Skip to content

Commit a874956

Browse files
committed
Auto merge of #75148 - joechrisellis:master, r=Amanieu
Implementation of peer credentials for Unix sockets The code in `ucred.rs` is based on the work done in [PR 13](tokio-rs/tokio-uds#13) in the tokio-uds repository on GitHub. This commit is effectively a port to the stdlib, so credit to Martin Habovštiak (`@Kixunil)` and contributors for the meat of this work. 🥇 Happy to make changes as needed. 🙂
2 parents 27a45d0 + 68ff495 commit a874956

File tree

4 files changed

+185
-0
lines changed

4 files changed

+185
-0
lines changed

library/std/src/sys/unix/ext/mod.rs

+12
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,18 @@ pub mod process;
3737
pub mod raw;
3838
pub mod thread;
3939

40+
#[unstable(feature = "peer_credentials_unix_socket", issue = "42839", reason = "unstable")]
41+
#[cfg(any(
42+
target_os = "android",
43+
target_os = "linux",
44+
target_os = "dragonfly",
45+
target_os = "freebsd",
46+
target_os = "ios",
47+
target_os = "macos",
48+
target_os = "openbsd"
49+
))]
50+
pub mod ucred;
51+
4052
/// A prelude for conveniently writing platform-specific code.
4153
///
4254
/// Includes all extension traits, and some important type definitions.

library/std/src/sys/unix/ext/net.rs

+51
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,29 @@ use crate::sys::{self, cvt};
3030
use crate::sys_common::{self, AsInner, FromInner, IntoInner};
3131
use crate::time::Duration;
3232

33+
#[cfg(any(
34+
target_os = "android",
35+
target_os = "linux",
36+
target_os = "dragonfly",
37+
target_os = "freebsd",
38+
target_os = "ios",
39+
target_os = "macos",
40+
target_os = "openbsd"
41+
))]
42+
use crate::os::unix::ucred;
43+
44+
#[unstable(feature = "peer_credentials_unix_socket", issue = "42839", reason = "unstable")]
45+
#[cfg(any(
46+
target_os = "android",
47+
target_os = "linux",
48+
target_os = "dragonfly",
49+
target_os = "freebsd",
50+
target_os = "ios",
51+
target_os = "macos",
52+
target_os = "openbsd"
53+
))]
54+
pub use ucred::UCred;
55+
3356
#[cfg(any(
3457
target_os = "linux",
3558
target_os = "android",
@@ -405,6 +428,34 @@ impl UnixStream {
405428
SocketAddr::new(|addr, len| unsafe { libc::getpeername(*self.0.as_inner(), addr, len) })
406429
}
407430

431+
/// Gets the peer credentials for this Unix domain socket.
432+
///
433+
/// # Examples
434+
///
435+
/// ```no_run
436+
/// #![feature(peer_credentials_unix_socket)]
437+
/// use std::os::unix::net::UnixStream;
438+
///
439+
/// fn main() -> std::io::Result<()> {
440+
/// let socket = UnixStream::connect("/tmp/sock")?;
441+
/// let peer_cred = socket.peer_cred().expect("Couldn't get peer credentials");
442+
/// Ok(())
443+
/// }
444+
/// ```
445+
#[unstable(feature = "peer_credentials_unix_socket", issue = "42839", reason = "unstable")]
446+
#[cfg(any(
447+
target_os = "android",
448+
target_os = "linux",
449+
target_os = "dragonfly",
450+
target_os = "freebsd",
451+
target_os = "ios",
452+
target_os = "macos",
453+
target_os = "openbsd"
454+
))]
455+
pub fn peer_cred(&self) -> io::Result<UCred> {
456+
ucred::peer_cred(self)
457+
}
458+
408459
/// Sets the read timeout for the socket.
409460
///
410461
/// If the provided value is [`None`], then [`read`] calls will block

library/std/src/sys/unix/ext/ucred.rs

+97
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
//! Unix peer credentials.
2+
3+
// NOTE: Code in this file is heavily based on work done in PR 13 from the tokio-uds repository on
4+
// GitHub.
5+
//
6+
// For reference, the link is here: https://github.com/tokio-rs/tokio-uds/pull/13
7+
// Credit to Martin Habovštiak (GitHub username Kixunil) and contributors for this work.
8+
9+
use libc::{gid_t, pid_t, uid_t};
10+
11+
/// Credentials for a UNIX process for credentials passing.
12+
#[unstable(feature = "peer_credentials_unix_socket", issue = "42839", reason = "unstable")]
13+
#[derive(Clone, Copy, Debug, Eq, Hash, PartialEq)]
14+
pub struct UCred {
15+
/// The UID part of the peer credential. This is the effective UID of the process at the domain
16+
/// socket's endpoint.
17+
pub uid: uid_t,
18+
/// The GID part of the peer credential. This is the effective GID of the process at the domain
19+
/// socket's endpoint.
20+
pub gid: gid_t,
21+
/// The PID part of the peer credential. This field is optional because the PID part of the
22+
/// peer credentials is not supported on every platform. On platforms where the mechanism to
23+
/// discover the PID exists, this field will be populated to the PID of the process at the
24+
/// domain socket's endpoint. Otherwise, it will be set to None.
25+
pub pid: Option<pid_t>,
26+
}
27+
28+
#[cfg(any(target_os = "android", target_os = "linux"))]
29+
pub use self::impl_linux::peer_cred;
30+
31+
#[cfg(any(
32+
target_os = "dragonfly",
33+
target_os = "freebsd",
34+
target_os = "ios",
35+
target_os = "macos",
36+
target_os = "openbsd"
37+
))]
38+
pub use self::impl_bsd::peer_cred;
39+
40+
#[cfg(any(target_os = "linux", target_os = "android"))]
41+
pub mod impl_linux {
42+
use super::UCred;
43+
use crate::os::unix::io::AsRawFd;
44+
use crate::os::unix::net::UnixStream;
45+
use crate::{io, mem};
46+
use libc::{c_void, getsockopt, socklen_t, ucred, SOL_SOCKET, SO_PEERCRED};
47+
48+
pub fn peer_cred(socket: &UnixStream) -> io::Result<UCred> {
49+
let ucred_size = mem::size_of::<ucred>();
50+
51+
// Trivial sanity checks.
52+
assert!(mem::size_of::<u32>() <= mem::size_of::<usize>());
53+
assert!(ucred_size <= u32::MAX as usize);
54+
55+
let mut ucred_size = ucred_size as socklen_t;
56+
let mut ucred: ucred = ucred { pid: 1, uid: 1, gid: 1 };
57+
58+
unsafe {
59+
let ret = getsockopt(
60+
socket.as_raw_fd(),
61+
SOL_SOCKET,
62+
SO_PEERCRED,
63+
&mut ucred as *mut ucred as *mut c_void,
64+
&mut ucred_size,
65+
);
66+
67+
if ret == 0 && ucred_size as usize == mem::size_of::<ucred>() {
68+
Ok(UCred { uid: ucred.uid, gid: ucred.gid, pid: Some(ucred.pid) })
69+
} else {
70+
Err(io::Error::last_os_error())
71+
}
72+
}
73+
}
74+
}
75+
76+
#[cfg(any(
77+
target_os = "dragonfly",
78+
target_os = "macos",
79+
target_os = "ios",
80+
target_os = "freebsd",
81+
target_os = "openbsd"
82+
))]
83+
pub mod impl_bsd {
84+
use super::UCred;
85+
use crate::io;
86+
use crate::os::unix::io::AsRawFd;
87+
use crate::os::unix::net::UnixStream;
88+
89+
pub fn peer_cred(socket: &UnixStream) -> io::Result<UCred> {
90+
let mut cred = UCred { uid: 1, gid: 1, pid: None };
91+
unsafe {
92+
let ret = libc::getpeereid(socket.as_raw_fd(), &mut cred.uid, &mut cred.gid);
93+
94+
if ret == 0 { Ok(cred) } else { Err(io::Error::last_os_error()) }
95+
}
96+
}
97+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
use crate::os::unix::net::UnixStream;
2+
use libc::{getegid, geteuid};
3+
4+
#[test]
5+
#[cfg(any(
6+
target_os = "android",
7+
target_os = "linux",
8+
target_os = "dragonfly",
9+
target_os = "freebsd",
10+
target_os = "ios",
11+
target_os = "macos",
12+
target_os = "openbsd"
13+
))]
14+
fn test_socket_pair() {
15+
// Create two connected sockets and get their peer credentials. They should be equal.
16+
let (sock_a, sock_b) = UnixStream::pair().unwrap();
17+
let (cred_a, cred_b) = (sock_a.peer_cred().unwrap(), sock_b.peer_cred().unwrap());
18+
assert_eq!(cred_a, cred_b);
19+
20+
// Check that the UID and GIDs match up.
21+
let uid = unsafe { geteuid() };
22+
let gid = unsafe { getegid() };
23+
assert_eq!(cred_a.uid, uid);
24+
assert_eq!(cred_a.gid, gid);
25+
}

0 commit comments

Comments
 (0)