43146b8316
Due to changes in ec3705f2ed
, the app can
no longer communicate with the dameon through a socket opened on the
daemon side due to SELinux restrictions. The workaround here is to have
the daemon decide a socket name, send it to the app, have the app create
the socket server, then finally the daemon connects to the app through
the socket.
73 lines
1.4 KiB
C++
73 lines
1.4 KiB
C++
#pragma once
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <memory>
|
|
|
|
#include <db.hpp>
|
|
#include <utils.hpp>
|
|
|
|
#define DEFAULT_SHELL "/system/bin/sh"
|
|
|
|
// Constants for atty
|
|
#define ATTY_IN (1 << 0)
|
|
#define ATTY_OUT (1 << 1)
|
|
#define ATTY_ERR (1 << 2)
|
|
|
|
class su_info {
|
|
public:
|
|
/* Unique key */
|
|
const int uid;
|
|
|
|
/* These should be guarded with internal lock */
|
|
db_settings cfg;
|
|
db_strings str;
|
|
su_access access;
|
|
struct stat mgr_st;
|
|
|
|
/* This should be guarded with global cache lock */
|
|
long timestamp;
|
|
|
|
su_info(unsigned uid = 0);
|
|
~su_info();
|
|
mutex_guard lock();
|
|
bool is_fresh();
|
|
void refresh();
|
|
|
|
private:
|
|
pthread_mutex_t _lock; /* Internal lock */
|
|
};
|
|
|
|
struct su_req_base {
|
|
int uid = UID_ROOT;
|
|
bool login = false;
|
|
bool keepenv = false;
|
|
bool mount_master = false;
|
|
} __attribute__((packed));
|
|
|
|
struct su_request : public su_req_base {
|
|
const char *shell = DEFAULT_SHELL;
|
|
const char *command = "";
|
|
su_request(bool dyn = false) : dyn(dyn) {}
|
|
~su_request() {
|
|
if (dyn) {
|
|
free(const_cast<char*>(shell));
|
|
free(const_cast<char*>(command));
|
|
}
|
|
}
|
|
|
|
private:
|
|
bool dyn;
|
|
} __attribute__((packed));
|
|
|
|
struct su_context {
|
|
std::shared_ptr<su_info> info;
|
|
su_request req;
|
|
int pid;
|
|
};
|
|
|
|
void app_log(const su_context &ctx);
|
|
void app_notify(const su_context &ctx);
|
|
int app_socket(const char *name, const std::shared_ptr<su_info> &info);
|
|
void socket_send_request(int fd, const std::shared_ptr<su_info> &info);
|