You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

265 lines
7.8 KiB

use clap::{arg, App};
use rdev::{
Event,
EventType::{
KeyPress,
KeyRelease,
},
Key,
};
use nix::unistd::{Group, Uid};
use once_cell::sync::OnceCell;
use std::{
thread,
sync::{
Mutex,
mpsc::{
sync_channel,
SyncSender,
Receiver
},
},
collections::HashMap,
env, fs,
io::prelude::*,
os::unix::net::UnixStream,
os::unix::net::UnixListener,
path::Path,
process::{exit, id},
thread::sleep,
time::Duration,
time::SystemTime,
};
use sysinfo::{ProcessExt, System, SystemExt};
mod config;
#[derive(PartialEq)]
pub struct LastHotkey {
hotkey: config::Hotkey,
ran_at: SystemTime,
}
static STATE_MODE: OnceCell<Mutex<String>> = OnceCell::new();
static MODE_SOCK: &str = "/tmp/odilia-mode.sock";
fn listen_for_mode_change() -> std::io::Result<()> {
log::trace!("Mode change listener started!");
let listener = UnixListener::bind(MODE_SOCK)?;
match listener.accept() {
Ok((mut socket, _addr)) => {
let mut response = String::new();
socket.read_to_string(&mut response)?;
log::trace!("reponse from odilia-mode.sock: '{}'", response);
let mode_m = STATE_MODE.get();
match mode_m {
Some(mm) => {
let mut mode = mm.lock();
match mode {
Ok(mut m) => {
*m = response;
println!("Mode updated to '{}'", m);
log::trace!("Mode updated to '{}'", m);
},
Err(e) => log::error!("Could not lock mode."),
}
},
_ => log::error!("Could not get static STATE_MODE."),
}
},
Err(e) => log::error!("accept function failed: {:?}", e),
}
Ok(())
}
pub fn key_listener() {
let args = set_flags().get_matches();
env::set_var("RUST_LOG", "swhkd=warn");
if args.is_present("debug") {
env::set_var("RUST_LOG", "swhkd=trace");
}
log::trace!("Logger initialized.");
match STATE_MODE.set(Mutex::new(String::new())) {
Err(e) => log::error!("could not initialize STATE_MODE"),
_ => log::trace!("STATE_MODE initialized"),
}
let pidfile: String = String::from("/tmp/swhkd.pid");
if Path::new(&pidfile).exists() {
log::trace!("Reading {} file and checking for running instances.", pidfile);
let swhkd_pid = match fs::read_to_string(&pidfile) {
Ok(swhkd_pid) => swhkd_pid,
Err(e) => {
log::error!("Unable to read {} to check all running instances", e);
exit(1);
}
};
log::debug!("Previous PID: {}", swhkd_pid);
let mut sys = System::new_all();
sys.refresh_all();
for (pid, process) in sys.processes() {
if pid.to_string() == swhkd_pid && process.exe() == env::current_exe().unwrap() {
log::error!("Swhkd is already running!");
exit(1);
}
}
}
match fs::write(&pidfile, id().to_string()) {
Ok(_) => {}
Err(e) => {
log::error!("Unable to write to {}: {}", pidfile, e);
exit(1);
}
}
permission_check();
let config_file_path: std::path::PathBuf;
if args.is_present("config") {
config_file_path = Path::new(args.value_of("config").unwrap()).to_path_buf();
} else {
config_file_path = check_config_xdg();
}
log::debug!("Using config file path: {:#?}", config_file_path);
if !config_file_path.exists() {
log::error!("{:#?} doesn't exist", config_file_path);
exit(1);
}
let hotkeys = match config::load(config_file_path) {
Err(e) => {
log::error!("Config Error: {}", e);
exit(1);
}
Ok(out) => out,
};
for hotkey in &hotkeys {
log::debug!("hotkey: {:#?}", hotkey);
}
let modifiers_map: HashMap<Key, config::Modifier> = HashMap::from([
(Key::MetaLeft, config::Modifier::Super),
(Key::MetaRight, config::Modifier::Super),
(Key::Alt, config::Modifier::Alt),
(Key::AltGr, config::Modifier::Alt),
(Key::ControlLeft, config::Modifier::Control),
(Key::ControlRight, config::Modifier::Control),
(Key::ShiftLeft, config::Modifier::Shift),
(Key::ShiftRight, config::Modifier::Shift),
]);
let mut possible_hotkeys: Vec<config::Hotkey> = Vec::new();
let default_test_modifier: Vec<config::Modifier> = vec![config::Modifier::Super];
let mut last_hotkey = LastHotkey {
// just a dummy last_hotkey so I don't need to mess with Option<T>. TODO: Change this to Option<T>
hotkey: config::Hotkey::new(
Some("".to_string()),
Key::KeyA,
default_test_modifier,
String::from("notify-send \"it works\""),
false,
),
ran_at: SystemTime::now(),
};
loop {
// TODO
}
}
pub fn main() {
env_logger::init();
let key_handler = thread::spawn(|| {
key_listener();
});
/*
let mode_updater = thread::spawn(|| {
let res = listen_for_mode_change();
match res {
Ok(listener) => log::trace!("Finished mode changer!"),
Err(e) => log::error!("Error setting up mode socket: {}", e),
}
});
*/
log::trace!("Threads set up");
//mode_updater.join().unwrap();
key_handler.join().unwrap();
}
pub fn permission_check() {
if !Uid::current().is_root() {
let groups = nix::unistd::getgroups();
for (_, groups) in groups.iter().enumerate() {
for group in groups {
let group = Group::from_gid(*group);
if group.unwrap().unwrap().name == "input" {
log::error!("Note: INVOKING USER IS IN INPUT GROUP!!!!");
log::error!("THIS IS A HUGE SECURITY RISK!!!!");
}
}
}
log::error!("Consider using `pkexec swhkd ...`");
} else {
log::warn!("Running swhkd as root!");
}
}
pub fn set_flags() -> App<'static> {
let app = App::new("swhkd")
.version(env!("CARGO_PKG_VERSION"))
.author(env!("CARGO_PKG_AUTHORS"))
.about("Simple Wayland HotKey Daemon")
.arg(
arg!(-c --config <CONFIG_FILE_PATH>)
.required(false)
.takes_value(true)
.help("Set a custom config file path."),
)
.arg(
arg!(-C --cooldown <COOLDOWN_IN_MS>)
.required(false)
.takes_value(true)
.help("Set a custom repeat cooldown duration. Default is 250ms."),
)
.arg(arg!(-d - -debug).required(false).help("Enable debug mode."));
app
}
pub fn check_config_xdg() -> std::path::PathBuf {
let config_file_path: std::path::PathBuf;
match env::var("XDG_CONFIG_HOME") {
Ok(val) => {
config_file_path = Path::new(&val).join("swhkd/swhkdrc");
log::debug!("XDG_CONFIG_HOME exists: {:#?}", val);
return config_file_path;
}
Err(_) => {
log::error!("XDG_CONFIG_HOME has not been set.");
config_file_path = Path::new("/etc/swhkd/swhkdrc").to_path_buf();
log::warn!(
"Note: Due to the design of the application, the invoking user is always root."
);
log::warn!("You can set a custom config file with the -c option.");
log::warn!("Adding your user to the input group could solve this.");
log::warn!("However that's a massive security flaw and basically defeats the purpose of using wayland.");
log::warn!("The following issue may be addressed in the future, but it is certainly not a priority right now.");
}
}
config_file_path
}
fn sock_send(command: &str) -> std::io::Result<()> {
let mut stream = UnixStream::connect("/tmp/swhkd.sock")?;
stream.write_all(command.as_bytes())?;
Ok(())
}