Compare commits
29 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8c382f0bde | ||
|
|
b933ab083f | ||
|
|
2f4d13bd29 | ||
|
|
9eeb8f7da8 | ||
|
|
152836fe54 | ||
|
|
507796887b | ||
|
|
2f08e5e16d | ||
|
|
6a2d652f60 | ||
|
|
b7ae0b1155 | ||
|
|
ec0ae681ac | ||
|
|
61ba07ecf0 | ||
|
|
c835f20263 | ||
|
|
b51965f5af | ||
|
|
66b0e4c71c | ||
|
|
cb23fd6155 | ||
|
|
d932e93d0b | ||
|
|
e60ae7434b | ||
|
|
005d864609 | ||
|
|
4d8e5d9367 | ||
|
|
cff0e68f46 | ||
|
|
266265ca35 | ||
|
|
479d2d9ade | ||
|
|
c53f5cc11b | ||
|
|
95fe89a12c | ||
|
|
e37b6d47cc | ||
|
|
d2d9ede8ab | ||
|
|
ed884b0d27 | ||
|
|
2f39c13355 | ||
|
|
488af2b9dd |
15
.github/workflows/rust-build.yml
vendored
Normal file
15
.github/workflows/rust-build.yml
vendored
Normal file
@@ -0,0 +1,15 @@
|
||||
name: Rust - Build
|
||||
|
||||
on: [push, pull_request]
|
||||
|
||||
env:
|
||||
CARGO_TERM_COLOR: always
|
||||
|
||||
jobs:
|
||||
build-release:
|
||||
name: "build-release"
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: Build project
|
||||
run: cargo build --release --all-features
|
||||
42
.github/workflows/rust-quality.yml
vendored
Normal file
42
.github/workflows/rust-quality.yml
vendored
Normal file
@@ -0,0 +1,42 @@
|
||||
name: Rust - Quality
|
||||
|
||||
on: [push, pull_request]
|
||||
|
||||
env:
|
||||
CARGO_TERM_COLOR: always
|
||||
|
||||
jobs:
|
||||
clippy:
|
||||
name: "clippy"
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- run: rustup component add clippy
|
||||
- name: Run clippy
|
||||
run: cargo clippy --all-features
|
||||
|
||||
fmt:
|
||||
name: "fmt"
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: Run formatter
|
||||
run: cargo fmt --all --check
|
||||
|
||||
doc:
|
||||
name: "doc"
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: Run doc
|
||||
run: cargo doc --all-features --no-deps
|
||||
env:
|
||||
RUSTDOCFLAGS: "-D warnings"
|
||||
|
||||
tests:
|
||||
name: "tests"
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- name: Run tests
|
||||
run: cargo test --verbose --all-features
|
||||
50
.github/workflows/rust-release.yml
vendored
Normal file
50
.github/workflows/rust-release.yml
vendored
Normal file
@@ -0,0 +1,50 @@
|
||||
name: Rust - Release creation
|
||||
|
||||
on:
|
||||
release:
|
||||
types: [created]
|
||||
|
||||
jobs:
|
||||
create-release:
|
||||
runs-on: ubuntu-latest
|
||||
|
||||
steps:
|
||||
- name: "Checkout repository"
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: "Set up Rust"
|
||||
uses: actions-rs/toolchain@v1
|
||||
with:
|
||||
toolchain: stable
|
||||
override: true
|
||||
|
||||
- name: "Install dependencies"
|
||||
run: |
|
||||
sudo apt update
|
||||
sudo apt install -y rpm
|
||||
cargo install cargo-deb
|
||||
cargo install cargo-generate-rpm
|
||||
|
||||
- name: "build-release"
|
||||
run: cargo build --all-features --release
|
||||
|
||||
- name: "Build DEB package"
|
||||
run: cargo deb -p adb_cli
|
||||
|
||||
- name: "Build RPM package"
|
||||
run: cargo generate-rpm -p adb_cli
|
||||
|
||||
- name: "Publish GitHub artefacts"
|
||||
uses: softprops/action-gh-release@v2
|
||||
with:
|
||||
files: |
|
||||
target/debian/*.deb
|
||||
target/generate-rpm/*.rpm
|
||||
target/release/adb_cli
|
||||
|
||||
- name: "Publish crates"
|
||||
run: |
|
||||
cargo publish -p adb_client --token ${CRATES_IO_TOKEN}
|
||||
cargo publish -p adb_cli --token ${CRATES_IO_TOKEN}
|
||||
env:
|
||||
CRATES_IO_TOKEN: ${{ secrets.CRATES_IO_TOKEN }}
|
||||
16
Cargo.toml
16
Cargo.toml
@@ -3,11 +3,21 @@ members = ["adb_cli", "adb_client"]
|
||||
resolver = "2"
|
||||
|
||||
[workspace.package]
|
||||
authors = ["Corentin LIAUD"]
|
||||
edition = "2021"
|
||||
homepage = "https://github.com/cocool97/adb_client"
|
||||
keywords = ["adb", "android", "tcp", "usb"]
|
||||
license = "MIT"
|
||||
repository = "https://github.com/cocool97/adb_client"
|
||||
version = "1.0.6"
|
||||
version = "2.0.6"
|
||||
|
||||
# To build locally when working on a new version
|
||||
# To build locally when working on a new release
|
||||
[patch.crates-io]
|
||||
adb_client = { path = "./adb_client" }
|
||||
adb_client = { path = "./adb_client" }
|
||||
|
||||
[profile.release]
|
||||
codegen-units = 1
|
||||
debug-assertions = false
|
||||
lto = "thin"
|
||||
opt-level = 'z'
|
||||
strip = true
|
||||
|
||||
21
LICENSE
Normal file
21
LICENSE
Normal file
@@ -0,0 +1,21 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) 2023-2024 Corentin LIAUD
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
||||
51
README.md
51
README.md
@@ -1,31 +1,52 @@
|
||||
# Rust adb_client
|
||||
<p align="center" style="text-align: center">
|
||||
<img src="assets/logo.png" width="33%">
|
||||
</p>
|
||||
|
||||
[](https://crates.io/crates/adb_client)
|
||||
[](https://deps.rs/repo/github/cocool97/adb_client)
|
||||
<p align="center">
|
||||
<p align="center">Android Debug Bridge (ADB) client implementation in pure Rust !</p>
|
||||
<p align="center">
|
||||
<a href="https://crates.io/crates/adb_client">
|
||||
<img alt="crates.io" src="https://img.shields.io/crates/v/adb_client.svg"/>
|
||||
</a>
|
||||
<a href="https://github.com/cocool97/adb_client/actions">
|
||||
<img alt="ci status" src="https://github.com/cocool97/adb_client/actions/workflows/rust-build.yml/badge.svg"/>
|
||||
</a>
|
||||
<a href="https://deps.rs/repo/github/cocool97/adb_client">
|
||||
<img alt="dependency status" src="https://deps.rs/repo/github/cocool97/adb_client/status.svg"/>
|
||||
</a>
|
||||
<a href="https://opensource.org/licenses/MIT">
|
||||
<img alt="dependency status" src="https://img.shields.io/badge/License-MIT-yellow.svg"/>
|
||||
</a>
|
||||
</p>
|
||||
</p>
|
||||
|
||||
**A**ndroid **D**ebug **B**ridge (ADB) client implementation in pure Rust !
|
||||
Main features of this library:
|
||||
|
||||
Main features :
|
||||
|
||||
- Full Rust, no need to use `adb *` shell commands
|
||||
- Currently only support server TCP/IP protocol
|
||||
- Full Rust, don't use `adb *` shell commands to interact with devices
|
||||
- Supports
|
||||
- Using ADB server as a proxy (standard behavior when using `adb` CLI)
|
||||
- Connecting directly to end devices (without using adb-server)
|
||||
- Over **USB**
|
||||
- Over **TCP/IP**
|
||||
- Implements hidden `adb` features, like `framebuffer`
|
||||
- Highly configurable
|
||||
- Easy to use !
|
||||
|
||||
## adb_client
|
||||
|
||||
Rust library implementing ADB protocol and providing high-level abstraction over commands.
|
||||
Rust library implementing both ADB protocols (server and end-devices) and providing a high-level abstraction over the many supported commands.
|
||||
|
||||
Improved documentation [here](./adb_client/README.md).
|
||||
Improved documentation available [here](./adb_client/README.md).
|
||||
|
||||
## adb_cli
|
||||
|
||||
Rust binary providing an improved version of `adb` CLI, using `adb_client` library. Can be used as an usage example of the library.
|
||||
Rust binary providing an improved version of Google's official `adb` CLI, by using `adb_client` library.
|
||||
Provides an usage example of the library.
|
||||
|
||||
Improved documentation [here](./adb_cli/README.md).
|
||||
Improved documentation available [here](./adb_cli/README.md).
|
||||
|
||||
## Missing features
|
||||
## Related publications
|
||||
|
||||
- USB protocol (Work in progress)
|
||||
- [Diving into ADB protocol internals (1/2)](https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12)
|
||||
|
||||
All pull requests are welcome !
|
||||
Some features may still be missing, all pull requests are welcome !
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
[package]
|
||||
authors.workspace = true
|
||||
description = "Rust ADB (Android Debug Bridge) CLI"
|
||||
edition.workspace = true
|
||||
keywords = ["adb", "android"]
|
||||
keywords.workspace = true
|
||||
license.workspace = true
|
||||
name = "adb_cli"
|
||||
readme = "README.md"
|
||||
@@ -9,8 +10,30 @@ repository.workspace = true
|
||||
version.workspace = true
|
||||
|
||||
[dependencies]
|
||||
adb_client = { version = "1.0.6" }
|
||||
anyhow = { version = "1.0.86" }
|
||||
clap = { version = "4.5.17", features = ["derive"] }
|
||||
adb_client = { version = "2.0.5" }
|
||||
anyhow = { version = "1.0.89" }
|
||||
clap = { version = "4.5.18", features = ["derive"] }
|
||||
env_logger = { version = "0.11.5" }
|
||||
log = "0.4.22"
|
||||
log = { version = "0.4.22" }
|
||||
|
||||
[target.'cfg(unix)'.dependencies]
|
||||
termios = { version = "0.3.3" }
|
||||
|
||||
#####################################
|
||||
# Debian package build instructions #
|
||||
#####################################
|
||||
[package.metadata.deb]
|
||||
assets = [
|
||||
{ source = "target/release/adb_cli", dest = "usr/bin/", mode = "755" },
|
||||
]
|
||||
priority = "optional"
|
||||
section = "utility"
|
||||
|
||||
##################################
|
||||
# RPM package build instructions #
|
||||
##################################
|
||||
[package.metadata.generate-rpm]
|
||||
assets = [
|
||||
{ source = "target/release/adb_cli", dest = "/usr/bin/adb_cli", mode = "755" },
|
||||
]
|
||||
license = "MIT"
|
||||
|
||||
@@ -15,6 +15,8 @@ cargo install adb_cli
|
||||
|
||||
Usage is quite simple, and tends to look like `adb`:
|
||||
|
||||
- To use ADB server as a proxy:
|
||||
|
||||
```bash
|
||||
user@laptop ~/adb_client (main)> adb_cli --help
|
||||
Rust ADB (Android Debug Bridge) CLI
|
||||
@@ -49,3 +51,26 @@ Options:
|
||||
-h, --help Print help
|
||||
-V, --version Print version
|
||||
```
|
||||
|
||||
- To interact directly with end devices
|
||||
|
||||
```bash
|
||||
user@laptop ~/adb_client (main)> adb_cli usb --help
|
||||
Device commands via USB, no server needed
|
||||
|
||||
Usage: adb_cli usb [OPTIONS] --vendor-id <VID> --product-id <PID> <COMMAND>
|
||||
|
||||
Commands:
|
||||
shell Spawn an interactive shell or run a list of commands on the device
|
||||
pull Pull a file from device
|
||||
push Push a file on device
|
||||
stat Stat a file on device
|
||||
reboot Reboot the device
|
||||
help Print this message or the help of the given subcommand(s)
|
||||
|
||||
Options:
|
||||
-v, --vendor-id <VID> Hexadecimal vendor id of this USB device
|
||||
-p, --product-id <PID> Hexadecimal product id of this USB device
|
||||
-k, --private-key <PATH_TO_PRIVATE_KEY> Path to a custom private key to use for authentication
|
||||
-h, --help Print help
|
||||
```
|
||||
@@ -1,3 +1,5 @@
|
||||
#![cfg(any(target_os = "linux", target_os = "macos"))]
|
||||
|
||||
use std::os::unix::prelude::{AsRawFd, RawFd};
|
||||
|
||||
use termios::{tcsetattr, Termios, TCSANOW, VMIN, VTIME};
|
||||
@@ -33,6 +35,8 @@ impl ADBTermios {
|
||||
impl Drop for ADBTermios {
|
||||
fn drop(&mut self) {
|
||||
// Custom drop implementation, restores previous termios structure.
|
||||
tcsetattr(self.fd, TCSANOW, &self.old_termios).unwrap();
|
||||
if let Err(e) = tcsetattr(self.fd, TCSANOW, &self.old_termios) {
|
||||
log::error!("Error while droping ADBTermios: {e}")
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -21,4 +21,19 @@ pub enum HostCommand {
|
||||
Connect { address: SocketAddrV4 },
|
||||
/// Disconnect device over WI-FI
|
||||
Disconnect { address: SocketAddrV4 },
|
||||
/// MDNS services
|
||||
Mdns {
|
||||
#[clap(subcommand)]
|
||||
subcommand: MdnsCommand,
|
||||
},
|
||||
/// Display server status
|
||||
ServerStatus,
|
||||
}
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
pub enum MdnsCommand {
|
||||
/// Check mdns status
|
||||
Check,
|
||||
/// List mdns services available
|
||||
Services,
|
||||
}
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
use clap::Parser;
|
||||
use std::path::PathBuf;
|
||||
|
||||
use crate::models::RebootTypeCommand;
|
||||
|
||||
@@ -15,11 +16,20 @@ pub enum LocalCommand {
|
||||
/// Stat a file specified on device
|
||||
Stat { path: String },
|
||||
/// Spawn an interactive shell or run a list of commands on the device
|
||||
Shell { command: Vec<String> },
|
||||
Shell { commands: Vec<String> },
|
||||
/// Run an activity on device specified by the intent
|
||||
Run {
|
||||
/// The package whose activity is to be invoked
|
||||
#[clap(short = 'p', long = "package")]
|
||||
package: String,
|
||||
/// The activity to be invoked itself, Usually it is MainActivity
|
||||
#[clap(short = 'a', long = "activity")]
|
||||
activity: String,
|
||||
},
|
||||
/// Reboot the device
|
||||
Reboot {
|
||||
#[clap(subcommand)]
|
||||
sub_command: RebootTypeCommand,
|
||||
reboot_type: RebootTypeCommand,
|
||||
},
|
||||
/// Dump framebuffer of device
|
||||
Framebuffer { path: String },
|
||||
@@ -28,4 +38,9 @@ pub enum LocalCommand {
|
||||
/// Path to output file (created if not exists)
|
||||
path: Option<String>,
|
||||
},
|
||||
/// Install an APK on device
|
||||
Install {
|
||||
/// Path to APK file. Extension must be ".apk"
|
||||
path: PathBuf,
|
||||
},
|
||||
}
|
||||
|
||||
@@ -1,7 +1,11 @@
|
||||
mod emu;
|
||||
mod host;
|
||||
mod local;
|
||||
mod tcp;
|
||||
mod usb;
|
||||
|
||||
pub use emu::EmuCommand;
|
||||
pub use host::HostCommand;
|
||||
pub use host::{HostCommand, MdnsCommand};
|
||||
pub use local::LocalCommand;
|
||||
pub use tcp::{TcpCommand, TcpCommands};
|
||||
pub use usb::{UsbCommand, UsbCommands};
|
||||
|
||||
44
adb_cli/src/commands/tcp.rs
Normal file
44
adb_cli/src/commands/tcp.rs
Normal file
@@ -0,0 +1,44 @@
|
||||
use std::net::SocketAddr;
|
||||
use std::path::PathBuf;
|
||||
|
||||
use clap::Parser;
|
||||
|
||||
use crate::models::RebootTypeCommand;
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
pub struct TcpCommand {
|
||||
pub address: SocketAddr,
|
||||
#[clap(subcommand)]
|
||||
pub commands: TcpCommands,
|
||||
}
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
pub enum TcpCommands {
|
||||
/// Spawn an interactive shell or run a list of commands on the device
|
||||
Shell { commands: Vec<String> },
|
||||
/// Pull a file from device
|
||||
Pull { source: String, destination: String },
|
||||
/// Push a file on device
|
||||
Push { filename: String, path: String },
|
||||
/// Stat a file on device
|
||||
Stat { path: String },
|
||||
/// Run an activity on device specified by the intent
|
||||
Run {
|
||||
/// The package whose activity is to be invoked
|
||||
#[clap(short = 'p', long = "package")]
|
||||
package: String,
|
||||
/// The activity to be invoked itself, Usually it is MainActivity
|
||||
#[clap(short = 'a', long = "activity")]
|
||||
activity: String,
|
||||
},
|
||||
/// Reboot the device
|
||||
Reboot {
|
||||
#[clap(subcommand)]
|
||||
reboot_type: RebootTypeCommand,
|
||||
},
|
||||
/// Install an APK on device
|
||||
Install {
|
||||
/// Path to APK file. Extension must be ".apk"
|
||||
path: PathBuf,
|
||||
},
|
||||
}
|
||||
56
adb_cli/src/commands/usb.rs
Normal file
56
adb_cli/src/commands/usb.rs
Normal file
@@ -0,0 +1,56 @@
|
||||
use std::num::ParseIntError;
|
||||
use std::path::PathBuf;
|
||||
|
||||
use clap::Parser;
|
||||
|
||||
use crate::models::RebootTypeCommand;
|
||||
|
||||
fn parse_hex_id(id: &str) -> Result<u16, ParseIntError> {
|
||||
u16::from_str_radix(id, 16)
|
||||
}
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
pub struct UsbCommand {
|
||||
/// Hexadecimal vendor id of this USB device
|
||||
#[clap(short = 'v', long = "vendor-id", value_parser=parse_hex_id, value_name="VID")]
|
||||
pub vendor_id: Option<u16>,
|
||||
/// Hexadecimal product id of this USB device
|
||||
#[clap(short = 'p', long = "product-id", value_parser=parse_hex_id, value_name="PID")]
|
||||
pub product_id: Option<u16>,
|
||||
/// Path to a custom private key to use for authentication
|
||||
#[clap(short = 'k', long = "private-key")]
|
||||
pub path_to_private_key: Option<PathBuf>,
|
||||
#[clap(subcommand)]
|
||||
pub commands: UsbCommands,
|
||||
}
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
pub enum UsbCommands {
|
||||
/// Spawn an interactive shell or run a list of commands on the device
|
||||
Shell { commands: Vec<String> },
|
||||
/// Pull a file from device
|
||||
Pull { source: String, destination: String },
|
||||
/// Push a file on device
|
||||
Push { filename: String, path: String },
|
||||
/// Stat a file on device
|
||||
Stat { path: String },
|
||||
/// Run an activity on device specified by the intent
|
||||
Run {
|
||||
/// The package whose activity is to be invoked
|
||||
#[clap(short = 'p', long = "package")]
|
||||
package: String,
|
||||
/// The activity to be invoked itself, Usually it is MainActivity
|
||||
#[clap(short = 'a', long = "activity")]
|
||||
activity: String,
|
||||
},
|
||||
/// Reboot the device
|
||||
Reboot {
|
||||
#[clap(subcommand)]
|
||||
reboot_type: RebootTypeCommand,
|
||||
},
|
||||
/// Install an APK on device
|
||||
Install {
|
||||
/// Path to APK file. Extension must be ".apk"
|
||||
path: PathBuf,
|
||||
},
|
||||
}
|
||||
@@ -1,34 +1,47 @@
|
||||
#![doc = include_str!("../README.md")]
|
||||
|
||||
#[cfg(any(target_os = "linux", target_os = "macos"))]
|
||||
mod adb_termios;
|
||||
|
||||
mod commands;
|
||||
mod models;
|
||||
|
||||
use adb_client::{ADBEmulatorDevice, ADBServer, DeviceShort};
|
||||
use adb_client::{
|
||||
ADBDeviceExt, ADBEmulatorDevice, ADBServer, ADBTcpDevice, ADBUSBDevice, DeviceShort,
|
||||
MDNSBackend, MDNSDiscoveryService,
|
||||
};
|
||||
use anyhow::{anyhow, Result};
|
||||
use clap::Parser;
|
||||
use commands::{EmuCommand, HostCommand, LocalCommand};
|
||||
use env_logger::Builder;
|
||||
use log::LevelFilter;
|
||||
use commands::{EmuCommand, HostCommand, LocalCommand, MdnsCommand, TcpCommands, UsbCommands};
|
||||
use models::{Command, Opts};
|
||||
use std::fs::File;
|
||||
use std::io::Write;
|
||||
use std::path::Path;
|
||||
|
||||
fn main() -> Result<()> {
|
||||
let opt = Opts::parse();
|
||||
let opts = Opts::parse();
|
||||
|
||||
let max_level = if opt.verbose {
|
||||
LevelFilter::Trace
|
||||
} else {
|
||||
LevelFilter::Info
|
||||
};
|
||||
let mut builder = Builder::default();
|
||||
builder.filter_level(max_level);
|
||||
builder.init();
|
||||
// RUST_LOG variable has more priority then "--debug" flag
|
||||
if std::env::var("RUST_LOG").is_err() {
|
||||
let level = match opts.debug {
|
||||
true => "trace",
|
||||
false => "info",
|
||||
};
|
||||
|
||||
match opt.command {
|
||||
std::env::set_var("RUST_LOG", level);
|
||||
}
|
||||
|
||||
// Setting default log level as "info" if not set
|
||||
if std::env::var("RUST_LOG").is_err() {
|
||||
std::env::set_var("RUST_LOG", "info");
|
||||
}
|
||||
env_logger::init();
|
||||
|
||||
match opts.command {
|
||||
Command::Local(local) => {
|
||||
let mut adb_server = ADBServer::new(opt.address);
|
||||
let mut adb_server = ADBServer::new(opts.address);
|
||||
|
||||
let mut device = match opt.serial {
|
||||
let mut device = match opts.serial {
|
||||
Some(serial) => adb_server.get_device_by_name(&serial)?,
|
||||
None => adb_server.get_device()?,
|
||||
};
|
||||
@@ -36,12 +49,12 @@ fn main() -> Result<()> {
|
||||
match local {
|
||||
LocalCommand::Pull { path, filename } => {
|
||||
let mut output = File::create(Path::new(&filename))?;
|
||||
device.recv(&path, &mut output)?;
|
||||
device.pull(&path, &mut output)?;
|
||||
log::info!("Downloaded {path} as {filename}");
|
||||
}
|
||||
LocalCommand::Push { filename, path } => {
|
||||
let mut input = File::open(Path::new(&filename))?;
|
||||
device.send(&mut input, &path)?;
|
||||
device.push(&mut input, &path)?;
|
||||
log::info!("Uploaded {filename} to {path}");
|
||||
}
|
||||
LocalCommand::List { path } => {
|
||||
@@ -49,15 +62,31 @@ fn main() -> Result<()> {
|
||||
}
|
||||
LocalCommand::Stat { path } => {
|
||||
let stat_response = device.stat(path)?;
|
||||
log::info!("{}", stat_response);
|
||||
println!("{}", stat_response);
|
||||
}
|
||||
LocalCommand::Shell { command } => {
|
||||
if command.is_empty() {
|
||||
device.shell()?;
|
||||
LocalCommand::Shell { commands } => {
|
||||
if commands.is_empty() {
|
||||
// Need to duplicate some code here as ADBTermios [Drop] implementation resets terminal state.
|
||||
// Using a scope here would call drop() too early..
|
||||
#[cfg(any(target_os = "linux", target_os = "macos"))]
|
||||
{
|
||||
let mut adb_termios = adb_termios::ADBTermios::new(std::io::stdin())?;
|
||||
adb_termios.set_adb_termios()?;
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
|
||||
#[cfg(not(any(target_os = "linux", target_os = "macos")))]
|
||||
{
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
} else {
|
||||
device.shell_command(command, std::io::stdout())?;
|
||||
device.shell_command(commands, std::io::stdout())?;
|
||||
}
|
||||
}
|
||||
LocalCommand::Run { package, activity } => {
|
||||
let output = device.run_activity(&package, &activity)?;
|
||||
std::io::stdout().write_all(&output)?;
|
||||
}
|
||||
LocalCommand::HostFeatures => {
|
||||
let features = device
|
||||
.host_features()?
|
||||
@@ -67,9 +96,9 @@ fn main() -> Result<()> {
|
||||
.ok_or(anyhow!("cannot list features"))?;
|
||||
log::info!("Available host features: {features}");
|
||||
}
|
||||
LocalCommand::Reboot { sub_command } => {
|
||||
log::info!("Reboots device");
|
||||
device.reboot(sub_command.into())?
|
||||
LocalCommand::Reboot { reboot_type } => {
|
||||
log::info!("Reboots device in mode {:?}", reboot_type);
|
||||
device.reboot(reboot_type.into())?
|
||||
}
|
||||
LocalCommand::Framebuffer { path } => {
|
||||
device.framebuffer(&path)?;
|
||||
@@ -84,10 +113,14 @@ fn main() -> Result<()> {
|
||||
};
|
||||
device.get_logs(writer)?;
|
||||
}
|
||||
LocalCommand::Install { path } => {
|
||||
log::info!("Starting installation of APK {}...", path.display());
|
||||
device.install(path)?;
|
||||
}
|
||||
}
|
||||
}
|
||||
Command::Host(host) => {
|
||||
let mut adb_server = ADBServer::new(opt.address);
|
||||
let mut adb_server = ADBServer::new(opts.address);
|
||||
|
||||
match host {
|
||||
HostCommand::Version => {
|
||||
@@ -131,10 +164,35 @@ fn main() -> Result<()> {
|
||||
adb_server.disconnect_device(address)?;
|
||||
log::info!("Disconnected {address}");
|
||||
}
|
||||
HostCommand::Mdns { subcommand } => match subcommand {
|
||||
MdnsCommand::Check => {
|
||||
let check = adb_server.mdns_check()?;
|
||||
let server_status = adb_server.server_status()?;
|
||||
match server_status.mdns_backend {
|
||||
MDNSBackend::Unknown => log::info!("unknown mdns backend..."),
|
||||
MDNSBackend::Bonjour => match check {
|
||||
true => log::info!("mdns daemon version [Bonjour]"),
|
||||
false => log::info!("ERROR: mdns daemon unavailable"),
|
||||
},
|
||||
MDNSBackend::OpenScreen => {
|
||||
log::info!("mdns daemon version [Openscreen discovery 0.0.0]")
|
||||
}
|
||||
}
|
||||
}
|
||||
MdnsCommand::Services => {
|
||||
log::info!("List of discovered mdns services");
|
||||
for service in adb_server.mdns_services()? {
|
||||
log::info!("{}", service);
|
||||
}
|
||||
}
|
||||
},
|
||||
HostCommand::ServerStatus => {
|
||||
log::info!("{}", adb_server.server_status()?);
|
||||
}
|
||||
}
|
||||
}
|
||||
Command::Emu(emu) => {
|
||||
let mut emulator = match opt.serial {
|
||||
let mut emulator = match opts.serial {
|
||||
Some(serial) => ADBEmulatorDevice::new(serial, None)?,
|
||||
None => return Err(anyhow!("Serial must be set to use emulators !")),
|
||||
};
|
||||
@@ -150,6 +208,145 @@ fn main() -> Result<()> {
|
||||
EmuCommand::Rotate => emulator.rotate()?,
|
||||
}
|
||||
}
|
||||
Command::Usb(usb) => {
|
||||
let mut device = match (usb.vendor_id, usb.product_id) {
|
||||
(Some(vid), Some(pid)) => match usb.path_to_private_key {
|
||||
Some(pk) => ADBUSBDevice::new_with_custom_private_key(vid, pid, pk)?,
|
||||
None => ADBUSBDevice::new(vid, pid)?,
|
||||
},
|
||||
|
||||
(None, None) => match usb.path_to_private_key {
|
||||
Some(pk) => ADBUSBDevice::autodetect_with_custom_private_key(pk)?,
|
||||
None => ADBUSBDevice::autodetect()?,
|
||||
},
|
||||
|
||||
_ => {
|
||||
anyhow::bail!("please either supply values for both the --vendor-id and --product-id flags or none.");
|
||||
}
|
||||
};
|
||||
|
||||
match usb.commands {
|
||||
UsbCommands::Shell { commands } => {
|
||||
if commands.is_empty() {
|
||||
// Need to duplicate some code here as ADBTermios [Drop] implementation resets terminal state.
|
||||
// Using a scope here would call drop() too early..
|
||||
#[cfg(any(target_os = "linux", target_os = "macos"))]
|
||||
{
|
||||
let mut adb_termios = adb_termios::ADBTermios::new(std::io::stdin())?;
|
||||
adb_termios.set_adb_termios()?;
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
|
||||
#[cfg(not(any(target_os = "linux", target_os = "macos")))]
|
||||
{
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
} else {
|
||||
device.shell_command(commands, std::io::stdout())?;
|
||||
}
|
||||
}
|
||||
UsbCommands::Pull {
|
||||
source,
|
||||
destination,
|
||||
} => {
|
||||
let mut output = File::create(Path::new(&destination))?;
|
||||
device.pull(&source, &mut output)?;
|
||||
log::info!("Downloaded {source} as {destination}");
|
||||
}
|
||||
UsbCommands::Stat { path } => {
|
||||
let stat_response = device.stat(&path)?;
|
||||
println!("{}", stat_response);
|
||||
}
|
||||
UsbCommands::Reboot { reboot_type } => {
|
||||
log::info!("Reboots device in mode {:?}", reboot_type);
|
||||
device.reboot(reboot_type.into())?
|
||||
}
|
||||
UsbCommands::Push { filename, path } => {
|
||||
let mut input = File::open(Path::new(&filename))?;
|
||||
device.push(&mut input, &path)?;
|
||||
log::info!("Uploaded {filename} to {path}");
|
||||
}
|
||||
UsbCommands::Run { package, activity } => {
|
||||
let output = device.run_activity(&package, &activity)?;
|
||||
std::io::stdout().write_all(&output)?;
|
||||
}
|
||||
UsbCommands::Install { path } => {
|
||||
log::info!("Starting installation of APK {}...", path.display());
|
||||
device.install(path)?;
|
||||
}
|
||||
}
|
||||
}
|
||||
Command::Tcp(tcp) => {
|
||||
let mut device = ADBTcpDevice::new(tcp.address)?;
|
||||
|
||||
match tcp.commands {
|
||||
TcpCommands::Shell { commands } => {
|
||||
if commands.is_empty() {
|
||||
// Need to duplicate some code here as ADBTermios [Drop] implementation resets terminal state.
|
||||
// Using a scope here would call drop() too early..
|
||||
#[cfg(any(target_os = "linux", target_os = "macos"))]
|
||||
{
|
||||
let mut adb_termios = adb_termios::ADBTermios::new(std::io::stdin())?;
|
||||
adb_termios.set_adb_termios()?;
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
|
||||
#[cfg(not(any(target_os = "linux", target_os = "macos")))]
|
||||
{
|
||||
device.shell(std::io::stdin(), std::io::stdout())?;
|
||||
}
|
||||
} else {
|
||||
device.shell_command(commands, std::io::stdout())?;
|
||||
}
|
||||
}
|
||||
TcpCommands::Pull {
|
||||
source,
|
||||
destination,
|
||||
} => {
|
||||
let mut output = File::create(Path::new(&destination))?;
|
||||
device.pull(&source, &mut output)?;
|
||||
log::info!("Downloaded {source} as {destination}");
|
||||
}
|
||||
TcpCommands::Stat { path } => {
|
||||
let stat_response = device.stat(&path)?;
|
||||
println!("{}", stat_response);
|
||||
}
|
||||
TcpCommands::Reboot { reboot_type } => {
|
||||
log::info!("Reboots device in mode {:?}", reboot_type);
|
||||
device.reboot(reboot_type.into())?
|
||||
}
|
||||
TcpCommands::Push { filename, path } => {
|
||||
let mut input = File::open(Path::new(&filename))?;
|
||||
device.push(&mut input, &path)?;
|
||||
log::info!("Uploaded {filename} to {path}");
|
||||
}
|
||||
TcpCommands::Run { package, activity } => {
|
||||
let output = device.run_activity(&package, &activity)?;
|
||||
std::io::stdout().write_all(&output)?;
|
||||
}
|
||||
TcpCommands::Install { path } => {
|
||||
log::info!("Starting installation of APK {}...", path.display());
|
||||
device.install(path)?;
|
||||
}
|
||||
}
|
||||
}
|
||||
Command::MdnsDiscovery => {
|
||||
let mut service = MDNSDiscoveryService::new()?;
|
||||
|
||||
let (tx, rx) = std::sync::mpsc::channel();
|
||||
service.start(tx)?;
|
||||
|
||||
log::info!("Starting mdns discovery...");
|
||||
while let Ok(device) = rx.recv() {
|
||||
log::info!(
|
||||
"Found device {} with addresses {:?}",
|
||||
device.fullname,
|
||||
device.addresses
|
||||
)
|
||||
}
|
||||
|
||||
service.shutdown()?;
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
|
||||
@@ -2,13 +2,13 @@ use std::net::SocketAddrV4;
|
||||
|
||||
use clap::Parser;
|
||||
|
||||
use crate::commands::{EmuCommand, HostCommand, LocalCommand};
|
||||
use crate::commands::{EmuCommand, HostCommand, LocalCommand, TcpCommand, UsbCommand};
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
#[clap(about, version, author)]
|
||||
pub struct Opts {
|
||||
#[clap(short = 'v', long = "verbose")]
|
||||
pub verbose: bool,
|
||||
#[clap(long = "debug")]
|
||||
pub debug: bool,
|
||||
#[clap(short = 'a', long = "address", default_value = "127.0.0.1:5037")]
|
||||
pub address: SocketAddrV4,
|
||||
/// Serial id of a specific device. Every request will be sent to this device.
|
||||
@@ -24,6 +24,13 @@ pub enum Command {
|
||||
Local(LocalCommand),
|
||||
#[clap(flatten)]
|
||||
Host(HostCommand),
|
||||
#[clap(flatten)]
|
||||
/// Emulator specific commands
|
||||
#[clap(subcommand)]
|
||||
Emu(EmuCommand),
|
||||
/// Device commands via USB, no server needed
|
||||
Usb(UsbCommand),
|
||||
/// Device commands via TCP, no server needed
|
||||
Tcp(TcpCommand),
|
||||
/// Discover devices over MDNS without using adb-server
|
||||
MdnsDiscovery,
|
||||
}
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
[package]
|
||||
authors.workspace = true
|
||||
description = "Rust ADB (Android Debug Bridge) client library"
|
||||
edition.workspace = true
|
||||
keywords = ["adb", "android"]
|
||||
keywords.workspace = true
|
||||
license.workspace = true
|
||||
name = "adb_client"
|
||||
readme = "README.md"
|
||||
@@ -9,13 +10,35 @@ repository.workspace = true
|
||||
version.workspace = true
|
||||
|
||||
[dependencies]
|
||||
base64 = { version = "0.22.1" }
|
||||
bincode = { version = "1.3.3" }
|
||||
byteorder = { version = "1.5.0" }
|
||||
chrono = { version = "0.4.38" }
|
||||
homedir = "0.3.3"
|
||||
image = { version = "0.25.2" }
|
||||
homedir = { version = "0.3.4" }
|
||||
image = { version = "0.25.5" }
|
||||
lazy_static = { version = "1.5.0" }
|
||||
log = "0.4.22"
|
||||
mio = { version = "1.0.2", features = ["os-ext", "os-poll"] }
|
||||
regex = { version = "1.10.6", features = ["perf", "std", "unicode"] }
|
||||
termios = { version = "0.3.3" }
|
||||
thiserror = { version = "1.0.63" }
|
||||
log = { version = "0.4.22" }
|
||||
mdns-sd = { version = "0.12.0" }
|
||||
num-bigint = { version = "0.8.4", package = "num-bigint-dig" }
|
||||
num-traits = { version = "0.2.19" }
|
||||
quick-protobuf = { version = "0.8.1" }
|
||||
rand = { version = "0.8.5" }
|
||||
rcgen = { version = "0.13.1" }
|
||||
regex = { version = "1.11.0", features = ["perf", "std", "unicode"] }
|
||||
rsa = { version = "0.9.7" }
|
||||
rusb = { version = "0.9.4", features = ["vendored"] }
|
||||
rustls = { version = "0.23.18" }
|
||||
rustls-pki-types = "1.10.0"
|
||||
serde = { version = "1.0.210", features = ["derive"] }
|
||||
serde_repr = { version = "0.1.19" }
|
||||
sha1 = { version = "0.10.6", features = ["oid"] }
|
||||
thiserror = { version = "2.0.1" }
|
||||
|
||||
[dev-dependencies]
|
||||
anyhow = { version = "1.0.93" }
|
||||
criterion = { version = "0.5.1" } # Used for benchmarks
|
||||
|
||||
[[bench]]
|
||||
harness = false
|
||||
name = "benchmark_adb_push"
|
||||
path = "../benches/benchmark_adb_push.rs"
|
||||
|
||||
@@ -17,16 +17,6 @@ adb_client = "*"
|
||||
|
||||
## Examples
|
||||
|
||||
### Launch a command on device via ADB server
|
||||
|
||||
```rust no_run
|
||||
use adb_client::ADBServer;
|
||||
|
||||
let mut server = ADBServer::default();
|
||||
let mut device = server.get_device().expect("cannot get device");
|
||||
device.shell_command(["df", "-h"],std::io::stdout());
|
||||
```
|
||||
|
||||
### Get available ADB devices
|
||||
|
||||
```rust no_run
|
||||
@@ -41,7 +31,19 @@ let mut server = ADBServer::new(SocketAddrV4::new(server_ip, server_port));
|
||||
server.devices();
|
||||
```
|
||||
|
||||
### Push a file to the device
|
||||
### Using ADB server as bridge
|
||||
|
||||
#### Launch a command on device
|
||||
|
||||
```rust no_run
|
||||
use adb_client::{ADBServer, ADBDeviceExt};
|
||||
|
||||
let mut server = ADBServer::default();
|
||||
let mut device = server.get_device().expect("cannot get device");
|
||||
device.shell_command(["df", "-h"],std::io::stdout());
|
||||
```
|
||||
|
||||
#### Push a file to the device
|
||||
|
||||
```rust no_run
|
||||
use adb_client::ADBServer;
|
||||
@@ -51,6 +53,45 @@ use std::path::Path;
|
||||
|
||||
let mut server = ADBServer::default();
|
||||
let mut device = server.get_device().expect("cannot get device");
|
||||
let mut input = File::open(Path::new("/tmp")).unwrap();
|
||||
device.send(&mut input, "/data/local/tmp");
|
||||
let mut input = File::open(Path::new("/tmp/f")).expect("Cannot open file");
|
||||
device.push(&mut input, "/data/local/tmp");
|
||||
```
|
||||
|
||||
### Interact directly with end devices
|
||||
|
||||
#### (USB) Launch a command on device
|
||||
|
||||
```rust no_run
|
||||
use adb_client::{ADBUSBDevice, ADBDeviceExt};
|
||||
|
||||
let vendor_id = 0x04e8;
|
||||
let product_id = 0x6860;
|
||||
let mut device = ADBUSBDevice::new(vendor_id, product_id).expect("cannot find device");
|
||||
device.shell_command(["df", "-h"],std::io::stdout());
|
||||
```
|
||||
|
||||
#### (USB) Push a file to the device
|
||||
|
||||
```rust no_run
|
||||
use adb_client::{ADBUSBDevice, ADBDeviceExt};
|
||||
use std::fs::File;
|
||||
use std::path::Path;
|
||||
|
||||
let vendor_id = 0x04e8;
|
||||
let product_id = 0x6860;
|
||||
let mut device = ADBUSBDevice::new(vendor_id, product_id).expect("cannot find device");
|
||||
let mut input = File::open(Path::new("/tmp/f")).expect("Cannot open file");
|
||||
device.push(&mut input, "/data/local/tmp");
|
||||
```
|
||||
|
||||
### (TCP) Get a shell from device
|
||||
|
||||
```rust no_run
|
||||
use std::net::{SocketAddr, IpAddr, Ipv4Addr};
|
||||
use adb_client::{ADBTcpDevice, ADBDeviceExt};
|
||||
|
||||
let device_ip = IpAddr::V4(Ipv4Addr::new(192, 168, 0, 10));
|
||||
let device_port = 43210;
|
||||
let mut device = ADBTcpDevice::new(SocketAddr::new(device_ip, device_port)).expect("cannot find device");
|
||||
device.shell(std::io::stdin(), std::io::stdout());
|
||||
```
|
||||
|
||||
46
adb_client/src/adb_device_ext.rs
Normal file
46
adb_client/src/adb_device_ext.rs
Normal file
@@ -0,0 +1,46 @@
|
||||
use std::io::{Read, Write};
|
||||
use std::path::Path;
|
||||
|
||||
use crate::models::AdbStatResponse;
|
||||
use crate::{RebootType, Result};
|
||||
|
||||
/// Trait representing all features available on both [`crate::ADBServerDevice`] and [`crate::ADBUSBDevice`]
|
||||
pub trait ADBDeviceExt {
|
||||
/// Runs command in a shell on the device, and write its output and error streams into output.
|
||||
fn shell_command<S: ToString, W: Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
output: W,
|
||||
) -> Result<()>;
|
||||
|
||||
/// Starts an interactive shell session on the device.
|
||||
/// Input data is read from reader and write to writer.
|
||||
/// W has a 'static bound as it is internally used in a thread.
|
||||
fn shell<R: Read, W: Write + Send + 'static>(&mut self, reader: R, writer: W) -> Result<()>;
|
||||
|
||||
/// Display the stat information for a remote file
|
||||
fn stat(&mut self, remote_path: &str) -> Result<AdbStatResponse>;
|
||||
|
||||
/// Pull the remote file pointed to by `source` and write its contents into `output`
|
||||
fn pull<A: AsRef<str>, W: Write>(&mut self, source: A, output: W) -> Result<()>;
|
||||
|
||||
/// Push `stream` to `path` on the device.
|
||||
fn push<R: Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()>;
|
||||
|
||||
/// Reboot the device using given reboot type
|
||||
fn reboot(&mut self, reboot_type: RebootType) -> Result<()>;
|
||||
|
||||
/// Run `activity` from `package` on device. Return the command output.
|
||||
fn run_activity(&mut self, package: &str, activity: &str) -> Result<Vec<u8>> {
|
||||
let mut output = Vec::new();
|
||||
self.shell_command(
|
||||
["am", "start", &format!("{package}/{package}.{activity}")],
|
||||
&mut output,
|
||||
)?;
|
||||
|
||||
Ok(output)
|
||||
}
|
||||
|
||||
/// Install an APK pointed to by `apk_path` on device.
|
||||
fn install<P: AsRef<Path>>(&mut self, apk_path: P) -> Result<()>;
|
||||
}
|
||||
1
adb_client/src/constants.rs
Normal file
1
adb_client/src/constants.rs
Normal file
@@ -0,0 +1 @@
|
||||
pub const BUFFER_SIZE: usize = 65536;
|
||||
236
adb_client/src/device/adb_message_device.rs
Normal file
236
adb_client/src/device/adb_message_device.rs
Normal file
@@ -0,0 +1,236 @@
|
||||
use byteorder::{LittleEndian, ReadBytesExt};
|
||||
use rand::Rng;
|
||||
use std::io::{Cursor, Read, Seek};
|
||||
|
||||
use crate::{constants::BUFFER_SIZE, ADBMessageTransport, AdbStatResponse, Result, RustADBError};
|
||||
|
||||
use super::{models::MessageSubcommand, ADBTransportMessage, MessageCommand};
|
||||
|
||||
/// Generic structure representing an ADB device reachable over an [`ADBMessageTransport`].
|
||||
/// Structure is totally agnostic over which transport is truly used.
|
||||
#[derive(Debug)]
|
||||
pub struct ADBMessageDevice<T: ADBMessageTransport> {
|
||||
transport: T,
|
||||
}
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
/// Instantiate a new [`ADBMessageTransport`]
|
||||
pub fn new(transport: T) -> Self {
|
||||
Self { transport }
|
||||
}
|
||||
|
||||
pub(crate) fn get_transport(&mut self) -> &T {
|
||||
&self.transport
|
||||
}
|
||||
|
||||
pub(crate) fn get_transport_mut(&mut self) -> &mut T {
|
||||
&mut self.transport
|
||||
}
|
||||
|
||||
/// Receive a message and acknowledge it by replying with an `OKAY` command
|
||||
pub(crate) fn recv_and_reply_okay(
|
||||
&mut self,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
) -> Result<ADBTransportMessage> {
|
||||
let message = self.transport.read_message()?;
|
||||
self.transport.write_message(ADBTransportMessage::new(
|
||||
MessageCommand::Okay,
|
||||
local_id,
|
||||
remote_id,
|
||||
"".into(),
|
||||
))?;
|
||||
Ok(message)
|
||||
}
|
||||
|
||||
/// Expect a message with an `OKAY` command after sending a message.
|
||||
pub(crate) fn send_and_expect_okay(
|
||||
&mut self,
|
||||
message: ADBTransportMessage,
|
||||
) -> Result<ADBTransportMessage> {
|
||||
self.transport.write_message(message)?;
|
||||
let message = self.transport.read_message()?;
|
||||
let received_command = message.header().command();
|
||||
if received_command != MessageCommand::Okay {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"expected command OKAY after message, got {}",
|
||||
received_command
|
||||
)));
|
||||
}
|
||||
Ok(message)
|
||||
}
|
||||
|
||||
pub(crate) fn recv_file<W: std::io::Write>(
|
||||
&mut self,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
mut output: W,
|
||||
) -> std::result::Result<(), RustADBError> {
|
||||
let mut len: Option<u64> = None;
|
||||
loop {
|
||||
let payload = self
|
||||
.recv_and_reply_okay(local_id, remote_id)?
|
||||
.into_payload();
|
||||
let mut rdr = Cursor::new(&payload);
|
||||
while rdr.position() != payload.len() as u64 {
|
||||
match len.take() {
|
||||
Some(0) | None => {
|
||||
rdr.seek_relative(4)?;
|
||||
len.replace(rdr.read_u32::<LittleEndian>()? as u64);
|
||||
}
|
||||
Some(length) => {
|
||||
let remaining_bytes = payload.len() as u64 - rdr.position();
|
||||
if length < remaining_bytes {
|
||||
std::io::copy(&mut rdr.by_ref().take(length), &mut output)?;
|
||||
} else {
|
||||
std::io::copy(&mut rdr.take(remaining_bytes), &mut output)?;
|
||||
len.replace(length - remaining_bytes);
|
||||
// this payload is now exhausted
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
if Cursor::new(&payload[(payload.len() - 8)..(payload.len() - 4)])
|
||||
.read_u32::<LittleEndian>()?
|
||||
== MessageSubcommand::Done as u32
|
||||
{
|
||||
break;
|
||||
}
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub(crate) fn push_file<R: std::io::Read>(
|
||||
&mut self,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
mut reader: R,
|
||||
) -> std::result::Result<(), RustADBError> {
|
||||
let mut buffer = [0; BUFFER_SIZE];
|
||||
let amount_read = reader.read(&mut buffer)?;
|
||||
let subcommand_data = MessageSubcommand::Data.with_arg(amount_read as u32);
|
||||
|
||||
let mut serialized_message =
|
||||
bincode::serialize(&subcommand_data).map_err(|_e| RustADBError::ConversionError)?;
|
||||
serialized_message.append(&mut buffer[..amount_read].to_vec());
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
serialized_message,
|
||||
);
|
||||
|
||||
self.send_and_expect_okay(message)?;
|
||||
|
||||
loop {
|
||||
let mut buffer = [0; BUFFER_SIZE];
|
||||
|
||||
match reader.read(&mut buffer) {
|
||||
Ok(0) => {
|
||||
// Currently file mtime is not forwarded
|
||||
let subcommand_data = MessageSubcommand::Done.with_arg(0);
|
||||
|
||||
let serialized_message = bincode::serialize(&subcommand_data)
|
||||
.map_err(|_e| RustADBError::ConversionError)?;
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
serialized_message,
|
||||
);
|
||||
|
||||
self.send_and_expect_okay(message)?;
|
||||
|
||||
// Command should end with a Write => Okay
|
||||
let received = self.transport.read_message()?;
|
||||
match received.header().command() {
|
||||
MessageCommand::Write => return Ok(()),
|
||||
c => {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"Wrong command received {}",
|
||||
c
|
||||
)))
|
||||
}
|
||||
}
|
||||
}
|
||||
Ok(size) => {
|
||||
let subcommand_data = MessageSubcommand::Data.with_arg(size as u32);
|
||||
|
||||
let mut serialized_message = bincode::serialize(&subcommand_data)
|
||||
.map_err(|_e| RustADBError::ConversionError)?;
|
||||
serialized_message.append(&mut buffer[..size].to_vec());
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
serialized_message,
|
||||
);
|
||||
|
||||
self.send_and_expect_okay(message)?;
|
||||
}
|
||||
Err(e) => {
|
||||
return Err(RustADBError::IOError(e));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub(crate) fn begin_synchronization(&mut self) -> Result<(u32, u32)> {
|
||||
let sync_directive = "sync:\0";
|
||||
|
||||
let mut rng = rand::thread_rng();
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Open,
|
||||
rng.gen(), /* Our 'local-id' */
|
||||
0,
|
||||
sync_directive.into(),
|
||||
);
|
||||
let message = self.send_and_expect_okay(message)?;
|
||||
let local_id = message.header().arg1();
|
||||
let remote_id = message.header().arg0();
|
||||
Ok((local_id, remote_id))
|
||||
}
|
||||
|
||||
pub(crate) fn stat_with_explicit_ids(
|
||||
&mut self,
|
||||
remote_path: &str,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
) -> Result<AdbStatResponse> {
|
||||
let stat_buffer = MessageSubcommand::Stat.with_arg(remote_path.len() as u32);
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
bincode::serialize(&stat_buffer).map_err(|_e| RustADBError::ConversionError)?,
|
||||
);
|
||||
self.send_and_expect_okay(message)?;
|
||||
self.send_and_expect_okay(ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
remote_path.into(),
|
||||
))?;
|
||||
let response = self.transport.read_message()?;
|
||||
// Skip first 4 bytes as this is the literal "STAT".
|
||||
// Interesting part starts right after
|
||||
bincode::deserialize(&response.into_payload()[4..])
|
||||
.map_err(|_e| RustADBError::ConversionError)
|
||||
}
|
||||
|
||||
pub(crate) fn end_transaction(&mut self, local_id: u32, remote_id: u32) -> Result<()> {
|
||||
let quit_buffer = MessageSubcommand::Quit.with_arg(0u32);
|
||||
self.send_and_expect_okay(ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
bincode::serialize(&quit_buffer).map_err(|_e| RustADBError::ConversionError)?,
|
||||
))?;
|
||||
let _discard_close = self.transport.read_message()?;
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
38
adb_client/src/device/adb_message_device_commands.rs
Normal file
38
adb_client/src/device/adb_message_device_commands.rs
Normal file
@@ -0,0 +1,38 @@
|
||||
use crate::{models::AdbStatResponse, ADBDeviceExt, ADBMessageTransport, RebootType, Result};
|
||||
use std::io::{Read, Write};
|
||||
|
||||
use super::ADBMessageDevice;
|
||||
|
||||
impl<T: ADBMessageTransport> ADBDeviceExt for ADBMessageDevice<T> {
|
||||
fn shell_command<S: ToString, W: Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
output: W,
|
||||
) -> Result<()> {
|
||||
self.shell_command(command, output)
|
||||
}
|
||||
|
||||
fn shell<R: Read, W: Write + Send + 'static>(&mut self, reader: R, writer: W) -> Result<()> {
|
||||
self.shell(reader, writer)
|
||||
}
|
||||
|
||||
fn stat(&mut self, remote_path: &str) -> Result<AdbStatResponse> {
|
||||
self.stat(remote_path)
|
||||
}
|
||||
|
||||
fn pull<A: AsRef<str>, W: Write>(&mut self, source: A, output: W) -> Result<()> {
|
||||
self.pull(source, output)
|
||||
}
|
||||
|
||||
fn push<R: Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
self.push(stream, path)
|
||||
}
|
||||
|
||||
fn reboot(&mut self, reboot_type: RebootType) -> Result<()> {
|
||||
self.reboot(reboot_type)
|
||||
}
|
||||
|
||||
fn install<P: AsRef<std::path::Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
self.install(apk_path)
|
||||
}
|
||||
}
|
||||
112
adb_client/src/device/adb_tcp_device.rs
Normal file
112
adb_client/src/device/adb_tcp_device.rs
Normal file
@@ -0,0 +1,112 @@
|
||||
use std::net::SocketAddr;
|
||||
use std::path::Path;
|
||||
|
||||
use super::adb_message_device::ADBMessageDevice;
|
||||
use super::models::MessageCommand;
|
||||
use super::ADBTransportMessage;
|
||||
use crate::{ADBDeviceExt, ADBMessageTransport, ADBTransport, Result, RustADBError, TcpTransport};
|
||||
|
||||
/// Represent a device reached and available over USB.
|
||||
#[derive(Debug)]
|
||||
pub struct ADBTcpDevice {
|
||||
inner: ADBMessageDevice<TcpTransport>,
|
||||
}
|
||||
|
||||
impl ADBTcpDevice {
|
||||
/// Instantiate a new [`ADBTcpDevice`]
|
||||
pub fn new(address: SocketAddr) -> Result<Self> {
|
||||
let mut device = Self {
|
||||
inner: ADBMessageDevice::new(TcpTransport::new(address)?),
|
||||
};
|
||||
|
||||
device.connect()?;
|
||||
|
||||
Ok(device)
|
||||
}
|
||||
|
||||
/// Send initial connect
|
||||
pub fn connect(&mut self) -> Result<()> {
|
||||
self.get_transport_mut().connect()?;
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Cnxn,
|
||||
0x01000000,
|
||||
1048576,
|
||||
format!("host::{}\0", env!("CARGO_PKG_NAME"))
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
);
|
||||
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let message = self.get_transport_mut().read_message()?;
|
||||
|
||||
// At this point, we should have received a STLS message
|
||||
if message.header().command() != MessageCommand::Stls {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"Wrong command received {}",
|
||||
message.header().command()
|
||||
)));
|
||||
};
|
||||
|
||||
let message = ADBTransportMessage::new(MessageCommand::Stls, 1, 0, vec![]);
|
||||
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
// Upgrade TCP connection to TLS
|
||||
self.get_transport_mut().upgrade_connection()?;
|
||||
|
||||
log::debug!("Connection successfully upgraded from TCP to TLS");
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn get_transport_mut(&mut self) -> &mut TcpTransport {
|
||||
self.inner.get_transport_mut()
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBDeviceExt for ADBTcpDevice {
|
||||
fn shell_command<S: ToString, W: std::io::Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
output: W,
|
||||
) -> Result<()> {
|
||||
self.inner.shell_command(command, output)
|
||||
}
|
||||
|
||||
fn shell<R: std::io::Read, W: std::io::Write + Send + 'static>(
|
||||
&mut self,
|
||||
reader: R,
|
||||
writer: W,
|
||||
) -> Result<()> {
|
||||
self.inner.shell(reader, writer)
|
||||
}
|
||||
|
||||
fn stat(&mut self, remote_path: &str) -> Result<crate::AdbStatResponse> {
|
||||
self.inner.stat(remote_path)
|
||||
}
|
||||
|
||||
fn pull<A: AsRef<str>, W: std::io::Write>(&mut self, source: A, output: W) -> Result<()> {
|
||||
self.inner.pull(source, output)
|
||||
}
|
||||
|
||||
fn push<R: std::io::Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
self.inner.push(stream, path)
|
||||
}
|
||||
|
||||
fn reboot(&mut self, reboot_type: crate::RebootType) -> Result<()> {
|
||||
self.inner.reboot(reboot_type)
|
||||
}
|
||||
|
||||
fn install<P: AsRef<Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
self.inner.install(apk_path)
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for ADBTcpDevice {
|
||||
fn drop(&mut self) {
|
||||
// Best effort here
|
||||
let _ = self.get_transport_mut().disconnect();
|
||||
}
|
||||
}
|
||||
110
adb_client/src/device/adb_transport_message.rs
Normal file
110
adb_client/src/device/adb_transport_message.rs
Normal file
@@ -0,0 +1,110 @@
|
||||
use serde::{Deserialize, Serialize};
|
||||
|
||||
use crate::RustADBError;
|
||||
|
||||
use super::models::MessageCommand;
|
||||
|
||||
pub const AUTH_TOKEN: u32 = 1;
|
||||
pub const AUTH_SIGNATURE: u32 = 2;
|
||||
pub const AUTH_RSAPUBLICKEY: u32 = 3;
|
||||
|
||||
#[derive(Debug)]
|
||||
pub struct ADBTransportMessage {
|
||||
header: ADBTransportMessageHeader,
|
||||
payload: Vec<u8>,
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
#[repr(C)]
|
||||
pub struct ADBTransportMessageHeader {
|
||||
command: MessageCommand, /* command identifier constant */
|
||||
arg0: u32, /* first argument */
|
||||
arg1: u32, /* second argument */
|
||||
data_length: u32, /* length of payload (0 is allowed) */
|
||||
data_crc32: u32, /* crc32 of data payload */
|
||||
magic: u32, /* command ^ 0xffffffff */
|
||||
}
|
||||
|
||||
impl ADBTransportMessageHeader {
|
||||
pub fn new(command: MessageCommand, arg0: u32, arg1: u32, data: &[u8]) -> Self {
|
||||
Self {
|
||||
command,
|
||||
arg0,
|
||||
arg1,
|
||||
data_length: data.len() as u32,
|
||||
data_crc32: Self::compute_crc32(data),
|
||||
magic: Self::compute_magic(command),
|
||||
}
|
||||
}
|
||||
|
||||
pub fn command(&self) -> MessageCommand {
|
||||
self.command
|
||||
}
|
||||
|
||||
pub fn arg0(&self) -> u32 {
|
||||
self.arg0
|
||||
}
|
||||
|
||||
pub fn arg1(&self) -> u32 {
|
||||
self.arg1
|
||||
}
|
||||
|
||||
pub fn data_length(&self) -> u32 {
|
||||
self.data_length
|
||||
}
|
||||
|
||||
pub fn data_crc32(&self) -> u32 {
|
||||
self.data_crc32
|
||||
}
|
||||
|
||||
pub(crate) fn compute_crc32(data: &[u8]) -> u32 {
|
||||
data.iter().map(|&x| x as u32).sum()
|
||||
}
|
||||
|
||||
fn compute_magic(command: MessageCommand) -> u32 {
|
||||
let command_u32 = command as u32;
|
||||
command_u32 ^ 0xFFFFFFFF
|
||||
}
|
||||
|
||||
pub fn as_bytes(&self) -> Result<Vec<u8>, RustADBError> {
|
||||
bincode::serialize(&self).map_err(|_e| RustADBError::ConversionError)
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBTransportMessage {
|
||||
pub fn new(command: MessageCommand, arg0: u32, arg1: u32, data: Vec<u8>) -> Self {
|
||||
Self {
|
||||
header: ADBTransportMessageHeader::new(command, arg0, arg1, &data),
|
||||
payload: data,
|
||||
}
|
||||
}
|
||||
|
||||
pub fn from_header_and_payload(header: ADBTransportMessageHeader, payload: Vec<u8>) -> Self {
|
||||
Self { header, payload }
|
||||
}
|
||||
|
||||
pub fn check_message_integrity(&self) -> bool {
|
||||
ADBTransportMessageHeader::compute_magic(self.header.command) == self.header.magic
|
||||
&& ADBTransportMessageHeader::compute_crc32(&self.payload) == self.header.data_crc32
|
||||
}
|
||||
|
||||
pub fn header(&self) -> &ADBTransportMessageHeader {
|
||||
&self.header
|
||||
}
|
||||
|
||||
pub fn payload(&self) -> &Vec<u8> {
|
||||
&self.payload
|
||||
}
|
||||
|
||||
pub fn into_payload(self) -> Vec<u8> {
|
||||
self.payload
|
||||
}
|
||||
}
|
||||
|
||||
impl TryFrom<[u8; 24]> for ADBTransportMessageHeader {
|
||||
type Error = RustADBError;
|
||||
|
||||
fn try_from(value: [u8; 24]) -> Result<Self, Self::Error> {
|
||||
bincode::deserialize(&value).map_err(|_e| RustADBError::ConversionError)
|
||||
}
|
||||
}
|
||||
294
adb_client/src/device/adb_usb_device.rs
Normal file
294
adb_client/src/device/adb_usb_device.rs
Normal file
@@ -0,0 +1,294 @@
|
||||
use rusb::Device;
|
||||
use rusb::DeviceDescriptor;
|
||||
use rusb::UsbContext;
|
||||
use std::fs::read_to_string;
|
||||
use std::path::Path;
|
||||
use std::path::PathBuf;
|
||||
use std::time::Duration;
|
||||
|
||||
use super::adb_message_device::ADBMessageDevice;
|
||||
use super::models::MessageCommand;
|
||||
use super::{ADBRsaKey, ADBTransportMessage};
|
||||
use crate::device::adb_transport_message::{AUTH_RSAPUBLICKEY, AUTH_SIGNATURE, AUTH_TOKEN};
|
||||
use crate::ADBDeviceExt;
|
||||
use crate::ADBMessageTransport;
|
||||
use crate::ADBTransport;
|
||||
use crate::{Result, RustADBError, USBTransport};
|
||||
|
||||
pub fn read_adb_private_key<P: AsRef<Path>>(private_key_path: P) -> Result<Option<ADBRsaKey>> {
|
||||
Ok(read_to_string(private_key_path.as_ref()).map(|pk| {
|
||||
match ADBRsaKey::new_from_pkcs8(&pk) {
|
||||
Ok(pk) => Some(pk),
|
||||
Err(e) => {
|
||||
log::error!("Error while create RSA private key: {e}");
|
||||
None
|
||||
}
|
||||
}
|
||||
})?)
|
||||
}
|
||||
|
||||
/// Search for adb devices with known interface class and subclass values
|
||||
fn search_adb_devices() -> Result<Option<(u16, u16)>> {
|
||||
let mut found_devices = vec![];
|
||||
for device in rusb::devices()?.iter() {
|
||||
let Ok(des) = device.device_descriptor() else {
|
||||
continue;
|
||||
};
|
||||
if is_adb_device(&device, &des) {
|
||||
log::debug!(
|
||||
"Autodetect device {:04x}:{:04x}",
|
||||
des.vendor_id(),
|
||||
des.product_id()
|
||||
);
|
||||
found_devices.push((des.vendor_id(), des.product_id()));
|
||||
}
|
||||
}
|
||||
|
||||
match (found_devices.first(), found_devices.get(1)) {
|
||||
(None, _) => Ok(None),
|
||||
(Some(identifiers), None) => Ok(Some(*identifiers)),
|
||||
(Some((vid1, pid1)), Some((vid2, pid2))) => Err(RustADBError::DeviceNotFound(format!(
|
||||
"Found two Android devices {:04x}:{:04x} and {:04x}:{:04x}",
|
||||
vid1, pid1, vid2, pid2
|
||||
))),
|
||||
}
|
||||
}
|
||||
|
||||
fn is_adb_device<T: UsbContext>(device: &Device<T>, des: &DeviceDescriptor) -> bool {
|
||||
const ADB_CLASS: u8 = 0xff;
|
||||
|
||||
const ADB_SUBCLASS: u8 = 0x42;
|
||||
const ADB_PROTOCOL: u8 = 0x1;
|
||||
|
||||
// Some devices require choosing the file transfer mode
|
||||
// for usb debugging to take effect.
|
||||
const BULK_CLASS: u8 = 0xdc;
|
||||
const BULK_ADB_SUBCLASS: u8 = 2;
|
||||
|
||||
for n in 0..des.num_configurations() {
|
||||
let Ok(config_des) = device.config_descriptor(n) else {
|
||||
continue;
|
||||
};
|
||||
for interface in config_des.interfaces() {
|
||||
for interface_des in interface.descriptors() {
|
||||
let proto = interface_des.protocol_code();
|
||||
let class = interface_des.class_code();
|
||||
let subcl = interface_des.sub_class_code();
|
||||
if proto == ADB_PROTOCOL
|
||||
&& ((class == ADB_CLASS && subcl == ADB_SUBCLASS)
|
||||
|| (class == BULK_CLASS && subcl == BULK_ADB_SUBCLASS))
|
||||
{
|
||||
return true;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
false
|
||||
}
|
||||
|
||||
pub fn get_default_adb_key_path() -> Result<PathBuf> {
|
||||
homedir::my_home()
|
||||
.ok()
|
||||
.flatten()
|
||||
.map(|home| home.join(".android").join("adbkey"))
|
||||
.ok_or(RustADBError::NoHomeDirectory)
|
||||
}
|
||||
|
||||
/// Represent a device reached and available over USB.
|
||||
#[derive(Debug)]
|
||||
pub struct ADBUSBDevice {
|
||||
private_key: ADBRsaKey,
|
||||
inner: ADBMessageDevice<USBTransport>,
|
||||
}
|
||||
|
||||
impl ADBUSBDevice {
|
||||
/// Instantiate a new [`ADBUSBDevice`]
|
||||
pub fn new(vendor_id: u16, product_id: u16) -> Result<Self> {
|
||||
Self::new_with_custom_private_key(vendor_id, product_id, get_default_adb_key_path()?)
|
||||
}
|
||||
|
||||
/// Instantiate a new [`ADBUSBDevice`] using a custom private key path
|
||||
pub fn new_with_custom_private_key(
|
||||
vendor_id: u16,
|
||||
product_id: u16,
|
||||
private_key_path: PathBuf,
|
||||
) -> Result<Self> {
|
||||
Self::new_from_transport_inner(USBTransport::new(vendor_id, product_id)?, private_key_path)
|
||||
}
|
||||
|
||||
/// Instantiate a new [`ADBUSBDevice`] from a [`USBTransport`] and an optional private key path.
|
||||
pub fn new_from_transport(
|
||||
transport: USBTransport,
|
||||
private_key_path: Option<PathBuf>,
|
||||
) -> Result<Self> {
|
||||
let private_key_path = match private_key_path {
|
||||
Some(private_key_path) => private_key_path,
|
||||
None => get_default_adb_key_path()?,
|
||||
};
|
||||
|
||||
Self::new_from_transport_inner(transport, private_key_path)
|
||||
}
|
||||
|
||||
fn new_from_transport_inner(
|
||||
transport: USBTransport,
|
||||
private_key_path: PathBuf,
|
||||
) -> Result<Self> {
|
||||
let private_key = match read_adb_private_key(private_key_path)? {
|
||||
Some(pk) => pk,
|
||||
None => ADBRsaKey::new_random()?,
|
||||
};
|
||||
|
||||
let mut s = Self {
|
||||
private_key,
|
||||
inner: ADBMessageDevice::new(transport),
|
||||
};
|
||||
|
||||
s.connect()?;
|
||||
|
||||
Ok(s)
|
||||
}
|
||||
|
||||
/// autodetect connected ADB devices and establish a connection with the first device found
|
||||
pub fn autodetect() -> Result<Self> {
|
||||
Self::autodetect_with_custom_private_key(get_default_adb_key_path()?)
|
||||
}
|
||||
|
||||
/// autodetect connected ADB devices and establish a connection with the first device found using a custom private key path
|
||||
pub fn autodetect_with_custom_private_key(private_key_path: PathBuf) -> Result<Self> {
|
||||
match search_adb_devices()? {
|
||||
Some((vendor_id, product_id)) => {
|
||||
ADBUSBDevice::new_with_custom_private_key(vendor_id, product_id, private_key_path)
|
||||
}
|
||||
_ => Err(RustADBError::DeviceNotFound(
|
||||
"cannot find USB devices matching the signature of an ADB device".into(),
|
||||
)),
|
||||
}
|
||||
}
|
||||
|
||||
/// Send initial connect
|
||||
pub fn connect(&mut self) -> Result<()> {
|
||||
self.get_transport_mut().connect()?;
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Cnxn,
|
||||
0x01000000,
|
||||
1048576,
|
||||
format!("host::{}\0", env!("CARGO_PKG_NAME"))
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
);
|
||||
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let message = self.get_transport_mut().read_message()?;
|
||||
|
||||
// At this point, we should have received either:
|
||||
// - an AUTH message with arg0 == 1
|
||||
// - a CNXN message
|
||||
let auth_message = match message.header().command() {
|
||||
MessageCommand::Auth if message.header().arg0() == AUTH_TOKEN => message,
|
||||
MessageCommand::Auth if message.header().arg0() != AUTH_TOKEN => {
|
||||
return Err(RustADBError::ADBRequestFailed(
|
||||
"Received AUTH message with type != 1".into(),
|
||||
))
|
||||
}
|
||||
c => {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"Wrong command received {}",
|
||||
c
|
||||
)))
|
||||
}
|
||||
};
|
||||
|
||||
let sign = self.private_key.sign(auth_message.into_payload())?;
|
||||
|
||||
let message = ADBTransportMessage::new(MessageCommand::Auth, AUTH_SIGNATURE, 0, sign);
|
||||
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let received_response = self.get_transport_mut().read_message()?;
|
||||
|
||||
if received_response.header().command() == MessageCommand::Cnxn {
|
||||
log::info!(
|
||||
"Authentication OK, device info {}",
|
||||
String::from_utf8(received_response.into_payload())?
|
||||
);
|
||||
return Ok(());
|
||||
}
|
||||
|
||||
let mut pubkey = self.private_key.android_pubkey_encode()?.into_bytes();
|
||||
pubkey.push(b'\0');
|
||||
|
||||
let message = ADBTransportMessage::new(MessageCommand::Auth, AUTH_RSAPUBLICKEY, 0, pubkey);
|
||||
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let response = self
|
||||
.get_transport_mut()
|
||||
.read_message_with_timeout(Duration::from_secs(10))?;
|
||||
|
||||
match response.header().command() {
|
||||
MessageCommand::Cnxn => log::info!(
|
||||
"Authentication OK, device info {}",
|
||||
String::from_utf8(response.into_payload())?
|
||||
),
|
||||
_ => {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"wrong response {}",
|
||||
response.header().command()
|
||||
)))
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn get_transport_mut(&mut self) -> &mut USBTransport {
|
||||
self.inner.get_transport_mut()
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBDeviceExt for ADBUSBDevice {
|
||||
fn shell_command<S: ToString, W: std::io::Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
output: W,
|
||||
) -> Result<()> {
|
||||
self.inner.shell_command(command, output)
|
||||
}
|
||||
|
||||
fn shell<R: std::io::Read, W: std::io::Write + Send + 'static>(
|
||||
&mut self,
|
||||
reader: R,
|
||||
writer: W,
|
||||
) -> Result<()> {
|
||||
self.inner.shell(reader, writer)
|
||||
}
|
||||
|
||||
fn stat(&mut self, remote_path: &str) -> Result<crate::AdbStatResponse> {
|
||||
self.inner.stat(remote_path)
|
||||
}
|
||||
|
||||
fn pull<A: AsRef<str>, W: std::io::Write>(&mut self, source: A, output: W) -> Result<()> {
|
||||
self.inner.pull(source, output)
|
||||
}
|
||||
|
||||
fn push<R: std::io::Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
self.inner.push(stream, path)
|
||||
}
|
||||
|
||||
fn reboot(&mut self, reboot_type: crate::RebootType) -> Result<()> {
|
||||
self.inner.reboot(reboot_type)
|
||||
}
|
||||
|
||||
fn install<P: AsRef<Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
self.inner.install(apk_path)
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for ADBUSBDevice {
|
||||
fn drop(&mut self) {
|
||||
// Best effort here
|
||||
let _ = self.get_transport_mut().disconnect();
|
||||
}
|
||||
}
|
||||
59
adb_client/src/device/commands/install.rs
Normal file
59
adb_client/src/device/commands/install.rs
Normal file
@@ -0,0 +1,59 @@
|
||||
use std::fs::File;
|
||||
|
||||
use rand::Rng;
|
||||
|
||||
use crate::{
|
||||
device::{
|
||||
adb_message_device::ADBMessageDevice, ADBTransportMessage, MessageCommand, MessageWriter,
|
||||
},
|
||||
utils::check_extension_is_apk,
|
||||
ADBMessageTransport, Result,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
pub(crate) fn install<P: AsRef<std::path::Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
let mut apk_file = File::open(&apk_path)?;
|
||||
|
||||
check_extension_is_apk(&apk_path)?;
|
||||
|
||||
let file_size = apk_file.metadata()?.len();
|
||||
|
||||
let mut rng = rand::thread_rng();
|
||||
|
||||
let local_id = rng.gen();
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Open,
|
||||
local_id,
|
||||
0,
|
||||
format!("exec:cmd package 'install' -S {}\0", file_size)
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
);
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let response = self.get_transport_mut().read_message()?;
|
||||
let remote_id = response.header().arg0();
|
||||
|
||||
let transport = self.get_transport().clone();
|
||||
|
||||
let mut writer = MessageWriter::new(transport, local_id, remote_id);
|
||||
|
||||
std::io::copy(&mut apk_file, &mut writer)?;
|
||||
|
||||
let final_status = self.get_transport_mut().read_message()?;
|
||||
|
||||
match final_status.into_payload().as_slice() {
|
||||
b"Success\n" => {
|
||||
log::info!(
|
||||
"APK file {} successfully installed",
|
||||
apk_path.as_ref().display()
|
||||
);
|
||||
Ok(())
|
||||
}
|
||||
d => Err(crate::RustADBError::ADBRequestFailed(String::from_utf8(
|
||||
d.to_vec(),
|
||||
)?)),
|
||||
}
|
||||
}
|
||||
}
|
||||
6
adb_client/src/device/commands/mod.rs
Normal file
6
adb_client/src/device/commands/mod.rs
Normal file
@@ -0,0 +1,6 @@
|
||||
mod install;
|
||||
mod pull;
|
||||
mod push;
|
||||
mod reboot;
|
||||
mod shell;
|
||||
mod stat;
|
||||
49
adb_client/src/device/commands/pull.rs
Normal file
49
adb_client/src/device/commands/pull.rs
Normal file
@@ -0,0 +1,49 @@
|
||||
use std::io::Write;
|
||||
|
||||
use crate::{
|
||||
device::{
|
||||
adb_message_device::ADBMessageDevice, models::MessageSubcommand, ADBTransportMessage,
|
||||
MessageCommand,
|
||||
},
|
||||
ADBMessageTransport, Result, RustADBError,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
pub(crate) fn pull<A: AsRef<str>, W: Write>(&mut self, source: A, output: W) -> Result<()> {
|
||||
let (local_id, remote_id) = self.begin_synchronization()?;
|
||||
let source = source.as_ref();
|
||||
|
||||
let adb_stat_response = self.stat_with_explicit_ids(source, local_id, remote_id)?;
|
||||
|
||||
if adb_stat_response.file_perm == 0 {
|
||||
return Err(RustADBError::UnknownResponseType(
|
||||
"mode is 0: source file does not exist".to_string(),
|
||||
));
|
||||
}
|
||||
|
||||
self.get_transport_mut().write_message_with_timeout(
|
||||
ADBTransportMessage::new(MessageCommand::Okay, local_id, remote_id, "".into()),
|
||||
std::time::Duration::from_secs(4),
|
||||
)?;
|
||||
|
||||
let recv_buffer = MessageSubcommand::Recv.with_arg(source.len() as u32);
|
||||
let recv_buffer =
|
||||
bincode::serialize(&recv_buffer).map_err(|_e| RustADBError::ConversionError)?;
|
||||
self.send_and_expect_okay(ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
recv_buffer,
|
||||
))?;
|
||||
self.send_and_expect_okay(ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
source.into(),
|
||||
))?;
|
||||
|
||||
self.recv_file(local_id, remote_id, output)?;
|
||||
self.end_transaction(local_id, remote_id)?;
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
35
adb_client/src/device/commands/push.rs
Normal file
35
adb_client/src/device/commands/push.rs
Normal file
@@ -0,0 +1,35 @@
|
||||
use std::io::Read;
|
||||
|
||||
use crate::{
|
||||
device::{
|
||||
adb_message_device::ADBMessageDevice, ADBTransportMessage, MessageCommand,
|
||||
MessageSubcommand,
|
||||
},
|
||||
ADBMessageTransport, Result, RustADBError,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
pub(crate) fn push<R: Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
let (local_id, remote_id) = self.begin_synchronization()?;
|
||||
|
||||
let path_header = format!("{},0777", path.as_ref());
|
||||
|
||||
let send_buffer = MessageSubcommand::Send.with_arg(path_header.len() as u32);
|
||||
let mut send_buffer =
|
||||
bincode::serialize(&send_buffer).map_err(|_e| RustADBError::ConversionError)?;
|
||||
send_buffer.append(&mut path_header.as_bytes().to_vec());
|
||||
|
||||
self.send_and_expect_okay(ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
local_id,
|
||||
remote_id,
|
||||
send_buffer,
|
||||
))?;
|
||||
|
||||
self.push_file(local_id, remote_id, stream)?;
|
||||
|
||||
self.end_transaction(local_id, remote_id)?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
28
adb_client/src/device/commands/reboot.rs
Normal file
28
adb_client/src/device/commands/reboot.rs
Normal file
@@ -0,0 +1,28 @@
|
||||
use rand::Rng;
|
||||
|
||||
use crate::{
|
||||
device::{adb_message_device::ADBMessageDevice, ADBTransportMessage, MessageCommand},
|
||||
ADBMessageTransport, RebootType, Result, RustADBError,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
pub(crate) fn reboot(&mut self, reboot_type: RebootType) -> Result<()> {
|
||||
let mut rng = rand::thread_rng();
|
||||
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Open,
|
||||
rng.gen(), // Our 'local-id'
|
||||
0,
|
||||
format!("reboot:{}\0", reboot_type).as_bytes().to_vec(),
|
||||
);
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let message = self.get_transport_mut().read_message()?;
|
||||
|
||||
if message.header().command() != MessageCommand::Okay {
|
||||
return Err(RustADBError::ADBShellNotSupported);
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
112
adb_client/src/device/commands/shell.rs
Normal file
112
adb_client/src/device/commands/shell.rs
Normal file
@@ -0,0 +1,112 @@
|
||||
use rand::Rng;
|
||||
use std::io::{Read, Write};
|
||||
|
||||
use crate::device::ShellMessageWriter;
|
||||
use crate::Result;
|
||||
use crate::{
|
||||
device::{ADBMessageDevice, ADBTransportMessage, MessageCommand},
|
||||
ADBMessageTransport, RustADBError,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
/// Runs 'command' in a shell on the device, and write its output and error streams into [`output`].
|
||||
pub(crate) fn shell_command<S: ToString, W: Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
mut output: W,
|
||||
) -> Result<()> {
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Open,
|
||||
1,
|
||||
0,
|
||||
format!(
|
||||
"shell:{}\0",
|
||||
command
|
||||
.into_iter()
|
||||
.map(|v| v.to_string())
|
||||
.collect::<Vec<_>>()
|
||||
.join(" "),
|
||||
)
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
);
|
||||
self.get_transport_mut().write_message(message)?;
|
||||
|
||||
let response = self.get_transport_mut().read_message()?;
|
||||
if response.header().command() != MessageCommand::Okay {
|
||||
return Err(RustADBError::ADBRequestFailed(format!(
|
||||
"wrong command {}",
|
||||
response.header().command()
|
||||
)));
|
||||
}
|
||||
|
||||
loop {
|
||||
let response = self.get_transport_mut().read_message()?;
|
||||
if response.header().command() != MessageCommand::Write {
|
||||
break;
|
||||
}
|
||||
|
||||
output.write_all(&response.into_payload())?;
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Starts an interactive shell session on the device.
|
||||
/// Input data is read from [reader] and write to [writer].
|
||||
/// [W] has a 'static bound as it is internally used in a thread.
|
||||
pub(crate) fn shell<R: Read, W: Write + Send + 'static>(
|
||||
&mut self,
|
||||
mut reader: R,
|
||||
mut writer: W,
|
||||
) -> Result<()> {
|
||||
let sync_directive = "shell:\0";
|
||||
|
||||
let mut rng = rand::thread_rng();
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Open,
|
||||
rng.gen(), /* Our 'local-id' */
|
||||
0,
|
||||
sync_directive.into(),
|
||||
);
|
||||
let message = self.send_and_expect_okay(message)?;
|
||||
let local_id = message.header().arg1();
|
||||
let remote_id = message.header().arg0();
|
||||
|
||||
let mut transport = self.get_transport().clone();
|
||||
|
||||
// Reading thread, reads response from adbd
|
||||
std::thread::spawn(move || -> Result<()> {
|
||||
loop {
|
||||
let message = transport.read_message()?;
|
||||
|
||||
// Acknowledge for more data
|
||||
let response =
|
||||
ADBTransportMessage::new(MessageCommand::Okay, local_id, remote_id, vec![]);
|
||||
transport.write_message(response)?;
|
||||
|
||||
match message.header().command() {
|
||||
MessageCommand::Write => {}
|
||||
MessageCommand::Okay => continue,
|
||||
_ => return Err(RustADBError::ADBShellNotSupported),
|
||||
}
|
||||
|
||||
writer.write_all(&message.into_payload())?;
|
||||
writer.flush()?;
|
||||
}
|
||||
});
|
||||
|
||||
let transport = self.get_transport().clone();
|
||||
let mut shell_writer = ShellMessageWriter::new(transport, local_id, remote_id);
|
||||
|
||||
// Read from given reader (that could be stdin e.g), and write content to device adbd
|
||||
if let Err(e) = std::io::copy(&mut reader, &mut shell_writer) {
|
||||
match e.kind() {
|
||||
std::io::ErrorKind::BrokenPipe => return Ok(()),
|
||||
_ => return Err(RustADBError::IOError(e)),
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
12
adb_client/src/device/commands/stat.rs
Normal file
12
adb_client/src/device/commands/stat.rs
Normal file
@@ -0,0 +1,12 @@
|
||||
use crate::{
|
||||
device::adb_message_device::ADBMessageDevice, ADBMessageTransport, AdbStatResponse, Result,
|
||||
};
|
||||
|
||||
impl<T: ADBMessageTransport> ADBMessageDevice<T> {
|
||||
pub(crate) fn stat(&mut self, remote_path: &str) -> Result<AdbStatResponse> {
|
||||
let (local_id, remote_id) = self.begin_synchronization()?;
|
||||
let adb_stat_response = self.stat_with_explicit_ids(remote_path, local_id, remote_id)?;
|
||||
self.end_transaction(local_id, remote_id)?;
|
||||
Ok(adb_stat_response)
|
||||
}
|
||||
}
|
||||
53
adb_client/src/device/message_writer.rs
Normal file
53
adb_client/src/device/message_writer.rs
Normal file
@@ -0,0 +1,53 @@
|
||||
use std::io::{ErrorKind, Write};
|
||||
|
||||
use crate::ADBMessageTransport;
|
||||
|
||||
use super::{ADBTransportMessage, MessageCommand};
|
||||
|
||||
/// [`Write`] trait implementation to hide underlying ADB protocol write logic.
|
||||
///
|
||||
/// Read received responses to check that message has been correctly received.
|
||||
pub struct MessageWriter<T: ADBMessageTransport> {
|
||||
transport: T,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
}
|
||||
|
||||
impl<T: ADBMessageTransport> MessageWriter<T> {
|
||||
pub fn new(transport: T, local_id: u32, remote_id: u32) -> Self {
|
||||
Self {
|
||||
transport,
|
||||
local_id,
|
||||
remote_id,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<T: ADBMessageTransport> Write for MessageWriter<T> {
|
||||
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
self.local_id,
|
||||
self.remote_id,
|
||||
buf.to_vec(),
|
||||
);
|
||||
self.transport
|
||||
.write_message(message)
|
||||
.map_err(|e| std::io::Error::new(std::io::ErrorKind::InvalidData, e))?;
|
||||
|
||||
match self.transport.read_message() {
|
||||
Ok(response) => match response.header().command() {
|
||||
MessageCommand::Okay => Ok(buf.len()),
|
||||
c => Err(std::io::Error::new(
|
||||
ErrorKind::Other,
|
||||
format!("wrong response received: {c}"),
|
||||
)),
|
||||
},
|
||||
Err(e) => Err(std::io::Error::new(ErrorKind::Other, e)),
|
||||
}
|
||||
}
|
||||
|
||||
fn flush(&mut self) -> std::io::Result<()> {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
17
adb_client/src/device/mod.rs
Normal file
17
adb_client/src/device/mod.rs
Normal file
@@ -0,0 +1,17 @@
|
||||
mod adb_message_device;
|
||||
mod adb_message_device_commands;
|
||||
mod adb_tcp_device;
|
||||
mod adb_transport_message;
|
||||
mod adb_usb_device;
|
||||
mod commands;
|
||||
mod message_writer;
|
||||
mod models;
|
||||
mod shell_message_writer;
|
||||
|
||||
use adb_message_device::ADBMessageDevice;
|
||||
pub use adb_tcp_device::ADBTcpDevice;
|
||||
pub use adb_transport_message::{ADBTransportMessage, ADBTransportMessageHeader};
|
||||
pub use adb_usb_device::{get_default_adb_key_path, ADBUSBDevice};
|
||||
pub use message_writer::MessageWriter;
|
||||
pub use models::{ADBRsaKey, MessageCommand, MessageSubcommand};
|
||||
pub use shell_message_writer::ShellMessageWriter;
|
||||
175
adb_client/src/device/models/adb_rsa_key.rs
Normal file
175
adb_client/src/device/models/adb_rsa_key.rs
Normal file
@@ -0,0 +1,175 @@
|
||||
use crate::{Result, RustADBError};
|
||||
use base64::{engine::general_purpose::STANDARD, Engine};
|
||||
use num_bigint::{BigUint, ModInverse};
|
||||
use num_traits::cast::ToPrimitive;
|
||||
use num_traits::FromPrimitive;
|
||||
use rand::rngs::OsRng;
|
||||
use rsa::pkcs8::DecodePrivateKey;
|
||||
use rsa::traits::PublicKeyParts;
|
||||
use rsa::{Pkcs1v15Sign, RsaPrivateKey};
|
||||
|
||||
const ADB_PRIVATE_KEY_SIZE: usize = 2048;
|
||||
const ANDROID_PUBKEY_MODULUS_SIZE_WORDS: u32 = 64;
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Debug, Default)]
|
||||
/// Internal ADB representation of a public key
|
||||
struct ADBRsaInternalPublicKey {
|
||||
pub modulus_size_words: u32,
|
||||
pub n0inv: u32,
|
||||
pub modulus: BigUint,
|
||||
pub rr: Vec<u8>,
|
||||
pub exponent: u32,
|
||||
}
|
||||
|
||||
impl ADBRsaInternalPublicKey {
|
||||
pub fn new(exponent: &BigUint, modulus: &BigUint) -> Result<Self> {
|
||||
Ok(Self {
|
||||
modulus_size_words: ANDROID_PUBKEY_MODULUS_SIZE_WORDS,
|
||||
exponent: exponent.to_u32().ok_or(RustADBError::ConversionError)?,
|
||||
modulus: modulus.clone(),
|
||||
..Default::default()
|
||||
})
|
||||
}
|
||||
|
||||
pub fn into_bytes(mut self) -> Vec<u8> {
|
||||
let mut bytes: Vec<u8> = Vec::new();
|
||||
bytes.append(&mut self.modulus_size_words.to_le_bytes().to_vec());
|
||||
bytes.append(&mut self.n0inv.to_le_bytes().to_vec());
|
||||
bytes.append(&mut self.modulus.to_bytes_le());
|
||||
bytes.append(&mut self.rr);
|
||||
bytes.append(&mut self.exponent.to_le_bytes().to_vec());
|
||||
|
||||
bytes
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
pub struct ADBRsaKey {
|
||||
private_key: RsaPrivateKey,
|
||||
}
|
||||
|
||||
impl ADBRsaKey {
|
||||
pub fn new_random() -> Result<Self> {
|
||||
Ok(Self {
|
||||
private_key: RsaPrivateKey::new(&mut OsRng, ADB_PRIVATE_KEY_SIZE)?,
|
||||
})
|
||||
}
|
||||
|
||||
pub fn new_from_pkcs8(pkcs8_content: &str) -> Result<Self> {
|
||||
Ok(ADBRsaKey {
|
||||
private_key: RsaPrivateKey::from_pkcs8_pem(pkcs8_content)?,
|
||||
})
|
||||
}
|
||||
|
||||
pub fn android_pubkey_encode(&self) -> Result<String> {
|
||||
// Helped from project: https://github.com/hajifkd/webadb
|
||||
// Source code: https://android.googlesource.com/platform/system/core/+/refs/heads/main/libcrypto_utils/android_pubkey.cpp
|
||||
// Useful function `android_pubkey_encode()`
|
||||
let mut adb_rsa_pubkey =
|
||||
ADBRsaInternalPublicKey::new(self.private_key.e(), self.private_key.n())?;
|
||||
|
||||
// r32 = 2 ^ 32
|
||||
let r32 = BigUint::from_u64(1 << 32).ok_or(RustADBError::ConversionError)?;
|
||||
|
||||
// r = 2 ^ rsa_size = 2 ^ 2048
|
||||
let r = set_bit(ADB_PRIVATE_KEY_SIZE)?;
|
||||
|
||||
// rr = r ^ 2 mod N
|
||||
let rr = r.modpow(&BigUint::from(2u32), &adb_rsa_pubkey.modulus);
|
||||
adb_rsa_pubkey.rr = rr.to_bytes_le();
|
||||
|
||||
// rem = N[0]
|
||||
let rem = &adb_rsa_pubkey.modulus % &r32;
|
||||
|
||||
// n0inv = -1 / rem mod r32
|
||||
let n0inv = rem
|
||||
.mod_inverse(&r32)
|
||||
.and_then(|v| v.to_biguint())
|
||||
.ok_or(RustADBError::ConversionError)?;
|
||||
|
||||
// BN_sub(n0inv, r32, n0inv)
|
||||
adb_rsa_pubkey.n0inv = (r32 - n0inv)
|
||||
.to_u32()
|
||||
.ok_or(RustADBError::ConversionError)?;
|
||||
|
||||
Ok(self.encode_public_key(adb_rsa_pubkey.into_bytes()))
|
||||
}
|
||||
|
||||
fn encode_public_key(&self, pub_key: Vec<u8>) -> String {
|
||||
let mut encoded = STANDARD.encode(pub_key);
|
||||
encoded.push(' ');
|
||||
encoded.push_str(&format!("adb_client@{}", env!("CARGO_PKG_VERSION")));
|
||||
|
||||
encoded
|
||||
}
|
||||
|
||||
pub fn sign(&self, msg: impl AsRef<[u8]>) -> Result<Vec<u8>> {
|
||||
Ok(self
|
||||
.private_key
|
||||
.sign(Pkcs1v15Sign::new::<sha1::Sha1>(), msg.as_ref())?)
|
||||
}
|
||||
}
|
||||
|
||||
fn set_bit(n: usize) -> Result<BigUint> {
|
||||
BigUint::parse_bytes(
|
||||
&{
|
||||
let mut bits = vec![b'1'];
|
||||
bits.append(&mut vec![b'0'; n]);
|
||||
bits
|
||||
}[..],
|
||||
2,
|
||||
)
|
||||
.ok_or(RustADBError::ConversionError)
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_pubkey_gen() {
|
||||
const DEFAULT_PRIV_KEY: &'static str = r"-----BEGIN PRIVATE KEY-----
|
||||
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC4Dyn85cxDJnjM
|
||||
uYXQl/w469MDKdlGdviLfmFMWeYLVfL2Mz1AVyvKqscrtlhbbgMQ/M+3lDvEdHS0
|
||||
14RIGAwWRtrlTTmhLvM2/IO+eSKSYeCrCVc4KLG3E3WRryUXbs2ynA29xjTJVw+Z
|
||||
xYxDyn/tAYPEyMm4v+HIJHcOtRzxtO2vjMJ2vBT/ywYxjhncXbFSO09q2E4XrHli
|
||||
SIPyO82hZgCkpzTZRp+nyA17TYuV9++mvUr9lWH9RbC+o8EF3yitlBsE2uXr97EV
|
||||
i2Qy8CE7FIxsihXlukppwKRuz+1rJrvmZPTn49ZS+sIS99WE9GoCpsyQvTpvehrM
|
||||
SIDRsVZPAgMBAAECggEAWNXAzzXeS36zCSR1yILCknqHotw86Pyc4z7BGUe+dzQp
|
||||
itiaNIaeNTgN3zQoGyDSzA0o+BLMcfo/JdVrHBy3IL1cAxYtvXTaoGxp7bGrlPk2
|
||||
pXZhqVJCy/jRYtokzdWF5DHbk/+pFJA3kGE/XKzM54g2n/DFI61A/QdUiz2w1ZtI
|
||||
vc5cM08EM8B/TSI3SeWB8zkh5SlIuLsFO2J2+tCak6PdFfKOVIrFv9dKJYLxx+59
|
||||
+edZamw2EvNlnl/sewgUk0gaZvQKVf4ivHyM+KSHuV4RFfiLvGuVcyA6XhSjztsG
|
||||
EA++jDHP5ib/Izes7UK09v9y7kow+z6vUtnDDQOvgQKBgQD8WWAn7FQt9aziCw19
|
||||
gZynzHG1bXI7uuEVSneuA3UwJImmDu8W+Qb9YL9Dc2nV0M5pGGdXKi2jzq8gPar6
|
||||
GPAmy7TOlov6Nm0pbMXTAfuovG+gIXxelp3US3FvyRupi0/7UQRRwvetFYbDFwJX
|
||||
ydF5uEtZdGSHAjPeU5FLq6tBwQKBgQC6uN0JwwZn+eaxguyKOXvp0KykhFI0HI1A
|
||||
MBDZ1uuKt6OW5+r9NeQtTLctGlNKVQ8wz+Wr0C/nLGIIv4lySS9WFyc5/FnFhDdy
|
||||
LsEi6whcca4vq3jsMOukvQGFnERsou4LqBEI1Es7jjeeEq+/8WnNTi6Y1flZ6UAp
|
||||
YAOeFI98DwKBgQDvyfHgHeajwZalOQF5qGb24AOQ9c4dyefGNnvhA/IgbCfMftZc
|
||||
iwhETuGQM6R3A7KQFRtlrXOu+2BYD6Ffg8D37IwD3vRmL7+tJGoapwC/B0g+7nLi
|
||||
4tZY+9Nv+LbrdbDry8GB+/UkKJdk3IFicCk4M5KOD1bTH5mwAtLHB/p1QQKBgDHi
|
||||
k8M45GxA+p4wMUvYgb987bLiWyfq/N3KOaZJYhJkb4MwoLpXfIeRuFqHbvsr8GwF
|
||||
DwIxE6s6U1KtAWaUIN5qPyOhxMYdRcbusNDIZCp2gKfhsuO/SiVwDYkJr8oqWVip
|
||||
5SsrtJHLtBY6PdQVBkRAf/h7KiwYQfkL2suQCKmHAoGBAJAkYImBYPHuRcnSXikn
|
||||
xGDK/moPvzs0CjdPlRcEN+Myy/G0FUrOaC0FcpNoJOdQSYz3F6URA4nX+zj6Ie7G
|
||||
CNkECiepaGyquQaffwR1CAi8dH6biJjlTQWQPFcCLA0hvernWo3eaSfiL7fHyym+
|
||||
ile69MHFENUePSpuRSiF3Z02
|
||||
-----END PRIVATE KEY-----";
|
||||
let priv_key =
|
||||
ADBRsaKey::new_from_pkcs8(DEFAULT_PRIV_KEY).expect("cannot create rsa key from data");
|
||||
let pub_key = priv_key
|
||||
.android_pubkey_encode()
|
||||
.expect("cannot encode public key");
|
||||
let pub_key_adb = "\
|
||||
QAAAAFH/pU9PVrHRgEjMGnpvOr2QzKYCavSE1fcSwvpS1uPn9GTmuyZr7c9up\
|
||||
MBpSrrlFYpsjBQ7IfAyZIsVsffr5doEG5StKN8FwaO+sEX9YZX9Sr2m7/eVi0\
|
||||
17Dcinn0bZNKekAGahzTvyg0hieawXTthqTztSsV3cGY4xBsv/FLx2woyv7bT\
|
||||
xHLUOdyTI4b+4ycjEgwHtf8pDjMWZD1fJNMa9DZyyzW4XJa+RdRO3sSg4Vwmr\
|
||||
4GGSInm+g/w28y6hOU3l2kYWDBhIhNe0dHTEO5S3z/wQA25bWLYrx6rKK1dAP\
|
||||
TP28lUL5llMYX6L+HZG2SkD0+s4/JfQhbnMeCZDzOX8KQ+4ThLy/gDTqCSTjj\
|
||||
ic8BykdUIqYPwAjBMgQwLOLY5WNJMpjGlFINRcCGhvFFZ73sJTLerECuV/Oae\
|
||||
nFRcORwnGIRgMrYXj4tjmxJC7sq3cfNX96YIcSCDE9SZFdlKXVK8Jc4YMLGF3\
|
||||
MI8k1KoTby34uaIyxPJvwM1WR4Rdj60fwMyikFXNaOR2fPteZ3UMBA7CMrOEm\
|
||||
9iYjntyEppA4hQXIO1TWTzkA/Kfl1i67k5NuLIQdhPFEc5ox5IYVHusauPQ7d\
|
||||
Awu6BlgK37TUn0JdK0Z6Z4RaEIaNiEI0d5CoP6zQKV2QQnlscYpdsaUW5t9/F\
|
||||
LioVXPwrz0tx35JyIUZPPYwEAAQA= ";
|
||||
assert_eq!(&pub_key[..pub_key_adb.len()], pub_key_adb);
|
||||
}
|
||||
65
adb_client/src/device/models/message_commands.rs
Normal file
65
adb_client/src/device/models/message_commands.rs
Normal file
@@ -0,0 +1,65 @@
|
||||
use serde::{Deserialize, Serialize};
|
||||
use serde_repr::{Deserialize_repr, Serialize_repr};
|
||||
use std::fmt::Display;
|
||||
|
||||
#[derive(Clone, Copy, Debug, Eq, PartialEq, Serialize_repr, Deserialize_repr)]
|
||||
#[repr(u32)]
|
||||
pub enum MessageCommand {
|
||||
/// Connect to a device
|
||||
Cnxn = 0x4e584e43,
|
||||
/// Close connection to a device
|
||||
Clse = 0x45534c43,
|
||||
/// Device ask for authentication
|
||||
Auth = 0x48545541,
|
||||
/// Open a data connection
|
||||
Open = 0x4e45504f,
|
||||
/// Write data to connection
|
||||
Write = 0x45545257,
|
||||
/// Server understood the message
|
||||
Okay = 0x59414b4f,
|
||||
// Sync 0x434e5953
|
||||
/// Start a connection using TLS
|
||||
Stls = 0x534C5453,
|
||||
}
|
||||
|
||||
#[derive(Debug, Eq, PartialEq, Copy, Clone, Serialize_repr, Deserialize_repr)]
|
||||
#[repr(u32)]
|
||||
pub enum MessageSubcommand {
|
||||
Stat = 0x54415453,
|
||||
Send = 0x444E4553,
|
||||
Recv = 0x56434552,
|
||||
Quit = 0x54495551,
|
||||
Fail = 0x4c494146,
|
||||
Done = 0x454e4f44,
|
||||
Data = 0x41544144,
|
||||
List = 0x5453494c,
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
pub struct SubcommandWithArg {
|
||||
subcommand: MessageSubcommand,
|
||||
arg: u32,
|
||||
}
|
||||
|
||||
impl MessageSubcommand {
|
||||
pub fn with_arg(self, arg: u32) -> SubcommandWithArg {
|
||||
SubcommandWithArg {
|
||||
subcommand: self,
|
||||
arg,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for MessageCommand {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
match self {
|
||||
MessageCommand::Cnxn => write!(f, "CNXN"),
|
||||
MessageCommand::Clse => write!(f, "CLSE"),
|
||||
MessageCommand::Auth => write!(f, "AUTH"),
|
||||
MessageCommand::Open => write!(f, "OPEN"),
|
||||
MessageCommand::Write => write!(f, "WRTE"),
|
||||
MessageCommand::Okay => write!(f, "OKAY"),
|
||||
MessageCommand::Stls => write!(f, "STLS"),
|
||||
}
|
||||
}
|
||||
}
|
||||
5
adb_client/src/device/models/mod.rs
Normal file
5
adb_client/src/device/models/mod.rs
Normal file
@@ -0,0 +1,5 @@
|
||||
mod adb_rsa_key;
|
||||
mod message_commands;
|
||||
|
||||
pub use adb_rsa_key::ADBRsaKey;
|
||||
pub use message_commands::{MessageCommand, MessageSubcommand};
|
||||
41
adb_client/src/device/shell_message_writer.rs
Normal file
41
adb_client/src/device/shell_message_writer.rs
Normal file
@@ -0,0 +1,41 @@
|
||||
use std::io::Write;
|
||||
|
||||
use crate::ADBMessageTransport;
|
||||
|
||||
use super::{models::MessageCommand, ADBTransportMessage};
|
||||
|
||||
/// [`Write`] trait implementation to hide underlying ADB protocol write logic for shell commands.
|
||||
pub struct ShellMessageWriter<T: ADBMessageTransport> {
|
||||
transport: T,
|
||||
local_id: u32,
|
||||
remote_id: u32,
|
||||
}
|
||||
|
||||
impl<T: ADBMessageTransport> ShellMessageWriter<T> {
|
||||
pub fn new(transport: T, local_id: u32, remote_id: u32) -> Self {
|
||||
Self {
|
||||
transport,
|
||||
local_id,
|
||||
remote_id,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<T: ADBMessageTransport> Write for ShellMessageWriter<T> {
|
||||
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
||||
let message = ADBTransportMessage::new(
|
||||
MessageCommand::Write,
|
||||
self.local_id,
|
||||
self.remote_id,
|
||||
buf.to_vec(),
|
||||
);
|
||||
self.transport
|
||||
.write_message(message)
|
||||
.map_err(|e| std::io::Error::new(std::io::ErrorKind::InvalidData, e))?;
|
||||
Ok(buf.len())
|
||||
}
|
||||
|
||||
fn flush(&mut self) -> std::io::Result<()> {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
@@ -1,15 +1,14 @@
|
||||
use std::net::{Ipv4Addr, SocketAddrV4};
|
||||
use std::{
|
||||
net::{Ipv4Addr, SocketAddrV4},
|
||||
sync::LazyLock,
|
||||
};
|
||||
|
||||
use crate::{ADBTransport, Result, RustADBError, TCPEmulatorTransport};
|
||||
use lazy_static::lazy_static;
|
||||
use crate::{ADBServerDevice, ADBTransport, Result, RustADBError, TCPEmulatorTransport};
|
||||
use regex::Regex;
|
||||
|
||||
use super::ADBServerDevice;
|
||||
|
||||
lazy_static! {
|
||||
pub static ref EMULATOR_REGEX: Regex =
|
||||
Regex::new("^emulator-(?P<port>\\d+)$").expect("wrong syntax for emulator regex");
|
||||
}
|
||||
static EMULATOR_REGEX: LazyLock<Regex> = LazyLock::new(|| {
|
||||
Regex::new("^emulator-(?P<port>\\d+)$").expect("wrong syntax for emulator regex")
|
||||
});
|
||||
|
||||
/// Represents an emulator connected to the ADB server.
|
||||
#[derive(Debug)]
|
||||
3
adb_client/src/emulator_device/mod.rs
Normal file
3
adb_client/src/emulator_device/mod.rs
Normal file
@@ -0,0 +1,3 @@
|
||||
mod adb_emulator_device;
|
||||
mod commands;
|
||||
pub use adb_emulator_device::ADBEmulatorDevice;
|
||||
@@ -54,7 +54,70 @@ pub enum RustADBError {
|
||||
/// An error occurred when converting framebuffer content
|
||||
#[error("Cannot convert framebuffer into image")]
|
||||
FramebufferConversionError,
|
||||
/// Unimplemented framebuffer image version
|
||||
#[error("Unimplemented framebuffer image version: {0}")]
|
||||
UnimplementedFramebufferImageVersion(u32),
|
||||
/// An error occurred while getting user's home directory
|
||||
#[error(transparent)]
|
||||
HomeError(#[from] homedir::GetHomeError),
|
||||
/// Cannot get home directory
|
||||
#[error("Cannot get home directory")]
|
||||
NoHomeDirectory,
|
||||
/// Generic USB error
|
||||
#[error(transparent)]
|
||||
UsbError(#[from] rusb::Error),
|
||||
/// USB device not found
|
||||
#[error("USB Device not found: {0} {1}")]
|
||||
USBDeviceNotFound(u16, u16),
|
||||
/// No descriptor found
|
||||
#[error("No USB descriptor found")]
|
||||
USBNoDescriptorFound,
|
||||
/// Integrity of the received message cannot be validated
|
||||
#[error("Invalid integrity. Expected CRC32 {0}, got {1}")]
|
||||
InvalidIntegrity(u32, u32),
|
||||
/// Error while decoding base64 data
|
||||
#[error(transparent)]
|
||||
Base64DecodeError(#[from] base64::DecodeError),
|
||||
/// Error while encoding base64 data
|
||||
#[error(transparent)]
|
||||
Base64EncodeError(#[from] base64::EncodeSliceError),
|
||||
/// An error occurred with RSA engine
|
||||
#[error(transparent)]
|
||||
RSAError(#[from] rsa::errors::Error),
|
||||
/// Cannot convert given data from slice
|
||||
#[error(transparent)]
|
||||
TryFromSliceError(#[from] std::array::TryFromSliceError),
|
||||
/// Given path does not represent an APK
|
||||
#[error("wrong file extension: {0}")]
|
||||
WrongFileExtension(String),
|
||||
/// An error occurred with PKCS8 data
|
||||
#[error("error with pkcs8: {0}")]
|
||||
RsaPkcs8Error(#[from] rsa::pkcs8::Error),
|
||||
/// Error during certificate generation
|
||||
#[error(transparent)]
|
||||
CertificateGenerationError(#[from] rcgen::Error),
|
||||
/// TLS Error
|
||||
#[error(transparent)]
|
||||
TLSError(#[from] rustls::Error),
|
||||
/// PEM certificate error
|
||||
#[error(transparent)]
|
||||
PemCertError(#[from] rustls_pki_types::pem::Error),
|
||||
/// Error while locking mutex
|
||||
#[error("error while locking data")]
|
||||
PoisonError,
|
||||
/// Cannot upgrade connection from TCP to TLS
|
||||
#[error("upgrade error: {0}")]
|
||||
UpgradeError(String),
|
||||
/// An error occurred while getting mdns devices
|
||||
#[error(transparent)]
|
||||
MDNSError(#[from] mdns_sd::Error),
|
||||
/// An error occurred while sending data to channel
|
||||
#[error(transparent)]
|
||||
SendError(#[from] std::sync::mpsc::SendError<crate::MDNSDevice>),
|
||||
}
|
||||
|
||||
impl<T> From<std::sync::PoisonError<T>> for RustADBError {
|
||||
fn from(_err: std::sync::PoisonError<T>) -> Self {
|
||||
Self::PoisonError
|
||||
}
|
||||
}
|
||||
|
||||
@@ -4,15 +4,26 @@
|
||||
#![forbid(missing_docs)]
|
||||
#![doc = include_str!("../README.md")]
|
||||
|
||||
mod adb_termios;
|
||||
mod emulator;
|
||||
mod adb_device_ext;
|
||||
mod constants;
|
||||
mod device;
|
||||
mod emulator_device;
|
||||
mod error;
|
||||
mod mdns;
|
||||
mod models;
|
||||
mod server;
|
||||
mod server_device;
|
||||
mod transports;
|
||||
mod utils;
|
||||
|
||||
pub use adb_device_ext::ADBDeviceExt;
|
||||
pub use device::{ADBTcpDevice, ADBUSBDevice};
|
||||
pub use emulator_device::ADBEmulatorDevice;
|
||||
pub use error::{Result, RustADBError};
|
||||
pub use models::{AdbVersion, DeviceLong, DeviceShort, DeviceState, RebootType};
|
||||
pub use mdns::*;
|
||||
pub use models::{
|
||||
AdbStatResponse, AdbVersion, DeviceLong, DeviceShort, DeviceState, MDNSBackend, RebootType,
|
||||
};
|
||||
pub use server::*;
|
||||
pub use server_device::ADBServerDevice;
|
||||
pub use transports::*;
|
||||
|
||||
19
adb_client/src/mdns/mdns_device.rs
Normal file
19
adb_client/src/mdns/mdns_device.rs
Normal file
@@ -0,0 +1,19 @@
|
||||
use std::{collections::HashSet, net::IpAddr};
|
||||
|
||||
/// Represent a device found from mdns search
|
||||
#[derive(Debug)]
|
||||
pub struct MDNSDevice {
|
||||
/// Full device address when resolved
|
||||
pub fullname: String,
|
||||
/// Device IP addresses
|
||||
pub addresses: HashSet<IpAddr>,
|
||||
}
|
||||
|
||||
impl From<mdns_sd::ServiceInfo> for MDNSDevice {
|
||||
fn from(value: mdns_sd::ServiceInfo) -> Self {
|
||||
Self {
|
||||
fullname: value.get_fullname().to_string(),
|
||||
addresses: value.get_addresses().to_owned(),
|
||||
}
|
||||
}
|
||||
}
|
||||
73
adb_client/src/mdns/mdns_discovery.rs
Normal file
73
adb_client/src/mdns/mdns_discovery.rs
Normal file
@@ -0,0 +1,73 @@
|
||||
use mdns_sd::{ServiceDaemon, ServiceEvent};
|
||||
use std::{sync::mpsc::Sender, thread::JoinHandle};
|
||||
|
||||
use crate::{MDNSDevice, Result, RustADBError};
|
||||
|
||||
const ADB_SERVICE_NAME: &str = "_adb-tls-connect._tcp.local.";
|
||||
|
||||
/// Structure holding responsibility over mdns discovery
|
||||
pub struct MDNSDiscoveryService {
|
||||
daemon: ServiceDaemon,
|
||||
thread_handle: Option<JoinHandle<Result<()>>>,
|
||||
}
|
||||
|
||||
impl std::fmt::Debug for MDNSDiscoveryService {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
f.debug_struct("MDNSDiscoveryService")
|
||||
.field("daemon", &self.daemon.get_metrics())
|
||||
.field("handle", &self.thread_handle)
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl MDNSDiscoveryService {
|
||||
/// Instantiate a new discovery service to find devices over mdns
|
||||
pub fn new() -> Result<Self> {
|
||||
Ok(MDNSDiscoveryService {
|
||||
daemon: ServiceDaemon::new()?,
|
||||
thread_handle: None,
|
||||
})
|
||||
}
|
||||
|
||||
/// Start discovery by spawning a new thread responsible of getting events.
|
||||
pub fn start(&mut self, sender: Sender<MDNSDevice>) -> Result<()> {
|
||||
let receiver = self.daemon.browse(ADB_SERVICE_NAME)?;
|
||||
|
||||
let handle: JoinHandle<Result<()>> = std::thread::spawn(move || loop {
|
||||
while let Ok(event) = receiver.recv() {
|
||||
match event {
|
||||
ServiceEvent::SearchStarted(_)
|
||||
| ServiceEvent::ServiceRemoved(_, _)
|
||||
| ServiceEvent::ServiceFound(_, _)
|
||||
| ServiceEvent::SearchStopped(_) => {
|
||||
// Ignoring these events. We are only interesting in found devices
|
||||
continue;
|
||||
}
|
||||
ServiceEvent::ServiceResolved(service_info) => {
|
||||
if let Err(e) = sender.send(MDNSDevice::from(service_info)) {
|
||||
return Err(e.into());
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
self.thread_handle = Some(handle);
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Shutdown discovery engines.
|
||||
pub fn shutdown(&mut self) -> Result<()> {
|
||||
match self.daemon.shutdown() {
|
||||
Ok(_) => Ok(()),
|
||||
Err(e) => match e {
|
||||
mdns_sd::Error::Again => {
|
||||
self.daemon.shutdown()?;
|
||||
Ok(())
|
||||
}
|
||||
e => Err(RustADBError::MDNSError(e)),
|
||||
},
|
||||
}
|
||||
}
|
||||
}
|
||||
5
adb_client/src/mdns/mod.rs
Normal file
5
adb_client/src/mdns/mod.rs
Normal file
@@ -0,0 +1,5 @@
|
||||
mod mdns_device;
|
||||
mod mdns_discovery;
|
||||
|
||||
pub use mdns_device::MDNSDevice;
|
||||
pub use mdns_discovery::MDNSDiscoveryService;
|
||||
@@ -16,12 +16,24 @@ pub(crate) enum AdbServerCommand {
|
||||
Pair(SocketAddrV4, String),
|
||||
TransportAny,
|
||||
TransportSerial(String),
|
||||
MDNSCheck,
|
||||
MDNSServices,
|
||||
ServerStatus,
|
||||
ReconnectOffline,
|
||||
Install(u64),
|
||||
// Local commands
|
||||
ShellCommand(String),
|
||||
Shell,
|
||||
FrameBuffer,
|
||||
Sync,
|
||||
Reboot(RebootType),
|
||||
Forward(String, String),
|
||||
ForwardRemoveAll,
|
||||
Reverse(String, String),
|
||||
ReverseRemoveAll,
|
||||
Reconnect,
|
||||
TcpIp(u16),
|
||||
Usb,
|
||||
}
|
||||
|
||||
impl Display for AdbServerCommand {
|
||||
@@ -53,6 +65,24 @@ impl Display for AdbServerCommand {
|
||||
write!(f, "host:pair:{code}:{addr}")
|
||||
}
|
||||
AdbServerCommand::FrameBuffer => write!(f, "framebuffer:"),
|
||||
AdbServerCommand::Forward(remote, local) => {
|
||||
write!(f, "host:forward:{local};{remote}")
|
||||
}
|
||||
AdbServerCommand::ForwardRemoveAll => write!(f, "host:killforward-all"),
|
||||
AdbServerCommand::Reverse(remote, local) => {
|
||||
write!(f, "reverse:forward:{remote};{local}")
|
||||
}
|
||||
AdbServerCommand::ReverseRemoveAll => write!(f, "reverse:killforward-all"),
|
||||
AdbServerCommand::MDNSCheck => write!(f, "host:mdns:check"),
|
||||
AdbServerCommand::MDNSServices => write!(f, "host:mdns:services"),
|
||||
AdbServerCommand::ServerStatus => write!(f, "host:server-status"),
|
||||
AdbServerCommand::Reconnect => write!(f, "reconnect"),
|
||||
AdbServerCommand::ReconnectOffline => write!(f, "host:reconnect-offline"),
|
||||
AdbServerCommand::TcpIp(port) => {
|
||||
write!(f, "tcpip:{port}")
|
||||
}
|
||||
AdbServerCommand::Usb => write!(f, "usb:"),
|
||||
AdbServerCommand::Install(size) => write!(f, "exec:cmd package 'install' -S {size}"),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
47
adb_client/src/models/adb_stat_response.rs
Normal file
47
adb_client/src/models/adb_stat_response.rs
Normal file
@@ -0,0 +1,47 @@
|
||||
use byteorder::ByteOrder;
|
||||
use chrono::{DateTime, Utc};
|
||||
use std::{
|
||||
fmt::Display,
|
||||
time::{Duration, UNIX_EPOCH},
|
||||
};
|
||||
|
||||
use byteorder::LittleEndian;
|
||||
use serde::{Deserialize, Serialize};
|
||||
|
||||
/// Represents a `stat` response
|
||||
#[derive(Debug, Deserialize, Serialize)]
|
||||
pub struct AdbStatResponse {
|
||||
/// File permissions
|
||||
pub file_perm: u32,
|
||||
/// File size, in bytes
|
||||
pub file_size: u32,
|
||||
/// File modification time
|
||||
pub mod_time: u32,
|
||||
}
|
||||
|
||||
impl From<[u8; 12]> for AdbStatResponse {
|
||||
fn from(value: [u8; 12]) -> Self {
|
||||
Self {
|
||||
file_perm: LittleEndian::read_u32(&value[0..4]),
|
||||
file_size: LittleEndian::read_u32(&value[4..8]),
|
||||
mod_time: LittleEndian::read_u32(&value[8..]),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for AdbStatResponse {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
let d = UNIX_EPOCH + Duration::from_secs(self.mod_time.into());
|
||||
// Create DateTime from SystemTime
|
||||
let datetime = DateTime::<Utc>::from(d);
|
||||
|
||||
writeln!(f, "File permissions: {}", self.file_perm)?;
|
||||
writeln!(f, "File size: {} bytes", self.file_size)?;
|
||||
write!(
|
||||
f,
|
||||
"Modification time: {}",
|
||||
datetime.format("%Y-%m-%d %H:%M:%S.%f %Z")
|
||||
)?;
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
@@ -1,16 +1,15 @@
|
||||
use lazy_static::lazy_static;
|
||||
use std::str::FromStr;
|
||||
use std::sync::LazyLock;
|
||||
use std::{fmt::Display, str};
|
||||
|
||||
use crate::{DeviceState, RustADBError};
|
||||
use regex::bytes::Regex;
|
||||
|
||||
lazy_static! {
|
||||
static ref DEVICES_LONG_REGEX: Regex = Regex::new("^(?P<identifier>\\S+)\\s+(?P<state>\\w+) ((usb:(?P<usb1>.*)|(?P<usb2>\\d-\\d)) )?(product:(?P<product>\\w+) model:(?P<model>\\w+) device:(?P<device>\\w+) )?transport_id:(?P<transport_id>\\d+)$").expect("cannot build devices long regex");
|
||||
static DEVICES_LONG_REGEX: LazyLock<Regex> = LazyLock::new(|| {
|
||||
Regex::new("^(?P<identifier>\\S+)\\s+(?P<state>\\w+) ((usb:(?P<usb1>.*)|(?P<usb2>\\d-\\d)) )?(product:(?P<product>\\w+) model:(?P<model>\\w+) device:(?P<device>\\w+) )?transport_id:(?P<transport_id>\\d+)$").expect("cannot build devices long regex")
|
||||
});
|
||||
|
||||
}
|
||||
|
||||
/// Represents a new device with more informations helded.
|
||||
/// Represents a new device with more informations.
|
||||
#[derive(Debug)]
|
||||
pub struct DeviceLong {
|
||||
/// Unique device identifier.
|
||||
@@ -68,14 +67,13 @@ impl TryFrom<Vec<u8>> for DeviceLong {
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
)?)?,
|
||||
usb: String::from_utf8(
|
||||
groups
|
||||
.name("usb1")
|
||||
.or_else(|| groups.name("usb2"))
|
||||
.ok_or(RustADBError::RegexParsingError)?
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
)?,
|
||||
usb: match groups.name("usb1") {
|
||||
None => match groups.name("usb2") {
|
||||
None => "Unk".to_string(),
|
||||
Some(usb) => String::from_utf8(usb.as_bytes().to_vec())?,
|
||||
},
|
||||
Some(usb) => String::from_utf8(usb.as_bytes().to_vec())?,
|
||||
},
|
||||
product: match groups.name("product") {
|
||||
None => "Unk".to_string(),
|
||||
Some(product) => String::from_utf8(product.as_bytes().to_vec())?,
|
||||
|
||||
@@ -1,12 +1,10 @@
|
||||
use lazy_static::lazy_static;
|
||||
use regex::bytes::Regex;
|
||||
use std::{fmt::Display, str::FromStr};
|
||||
use std::{fmt::Display, str::FromStr, sync::LazyLock};
|
||||
|
||||
use crate::{DeviceState, RustADBError};
|
||||
|
||||
lazy_static! {
|
||||
static ref DEVICES_REGEX: Regex = Regex::new("^(\\S+)\t(\\w+)\n?$").unwrap();
|
||||
}
|
||||
static DEVICES_REGEX: LazyLock<Regex> =
|
||||
LazyLock::new(|| Regex::new("^(\\S+)\t(\\w+)\n?$").expect("Cannot build devices regex"));
|
||||
|
||||
/// Represents a device connected to the ADB server.
|
||||
#[derive(Debug, Clone)]
|
||||
@@ -28,7 +26,9 @@ impl TryFrom<Vec<u8>> for DeviceShort {
|
||||
|
||||
fn try_from(value: Vec<u8>) -> Result<Self, Self::Error> {
|
||||
// Optional final '\n' is used to match TrackDevices inputs
|
||||
let groups = DEVICES_REGEX.captures(&value).unwrap();
|
||||
let groups = DEVICES_REGEX
|
||||
.captures(&value)
|
||||
.ok_or(RustADBError::RegexParsingError)?;
|
||||
Ok(DeviceShort {
|
||||
identifier: String::from_utf8(
|
||||
groups
|
||||
|
||||
@@ -15,6 +15,22 @@ pub enum DeviceState {
|
||||
Authorizing,
|
||||
/// The device is unauthorized.
|
||||
Unauthorized,
|
||||
/// Haven't received a response from the device yet.
|
||||
Connecting,
|
||||
/// Insufficient permissions to communicate with the device.
|
||||
NoPerm,
|
||||
/// USB device detached from the adb server (known but not opened/claimed).
|
||||
Detached,
|
||||
/// Device running fastboot OS (fastboot) or userspace fastboot (fastbootd).
|
||||
Bootloader,
|
||||
/// What a device sees from its end of a Transport (adb host).
|
||||
Host,
|
||||
/// Device with bootloader loaded but no ROM OS loaded (adbd).
|
||||
Recovery,
|
||||
/// Device running Android OS Sideload mode (minadbd sideload mode).
|
||||
Sideload,
|
||||
/// Device running Android OS Rescue mode (minadbd rescue mode).
|
||||
Rescue,
|
||||
}
|
||||
|
||||
impl Display for DeviceState {
|
||||
@@ -25,6 +41,14 @@ impl Display for DeviceState {
|
||||
DeviceState::NoDevice => write!(f, "no device"),
|
||||
DeviceState::Authorizing => write!(f, "authorizing"),
|
||||
DeviceState::Unauthorized => write!(f, "unauthorized"),
|
||||
DeviceState::Connecting => write!(f, "connecting"),
|
||||
DeviceState::NoPerm => write!(f, "noperm"),
|
||||
DeviceState::Detached => write!(f, "detached"),
|
||||
DeviceState::Bootloader => write!(f, "bootloader"),
|
||||
DeviceState::Host => write!(f, "host"),
|
||||
DeviceState::Recovery => write!(f, "recovery"),
|
||||
DeviceState::Sideload => write!(f, "sideload"),
|
||||
DeviceState::Rescue => write!(f, "rescue"),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -40,6 +64,14 @@ impl FromStr for DeviceState {
|
||||
"no device" => Ok(Self::NoDevice),
|
||||
"authorizing" => Ok(Self::Authorizing),
|
||||
"unauthorized" => Ok(Self::Unauthorized),
|
||||
"connecting" => Ok(Self::Connecting),
|
||||
"noperm" => Ok(Self::NoPerm),
|
||||
"detached" => Ok(Self::Detached),
|
||||
"bootloader" => Ok(Self::Bootloader),
|
||||
"host" => Ok(Self::Host),
|
||||
"recovery" => Ok(Self::Recovery),
|
||||
"sideload" => Ok(Self::Sideload),
|
||||
"rescue" => Ok(Self::Rescue),
|
||||
_ => Err(RustADBError::UnknownDeviceState(lowercased)),
|
||||
}
|
||||
}
|
||||
|
||||
64
adb_client/src/models/mdns_services.rs
Normal file
64
adb_client/src/models/mdns_services.rs
Normal file
@@ -0,0 +1,64 @@
|
||||
use regex::bytes::Regex;
|
||||
use std::net::SocketAddrV4;
|
||||
use std::sync::LazyLock;
|
||||
use std::{fmt::Display, str::FromStr};
|
||||
|
||||
use crate::RustADBError;
|
||||
|
||||
static MDNS_SERVICES_REGEX: LazyLock<Regex> = LazyLock::new(|| {
|
||||
Regex::new("^(\\S+)\t(\\S+)\t([\\d\\.]+:\\d+)\n?$").expect("Cannot build mdns services regex")
|
||||
});
|
||||
|
||||
/// Represents MDNS Services
|
||||
#[derive(Debug, Clone)]
|
||||
pub struct MDNSServices {
|
||||
/// Service name
|
||||
pub service_name: String,
|
||||
/// Reg type
|
||||
pub reg_type: String,
|
||||
/// IP addr with port
|
||||
pub socket_v4: SocketAddrV4,
|
||||
}
|
||||
|
||||
impl Display for MDNSServices {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
write!(
|
||||
f,
|
||||
"{}\t{}\t{}",
|
||||
self.service_name, self.reg_type, self.socket_v4
|
||||
)
|
||||
}
|
||||
}
|
||||
|
||||
impl TryFrom<&[u8]> for MDNSServices {
|
||||
type Error = RustADBError;
|
||||
|
||||
fn try_from(value: &[u8]) -> Result<Self, Self::Error> {
|
||||
let groups = MDNS_SERVICES_REGEX
|
||||
.captures(value)
|
||||
.ok_or(RustADBError::RegexParsingError)?;
|
||||
Ok(MDNSServices {
|
||||
service_name: String::from_utf8(
|
||||
groups
|
||||
.get(1)
|
||||
.ok_or(RustADBError::RegexParsingError)?
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
)?,
|
||||
reg_type: String::from_utf8(
|
||||
groups
|
||||
.get(2)
|
||||
.ok_or(RustADBError::RegexParsingError)?
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
)?,
|
||||
socket_v4: SocketAddrV4::from_str(&String::from_utf8(
|
||||
groups
|
||||
.get(3)
|
||||
.ok_or(RustADBError::RegexParsingError)?
|
||||
.as_bytes()
|
||||
.to_vec(),
|
||||
)?)?,
|
||||
})
|
||||
}
|
||||
}
|
||||
@@ -1,21 +1,28 @@
|
||||
mod adb_emulator_command;
|
||||
mod adb_request_status;
|
||||
mod adb_server_command;
|
||||
mod adb_stat_response;
|
||||
mod adb_version;
|
||||
mod device_long;
|
||||
mod device_short;
|
||||
mod device_state;
|
||||
mod host_features;
|
||||
mod mdns_services;
|
||||
mod reboot_type;
|
||||
mod server_status;
|
||||
mod sync_command;
|
||||
|
||||
pub(crate) use adb_emulator_command::ADBEmulatorCommand;
|
||||
pub use adb_request_status::AdbRequestStatus;
|
||||
pub(crate) use adb_server_command::AdbServerCommand;
|
||||
pub use adb_stat_response::AdbStatResponse;
|
||||
pub use adb_version::AdbVersion;
|
||||
pub use device_long::DeviceLong;
|
||||
pub use device_short::DeviceShort;
|
||||
pub use device_state::DeviceState;
|
||||
pub use host_features::HostFeatures;
|
||||
pub use mdns_services::MDNSServices;
|
||||
pub use reboot_type::RebootType;
|
||||
pub use server_status::MDNSBackend;
|
||||
pub use server_status::ServerStatus;
|
||||
pub use sync_command::SyncCommand;
|
||||
|
||||
158
adb_client/src/models/server_status.rs
Normal file
158
adb_client/src/models/server_status.rs
Normal file
@@ -0,0 +1,158 @@
|
||||
use quick_protobuf::{BytesReader, MessageRead};
|
||||
|
||||
use std::fmt::Display;
|
||||
|
||||
use crate::RustADBError;
|
||||
|
||||
#[derive(Debug, PartialEq, Default, Eq, Clone, Copy)]
|
||||
pub enum UsbBackend {
|
||||
#[default]
|
||||
Unknown = 0,
|
||||
Native = 1,
|
||||
LibUSB = 2,
|
||||
}
|
||||
|
||||
impl From<i32> for UsbBackend {
|
||||
fn from(i: i32) -> Self {
|
||||
match i {
|
||||
0 => UsbBackend::Unknown,
|
||||
1 => UsbBackend::Native,
|
||||
2 => UsbBackend::LibUSB,
|
||||
_ => Self::default(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<'a> From<&'a str> for UsbBackend {
|
||||
fn from(s: &'a str) -> Self {
|
||||
match s {
|
||||
"UNKNOWN_USB" => UsbBackend::Unknown,
|
||||
"NATIVE" => UsbBackend::Native,
|
||||
"LIBUSB" => UsbBackend::LibUSB,
|
||||
_ => Self::default(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for UsbBackend {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
match self {
|
||||
UsbBackend::Unknown => write!(f, "UNKNOWN_USB"),
|
||||
UsbBackend::Native => write!(f, "NATIVE"),
|
||||
UsbBackend::LibUSB => write!(f, "LIBUSB"),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// MDNS Backend Status
|
||||
#[derive(Debug, Clone, PartialEq, Default)]
|
||||
pub enum MDNSBackend {
|
||||
#[default]
|
||||
/// Unknown
|
||||
Unknown = 0,
|
||||
/// Bonjour
|
||||
Bonjour = 1,
|
||||
/// OpenScreen
|
||||
OpenScreen = 2,
|
||||
}
|
||||
|
||||
impl From<i32> for MDNSBackend {
|
||||
fn from(i: i32) -> Self {
|
||||
match i {
|
||||
0 => MDNSBackend::Unknown,
|
||||
1 => MDNSBackend::Bonjour,
|
||||
2 => MDNSBackend::OpenScreen,
|
||||
_ => Self::default(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<'a> From<&'a str> for MDNSBackend {
|
||||
fn from(s: &'a str) -> Self {
|
||||
match s {
|
||||
"UNKNOWN_MDNS" => MDNSBackend::Unknown,
|
||||
"BONJOUR" => MDNSBackend::Bonjour,
|
||||
"OPENSCREEN" => MDNSBackend::OpenScreen,
|
||||
_ => Self::default(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for MDNSBackend {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
match self {
|
||||
MDNSBackend::Unknown => write!(f, "UNKNOWN_MDNS"),
|
||||
MDNSBackend::Bonjour => write!(f, "BONJOUR"),
|
||||
MDNSBackend::OpenScreen => write!(f, "OPENSCREEN"),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Structure representing current server status
|
||||
#[derive(Debug, Clone, Default, PartialEq)]
|
||||
pub struct ServerStatus {
|
||||
pub usb_backend: UsbBackend,
|
||||
pub usb_backend_forced: bool,
|
||||
pub mdns_backend: MDNSBackend,
|
||||
pub mdns_backend_forced: bool,
|
||||
pub version: String,
|
||||
pub build: String,
|
||||
pub executable_absolute_path: String,
|
||||
pub log_absolute_path: String,
|
||||
pub os: String,
|
||||
}
|
||||
|
||||
impl<'a> MessageRead<'a> for ServerStatus {
|
||||
fn from_reader(r: &mut BytesReader, bytes: &'a [u8]) -> quick_protobuf::Result<Self> {
|
||||
let mut msg = Self::default();
|
||||
while !r.is_eof() {
|
||||
match r.next_tag(bytes) {
|
||||
Ok(8) => msg.usb_backend = r.read_enum(bytes)?,
|
||||
Ok(16) => msg.usb_backend_forced = r.read_bool(bytes)?,
|
||||
Ok(24) => msg.mdns_backend = r.read_enum(bytes)?,
|
||||
Ok(32) => msg.mdns_backend_forced = r.read_bool(bytes)?,
|
||||
Ok(42) => msg.version = r.read_string(bytes)?.to_string(),
|
||||
Ok(50) => msg.build = r.read_string(bytes)?.to_string(),
|
||||
Ok(58) => msg.executable_absolute_path = r.read_string(bytes)?.to_string(),
|
||||
Ok(66) => msg.log_absolute_path = r.read_string(bytes)?.to_string(),
|
||||
Ok(74) => msg.os = r.read_string(bytes)?.to_string(),
|
||||
Ok(t) => {
|
||||
r.read_unknown(bytes, t)?;
|
||||
}
|
||||
Err(e) => return Err(e),
|
||||
}
|
||||
}
|
||||
Ok(msg)
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for ServerStatus {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
writeln!(f, "usb_backend: {}", self.usb_backend)?;
|
||||
if self.usb_backend_forced {
|
||||
writeln!(f, "usb_backend_forced: {}", self.usb_backend_forced)?;
|
||||
}
|
||||
writeln!(f, "mdns_backend: {}", self.mdns_backend)?;
|
||||
if self.mdns_backend_forced {
|
||||
writeln!(f, "mdns_backend_forced: {}", self.mdns_backend_forced)?;
|
||||
}
|
||||
writeln!(f, "version: \"{}\"", self.version)?;
|
||||
writeln!(f, "build: \"{}\"", self.build)?;
|
||||
writeln!(
|
||||
f,
|
||||
"executable_absolute_path: \"{}\"",
|
||||
self.executable_absolute_path
|
||||
)?;
|
||||
writeln!(f, "log_absolute_path: \"{}\"", self.log_absolute_path)?;
|
||||
writeln!(f, "os: \"{}\"", self.os)
|
||||
}
|
||||
}
|
||||
|
||||
impl TryFrom<Vec<u8>> for ServerStatus {
|
||||
type Error = RustADBError;
|
||||
|
||||
fn try_from(value: Vec<u8>) -> Result<Self, Self::Error> {
|
||||
let mut reader = BytesReader::from_bytes(&value);
|
||||
ServerStatus::from_reader(&mut reader, &value).map_err(|_| RustADBError::ConversionError)
|
||||
}
|
||||
}
|
||||
@@ -2,6 +2,7 @@ use crate::ADBTransport;
|
||||
use crate::Result;
|
||||
use crate::RustADBError;
|
||||
use crate::TCPServerTransport;
|
||||
use std::collections::HashMap;
|
||||
use std::net::SocketAddrV4;
|
||||
use std::process::Command;
|
||||
|
||||
@@ -12,6 +13,8 @@ pub struct ADBServer {
|
||||
pub(crate) transport: Option<TCPServerTransport>,
|
||||
/// Address to connect to
|
||||
pub(crate) socket_addr: Option<SocketAddrV4>,
|
||||
/// adb-server start envs
|
||||
pub(crate) envs: HashMap<String, String>,
|
||||
}
|
||||
|
||||
impl ADBServer {
|
||||
@@ -20,6 +23,7 @@ impl ADBServer {
|
||||
Self {
|
||||
transport: None,
|
||||
socket_addr: Some(address),
|
||||
envs: HashMap::new(),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -49,7 +53,13 @@ impl ADBServer {
|
||||
|
||||
if is_local_ip {
|
||||
// ADB Server is local, we start it if not already running
|
||||
let child = Command::new("adb").arg("start-server").spawn();
|
||||
let mut command = Command::new("adb");
|
||||
command.arg("start-server");
|
||||
for (env_k, env_v) in self.envs.iter() {
|
||||
command.env(env_k, env_v);
|
||||
}
|
||||
|
||||
let child = command.spawn();
|
||||
match child {
|
||||
Ok(mut child) => {
|
||||
if let Err(e) = child.wait() {
|
||||
|
||||
@@ -8,9 +8,10 @@ impl ADBServer {
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::Connect(address), true)?;
|
||||
|
||||
match String::from_utf8(response).unwrap() {
|
||||
s if s.starts_with("connected to") => Ok(()),
|
||||
s => Err(RustADBError::ADBRequestFailed(s)),
|
||||
match String::from_utf8(response) {
|
||||
Ok(s) if s.starts_with("connected to") => Ok(()),
|
||||
Ok(s) => Err(RustADBError::ADBRequestFailed(s)),
|
||||
Err(e) => Err(e.into()),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -79,7 +79,6 @@ impl ADBServer {
|
||||
}
|
||||
|
||||
/// Tracks new devices showing up.
|
||||
// TODO: Change with Generator when feature stabilizes
|
||||
pub fn track_devices(&mut self, callback: impl Fn(DeviceShort) -> Result<()>) -> Result<()> {
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TrackDevices)?;
|
||||
@@ -8,9 +8,10 @@ impl ADBServer {
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::Disconnect(address), true)?;
|
||||
|
||||
match String::from_utf8(response).unwrap() {
|
||||
s if s.starts_with("disconnected") => Ok(()),
|
||||
s => Err(RustADBError::ADBRequestFailed(s)),
|
||||
match String::from_utf8(response) {
|
||||
Ok(s) if s.starts_with("disconnected") => Ok(()),
|
||||
Ok(s) => Err(RustADBError::ADBRequestFailed(s)),
|
||||
Err(e) => Err(e.into()),
|
||||
}
|
||||
}
|
||||
}
|
||||
62
adb_client/src/server/commands/mdns.rs
Normal file
62
adb_client/src/server/commands/mdns.rs
Normal file
@@ -0,0 +1,62 @@
|
||||
use std::io::BufRead;
|
||||
|
||||
use crate::{
|
||||
models::{AdbServerCommand, MDNSBackend, MDNSServices},
|
||||
ADBServer, Result,
|
||||
};
|
||||
|
||||
const OPENSCREEN_MDNS_BACKEND: &str = "ADB_MDNS_OPENSCREEN";
|
||||
|
||||
impl ADBServer {
|
||||
/// Check if mdns discovery is available
|
||||
pub fn mdns_check(&mut self) -> Result<bool> {
|
||||
let response = self
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::MDNSCheck, true)?;
|
||||
|
||||
match String::from_utf8(response) {
|
||||
Ok(s) if s.starts_with("mdns daemon version") => Ok(true),
|
||||
Ok(_) => Ok(false),
|
||||
Err(e) => Err(e.into()),
|
||||
}
|
||||
}
|
||||
|
||||
/// List all discovered mdns services
|
||||
pub fn mdns_services(&mut self) -> Result<Vec<MDNSServices>> {
|
||||
let services = self
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::MDNSServices, true)?;
|
||||
|
||||
let mut vec_services: Vec<MDNSServices> = vec![];
|
||||
for service in services.lines() {
|
||||
match service {
|
||||
Ok(service) => {
|
||||
vec_services.push(MDNSServices::try_from(service.as_bytes())?);
|
||||
}
|
||||
Err(e) => log::error!("{}", e),
|
||||
}
|
||||
}
|
||||
|
||||
Ok(vec_services)
|
||||
}
|
||||
|
||||
/// Check if specified backend mdns service is used, otherwise restart adb server with envs
|
||||
pub fn mdns_force_backend(&mut self, backend: MDNSBackend) -> Result<()> {
|
||||
let server_status = self.server_status()?;
|
||||
if server_status.mdns_backend != backend {
|
||||
self.kill()?;
|
||||
self.envs.insert(
|
||||
OPENSCREEN_MDNS_BACKEND.to_string(),
|
||||
(if backend == MDNSBackend::OpenScreen {
|
||||
"1"
|
||||
} else {
|
||||
"0"
|
||||
})
|
||||
.to_string(),
|
||||
);
|
||||
self.connect()?;
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
@@ -2,5 +2,8 @@ mod connect;
|
||||
mod devices;
|
||||
mod disconnect;
|
||||
mod kill;
|
||||
mod mdns;
|
||||
mod pair;
|
||||
mod reconnect;
|
||||
mod server_status;
|
||||
mod version;
|
||||
@@ -9,9 +9,10 @@ impl ADBServer {
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::Pair(address, code), true)?;
|
||||
|
||||
match String::from_utf8(response).unwrap() {
|
||||
s if s.starts_with("Successfully paired to") => Ok(()),
|
||||
s => Err(RustADBError::ADBRequestFailed(s)),
|
||||
match String::from_utf8(response) {
|
||||
Ok(s) if s.starts_with("Successfully paired to") => Ok(()),
|
||||
Ok(s) => Err(RustADBError::ADBRequestFailed(s)),
|
||||
Err(e) => Err(e.into()),
|
||||
}
|
||||
}
|
||||
}
|
||||
10
adb_client/src/server/commands/reconnect.rs
Normal file
10
adb_client/src/server/commands/reconnect.rs
Normal file
@@ -0,0 +1,10 @@
|
||||
use crate::{models::AdbServerCommand, ADBServer, Result};
|
||||
|
||||
impl ADBServer {
|
||||
/// Reconnect the device
|
||||
pub fn reconnect_offline(&mut self) -> Result<()> {
|
||||
self.connect()?
|
||||
.proxy_connection(AdbServerCommand::ReconnectOffline, false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
15
adb_client/src/server/commands/server_status.rs
Normal file
15
adb_client/src/server/commands/server_status.rs
Normal file
@@ -0,0 +1,15 @@
|
||||
use crate::{
|
||||
models::{AdbServerCommand, ServerStatus},
|
||||
ADBServer, Result,
|
||||
};
|
||||
|
||||
impl ADBServer {
|
||||
/// Check ADB server status
|
||||
pub fn server_status(&mut self) -> Result<ServerStatus> {
|
||||
let status = self
|
||||
.connect()?
|
||||
.proxy_connection(AdbServerCommand::ServerStatus, true)?;
|
||||
|
||||
ServerStatus::try_from(status)
|
||||
}
|
||||
}
|
||||
@@ -1,85 +0,0 @@
|
||||
use crate::{
|
||||
models::{AdbServerCommand, SyncCommand},
|
||||
ADBServerDevice, Result, RustADBError,
|
||||
};
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use std::io::{Read, Write};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Receives [path] to [stream] from the device.
|
||||
pub fn recv<A: AsRef<str>>(&mut self, path: A, stream: &mut dyn Write) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
// Set device in SYNC mode
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Sync)?;
|
||||
|
||||
// Send a recv command
|
||||
self.get_transport_mut()
|
||||
.send_sync_request(SyncCommand::Recv)?;
|
||||
|
||||
self.handle_recv_command(path, stream)
|
||||
}
|
||||
|
||||
fn handle_recv_command<S: AsRef<str>>(
|
||||
&mut self,
|
||||
from: S,
|
||||
output: &mut dyn Write,
|
||||
) -> Result<()> {
|
||||
// First send 8 byte common header
|
||||
let mut len_buf = [0_u8; 4];
|
||||
LittleEndian::write_u32(&mut len_buf, from.as_ref().len() as u32);
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(&len_buf)?;
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(from.as_ref().as_bytes())?;
|
||||
|
||||
// Then we receive the byte data in chunks of up to 64k
|
||||
// Chunk looks like 'DATA' <length> <data>
|
||||
let mut buffer = [0_u8; 64 * 1024]; // Should this be Boxed?
|
||||
let mut data_header = [0_u8; 4]; // DATA
|
||||
loop {
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut data_header)?;
|
||||
// Check if data_header is DATA or DONE or FAIL
|
||||
match &data_header {
|
||||
b"DATA" => {
|
||||
// Handle received data
|
||||
let length: usize = self
|
||||
.get_transport_mut()
|
||||
.get_body_length()?
|
||||
.try_into()
|
||||
.unwrap();
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut buffer[..length])?;
|
||||
output.write_all(&buffer[..length])?;
|
||||
}
|
||||
b"DONE" => break, // We're done here
|
||||
b"FAIL" => {
|
||||
// Handle fail
|
||||
let length: usize = self
|
||||
.get_transport_mut()
|
||||
.get_body_length()?
|
||||
.try_into()
|
||||
.unwrap();
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut buffer[..length])?;
|
||||
Err(RustADBError::ADBRequestFailed(String::from_utf8(
|
||||
buffer[..length].to_vec(),
|
||||
)?))?;
|
||||
}
|
||||
_ => panic!("Unknown response from device {:#?}", data_header),
|
||||
}
|
||||
}
|
||||
|
||||
// Connection should've left SYNC by now
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
@@ -1,110 +0,0 @@
|
||||
use crate::{
|
||||
models::{AdbRequestStatus, AdbServerCommand, SyncCommand},
|
||||
ADBServerDevice, Result, RustADBError,
|
||||
};
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use std::{
|
||||
convert::TryInto,
|
||||
io::{Read, Write},
|
||||
str::{self, FromStr},
|
||||
time::SystemTime,
|
||||
};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Send [stream] to [path] on the device.
|
||||
pub fn send<A: AsRef<str>>(&mut self, stream: &mut dyn Read, path: A) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
// Set device in SYNC mode
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Sync)?;
|
||||
|
||||
// Send a send command
|
||||
self.get_transport_mut()
|
||||
.send_sync_request(SyncCommand::Send)?;
|
||||
|
||||
self.handle_send_command(stream, path)
|
||||
}
|
||||
|
||||
fn handle_send_command<S: AsRef<str>>(&mut self, input: &mut dyn Read, to: S) -> Result<()> {
|
||||
// Append the permission flags to the filename
|
||||
let to = to.as_ref().to_string() + ",0777";
|
||||
|
||||
// The name of command is already sent by get_transport()?.send_sync_request
|
||||
let mut len_buf = [0_u8; 4];
|
||||
LittleEndian::write_u32(&mut len_buf, to.len() as u32);
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(&len_buf)?;
|
||||
|
||||
// Send appends the filemode to the string sent
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(to.as_bytes())?;
|
||||
|
||||
// Then we send the byte data in chunks of up to 64k
|
||||
// Chunk looks like 'DATA' <length> <data>
|
||||
let mut buffer = [0_u8; 64 * 1024];
|
||||
loop {
|
||||
let bytes_read = input.read(&mut buffer)?;
|
||||
if bytes_read == 0 {
|
||||
break;
|
||||
}
|
||||
let mut chunk_len_buf = [0_u8; 4];
|
||||
LittleEndian::write_u32(&mut chunk_len_buf, bytes_read as u32);
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(b"DATA")?;
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(&chunk_len_buf)?;
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(&buffer[..bytes_read])?;
|
||||
}
|
||||
|
||||
// When we are done sending, we send 'DONE' <last modified time>
|
||||
// Re-use len_buf to send the last modified time
|
||||
let last_modified = match SystemTime::now().duration_since(SystemTime::UNIX_EPOCH) {
|
||||
Ok(n) => n,
|
||||
Err(_) => panic!("SystemTime before UNIX EPOCH!"),
|
||||
};
|
||||
LittleEndian::write_u32(&mut len_buf, last_modified.as_secs() as u32);
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(b"DONE")?;
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.write_all(&len_buf)?;
|
||||
|
||||
// We expect 'OKAY' response from this
|
||||
let mut request_status = [0; 4];
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut request_status)?;
|
||||
|
||||
match AdbRequestStatus::from_str(str::from_utf8(request_status.as_ref())?)? {
|
||||
AdbRequestStatus::Fail => {
|
||||
// We can keep reading to get further details
|
||||
let length = self.get_transport_mut().get_body_length()?;
|
||||
|
||||
let mut body = vec![
|
||||
0;
|
||||
length
|
||||
.try_into()
|
||||
.map_err(|_| RustADBError::ConversionError)?
|
||||
];
|
||||
if length > 0 {
|
||||
self.get_transport_mut()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut body)?;
|
||||
}
|
||||
|
||||
Err(RustADBError::ADBRequestFailed(String::from_utf8(body)?))
|
||||
}
|
||||
AdbRequestStatus::Okay => Ok(()),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +1,4 @@
|
||||
mod adb_emulator_device;
|
||||
mod adb_server;
|
||||
mod adb_server_device;
|
||||
mod device_commands;
|
||||
mod server_commands;
|
||||
mod commands;
|
||||
|
||||
pub use adb_emulator_device::ADBEmulatorDevice;
|
||||
pub use adb_server::ADBServer;
|
||||
pub use adb_server_device::ADBServerDevice;
|
||||
|
||||
@@ -1,33 +1,18 @@
|
||||
use std::{
|
||||
io::{self, Read, Write},
|
||||
sync::mpsc,
|
||||
time::Duration,
|
||||
io::{Read, Write},
|
||||
path::Path,
|
||||
};
|
||||
|
||||
use mio::{unix::SourceFd, Events, Interest, Poll, Token};
|
||||
|
||||
use crate::{
|
||||
adb_termios::ADBTermios,
|
||||
models::{AdbServerCommand, HostFeatures},
|
||||
ADBServerDevice, Result, RustADBError,
|
||||
constants::BUFFER_SIZE,
|
||||
models::{AdbServerCommand, AdbStatResponse, HostFeatures},
|
||||
ADBDeviceExt, Result, RustADBError,
|
||||
};
|
||||
|
||||
const STDIN: Token = Token(0);
|
||||
const BUFFER_SIZE: usize = 512;
|
||||
const POLL_DURATION: Duration = Duration::from_millis(100);
|
||||
use super::ADBServerDevice;
|
||||
|
||||
fn setup_poll_stdin() -> std::result::Result<Poll, io::Error> {
|
||||
let poll = Poll::new()?;
|
||||
let stdin_fd = 0;
|
||||
poll.registry()
|
||||
.register(&mut SourceFd(&stdin_fd), STDIN, Interest::READABLE)?;
|
||||
|
||||
Ok(poll)
|
||||
}
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Runs 'command' in a shell on the device, and write its output and error streams into [`output`].
|
||||
pub fn shell_command<S: ToString, W: Write>(
|
||||
impl ADBDeviceExt for ADBServerDevice {
|
||||
fn shell_command<S: ToString, W: Write>(
|
||||
&mut self,
|
||||
command: impl IntoIterator<Item = S>,
|
||||
mut output: W,
|
||||
@@ -73,15 +58,15 @@ impl ADBServerDevice {
|
||||
}
|
||||
}
|
||||
|
||||
/// Starts an interactive shell session on the device. Redirects stdin/stdout/stderr as appropriate.
|
||||
pub fn shell(&mut self) -> Result<()> {
|
||||
let mut adb_termios = ADBTermios::new(std::io::stdin())?;
|
||||
adb_termios.set_adb_termios()?;
|
||||
|
||||
self.connect()?.get_raw_connection()?.set_nodelay(true)?;
|
||||
|
||||
// TODO: FORWARD CTRL+C !!
|
||||
fn stat(&mut self, remote_path: &str) -> Result<AdbStatResponse> {
|
||||
self.stat(remote_path)
|
||||
}
|
||||
|
||||
fn shell<R: Read, W: Write + Send + 'static>(
|
||||
&mut self,
|
||||
mut reader: R,
|
||||
mut writer: W,
|
||||
) -> Result<()> {
|
||||
let supported_features = self.host_features()?;
|
||||
if !supported_features.contains(&HostFeatures::ShellV2)
|
||||
&& !supported_features.contains(&HostFeatures::Cmd)
|
||||
@@ -95,26 +80,22 @@ impl ADBServerDevice {
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Shell)?;
|
||||
|
||||
// let read_stream = Arc::new(self.tcp_stream);
|
||||
let mut read_stream = self.get_transport_mut().get_raw_connection()?.try_clone()?;
|
||||
|
||||
let (tx, rx) = mpsc::channel::<bool>();
|
||||
|
||||
let mut write_stream = read_stream.try_clone()?;
|
||||
|
||||
// Reading thread
|
||||
// Reading thread, reads response from adb-server
|
||||
std::thread::spawn(move || -> Result<()> {
|
||||
loop {
|
||||
let mut buffer = [0; BUFFER_SIZE];
|
||||
match read_stream.read(&mut buffer) {
|
||||
Ok(0) => {
|
||||
let _ = tx.send(true);
|
||||
read_stream.shutdown(std::net::Shutdown::Both)?;
|
||||
return Ok(());
|
||||
}
|
||||
Ok(size) => {
|
||||
std::io::stdout().write_all(&buffer[..size])?;
|
||||
std::io::stdout().flush()?;
|
||||
writer.write_all(&buffer[..size])?;
|
||||
writer.flush()?;
|
||||
}
|
||||
Err(e) => {
|
||||
return Err(RustADBError::IOError(e));
|
||||
@@ -123,33 +104,30 @@ impl ADBServerDevice {
|
||||
}
|
||||
});
|
||||
|
||||
let mut buf = [0; BUFFER_SIZE];
|
||||
let mut events = Events::with_capacity(1);
|
||||
|
||||
let mut poll = setup_poll_stdin()?;
|
||||
|
||||
// Polling either by checking that reading socket hasn't been closed, and if is there is something to read on stdin.
|
||||
loop {
|
||||
poll.poll(&mut events, Some(POLL_DURATION))?;
|
||||
match rx.try_recv() {
|
||||
Ok(_) | Err(mpsc::TryRecvError::Disconnected) => return Ok(()),
|
||||
Err(mpsc::TryRecvError::Empty) => (),
|
||||
}
|
||||
|
||||
for event in events.iter() {
|
||||
match event.token() {
|
||||
STDIN => {
|
||||
let size = match std::io::stdin().read(&mut buf) {
|
||||
Ok(0) => return Ok(()),
|
||||
Ok(size) => size,
|
||||
Err(_) => return Ok(()),
|
||||
};
|
||||
|
||||
write_stream.write_all(&buf[0..size])?;
|
||||
}
|
||||
_ => unreachable!(),
|
||||
}
|
||||
// Read from given reader (that could be stdin e.g), and write content to server socket
|
||||
if let Err(e) = std::io::copy(&mut reader, &mut write_stream) {
|
||||
match e.kind() {
|
||||
std::io::ErrorKind::BrokenPipe => return Ok(()),
|
||||
_ => return Err(RustADBError::IOError(e)),
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn pull<A: AsRef<str>, W: Write>(&mut self, source: A, mut output: W) -> Result<()> {
|
||||
self.pull(source, &mut output)
|
||||
}
|
||||
|
||||
fn reboot(&mut self, reboot_type: crate::RebootType) -> Result<()> {
|
||||
self.reboot(reboot_type)
|
||||
}
|
||||
|
||||
fn push<R: Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
self.push(stream, path)
|
||||
}
|
||||
|
||||
fn install<P: AsRef<Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
self.install(apk_path)
|
||||
}
|
||||
}
|
||||
25
adb_client/src/server_device/commands/forward.rs
Normal file
25
adb_client/src/server_device/commands/forward.rs
Normal file
@@ -0,0 +1,25 @@
|
||||
use crate::{models::AdbServerCommand, ADBServerDevice, Result};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Forward socket connection
|
||||
pub fn forward(&mut self, remote: String, local: String) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial.clone()))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::Forward(remote, local), false)
|
||||
.map(|_| ())
|
||||
}
|
||||
|
||||
/// Remove all previously applied forward rules
|
||||
pub fn forward_remove_all(&mut self) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial.clone()))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::ForwardRemoveAll, false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
@@ -1,7 +1,12 @@
|
||||
use std::{io::Read, iter::Map, path::Path, slice::ChunksExact};
|
||||
use std::{
|
||||
io::{Read, Seek, Write},
|
||||
iter::Map,
|
||||
path::Path,
|
||||
slice::ChunksExact,
|
||||
};
|
||||
|
||||
use byteorder::{LittleEndian, ReadBytesExt};
|
||||
use image::{ImageBuffer, Rgba};
|
||||
use image::{ImageBuffer, ImageFormat, Rgba};
|
||||
|
||||
use crate::{models::AdbServerCommand, utils, ADBServerDevice, Result, RustADBError};
|
||||
|
||||
@@ -98,13 +103,21 @@ impl TryFrom<[u8; std::mem::size_of::<Self>()]> for FrameBufferInfoV2 {
|
||||
}
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Dump framebuffer of this device
|
||||
/// Big help from source code (https://android.googlesource.com/platform/system/adb/+/refs/heads/main/framebuffer_service.cpp)
|
||||
/// Dump framebuffer of this device into given ['path']
|
||||
/// Big help from source code (<https://android.googlesource.com/platform/system/adb/+/refs/heads/main/framebuffer_service.cpp>)
|
||||
pub fn framebuffer<P: AsRef<Path>>(&mut self, path: P) -> Result<()> {
|
||||
let img = self.framebuffer_inner()?;
|
||||
Ok(img.save(path.as_ref())?)
|
||||
}
|
||||
|
||||
/// Dump framebuffer of this device and return corresponding bytes.
|
||||
///
|
||||
/// Output data format is currently only `PNG`.
|
||||
pub fn framebuffer_bytes<W: Write + Seek>(&mut self, mut writer: W) -> Result<()> {
|
||||
let img = self.framebuffer_inner()?;
|
||||
Ok(img.write_to(&mut writer, ImageFormat::Png)?)
|
||||
}
|
||||
|
||||
/// Inner method requesting framebuffer from Android device
|
||||
fn framebuffer_inner(&mut self) -> Result<ImageBuffer<Rgba<u8>, Vec<u8>>> {
|
||||
let serial: String = self.identifier.clone();
|
||||
@@ -170,7 +183,7 @@ impl ADBServerDevice {
|
||||
.ok_or_else(|| RustADBError::FramebufferConversionError)?,
|
||||
)
|
||||
}
|
||||
v => unimplemented!("Version {} not implemented", v),
|
||||
v => Err(RustADBError::UnimplementedFramebufferImageVersion(v)),
|
||||
}
|
||||
}
|
||||
}
|
||||
43
adb_client/src/server_device/commands/install.rs
Normal file
43
adb_client/src/server_device/commands/install.rs
Normal file
@@ -0,0 +1,43 @@
|
||||
use std::{fs::File, io::Read, path::Path};
|
||||
|
||||
use crate::{
|
||||
models::AdbServerCommand, server_device::ADBServerDevice, utils::check_extension_is_apk, Result,
|
||||
};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Install an APK on device
|
||||
pub fn install<P: AsRef<Path>>(&mut self, apk_path: P) -> Result<()> {
|
||||
let mut apk_file = File::open(&apk_path)?;
|
||||
|
||||
check_extension_is_apk(&apk_path)?;
|
||||
|
||||
let file_size = apk_file.metadata()?.len();
|
||||
|
||||
let serial: String = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Install(file_size))?;
|
||||
|
||||
let mut raw_connection = self.get_transport_mut().get_raw_connection()?;
|
||||
|
||||
std::io::copy(&mut apk_file, &mut raw_connection)?;
|
||||
|
||||
let mut data = [0; 1024];
|
||||
let read_amount = self.get_transport().get_raw_connection()?.read(&mut data)?;
|
||||
|
||||
match &data[0..read_amount] {
|
||||
b"Success\n" => {
|
||||
log::info!(
|
||||
"APK file {} successfully installed",
|
||||
apk_path.as_ref().display()
|
||||
);
|
||||
Ok(())
|
||||
}
|
||||
d => Err(crate::RustADBError::ADBRequestFailed(String::from_utf8(
|
||||
d.to_vec(),
|
||||
)?)),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -9,7 +9,7 @@ use std::{
|
||||
};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Lists files in [path] on the device.
|
||||
/// Lists files in path on the device.
|
||||
pub fn list<A: AsRef<str>>(&mut self, path: A) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
@@ -1,6 +1,6 @@
|
||||
use std::io::{self, Write};
|
||||
|
||||
use crate::{ADBServerDevice, Result};
|
||||
use crate::{ADBDeviceExt, ADBServerDevice, Result};
|
||||
|
||||
struct LogFilter<W: Write> {
|
||||
writer: W,
|
||||
@@ -1,10 +1,15 @@
|
||||
mod forward;
|
||||
mod framebuffer;
|
||||
mod host_features;
|
||||
mod install;
|
||||
mod list;
|
||||
mod logcat;
|
||||
mod reboot;
|
||||
mod reconnect;
|
||||
mod recv;
|
||||
mod reverse;
|
||||
mod send;
|
||||
mod shell;
|
||||
mod stat;
|
||||
mod tcpip;
|
||||
mod transport;
|
||||
mod usb;
|
||||
14
adb_client/src/server_device/commands/reconnect.rs
Normal file
14
adb_client/src/server_device/commands/reconnect.rs
Normal file
@@ -0,0 +1,14 @@
|
||||
use crate::{models::AdbServerCommand, ADBServerDevice, Result};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Reconnect device
|
||||
pub fn reconnect(&mut self) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::Reconnect, false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
111
adb_client/src/server_device/commands/recv.rs
Normal file
111
adb_client/src/server_device/commands/recv.rs
Normal file
@@ -0,0 +1,111 @@
|
||||
use crate::{
|
||||
constants,
|
||||
models::{AdbServerCommand, SyncCommand},
|
||||
ADBServerDevice, Result,
|
||||
};
|
||||
use byteorder::{LittleEndian, ReadBytesExt};
|
||||
use std::io::{BufReader, BufWriter, Read, Write};
|
||||
|
||||
/// Internal structure wrapping a [std::io::Read] and hiding underlying protocol logic.
|
||||
struct ADBRecvCommandReader<R: Read> {
|
||||
inner: R,
|
||||
remaining_data_bytes_to_read: usize,
|
||||
}
|
||||
|
||||
impl<R: Read> ADBRecvCommandReader<R> {
|
||||
pub fn new(inner: R) -> Self {
|
||||
Self {
|
||||
inner,
|
||||
remaining_data_bytes_to_read: 0,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<R: Read> Read for ADBRecvCommandReader<R> {
|
||||
fn read(&mut self, buf: &mut [u8]) -> std::io::Result<usize> {
|
||||
// In case of a "DATA" header, we may not have enough space in `buf` to fill it with "length" bytes coming from device.
|
||||
// `remaining_data_bytes_to_read` represents how many bytes are still left to read before receiving another header.
|
||||
if self.remaining_data_bytes_to_read == 0 {
|
||||
let mut header = [0_u8; 4];
|
||||
self.inner.read_exact(&mut header)?;
|
||||
|
||||
match &header[..] {
|
||||
b"DATA" => {
|
||||
let length = self.inner.read_u32::<LittleEndian>()? as usize;
|
||||
let effective_read = self.inner.read(&mut buf[0..length])?;
|
||||
self.remaining_data_bytes_to_read = length - effective_read;
|
||||
|
||||
Ok(effective_read)
|
||||
}
|
||||
b"DONE" => Ok(0),
|
||||
b"FAIL" => {
|
||||
let length = self.inner.read_u32::<LittleEndian>()? as usize;
|
||||
let mut error_msg = vec![0; length];
|
||||
self.inner.read_exact(&mut error_msg)?;
|
||||
|
||||
Err(std::io::Error::new(
|
||||
std::io::ErrorKind::Other,
|
||||
format!(
|
||||
"ADB request failed: {}",
|
||||
String::from_utf8_lossy(&error_msg)
|
||||
),
|
||||
))
|
||||
}
|
||||
_ => Err(std::io::Error::new(
|
||||
std::io::ErrorKind::Other,
|
||||
format!("Unknown response from device {:#?}", header),
|
||||
)),
|
||||
}
|
||||
} else {
|
||||
// Computing minimum to ensure to stop reading before next header...
|
||||
let data_to_read = std::cmp::min(self.remaining_data_bytes_to_read, buf.len());
|
||||
self.inner.read_exact(&mut buf[..data_to_read])?;
|
||||
|
||||
self.remaining_data_bytes_to_read -= self.remaining_data_bytes_to_read;
|
||||
|
||||
Ok(data_to_read)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Receives path to stream from the device.
|
||||
pub fn pull<A: AsRef<str>>(&mut self, path: A, stream: &mut dyn Write) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
// Set device in SYNC mode
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Sync)?;
|
||||
|
||||
// Send a recv command
|
||||
self.get_transport_mut()
|
||||
.send_sync_request(SyncCommand::Recv)?;
|
||||
|
||||
self.handle_recv_command(path, stream)
|
||||
}
|
||||
|
||||
fn handle_recv_command<S: AsRef<str>>(
|
||||
&mut self,
|
||||
from: S,
|
||||
output: &mut dyn Write,
|
||||
) -> Result<()> {
|
||||
let mut raw_connection = self.get_transport().get_raw_connection()?;
|
||||
|
||||
let from_as_bytes = from.as_ref().as_bytes();
|
||||
let mut buffer = Vec::with_capacity(4 + from_as_bytes.len());
|
||||
buffer.extend_from_slice(&(from.as_ref().len() as u32).to_le_bytes());
|
||||
buffer.extend_from_slice(from_as_bytes);
|
||||
raw_connection.write_all(&buffer)?;
|
||||
|
||||
let reader = ADBRecvCommandReader::new(raw_connection);
|
||||
std::io::copy(
|
||||
&mut BufReader::with_capacity(constants::BUFFER_SIZE, reader),
|
||||
&mut BufWriter::with_capacity(constants::BUFFER_SIZE, output),
|
||||
)?;
|
||||
|
||||
// Connection should've been left in SYNC mode by now
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
25
adb_client/src/server_device/commands/reverse.rs
Normal file
25
adb_client/src/server_device/commands/reverse.rs
Normal file
@@ -0,0 +1,25 @@
|
||||
use crate::{models::AdbServerCommand, ADBServerDevice, Result};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Reverse socket connection
|
||||
pub fn reverse(&mut self, remote: String, local: String) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::Reverse(remote, local), false)
|
||||
.map(|_| ())
|
||||
}
|
||||
|
||||
/// Remove all reverse rules
|
||||
pub fn reverse_remove_all(&mut self) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial.clone()))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::ReverseRemoveAll, false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
121
adb_client/src/server_device/commands/send.rs
Normal file
121
adb_client/src/server_device/commands/send.rs
Normal file
@@ -0,0 +1,121 @@
|
||||
use crate::{
|
||||
constants,
|
||||
models::{AdbRequestStatus, AdbServerCommand, SyncCommand},
|
||||
ADBServerDevice, Result, RustADBError,
|
||||
};
|
||||
use std::{
|
||||
convert::TryInto,
|
||||
io::{BufReader, BufWriter, Read, Write},
|
||||
str::{self, FromStr},
|
||||
time::SystemTime,
|
||||
};
|
||||
|
||||
/// Internal structure wrapping a [std::io::Write] and hiding underlying protocol logic.
|
||||
struct ADBSendCommandWriter<W: Write> {
|
||||
inner: W,
|
||||
}
|
||||
|
||||
impl<W: Write> ADBSendCommandWriter<W> {
|
||||
pub fn new(inner: W) -> Self {
|
||||
ADBSendCommandWriter { inner }
|
||||
}
|
||||
}
|
||||
|
||||
impl<W: Write> Write for ADBSendCommandWriter<W> {
|
||||
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
||||
let chunk_len = buf.len() as u32;
|
||||
|
||||
// 8 = "DATA".len() + sizeof(u32)
|
||||
let mut buffer = Vec::with_capacity(8 + buf.len());
|
||||
buffer.extend_from_slice(b"DATA");
|
||||
buffer.extend_from_slice(&chunk_len.to_le_bytes());
|
||||
buffer.extend_from_slice(buf);
|
||||
|
||||
self.inner.write_all(&buffer)?;
|
||||
|
||||
Ok(buf.len())
|
||||
}
|
||||
|
||||
fn flush(&mut self) -> std::io::Result<()> {
|
||||
self.inner.flush()
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Send stream to path on the device.
|
||||
pub fn push<R: Read, A: AsRef<str>>(&mut self, stream: R, path: A) -> Result<()> {
|
||||
log::info!("Sending data to {}", path.as_ref());
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
// Set device in SYNC mode
|
||||
self.get_transport_mut()
|
||||
.send_adb_request(AdbServerCommand::Sync)?;
|
||||
|
||||
// Send a send command
|
||||
self.get_transport_mut()
|
||||
.send_sync_request(SyncCommand::Send)?;
|
||||
|
||||
self.handle_send_command(stream, path)
|
||||
}
|
||||
|
||||
fn handle_send_command<R: Read, S: AsRef<str>>(&mut self, input: R, to: S) -> Result<()> {
|
||||
// Append the permission flags to the filename
|
||||
let to = to.as_ref().to_string() + ",0777";
|
||||
|
||||
let mut raw_connection = self.get_transport_mut().get_raw_connection()?;
|
||||
|
||||
// The name of the command is already sent by get_transport()?.send_sync_request
|
||||
let to_as_bytes = to.as_bytes();
|
||||
let mut buffer = Vec::with_capacity(4 + to_as_bytes.len());
|
||||
buffer.extend_from_slice(&(to.len() as u32).to_le_bytes());
|
||||
buffer.extend_from_slice(to_as_bytes);
|
||||
raw_connection.write_all(&buffer)?;
|
||||
|
||||
let writer = ADBSendCommandWriter::new(raw_connection);
|
||||
|
||||
std::io::copy(
|
||||
&mut BufReader::with_capacity(constants::BUFFER_SIZE, input),
|
||||
&mut BufWriter::with_capacity(constants::BUFFER_SIZE, writer),
|
||||
)?;
|
||||
|
||||
// Copy is finished, we can now notify as finished
|
||||
// Have to send DONE + file mtime
|
||||
let last_modified = match SystemTime::now().duration_since(SystemTime::UNIX_EPOCH) {
|
||||
Ok(n) => n,
|
||||
Err(_) => panic!("SystemTime before UNIX EPOCH!"),
|
||||
};
|
||||
|
||||
let mut done_buffer = Vec::with_capacity(8);
|
||||
done_buffer.extend_from_slice(b"DONE");
|
||||
done_buffer.extend_from_slice(&last_modified.as_secs().to_le_bytes());
|
||||
raw_connection.write_all(&done_buffer)?;
|
||||
|
||||
// We expect 'OKAY' response from this
|
||||
let mut request_status = [0; 4];
|
||||
raw_connection.read_exact(&mut request_status)?;
|
||||
|
||||
match AdbRequestStatus::from_str(str::from_utf8(&request_status)?)? {
|
||||
AdbRequestStatus::Fail => {
|
||||
// We can keep reading to get further details
|
||||
let length = self.get_transport_mut().get_body_length()?;
|
||||
|
||||
let mut body = vec![
|
||||
0;
|
||||
length
|
||||
.try_into()
|
||||
.map_err(|_| RustADBError::ConversionError)?
|
||||
];
|
||||
if length > 0 {
|
||||
self.get_transport()
|
||||
.get_raw_connection()?
|
||||
.read_exact(&mut body)?;
|
||||
}
|
||||
|
||||
Err(RustADBError::ADBRequestFailed(String::from_utf8(body)?))
|
||||
}
|
||||
AdbRequestStatus::Okay => Ok(()),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,51 +1,12 @@
|
||||
use std::{
|
||||
fmt::Display,
|
||||
io::{Read, Write},
|
||||
time::{Duration, UNIX_EPOCH},
|
||||
};
|
||||
use std::io::{Read, Write};
|
||||
|
||||
use byteorder::{ByteOrder, LittleEndian};
|
||||
use chrono::{DateTime, Utc};
|
||||
|
||||
use crate::{
|
||||
models::{AdbServerCommand, SyncCommand},
|
||||
models::{AdbServerCommand, AdbStatResponse, SyncCommand},
|
||||
ADBServerDevice, Result, RustADBError,
|
||||
};
|
||||
|
||||
#[derive(Debug)]
|
||||
pub struct AdbStatResponse {
|
||||
pub file_perm: u32,
|
||||
pub file_size: u32,
|
||||
pub mod_time: u32,
|
||||
}
|
||||
|
||||
impl From<[u8; 12]> for AdbStatResponse {
|
||||
fn from(value: [u8; 12]) -> Self {
|
||||
Self {
|
||||
file_perm: LittleEndian::read_u32(&value[0..4]),
|
||||
file_size: LittleEndian::read_u32(&value[4..8]),
|
||||
mod_time: LittleEndian::read_u32(&value[8..]),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for AdbStatResponse {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
let d = UNIX_EPOCH + Duration::from_secs(self.mod_time.into());
|
||||
// Create DateTime from SystemTime
|
||||
let datetime = DateTime::<Utc>::from(d);
|
||||
|
||||
writeln!(f, "File permissions: {}", self.file_perm)?;
|
||||
writeln!(f, "File size: {} bytes", self.file_size)?;
|
||||
write!(
|
||||
f,
|
||||
"Modification time: {}",
|
||||
datetime.format("%Y-%m-%d %H:%M:%S.%f %Z")
|
||||
)?;
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBServerDevice {
|
||||
fn handle_stat_command<S: AsRef<str>>(&mut self, path: S) -> Result<AdbStatResponse> {
|
||||
let mut len_buf = [0_u8; 4];
|
||||
@@ -80,7 +41,7 @@ impl ADBServerDevice {
|
||||
}
|
||||
}
|
||||
|
||||
/// Stat file given as [path] on the device.
|
||||
/// Stat file given as path on the device.
|
||||
pub fn stat<A: AsRef<str>>(&mut self, path: A) -> Result<AdbStatResponse> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
14
adb_client/src/server_device/commands/tcpip.rs
Normal file
14
adb_client/src/server_device/commands/tcpip.rs
Normal file
@@ -0,0 +1,14 @@
|
||||
use crate::{models::AdbServerCommand, ADBServerDevice, Result};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Set adb daemon to tcp/ip mode
|
||||
pub fn tcpip(&mut self, port: u16) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::TcpIp(port), false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
14
adb_client/src/server_device/commands/usb.rs
Normal file
14
adb_client/src/server_device/commands/usb.rs
Normal file
@@ -0,0 +1,14 @@
|
||||
use crate::{models::AdbServerCommand, ADBServerDevice, Result};
|
||||
|
||||
impl ADBServerDevice {
|
||||
/// Set adb daemon to usb mode
|
||||
pub fn usb(&mut self) -> Result<()> {
|
||||
let serial = self.identifier.clone();
|
||||
self.connect()?
|
||||
.send_adb_request(AdbServerCommand::TransportSerial(serial))?;
|
||||
|
||||
self.get_transport_mut()
|
||||
.proxy_connection(AdbServerCommand::Usb, false)
|
||||
.map(|_| ())
|
||||
}
|
||||
}
|
||||
5
adb_client/src/server_device/mod.rs
Normal file
5
adb_client/src/server_device/mod.rs
Normal file
@@ -0,0 +1,5 @@
|
||||
mod adb_server_device;
|
||||
mod adb_server_device_commands;
|
||||
mod commands;
|
||||
|
||||
pub use adb_server_device::ADBServerDevice;
|
||||
@@ -1,6 +1,11 @@
|
||||
mod tcp_emulator_transport;
|
||||
mod tcp_server_transport;
|
||||
mod transport_trait;
|
||||
mod tcp_transport;
|
||||
mod traits;
|
||||
mod usb_transport;
|
||||
|
||||
pub use tcp_emulator_transport::TCPEmulatorTransport;
|
||||
pub use tcp_server_transport::TCPServerTransport;
|
||||
pub use transport_trait::ADBTransport;
|
||||
pub use tcp_transport::TcpTransport;
|
||||
pub use traits::{ADBMessageTransport, ADBTransport};
|
||||
pub use usb_transport::USBTransport;
|
||||
|
||||
@@ -38,7 +38,7 @@ impl TCPEmulatorTransport {
|
||||
pub fn get_authentication_token(&mut self) -> Result<String> {
|
||||
let home = match my_home()? {
|
||||
Some(home) => home,
|
||||
None => todo!(),
|
||||
None => return Err(RustADBError::NoHomeDirectory),
|
||||
};
|
||||
|
||||
let mut f = File::open(home.join(".emulator_console_auth_token"))?;
|
||||
|
||||
@@ -154,7 +154,9 @@ impl ADBTransport for TCPServerTransport {
|
||||
// Ignoring underlying error, we will recreate a new connection
|
||||
let _ = previous.shutdown(std::net::Shutdown::Both);
|
||||
}
|
||||
self.tcp_stream = Some(TcpStream::connect(self.socket_addr)?);
|
||||
let tcp_stream = TcpStream::connect(self.socket_addr)?;
|
||||
tcp_stream.set_nodelay(true)?;
|
||||
self.tcp_stream = Some(tcp_stream);
|
||||
log::trace!("Successfully connected to {}", self.socket_addr);
|
||||
|
||||
Ok(())
|
||||
|
||||
344
adb_client/src/transports/tcp_transport.rs
Normal file
344
adb_client/src/transports/tcp_transport.rs
Normal file
@@ -0,0 +1,344 @@
|
||||
use rcgen::{CertificateParams, KeyPair, PKCS_RSA_SHA256};
|
||||
use rustls::{
|
||||
client::danger::{HandshakeSignatureValid, ServerCertVerified, ServerCertVerifier},
|
||||
pki_types::{pem::PemObject, CertificateDer, PrivatePkcs8KeyDer},
|
||||
ClientConfig, ClientConnection, KeyLogFile, SignatureScheme, StreamOwned,
|
||||
};
|
||||
|
||||
use super::{ADBMessageTransport, ADBTransport};
|
||||
use crate::{
|
||||
device::{
|
||||
get_default_adb_key_path, ADBTransportMessage, ADBTransportMessageHeader, MessageCommand,
|
||||
},
|
||||
Result, RustADBError,
|
||||
};
|
||||
use std::{
|
||||
fs::read_to_string,
|
||||
io::{Read, Write},
|
||||
net::{Shutdown, SocketAddr, TcpStream},
|
||||
ops::{Deref, DerefMut},
|
||||
path::PathBuf,
|
||||
sync::{Arc, Mutex},
|
||||
time::Duration,
|
||||
};
|
||||
|
||||
#[derive(Debug)]
|
||||
enum CurrentConnection {
|
||||
Tcp(TcpStream),
|
||||
Tls(Box<StreamOwned<ClientConnection, TcpStream>>),
|
||||
}
|
||||
|
||||
impl CurrentConnection {
|
||||
fn set_read_timeout(&self, read_timeout: Duration) -> Result<()> {
|
||||
match self {
|
||||
CurrentConnection::Tcp(tcp_stream) => {
|
||||
Ok(tcp_stream.set_read_timeout(Some(read_timeout))?)
|
||||
}
|
||||
CurrentConnection::Tls(stream_owned) => {
|
||||
Ok(stream_owned.sock.set_read_timeout(Some(read_timeout))?)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
fn set_write_timeout(&self, write_timeout: Duration) -> Result<()> {
|
||||
match self {
|
||||
CurrentConnection::Tcp(tcp_stream) => {
|
||||
Ok(tcp_stream.set_write_timeout(Some(write_timeout))?)
|
||||
}
|
||||
CurrentConnection::Tls(stream_owned) => {
|
||||
Ok(stream_owned.sock.set_write_timeout(Some(write_timeout))?)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Read for CurrentConnection {
|
||||
fn read(&mut self, buf: &mut [u8]) -> std::io::Result<usize> {
|
||||
match self {
|
||||
CurrentConnection::Tcp(tcp_stream) => tcp_stream.read(buf),
|
||||
CurrentConnection::Tls(tls_conn) => tls_conn.read(buf),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Write for CurrentConnection {
|
||||
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
||||
match self {
|
||||
CurrentConnection::Tcp(tcp_stream) => tcp_stream.write(buf),
|
||||
CurrentConnection::Tls(tls_conn) => tls_conn.write(buf),
|
||||
}
|
||||
}
|
||||
|
||||
fn flush(&mut self) -> std::io::Result<()> {
|
||||
match self {
|
||||
CurrentConnection::Tcp(tcp_stream) => tcp_stream.flush(),
|
||||
CurrentConnection::Tls(tls_conn) => tls_conn.flush(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Transport running on USB
|
||||
#[derive(Clone, Debug)]
|
||||
pub struct TcpTransport {
|
||||
address: SocketAddr,
|
||||
current_connection: Option<Arc<Mutex<CurrentConnection>>>,
|
||||
private_key_path: PathBuf,
|
||||
}
|
||||
|
||||
fn certificate_from_pk(key_pair: &KeyPair) -> Result<Vec<CertificateDer<'static>>> {
|
||||
let certificate_params = CertificateParams::default();
|
||||
let certificate = certificate_params.self_signed(key_pair)?;
|
||||
Ok(vec![certificate.der().to_owned()])
|
||||
}
|
||||
|
||||
impl TcpTransport {
|
||||
/// Instantiate a new [`TcpTransport`]
|
||||
pub fn new(address: SocketAddr) -> Result<Self> {
|
||||
Self::new_with_custom_private_key(address, get_default_adb_key_path()?)
|
||||
}
|
||||
|
||||
/// Instantiate a new [`TcpTransport`] using a given private key
|
||||
pub fn new_with_custom_private_key(
|
||||
address: SocketAddr,
|
||||
private_key_path: PathBuf,
|
||||
) -> Result<Self> {
|
||||
Ok(Self {
|
||||
address,
|
||||
current_connection: None,
|
||||
private_key_path,
|
||||
})
|
||||
}
|
||||
|
||||
fn get_current_connection(&mut self) -> Result<Arc<Mutex<CurrentConnection>>> {
|
||||
self.current_connection
|
||||
.as_ref()
|
||||
.ok_or(RustADBError::IOError(std::io::Error::new(
|
||||
std::io::ErrorKind::NotConnected,
|
||||
"not connected",
|
||||
)))
|
||||
.cloned()
|
||||
}
|
||||
|
||||
pub(crate) fn upgrade_connection(&mut self) -> Result<()> {
|
||||
let current_connection = match self.current_connection.clone() {
|
||||
Some(current_connection) => current_connection,
|
||||
None => {
|
||||
return Err(RustADBError::UpgradeError(
|
||||
"cannot upgrade a non-existing connection...".into(),
|
||||
))
|
||||
}
|
||||
};
|
||||
|
||||
{
|
||||
let mut current_conn_locked = current_connection.lock()?;
|
||||
match current_conn_locked.deref() {
|
||||
CurrentConnection::Tcp(tcp_stream) => {
|
||||
// TODO: Check if we cannot be more precise
|
||||
|
||||
let pk_content = read_to_string(&self.private_key_path)?;
|
||||
|
||||
let key_pair =
|
||||
KeyPair::from_pkcs8_pem_and_sign_algo(&pk_content, &PKCS_RSA_SHA256)?;
|
||||
|
||||
let certificate = certificate_from_pk(&key_pair)?;
|
||||
let private_key = PrivatePkcs8KeyDer::from_pem_file(&self.private_key_path)?;
|
||||
|
||||
let mut client_config = ClientConfig::builder()
|
||||
.dangerous()
|
||||
.with_custom_certificate_verifier(Arc::new(NoCertificateVerification {}))
|
||||
.with_client_auth_cert(certificate, private_key.into())?;
|
||||
|
||||
client_config.key_log = Arc::new(KeyLogFile::new());
|
||||
|
||||
let rc_config = Arc::new(client_config);
|
||||
let example_com = self.address.ip().into();
|
||||
let conn = ClientConnection::new(rc_config, example_com)?;
|
||||
let owned = tcp_stream.try_clone()?;
|
||||
let client = StreamOwned::new(conn, owned);
|
||||
|
||||
// Update current connection state to now use TLS protocol
|
||||
*current_conn_locked = CurrentConnection::Tls(Box::new(client));
|
||||
}
|
||||
CurrentConnection::Tls(_) => {
|
||||
return Err(RustADBError::UpgradeError(
|
||||
"cannot upgrade a TLS connection...".into(),
|
||||
))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
let message = self.read_message()?;
|
||||
match message.header().command() {
|
||||
MessageCommand::Cnxn => {
|
||||
let device_infos = String::from_utf8(message.into_payload())?;
|
||||
log::debug!("received device info: {device_infos}");
|
||||
Ok(())
|
||||
}
|
||||
c => Err(RustADBError::ADBRequestFailed(format!(
|
||||
"Wrong command received {}",
|
||||
c
|
||||
))),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBTransport for TcpTransport {
|
||||
fn connect(&mut self) -> Result<()> {
|
||||
let stream = TcpStream::connect(self.address)?;
|
||||
self.current_connection = Some(Arc::new(Mutex::new(CurrentConnection::Tcp(stream))));
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn disconnect(&mut self) -> Result<()> {
|
||||
log::debug!("disconnecting...");
|
||||
if let Some(current_connection) = &self.current_connection {
|
||||
let mut lock = current_connection.lock()?;
|
||||
match lock.deref_mut() {
|
||||
CurrentConnection::Tcp(tcp_stream) => {
|
||||
let _ = tcp_stream.shutdown(Shutdown::Both);
|
||||
}
|
||||
CurrentConnection::Tls(tls_conn) => {
|
||||
tls_conn.conn.send_close_notify();
|
||||
let _ = tls_conn.sock.shutdown(Shutdown::Both);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBMessageTransport for TcpTransport {
|
||||
fn read_message_with_timeout(
|
||||
&mut self,
|
||||
read_timeout: std::time::Duration,
|
||||
) -> Result<crate::device::ADBTransportMessage> {
|
||||
let raw_connection_lock = self.get_current_connection()?;
|
||||
let mut raw_connection = raw_connection_lock.lock()?;
|
||||
|
||||
raw_connection.set_read_timeout(read_timeout)?;
|
||||
|
||||
let mut data = [0; 24];
|
||||
let mut total_read = 0;
|
||||
loop {
|
||||
total_read += raw_connection.read(&mut data[total_read..])?;
|
||||
if total_read == data.len() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let header = ADBTransportMessageHeader::try_from(data)?;
|
||||
|
||||
if header.data_length() != 0 {
|
||||
let mut msg_data = vec![0_u8; header.data_length() as usize];
|
||||
let mut total_read = 0;
|
||||
loop {
|
||||
total_read += raw_connection.read(&mut msg_data[total_read..])?;
|
||||
if total_read == msg_data.capacity() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let message = ADBTransportMessage::from_header_and_payload(header, msg_data);
|
||||
|
||||
// Check message integrity
|
||||
if !message.check_message_integrity() {
|
||||
return Err(RustADBError::InvalidIntegrity(
|
||||
ADBTransportMessageHeader::compute_crc32(message.payload()),
|
||||
message.header().data_crc32(),
|
||||
));
|
||||
}
|
||||
|
||||
return Ok(message);
|
||||
}
|
||||
|
||||
Ok(ADBTransportMessage::from_header_and_payload(header, vec![]))
|
||||
}
|
||||
|
||||
fn write_message_with_timeout(
|
||||
&mut self,
|
||||
message: ADBTransportMessage,
|
||||
write_timeout: Duration,
|
||||
) -> Result<()> {
|
||||
let message_bytes = message.header().as_bytes()?;
|
||||
let raw_connection_lock = self.get_current_connection()?;
|
||||
let mut raw_connection = raw_connection_lock.lock()?;
|
||||
|
||||
raw_connection.set_write_timeout(write_timeout)?;
|
||||
|
||||
let mut total_written = 0;
|
||||
loop {
|
||||
total_written += raw_connection.write(&message_bytes[total_written..])?;
|
||||
if total_written == message_bytes.len() {
|
||||
raw_connection.flush()?;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let payload = message.into_payload();
|
||||
if !payload.is_empty() {
|
||||
let mut total_written = 0;
|
||||
loop {
|
||||
total_written += raw_connection.write(&payload[total_written..])?;
|
||||
if total_written == payload.len() {
|
||||
raw_connection.flush()?;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Debug)]
|
||||
struct NoCertificateVerification;
|
||||
|
||||
impl ServerCertVerifier for NoCertificateVerification {
|
||||
fn verify_server_cert(
|
||||
&self,
|
||||
_end_entity: &rustls::pki_types::CertificateDer<'_>,
|
||||
_intermediates: &[rustls::pki_types::CertificateDer<'_>],
|
||||
_server_name: &rustls::pki_types::ServerName<'_>,
|
||||
_ocsp_response: &[u8],
|
||||
_now: rustls::pki_types::UnixTime,
|
||||
) -> std::result::Result<rustls::client::danger::ServerCertVerified, rustls::Error> {
|
||||
Ok(ServerCertVerified::assertion())
|
||||
}
|
||||
|
||||
fn verify_tls12_signature(
|
||||
&self,
|
||||
_message: &[u8],
|
||||
_cert: &rustls::pki_types::CertificateDer<'_>,
|
||||
_dss: &rustls::DigitallySignedStruct,
|
||||
) -> std::result::Result<rustls::client::danger::HandshakeSignatureValid, rustls::Error> {
|
||||
Ok(HandshakeSignatureValid::assertion())
|
||||
}
|
||||
|
||||
fn verify_tls13_signature(
|
||||
&self,
|
||||
_message: &[u8],
|
||||
_cert: &rustls::pki_types::CertificateDer<'_>,
|
||||
_dss: &rustls::DigitallySignedStruct,
|
||||
) -> std::result::Result<rustls::client::danger::HandshakeSignatureValid, rustls::Error> {
|
||||
Ok(HandshakeSignatureValid::assertion())
|
||||
}
|
||||
|
||||
fn supported_verify_schemes(&self) -> Vec<rustls::SignatureScheme> {
|
||||
vec![
|
||||
SignatureScheme::RSA_PKCS1_SHA1,
|
||||
SignatureScheme::ECDSA_SHA1_Legacy,
|
||||
SignatureScheme::RSA_PKCS1_SHA256,
|
||||
SignatureScheme::ECDSA_NISTP256_SHA256,
|
||||
SignatureScheme::RSA_PKCS1_SHA384,
|
||||
SignatureScheme::ECDSA_NISTP384_SHA384,
|
||||
SignatureScheme::RSA_PKCS1_SHA512,
|
||||
SignatureScheme::ECDSA_NISTP521_SHA512,
|
||||
SignatureScheme::RSA_PSS_SHA256,
|
||||
SignatureScheme::RSA_PSS_SHA384,
|
||||
SignatureScheme::RSA_PSS_SHA512,
|
||||
SignatureScheme::ED25519,
|
||||
SignatureScheme::ED448,
|
||||
]
|
||||
}
|
||||
}
|
||||
30
adb_client/src/transports/traits/adb_message_transport.rs
Normal file
30
adb_client/src/transports/traits/adb_message_transport.rs
Normal file
@@ -0,0 +1,30 @@
|
||||
use std::time::Duration;
|
||||
|
||||
use super::ADBTransport;
|
||||
use crate::{device::ADBTransportMessage, Result};
|
||||
|
||||
const DEFAULT_READ_TIMEOUT: Duration = Duration::from_secs(u64::MAX);
|
||||
const DEFAULT_WRITE_TIMEOUT: Duration = Duration::from_secs(2);
|
||||
|
||||
/// Trait representing a transport able to read and write messages.
|
||||
pub trait ADBMessageTransport: ADBTransport + Clone + Send + 'static {
|
||||
/// Read a message using given timeout on the underlying transport
|
||||
fn read_message_with_timeout(&mut self, read_timeout: Duration) -> Result<ADBTransportMessage>;
|
||||
|
||||
/// Read data to underlying connection, using default timeout
|
||||
fn read_message(&mut self) -> Result<ADBTransportMessage> {
|
||||
self.read_message_with_timeout(DEFAULT_READ_TIMEOUT)
|
||||
}
|
||||
|
||||
/// Write a message using given timeout on the underlying transport
|
||||
fn write_message_with_timeout(
|
||||
&mut self,
|
||||
message: ADBTransportMessage,
|
||||
write_timeout: Duration,
|
||||
) -> Result<()>;
|
||||
|
||||
/// Write data to underlying connection, using default timeout
|
||||
fn write_message(&mut self, message: ADBTransportMessage) -> Result<()> {
|
||||
self.write_message_with_timeout(message, DEFAULT_WRITE_TIMEOUT)
|
||||
}
|
||||
}
|
||||
10
adb_client/src/transports/traits/adb_transport.rs
Normal file
10
adb_client/src/transports/traits/adb_transport.rs
Normal file
@@ -0,0 +1,10 @@
|
||||
use crate::Result;
|
||||
|
||||
/// Trait representing a transport usable by ADB protocol.
|
||||
pub trait ADBTransport {
|
||||
/// Initializes the connection to this transport.
|
||||
fn connect(&mut self) -> Result<()>;
|
||||
|
||||
/// Shuts down the connection to this transport.
|
||||
fn disconnect(&mut self) -> Result<()>;
|
||||
}
|
||||
5
adb_client/src/transports/traits/mod.rs
Normal file
5
adb_client/src/transports/traits/mod.rs
Normal file
@@ -0,0 +1,5 @@
|
||||
mod adb_message_transport;
|
||||
mod adb_transport;
|
||||
|
||||
pub use adb_message_transport::ADBMessageTransport;
|
||||
pub use adb_transport::ADBTransport;
|
||||
@@ -1,10 +0,0 @@
|
||||
use crate::Result;
|
||||
|
||||
/// Trait representing a transport
|
||||
pub trait ADBTransport {
|
||||
/// Initializes the connection
|
||||
fn connect(&mut self) -> Result<()>;
|
||||
|
||||
/// Shuts down the connection
|
||||
fn disconnect(&mut self) -> Result<()>;
|
||||
}
|
||||
232
adb_client/src/transports/usb_transport.rs
Normal file
232
adb_client/src/transports/usb_transport.rs
Normal file
@@ -0,0 +1,232 @@
|
||||
use std::{sync::Arc, time::Duration};
|
||||
|
||||
use rusb::{
|
||||
constants::LIBUSB_CLASS_VENDOR_SPEC, Device, DeviceHandle, Direction, GlobalContext,
|
||||
TransferType,
|
||||
};
|
||||
|
||||
use super::{ADBMessageTransport, ADBTransport};
|
||||
use crate::{
|
||||
device::{ADBTransportMessage, ADBTransportMessageHeader, MessageCommand},
|
||||
Result, RustADBError,
|
||||
};
|
||||
|
||||
#[derive(Debug)]
|
||||
struct Endpoint {
|
||||
iface: u8,
|
||||
address: u8,
|
||||
}
|
||||
|
||||
/// Transport running on USB
|
||||
#[derive(Debug, Clone)]
|
||||
pub struct USBTransport {
|
||||
device: Device<GlobalContext>,
|
||||
handle: Option<Arc<DeviceHandle<GlobalContext>>>,
|
||||
}
|
||||
|
||||
impl USBTransport {
|
||||
/// Instantiate a new [`USBTransport`].
|
||||
/// Only the first device with given vendor_id and product_id is returned.
|
||||
pub fn new(vendor_id: u16, product_id: u16) -> Result<Self> {
|
||||
for device in rusb::devices()?.iter() {
|
||||
if let Ok(descriptor) = device.device_descriptor() {
|
||||
if descriptor.vendor_id() == vendor_id && descriptor.product_id() == product_id {
|
||||
return Ok(Self::new_from_device(device));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Err(RustADBError::DeviceNotFound(format!(
|
||||
"cannot find USB device with vendor_id={} and product_id={}",
|
||||
vendor_id, product_id
|
||||
)))
|
||||
}
|
||||
|
||||
/// Instantiate a new [`USBTransport`] from a [`rusb::Device`].
|
||||
///
|
||||
/// Devices can be enumerated using [`rusb::devices()`] and then filtered out to get desired device.
|
||||
pub fn new_from_device(rusb_device: rusb::Device<GlobalContext>) -> Self {
|
||||
Self {
|
||||
device: rusb_device,
|
||||
handle: None,
|
||||
}
|
||||
}
|
||||
|
||||
pub(crate) fn get_raw_connection(&self) -> Result<Arc<DeviceHandle<GlobalContext>>> {
|
||||
self.handle
|
||||
.as_ref()
|
||||
.ok_or(RustADBError::IOError(std::io::Error::new(
|
||||
std::io::ErrorKind::NotConnected,
|
||||
"not connected",
|
||||
)))
|
||||
.cloned()
|
||||
}
|
||||
|
||||
fn configure_endpoint(handle: &DeviceHandle<GlobalContext>, endpoint: &Endpoint) -> Result<()> {
|
||||
handle.claim_interface(endpoint.iface)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn find_readable_endpoint(&self) -> Result<Endpoint> {
|
||||
let handle = self.get_raw_connection()?;
|
||||
for n in 0..handle.device().device_descriptor()?.num_configurations() {
|
||||
let config_desc = match handle.device().config_descriptor(n) {
|
||||
Ok(c) => c,
|
||||
Err(_) => continue,
|
||||
};
|
||||
|
||||
for interface in config_desc.interfaces() {
|
||||
for interface_desc in interface.descriptors() {
|
||||
for endpoint_desc in interface_desc.endpoint_descriptors() {
|
||||
if endpoint_desc.direction() == Direction::In
|
||||
&& endpoint_desc.transfer_type() == TransferType::Bulk
|
||||
&& interface_desc.class_code() == LIBUSB_CLASS_VENDOR_SPEC
|
||||
&& interface_desc.sub_class_code() == 0x42
|
||||
&& interface_desc.protocol_code() == 0x01
|
||||
{
|
||||
return Ok(Endpoint {
|
||||
iface: interface_desc.interface_number(),
|
||||
address: endpoint_desc.address(),
|
||||
});
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Err(RustADBError::USBNoDescriptorFound)
|
||||
}
|
||||
|
||||
fn find_writable_endpoint(&self) -> Result<Endpoint> {
|
||||
let handle = self.get_raw_connection()?;
|
||||
for n in 0..handle.device().device_descriptor()?.num_configurations() {
|
||||
let config_desc = match handle.device().config_descriptor(n) {
|
||||
Ok(c) => c,
|
||||
Err(_) => continue,
|
||||
};
|
||||
|
||||
for interface in config_desc.interfaces() {
|
||||
for interface_desc in interface.descriptors() {
|
||||
for endpoint_desc in interface_desc.endpoint_descriptors() {
|
||||
if endpoint_desc.direction() == Direction::Out
|
||||
&& endpoint_desc.transfer_type() == TransferType::Bulk
|
||||
&& interface_desc.class_code() == LIBUSB_CLASS_VENDOR_SPEC
|
||||
&& interface_desc.sub_class_code() == 0x42
|
||||
&& interface_desc.protocol_code() == 0x01
|
||||
{
|
||||
return Ok(Endpoint {
|
||||
iface: interface_desc.interface_number(),
|
||||
address: endpoint_desc.address(),
|
||||
});
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Err(RustADBError::USBNoDescriptorFound)
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBTransport for USBTransport {
|
||||
fn connect(&mut self) -> crate::Result<()> {
|
||||
self.handle = Some(Arc::new(self.device.open()?));
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn disconnect(&mut self) -> crate::Result<()> {
|
||||
let message = ADBTransportMessage::new(MessageCommand::Clse, 0, 0, "".into());
|
||||
self.write_message(message)
|
||||
}
|
||||
}
|
||||
|
||||
impl ADBMessageTransport for USBTransport {
|
||||
fn write_message_with_timeout(
|
||||
&mut self,
|
||||
message: ADBTransportMessage,
|
||||
timeout: Duration,
|
||||
) -> Result<()> {
|
||||
let endpoint = self.find_writable_endpoint()?;
|
||||
let handle = self.get_raw_connection()?;
|
||||
|
||||
if let Ok(true) = handle.kernel_driver_active(endpoint.iface) {
|
||||
handle.detach_kernel_driver(endpoint.iface)?;
|
||||
}
|
||||
|
||||
Self::configure_endpoint(&handle, &endpoint)?;
|
||||
|
||||
let message_bytes = message.header().as_bytes()?;
|
||||
let mut total_written = 0;
|
||||
loop {
|
||||
total_written +=
|
||||
handle.write_bulk(endpoint.address, &message_bytes[total_written..], timeout)?;
|
||||
if total_written == message_bytes.len() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let payload = message.into_payload();
|
||||
if !payload.is_empty() {
|
||||
let mut total_written = 0;
|
||||
loop {
|
||||
total_written +=
|
||||
handle.write_bulk(endpoint.address, &payload[total_written..], timeout)?;
|
||||
if total_written == payload.len() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn read_message_with_timeout(&mut self, timeout: Duration) -> Result<ADBTransportMessage> {
|
||||
let endpoint = self.find_readable_endpoint()?;
|
||||
let handle = self.get_raw_connection()?;
|
||||
|
||||
if let Ok(true) = handle.kernel_driver_active(endpoint.iface) {
|
||||
handle.detach_kernel_driver(endpoint.iface)?;
|
||||
}
|
||||
|
||||
Self::configure_endpoint(&handle, &endpoint)?;
|
||||
|
||||
let mut data = [0; 24];
|
||||
let mut total_read = 0;
|
||||
loop {
|
||||
total_read += handle.read_bulk(endpoint.address, &mut data[total_read..], timeout)?;
|
||||
if total_read == data.len() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let header = ADBTransportMessageHeader::try_from(data)?;
|
||||
|
||||
log::trace!("received header {header:?}");
|
||||
|
||||
if header.data_length() != 0 {
|
||||
let mut msg_data = vec![0_u8; header.data_length() as usize];
|
||||
let mut total_read = 0;
|
||||
loop {
|
||||
total_read +=
|
||||
handle.read_bulk(endpoint.address, &mut msg_data[total_read..], timeout)?;
|
||||
if total_read == msg_data.capacity() {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
let message = ADBTransportMessage::from_header_and_payload(header, msg_data);
|
||||
|
||||
// Check message integrity
|
||||
if !message.check_message_integrity() {
|
||||
return Err(RustADBError::InvalidIntegrity(
|
||||
ADBTransportMessageHeader::compute_crc32(message.payload()),
|
||||
message.header().data_crc32(),
|
||||
));
|
||||
}
|
||||
|
||||
return Ok(message);
|
||||
}
|
||||
|
||||
Ok(ADBTransportMessage::from_header_and_payload(header, vec![]))
|
||||
}
|
||||
}
|
||||
@@ -1,3 +1,5 @@
|
||||
use std::{ffi::OsStr, path::Path};
|
||||
|
||||
use crate::{Result, RustADBError};
|
||||
|
||||
pub fn u32_from_le(value: &[u8]) -> Result<u32> {
|
||||
@@ -7,3 +9,16 @@ pub fn u32_from_le(value: &[u8]) -> Result<u32> {
|
||||
.map_err(|_| RustADBError::ConversionError)?,
|
||||
))
|
||||
}
|
||||
|
||||
pub fn check_extension_is_apk<P: AsRef<Path>>(path: P) -> Result<()> {
|
||||
if let Some(extension) = path.as_ref().extension() {
|
||||
if ![OsStr::new("apk")].contains(&extension) {
|
||||
return Err(RustADBError::WrongFileExtension(format!(
|
||||
"{} is not an APK file",
|
||||
extension.to_string_lossy()
|
||||
)));
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
BIN
assets/logo.png
Normal file
BIN
assets/logo.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 280 KiB |
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user