1/*
2* Copyright (c) 2022 Huawei Device Co., Ltd.
3* Licensed under the Apache License, Version 2.0 (the "License");
4* you may not use this file except in compliance with the License.
5* You may obtain a copy of the License at
6*
7*     http://www.apache.org/licenses/LICENSE-2.0
8*
9* Unless required by applicable law or agreed to in writing, software
10* distributed under the License is distributed on an "AS IS" BASIS,
11* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12* See the License for the specific language governing permissions and
13* limitations under the License.
14*/
15#include <errno.h>
16#include <stdio.h>
17#include <string.h>
18
19#ifdef ENABLE_ENTER_APPSPAWN_SANDBOX
20#include "appspawn.h"
21#endif
22#include "begetctl.h"
23#include "beget_ext.h"
24#include "control_fd.h"
25#include "securec.h"
26#include "init_param.h"
27
28#define DUMP_APPSPAWN_CMD_ARGS 1
29#define DUMP_SERVICE_INFO_CMD_ARGS 2
30#define DUMP_SERVICE_BOOTEVENT_CMD_ARGS 3
31
32static int SendAppspawnCmdMessage(const CmdAgent *agent, uint16_t type, const char *cmd, const char *ptyName)
33{
34#ifdef ENABLE_ENTER_APPSPAWN_SANDBOX
35    if ((agent == NULL) || (cmd == NULL) || (ptyName == NULL)) {
36        BEGET_LOGE("Invalid parameter");
37        return -1;
38    }
39
40    int ret = -1;
41    AppSpawnClientHandle clientHandle;
42    if (strcmp(cmd, "dump_appspawn") == 0) {
43        ret = AppSpawnClientInit("AppSpawn", &clientHandle);
44    } else if (strcmp(cmd, "dump_nwebspawn") == 0) {
45        ret = AppSpawnClientInit("NWebSpawn", &clientHandle);
46    } else {
47        BEGET_LOGE("Invalid parameter to dump appspawn");
48    }
49    BEGET_ERROR_CHECK(ret == 0, return -1, "AppSpawnClientInit error, errno = %d", errno);
50    AppSpawnReqMsgHandle reqHandle;
51    ret = AppSpawnReqMsgCreate(MSG_DUMP, ptyName, &reqHandle);
52    BEGET_ERROR_CHECK(ret == 0, AppSpawnClientDestroy(clientHandle);
53        return -1, "AppSpawnReqMsgCreate error");
54    ret = AppSpawnReqMsgAddStringInfo(reqHandle, "pty-name", ptyName);
55    BEGET_ERROR_CHECK(ret == 0, AppSpawnClientDestroy(clientHandle);
56        return -1, "add %s request message error", ptyName);
57    AppSpawnResult result = {};
58    ret = AppSpawnClientSendMsg(clientHandle, reqHandle, &result);
59    if (ret != 0 || result.result != 0) {
60        AppSpawnClientDestroy(clientHandle);
61        return -1;
62    }
63    AppSpawnClientDestroy(clientHandle);
64    return 0;
65#endif
66    return -1;
67}
68
69static void DumpAppspawnClientInit(const char *cmd, CallbackSendMsgProcess sendMsg)
70{
71    if (cmd == NULL) {
72        BEGET_LOGE("[control_fd] Invalid parameter");
73        return;
74    }
75
76    CmdAgent agent;
77    int ret = InitPtyInterface(&agent, ACTION_DUMP, cmd, sendMsg);
78    if (ret != 0) {
79        BEGET_LOGE("App with pid=%s does not support entering sandbox environment", cmd);
80        return;
81    }
82    LE_RunLoop(LE_GetDefaultLoop());
83    LE_CloseLoop(LE_GetDefaultLoop());
84    BEGET_LOGI("Cmd Client exit ");
85}
86
87static int main_cmd(BShellHandle shell, int argc, char **argv)
88{
89    if (argc == DUMP_APPSPAWN_CMD_ARGS) {
90        DumpAppspawnClientInit(argv[0], SendAppspawnCmdMessage);
91    } else if (argc == DUMP_SERVICE_INFO_CMD_ARGS) {
92        printf("dump service info \n");
93        CmdClientInit(INIT_CONTROL_FD_SOCKET_PATH, ACTION_DUMP, argv[1], NULL);
94    } else if (argc == DUMP_SERVICE_BOOTEVENT_CMD_ARGS) {
95        if (strcmp(argv[1], "parameter_service") == 0) {
96            printf("dump parameter service info \n");
97        }
98        size_t serviceNameLen = strlen(argv[1]) + strlen(argv[2]) + 2; // 2 is \0 and #
99        char *cmd = (char *)calloc(1, serviceNameLen);
100        BEGET_ERROR_CHECK(cmd != NULL, return 0, "failed to allocate cmd memory");
101        BEGET_ERROR_CHECK(sprintf_s(cmd, serviceNameLen, "%s#%s", argv[1], argv[2]) >= 0, free(cmd);
102            return 0, "dump service arg create failed");
103        CmdClientInit(INIT_CONTROL_FD_SOCKET_PATH, ACTION_DUMP, cmd, NULL);
104        free(cmd);
105    } else {
106        BShellCmdHelp(shell, argc, argv);
107    }
108    return 0;
109}
110
111static int BootEventEnable(BShellHandle shell, int argc, char **argv)
112{
113    if (SystemSetParameter("persist.init.bootevent.enable", "true") == 0) {
114        printf("bootevent enabled\n");
115    }
116    return 0;
117}
118static int BootEventDisable(BShellHandle shell, int argc, char **argv)
119{
120    if (SystemSetParameter("persist.init.bootevent.enable", "false") == 0) {
121        printf("bootevent disabled\n");
122    }
123    return 0;
124}
125
126MODULE_CONSTRUCTOR(void)
127{
128    const CmdInfo infos[] = {
129        {"dump_service", main_cmd, "dump all loop info", "dump_service loop", NULL},
130        {"dump_service", main_cmd, "dump one service info by serviceName", "dump_service serviceName", NULL},
131        {"dump_service", main_cmd, "dump all services info", "dump_service all", NULL},
132        {"dump_service", main_cmd, "dump parameter-service trigger",
133            "dump_service parameter_service trigger", NULL},
134        {"bootevent", BootEventEnable, "bootevent enable", "bootevent enable",
135            "bootevent enable"},
136        {"bootevent", BootEventDisable, "bootevent disable", "bootevent disable",
137            "bootevent disable"},
138        {"dump_appspawn", main_cmd, "dump appspawn info", "dump_appspawn", NULL },
139        {"dump_nwebspawn", main_cmd, "dump nwebspawn info", "dump_nwebspawn", NULL}
140    };
141    for (size_t i = 0; i < sizeof(infos) / sizeof(infos[0]); i++) {
142        BShellEnvRegisterCmd(GetShellHandle(), &infos[i]);
143    }
144}
145