_empty() && backup_file_path.exists() {\n println!(\"{} Attempting to restore registry from backup: {:?}\", \"[YELLOW]\".color(YELLOW), backup_file_path);\n let restore_command_str = format!(\"reg.exe import \\\"{}\\\"\", backup_file_path.display());\n match Command::new(\"cmd\").args(&[\"/C\", &restore_command_str]).status() {\n Ok(status) if status.success() => println!(\"{} Registry restored successfully from backup.\", \"[INFO]\".color(GREEN)),\n Ok(status) => println!(\"{} Registry restore command failed with status: {}. Manual restore may be needed from {:?}\", \"[ERROR]\".color(RED), status, backup_file_path),\n Err(re) => println!(\"{} Failed to execute registry restore command: {}. Manual restore needed from {:?}\", \"[ERROR]\".color(RED), re, backup_file_path),\n }\n }\n false\n }\n }\n}\n\nfn update_storage_file(\n storage_file_path: &Path,\n machine_id: &str,\n mac_machine_id: &str,\n dev_device_id: &str,\n sqm_id: &str,\n) -> bool {\n if !storage_file_path.exists() {\n println!(\"{} Configuration file not found: {:?}\", \"[ERROR]\".color(RED), storage_file_path);\n println!(\"{} Please install and run Cursor once before using this script\", \"[TIP]\".color(YELLOW));\n return false;\n }\n\n let original_content = match fs::read_to_string(storage_file_path) {\n Ok(content) => content,\n Err(e) => {\n println!(\"{} Failed to read configuration file {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n return false;\n }\n };\n\n let mut config: Value = match serde_json::from_str(&original_content) {\n Ok(json_value) => json_value,\n Err(e) => {\n println!(\"{} Failed to parse configuration file JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content is not applicable here as we haven't written yet\n return false;\n }\n };\n\n // Ensure the path to telemetry values exists or create it\n // serde_json::Value uses `pointer_mut` for this kind of access.\n // Example: /telemetry/machineId\n // We need to ensure `config[\"telemetry\"]` is an object.\n if !config.get(\"telemetry\").map_or(false, |v| v.is_object()) {\n if config.as_object_mut().is_some() { // Check if config itself is an object\n config[\"telemetry\"] = serde_json::json!({});\n } else {\n println!(\"{} Configuration root is not a JSON object. Cannot set telemetry.\", \"[ERROR]\".color(RED));\n return false;\n }\n }\n \n // Update specific values\n // Using .get_mut(\"telemetry\") and then working with the resulting Option<&mut Value>\n if let Some(telemetry) = config.get_mut(\"telemetry\") {\n if let Some(telemetry_obj) = telemetry.as_object_mut() {\n telemetry_obj.insert(\"machineId\".to_string(), Value::String(machine_id.to_string()));\n telemetry_obj.insert(\"macMachineId\".to_string(), Value::String(mac_machine_id.to_string()));\n telemetry_obj.insert(\"devDeviceId\".to_string(), Value::String(dev_device_id.to_string()));\n telemetry_obj.insert(\"sqmId\".to_string(), Value::String(sqm_id.to_string()));\n } else {\n println!(\"{} 'telemetry' field is not an object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n } else {\n // This case should ideally be covered by the creation logic above.\n println!(\"{} Failed to access or create 'telemetry' object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n \n match serde_json::to_string_pretty(&config) { // Using pretty for readability, PowerShell does compact\n Ok(updated_json) => {\n match fs::write(storage_file_path, updated_json.as_bytes()) { // .as_bytes() for UTF-8\n Ok(_) => {\n println!(\"{} Configuration file updated successfully at {:?}\", \"[INFO]\".color(GREEN), storage_file_path);\n true\n }\n Err(e) => {\n println!(\"{} Failed to write updated configuration to {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n // Attempt to restore original content\n if fs::write(storage_file_path, original_content.as_bytes()).is_err() {\n println!(\"{} CRITICAL: Failed to restore original content to {:?} after write error.\", \"[ERROR]\".color(RED), storage_file_path);\n }\n false\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to serialize updated configuration to JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content if we had changed it in memory (not the case here with direct write path)\n // No need to restore file if serialization failed before writing.\n false\n }\n }\n}\n", "middle_code": "if storage_file_path.exists() {\n println!(\"{} Backing up configuration file...\", \"[INFO]\".color(GREEN));\n let backup_name = format!(\"storage.json.backup_{}\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir_path.join(backup_name);\n match fs::copy(&storage_file_path, &backup_file_path) {\n Ok(_) => println!(\"{} Configuration backed up to {:?}\", \"[INFO]\".color(GREEN), backup_file_path),\n Err(e) => {\n println!(\"{} Failed to backup configuration file to {:?}: {}\", \"[ERROR]\".color(RED), backup_file_path, e);\n }\n }\n } else {\n println!(\"{} No existing configuration file found at {:?} to back up.\", \"[INFO]\".color(GREEN), storage_file_path);\n }", "code_description": null, "fill_type": "BLOCK_TYPE", "language_type": "rust", "sub_task_type": "if_statement"}, "context_code": [], "task_instance_info": {"created_time": "2025-08-21 01:50:39", "created_task_model": "DeepSeek-R1", "code_description": "This code segment functions to: Create a timestamped backup of a configuration file if it exists, preserving the original in a designated directory while handling success and failure scenarios."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```rust\n[TASK_BEGIN]\n // Backup existing configuration\n println!(\"{} Backing up existing configuration...\", \"[INFO]\".color(GREEN));\n let timestamp = Local::now().format(\"%Y%m%d_%H%M%S\").to_string();\n let random_suffix = get_random_hex(8);\n let backup_file_name = format!(\"storage_{}_{}.json\", timestamp, random_suffix);\n let backup_path = backup_dir_path.join(backup_file_name);\n\n if storage_file_path.exists() {\n match fs::copy(&storage_file_path, &backup_path) {\n Ok(_) => println!(\"{} Backup created: {}\", \"[SUCCESS]\".color(GREEN), backup_path.display().to_string().color(BLUE)),\n Err(e) => {\n println!(\"{} Failed to create backup: {}\", \"[ERROR]\".color(RED), e);\n println!(\"{} Manual backup recommended before proceeding\", \"[WARNING]\".color(YELLOW));\n press_enter_to_exit(1);\n }\n }\n } else {\n println!(\"{} No existing configuration file to backup\", \"[WARNING]\".color(YELLOW));\n }\n[TASK_END]\n```", "inference_time": "2025-08-21 01-50-54"}, "editdistance_info": {"edit_distance": 40.367, "calculate_time": "2025-08-21 01:50:54", "true_code_clean": "if storage_file_path.exists() {\n println!(\"{} Backing up configuration file...\", \"[INFO]\".color(GREEN));\n let backup_name = format!(\"storage.json.backup_{}\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir_path.join(backup_name);\n match fs::copy(&storage_file_path, &backup_file_path) {\n Ok(_) => println!(\"{} Configuration backed up to {:?}\", \"[INFO]\".color(GREEN), backup_file_path),\n Err(e) => {\n println!(\"{} Failed to backup configuration file to {:?}: {}\", \"[ERROR]\".color(RED), backup_file_path, e);\n }\n }\n } else {\n println!(\"{} No existing configuration file found at {:?} to back up.\", \"[INFO]\".color(GREEN), storage_file_path);\n }", "predict_code_clean": " println!(\"{} Backing up existing configuration...\", \"[INFO]\".color(GREEN));\n let timestamp = Local::now().format(\"%Y%m%d_%H%M%S\").to_string();\n let random_suffix = get_random_hex(8);\n let backup_file_name = format!(\"storage_{}_{}.json\", timestamp, random_suffix);\n let backup_path = backup_dir_path.join(backup_file_name);\n if storage_file_path.exists() {\n match fs::copy(&storage_file_path, &backup_path) {\n Ok(_) => println!(\"{} Backup created: {}\", \"[SUCCESS]\".color(GREEN), backup_path.display().to_string().color(BLUE)),\n Err(e) => {\n println!(\"{} Failed to create backup: {}\", \"[ERROR]\".color(RED), e);\n println!(\"{} Manual backup recommended before proceeding\", \"[WARNING]\".color(YELLOW));\n press_enter_to_exit(1);\n }\n }\n } else {\n println!(\"{} No existing configuration file to backup\", \"[WARNING]\".color(YELLOW));\n }"}}
{"repo_name": "cursor-free-everyday", "file_name": "/cursor-free-everyday/reset_machine.rs", "inference_info": {"prefix_code": "use colored::*;\nuse directories::{BaseDirs, UserDirs};\nuse is_elevated::is_elevated;\nuse serde::{Deserialize, Serialize};\nuse serde_json::Value;\nuse std::collections::HashMap;\nuse std::env;\nuse std::fs;\nuse std::io::{self, Write};\nuse std::path::{Path, PathBuf};\nuse std::process::{Command, Stdio};\nuse sysinfo::{System};\nuse uuid::Uuid;\nuse winreg::enums::*;\nuse winreg::RegKey;\nuse chrono::Local;\nuse rand::{thread_rng, Rng, distributions::Alphanumeric};\n\n// Color definitions (approximated from PowerShell)\nconst RED: &str = \"red\";\nconst GREEN: &str = \"green\";\nconst YELLOW: &str = \"yellow\";\nconst BLUE: &str = \"blue\";\n// const NC: &str = \"clear\"; // `colored` crate handles reset implicitly or via `.normal()`\n\n// Max retries and wait time for process termination\nconst MAX_RETRIES: u32 = 5;\nconst WAIT_TIME_SECONDS: u64 = 1;\n\n// Configuration file paths\nfn get_storage_file_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir(); // Typically %APPDATA% or ~/.config\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"storage.json\"))\n } else {\n None\n }\n}\n\nfn get_backup_dir_path() -> Option<PathBuf> {\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir = base_dirs.config_dir();\n Some(app_data_dir.join(\"Cursor\").join(\"User\").join(\"globalStorage\").join(\"backups\"))\n } else {\n None\n }\n}\n\nfn get_cursor_package_path() -> Option<PathBuf> {\n ", "suffix_code": "\n None\n}\n\nfn get_cursor_updater_path() -> Option<PathBuf> {\n if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n Some(local_app_data_dir.join(\"cursor-updater\"))\n } else {\n None\n }\n}\n\n\nfn press_enter_to_exit(exit_code: i32) {\n print!(\"Press Enter to exit...\");\n io::stdout().flush().unwrap();\n let mut buffer = String::new();\n io::stdin().read_line(&mut buffer).unwrap();\n std::process::exit(exit_code);\n}\n\nfn main() {\n // Set output encoding to UTF-8 (Rust strings are UTF-8 by default, console might need setup on Windows)\n // On Windows, `chcp 65001` might be needed in the terminal before running for full UTF-8 display.\n // The script itself cannot reliably change the parent console's encoding.\n\n // Check administrator privileges\n if !is_elevated() {\n println!(\"{}\", \"[ERROR] Please run this script as administrator\".color(RED));\n println!(\"Right-click the executable and select 'Run as administrator'\");\n press_enter_to_exit(1);\n }\n\n // Display Logo\n // Using simple print for now, can be enhanced\n Command::new(\"cmd\").args(&[\"/c\", \"cls\"]).status().unwrap(); // Clear screen on Windows\n\n println!(\"{}\", r#\"\n β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— \n β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•\n β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—\n β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘\n β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β• β•šβ•β•\n\n\"#.bright_cyan());\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"Cursor Device ID Modifier Tool\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\" {}\", \"Free tool for Cursor device ID management\".color(YELLOW));\n println!(\" {}\", \"[IMPORTANT] This is a free community tool\".color(YELLOW));\n println!(\"{}\", \"================================\".color(BLUE));\n println!(\" {}\", \"QQηΎ€: 951642519 (亀桁/下载纯免费θ‡ͺεŠ¨θ΄¦ε·εˆ‡ζ’ε·₯ε…·)\".color(YELLOW));\n println!(\"\");\n\n // Get and display Cursor version\n let cursor_version = get_cursor_version();\n match &cursor_version {\n Some(version) => println!(\"{} Current Cursor version: v{}\", \"[INFO]\".color(GREEN), version),\n None => {\n println!(\"{} Unable to detect Cursor version\", \"[WARNING]\".color(YELLOW));\n println!(\"{} Please ensure Cursor is properly installed\", \"[TIP]\".color(YELLOW));\n }\n }\n println!(\"\");\n\n println!(\"{} Latest 0.45.x (supported)\", \"[IMPORTANT NOTE]\".color(YELLOW));\n println!(\"\");\n\n // Check and close Cursor processes\n println!(\"{} Checking Cursor processes...\", \"[INFO]\".color(GREEN));\n close_cursor_process(\"Cursor\");\n close_cursor_process(\"cursor\");\n println!(\"\");\n\n let storage_file_path = match get_storage_file_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for storage file.\".color(RED));\n press_enter_to_exit(1);\n unreachable!(); // press_enter_to_exit exits\n }\n };\n // println!(\"Storage file path: {:?}\", storage_file_path);\n\n let backup_dir_path = match get_backup_dir_path() {\n Some(path) => path,\n None => {\n println!(\"{}\", \"[ERROR] Could not determine APPDATA path for backup directory.\".color(RED));\n press_enter_to_exit(1);\n unreachable!();\n }\n };\n // println!(\"Backup dir path: {:?}\", backup_dir_path);\n\n // Create backup directory\n if !backup_dir_path.exists() {\n match fs::create_dir_all(&backup_dir_path) {\n Ok(_) => println!(\"{} Created backup directory at {:?}\", \"[INFO]\".color(GREEN), backup_dir_path),\n Err(e) => {\n println!(\"{} Failed to create backup directory at {:?}: {}\", \"[ERROR]\".color(RED), backup_dir_path, e);\n press_enter_to_exit(1);\n }\n }\n }\n\n // Backup existing configuration\n if storage_file_path.exists() {\n println!(\"{} Backing up configuration file...\", \"[INFO]\".color(GREEN));\n let backup_name = format!(\"storage.json.backup_{}\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir_path.join(backup_name);\n match fs::copy(&storage_file_path, &backup_file_path) {\n Ok(_) => println!(\"{} Configuration backed up to {:?}\", \"[INFO]\".color(GREEN), backup_file_path),\n Err(e) => {\n println!(\"{} Failed to backup configuration file to {:?}: {}\", \"[ERROR]\".color(RED), backup_file_path, e);\n // Decide if this is a fatal error or a warning\n }\n }\n } else {\n println!(\"{} No existing configuration file found at {:?} to back up.\", \"[INFO]\".color(GREEN), storage_file_path);\n }\n println!(\"\");\n\n // Generate new IDs\n println!(\"{} Generating new IDs...\", \"[INFO]\".color(GREEN));\n let mac_machine_id = new_standard_machine_id();\n let uuid_str = Uuid::new_v4().to_string();\n let prefix_hex = \"auth0|user_\".as_bytes().iter().map(|b| format!(\"{:02x}\", b)).collect::<String>();\n let random_part = get_random_hex(32);\n let machine_id = format!(\"{}{}\", prefix_hex, random_part);\n let sqm_id = format!(\"{{{}}}\", Uuid::new_v4().to_string().to_uppercase());\n\n // println!(\"Generated MAC_MACHINE_ID: {}\", mac_machine_id);\n // println!(\"Generated UUID_STR: {}\", uuid_str);\n // println!(\"Generated MACHINE_ID: {}\", machine_id);\n // println!(\"Generated SQM_ID: {}\", sqm_id);\n // println!(\"\");\n\n // Update MachineGuid in registry\n let mut machine_guid_updated = false;\n if cfg!(target_os = \"windows\") { // Only run on Windows\n machine_guid_updated = update_machine_guid(&backup_dir_path);\n } else {\n println!(\"{} Skipping MachineGuid update (not on Windows)\", \"[INFO]\".color(YELLOW));\n }\n\n // Create or update configuration file\n println!(\"{} Updating configuration...\", \"[INFO]\".color(GREEN));\n let storage_update_successful = update_storage_file(\n &storage_file_path,\n &machine_id,\n &mac_machine_id,\n &uuid_str, // This was $UUID in PowerShell, which corresponds to devDeviceId\n &sqm_id\n );\n\n if storage_update_successful {\n println!(\"{} Configuration updated successfully.\", \"[INFO]\".color(GREEN));\n // Display results\n println!(\"\");\n println!(\"{} Configuration updated details:\", \"[INFO]\".color(GREEN));\n println!(\"{} machineId: {}\", \"[DEBUG]\".color(BLUE), machine_id);\n println!(\"{} macMachineId: {}\", \"[DEBUG]\".color(BLUE), mac_machine_id);\n println!(\"{} devDeviceId: {}\", \"[DEBUG]\".color(BLUE), uuid_str);\n println!(\"{} sqmId: {}\", \"[DEBUG]\".color(BLUE), sqm_id);\n } else {\n println!(\"{} Main operation failed to update storage file.\", \"[ERROR]\".color(RED));\n // The PS script has an alternative method here, which is complex.\n // For now, we'll just indicate failure.\n press_enter_to_exit(1);\n }\n println!(\"\");\n\n // Display file tree structure\n println!(\"{} File structure:\", \"[INFO]\".color(GREEN));\n if let Some(user_dirs) = UserDirs::new() {\n // %APPDATA%\\Cursor\\User is not directly available via UserDirs or BaseDirs in a cross-platform way for this specific structure.\n // We'll construct it based on APPDATA which UserDirs doesn't directly give, BaseDirs::config_dir() is the closest.\n if let Some(base_dirs) = BaseDirs::new() {\n let app_data_dir_equivalent = base_dirs.config_dir(); // This is platform specific, e.g. %APPDATA% on Windows\n println!(\"{}\", app_data_dir_equivalent.join(\"Cursor\").join(\"User\").display().to_string().color(BLUE));\n }\n } else {\n println!(\"{} Could not determine APPDATA path for display.\", \"[WARNING]\".color(YELLOW));\n }\n println!(\"β”œβ”€β”€ globalStorage\");\n println!(\"β”‚ β”œβ”€β”€ storage.json (modified)\");\n println!(\"β”‚ └── backups\");\n\n // List backup files\n match fs::read_dir(&backup_dir_path) {\n Ok(entries) => {\n let mut backup_files_found = false;\n for entry in entries {\n if let Ok(entry) = entry {\n if entry.path().is_file() {\n println!(\"β”‚ └── {}\", entry.file_name().to_string_lossy());\n backup_files_found = true;\n }\n }\n }\n if !backup_files_found {\n println!(\"β”‚ └── (empty)\");\n }\n }\n Err(e) => {\n println!(\"β”‚ └── (Error reading backups: {})\", e);\n }\n }\n println!(\"\");\n\n // Display completion message\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\" {}\", \"Cursor ID Reset Tool - Community Edition\".color(YELLOW));\n println!(\"{}\", \"================================\".color(GREEN));\n println!(\"\");\n println!(\"{} Please restart Cursor to apply new configuration\", \"[INFO]\".color(GREEN));\n println!(\"\");\n\n press_enter_to_exit(0);\n}\n\nfn get_random_hex(length: usize) -> String {\n thread_rng()\n .sample_iter(&Alphanumeric)\n .take(length)\n .map(char::from)\n .collect::<String>()\n .to_lowercase() // PowerShell version produces lowercase hex\n}\n\nfn new_standard_machine_id() -> String {\n // Template: xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\n // y is one of 8, 9, a, b\n let mut rng = thread_rng();\n let mut id = String::with_capacity(36);\n for (i, char_template) in \"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\".chars().enumerate() {\n if char_template == '-' || char_template == '4' {\n id.push(char_template);\n } else if char_template == 'x' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(0..16)));\n } else if char_template == 'y' {\n id.push_str(&format!(\"{:x}\", rng.gen_range(8..12))); // 8, 9, a, b\n }\n }\n id\n}\n\n#[derive(Deserialize)]\nstruct PackageJson {\n version: String,\n}\n\nfn get_cursor_version() -> Option<String> {\n if let Some(package_path) = get_cursor_package_path() {\n if package_path.exists() {\n match fs::read_to_string(&package_path) {\n Ok(contents) => match serde_json::from_str::<PackageJson>(&contents) {\n Ok(json) => Some(json.version),\n Err(e) => {\n println!(\"{} Failed to parse package.json: {}\", \"[ERROR]\".color(RED), e);\n None\n }\n },\n Err(e) => {\n println!(\"{} Failed to read package.json at {:?}: {}\", \"[ERROR]\".color(RED), package_path, e);\n None\n }\n }\n } else {\n println!(\"{} package.json not found at {:?}\", \"[WARNING]\".color(YELLOW), package_path);\n None\n }\n } else {\n println!(\"{} Could not determine path to Cursor's package.json\", \"[WARNING]\".color(YELLOW));\n None\n }\n}\n\nfn close_cursor_process(process_name: &str) {\n let mut sys = System::new_all();\n sys.refresh_processes();\n\n let processes_to_kill: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if !processes_to_kill.is_empty() {\n println!(\"{} Found {} running\", \"[WARNING]\".color(YELLOW), process_name);\n for p in &processes_to_kill {\n println!(\" PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n\n println!(\"{} Attempting to close {}...\", \"[WARNING]\".color(YELLOW), process_name);\n for p in processes_to_kill {\n if !p.kill() { // kill() sends SIGKILL by default on Unix, TerminateProcess on Windows\n println!(\"{} Failed to send termination signal to {} (PID: {}). Trying to wait...\", \"[ERROR]\".color(RED), process_name, p.pid());\n }\n }\n\n let mut retry_count = 0;\n loop {\n sys.refresh_processes();\n let still_running: Vec<_> = sys\n .processes()\n .values()\n .filter(|p| p.name().eq_ignore_ascii_case(process_name))\n .collect();\n\n if still_running.is_empty() {\n break;\n }\n\n retry_count += 1;\n if retry_count >= MAX_RETRIES {\n println!(\"{} Unable to close {} after {} attempts\", \"[ERROR]\".color(RED), process_name, MAX_RETRIES);\n for p in still_running {\n println!(\" Still running - PID: {}, Name: {}, Path: {:?}\", p.pid(), p.name(), p.exe());\n }\n println!(\"{} Please close the process manually and try again\", \"[ERROR]\".color(RED));\n press_enter_to_exit(1);\n }\n\n println!(\"{} Waiting for process to close, attempt {}/{}...\", \"[WARNING]\".color(YELLOW), retry_count, MAX_RETRIES);\n std::thread::sleep(std::time::Duration::from_secs(WAIT_TIME_SECONDS));\n }\n println!(\"{} {} successfully closed\", \"[INFO]\".color(GREEN), process_name);\n }\n}\n\n#[cfg(target_os = \"windows\")]\nfn update_machine_guid(backup_dir: &Path) -> bool {\n println!(\"{} Updating MachineGuid in registry...\", \"[INFO]\".color(GREEN));\n let hklm = RegKey::predef(HKEY_LOCAL_MACHINE);\n let reg_path = \"SOFTWARE\\\\Microsoft\\\\Cryptography\";\n let reg_key_name = \"MachineGuid\";\n let full_reg_key_path_for_export = \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Cryptography\";\n\n let crypto_key = match hklm.open_subkey_with_flags(reg_path, KEY_READ | KEY_WRITE) {\n Ok(key) => key,\n Err(e) => {\n println!(\"{} Failed to open registry key '{}': {}. Ensure you have admin rights.\", \"[ERROR]\".color(RED), reg_path, e);\n return false;\n }\n };\n\n let current_guid_val: Result<String, _> = crypto_key.get_value(reg_key_name);\n let original_guid = match current_guid_val {\n Ok(guid) => {\n println!(\"{} Current registry value:\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, guid);\n guid\n }\n Err(e) => {\n println!(\"{} Unable to get current {}: {}. This might indicate a problem or the value might not exist.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Proceeding to set a new one if it doesn't exist, or fail if it's a permission issue.\n String::new() // Or handle as a more critical error if needed.\n }\n };\n\n if !backup_dir.exists() {\n if let Err(e) = fs::create_dir_all(backup_dir) {\n println!(\"{} Failed to create backup directory for registry backup: {}. Proceeding without registry backup.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let backup_file_name = format!(\"MachineGuid_{}.reg\", Local::now().format(\"%Y%m%d_%H%M%S\"));\n let backup_file_path = backup_dir.join(&backup_file_name);\n let backup_command_str = format!(\"reg.exe export \\\"{}\\\" \\\"{}\\\" /y\", full_reg_key_path_for_export, backup_file_path.display());\n \n println!(\"{} Attempting to backup registry key to: {:?}\", \"[INFO]\".color(GREEN), backup_file_path);\n match Command::new(\"cmd\").args(&[\"/C\", &backup_command_str]).status() {\n Ok(status) if status.success() => {\n println!(\"{} Registry key backed up successfully.\", \"[INFO]\".color(GREEN));\n }\n Ok(status) => {\n println!(\"{} Registry backup command finished with status: {}. Check permissions or if reg.exe is available.\", \"[WARNING]\".color(YELLOW), status);\n }\n Err(e) => {\n println!(\"{} Failed to execute registry backup command: {}. Proceeding with caution.\", \"[WARNING]\".color(YELLOW), e);\n }\n }\n\n let new_guid = Uuid::new_v4().to_string();\n match crypto_key.set_value(reg_key_name, &new_guid) {\n Ok(_) => {\n println!(\"{} Registry value {} set to: {}\", \"[INFO]\".color(GREEN), reg_key_name, new_guid);\n // Verification\n let verify_guid: Result<String, _> = crypto_key.get_value(reg_key_name);\n match verify_guid {\n Ok(val) if val == new_guid => {\n println!(\"{} Registry update verified successfully.\", \"[INFO]\".color(GREEN));\n println!(\" {}\", full_reg_key_path_for_export);\n println!(\" {} REG_SZ {}\", reg_key_name, new_guid);\n true\n }\n Ok(val) => {\n println!(\"{} Registry verification failed: Updated value ({}) does not match expected value ({}).\", \"[ERROR]\".color(RED), val, new_guid);\n // Attempt restore\n false // Placeholder for restore logic\n }\n Err(e) => {\n println!(\"{} Failed to verify registry update: {}.\", \"[ERROR]\".color(RED), e);\n false // Placeholder for restore logic\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to set registry value {}: {}.\", \"[ERROR]\".color(RED), reg_key_name, e);\n // Attempt restore if original_guid was present and backup_file_path exists\n if !original_guid.is_empty() && backup_file_path.exists() {\n println!(\"{} Attempting to restore registry from backup: {:?}\", \"[YELLOW]\".color(YELLOW), backup_file_path);\n let restore_command_str = format!(\"reg.exe import \\\"{}\\\"\", backup_file_path.display());\n match Command::new(\"cmd\").args(&[\"/C\", &restore_command_str]).status() {\n Ok(status) if status.success() => println!(\"{} Registry restored successfully from backup.\", \"[INFO]\".color(GREEN)),\n Ok(status) => println!(\"{} Registry restore command failed with status: {}. Manual restore may be needed from {:?}\", \"[ERROR]\".color(RED), status, backup_file_path),\n Err(re) => println!(\"{} Failed to execute registry restore command: {}. Manual restore needed from {:?}\", \"[ERROR]\".color(RED), re, backup_file_path),\n }\n }\n false\n }\n }\n}\n\nfn update_storage_file(\n storage_file_path: &Path,\n machine_id: &str,\n mac_machine_id: &str,\n dev_device_id: &str,\n sqm_id: &str,\n) -> bool {\n if !storage_file_path.exists() {\n println!(\"{} Configuration file not found: {:?}\", \"[ERROR]\".color(RED), storage_file_path);\n println!(\"{} Please install and run Cursor once before using this script\", \"[TIP]\".color(YELLOW));\n return false;\n }\n\n let original_content = match fs::read_to_string(storage_file_path) {\n Ok(content) => content,\n Err(e) => {\n println!(\"{} Failed to read configuration file {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n return false;\n }\n };\n\n let mut config: Value = match serde_json::from_str(&original_content) {\n Ok(json_value) => json_value,\n Err(e) => {\n println!(\"{} Failed to parse configuration file JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content is not applicable here as we haven't written yet\n return false;\n }\n };\n\n // Ensure the path to telemetry values exists or create it\n // serde_json::Value uses `pointer_mut` for this kind of access.\n // Example: /telemetry/machineId\n // We need to ensure `config[\"telemetry\"]` is an object.\n if !config.get(\"telemetry\").map_or(false, |v| v.is_object()) {\n if config.as_object_mut().is_some() { // Check if config itself is an object\n config[\"telemetry\"] = serde_json::json!({});\n } else {\n println!(\"{} Configuration root is not a JSON object. Cannot set telemetry.\", \"[ERROR]\".color(RED));\n return false;\n }\n }\n \n // Update specific values\n // Using .get_mut(\"telemetry\") and then working with the resulting Option<&mut Value>\n if let Some(telemetry) = config.get_mut(\"telemetry\") {\n if let Some(telemetry_obj) = telemetry.as_object_mut() {\n telemetry_obj.insert(\"machineId\".to_string(), Value::String(machine_id.to_string()));\n telemetry_obj.insert(\"macMachineId\".to_string(), Value::String(mac_machine_id.to_string()));\n telemetry_obj.insert(\"devDeviceId\".to_string(), Value::String(dev_device_id.to_string()));\n telemetry_obj.insert(\"sqmId\".to_string(), Value::String(sqm_id.to_string()));\n } else {\n println!(\"{} 'telemetry' field is not an object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n } else {\n // This case should ideally be covered by the creation logic above.\n println!(\"{} Failed to access or create 'telemetry' object.\", \"[ERROR]\".color(RED));\n return false; // Or attempt to restore original_content\n }\n \n match serde_json::to_string_pretty(&config) { // Using pretty for readability, PowerShell does compact\n Ok(updated_json) => {\n match fs::write(storage_file_path, updated_json.as_bytes()) { // .as_bytes() for UTF-8\n Ok(_) => {\n println!(\"{} Configuration file updated successfully at {:?}\", \"[INFO]\".color(GREEN), storage_file_path);\n true\n }\n Err(e) => {\n println!(\"{} Failed to write updated configuration to {:?}: {}\", \"[ERROR]\".color(RED), storage_file_path, e);\n // Attempt to restore original content\n if fs::write(storage_file_path, original_content.as_bytes()).is_err() {\n println!(\"{} CRITICAL: Failed to restore original content to {:?} after write error.\", \"[ERROR]\".color(RED), storage_file_path);\n }\n false\n }\n }\n }\n Err(e) => {\n println!(\"{} Failed to serialize updated configuration to JSON: {}\", \"[ERROR]\".color(RED), e);\n // Attempt to restore original content if we had changed it in memory (not the case here with direct write path)\n // No need to restore file if serialization failed before writing.\n false\n }\n }\n}\n", "middle_code": "if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n let primary_path = local_app_data_dir.join(\"Programs\").join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if primary_path.exists() {\n return Some(primary_path);\n }\n let alt_path = local_app_data_dir.join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if alt_path.exists() {\n return Some(alt_path);\n }\n }", "code_description": null, "fill_type": "BLOCK_TYPE", "language_type": "rust", "sub_task_type": "if_statement"}, "context_code": [], "task_instance_info": {"created_time": "2025-08-21 01:50:56", "created_task_model": "DeepSeek-R1", "code_description": "This code segment functions to: Locate application configuration data by checking multiple potential installation paths within system directories and verifying file existence through hierarchical path construction."}, "inference_content": {"inference_model": "DeepSeek-R1", "inference_result": "```rust\n[TASK_BEGIN]\nfn get_cursor_package_path() -> Option<PathBuf> {\n // Check common installation paths\n let possible_paths = [\n env::var(\"PROGRAMFILES\").ok().map(PathBuf::from),\n env::var(\"PROGRAMFILES(X86)\").ok().map(PathBuf::from),\n BaseDirs::new().map(|d| d.data_local_dir().to_path_buf()),\n ];\n\n for path in possible_paths.iter().flatten() {\n let package_path = path\n .join(\"Cursor\")\n .join(\"resources\")\n .join(\"app\")\n .join(\"package.json\");\n \n if package_path.exists() {\n return Some(package_path);\n }\n }\n\n // Fallback to traditional path if not found in standard locations\n let traditional_path = PathBuf::from(r\"C:\\Program Files\\Cursor\\resources\\app\\package.json\");\n if traditional_path.exists() {\n return Some(traditional_path);\n }\n\n None\n}\n[TASK_END]\n```", "inference_time": "2025-08-21 01-51-17"}, "editdistance_info": {"edit_distance": 26.8156, "calculate_time": "2025-08-21 01:51:17", "true_code_clean": "if let Some(user_dirs) = BaseDirs::new() {\n let local_app_data_dir = user_dirs.data_local_dir();\n let primary_path = local_app_data_dir.join(\"Programs\").join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if primary_path.exists() {\n return Some(primary_path);\n }\n let alt_path = local_app_data_dir.join(\"cursor\").join(\"resources\").join(\"app\").join(\"package.json\");\n if alt_path.exists() {\n return Some(alt_path);\n }\n }", "predict_code_clean": "fn get_cursor_package_path() -> Option<PathBuf> {\n let possible_paths = [\n env::var(\"PROGRAMFILES\").ok().map(PathBuf::from),\n env::var(\"PROGRAMFILES(X86)\").ok().map(PathBuf::from),\n BaseDirs::new().map(|d| d.data_local_dir().to_path_buf()),\n ];\n for path in possible_paths.iter().flatten() {\n let package_path = path\n .join(\"Cursor\")\n .join(\"resources\")\n .join(\"app\")\n .join(\"package.json\");\n if package_path.exists() {\n return Some(package_path);\n }\n }\n let traditional_path = PathBuf::from(r\"C:\\Program Files\\Cursor\\resources\\app\\package.json\");\n if traditional_path.exists() {\n return Some(traditional_path);\n }\n None\n}"}}