tor-commits
Threads by month
- ----- 2025 -----
- July
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
November 2016
- 16 participants
- 1665 discussions
commit 4d66133894855410e26508e8f3bea856df0d8908
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Sat Oct 29 11:33:37 2016 -0400
remove unused files
---
orbotservice/src/main/res/values/arrays.xml | 15 ---------------
orbotservice/src/main/res/values/colors.xml | 8 --------
orbotservice/src/main/res/values/styles.xml | 5 -----
orbotservice/src/main/res/values/theme.xml | 8 --------
4 files changed, 36 deletions(-)
diff --git a/orbotservice/src/main/res/values/arrays.xml b/orbotservice/src/main/res/values/arrays.xml
deleted file mode 100644
index 7defef0..0000000
--- a/orbotservice/src/main/res/values/arrays.xml
+++ /dev/null
@@ -1,15 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-
-<resources>
-
- <string-array name="bridge_options">
- <item>Obfs4 (Best)</item>
- <item>Obfs3</item>
- <item>ScrambleSuit</item>
- <item>Tunnel through Azure</item>
- <item>Tunnel through Amazon</item>
- <item>Get New Bridges</item>
- <item></item>
- </string-array>
-
-</resources>
diff --git a/orbotservice/src/main/res/values/colors.xml b/orbotservice/src/main/res/values/colors.xml
deleted file mode 100644
index 19e06e7..0000000
--- a/orbotservice/src/main/res/values/colors.xml
+++ /dev/null
@@ -1,8 +0,0 @@
-
- <resources>
- <color name="panel_background">#ffffff</color>
- <color name="panel_background_dark">#efefef</color>
- <color name="panel_background_main">#efefef</color>
- <color name="bright_green">#ccff2a</color>
- <color name="dark_green">#669901</color>
- </resources>
diff --git a/orbotservice/src/main/res/values/styles.xml b/orbotservice/src/main/res/values/styles.xml
deleted file mode 100644
index b3fe8af..0000000
--- a/orbotservice/src/main/res/values/styles.xml
+++ /dev/null
@@ -1,5 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-<resources>
- <style name="NotificationText" parent="android:TextAppearance.StatusBar.EventContent" />
- <style name="NotificationTitle" parent="android:TextAppearance.StatusBar.EventContent.Title" />
-</resources>
diff --git a/orbotservice/src/main/res/values/theme.xml b/orbotservice/src/main/res/values/theme.xml
deleted file mode 100644
index e51e533..0000000
--- a/orbotservice/src/main/res/values/theme.xml
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-
-<resources>
- <style name="DefaultTheme" parent="Theme.AppCompat.NoActionBar">
- </style>
-
-</resources>
-
1
0

02 Nov '16
commit ef57341c6ee39784eb4faba107442875a80c7e33
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Sat Oct 29 11:33:26 2016 -0400
re-enabled root permission request and shell
---
.../org/torproject/android/service/TorService.java | 32 +++++++++-------
.../android/service/transproxy/TorTransProxy.java | 43 +++++++++++++++++-----
2 files changed, 51 insertions(+), 24 deletions(-)
diff --git a/orbotservice/src/main/java/org/torproject/android/service/TorService.java b/orbotservice/src/main/java/org/torproject/android/service/TorService.java
index d1ae1fd..87d814d 100644
--- a/orbotservice/src/main/java/org/torproject/android/service/TorService.java
+++ b/orbotservice/src/main/java/org/torproject/android/service/TorService.java
@@ -805,21 +805,25 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
}
private boolean flushTransparentProxyRules () {
- if (Prefs.useRoot())
- {
- if (mTransProxy == null)
- mTransProxy = new TorTransProxy(this, fileXtables);
-
- try {
- mTransProxy.flushTransproxyRules(this);
- } catch (Exception e) {
- e.printStackTrace();
- return false;
- }
-
- return true;
+
+ try {
+ if (Prefs.useRoot()) {
+ if (mTransProxy == null)
+ mTransProxy = new TorTransProxy(this, fileXtables);
+
+ try {
+ mTransProxy.flushTransproxyRules(this);
+ } catch (Exception e) {
+ e.printStackTrace();
+ return false;
+ }
+
+ return true;
+ } else {
+ return false;
+ }
}
- else
+ catch (IOException ioe)
{
return false;
}
diff --git a/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java b/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
index 2aeb58d..037868a 100644
--- a/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
+++ b/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
@@ -1,6 +1,8 @@
package org.torproject.android.service.transproxy;
+import java.io.DataOutputStream;
import java.io.File;
+import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
@@ -29,12 +31,27 @@ public class TorTransProxy implements TorServiceConstants {
private int mTransProxyPort = TOR_TRANSPROXY_PORT_DEFAULT;
private int mDNSPort = TOR_DNS_PORT_DEFAULT;
-
- public TorTransProxy (TorService torService, File fileXTables)
+
+ private Process mProcess = null;
+
+ private DataOutputStream mProcessOutput = null;
+
+
+ public TorTransProxy (TorService torService, File fileXTables) throws IOException
{
mTorService = torService;
- mFileXtables = fileXTables;
+ mFileXtables = fileXTables;
+
+ mProcess = Runtime.getRuntime().exec("su");
+ mProcessOutput = new DataOutputStream(mProcess.getOutputStream());
+
}
+
+ public static boolean testRoot () throws IOException
+ {
+ Runtime.getRuntime().exec("su");
+ return true;
+ }
public void setTransProxyPort (int transProxyPort)
{
@@ -545,16 +562,22 @@ public class TorTransProxy implements TorServiceConstants {
private int executeCommand (String cmdString) throws Exception {
- Process proc = Runtime.getRuntime().exec(cmdString);
- proc.waitFor();
- int exitCode = proc.exitValue();
- //String output = cmd.getOutput();
+ mProcessOutput.writeBytes(cmdString + "\n");
+ mProcessOutput.flush();
+ logMessage(cmdString);
- logMessage(cmdString + "; exit=" + exitCode);
-
- return exitCode;
+ return 0;
}
+
+ public int doExit () throws Exception
+ {
+ mProcessOutput.writeBytes("exit\n");
+ mProcessOutput.flush();
+
+ return mProcess.waitFor();
+
+ }
public int enableTetheringRules (Context context) throws Exception
1
0
commit 41c9d2cd5dd57a4fede9d9b902d6154cd35ebf6a
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Wed Nov 2 12:07:57 2016 -0400
lock in app item list row height
---
app/src/main/res/layout/layout_apps_item.xml | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/app/src/main/res/layout/layout_apps_item.xml b/app/src/main/res/layout/layout_apps_item.xml
index c16d1cd..763581c 100644
--- a/app/src/main/res/layout/layout_apps_item.xml
+++ b/app/src/main/res/layout/layout_apps_item.xml
@@ -1,12 +1,12 @@
<?xml version="1.0" encoding="utf-8"?>
<TableLayout xmlns:android="http://schemas.android.com/apk/res/android"
- android:layout_width="fill_parent"
- android:layout_height="fill_parent"
+ android:layout_width="match_parent"
+ android:layout_height="40dp"
android:stretchColumns="1">
<TableRow>
- <ImageView android:id="@+id/itemicon" android:layout_width="50dip" android:layout_height="50dip" android:padding="3dip"></ImageView>
+ <ImageView android:id="@+id/itemicon" android:layout_width="50dip" android:layout_height="50dip" android:padding="3dip" android:visibility="gone"></ImageView>
<TextView android:layout_height="wrap_content" android:id="@+id/itemtext" android:text="uid:packages" android:textSize="18sp" android:padding="3dip"></TextView>
1
0

[orbot/master] add RootCommands library back in for shell and root shell exec
by n8fr8@torproject.org 02 Nov '16
by n8fr8@torproject.org 02 Nov '16
02 Nov '16
commit 52e7ad3bf052ad2746072d67837f1764a4b08f9e
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Mon Oct 31 15:52:03 2016 -0400
add RootCommands library back in for shell and root shell exec
---
RootCommands/.gitignore | 33 +
RootCommands/build.gradle | 28 +
RootCommands/src/main/AndroidManifest.xml | 13 +
.../org/sufficientlysecure/rootcommands/Mount.java | 58 ++
.../sufficientlysecure/rootcommands/Remounter.java | 191 +++++
.../rootcommands/RootCommands.java | 50 ++
.../org/sufficientlysecure/rootcommands/Shell.java | 350 +++++++++
.../rootcommands/SystemCommands.java | 122 +++
.../sufficientlysecure/rootcommands/Toolbox.java | 824 +++++++++++++++++++++
.../rootcommands/command/Command.java | 170 +++++
.../rootcommands/command/ExecutableCommand.java | 65 ++
.../rootcommands/command/SimpleCommand.java | 43 ++
.../command/SimpleExecutableCommand.java | 45 ++
.../rootcommands/util/BrokenBusyboxException.java | 32 +
.../sufficientlysecure/rootcommands/util/Log.java | 83 +++
.../util/RootAccessDeniedException.java | 32 +
.../util/UnsupportedArchitectureException.java | 30 +
.../rootcommands/util/Utils.java | 105 +++
orbotservice/build.gradle | 1 +
.../org/torproject/android/service/TorService.java | 89 ++-
.../android/service/transproxy/TorTransProxy.java | 38 +-
settings.gradle | 2 +-
22 files changed, 2344 insertions(+), 60 deletions(-)
diff --git a/RootCommands/.gitignore b/RootCommands/.gitignore
new file mode 100644
index 0000000..afa9dfc
--- /dev/null
+++ b/RootCommands/.gitignore
@@ -0,0 +1,33 @@
+#Android specific
+bin
+gen
+obj
+libs/armeabi
+lint.xml
+local.properties
+release.properties
+ant.properties
+*.class
+*.apk
+
+#Gradle
+.gradle
+build
+gradle.properties
+gradlew
+gradlew.bat
+gradle
+
+#Maven
+target
+pom.xml.*
+
+#Eclipse
+.project
+.classpath
+.settings
+.metadata
+
+#IntelliJ IDEA
+.idea
+*.iml
diff --git a/RootCommands/build.gradle b/RootCommands/build.gradle
new file mode 100644
index 0000000..00907bf
--- /dev/null
+++ b/RootCommands/build.gradle
@@ -0,0 +1,28 @@
+apply plugin: 'com.android.library'
+
+android {
+ compileSdkVersion 23
+ buildToolsVersion "23.0.3"
+
+ sourceSets {
+ main {
+ jni.srcDirs = []
+ }
+ }
+
+ defaultConfig {
+ minSdkVersion 9
+ targetSdkVersion 23
+ versionCode 1
+ versionName "1.0"
+
+ }
+ buildTypes {
+ release {
+ minifyEnabled false
+ proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro'
+ }
+ }
+}
+
+
diff --git a/RootCommands/src/main/AndroidManifest.xml b/RootCommands/src/main/AndroidManifest.xml
new file mode 100644
index 0000000..ee9b199
--- /dev/null
+++ b/RootCommands/src/main/AndroidManifest.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="utf-8"?>
+<manifest xmlns:android="http://schemas.android.com/apk/res/android"
+ package="org.sufficientlysecure.rootcommands"
+ android:versionCode="3"
+ android:versionName="1.2" >
+
+ <uses-sdk
+ android:minSdkVersion="7"
+ android:targetSdkVersion="17" />
+
+ <application />
+
+</manifest>
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Mount.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Mount.java
new file mode 100644
index 0000000..6f5ef78
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Mount.java
@@ -0,0 +1,58 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import java.io.File;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.Set;
+
+public class Mount {
+ protected final File mDevice;
+ protected final File mMountPoint;
+ protected final String mType;
+ protected final Set<String> mFlags;
+
+ Mount(File device, File path, String type, String flagsStr) {
+ mDevice = device;
+ mMountPoint = path;
+ mType = type;
+ mFlags = new HashSet<String>(Arrays.asList(flagsStr.split(",")));
+ }
+
+ public File getDevice() {
+ return mDevice;
+ }
+
+ public File getMountPoint() {
+ return mMountPoint;
+ }
+
+ public String getType() {
+ return mType;
+ }
+
+ public Set<String> getFlags() {
+ return mFlags;
+ }
+
+ @Override
+ public String toString() {
+ return String.format("%s on %s type %s %s", mDevice, mMountPoint, mType, mFlags);
+ }
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Remounter.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Remounter.java
new file mode 100644
index 0000000..00d4e2c
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Remounter.java
@@ -0,0 +1,191 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import java.io.File;
+import java.io.FileReader;
+import java.io.IOException;
+import java.io.LineNumberReader;
+import java.util.ArrayList;
+import java.util.Locale;
+
+import org.sufficientlysecure.rootcommands.command.SimpleCommand;
+import org.sufficientlysecure.rootcommands.util.Log;
+
+//no modifier, this means it is package-private. Only our internal classes can use this.
+class Remounter {
+
+ private Shell shell;
+
+ public Remounter(Shell shell) {
+ super();
+ this.shell = shell;
+ }
+
+ /**
+ * This will take a path, which can contain the file name as well, and attempt to remount the
+ * underlying partition.
+ * <p/>
+ * For example, passing in the following string:
+ * "/system/bin/some/directory/that/really/would/never/exist" will result in /system ultimately
+ * being remounted. However, keep in mind that the longer the path you supply, the more work
+ * this has to do, and the slower it will run.
+ *
+ * @param file
+ * file path
+ * @param mountType
+ * mount type: pass in RO (Read only) or RW (Read Write)
+ * @return a <code>boolean</code> which indicates whether or not the partition has been
+ * remounted as specified.
+ */
+ protected boolean remount(String file, String mountType) {
+
+ // if the path has a trailing slash get rid of it.
+ if (file.endsWith("/") && !file.equals("/")) {
+ file = file.substring(0, file.lastIndexOf("/"));
+ }
+ // Make sure that what we are trying to remount is in the mount list.
+ boolean foundMount = false;
+ while (!foundMount) {
+ try {
+ for (Mount mount : getMounts()) {
+ Log.d(RootCommands.TAG, mount.getMountPoint().toString());
+
+ if (file.equals(mount.getMountPoint().toString())) {
+ foundMount = true;
+ break;
+ }
+ }
+ } catch (Exception e) {
+ Log.e(RootCommands.TAG, "Exception", e);
+ return false;
+ }
+ if (!foundMount) {
+ try {
+ file = (new File(file).getParent()).toString();
+ } catch (Exception e) {
+ Log.e(RootCommands.TAG, "Exception", e);
+ return false;
+ }
+ }
+ }
+ Mount mountPoint = findMountPointRecursive(file);
+
+ Log.d(RootCommands.TAG, "Remounting " + mountPoint.getMountPoint().getAbsolutePath()
+ + " as " + mountType.toLowerCase(Locale.US));
+ final boolean isMountMode = mountPoint.getFlags().contains(mountType.toLowerCase(Locale.US));
+
+ if (!isMountMode) {
+ // grab an instance of the internal class
+ try {
+ SimpleCommand command = new SimpleCommand("busybox mount -o remount,"
+ + mountType.toLowerCase(Locale.US) + " " + mountPoint.getDevice().getAbsolutePath()
+ + " " + mountPoint.getMountPoint().getAbsolutePath(),
+ "toolbox mount -o remount," + mountType.toLowerCase(Locale.US) + " "
+ + mountPoint.getDevice().getAbsolutePath() + " "
+ + mountPoint.getMountPoint().getAbsolutePath(), "mount -o remount,"
+ + mountType.toLowerCase(Locale.US) + " "
+ + mountPoint.getDevice().getAbsolutePath() + " "
+ + mountPoint.getMountPoint().getAbsolutePath(),
+ "/system/bin/toolbox mount -o remount," + mountType.toLowerCase(Locale.US) + " "
+ + mountPoint.getDevice().getAbsolutePath() + " "
+ + mountPoint.getMountPoint().getAbsolutePath());
+
+ // execute on shell
+ shell.add(command).waitForFinish();
+
+ } catch (Exception e) {
+ }
+
+ mountPoint = findMountPointRecursive(file);
+ }
+
+ if (mountPoint != null) {
+ Log.d(RootCommands.TAG, mountPoint.getFlags() + " AND " + mountType.toLowerCase(Locale.US));
+ if (mountPoint.getFlags().contains(mountType.toLowerCase(Locale.US))) {
+ Log.d(RootCommands.TAG, mountPoint.getFlags().toString());
+ return true;
+ } else {
+ Log.d(RootCommands.TAG, mountPoint.getFlags().toString());
+ }
+ } else {
+ Log.d(RootCommands.TAG, "mountPoint is null");
+ }
+ return false;
+ }
+
+ private Mount findMountPointRecursive(String file) {
+ try {
+ ArrayList<Mount> mounts = getMounts();
+ for (File path = new File(file); path != null;) {
+ for (Mount mount : mounts) {
+ if (mount.getMountPoint().equals(path)) {
+ return mount;
+ }
+ }
+ }
+ return null;
+ } catch (IOException e) {
+ throw new RuntimeException(e);
+ } catch (Exception e) {
+ Log.e(RootCommands.TAG, "Exception", e);
+ }
+ return null;
+ }
+
+ /**
+ * This will return an ArrayList of the class Mount. The class mount contains the following
+ * property's: device mountPoint type flags
+ * <p/>
+ * These will provide you with any information you need to work with the mount points.
+ *
+ * @return <code>ArrayList<Mount></code> an ArrayList of the class Mount.
+ * @throws Exception
+ * if we cannot return the mount points.
+ */
+ protected static ArrayList<Mount> getMounts() throws Exception {
+
+ final String tempFile = "/data/local/RootToolsMounts";
+
+ // copy /proc/mounts to tempfile. Directly reading it does not work on 4.3
+ Shell shell = Shell.startRootShell();
+ Toolbox tb = new Toolbox(shell);
+ tb.copyFile("/proc/mounts", tempFile, false, false);
+ tb.setFilePermissions(tempFile, "777");
+ shell.close();
+
+ LineNumberReader lnr = null;
+ lnr = new LineNumberReader(new FileReader(tempFile));
+ String line;
+ ArrayList<Mount> mounts = new ArrayList<Mount>();
+ while ((line = lnr.readLine()) != null) {
+
+ Log.d(RootCommands.TAG, line);
+
+ String[] fields = line.split(" ");
+ mounts.add(new Mount(new File(fields[0]), // device
+ new File(fields[1]), // mountPoint
+ fields[2], // fstype
+ fields[3] // flags
+ ));
+ }
+ lnr.close();
+
+ return mounts;
+ }
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/RootCommands.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/RootCommands.java
new file mode 100644
index 0000000..2557628
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/RootCommands.java
@@ -0,0 +1,50 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import org.sufficientlysecure.rootcommands.util.Log;
+
+public class RootCommands {
+ public static boolean DEBUG = false;
+ public static int DEFAULT_TIMEOUT = 10000;
+
+ public static final String TAG = "RootCommands";
+
+ /**
+ * General method to check if user has su binary and accepts root access for this program!
+ *
+ * @return true if everything worked
+ */
+ public static boolean rootAccessGiven() {
+ boolean rootAccess = false;
+
+ try {
+ Shell rootShell = Shell.startRootShell();
+
+ Toolbox tb = new Toolbox(rootShell);
+ if (tb.isRootAccessGiven()) {
+ rootAccess = true;
+ }
+
+ rootShell.close();
+ } catch (Exception e) {
+ Log.e(TAG, "Problem while checking for root access!", e);
+ }
+
+ return rootAccess;
+ }
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Shell.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Shell.java
new file mode 100644
index 0000000..8091dee
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Shell.java
@@ -0,0 +1,350 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks, Jeremy Lakeman (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import java.io.BufferedReader;
+import java.io.Closeable;
+import java.io.DataOutputStream;
+import java.io.IOException;
+import java.io.InputStreamReader;
+import java.util.ArrayList;
+import java.util.List;
+
+import org.sufficientlysecure.rootcommands.command.Command;
+import org.sufficientlysecure.rootcommands.util.Log;
+import org.sufficientlysecure.rootcommands.util.RootAccessDeniedException;
+import org.sufficientlysecure.rootcommands.util.Utils;
+
+public class Shell implements Closeable {
+ private final Process shellProcess;
+ private final BufferedReader stdOutErr;
+ private final DataOutputStream outputStream;
+ private final List<Command> commands = new ArrayList<Command>();
+ private boolean close = false;
+
+ private static final String LD_LIBRARY_PATH = System.getenv("LD_LIBRARY_PATH");
+ private static final String token = "F*D^W@#FGF";
+
+ /**
+ * Start root shell
+ *
+ * @param customEnv
+ * @param baseDirectory
+ * @return
+ * @throws IOException
+ */
+ public static Shell startRootShell(ArrayList<String> customEnv, String baseDirectory)
+ throws IOException, RootAccessDeniedException {
+ Log.d(RootCommands.TAG, "Starting Root Shell!");
+
+ // On some versions of Android (ICS) LD_LIBRARY_PATH is unset when using su
+ // We need to pass LD_LIBRARY_PATH over su for some commands to work correctly.
+ if (customEnv == null) {
+ customEnv = new ArrayList<String>();
+ }
+ customEnv.add("LD_LIBRARY_PATH=" + LD_LIBRARY_PATH);
+
+ Shell shell = new Shell(Utils.getSuPath(), customEnv, baseDirectory);
+
+ return shell;
+ }
+
+ /**
+ * Start root shell without custom environment and base directory
+ *
+ * @return
+ * @throws IOException
+ */
+ public static Shell startRootShell() throws IOException, RootAccessDeniedException {
+ return startRootShell(null, null);
+ }
+
+ /**
+ * Start default sh shell
+ *
+ * @param customEnv
+ * @param baseDirectory
+ * @return
+ * @throws IOException
+ */
+ public static Shell startShell(ArrayList<String> customEnv, String baseDirectory)
+ throws IOException {
+ Log.d(RootCommands.TAG, "Starting Shell!");
+ Shell shell = new Shell("sh", customEnv, baseDirectory);
+ return shell;
+ }
+
+ /**
+ * Start default sh shell without custom environment and base directory
+ *
+ * @return
+ * @throws IOException
+ */
+ public static Shell startShell() throws IOException {
+ return startShell(null, null);
+ }
+
+ /**
+ * Start custom shell defined by shellPath
+ *
+ * @param shellPath
+ * @param customEnv
+ * @param baseDirectory
+ * @return
+ * @throws IOException
+ */
+ public static Shell startCustomShell(String shellPath, ArrayList<String> customEnv,
+ String baseDirectory) throws IOException {
+ Log.d(RootCommands.TAG, "Starting Custom Shell!");
+ Shell shell = new Shell(shellPath, customEnv, baseDirectory);
+
+ return shell;
+ }
+
+ /**
+ * Start custom shell without custom environment and base directory
+ *
+ * @param shellPath
+ * @return
+ * @throws IOException
+ */
+ public static Shell startCustomShell(String shellPath) throws IOException {
+ return startCustomShell(shellPath, null, null);
+ }
+
+ private Shell(String shell, ArrayList<String> customEnv, String baseDirectory)
+ throws IOException, RootAccessDeniedException {
+ Log.d(RootCommands.TAG, "Starting shell: " + shell);
+
+ // start shell process!
+ shellProcess = Utils.runWithEnv(shell, customEnv, baseDirectory);
+
+ // StdErr is redirected to StdOut, defined in Command.getCommand()
+ stdOutErr = new BufferedReader(new InputStreamReader(shellProcess.getInputStream()));
+ outputStream = new DataOutputStream(shellProcess.getOutputStream());
+
+ outputStream.write("echo Started\n".getBytes());
+ outputStream.flush();
+
+ while (true) {
+ String line = stdOutErr.readLine();
+ if (line == null)
+ throw new RootAccessDeniedException(
+ "stdout line is null! Access was denied or this executeable is not a shell!");
+ if ("".equals(line))
+ continue;
+ if ("Started".equals(line))
+ break;
+
+ destroyShellProcess();
+ throw new IOException("Unable to start shell, unexpected output \"" + line + "\"");
+ }
+
+ new Thread(inputRunnable, "Shell Input").start();
+ new Thread(outputRunnable, "Shell Output").start();
+ }
+
+ private Runnable inputRunnable = new Runnable() {
+ public void run() {
+ try {
+ writeCommands();
+ } catch (IOException e) {
+ Log.e(RootCommands.TAG, "IO Exception", e);
+ }
+ }
+ };
+
+ private Runnable outputRunnable = new Runnable() {
+ public void run() {
+ try {
+ readOutput();
+ } catch (IOException e) {
+ Log.e(RootCommands.TAG, "IOException", e);
+ } catch (InterruptedException e) {
+ Log.e(RootCommands.TAG, "InterruptedException", e);
+ }
+ }
+ };
+
+ /**
+ * Destroy shell process considering that the process could already be terminated
+ */
+ private void destroyShellProcess() {
+ try {
+ // Yes, this really is the way to check if the process is
+ // still running.
+ shellProcess.exitValue();
+ } catch (IllegalThreadStateException e) {
+ // Only call destroy() if the process is still running;
+ // Calling it for a terminated process will not crash, but
+ // (starting with at least ICS/4.0) spam the log with INFO
+ // messages ala "Failed to destroy process" and "kill
+ // failed: ESRCH (No such process)".
+ shellProcess.destroy();
+ }
+
+ Log.d(RootCommands.TAG, "Shell destroyed");
+ }
+
+ /**
+ * Writes queued commands one after another into the opened shell. After an execution a token is
+ * written to seperate command output on read
+ *
+ * @throws IOException
+ */
+ private void writeCommands() throws IOException {
+ try {
+ int commandIndex = 0;
+ while (true) {
+ DataOutputStream out;
+ synchronized (commands) {
+ while (!close && commandIndex >= commands.size()) {
+ commands.wait();
+ }
+ out = this.outputStream;
+ }
+ if (commandIndex < commands.size()) {
+ Command next = commands.get(commandIndex);
+ next.writeCommand(out);
+ String line = "\necho " + token + " " + commandIndex + " $?\n";
+ out.write(line.getBytes());
+ out.flush();
+ commandIndex++;
+ } else if (close) {
+ out.write("\nexit 0\n".getBytes());
+ out.flush();
+ Log.d(RootCommands.TAG, "Closing shell");
+ shellProcess.waitFor();
+ out.close();
+ return;
+ } else {
+ Thread.sleep(50);
+ }
+ }
+ } catch (InterruptedException e) {
+ Log.e(RootCommands.TAG, "interrupted while writing command", e);
+ }
+ }
+
+ /**
+ * Reads output line by line, seperated by token written after every command
+ *
+ * @throws IOException
+ * @throws InterruptedException
+ */
+ private void readOutput() throws IOException, InterruptedException {
+ Command command = null;
+
+ // index of current command
+ int commandIndex = 0;
+ while (true) {
+ String lineStdOut = stdOutErr.readLine();
+
+ // terminate on EOF
+ if (lineStdOut == null)
+ break;
+
+ if (command == null) {
+
+ // break on close after last command
+ if (commandIndex >= commands.size()) {
+ if (close)
+ break;
+ continue;
+ }
+
+ // get current command
+ command = commands.get(commandIndex);
+ }
+
+ int pos = lineStdOut.indexOf(token);
+ if (pos > 0) {
+ command.processOutput(lineStdOut.substring(0, pos));
+ }
+ if (pos >= 0) {
+ lineStdOut = lineStdOut.substring(pos);
+ String fields[] = lineStdOut.split(" ");
+ int id = Integer.parseInt(fields[1]);
+ if (id == commandIndex) {
+ command.setExitCode(Integer.parseInt(fields[2]));
+
+ // go to next command
+ commandIndex++;
+ command = null;
+ continue;
+ }
+ }
+ command.processOutput(lineStdOut);
+ }
+ Log.d(RootCommands.TAG, "Read all output");
+ shellProcess.waitFor();
+ stdOutErr.close();
+ destroyShellProcess();
+
+ while (commandIndex < commands.size()) {
+ if (command == null) {
+ command = commands.get(commandIndex);
+ }
+ command.terminated("Unexpected Termination!");
+ commandIndex++;
+ command = null;
+ }
+ }
+
+ /**
+ * Add command to shell queue
+ *
+ * @param command
+ * @return
+ * @throws IOException
+ */
+ public Command add(Command command) throws IOException {
+ if (close)
+ throw new IOException("Unable to add commands to a closed shell");
+ synchronized (commands) {
+ commands.add(command);
+ // set shell on the command object, to know where the command is running on
+ command.addedToShell(this, (commands.size() - 1));
+ commands.notifyAll();
+ }
+
+ return command;
+ }
+
+ /**
+ * Close shell
+ *
+ * @throws IOException
+ */
+ public void close() throws IOException {
+ synchronized (commands) {
+ this.close = true;
+ commands.notifyAll();
+ }
+ }
+
+ /**
+ * Returns number of queued commands
+ *
+ * @return
+ */
+ public int getCommandsSize() {
+ return commands.size();
+ }
+
+}
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/SystemCommands.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/SystemCommands.java
new file mode 100644
index 0000000..355e695
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/SystemCommands.java
@@ -0,0 +1,122 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import android.annotation.TargetApi;
+import android.content.ContentResolver;
+import android.content.Context;
+import android.location.LocationManager;
+import android.os.PowerManager;
+import android.provider.Settings;
+
+/**
+ * This methods work when the apk is installed as a system app (under /system/app)
+ */
+public class SystemCommands {
+ Context context;
+
+ public SystemCommands(Context context) {
+ super();
+ this.context = context;
+ }
+
+ /**
+ * Get GPS status
+ *
+ * @return
+ */
+ public boolean getGPS() {
+ return ((LocationManager) context.getSystemService(Context.LOCATION_SERVICE))
+ .isProviderEnabled(LocationManager.GPS_PROVIDER);
+ }
+
+ /**
+ * Enable/Disable GPS
+ *
+ * @param value
+ */
+ @TargetApi(8)
+ public void setGPS(boolean value) {
+ ContentResolver localContentResolver = context.getContentResolver();
+ Settings.Secure.setLocationProviderEnabled(localContentResolver,
+ LocationManager.GPS_PROVIDER, value);
+ }
+
+ /**
+ * TODO: Not ready yet
+ */
+ @TargetApi(8)
+ public void reboot() {
+ PowerManager pm = (PowerManager) context.getSystemService(Context.POWER_SERVICE);
+ pm.reboot("recovery");
+ pm.reboot(null);
+
+ // not working:
+ // reboot(null);
+ }
+
+ /**
+ * Reboot the device immediately, passing 'reason' (may be null) to the underlying __reboot
+ * system call. Should not return.
+ *
+ * Taken from com.android.server.PowerManagerService.reboot
+ */
+ // public void reboot(String reason) {
+ //
+ // // final String finalReason = reason;
+ // Runnable runnable = new Runnable() {
+ // public void run() {
+ // synchronized (this) {
+ // // ShutdownThread.reboot(mContext, finalReason, false);
+ // try {
+ // Class<?> clazz = Class.forName("com.android.internal.app.ShutdownThread");
+ //
+ // // if (mReboot) {
+ // Method method = clazz.getMethod("reboot", Context.class, String.class,
+ // Boolean.TYPE);
+ // method.invoke(null, context, null, false);
+ //
+ // // if (mReboot) {
+ // // Method method = clazz.getMethod("reboot", Context.class, String.class,
+ // // Boolean.TYPE);
+ // // method.invoke(null, mContext, mReason, mConfirm);
+ // // } else {
+ // // Method method = clazz.getMethod("shutdown", Context.class, Boolean.TYPE);
+ // // method.invoke(null, mContext, mConfirm);
+ // // }
+ // } catch (Exception e) {
+ // e.printStackTrace();
+ // }
+ // }
+ //
+ // }
+ // };
+ // // ShutdownThread must run on a looper capable of displaying the UI.
+ // mHandler.post(runnable);
+ //
+ // // PowerManager.reboot() is documented not to return so just wait for the inevitable.
+ // // synchronized (runnable) {
+ // // while (true) {
+ // // try {
+ // // runnable.wait();
+ // // } catch (InterruptedException e) {
+ // // }
+ // // }
+ // // }
+ // }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Toolbox.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Toolbox.java
new file mode 100644
index 0000000..fe8d2b4
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/Toolbox.java
@@ -0,0 +1,824 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands;
+
+import java.io.File;
+import java.io.FileNotFoundException;
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.concurrent.TimeoutException;
+import java.util.regex.Matcher;
+import java.util.regex.Pattern;
+
+import org.sufficientlysecure.rootcommands.command.ExecutableCommand;
+import org.sufficientlysecure.rootcommands.command.Command;
+import org.sufficientlysecure.rootcommands.command.SimpleCommand;
+import org.sufficientlysecure.rootcommands.util.BrokenBusyboxException;
+import org.sufficientlysecure.rootcommands.util.Log;
+
+import android.os.StatFs;
+import android.os.SystemClock;
+
+/**
+ * All methods in this class are working with Androids toolbox. Toolbox is similar to busybox, but
+ * normally shipped on every Android OS. You can find toolbox commands on
+ * https://github.com/CyanogenMod/android_system_core/tree/ics/toolbox
+ *
+ * This means that these commands are designed to work on every Android OS, with a _working_ toolbox
+ * binary on it. They don't require busybox!
+ *
+ */
+public class Toolbox {
+ private Shell shell;
+
+ /**
+ * All methods in this class are working with Androids toolbox. Toolbox is similar to busybox,
+ * but normally shipped on every Android OS.
+ *
+ * @param shell
+ * where to execute commands on
+ */
+ public Toolbox(Shell shell) {
+ super();
+ this.shell = shell;
+ }
+
+ /**
+ * Checks if user accepted root access
+ *
+ * (commands: id)
+ *
+ * @return true if user has given root access
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public boolean isRootAccessGiven() throws BrokenBusyboxException, TimeoutException, IOException {
+ SimpleCommand idCommand = new SimpleCommand("id");
+ shell.add(idCommand).waitForFinish();
+
+ if (idCommand.getOutput().contains("uid=0")) {
+ return true;
+ } else {
+ return false;
+ }
+ }
+
+ /**
+ * This command class gets all pids to a given process name
+ */
+ private class PsCommand extends Command {
+ private String processName;
+ private ArrayList<String> pids;
+ private String psRegex;
+ private Pattern psPattern;
+
+ public PsCommand(String processName) {
+ super("ps");
+ this.processName = processName;
+ pids = new ArrayList<String>();
+
+ /**
+ * regex to get pid out of ps line, example:
+ *
+ * <pre>
+ * root 24736 1 12140 584 ffffffff 40010d14 S /data/data/org.adaway/files/blank_webserver
+ * ^\\S \\s ([0-9]+) .* processName $
+ * </pre>
+ */
+ psRegex = "^\\S+\\s+([0-9]+).*" + Pattern.quote(processName) + "$";
+ psPattern = Pattern.compile(psRegex);
+ }
+
+ public ArrayList<String> getPids() {
+ return pids;
+ }
+
+ public String getPidsString() {
+ StringBuilder sb = new StringBuilder();
+ for (String s : pids) {
+ sb.append(s);
+ sb.append(" ");
+ }
+
+ return sb.toString();
+ }
+
+ @Override
+ public void output(int id, String line) {
+ // general check if line contains processName
+ if (line.contains(processName)) {
+ Matcher psMatcher = psPattern.matcher(line);
+
+ // try to match line exactly
+ try {
+ if (psMatcher.find()) {
+ String pid = psMatcher.group(1);
+ // add to pids list
+ pids.add(pid);
+ Log.d(RootCommands.TAG, "Found pid: " + pid);
+ } else {
+ Log.d(RootCommands.TAG, "Matching in ps command failed!");
+ }
+ } catch (Exception e) {
+ Log.e(RootCommands.TAG, "Error with regex!", e);
+ }
+ }
+ }
+
+ @Override
+ public void afterExecution(int id, int exitCode) {
+ }
+
+ }
+
+ /**
+ * This method can be used to kill a running process
+ *
+ * (commands: ps, kill)
+ *
+ * @param processName
+ * name of process to kill
+ * @return <code>true</code> if process was found and killed successfully
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public boolean killAll(String processName) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ Log.d(RootCommands.TAG, "Killing process " + processName);
+
+ PsCommand psCommand = new PsCommand(processName);
+ shell.add(psCommand).waitForFinish();
+
+ // kill processes
+ if (!psCommand.getPids().isEmpty()) {
+ // example: kill -9 1234 1222 5343
+ SimpleCommand killCommand = new SimpleCommand("kill -9 "
+ + psCommand.getPidsString());
+ shell.add(killCommand).waitForFinish();
+
+ if (killCommand.getExitCode() == 0) {
+ return true;
+ } else {
+ return false;
+ }
+ } else {
+ Log.d(RootCommands.TAG, "No pid found! Nothing was killed!");
+ return false;
+ }
+ }
+
+ /**
+ * Kill a running executable
+ *
+ * See README for more information how to use your own executables!
+ *
+ * @param executableName
+ * @return
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public boolean killAllExecutable(String executableName) throws BrokenBusyboxException,
+ TimeoutException, IOException {
+ return killAll(ExecutableCommand.EXECUTABLE_PREFIX + executableName + ExecutableCommand.EXECUTABLE_SUFFIX);
+ }
+
+ /**
+ * This method can be used to to check if a process is running
+ *
+ * @param processName
+ * name of process to check
+ * @return <code>true</code> if process was found
+ * @throws IOException
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * (Could not determine if the process is running)
+ */
+ public boolean isProcessRunning(String processName) throws BrokenBusyboxException,
+ TimeoutException, IOException {
+ PsCommand psCommand = new PsCommand(processName);
+ shell.add(psCommand).waitForFinish();
+
+ // if pids are available process is running!
+ if (!psCommand.getPids().isEmpty()) {
+ return true;
+ } else {
+ return false;
+ }
+ }
+
+ /**
+ * Checks if binary is running
+ *
+ * @param binaryName
+ * @return
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public boolean isBinaryRunning(String binaryName) throws BrokenBusyboxException,
+ TimeoutException, IOException {
+ return isProcessRunning(ExecutableCommand.EXECUTABLE_PREFIX + binaryName
+ + ExecutableCommand.EXECUTABLE_SUFFIX);
+ }
+
+ /**
+ * Ls command to get permissions or symlinks
+ */
+ private class LsCommand extends Command {
+ private String fileName;
+ private String permissionRegex;
+ private Pattern permissionPattern;
+ private String symlinkRegex;
+ private Pattern symlinkPattern;
+
+ private String symlink;
+ private String permissions;
+
+ public String getSymlink() {
+ return symlink;
+ }
+
+ public String getPermissions() {
+ return permissions;
+ }
+
+ public LsCommand(String file) {
+ super("ls -l " + file);
+
+ // get only filename:
+ this.fileName = (new File(file)).getName();
+ Log.d(RootCommands.TAG, "fileName: " + fileName);
+
+ /**
+ * regex to get pid out of ps line, example:
+ *
+ * <pre>
+ * with busybox:
+ * lrwxrwxrwx 1 root root 15 Aug 13 12:14 dev/stdin -> /proc/self/fd/0
+ *
+ * with toolbox:
+ * lrwxrwxrwx root root 15 Aug 13 12:14 stdin -> /proc/self/fd/0
+ *
+ * Regex:
+ * ^.*?(\\S{10}) .* $
+ * </pre>
+ */
+ permissionRegex = "^.*?(\\S{10}).*$";
+ permissionPattern = Pattern.compile(permissionRegex);
+
+ /**
+ * regex to get symlink
+ *
+ * <pre>
+ * -> /proc/self/fd/0
+ * ^.*?\\-\\> \\s+ (.*) $
+ * </pre>
+ */
+ symlinkRegex = "^.*?\\-\\>\\s+(.*)$";
+ symlinkPattern = Pattern.compile(symlinkRegex);
+ }
+
+ /**
+ * Converts permission string from ls command to numerical value. Example: -rwxrwxrwx gets
+ * to 777
+ *
+ * @param permissions
+ * @return
+ */
+ private String convertPermissions(String permissions) {
+ int owner = getGroupPermission(permissions.substring(1, 4));
+ int group = getGroupPermission(permissions.substring(4, 7));
+ int world = getGroupPermission(permissions.substring(7, 10));
+
+ return "" + owner + group + world;
+ }
+
+ /**
+ * Calculates permission for one group
+ *
+ * @param permission
+ * @return value of permission string
+ */
+ private int getGroupPermission(String permission) {
+ int value = 0;
+
+ if (permission.charAt(0) == 'r') {
+ value += 4;
+ }
+ if (permission.charAt(1) == 'w') {
+ value += 2;
+ }
+ if (permission.charAt(2) == 'x') {
+ value += 1;
+ }
+
+ return value;
+ }
+
+ @Override
+ public void output(int id, String line) {
+ // general check if line contains file
+ if (line.contains(fileName)) {
+
+ // try to match line exactly
+ try {
+ Matcher permissionMatcher = permissionPattern.matcher(line);
+ if (permissionMatcher.find()) {
+ permissions = convertPermissions(permissionMatcher.group(1));
+
+ Log.d(RootCommands.TAG, "Found permissions: " + permissions);
+ } else {
+ Log.d(RootCommands.TAG, "Permissions were not found in ls command!");
+ }
+
+ // try to parse for symlink
+ Matcher symlinkMatcher = symlinkPattern.matcher(line);
+ if (symlinkMatcher.find()) {
+ /*
+ * TODO: If symlink points to a file in the same directory the path is not
+ * absolute!!!
+ */
+ symlink = symlinkMatcher.group(1);
+ Log.d(RootCommands.TAG, "Symlink found: " + symlink);
+ } else {
+ Log.d(RootCommands.TAG, "No symlink found!");
+ }
+ } catch (Exception e) {
+ Log.e(RootCommands.TAG, "Error with regex!", e);
+ }
+ }
+ }
+
+ @Override
+ public void afterExecution(int id, int exitCode) {
+ }
+
+ }
+
+ /**
+ * @param file
+ * String that represent the file, including the full path to the file and its name.
+ * @param followSymlinks
+ * @return File permissions as String, for example: 777, returns null on error
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ *
+ */
+ public String getFilePermissions(String file) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ Log.d(RootCommands.TAG, "Checking permissions for " + file);
+
+ String permissions = null;
+
+ if (fileExists(file)) {
+ Log.d(RootCommands.TAG, file + " was found.");
+
+ LsCommand lsCommand = new LsCommand(file);
+ shell.add(lsCommand).waitForFinish();
+
+ permissions = lsCommand.getPermissions();
+ }
+
+ return permissions;
+ }
+
+ /**
+ * Sets permission of file
+ *
+ * @param file
+ * absolute path to file
+ * @param permissions
+ * String like 777
+ * @return true if command worked
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public boolean setFilePermissions(String file, String permissions)
+ throws BrokenBusyboxException, TimeoutException, IOException {
+ Log.d(RootCommands.TAG, "Set permissions of " + file + " to " + permissions);
+
+ SimpleCommand chmodCommand = new SimpleCommand("chmod " + permissions + " " + file);
+ shell.add(chmodCommand).waitForFinish();
+
+ if (chmodCommand.getExitCode() == 0) {
+ return true;
+ } else {
+ return false;
+ }
+ }
+
+ /**
+ * This will return a String that represent the symlink for a specified file.
+ *
+ * @param file
+ * The path to the file to get the Symlink for. (must have absolute path)
+ *
+ * @return A String that represent the symlink for a specified file or null if no symlink
+ * exists.
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public String getSymlink(String file) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ Log.d(RootCommands.TAG, "Find symlink for " + file);
+
+ String symlink = null;
+
+ LsCommand lsCommand = new LsCommand(file);
+ shell.add(lsCommand).waitForFinish();
+
+ symlink = lsCommand.getSymlink();
+
+ return symlink;
+ }
+
+ /**
+ * Copys a file to a destination. Because cp is not available on all android devices, we use dd
+ * or cat.
+ *
+ * @param source
+ * example: /data/data/org.adaway/files/hosts
+ * @param destination
+ * example: /system/etc/hosts
+ * @param remountAsRw
+ * remounts the destination as read/write before writing to it
+ * @param preserveFileAttributes
+ * tries to copy file attributes from source to destination, if only cat is available
+ * only permissions are preserved
+ * @return true if it was successfully copied
+ * @throws BrokenBusyboxException
+ * @throws IOException
+ * @throws TimeoutException
+ */
+ public boolean copyFile(String source, String destination, boolean remountAsRw,
+ boolean preservePermissions) throws BrokenBusyboxException, IOException,
+ TimeoutException {
+
+ /*
+ * dd can only copy files, but we can not check if the source is a file without invoking
+ * shell commands, because from Java we probably have no read access, thus we only check if
+ * they are ending with trailing slashes
+ */
+ if (source.endsWith("/") || destination.endsWith("/")) {
+ throw new FileNotFoundException("dd can only copy files!");
+ }
+
+ // remount destination as read/write before copying to it
+ if (remountAsRw) {
+ if (!remount(destination, "RW")) {
+ Log.d(RootCommands.TAG,
+ "Remounting failed! There is probably no need to remount this partition!");
+ }
+ }
+
+ // get permissions of source before overwriting
+ String permissions = null;
+ if (preservePermissions) {
+ permissions = getFilePermissions(source);
+ }
+
+ boolean commandSuccess = false;
+
+ SimpleCommand ddCommand = new SimpleCommand("dd if=" + source + " of="
+ + destination);
+ shell.add(ddCommand).waitForFinish();
+
+ if (ddCommand.getExitCode() == 0) {
+ commandSuccess = true;
+ } else {
+ // try cat if dd fails
+ SimpleCommand catCommand = new SimpleCommand("cat " + source + " > "
+ + destination);
+ shell.add(catCommand).waitForFinish();
+
+ if (catCommand.getExitCode() == 0) {
+ commandSuccess = true;
+ }
+ }
+
+ // set back permissions from source to destination
+ if (preservePermissions) {
+ setFilePermissions(destination, permissions);
+ }
+
+ // remount destination back to read only
+ if (remountAsRw) {
+ if (!remount(destination, "RO")) {
+ Log.d(RootCommands.TAG,
+ "Remounting failed! There is probably no need to remount this partition!");
+ }
+ }
+
+ return commandSuccess;
+ }
+
+ public static final int REBOOT_HOTREBOOT = 1;
+ public static final int REBOOT_REBOOT = 2;
+ public static final int REBOOT_SHUTDOWN = 3;
+ public static final int REBOOT_RECOVERY = 4;
+
+ /**
+ * Shutdown or reboot device. Possible actions are REBOOT_HOTREBOOT, REBOOT_REBOOT,
+ * REBOOT_SHUTDOWN, REBOOT_RECOVERY
+ *
+ * @param action
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public void reboot(int action) throws BrokenBusyboxException, TimeoutException, IOException {
+ if (action == REBOOT_HOTREBOOT) {
+ killAll("system_server");
+ // or: killAll("zygote");
+ } else {
+ String command;
+ switch (action) {
+ case REBOOT_REBOOT:
+ command = "reboot";
+ break;
+ case REBOOT_SHUTDOWN:
+ command = "reboot -p";
+ break;
+ case REBOOT_RECOVERY:
+ command = "reboot recovery";
+ break;
+ default:
+ command = "reboot";
+ break;
+ }
+
+ SimpleCommand rebootCommand = new SimpleCommand(command);
+ shell.add(rebootCommand).waitForFinish();
+
+ if (rebootCommand.getExitCode() == -1) {
+ Log.e(RootCommands.TAG, "Reboot failed!");
+ }
+ }
+ }
+
+ /**
+ * This command checks if a file exists
+ */
+ private class FileExistsCommand extends Command {
+ private String file;
+ private boolean fileExists = false;
+
+ public FileExistsCommand(String file) {
+ super("ls " + file);
+ this.file = file;
+ }
+
+ public boolean isFileExists() {
+ return fileExists;
+ }
+
+ @Override
+ public void output(int id, String line) {
+ if (line.trim().equals(file)) {
+ fileExists = true;
+ }
+ }
+
+ @Override
+ public void afterExecution(int id, int exitCode) {
+ }
+
+ }
+
+ /**
+ * Use this to check whether or not a file exists on the filesystem.
+ *
+ * @param file
+ * String that represent the file, including the full path to the file and its name.
+ *
+ * @return a boolean that will indicate whether or not the file exists.
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ *
+ */
+ public boolean fileExists(String file) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ FileExistsCommand fileExistsCommand = new FileExistsCommand(file);
+ shell.add(fileExistsCommand).waitForFinish();
+
+ if (fileExistsCommand.isFileExists()) {
+ return true;
+ } else {
+ return false;
+ }
+ }
+
+ public abstract class WithPermissions {
+ abstract void whileHavingPermissions();
+ }
+
+ /**
+ * Execute user defined Java code while having temporary permissions on a file
+ *
+ * @param file
+ * @param withPermissions
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public void withPermission(String file, String permission, WithPermissions withPermissions)
+ throws BrokenBusyboxException, TimeoutException, IOException {
+ String oldPermissions = getFilePermissions(file);
+
+ // set permissions (If set to 666, then Dalvik VM can also write to that file!)
+ setFilePermissions(file, permission);
+
+ // execute user defined code
+ withPermissions.whileHavingPermissions();
+
+ // set back to old permissions
+ setFilePermissions(file, oldPermissions);
+ }
+
+ /**
+ * Execute user defined Java code while having temporary write permissions on a file using chmod
+ * 666
+ *
+ * @param file
+ * @param withWritePermissions
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public void withWritePermissions(String file, WithPermissions withWritePermissions)
+ throws BrokenBusyboxException, TimeoutException, IOException {
+ withPermission(file, "666", withWritePermissions);
+ }
+
+ /**
+ * Sets system clock using /dev/alarm
+ *
+ * @param millis
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public void setSystemClock(final long millis) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ withWritePermissions("/dev/alarm", new WithPermissions() {
+
+ @Override
+ void whileHavingPermissions() {
+ SystemClock.setCurrentTimeMillis(millis);
+ }
+ });
+ }
+
+ /**
+ * Adjust system clock by offset using /dev/alarm
+ *
+ * @param offset
+ * @throws BrokenBusyboxException
+ * @throws TimeoutException
+ * @throws IOException
+ */
+ public void adjustSystemClock(final long offset) throws BrokenBusyboxException,
+ TimeoutException, IOException {
+ withWritePermissions("/dev/alarm", new WithPermissions() {
+
+ @Override
+ void whileHavingPermissions() {
+ SystemClock.setCurrentTimeMillis(System.currentTimeMillis() + offset);
+ }
+ });
+ }
+
+ /**
+ * This will take a path, which can contain the file name as well, and attempt to remount the
+ * underlying partition.
+ *
+ * For example, passing in the following string:
+ * "/system/bin/some/directory/that/really/would/never/exist" will result in /system ultimately
+ * being remounted. However, keep in mind that the longer the path you supply, the more work
+ * this has to do, and the slower it will run.
+ *
+ * @param file
+ * file path
+ * @param mountType
+ * mount type: pass in RO (Read only) or RW (Read Write)
+ * @return a <code>boolean</code> which indicates whether or not the partition has been
+ * remounted as specified.
+ */
+ public boolean remount(String file, String mountType) {
+ // Recieved a request, get an instance of Remounter
+ Remounter remounter = new Remounter(shell);
+ // send the request
+ return (remounter.remount(file, mountType));
+ }
+
+ /**
+ * This will tell you how the specified mount is mounted. rw, ro, etc...
+ *
+ * @param The
+ * mount you want to check
+ *
+ * @return <code>String</code> What the mount is mounted as.
+ * @throws Exception
+ * if we cannot determine how the mount is mounted.
+ */
+ public String getMountedAs(String path) throws Exception {
+ ArrayList<Mount> mounts = Remounter.getMounts();
+ if (mounts != null) {
+ for (Mount mount : mounts) {
+ if (path.contains(mount.getMountPoint().getAbsolutePath())) {
+ Log.d(RootCommands.TAG, (String) mount.getFlags().toArray()[0]);
+ return (String) mount.getFlags().toArray()[0];
+ }
+ }
+
+ throw new Exception();
+ } else {
+ throw new Exception();
+ }
+ }
+
+ /**
+ * Check if there is enough space on partition where target is located
+ *
+ * @param size
+ * size of file to put on partition
+ * @param target
+ * path where to put the file
+ *
+ * @return true if it will fit on partition of target, false if it will not fit.
+ */
+ public boolean hasEnoughSpaceOnPartition(String target, long size) {
+ try {
+ // new File(target).getFreeSpace() (API 9) is not working on data partition
+
+ // get directory without file
+ String directory = new File(target).getParent().toString();
+
+ StatFs stat = new StatFs(directory);
+ long blockSize = stat.getBlockSize();
+ long availableBlocks = stat.getAvailableBlocks();
+ long availableSpace = availableBlocks * blockSize;
+
+ Log.i(RootCommands.TAG, "Checking for enough space: Target: " + target
+ + ", directory: " + directory + " size: " + size + ", availableSpace: "
+ + availableSpace);
+
+ if (size < availableSpace) {
+ return true;
+ } else {
+ Log.e(RootCommands.TAG, "Not enough space on partition!");
+ return false;
+ }
+ } catch (Exception e) {
+ // if new StatFs(directory) fails catch IllegalArgumentException and just return true as
+ // workaround
+ Log.e(RootCommands.TAG, "Problem while getting available space on partition!", e);
+ return true;
+ }
+ }
+
+ /**
+ * TODO: Not tested!
+ *
+ * @param toggle
+ * @throws IOException
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public void toggleAdbDaemon(boolean toggle) throws BrokenBusyboxException, TimeoutException,
+ IOException {
+ SimpleCommand disableAdb = new SimpleCommand("setprop persist.service.adb.enable 0",
+ "stop adbd");
+ SimpleCommand enableAdb = new SimpleCommand("setprop persist.service.adb.enable 1",
+ "stop adbd", "sleep 1", "start adbd");
+
+ if (toggle) {
+ shell.add(enableAdb).waitForFinish();
+ } else {
+ shell.add(disableAdb).waitForFinish();
+ }
+ }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/Command.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/Command.java
new file mode 100644
index 0000000..33e0f19
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/Command.java
@@ -0,0 +1,170 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks, Jeremy Lakeman (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.command;
+
+import java.io.IOException;
+import java.io.OutputStream;
+import java.util.concurrent.TimeoutException;
+
+import org.sufficientlysecure.rootcommands.RootCommands;
+import org.sufficientlysecure.rootcommands.Shell;
+import org.sufficientlysecure.rootcommands.util.BrokenBusyboxException;
+import org.sufficientlysecure.rootcommands.util.Log;
+
+public abstract class Command {
+ final String command[];
+ boolean finished = false;
+ boolean brokenBusyboxDetected = false;
+ int exitCode;
+ int id;
+ int timeout = RootCommands.DEFAULT_TIMEOUT;
+ Shell shell = null;
+
+ public Command(String... command) {
+ this.command = command;
+ }
+
+ public Command(int timeout, String... command) {
+ this.command = command;
+ this.timeout = timeout;
+ }
+
+ /**
+ * This is called from Shell after adding it
+ *
+ * @param shell
+ * @param id
+ */
+ public void addedToShell(Shell shell, int id) {
+ this.shell = shell;
+ this.id = id;
+ }
+
+ /**
+ * Gets command string executed on the shell
+ *
+ * @return
+ */
+ public String getCommand() {
+ StringBuilder sb = new StringBuilder();
+ for (int i = 0; i < command.length; i++) {
+ // redirect stderr to stdout
+ sb.append(command[i] + " 2>&1");
+ sb.append('\n');
+ }
+ Log.d(RootCommands.TAG, "Sending command(s): " + sb.toString());
+ return sb.toString();
+ }
+
+ public void writeCommand(OutputStream out) throws IOException {
+ out.write(getCommand().getBytes());
+ }
+
+ public void processOutput(String line) {
+ Log.d(RootCommands.TAG, "ID: " + id + ", Output: " + line);
+
+ /*
+ * Try to detect broken toolbox/busybox binaries (see
+ * https://code.google.com/p/busybox-android/issues/detail?id=1)
+ *
+ * It is giving "Value too large for defined data type" on certain file operations (e.g. ls
+ * and chown) in certain directories (e.g. /data/data)
+ */
+ if (line.contains("Value too large for defined data type")) {
+ Log.e(RootCommands.TAG, "Busybox is broken with high probability due to line: " + line);
+ brokenBusyboxDetected = true;
+ }
+
+ // now execute specific output parsing
+ output(id, line);
+ }
+
+ public abstract void output(int id, String line);
+
+ public void processAfterExecution(int exitCode) {
+ Log.d(RootCommands.TAG, "ID: " + id + ", ExitCode: " + exitCode);
+
+ afterExecution(id, exitCode);
+ }
+
+ public abstract void afterExecution(int id, int exitCode);
+
+ public void commandFinished(int id) {
+ Log.d(RootCommands.TAG, "Command " + id + " finished.");
+ }
+
+ public void setExitCode(int code) {
+ synchronized (this) {
+ exitCode = code;
+ finished = true;
+ commandFinished(id);
+ this.notifyAll();
+ }
+ }
+
+ /**
+ * Close the shell
+ *
+ * @param reason
+ */
+ public void terminate(String reason) {
+ try {
+ shell.close();
+ Log.d(RootCommands.TAG, "Terminating the shell.");
+ terminated(reason);
+ } catch (IOException e) {
+ }
+ }
+
+ public void terminated(String reason) {
+ setExitCode(-1);
+ Log.d(RootCommands.TAG, "Command " + id + " did not finish, because of " + reason);
+ }
+
+ /**
+ * Waits for this command to finish and forwards exitCode into afterExecution method
+ *
+ * @param timeout
+ * @throws TimeoutException
+ * @throws BrokenBusyboxException
+ */
+ public void waitForFinish() throws TimeoutException, BrokenBusyboxException {
+ synchronized (this) {
+ while (!finished) {
+ try {
+ this.wait(timeout);
+ } catch (InterruptedException e) {
+ Log.e(RootCommands.TAG, "InterruptedException in waitForFinish()", e);
+ }
+
+ if (!finished) {
+ finished = true;
+ terminate("Timeout");
+ throw new TimeoutException("Timeout has occurred.");
+ }
+ }
+
+ if (brokenBusyboxDetected) {
+ throw new BrokenBusyboxException();
+ }
+
+ processAfterExecution(exitCode);
+ }
+ }
+
+}
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/ExecutableCommand.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/ExecutableCommand.java
new file mode 100644
index 0000000..d6c8e61
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/ExecutableCommand.java
@@ -0,0 +1,65 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.command;
+
+import java.io.File;
+
+import android.annotation.SuppressLint;
+import android.content.Context;
+import android.os.Build;
+
+public abstract class ExecutableCommand extends Command {
+ public static final String EXECUTABLE_PREFIX = "lib";
+ public static final String EXECUTABLE_SUFFIX = "_exec.so";
+
+ /**
+ * This class provides a way to use your own binaries!
+ *
+ * Include your own executables, renamed from * to lib*_exec.so, in your libs folder under the
+ * architecture directories. Now they will be deployed by Android the same way libraries are
+ * deployed!
+ *
+ * See README for more information how to use your own executables!
+ *
+ * @param context
+ * @param executableName
+ * @param parameters
+ */
+ public ExecutableCommand(Context context, String executableName, String parameters) {
+ super(getLibDirectory(context) + File.separator + EXECUTABLE_PREFIX + executableName
+ + EXECUTABLE_SUFFIX + " " + parameters);
+ }
+
+ /**
+ * Get full path to lib directory of app
+ *
+ * @return dir as String
+ */
+ @SuppressLint("NewApi")
+ private static String getLibDirectory(Context context) {
+ if (Build.VERSION.SDK_INT >= 9) {
+ return context.getApplicationInfo().nativeLibraryDir;
+ } else {
+ return context.getApplicationInfo().dataDir + File.separator + "lib";
+ }
+ }
+
+ public abstract void output(int id, String line);
+
+ public abstract void afterExecution(int id, int exitCode);
+
+}
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleCommand.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleCommand.java
new file mode 100644
index 0000000..9049040
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleCommand.java
@@ -0,0 +1,43 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.command;
+
+public class SimpleCommand extends Command {
+ private StringBuilder sb = new StringBuilder();
+
+ public SimpleCommand(String... command) {
+ super(command);
+ }
+
+ @Override
+ public void output(int id, String line) {
+ sb.append(line).append('\n');
+ }
+
+ @Override
+ public void afterExecution(int id, int exitCode) {
+ }
+
+ public String getOutput() {
+ return sb.toString();
+ }
+
+ public int getExitCode() {
+ return exitCode;
+ }
+
+}
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleExecutableCommand.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleExecutableCommand.java
new file mode 100644
index 0000000..95d2fae
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/command/SimpleExecutableCommand.java
@@ -0,0 +1,45 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.command;
+
+import android.content.Context;
+
+public class SimpleExecutableCommand extends ExecutableCommand {
+ private StringBuilder sb = new StringBuilder();
+
+ public SimpleExecutableCommand(Context context, String executableName, String parameters) {
+ super(context, executableName, parameters);
+ }
+
+ @Override
+ public void output(int id, String line) {
+ sb.append(line).append('\n');
+ }
+
+ @Override
+ public void afterExecution(int id, int exitCode) {
+ }
+
+ public String getOutput() {
+ return sb.toString();
+ }
+
+ public int getExitCode() {
+ return exitCode;
+ }
+
+}
\ No newline at end of file
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/BrokenBusyboxException.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/BrokenBusyboxException.java
new file mode 100644
index 0000000..e982b24
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/BrokenBusyboxException.java
@@ -0,0 +1,32 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.util;
+
+import java.io.IOException;
+
+public class BrokenBusyboxException extends IOException {
+ private static final long serialVersionUID = 8337358201589488409L;
+
+ public BrokenBusyboxException() {
+ super();
+ }
+
+ public BrokenBusyboxException(String detailMessage) {
+ super(detailMessage);
+ }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Log.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Log.java
new file mode 100644
index 0000000..a25fbf4
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Log.java
@@ -0,0 +1,83 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.util;
+
+import org.sufficientlysecure.rootcommands.RootCommands;
+
+/**
+ * Wraps Android Logging to enable or disable debug output using Constants
+ *
+ */
+public final class Log {
+
+ public static void v(String tag, String msg) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.v(tag, msg);
+ }
+ }
+
+ public static void v(String tag, String msg, Throwable tr) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.v(tag, msg, tr);
+ }
+ }
+
+ public static void d(String tag, String msg) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.d(tag, msg);
+ }
+ }
+
+ public static void d(String tag, String msg, Throwable tr) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.d(tag, msg, tr);
+ }
+ }
+
+ public static void i(String tag, String msg) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.i(tag, msg);
+ }
+ }
+
+ public static void i(String tag, String msg, Throwable tr) {
+ if (RootCommands.DEBUG) {
+ android.util.Log.i(tag, msg, tr);
+ }
+ }
+
+ public static void w(String tag, String msg) {
+ android.util.Log.w(tag, msg);
+ }
+
+ public static void w(String tag, String msg, Throwable tr) {
+ android.util.Log.w(tag, msg, tr);
+ }
+
+ public static void w(String tag, Throwable tr) {
+ android.util.Log.w(tag, tr);
+ }
+
+ public static void e(String tag, String msg) {
+ android.util.Log.e(tag, msg);
+ }
+
+ public static void e(String tag, String msg, Throwable tr) {
+ android.util.Log.e(tag, msg, tr);
+ }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/RootAccessDeniedException.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/RootAccessDeniedException.java
new file mode 100644
index 0000000..35f353d
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/RootAccessDeniedException.java
@@ -0,0 +1,32 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.util;
+
+import java.io.IOException;
+
+public class RootAccessDeniedException extends IOException {
+ private static final long serialVersionUID = 9088998884166225540L;
+
+ public RootAccessDeniedException() {
+ super();
+ }
+
+ public RootAccessDeniedException(String detailMessage) {
+ super(detailMessage);
+ }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/UnsupportedArchitectureException.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/UnsupportedArchitectureException.java
new file mode 100644
index 0000000..96ad030
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/UnsupportedArchitectureException.java
@@ -0,0 +1,30 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.util;
+
+public class UnsupportedArchitectureException extends Exception {
+ private static final long serialVersionUID = 7826528799780001655L;
+
+ public UnsupportedArchitectureException() {
+ super();
+ }
+
+ public UnsupportedArchitectureException(String detailMessage) {
+ super(detailMessage);
+ }
+
+}
diff --git a/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Utils.java b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Utils.java
new file mode 100644
index 0000000..87f32bb
--- /dev/null
+++ b/RootCommands/src/main/java/org/sufficientlysecure/rootcommands/util/Utils.java
@@ -0,0 +1,105 @@
+/*
+ * Copyright (C) 2012 Dominik Schürmann <dominik(a)dominikschuermann.de>
+ * Copyright (c) 2012 Michael Elsdörfer (Android Autostarts)
+ * Copyright (c) 2012 Stephen Erickson, Chris Ravenscroft, Adam Shanks (RootTools)
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.sufficientlysecure.rootcommands.util;
+
+import java.io.File;
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.Map;
+
+import org.sufficientlysecure.rootcommands.RootCommands;
+
+public class Utils {
+ /*
+ * The emulator and ADP1 device both have a su binary in /system/xbin/su, but it doesn't allow
+ * apps to use it (su app_29 $ su su: uid 10029 not allowed to su).
+ *
+ * Cyanogen used to have su in /system/bin/su, in newer versions it's a symlink to
+ * /system/xbin/su.
+ *
+ * The Archos tablet has it in /data/bin/su, since they don't have write access to /system yet.
+ */
+ static final String[] BinaryPlaces = { "/data/bin/", "/system/bin/", "/system/xbin/", "/sbin/",
+ "/data/local/xbin/", "/data/local/bin/", "/system/sd/xbin/", "/system/bin/failsafe/",
+ "/data/local/" };
+
+ /**
+ * Determine the path of the su executable.
+ *
+ * Code from https://github.com/miracle2k/android-autostarts, use under Apache License was
+ * agreed by Michael Elsdörfer
+ */
+ public static String getSuPath() {
+ for (String p : BinaryPlaces) {
+ File su = new File(p + "su");
+ if (su.exists()) {
+ Log.d(RootCommands.TAG, "su found at: " + p);
+ return su.getAbsolutePath();
+ } else {
+ Log.v(RootCommands.TAG, "No su in: " + p);
+ }
+ }
+ Log.d(RootCommands.TAG, "No su found in a well-known location, " + "will just use \"su\".");
+ return "su";
+ }
+
+ /**
+ * This code is adapted from java.lang.ProcessBuilder.start().
+ *
+ * The problem is that Android doesn't allow us to modify the map returned by
+ * ProcessBuilder.environment(), even though the docstring indicates that it should. This is
+ * because it simply returns the SystemEnvironment object that System.getenv() gives us. The
+ * relevant portion in the source code is marked as "// android changed", so presumably it's not
+ * the case in the original version of the Apache Harmony project.
+ *
+ * Note that simply passing the environment variables we want to Process.exec won't be good
+ * enough, since that would override the environment we inherited completely.
+ *
+ * We needed to be able to set a CLASSPATH environment variable for our new process in order to
+ * use the "app_process" command directly. Note: "app_process" takes arguments passed on to the
+ * Dalvik VM as well; this might be an alternative way to set the class path.
+ *
+ * Code from https://github.com/miracle2k/android-autostarts, use under Apache License was
+ * agreed by Michael Elsdörfer
+ */
+ public static Process runWithEnv(String command, ArrayList<String> customAddedEnv,
+ String baseDirectory) throws IOException {
+
+ Map<String, String> environment = System.getenv();
+ String[] envArray = new String[environment.size()
+ + (customAddedEnv != null ? customAddedEnv.size() : 0)];
+ int i = 0;
+ for (Map.Entry<String, String> entry : environment.entrySet()) {
+ envArray[i++] = entry.getKey() + "=" + entry.getValue();
+ }
+ if (customAddedEnv != null) {
+ for (String entry : customAddedEnv) {
+ envArray[i++] = entry;
+ }
+ }
+
+ Process process;
+ if (baseDirectory == null) {
+ process = Runtime.getRuntime().exec(command, envArray, null);
+ } else {
+ process = Runtime.getRuntime().exec(command, envArray, new File(baseDirectory));
+ }
+ return process;
+ }
+}
diff --git a/orbotservice/build.gradle b/orbotservice/build.gradle
index cfc0a53..62ceffd 100644
--- a/orbotservice/build.gradle
+++ b/orbotservice/build.gradle
@@ -27,6 +27,7 @@ android {
dependencies {
compile project(':jsocksAndroid')
+ compile project(':RootCommands')
compile 'com.android.support:appcompat-v7:23.4.0'
compile fileTree(dir: 'libs', include: ['*.jar','*.so'])
testCompile 'junit:junit:4.12'
diff --git a/orbotservice/src/main/java/org/torproject/android/service/TorService.java b/orbotservice/src/main/java/org/torproject/android/service/TorService.java
index 87d814d..0dab480 100644
--- a/orbotservice/src/main/java/org/torproject/android/service/TorService.java
+++ b/orbotservice/src/main/java/org/torproject/android/service/TorService.java
@@ -35,6 +35,8 @@ import android.text.TextUtils;
import android.util.Log;
import android.widget.RemoteViews;
+import org.sufficientlysecure.rootcommands.Shell;
+import org.sufficientlysecure.rootcommands.command.SimpleCommand;
import org.torproject.android.control.ConfigEntry;
import org.torproject.android.control.TorControlConnection;
import org.torproject.android.service.transproxy.TorTransProxy;
@@ -60,6 +62,7 @@ import java.io.PrintStream;
import java.io.PrintWriter;
import java.net.Socket;
import java.text.Normalizer;
+import java.text.SimpleDateFormat;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Iterator;
@@ -81,7 +84,6 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
private TorControlConnection conn = null;
private Socket torConnSocket = null;
private int mLastProcessId = -1;
- private Process mProcPolipo;
private int mPortHTTP = HTTP_PROXY_PORT_DEFAULT;
private int mPortSOCKS = SOCKS_PROXY_PORT_DEFAULT;
@@ -123,6 +125,8 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
public static File fileXtables;
public static File fileTorRc;
+ private Shell mShell;
+ private Shell mShellPolipo;
public void debug(String msg)
{
@@ -374,6 +378,16 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
public void onDestroy() {
stopTor();
unregisterReceiver(mNetworkStateReceiver);
+
+ try
+ {
+ mShell.close();
+ }
+ catch (IOException ioe)
+ {
+ Log.d(TAG, "Error closing shell",ioe);
+ }
+
super.onDestroy();
}
@@ -500,11 +514,10 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
conn = null;
}
- if (mProcPolipo != null)
+ if (mShellPolipo != null)
{
- mProcPolipo.destroy();
- int exitValue = mProcPolipo.waitFor();
- logNotice("Polipo exited with value: " + exitValue);
+ mShellPolipo.close();
+ //logNotice("Polipo exited with value: " + exitValue);
}
@@ -545,6 +558,8 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
appBinHome = getDir(TorServiceConstants.DIRECTORY_TOR_BINARY, Application.MODE_PRIVATE);
appCacheHome = getDir(TorServiceConstants.DIRECTORY_TOR_DATA,Application.MODE_PRIVATE);
+ mShell = Shell.startShell();
+
fileTor= new File(appBinHome, TorServiceConstants.TOR_ASSET_KEY);
filePolipo = new File(appBinHome, TorServiceConstants.POLIPO_ASSET_KEY);
fileObfsclient = new File(appBinHome, TorServiceConstants.OBFSCLIENT_ASSET_KEY);
@@ -768,32 +783,19 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
{
customEnv.add("TOR_PT_PROXY=socks5://" + OrbotVpnManager.sSocksProxyLocalhost + ":" + OrbotVpnManager.sSocksProxyServerPort);
}
-
- // String baseDirectory = fileTor.getParent();
- // Shell shellUser = Shell.startShell(customEnv, baseDirectory);
-
+
boolean success = runTorShellCmd();
-
- if (success)
- {
- if (mPortHTTP != -1)
- runPolipoShellCmd();
-
- if (Prefs.useRoot() && Prefs.useTransparentProxying())
- {
- disableTransparentProxy();
- enableTransparentProxy();
-
+ if (mPortHTTP != -1)
+ runPolipoShellCmd();
- }
-
- getHiddenServiceHostname ();
- }
- else
- {
- showToolbarNotification(getString(R.string.unable_to_start_tor), ERROR_NOTIFY_ID, R.drawable.ic_stat_notifyerr);
- }
+ if (Prefs.useRoot() && Prefs.useTransparentProxying())
+ {
+ disableTransparentProxy();
+ enableTransparentProxy();
+ }
+
+ getHiddenServiceHostname ();
} catch (Exception e) {
logException("Unable to start Tor: " + e.toString(), e);
@@ -914,14 +916,19 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
mTransProxy = new TorTransProxy(this, fileXtables);
mTransProxy.setTransparentProxyingAll(this, false);
+
ArrayList<TorifiedApp> apps = TorTransProxy.getApps(this, TorServiceUtils.getSharedPrefs(getApplicationContext()));
mTransProxy.setTransparentProxyingByApp(this, apps, false);
-
+
+ mTransProxy.closeShell();
+ mTransProxy = null;
+
return true;
}
private boolean runTorShellCmd() throws Exception
{
+ boolean result = true;
String torrcPath = new File(appBinHome, TORRC_ASSET_KEY).getCanonicalPath();
@@ -936,9 +943,8 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
debug(torCmdString);
- Process proc = exec(torCmdString + " --verify-config", true);
+ int exitCode = exec(torCmdString + " --verify-config", true);
- int exitCode = proc.exitValue();
String output = "";
// String output = shellTorCommand.getOutput();
@@ -949,8 +955,7 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
}
- proc = exec(torCmdString, true);
- exitCode = proc.exitValue();
+ exitCode = exec(torCmdString, true);
output = "";// shellTorCommand.getOutput();
if (exitCode != 0)
@@ -977,7 +982,7 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
}
- return true;
+ return result;
}
@@ -986,14 +991,15 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
mExecutor.execute(runn);
}
- private Process exec (String cmd, boolean wait) throws Exception
+ private int exec (String cmd, boolean wait) throws Exception
{
- Process proc = Runtime.getRuntime().exec(cmd);
+ SimpleCommand command = new SimpleCommand(cmd);
+ mShell.add(command);
if (wait)
- proc.waitFor();
+ command.waitForFinish();
- return proc;
+ return command.getExitCode();
}
private void updatePolipoConfig () throws FileNotFoundException, IOException
@@ -1024,7 +1030,12 @@ public class TorService extends Service implements TorServiceConstants, OrbotCon
String polipoConfigPath = new File(appBinHome, POLIPOCONFIG_ASSET_KEY).getCanonicalPath();
String cmd = (filePolipo.getCanonicalPath() + " -c " + polipoConfigPath);
- mProcPolipo = exec(cmd,false);
+ if (mShellPolipo != null)
+ mShellPolipo.close();
+
+ mShellPolipo = Shell.startShell();
+ SimpleCommand cmdPolipo = new SimpleCommand(cmd);
+ mShellPolipo.add(cmdPolipo);
sendCallbackLogMessage(getString(R.string.privoxy_is_running_on_port_) + mPortHTTP);
diff --git a/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java b/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
index 037868a..da0a4a7 100644
--- a/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
+++ b/orbotservice/src/main/java/org/torproject/android/service/transproxy/TorTransProxy.java
@@ -16,6 +16,8 @@ import android.content.pm.ApplicationInfo;
import android.content.pm.PackageInfo;
import android.content.pm.PackageManager;
+import org.sufficientlysecure.rootcommands.Shell;
+import org.sufficientlysecure.rootcommands.command.SimpleCommand;
import org.torproject.android.service.OrbotConstants;
import org.torproject.android.service.util.Prefs;
import org.torproject.android.service.TorService;
@@ -32,18 +34,15 @@ public class TorTransProxy implements TorServiceConstants {
private int mTransProxyPort = TOR_TRANSPROXY_PORT_DEFAULT;
private int mDNSPort = TOR_DNS_PORT_DEFAULT;
- private Process mProcess = null;
-
- private DataOutputStream mProcessOutput = null;
-
+ private Shell mShell;
public TorTransProxy (TorService torService, File fileXTables) throws IOException
{
mTorService = torService;
mFileXtables = fileXTables;
- mProcess = Runtime.getRuntime().exec("su");
- mProcessOutput = new DataOutputStream(mProcess.getOutputStream());
+ // start root shell
+ mShell = Shell.startRootShell();
}
@@ -562,24 +561,22 @@ public class TorTransProxy implements TorServiceConstants {
private int executeCommand (String cmdString) throws Exception {
- mProcessOutput.writeBytes(cmdString + "\n");
- mProcessOutput.flush();
+ SimpleCommand command = new SimpleCommand(cmdString);
- logMessage(cmdString);
+ mShell.add(command).waitForFinish();
+
+ logMessage("Command Exec: " + cmdString);
+ logMessage("Output: " + command.getOutput());
+ logMessage("Exit code: " + command.getExitCode());
return 0;
}
- public int doExit () throws Exception
+ public void closeShell () throws IOException
{
- mProcessOutput.writeBytes("exit\n");
- mProcessOutput.flush();
-
- return mProcess.waitFor();
-
+ mShell.close();
}
-
-
+
public int enableTetheringRules (Context context) throws Exception
{
@@ -800,7 +797,8 @@ public class TorTransProxy implements TorServiceConstants {
executeCommand (script.toString());
script = new StringBuilder();
-
+
+ /**
if (Prefs.useDebugLogging())
{
//XXX: Comment the following rules for non-debug builds
@@ -827,8 +825,8 @@ public class TorTransProxy implements TorServiceConstants {
executeCommand (script.toString());
script = new StringBuilder();
-
- }
+
+ }**/
//allow access to transproxy port
script.append(ipTablesPath);
diff --git a/settings.gradle b/settings.gradle
index 9984a03..7453139 100644
--- a/settings.gradle
+++ b/settings.gradle
@@ -1,2 +1,2 @@
-include ':jsocksAndroid', ':orbotservice'
+include ':jsocksAndroid', ':orbotservice', ':RootCommands'
include ':app'
1
0
commit 0d00c064509d008be3ebdc88f30cab48cb5dfaab
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Wed Nov 2 13:48:52 2016 -0400
update changelog for rc3
---
CHANGELOG | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/CHANGELOG b/CHANGELOG
index 260ae9c..5a7dd19 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,5 +1,17 @@
NOTE: Specific #s below correspond to Trac tickets logged and maintained at https://trac.torproject.org/projects/tor/
+/** 15.2.0 RC 3 / 2 November 2016 / 354ce24283790ef72601d3a512e2d16f34aeba91 **/
+
+41c9d2c lock in app item list row height
+52e7ad3 add RootCommands library back in for shell and root shell exec
+af69041 remove old superuser-commands
+5d52f04 update to 15.2.0-RC-2
+dacf2ef cleanup resources and unused drawables
+d25b3d5 tweak root preferences
+4d66133 remove unused files
+ef57341 re-enabled root permission request and shell
+f463887 quick fixes for app UI and VPN dialog
+
/** 15.2.0 RC 1 / 28 October 2016/ 9077bd236df388cd14727252d0be676d39b841e5 **/
9077bd2 update to 15.2.0-RC-1 and SDK min of 16
1
0
commit dacf2ef9f503ffb672b31c849265c098a1cdfb68
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Sat Oct 29 11:42:27 2016 -0400
cleanup resources and unused drawables
---
orbotservice/src/main/res/drawable/button.xml | 37 ---------------------
orbotservice/src/main/res/drawable/button_off.xml | 37 ---------------------
orbotservice/src/main/res/drawable/button_on.xml | 35 -------------------
.../src/main/res/drawable/classyfabric.png | Bin 8856 -> 0 bytes
orbotservice/src/main/res/drawable/error.png | Bin 2922 -> 0 bytes
.../src/main/res/drawable/ic_chatsecure.png | Bin 4013 -> 0 bytes
.../src/main/res/drawable/ic_duckduckgo.png | Bin 5042 -> 0 bytes
orbotservice/src/main/res/drawable/ic_launcher.png | Bin 6055 -> 0 bytes
.../src/main/res/drawable/ic_menu_about.png | Bin 1771 -> 0 bytes
.../src/main/res/drawable/ic_menu_exit.png | Bin 2693 -> 0 bytes
.../src/main/res/drawable/ic_menu_goto.png | Bin 1636 -> 0 bytes
orbotservice/src/main/res/drawable/ic_play.png | Bin 3560 -> 0 bytes
.../src/main/res/drawable/ic_stat_tor_off.png | Bin 744 -> 0 bytes
.../src/main/res/drawable/ic_stat_tor_xfer.png | Bin 600 -> 0 bytes
orbotservice/src/main/res/drawable/ic_twitter.png | Bin 2797 -> 0 bytes
orbotservice/src/main/res/drawable/icon_martus.png | Bin 6763 -> 0 bytes
orbotservice/src/main/res/drawable/icon_orfox.png | Bin 7617 -> 0 bytes
.../src/main/res/drawable/icon_story_maker.png | Bin 4290 -> 0 bytes
orbotservice/src/main/res/drawable/inverse.png | Bin 1027 -> 0 bytes
orbotservice/src/main/res/drawable/n8fr8.jpg | Bin 18062 -> 0 bytes
orbotservice/src/main/res/drawable/oldtoroff.png | Bin 63700 -> 0 bytes
orbotservice/src/main/res/drawable/oldtoron.png | Bin 121036 -> 0 bytes
.../src/main/res/drawable/oldtorstarting.png | Bin 111753 -> 0 bytes
orbotservice/src/main/res/drawable/onion32.png | Bin 1599 -> 0 bytes
orbotservice/src/main/res/drawable/tilebg.xml | 4 ---
orbotservice/src/main/res/drawable/toggle.xml | 8 -----
orbotservice/src/main/res/drawable/tor.png | Bin 4766 -> 0 bytes
orbotservice/src/main/res/drawable/tor25.png | Bin 2227 -> 0 bytes
orbotservice/src/main/res/drawable/toroff.png | Bin 39556 -> 0 bytes
orbotservice/src/main/res/drawable/toron.png | Bin 47022 -> 0 bytes
orbotservice/src/main/res/drawable/torstarting.png | Bin 41700 -> 0 bytes
orbotservice/src/main/res/values/styles.xml | 5 +++
32 files changed, 5 insertions(+), 121 deletions(-)
diff --git a/orbotservice/src/main/res/drawable/button.xml b/orbotservice/src/main/res/drawable/button.xml
deleted file mode 100644
index 9f44d24..0000000
--- a/orbotservice/src/main/res/drawable/button.xml
+++ /dev/null
@@ -1,37 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-<selector xmlns:android="http://schemas.android.com/apk/res/android">
- <item android:state_pressed="true" >
- <shape>
- <solid
- android:color="@color/panel_background" />
- <stroke
- android:width="1dp"
- android:color="#ffffff" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
- <item>
- <shape>
- <gradient
- android:startColor="@color/panel_background_dark"
- android:endColor="@color/panel_background_main"
- android:angle="270" />
- <stroke
- android:width="2dp"
- android:color="#aaaaaa" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
-</selector>
\ No newline at end of file
diff --git a/orbotservice/src/main/res/drawable/button_off.xml b/orbotservice/src/main/res/drawable/button_off.xml
deleted file mode 100644
index 1304d1b..0000000
--- a/orbotservice/src/main/res/drawable/button_off.xml
+++ /dev/null
@@ -1,37 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-<selector xmlns:android="http://schemas.android.com/apk/res/android">
- <item android:state_pressed="true" >
- <shape>
- <solid
- android:color="@color/panel_background" />
- <stroke
- android:width="1dp"
- android:color="#ffffff" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
- <item>
- <shape>
- <gradient
- android:startColor="@color/panel_background_dark"
- android:endColor="@color/panel_background_main"
- android:angle="270" />
- <stroke
- android:width="2dp"
- android:color="#555555" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
-</selector>
\ No newline at end of file
diff --git a/orbotservice/src/main/res/drawable/button_on.xml b/orbotservice/src/main/res/drawable/button_on.xml
deleted file mode 100644
index 27dc092..0000000
--- a/orbotservice/src/main/res/drawable/button_on.xml
+++ /dev/null
@@ -1,35 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-<selector xmlns:android="http://schemas.android.com/apk/res/android">
- <item android:state_pressed="true" >
- <shape>
- <solid
- android:color="@color/bright_green" />
- <stroke
- android:width="1dp"
- android:color="#ffffff" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
- <item>
- <shape>
- <solid
- android:color="@color/dark_green" />
- <stroke
- android:width="1dp"
- android:color="#ffffff" />
- <corners
- android:radius="6dp" />
- <padding
- android:left="10dp"
- android:top="10dp"
- android:right="10dp"
- android:bottom="10dp" />
- </shape>
- </item>
-</selector>
\ No newline at end of file
diff --git a/orbotservice/src/main/res/drawable/classyfabric.png b/orbotservice/src/main/res/drawable/classyfabric.png
deleted file mode 100644
index ca3d267..0000000
Binary files a/orbotservice/src/main/res/drawable/classyfabric.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/error.png b/orbotservice/src/main/res/drawable/error.png
deleted file mode 100644
index 42dc6d6..0000000
Binary files a/orbotservice/src/main/res/drawable/error.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_chatsecure.png b/orbotservice/src/main/res/drawable/ic_chatsecure.png
deleted file mode 100644
index aaddd88..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_chatsecure.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_duckduckgo.png b/orbotservice/src/main/res/drawable/ic_duckduckgo.png
deleted file mode 100644
index 696dcd6..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_duckduckgo.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_launcher.png b/orbotservice/src/main/res/drawable/ic_launcher.png
deleted file mode 100644
index ea47373..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_launcher.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_menu_about.png b/orbotservice/src/main/res/drawable/ic_menu_about.png
deleted file mode 100644
index 866d4e0..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_menu_about.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_menu_exit.png b/orbotservice/src/main/res/drawable/ic_menu_exit.png
deleted file mode 100644
index d301ea6..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_menu_exit.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_menu_goto.png b/orbotservice/src/main/res/drawable/ic_menu_goto.png
deleted file mode 100644
index 40183eb..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_menu_goto.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_play.png b/orbotservice/src/main/res/drawable/ic_play.png
deleted file mode 100644
index a919794..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_play.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_stat_tor_off.png b/orbotservice/src/main/res/drawable/ic_stat_tor_off.png
deleted file mode 100644
index 6df646e..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_stat_tor_off.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_stat_tor_xfer.png b/orbotservice/src/main/res/drawable/ic_stat_tor_xfer.png
deleted file mode 100644
index 73ab233..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_stat_tor_xfer.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/ic_twitter.png b/orbotservice/src/main/res/drawable/ic_twitter.png
deleted file mode 100644
index 1e61c0a..0000000
Binary files a/orbotservice/src/main/res/drawable/ic_twitter.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/icon_martus.png b/orbotservice/src/main/res/drawable/icon_martus.png
deleted file mode 100644
index e72db19..0000000
Binary files a/orbotservice/src/main/res/drawable/icon_martus.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/icon_orfox.png b/orbotservice/src/main/res/drawable/icon_orfox.png
deleted file mode 100644
index 57ed1f0..0000000
Binary files a/orbotservice/src/main/res/drawable/icon_orfox.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/icon_story_maker.png b/orbotservice/src/main/res/drawable/icon_story_maker.png
deleted file mode 100644
index 9c54ca5..0000000
Binary files a/orbotservice/src/main/res/drawable/icon_story_maker.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/inverse.png b/orbotservice/src/main/res/drawable/inverse.png
deleted file mode 100644
index 65eff2c..0000000
Binary files a/orbotservice/src/main/res/drawable/inverse.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/n8fr8.jpg b/orbotservice/src/main/res/drawable/n8fr8.jpg
deleted file mode 100644
index 4939d5c..0000000
Binary files a/orbotservice/src/main/res/drawable/n8fr8.jpg and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/oldtoroff.png b/orbotservice/src/main/res/drawable/oldtoroff.png
deleted file mode 100644
index 4b23e0b..0000000
Binary files a/orbotservice/src/main/res/drawable/oldtoroff.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/oldtoron.png b/orbotservice/src/main/res/drawable/oldtoron.png
deleted file mode 100644
index a99bec1..0000000
Binary files a/orbotservice/src/main/res/drawable/oldtoron.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/oldtorstarting.png b/orbotservice/src/main/res/drawable/oldtorstarting.png
deleted file mode 100644
index a56844a..0000000
Binary files a/orbotservice/src/main/res/drawable/oldtorstarting.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/onion32.png b/orbotservice/src/main/res/drawable/onion32.png
deleted file mode 100644
index 7846760..0000000
Binary files a/orbotservice/src/main/res/drawable/onion32.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/tilebg.xml b/orbotservice/src/main/res/drawable/tilebg.xml
deleted file mode 100644
index 6f0d2a3..0000000
--- a/orbotservice/src/main/res/drawable/tilebg.xml
+++ /dev/null
@@ -1,4 +0,0 @@
-<?xml version="1.0" encoding="utf-8"?>
-<bitmap xmlns:android="http://schemas.android.com/apk/res/android"
- android:src="@drawable/classyfabric"
- android:tileMode="repeat" />
\ No newline at end of file
diff --git a/orbotservice/src/main/res/drawable/toggle.xml b/orbotservice/src/main/res/drawable/toggle.xml
deleted file mode 100644
index 0f9a36e..0000000
--- a/orbotservice/src/main/res/drawable/toggle.xml
+++ /dev/null
@@ -1,8 +0,0 @@
-<selector xmlns:android="http://schemas.android.com/apk/res/android">
- <item
- android:state_checked="false"
- android:drawable="@drawable/button_off" />
- <item
- android:state_checked="true"
- android:drawable="@drawable/button_on" />
-</selector>
\ No newline at end of file
diff --git a/orbotservice/src/main/res/drawable/tor.png b/orbotservice/src/main/res/drawable/tor.png
deleted file mode 100644
index 0d63dd9..0000000
Binary files a/orbotservice/src/main/res/drawable/tor.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/tor25.png b/orbotservice/src/main/res/drawable/tor25.png
deleted file mode 100644
index 20b7666..0000000
Binary files a/orbotservice/src/main/res/drawable/tor25.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/toroff.png b/orbotservice/src/main/res/drawable/toroff.png
deleted file mode 100644
index a72790b..0000000
Binary files a/orbotservice/src/main/res/drawable/toroff.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/toron.png b/orbotservice/src/main/res/drawable/toron.png
deleted file mode 100644
index e3592b1..0000000
Binary files a/orbotservice/src/main/res/drawable/toron.png and /dev/null differ
diff --git a/orbotservice/src/main/res/drawable/torstarting.png b/orbotservice/src/main/res/drawable/torstarting.png
deleted file mode 100644
index 6e84a6f..0000000
Binary files a/orbotservice/src/main/res/drawable/torstarting.png and /dev/null differ
diff --git a/orbotservice/src/main/res/values/styles.xml b/orbotservice/src/main/res/values/styles.xml
new file mode 100644
index 0000000..b3fe8af
--- /dev/null
+++ b/orbotservice/src/main/res/values/styles.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0" encoding="utf-8"?>
+<resources>
+ <style name="NotificationText" parent="android:TextAppearance.StatusBar.EventContent" />
+ <style name="NotificationTitle" parent="android:TextAppearance.StatusBar.EventContent.Title" />
+</resources>
1
0
commit 354ce24283790ef72601d3a512e2d16f34aeba91
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Wed Nov 2 13:47:41 2016 -0400
update manifest to 15.2.0-RC-3
---
app/src/main/AndroidManifest.xml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/app/src/main/AndroidManifest.xml b/app/src/main/AndroidManifest.xml
index fcdad4e..d25f5b7 100644
--- a/app/src/main/AndroidManifest.xml
+++ b/app/src/main/AndroidManifest.xml
@@ -1,8 +1,8 @@
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="org.torproject.android"
- android:versionName="15.2.0-RC-2"
- android:versionCode="15200040"
+ android:versionName="15.2.0-RC-3"
+ android:versionCode="15200050"
android:installLocation="auto"
>
<uses-sdk android:minSdkVersion="16" android:targetSdkVersion="23"/>
1
0
commit 5d52f045564194cc9d9c65755e518dbbdc36599f
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Sat Oct 29 11:42:50 2016 -0400
update to 15.2.0-RC-2
---
app/src/main/AndroidManifest.xml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/app/src/main/AndroidManifest.xml b/app/src/main/AndroidManifest.xml
index 9036d5d..fcdad4e 100644
--- a/app/src/main/AndroidManifest.xml
+++ b/app/src/main/AndroidManifest.xml
@@ -1,8 +1,8 @@
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="org.torproject.android"
- android:versionName="15.2.0-RC-1"
- android:versionCode="15200030"
+ android:versionName="15.2.0-RC-2"
+ android:versionCode="15200040"
android:installLocation="auto"
>
<uses-sdk android:minSdkVersion="16" android:targetSdkVersion="23"/>
1
0
commit af69041811a00734b0cc830af942006025a03550
Author: Nathan Freitas <nathan(a)freitas.net>
Date: Mon Oct 31 06:54:15 2016 -0400
remove old superuser-commands
---
.gitmodules | 4 ----
external/superuser-commands | 1 -
2 files changed, 5 deletions(-)
diff --git a/.gitmodules b/.gitmodules
index 665ab2a..6cd626a 100644
--- a/.gitmodules
+++ b/.gitmodules
@@ -18,10 +18,6 @@
path = external/iptables
url = git://git.netfilter.org/iptables
ignore = dirty
-[submodule "external/superuser-commands"]
- path = external/superuser-commands
- url = https://github.com/guardianproject/RootCommands.git
- ignore = dirty
[submodule "external/polipo"]
path = external/polipo
url = https://github.com/jech/polipo.git
diff --git a/external/superuser-commands b/external/superuser-commands
deleted file mode 160000
index d38520e..0000000
--- a/external/superuser-commands
+++ /dev/null
@@ -1 +0,0 @@
-Subproject commit d38520e6c80aaf84bcc1c0eb0f5c904c0e8b79af
1
0

[stem/master] Disable integ test for fallback directory reachability
by atagar@torproject.org 02 Nov '16
by atagar@torproject.org 02 Nov '16
02 Nov '16
commit 3c3fc11c6bb0ef7bcc3ebd12f2a055b0950dcfac
Author: Damian Johnson <atagar(a)torproject.org>
Date: Mon Oct 31 19:24:03 2016 -0700
Disable integ test for fallback directory reachability
This was a great test at one point but tor's added so many fallbacks that it
takes *forever*. At a rough guess maybe a half hour. Better as a DocTor check
anyway (think we actually have one already...).
---
test/integ/descriptor/remote.py | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/test/integ/descriptor/remote.py b/test/integ/descriptor/remote.py
index 5fe6cc1..52d29f0 100644
--- a/test/integ/descriptor/remote.py
+++ b/test/integ/descriptor/remote.py
@@ -11,6 +11,8 @@ import stem.descriptor.remote
import stem.descriptor.router_status_entry
import stem.descriptor.server_descriptor
+import test.runner
+
from test.runner import (
require_online,
only_run_once,
@@ -226,6 +228,12 @@ class TestDescriptorDownloader(unittest.TestCase):
available.
"""
+ # Don't run this test by default. Once upon a time it was fine, but tor has
+ # added so many fallbacks now that this takes a looong time. :(
+
+ test.runner.skip(self, '(skipped by default)')
+ return
+
unsuccessful = {}
downloader = stem.descriptor.remote.DescriptorDownloader()
moria1_v3ident = stem.descriptor.remote.get_authorities()['moria1'].v3ident
1
0