X-Git-Url: https://git.carlh.net/gitweb/?a=blobdiff_plain;f=src%2Flib%2Fcross_linux.cc;h=2d43d38019c7d2697af5fb498b3894be60d7724d;hb=66f66acc99d6de49a038735a2d3236c7a8ceedd3;hp=a60f7af6336728f1040523bca306bc4d0454931d;hpb=d0500842e988596fc329d1a6353f6ac6153f3a8d;p=dcpomatic.git diff --git a/src/lib/cross_linux.cc b/src/lib/cross_linux.cc index a60f7af63..2d43d3801 100644 --- a/src/lib/cross_linux.cc +++ b/src/lib/cross_linux.cc @@ -33,7 +33,7 @@ extern "C" { #include #include #include -#ifdef DCPOMATIC_DISK +#if BOOST_VERSION >= 106100 #include #endif #include @@ -99,21 +99,35 @@ cpu_info () } boost::filesystem::path -shared_path () +resources_path () { - char const * p = getenv ("DCPOMATIC_LINUX_SHARE_PREFIX"); - if (p) { - return p; - } - return boost::filesystem::canonical (LINUX_SHARE_PREFIX); + return directory_containing_executable().parent_path() / "share" / "dcpomatic2"; } + +boost::filesystem::path +xsd_path () +{ + return boost::filesystem::canonical(LINUX_SHARE_PREFIX) / "libdcp" / "xsd"; +} + + +boost::filesystem::path +tags_path () +{ + return boost::filesystem::canonical(LINUX_SHARE_PREFIX) / "libdcp" / "tags"; +} + + void run_ffprobe (boost::filesystem::path content, boost::filesystem::path out) { string ffprobe = "ffprobe \"" + content.string() + "\" 2> \"" + out.string() + "\""; LOG_GENERAL (N_("Probing with %1"), ffprobe); - system (ffprobe.c_str ()); + int const r = system (ffprobe.c_str()); + if (r == -1 || (WIFEXITED(r) && WEXITSTATUS(r) != 0)) { + LOG_GENERAL (N_("Could not run ffprobe (system returned %1"), r); + } } list > @@ -140,20 +154,41 @@ mount_info () return m; } + +boost::filesystem::path +directory_containing_executable () +{ +#if BOOST_VERSION >= 106100 + return boost::dll::program_location().parent_path(); +#else + char buffer[PATH_MAX]; + ssize_t N = readlink ("/proc/self/exe", buffer, PATH_MAX); + return boost::filesystem::path(string(buffer, N)).parent_path(); +#endif +} + + boost::filesystem::path openssl_path () { + boost::filesystem::path p = directory_containing_executable() / "dcpomatic2_openssl"; + if (boost::filesystem::is_regular_file(p)) { + return p; + } + return "dcpomatic2_openssl"; } + #ifdef DCPOMATIC_DISK boost::filesystem::path disk_writer_path () { - return boost::dll::program_location().parent_path() / "dcpomatic2_disk_writer"; + return directory_containing_executable() / "dcpomatic2_disk_writer"; } #endif + /* Apparently there is no way to create an ofstream using a UTF-8 filename under Windows. We are hence reduced to using fopen with this wrapper. @@ -186,10 +221,11 @@ Waker::~Waker () } + void -start_tool (boost::filesystem::path dcpomatic, string executable, string) +start_tool (string executable) { - boost::filesystem::path batch = dcpomatic.parent_path() / executable; + boost::filesystem::path batch = directory_containing_executable() / executable; pid_t pid = fork (); if (pid == 0) { @@ -198,18 +234,21 @@ start_tool (boost::filesystem::path dcpomatic, string executable, string) } } + void -start_batch_converter (boost::filesystem::path dcpomatic) +start_batch_converter () { - start_tool (dcpomatic, "dcpomatic2_batch", "DCP-o-matic\\ 2\\ Batch\\ Converter.app"); + start_tool ("dcpomatic2_batch"); } + void -start_player (boost::filesystem::path dcpomatic) +start_player () { - start_tool (dcpomatic, "dcpomatic2_player", "DCP-o-matic\\ 2\\ Player.app"); + start_tool ("dcpomatic2_player"); } + uint64_t thread_id () { @@ -226,7 +265,7 @@ avio_open_boost (AVIOContext** s, boost::filesystem::path file, int flags) boost::filesystem::path home_directory () { - return getenv("HOME"); + return getenv("HOME"); } string @@ -351,9 +390,10 @@ unprivileged () uid_t ruid, euid, suid; if (getresuid(&ruid, &euid, &suid) == -1) { cerr << "getresuid() failed.\n"; - exit (EXIT_FAILURE); } - seteuid (ruid); + if (seteuid(ruid) == -1) { + cerr << "seteuid() failed.\n"; + } } PrivilegeEscalator::~PrivilegeEscalator () @@ -363,7 +403,10 @@ PrivilegeEscalator::~PrivilegeEscalator () PrivilegeEscalator::PrivilegeEscalator () { - seteuid (0); + int const r = seteuid(0); + if (r < 0) { + throw PrivilegeError (String::compose("seteuid() call failed with %1", errno)); + } } boost::filesystem::path