/*
* Copyright 2012 two forty four a.m. LLC <http://www.twofortyfouram.com>
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
* <http://www.apache.org/licenses/LICENSE-2.0>
*
* Unless required by applicable law or agreed to in writing, software distributed under the License is
* distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and limitations under the License.
*/
package dev.ukanth.ufirewall.plugin;
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.os.Bundle;
import android.os.Handler;
import android.os.Message;
import android.widget.Toast;
import dev.ukanth.ufirewall.Api;
import dev.ukanth.ufirewall.util.G;
import dev.ukanth.ufirewall.R;
import dev.ukanth.ufirewall.service.RootShell.RootCommand;
/**
* This is the "fire" BroadcastReceiver for a Locale Plug-in setting.
*/
public final class FireReceiver extends BroadcastReceiver
{
public static final String TAG = "AFWall";
/**
* @param context {@inheritDoc}.
* @param intent the incoming {@link com.twofortyfouram.locale.Intent#ACTION_FIRE_SETTING} Intent. This
* should contain the {@link com.twofortyfouram.locale.Intent#EXTRA_BUNDLE} that was saved by
* {@link EditActivity} and later broadcast by Locale.
*/
@Override
public void onReceive(final Context context, final Intent intent)
{
/*
* Always be sure to be strict on input parameters! A malicious third-party app could always send an
* empty or otherwise malformed Intent. And since Locale applies settings in the background, the
* plug-in definitely shouldn't crash in the background.
*/
/*
* Locale guarantees that the Intent action will be ACTION_FIRE_SETTING
*/
if (!com.twofortyfouram.locale.Intent.ACTION_FIRE_SETTING.equals(intent.getAction()))
{
return;
}
/*
* A hack to prevent a private serializable classloader attack
*/
BundleScrubber.scrub(intent);
BundleScrubber.scrub(intent.getBundleExtra(com.twofortyfouram.locale.Intent.EXTRA_BUNDLE));
final Bundle bundle = intent.getBundleExtra(com.twofortyfouram.locale.Intent.EXTRA_BUNDLE);
final Handler toaster = new Handler() {
public void handleMessage(Message msg) {
if (msg.arg1 != 0) Toast.makeText(context, msg.arg1, Toast.LENGTH_SHORT).show();
}
};
/*
* Final verification of the plug-in Bundle before firing the setting.
*/
if (PluginBundleManager.isBundleValid(bundle))
{
String index = bundle.getString(PluginBundleManager.BUNDLE_EXTRA_STRING_MESSAGE);
String action = null;
if(index.contains("::")) {
String[] msg = index.split("::");
index = msg[0];
action = msg[1];
}
final boolean multimode = G.enableMultiProfile();
final boolean disableToasts = G.disableTaskerToast();
final Message msg = new Message();
if(index != null){
//int id = Integer.parseInt(index);
switch(index){
case "0":
if(applyRules(context,msg,toaster)){
Api.setEnabled(context, true, false);
}
break;
case "1":
if(G.protectionLevel().equals("p0")){
if (Api.purgeIptables(context, false)) {
msg.arg1 = R.string.toast_disabled;
toaster.sendMessage(msg);
Api.setEnabled(context, false, false);
} else {
msg.arg1 = R.string.toast_error_disabling;
toaster.sendMessage(msg);
}
} else {
msg.arg1 = R.string.widget_disable_fail;
toaster.sendMessage(msg);
}
break;
case "2":
if(multimode) {
G.setProfile(true, "AFWallPrefs");
}
break;
case "3":
if(multimode) {
G.setProfile(true, "AFWallProfile1");
}
break;
case "4":
if(multimode) {
G.setProfile(true, "AFWallProfile2");
}
break;
case "5":
if(multimode) {
G.setProfile(true, "AFWallProfile3");
}
break;
default:
if(multimode) {
G.setProfile(true,action);
}
break;
}
if(Integer.parseInt(index) > 1) {
if(multimode) {
if (Api.isEnabled(context)) {
if(!disableToasts){
Toast.makeText(context, R.string.tasker_apply, Toast.LENGTH_SHORT).show();
}
if(applyRules(context, msg, toaster)) {
msg.arg1 = R.string.tasker_profile_applied;
if(!disableToasts) toaster.sendMessage(msg);
}
} else {
msg.arg1 = R.string.tasker_disabled;
toaster.sendMessage(msg);
}
} else {
msg.arg1 = R.string.tasker_muliprofile;
toaster.sendMessage(msg);
}
G.reloadPrefs();
}
}
}
}
/* private boolean applyRules(Context context,Message msg, Handler toaster) {
boolean success = false;
if (Api.applySavedIptablesRules(context, false)) {
msg.arg1 = R.string.rules_applied;
//toaster.sendMessage(msg);
success = true;
} else {
msg.arg1 = R.string.error_apply;
//toaster.sendMessage(msg);
}
return success;
}*/
private boolean applyRules(final Context context,final Message msg, final Handler toaster) {
boolean ret = Api.applySavedIptablesRules(context, false,new RootCommand()
.setFailureToast(R.string.error_apply)
.setCallback(new RootCommand.Callback() {
@Override
public void cbFunc(RootCommand state) {
if (state.exitCode == 0) {
msg.arg1 = R.string.rules_applied;
} else {
// error details are already in logcat
msg.arg1 = R.string.error_apply;
}
}
}));
return ret;
}
}