307 lines
9.1 KiB
Plaintext
307 lines
9.1 KiB
Plaintext
/**
|
|
* @file src/platform/macos/misc.mm
|
|
* @brief todo
|
|
*/
|
|
#include <Foundation/Foundation.h>
|
|
#include <arpa/inet.h>
|
|
#include <dlfcn.h>
|
|
#include <fcntl.h>
|
|
#include <ifaddrs.h>
|
|
#include <mach-o/dyld.h>
|
|
#include <net/if_dl.h>
|
|
#include <pwd.h>
|
|
|
|
#include "misc.h"
|
|
#include "src/main.h"
|
|
#include "src/platform/common.h"
|
|
|
|
#include <boost/process.hpp>
|
|
|
|
using namespace std::literals;
|
|
namespace fs = std::filesystem;
|
|
namespace bp = boost::process;
|
|
|
|
namespace platf {
|
|
|
|
// Even though the following two functions are available starting in macOS 10.15, they weren't
|
|
// actually in the Mac SDK until Xcode 12.2, the first to include the SDK for macOS 11
|
|
#if __MAC_OS_X_VERSION_MAX_ALLOWED < 110000 // __MAC_11_0
|
|
// If they're not in the SDK then we can use our own function definitions.
|
|
// Need to use weak import so that this will link in macOS 10.14 and earlier
|
|
extern "C" bool
|
|
CGPreflightScreenCaptureAccess(void) __attribute__((weak_import));
|
|
extern "C" bool
|
|
CGRequestScreenCaptureAccess(void) __attribute__((weak_import));
|
|
#endif
|
|
|
|
std::unique_ptr<deinit_t>
|
|
init() {
|
|
// This will generate a warning about CGPreflightScreenCaptureAccess and
|
|
// CGRequestScreenCaptureAccess being unavailable before macOS 10.15, but
|
|
// we have a guard to prevent it from being called on those earlier systems.
|
|
// Unfortunately the supported way to silence this warning, using @available,
|
|
// produces linker errors for __isPlatformVersionAtLeast, so we have to use
|
|
// a different method.
|
|
// We also ignore "tautological-pointer-compare" because when compiling with
|
|
// Xcode 12.2 and later, these functions are not weakly linked and will never
|
|
// be null, and therefore generate this warning. Since we are weakly linking
|
|
// when compiling with earlier Xcode versions, the check for null is
|
|
// necessary and so we ignore the warning.
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wunguarded-availability-new"
|
|
#pragma clang diagnostic ignored "-Wtautological-pointer-compare"
|
|
if ([[NSProcessInfo processInfo] isOperatingSystemAtLeastVersion:((NSOperatingSystemVersion) { 10, 15, 0 })] &&
|
|
// Double check that these weakly-linked symbols have been loaded:
|
|
CGPreflightScreenCaptureAccess != nullptr && CGRequestScreenCaptureAccess != nullptr &&
|
|
!CGPreflightScreenCaptureAccess()) {
|
|
BOOST_LOG(error) << "No screen capture permission!"sv;
|
|
BOOST_LOG(error) << "Please activate it in 'System Preferences' -> 'Privacy' -> 'Screen Recording'"sv;
|
|
CGRequestScreenCaptureAccess();
|
|
return nullptr;
|
|
}
|
|
#pragma clang diagnostic pop
|
|
return std::make_unique<deinit_t>();
|
|
}
|
|
|
|
fs::path
|
|
appdata() {
|
|
const char *homedir;
|
|
if ((homedir = getenv("HOME")) == nullptr) {
|
|
homedir = getpwuid(geteuid())->pw_dir;
|
|
}
|
|
|
|
return fs::path { homedir } / ".config/sunshine"sv;
|
|
}
|
|
|
|
using ifaddr_t = util::safe_ptr<ifaddrs, freeifaddrs>;
|
|
|
|
ifaddr_t
|
|
get_ifaddrs() {
|
|
ifaddrs *p { nullptr };
|
|
|
|
getifaddrs(&p);
|
|
|
|
return ifaddr_t { p };
|
|
}
|
|
|
|
std::string
|
|
from_sockaddr(const sockaddr *const ip_addr) {
|
|
char data[INET6_ADDRSTRLEN] = {};
|
|
|
|
auto family = ip_addr->sa_family;
|
|
if (family == AF_INET6) {
|
|
inet_ntop(AF_INET6, &((sockaddr_in6 *) ip_addr)->sin6_addr, data,
|
|
INET6_ADDRSTRLEN);
|
|
}
|
|
else if (family == AF_INET) {
|
|
inet_ntop(AF_INET, &((sockaddr_in *) ip_addr)->sin_addr, data,
|
|
INET_ADDRSTRLEN);
|
|
}
|
|
|
|
return std::string { data };
|
|
}
|
|
|
|
std::pair<std::uint16_t, std::string>
|
|
from_sockaddr_ex(const sockaddr *const ip_addr) {
|
|
char data[INET6_ADDRSTRLEN] = {};
|
|
|
|
auto family = ip_addr->sa_family;
|
|
std::uint16_t port = 0;
|
|
if (family == AF_INET6) {
|
|
inet_ntop(AF_INET6, &((sockaddr_in6 *) ip_addr)->sin6_addr, data,
|
|
INET6_ADDRSTRLEN);
|
|
port = ((sockaddr_in6 *) ip_addr)->sin6_port;
|
|
}
|
|
else if (family == AF_INET) {
|
|
inet_ntop(AF_INET, &((sockaddr_in *) ip_addr)->sin_addr, data,
|
|
INET_ADDRSTRLEN);
|
|
port = ((sockaddr_in *) ip_addr)->sin_port;
|
|
}
|
|
|
|
return { port, std::string { data } };
|
|
}
|
|
|
|
std::string
|
|
get_mac_address(const std::string_view &address) {
|
|
auto ifaddrs = get_ifaddrs();
|
|
|
|
for (auto pos = ifaddrs.get(); pos != nullptr; pos = pos->ifa_next) {
|
|
if (pos->ifa_addr && address == from_sockaddr(pos->ifa_addr)) {
|
|
BOOST_LOG(verbose) << "Looking for MAC of "sv << pos->ifa_name;
|
|
|
|
struct ifaddrs *ifap, *ifaptr;
|
|
unsigned char *ptr;
|
|
std::string mac_address;
|
|
|
|
if (getifaddrs(&ifap) == 0) {
|
|
for (ifaptr = ifap; ifaptr != NULL; ifaptr = (ifaptr)->ifa_next) {
|
|
if (!strcmp((ifaptr)->ifa_name, pos->ifa_name) && (((ifaptr)->ifa_addr)->sa_family == AF_LINK)) {
|
|
ptr = (unsigned char *) LLADDR((struct sockaddr_dl *) (ifaptr)->ifa_addr);
|
|
char buff[100];
|
|
|
|
snprintf(buff, sizeof(buff), "%02x:%02x:%02x:%02x:%02x:%02x",
|
|
*ptr, *(ptr + 1), *(ptr + 2), *(ptr + 3), *(ptr + 4), *(ptr + 5));
|
|
mac_address = buff;
|
|
break;
|
|
}
|
|
}
|
|
|
|
freeifaddrs(ifap);
|
|
|
|
if (ifaptr != NULL) {
|
|
BOOST_LOG(verbose) << "Found MAC of "sv << pos->ifa_name << ": "sv << mac_address;
|
|
return mac_address;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
BOOST_LOG(warning) << "Unable to find MAC address for "sv << address;
|
|
return "00:00:00:00:00:00"s;
|
|
}
|
|
|
|
bp::child
|
|
run_command(bool elevated, bool interactive, const std::string &cmd, boost::filesystem::path &working_dir, bp::environment &env, FILE *file, std::error_code &ec, bp::group *group) {
|
|
if (!group) {
|
|
if (!file) {
|
|
return bp::child(cmd, env, bp::start_dir(working_dir), bp::std_out > bp::null, bp::std_err > bp::null, ec);
|
|
}
|
|
else {
|
|
return bp::child(cmd, env, bp::start_dir(working_dir), bp::std_out > file, bp::std_err > file, ec);
|
|
}
|
|
}
|
|
else {
|
|
if (!file) {
|
|
return bp::child(cmd, env, bp::start_dir(working_dir), bp::std_out > bp::null, bp::std_err > bp::null, ec, *group);
|
|
}
|
|
else {
|
|
return bp::child(cmd, env, bp::start_dir(working_dir), bp::std_out > file, bp::std_err > file, ec, *group);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Open a url in the default web browser.
|
|
* @param url The url to open.
|
|
*/
|
|
void
|
|
open_url(const std::string &url) {
|
|
boost::filesystem::path working_dir;
|
|
std::string cmd = R"(open ")" + url + R"(")";
|
|
|
|
boost::process::environment _env = boost::this_process::environment();
|
|
std::error_code ec;
|
|
auto child = run_command(false, false, cmd, working_dir, _env, nullptr, ec, nullptr);
|
|
if (ec) {
|
|
BOOST_LOG(warning) << "Couldn't open url ["sv << url << "]: System: "sv << ec.message();
|
|
}
|
|
else {
|
|
BOOST_LOG(info) << "Opened url ["sv << url << "]"sv;
|
|
child.detach();
|
|
}
|
|
}
|
|
|
|
void
|
|
adjust_thread_priority(thread_priority_e priority) {
|
|
// Unimplemented
|
|
}
|
|
|
|
void
|
|
streaming_will_start() {
|
|
// Nothing to do
|
|
}
|
|
|
|
void
|
|
streaming_will_stop() {
|
|
// Nothing to do
|
|
}
|
|
|
|
void
|
|
restart_on_exit() {
|
|
char executable[2048];
|
|
uint32_t size = sizeof(executable);
|
|
if (_NSGetExecutablePath(executable, &size) < 0) {
|
|
BOOST_LOG(fatal) << "NSGetExecutablePath() failed: "sv << errno;
|
|
return;
|
|
}
|
|
|
|
// ASIO doesn't use O_CLOEXEC, so we have to close all fds ourselves
|
|
int openmax = (int) sysconf(_SC_OPEN_MAX);
|
|
for (int fd = STDERR_FILENO + 1; fd < openmax; fd++) {
|
|
close(fd);
|
|
}
|
|
|
|
// Re-exec ourselves with the same arguments
|
|
if (execv(executable, lifetime::get_argv()) < 0) {
|
|
BOOST_LOG(fatal) << "execv() failed: "sv << errno;
|
|
return;
|
|
}
|
|
}
|
|
|
|
void
|
|
restart() {
|
|
// Gracefully clean up and restart ourselves instead of exiting
|
|
atexit(restart_on_exit);
|
|
lifetime::exit_sunshine(0, true);
|
|
}
|
|
|
|
bool
|
|
send_batch(batched_send_info_t &send_info) {
|
|
// Fall back to unbatched send calls
|
|
return false;
|
|
}
|
|
|
|
std::unique_ptr<deinit_t>
|
|
enable_socket_qos(uintptr_t native_socket, boost::asio::ip::address &address, uint16_t port, qos_data_type_e data_type) {
|
|
// Unimplemented
|
|
//
|
|
// NB: When implementing, remember to consider that some routes can drop DSCP-tagged packets completely!
|
|
return nullptr;
|
|
}
|
|
|
|
} // namespace platf
|
|
|
|
namespace dyn {
|
|
void *
|
|
handle(const std::vector<const char *> &libs) {
|
|
void *handle;
|
|
|
|
for (auto lib : libs) {
|
|
handle = dlopen(lib, RTLD_LAZY | RTLD_LOCAL);
|
|
if (handle) {
|
|
return handle;
|
|
}
|
|
}
|
|
|
|
std::stringstream ss;
|
|
ss << "Couldn't find any of the following libraries: ["sv << libs.front();
|
|
std::for_each(std::begin(libs) + 1, std::end(libs), [&](auto lib) {
|
|
ss << ", "sv << lib;
|
|
});
|
|
|
|
ss << ']';
|
|
|
|
BOOST_LOG(error) << ss.str();
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
int
|
|
load(void *handle, const std::vector<std::tuple<apiproc *, const char *>> &funcs, bool strict) {
|
|
int err = 0;
|
|
for (auto &func : funcs) {
|
|
TUPLE_2D_REF(fn, name, func);
|
|
|
|
*fn = (void (*)()) dlsym(handle, name);
|
|
|
|
if (!*fn && strict) {
|
|
BOOST_LOG(error) << "Couldn't find function: "sv << name;
|
|
|
|
err = -1;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
} // namespace dyn
|