af-wall/app/src/main/java/dev/ukanth/ufirewall/plugin/FireReceiver.java
2025-11-20 14:05:38 +01:00

301 lines
No EOL
15 KiB
Java

/*
* Copyright 2012 two forty four a.m. LLC <http://www.twofortyfouram.com>
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
* <http://www.apache.org/licenses/LICENSE-2.0>
*
* Unless required by applicable law or agreed to in writing, software distributed under the License is
* distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and limitations under the License.
*/
package dev.ukanth.ufirewall.plugin;
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.os.Bundle;
import android.os.Handler;
import android.os.Message;
import android.widget.Toast;
import dev.ukanth.ufirewall.Api;
import dev.ukanth.ufirewall.R;
import dev.ukanth.ufirewall.profiles.ProfileData;
import dev.ukanth.ufirewall.profiles.ProfileHelper;
import dev.ukanth.ufirewall.service.RootCommand;
import dev.ukanth.ufirewall.util.G;
/**
* This is the "fire" BroadcastReceiver for a Locale Plug-in setting.
*/
public final class FireReceiver extends BroadcastReceiver {
public static final String TAG = "AFWall";
/**
* @param context {@inheritDoc}.
* @param intent the incoming {@link com.twofortyfouram.locale.Intent#ACTION_FIRE_SETTING} Intent. This
* should contain the {@link com.twofortyfouram.locale.Intent#EXTRA_BUNDLE} that was saved by
* {@link } and later broadcast by Locale.
*/
@Override
public void onReceive(final Context context, final Intent intent) {
/*
* Always be sure to be strict on input parameters! A malicious third-party app could always send an
* empty or otherwise malformed Intent. And since Locale applies settings in the background, the
* plug-in definitely shouldn't crash in the background.
*/
/*
* Locale guarantees that the Intent action will be ACTION_FIRE_SETTING
*/
if (!com.twofortyfouram.locale.Intent.ACTION_FIRE_SETTING.equals(intent.getAction())) {
return;
}
/*
* A hack to prevent a private serializable classloader attack
*/
BundleScrubber.scrub(intent);
BundleScrubber.scrub(intent.getBundleExtra(com.twofortyfouram.locale.Intent.EXTRA_BUNDLE));
final Bundle bundle = intent.getBundleExtra(com.twofortyfouram.locale.Intent.EXTRA_BUNDLE);
/*
* Final verification of the plug-in Bundle before firing the setting.
*/
if (PluginBundleManager.isBundleValid(bundle)) {
String index = bundle.getString(PluginBundleManager.BUNDLE_EXTRA_STRING_MESSAGE);
String name = null;
if (index.contains("::")) {
String[] msg = index.split("::");
index = msg[0];
name = msg[1];
}
final boolean multimode = G.enableMultiProfile();
final boolean disableToasts = G.disableTaskerToast();
if (!G.isProfileMigrated()) {
if (index != null) {
//int id = Integer.parseInt(index);
switch (index) {
case "0":
Api.applySavedIptablesRules(context, false, new RootCommand()
.setFailureToast(R.string.error_apply)
.setCallback(new RootCommand.Callback() {
@Override
public void cbFunc(RootCommand state) {
Message msg = new Message();
if (state.exitCode == 0) {
msg.arg1 = R.string.rules_applied;
Api.setEnabled(context, true, false);
} else {
// error details are already in logcat
msg.arg1 = R.string.error_apply;
}
sendMessage(msg);
}
}));
break;
case "1":
if (G.protectionLevel().equals("p0")) {
Api.purgeIptables(context, true, new RootCommand()
.setReopenShell(true)
.setCallback(new RootCommand.Callback() {
public void cbFunc(RootCommand state) {
Message msg = new Message();
msg.arg1 = R.string.toast_disabled;
sendMessage(msg);
Api.setEnabled(context, false, false);
}
}));
} else {
Message msg = new Message();
msg.arg1 = R.string.widget_disable_fail;
sendMessage(msg);
}
break;
case "2":
if (multimode) {
G.setProfile(true, "AFWallPrefs");
}
break;
case "3":
if (multimode) {
G.setProfile(true, "AFWallProfile1");
}
break;
case "4":
if (multimode) {
G.setProfile(true, "AFWallProfile2");
}
break;
case "5":
if (multimode) {
G.setProfile(true, "AFWallProfile3");
}
break;
default:
if (multimode) {
G.setProfile(true, name);
}
break;
}
if (Integer.parseInt(index) > 1) {
if (multimode) {
if (Api.isEnabled(context)) {
if (!disableToasts) {
Toast.makeText(context, R.string.tasker_apply, Toast.LENGTH_SHORT).show();
}
Api.applySavedIptablesRules(context, false, new RootCommand()
.setFailureToast(R.string.error_apply)
.setCallback(new RootCommand.Callback() {
@Override
public void cbFunc(RootCommand state) {
Message msg = new Message();
if (state.exitCode == 0) {
msg.arg1 = R.string.tasker_profile_applied;
if (!disableToasts)
sendMessage(msg);
} else {
// error details are already in logcat
msg.arg1 = R.string.error_apply;
}
sendMessage(msg);
}
}));
} else {
Message msg = new Message();
msg.arg1 = R.string.tasker_disabled;
sendMessage(msg);
}
} else {
Message msg = new Message();
msg.arg1 = R.string.tasker_muliprofile;
sendMessage(msg);
}
G.reloadPrefs();
/*if (G.activeNotification()) {
Api.showNotification(Api.isEnabled(context), context);
}*/
Api.updateNotification(Api.isEnabled(context), context);
}
}
} else {
if (index != null) {
//int id = Integer.parseInt(index);
switch (index) {
case "0":
Api.applySavedIptablesRules(context, false, new RootCommand()
.setFailureToast(R.string.error_apply)
.setCallback(new RootCommand.Callback() {
@Override
public void cbFunc(RootCommand state) {
Message msg = new Message();
if (state.exitCode == 0) {
msg.arg1 = R.string.rules_applied;
Api.setEnabled(context, true, false);
} else {
// error details are already in logcat
msg.arg1 = R.string.error_apply;
}
sendMessage(msg);
}
}));
break;
case "1":
if (G.protectionLevel().equals("p0")) {
Api.purgeIptables(context, true, new RootCommand()
.setReopenShell(true)
.setCallback(new RootCommand.Callback() {
public void cbFunc(RootCommand state) {
Message msg = new Message();
msg.arg1 = R.string.toast_disabled;
sendMessage(msg);
Api.setEnabled(context, false, false);
}
}));
/* } else {
msg.arg1 = R.string.toast_error_disabling;
sendMessage(msg);
}*/
} else {
Message msg = new Message();
msg.arg1 = R.string.widget_disable_fail;
sendMessage(msg);
}
break;
case "2":
if (multimode) {
G.setProfile(true, "AFWallPrefs");
}
break;
default:
if (multimode) {
ProfileData data = ProfileHelper.getProfileByName(name);
if (data != null) {
G.setProfile(true, data.getIdentifier());
}
}
break;
}
if (Integer.parseInt(index) > 1) {
if (multimode) {
if (Api.isEnabled(context)) {
if (!disableToasts) {
Toast.makeText(context, R.string.tasker_apply, Toast.LENGTH_SHORT).show();
}
Api.applySavedIptablesRules(context, false, new RootCommand()
.setFailureToast(R.string.error_apply)
.setCallback(new RootCommand.Callback() {
@Override
public void cbFunc(RootCommand state) {
Message msg = new Message();
if (state.exitCode == 0) {
msg.arg1 = R.string.tasker_profile_applied;
if (!disableToasts) sendMessage(msg);
} else {
// error details are already in logcat
msg.arg1 = R.string.error_apply;
}
}
}));
} else {
Message msg = new Message();
msg.arg1 = R.string.tasker_disabled;
sendMessage(msg);
}
} else {
Message msg = new Message();
msg.arg1 = R.string.tasker_muliprofile;
sendMessage(msg);
}
G.reloadPrefs();
/* if (G.activeNotification()) {
Api.showNotification(Api.isEnabled(context), context);
}*/
Api.updateNotification(Api.isEnabled(context), context);
}
}
}
}
}
private void sendMessage(Message msg) {
try {
new Handler() {
public void handleMessage(Message msg) {
if (msg.arg1 != 0)
Toast.makeText(G.getContext(), msg.arg1, Toast.LENGTH_SHORT).show();
}
}.sendMessage(msg);
}catch (Exception e) {
//unable to send toast. but don't crash
}
}
}