* Support fd_fdstat_get on stdin/stdout/stderr. Add a routine for obtaining an `OsFile` containing a file descriptor for stdin/stdout/stderr so that we can do fd_fdstat_get on them. * Add a testcase for fd_fdstat_get etc. on stdin etc. * Don't dup file descriptors in fd_renumber. * Fix compilation on macOS * Rename OsFile to OsHandle This commits renames `OsFile` to `OsHandle` which seems to make more sense semantically as it is permitted to hold a valid OS handle to OS entities other than simply file/dir (e.g., socket, stream, etc.). As such, this commit also renames methods on `Descriptor` struct from `as_actual_file` to `as_file` as this in reality does pertain ops on FS entities such as files/dirs, and `as_file` to `as_os_handle` as in this case it can be anything, from file, through a socket, to a stream. * Fix compilation on Linux * Introduce `OsHandleRef` for borrowing OS resources. To prevent a `ManuallyDrop<OsHandleRef>` from outliving the resource it holds on to, create an `OsHandleRef` class parameterized on the lifetime of the `Descriptor`. * Fix scoping to pub-priv and backport to snapshot_0
139 lines
4.3 KiB
Rust
139 lines
4.3 KiB
Rust
use crate::fdentry::{Descriptor, OsHandleRef};
|
|
use crate::{wasi, Error, Result};
|
|
use std::fs::File;
|
|
use std::io;
|
|
use std::mem::ManuallyDrop;
|
|
use std::ops::{Deref, DerefMut};
|
|
use std::os::windows::prelude::{AsRawHandle, FromRawHandle, RawHandle};
|
|
|
|
#[derive(Debug)]
|
|
pub(crate) struct OsHandle(File);
|
|
|
|
impl From<File> for OsHandle {
|
|
fn from(file: File) -> Self {
|
|
Self(file)
|
|
}
|
|
}
|
|
|
|
impl AsRawHandle for OsHandle {
|
|
fn as_raw_handle(&self) -> RawHandle {
|
|
self.0.as_raw_handle()
|
|
}
|
|
}
|
|
|
|
impl Deref for OsHandle {
|
|
type Target = File;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
impl DerefMut for OsHandle {
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.0
|
|
}
|
|
}
|
|
|
|
impl AsRawHandle for Descriptor {
|
|
fn as_raw_handle(&self) -> RawHandle {
|
|
match self {
|
|
Self::OsHandle(file) => file.as_raw_handle(),
|
|
Self::Stdin => io::stdin().as_raw_handle(),
|
|
Self::Stdout => io::stdout().as_raw_handle(),
|
|
Self::Stderr => io::stderr().as_raw_handle(),
|
|
}
|
|
}
|
|
}
|
|
|
|
pub(crate) fn descriptor_as_oshandle<'lifetime>(
|
|
desc: &'lifetime Descriptor,
|
|
) -> OsHandleRef<'lifetime> {
|
|
OsHandleRef::new(ManuallyDrop::new(OsHandle::from(unsafe {
|
|
File::from_raw_handle(desc.as_raw_handle())
|
|
})))
|
|
}
|
|
|
|
/// This function is unsafe because it operates on a raw file handle.
|
|
pub(crate) unsafe fn determine_type_and_access_rights<Handle: AsRawHandle>(
|
|
handle: &Handle,
|
|
) -> Result<(
|
|
wasi::__wasi_filetype_t,
|
|
wasi::__wasi_rights_t,
|
|
wasi::__wasi_rights_t,
|
|
)> {
|
|
use winx::file::{query_access_information, AccessMode};
|
|
|
|
let (file_type, mut rights_base, rights_inheriting) = determine_type_rights(handle)?;
|
|
|
|
match file_type {
|
|
wasi::__WASI_FILETYPE_DIRECTORY | wasi::__WASI_FILETYPE_REGULAR_FILE => {
|
|
let mode = query_access_information(handle.as_raw_handle())?;
|
|
if mode.contains(AccessMode::FILE_GENERIC_READ) {
|
|
rights_base |= wasi::__WASI_RIGHTS_FD_READ;
|
|
}
|
|
if mode.contains(AccessMode::FILE_GENERIC_WRITE) {
|
|
rights_base |= wasi::__WASI_RIGHTS_FD_WRITE;
|
|
}
|
|
}
|
|
_ => {
|
|
// TODO: is there a way around this? On windows, it seems
|
|
// we cannot check access rights for anything but dirs and regular files
|
|
}
|
|
}
|
|
|
|
Ok((file_type, rights_base, rights_inheriting))
|
|
}
|
|
|
|
/// This function is unsafe because it operates on a raw file handle.
|
|
pub(crate) unsafe fn determine_type_rights<Handle: AsRawHandle>(
|
|
handle: &Handle,
|
|
) -> Result<(
|
|
wasi::__wasi_filetype_t,
|
|
wasi::__wasi_rights_t,
|
|
wasi::__wasi_rights_t,
|
|
)> {
|
|
let (file_type, rights_base, rights_inheriting) = {
|
|
let file_type = winx::file::get_file_type(handle.as_raw_handle())?;
|
|
if file_type.is_char() {
|
|
// character file: LPT device or console
|
|
// TODO: rule out LPT device
|
|
(
|
|
wasi::__WASI_FILETYPE_CHARACTER_DEVICE,
|
|
wasi::RIGHTS_TTY_BASE,
|
|
wasi::RIGHTS_TTY_BASE,
|
|
)
|
|
} else if file_type.is_disk() {
|
|
// disk file: file, dir or disk device
|
|
let file = std::mem::ManuallyDrop::new(File::from_raw_handle(handle.as_raw_handle()));
|
|
let meta = file.metadata().map_err(|_| Error::EINVAL)?;
|
|
if meta.is_dir() {
|
|
(
|
|
wasi::__WASI_FILETYPE_DIRECTORY,
|
|
wasi::RIGHTS_DIRECTORY_BASE,
|
|
wasi::RIGHTS_DIRECTORY_INHERITING,
|
|
)
|
|
} else if meta.is_file() {
|
|
(
|
|
wasi::__WASI_FILETYPE_REGULAR_FILE,
|
|
wasi::RIGHTS_REGULAR_FILE_BASE,
|
|
wasi::RIGHTS_REGULAR_FILE_INHERITING,
|
|
)
|
|
} else {
|
|
return Err(Error::EINVAL);
|
|
}
|
|
} else if file_type.is_pipe() {
|
|
// pipe object: socket, named pipe or anonymous pipe
|
|
// TODO: what about pipes, etc?
|
|
(
|
|
wasi::__WASI_FILETYPE_SOCKET_STREAM,
|
|
wasi::RIGHTS_SOCKET_BASE,
|
|
wasi::RIGHTS_SOCKET_INHERITING,
|
|
)
|
|
} else {
|
|
return Err(Error::EINVAL);
|
|
}
|
|
};
|
|
Ok((file_type, rights_base, rights_inheriting))
|
|
}
|