mirror of
https://github.com/jkcoxson/idevice.git
synced 2026-03-02 14:36:16 +01:00
189 lines
5.6 KiB
Rust
189 lines
5.6 KiB
Rust
// Jackson Coxson
|
|
|
|
use std::{
|
|
net::{IpAddr, SocketAddr},
|
|
str::FromStr,
|
|
};
|
|
|
|
use clap::{Arg, Command};
|
|
use idevice::{
|
|
core_device_proxy::CoreDeviceProxy, tunneld::get_tunneld_devices, xpc::XPCDevice,
|
|
IdeviceService,
|
|
};
|
|
use tokio::net::TcpStream;
|
|
|
|
mod common;
|
|
|
|
#[tokio::main]
|
|
async fn main() {
|
|
env_logger::init();
|
|
|
|
let matches = Command::new("process_control")
|
|
.about("Query process control")
|
|
.arg(
|
|
Arg::new("host")
|
|
.long("host")
|
|
.value_name("HOST")
|
|
.help("IP address of the device"),
|
|
)
|
|
.arg(
|
|
Arg::new("pairing_file")
|
|
.long("pairing-file")
|
|
.value_name("PATH")
|
|
.help("Path to the pairing file"),
|
|
)
|
|
.arg(
|
|
Arg::new("udid")
|
|
.value_name("UDID")
|
|
.help("UDID of the device (overrides host/pairing file)")
|
|
.index(2),
|
|
)
|
|
.arg(
|
|
Arg::new("about")
|
|
.long("about")
|
|
.help("Show about information")
|
|
.action(clap::ArgAction::SetTrue),
|
|
)
|
|
.arg(
|
|
Arg::new("tunneld")
|
|
.long("tunneld")
|
|
.help("Use tunneld for connection")
|
|
.action(clap::ArgAction::SetTrue),
|
|
)
|
|
.arg(
|
|
Arg::new("bundle_id")
|
|
.value_name("Bundle ID")
|
|
.help("Bundle ID of the app to launch")
|
|
.index(1),
|
|
)
|
|
.get_matches();
|
|
|
|
if matches.get_flag("about") {
|
|
println!("process_control - launch and manage processes on the device");
|
|
println!("Copyright (c) 2025 Jackson Coxson");
|
|
return;
|
|
}
|
|
|
|
let udid = matches.get_one::<String>("udid");
|
|
let pairing_file = matches.get_one::<String>("pairing_file");
|
|
let host = matches.get_one::<String>("host");
|
|
let bundle_id = matches
|
|
.get_one::<String>("bundle_id")
|
|
.expect("No bundle ID specified");
|
|
|
|
if matches.get_flag("tunneld") {
|
|
let socket = SocketAddr::new(
|
|
IpAddr::from_str("127.0.0.1").unwrap(),
|
|
idevice::tunneld::DEFAULT_PORT,
|
|
);
|
|
let mut devices = get_tunneld_devices(socket)
|
|
.await
|
|
.expect("Failed to get tunneld devices");
|
|
|
|
let (_udid, device) = match udid {
|
|
Some(u) => (
|
|
u.to_owned(),
|
|
devices.remove(u).expect("Device not in tunneld"),
|
|
),
|
|
None => devices.into_iter().next().expect("No devices"),
|
|
};
|
|
|
|
// Make the connection to RemoteXPC
|
|
let client = XPCDevice::new(Box::new(
|
|
TcpStream::connect((device.tunnel_address.as_str(), device.tunnel_port))
|
|
.await
|
|
.unwrap(),
|
|
))
|
|
.await
|
|
.unwrap();
|
|
|
|
// Get the debug proxy
|
|
let service = client
|
|
.services
|
|
.get(idevice::dvt::SERVICE_NAME)
|
|
.expect("Client did not contain DVT service");
|
|
|
|
let stream = TcpStream::connect(SocketAddr::new(
|
|
IpAddr::from_str(&device.tunnel_address).unwrap(),
|
|
service.port,
|
|
))
|
|
.await
|
|
.expect("Failed to connect");
|
|
|
|
let mut rs_client =
|
|
idevice::dvt::remote_server::RemoteServerClient::new(Box::new(stream)).unwrap();
|
|
rs_client.read_message(0).await.expect("no read??");
|
|
let mut pc_client =
|
|
idevice::dvt::process_control::ProcessControlClient::new(&mut rs_client)
|
|
.await
|
|
.unwrap();
|
|
|
|
let pid = pc_client
|
|
.launch_app(bundle_id, None, None, true, false)
|
|
.await
|
|
.expect("no launch??");
|
|
pc_client
|
|
.disable_memory_limit(pid)
|
|
.await
|
|
.expect("no disable??");
|
|
println!("PID: {pid}");
|
|
} else {
|
|
let provider = match common::get_provider(
|
|
udid,
|
|
host,
|
|
pairing_file,
|
|
"process_control-jkcoxson",
|
|
)
|
|
.await
|
|
{
|
|
Ok(p) => p,
|
|
Err(e) => {
|
|
eprintln!("{e}");
|
|
return;
|
|
}
|
|
};
|
|
|
|
let proxy = CoreDeviceProxy::connect(&*provider)
|
|
.await
|
|
.expect("no core proxy");
|
|
let rsd_port = proxy.handshake.server_rsd_port;
|
|
|
|
let mut adapter = proxy.create_software_tunnel().expect("no software tunnel");
|
|
adapter.connect(rsd_port).await.expect("no RSD connect");
|
|
|
|
// Make the connection to RemoteXPC
|
|
let client = XPCDevice::new(Box::new(adapter)).await.unwrap();
|
|
|
|
// Get the debug proxy
|
|
let service = client
|
|
.services
|
|
.get(idevice::dvt::SERVICE_NAME)
|
|
.expect("Client did not contain DVT service")
|
|
.to_owned();
|
|
|
|
let mut adapter = client.into_inner();
|
|
adapter.connect(service.port).await.unwrap();
|
|
|
|
let mut rs_client =
|
|
idevice::dvt::remote_server::RemoteServerClient::new(Box::new(adapter)).unwrap();
|
|
rs_client.read_message(0).await.expect("no read??");
|
|
let mut pc_client =
|
|
idevice::dvt::process_control::ProcessControlClient::new(&mut rs_client)
|
|
.await
|
|
.unwrap();
|
|
|
|
let pid = pc_client
|
|
.launch_app(bundle_id, None, None, true, false)
|
|
.await
|
|
.expect("no launch??");
|
|
pc_client
|
|
.disable_memory_limit(pid)
|
|
.await
|
|
.expect("no disable??");
|
|
println!("PID: {pid}");
|
|
|
|
// let mut adapter = rs_client.into_inner();
|
|
// adapter.close().await.expect("no close??");
|
|
}
|
|
}
|