2017-12-12 22:12:07 +08:00
|
|
|
#include "command.h"
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2018-02-13 17:10:18 +08:00
|
|
|
|
2018-03-25 21:23:00 +08:00
|
|
|
#include "common.h"
|
2018-02-13 17:10:18 +08:00
|
|
|
#include "log.h"
|
2017-12-12 22:12:07 +08:00
|
|
|
|
2018-02-01 01:46:56 +08:00
|
|
|
static const char *adb_command;
|
|
|
|
|
|
|
|
static inline const char *get_adb_command() {
|
|
|
|
if (!adb_command) {
|
|
|
|
adb_command = getenv("ADB");
|
|
|
|
if (!adb_command)
|
|
|
|
adb_command = "adb";
|
|
|
|
}
|
|
|
|
return adb_command;
|
|
|
|
}
|
|
|
|
|
2017-12-12 22:12:07 +08:00
|
|
|
process_t adb_execute(const char *serial, const char *const adb_cmd[], int len) {
|
|
|
|
const char *cmd[len + 4];
|
|
|
|
int i;
|
2018-02-01 01:46:56 +08:00
|
|
|
cmd[0] = get_adb_command();
|
2017-12-12 22:12:07 +08:00
|
|
|
if (serial) {
|
|
|
|
cmd[1] = "-s";
|
|
|
|
cmd[2] = serial;
|
|
|
|
i = 3;
|
|
|
|
} else {
|
|
|
|
i = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&cmd[i], adb_cmd, len * sizeof(const char *));
|
|
|
|
cmd[len + i] = NULL;
|
|
|
|
return cmd_execute(cmd[0], cmd);
|
|
|
|
}
|
|
|
|
|
|
|
|
process_t adb_forward(const char *serial, uint16_t local_port, const char *device_socket_name) {
|
|
|
|
char local[4 + 5 + 1]; // tcp:PORT
|
|
|
|
char remote[108 + 14 + 1]; // localabstract:NAME
|
|
|
|
sprintf(local, "tcp:%" PRIu16, local_port);
|
|
|
|
snprintf(remote, sizeof(remote), "localabstract:%s", device_socket_name);
|
|
|
|
const char *const adb_cmd[] = {"forward", local, remote};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
2018-03-12 15:35:51 +08:00
|
|
|
process_t adb_forward_remove(const char *serial, uint16_t local_port) {
|
|
|
|
char local[4 + 5 + 1]; // tcp:PORT
|
|
|
|
sprintf(local, "tcp:%" PRIu16, local_port);
|
|
|
|
const char *const adb_cmd[] = {"forward", "--remove", local};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
2017-12-12 22:12:07 +08:00
|
|
|
process_t adb_reverse(const char *serial, const char *device_socket_name, uint16_t local_port) {
|
|
|
|
char local[4 + 5 + 1]; // tcp:PORT
|
|
|
|
char remote[108 + 14 + 1]; // localabstract:NAME
|
|
|
|
sprintf(local, "tcp:%" PRIu16, local_port);
|
|
|
|
snprintf(remote, sizeof(remote), "localabstract:%s", device_socket_name);
|
|
|
|
const char *const adb_cmd[] = {"reverse", remote, local};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
|
|
|
process_t adb_reverse_remove(const char *serial, const char *device_socket_name) {
|
|
|
|
char remote[108 + 14 + 1]; // localabstract:NAME
|
|
|
|
snprintf(remote, sizeof(remote), "localabstract:%s", device_socket_name);
|
|
|
|
const char *const adb_cmd[] = {"reverse", "--remove", remote};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
|
|
|
process_t adb_push(const char *serial, const char *local, const char *remote) {
|
2018-02-28 22:02:51 +08:00
|
|
|
const char *const adb_cmd[] = {"push", local, remote};
|
2017-12-12 22:12:07 +08:00
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
2018-02-08 22:16:27 +08:00
|
|
|
|
2018-04-29 06:17:34 +08:00
|
|
|
process_t adb_install(const char *serial, const char *local) {
|
2018-05-26 20:43:42 +08:00
|
|
|
#ifdef __WINDOWS__
|
|
|
|
// Windows will parse the string, so the local name must be quoted (see sys/win/command.c)
|
|
|
|
size_t len = strlen(local);
|
|
|
|
char quoted[len + 3];
|
|
|
|
memcpy("ed[1], local, len);
|
|
|
|
quoted[0] = '"';
|
|
|
|
quoted[len + 1] = '"';
|
|
|
|
quoted[len + 2] = '\0';
|
|
|
|
local = quoted;
|
|
|
|
#endif
|
2018-04-29 06:17:34 +08:00
|
|
|
const char *const adb_cmd[] = {"install", "-r", local};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
2018-02-28 22:13:56 +08:00
|
|
|
process_t adb_remove_path(const char *serial, const char *path) {
|
|
|
|
const char *const adb_cmd[] = {"shell", "rm", path};
|
|
|
|
return adb_execute(serial, adb_cmd, ARRAY_LEN(adb_cmd));
|
|
|
|
}
|
|
|
|
|
2018-02-08 22:16:27 +08:00
|
|
|
SDL_bool process_check_success(process_t proc, const char *name) {
|
|
|
|
if (proc == PROCESS_NONE) {
|
2018-02-13 17:10:18 +08:00
|
|
|
LOGE("Could not execute \"%s\"", name);
|
2018-02-08 22:16:27 +08:00
|
|
|
return SDL_FALSE;
|
|
|
|
}
|
|
|
|
exit_code_t exit_code;
|
|
|
|
if (!cmd_simple_wait(proc, &exit_code)) {
|
|
|
|
if (exit_code != NO_EXIT_CODE) {
|
2018-02-13 17:10:18 +08:00
|
|
|
LOGE("\"%s\" returned with value %" PRIexitcode, name, exit_code);
|
2018-02-08 22:16:27 +08:00
|
|
|
} else {
|
2018-02-13 17:10:18 +08:00
|
|
|
LOGE("\"%s\" exited unexpectedly", name);
|
2018-02-08 22:16:27 +08:00
|
|
|
}
|
|
|
|
return SDL_FALSE;
|
|
|
|
}
|
|
|
|
return SDL_TRUE;
|
|
|
|
}
|