b4d4a717f8
This is the final piece rearchitecting the authorized command handling and config reset flows. It decouples the command handling from the types of operations that can be executed after authorization, allowing easy extension to any platform-specific workflows. Without the direct dependency on config_resete APIs, intrusion reset is also decoupled from resetting other configuration in the system. |
||
---|---|---|
.. | ||
authorized_execution_reset_intrusion.c | ||
authorized_execution_reset_intrusion.h | ||
authorized_execution_reset_intrusion_static.h | ||
intrusion_logging.h | ||
intrusion_manager.c | ||
intrusion_manager.h | ||
intrusion_manager_async.c | ||
intrusion_manager_async.h | ||
intrusion_state.h | ||
intrusion_state_observer.h |