use anyhow::{bail, Context, Error, Ok, Result}; use std::{ fs::{create_dir_all, write, File, OpenOptions}, io::{ErrorKind::AlreadyExists, Write}, path::Path, }; use crate::defs; use std::fs::metadata; #[allow(unused_imports)] use std::fs::{set_permissions, Permissions}; #[cfg(unix)] use std::os::unix::prelude::PermissionsExt; pub fn ensure_clean_dir(dir: &str) -> Result<()> { let path = Path::new(dir); log::debug!("ensure_clean_dir: {}", path.display()); if path.exists() { log::debug!("ensure_clean_dir: {} exists, remove it", path.display()); std::fs::remove_dir_all(path)?; } Ok(std::fs::create_dir_all(path)?) } pub fn ensure_file_exists>(file: T) -> Result<()> { match File::options().write(true).create_new(true).open(&file) { std::result::Result::Ok(_) => Ok(()), Err(err) => { if err.kind() == AlreadyExists && file.as_ref().is_file() { Ok(()) } else { Err(Error::from(err)) .with_context(|| format!("{} is not a regular file", file.as_ref().display())) } } } } pub fn ensure_dir_exists>(dir: T) -> Result<()> { let result = create_dir_all(&dir).map_err(Error::from); if dir.as_ref().is_dir() { result } else if result.is_ok() { bail!("{} is not a regular directory", dir.as_ref().display()) } else { result } } pub fn ensure_binary>( path: T, contents: &[u8], ignore_if_exist: bool, ) -> Result<()> { if ignore_if_exist && path.as_ref().exists() { return Ok(()); } ensure_dir_exists(path.as_ref().parent().ok_or_else(|| { anyhow::anyhow!( "{} does not have parent directory", path.as_ref().to_string_lossy() ) })?)?; write(&path, contents)?; #[cfg(unix)] set_permissions(&path, Permissions::from_mode(0o755))?; Ok(()) } #[cfg(any(target_os = "linux", target_os = "android"))] pub fn getprop(prop: &str) -> Option { android_properties::getprop(prop).value() } #[cfg(not(any(target_os = "linux", target_os = "android")))] pub fn getprop(_prop: &str) -> Option { unimplemented!() } pub fn is_safe_mode() -> bool { let safemode = getprop("persist.sys.safemode") .filter(|prop| prop == "1") .is_some() || getprop("ro.sys.safemode") .filter(|prop| prop == "1") .is_some(); log::info!("safemode: {}", safemode); if safemode { return true; } let safemode = crate::ksu::check_kernel_safemode(); log::info!("kernel_safemode: {}", safemode); safemode } pub fn get_zip_uncompressed_size(zip_path: &str) -> Result { let mut zip = zip::ZipArchive::new(std::fs::File::open(zip_path)?)?; let total: u64 = (0..zip.len()) .map(|i| zip.by_index(i).unwrap().size()) .sum(); Ok(total) } #[cfg(any(target_os = "linux", target_os = "android"))] pub fn switch_mnt_ns(pid: i32) -> Result<()> { use anyhow::ensure; use std::os::fd::AsRawFd; let path = format!("/proc/{pid}/ns/mnt"); let fd = std::fs::File::open(path)?; let current_dir = std::env::current_dir(); let ret = unsafe { libc::setns(fd.as_raw_fd(), libc::CLONE_NEWNS) }; if let std::result::Result::Ok(current_dir) = current_dir { let _ = std::env::set_current_dir(current_dir); } ensure!(ret == 0, "switch mnt ns failed"); Ok(()) } #[cfg(any(target_os = "linux", target_os = "android"))] pub fn unshare_mnt_ns() -> Result<()> { use anyhow::ensure; let ret = unsafe { libc::unshare(libc::CLONE_NEWNS) }; ensure!(ret == 0, "unshare mnt ns failed"); Ok(()) } fn switch_cgroup(grp: &str, pid: u32) { let path = Path::new(grp).join("cgroup.procs"); if !path.exists() { return; } let fp = OpenOptions::new().append(true).open(path); if let std::result::Result::Ok(mut fp) = fp { let _ = writeln!(fp, "{pid}"); } } pub fn switch_cgroups() { let pid = std::process::id(); switch_cgroup("/acct", pid); switch_cgroup("/dev/cg2_bpf", pid); switch_cgroup("/sys/fs/cgroup", pid); if getprop("ro.config.per_app_memcg") .filter(|prop| prop == "false") .is_none() { switch_cgroup("/dev/memcg/apps", pid); } } #[cfg(any(target_os = "linux", target_os = "android"))] pub fn umask(mask: u32) { unsafe { libc::umask(mask) }; } #[cfg(not(any(target_os = "linux", target_os = "android")))] pub fn umask(_mask: u32) { unimplemented!("umask is not supported on this platform") } pub fn has_magisk() -> bool { which::which("magisk").is_ok() } pub fn get_tmp_path() -> &'static str { if metadata(defs::TEMP_DIR_LEGACY).is_ok() { return defs::TEMP_DIR_LEGACY; } if metadata(defs::TEMP_DIR).is_ok() { return defs::TEMP_DIR; } "" }